Ict Notes Senior 1
Ict Notes Senior 1
Ict Notes Senior 1
Data: Is raw facts that have entered into a computer but have not been processed. It refers to statistics,
symbols, basic facts, figures, numbers or simply records.
Note: The term data is the plural form of datum. However, in modern usage, the term data is used both as a
singular and plural term.
Digital data, unlike analog data, does not vary continuously with time. Digital data are discrete, that is their
values have only two possible states: that is, 0 or 1; On or Off; and True or False.
This is the systematic collection of data from various sources for a specific purpose.
1.2. Information
Information: Is a processed facts or data that is meaningful and useful to the user.
- Accuracy
- Relevance
- Timeliness / Age
- Completeness
Page 1 of 90
- Presentation
Accuracy: This is the measure of how close information is to the original data.
Relevance: Information is considered to be relevant if it can be used for what it was intended.
Information that is not accurate or timely is there for not relevant. Relevant information should therefore
be appropriate to the user needs.
Timeliness / Age: Information changes overtime. This means that out of date information can be
irrelevant; therefore, information needs to be up to date to avoid cases of misleading or giving the wrong
picture of what is happening.
Completeness: Good information should be complete. It should provide all the relevant facts and
aspects required by the user to make the right decision.
1.3. Communication
Communication: Is the art or process of coding sounds, words, symbols, signs, pictures, videos or signals in a
particular format in order to pass information or message through a medium from one person to another.
- Source / Sender
- Content
- Communication channel
- Receiver
- Feedback
Communication channel: This refers to the medium of transmission used to deliver the message.
Message
Message Content / Communication Message
sender Message channel receiver
Feedback
Page 2 of 90
There are two basic types of communication which include:
- Verbal communication
- Non - verbal communication
Verbal communication: This is the use of spoken words to send a message. It can also be oral or written.
It involves both speaking and listening.
1.4. Technology
Technology of teaching
Assistive technology
Medical technology
Information technology (IT)
Military technology
Food technology
Banking technology
Weather forecasting technology
Broadcasting technology
1. Technology of teaching
2. Assistive technology
It applies various types of services and devices designed to help people with disabilities to function within an
environment.
It includes:
- Electronic
- Microprocessor based equipment
- Mechanical
Page 3 of 90
- Non mechanical
- Specialized instructional materials
- Strategies
Assistive technology enhances the lives of people with disabilities in the following ways:
3. Medical technology
It is the use of scientific knowledge in health care to diagnose, monitor and treat diseases or medical conditions.
It is the use of computers, storage devices networking devices, and other electronic devices to create, process,
store, secure, and exchange all forms of data.
ICT: Is an application of information technology and telecommunication that includes the use of computer
hardware, software, and telecommunications equipment for transmission and presentation of information.
- Radio
- Television
- Mobile phones
- Computers
- Tablet
- Billing Machines
- Satellite
- Projector
1. Radio
This is device that is used to receive radio signals from broadcasting stations and convert them into sound.
Connect the power cable to the power supply or insert dry cells in the radio battery compartment.
Switch on the power button
Using the frequency adjustment knob, tune to the desired frequency.
Page 4 of 90
2. Television (TV)
Use of a television
It is an electronic device for receiving and reproducing images and sound of combined video and audio signals.
3. Computer
A computer: Is an electronic device which is capable of receiving data and processing into information.
A computer has the ability to store, retrieve, and process data. The user is able to type documents, send and
receive emails, play games, and browse the internet.
4. Tablet
It is a portable computer fitted with a touch screen display, circuitry, and battery in a single device. It is also
equipped with features, including cameras, a microphone, and a speaker.
5. Billing Machines
It is used in business to itemize, compute customer accounts, generate bills, provide customer invoices, and
send account records.
6. Satellite
Use of satellite
A satellite: Is a self-contained communications system. It has the ability to receive signals from the earth and to
retransmit those signals back.
7. Projector
Page 5 of 90
It is an output device that uses light and lenses to take images generated by computer and reproduce them on a
larger flat screen or wall.
o Education
o Health
o Business
o Communication
o Banking
o Manufacturing and production
a. Education
This is the integration of ICT into the learning process. It is also known as Computer Based Training (CBT).
It involves the use of computers in education and training.
- Education games
- Problem solving tutorials
- Drill and practice
- Simulation
o Educational games: These are electronic games that have content relevant to a subject area
o Problem solving tutorials: These are self-instructional programs that guide the learner through learning
and resource material acting as their virtual teacher.
o Drill and practice: A set of question from a database are given to students repeatedly to practice skills
and concepts. These questions have the answers in order to help a computer to mark.
Page 6 of 90
This involves the use of computers to teach academic skills to students. CAI is used to develop communication
and language skills.
It is a computerized innovation used in marking multiple choice examination papers where a box is marked in
pencil to indicate the candidate’s preferred answer.
E – learning
It is the delivery of educational programs, training or learning materials by electronic means. It uses the
electronic devices such as:
- Mobile phones
- Tablets
- Computers
- Internet
Computer simulation
This is the modelling of a real situation using a computer. It is used to model industrial processes enabling
better understanding and improvement of production systems.
b. Health
c. Business
Business: Refers to commercial activities carried out for profit. Electronic business (e-business) is the
application of ICT in support of business activities.
Online shopping: The use of plastic money, that is, money held in electronic credit cards or mobile
devices makes it possible to order for goods and services from the comfort of one’s home or office.
Advertising and marketing: Through the use of websites, organizations are able to advertise at a low
cost. Example: The Online exchange (OLX) website is used for selling second hand items.
Use of electronic billboards: These are created using graphic software such as
o Adobe Illustrator
o Adobe Photoshop
Promotional presentations: These could be created using power point presentations, video
presentations, and animation software.
d. Communication
ICT is used to transmit textual, visual and audio information from one point to another through the use of
telecommunication equipment at a very high speed.
This is achieved through the use of electronic mails (e-mails), live chatting systems, online meetings (via
skype), short messages services (SMS), facsimile (fax), and video conferencing among others.
e. Banking
Customer are also enabled to access their bank details through SMS alerts.
ICT based systems such as: Computer Integrated Manufacturing (CIM), Computer Aided Design (CAD),
Computer Aided Engineering (CAE) are used to monitor and control production processes in factories.
Page 8 of 90
Advantages of ICT
Disadvantages of ICT
The initial capital investment of buying new equipment and the cost of maintenance is usually high.
ICT and automation can lead to loss of jobs, especially for computer illiterate persons.
ICT equipment such as computes can lead to health problems. Some known health risks related to
computer use include eye problems, backache, and wrist injuries.
The Rwandan government has invested greatly in a knowledge based economy with ICT as its cornerstone.
o Learning in schools
o Distance learning
o E-ICT
Learning in schools: The government project for One Laptop Per Child (OLPC) has facilitated the use
of computers in learning institution.
Distance learning: ICT has facilitated the running of distant educational programs. Distance learning
programs offer opportunities for further training for people who desire to advance their education.
E-ICT: Electronic ICT is easily accessible to anyone interested in high technology courses. Such
programs enable one to keep up to date with new technologies.
Example for this: Microsoft office applications and Cisco Networking (International Driving License):
Programs used in E-ICT.
- Record keeping
Page 9 of 90
- Mobile e-health systems
- Telemedicine
Record keeping: The use of systems such as open Medical Records System (Open MRS) and
Treatment and Research Aids Centre (TRAC) net system facilitates nationwide tracking of patient data
and managing clinical heath information.
Mobile e-health systems: They are used by community health worker to collect data on patients and
health management, for example, Open MRS and TRAC net systems.
Telemedicine: This facility allows the sharing of clinical information between urban and rural hospitals.
Mobile banking and financial services: Mobile service provides have introduced money transfer and
other financial services.
Village banking: Banks are using telecommunication facilities to provide banking services in remote
areas.
E-business: ICT is a great medium of transacting businesses. Through electronic payment systems such
as credit cards and online banking, clients are able to transact business across borders without moving
physically from one location to another.
Market survey: Rwandans have real time updates about the stock exchange daily market status. This
enables them to make informed decisions about investments.
E-Soko: This project enables farmers to make informed market pricing decisions on their produces.
d. Communication
- Video conferencing
- E-mail
- Internet
Video conferencing: This refers to communication between individuals in different locations by use of
simultaneous two-way audio and video transmissions.
o Holding meeting
o Facilitate distance learning
o Interview employees remotely
o Television and video broadcasting
Page 10 of 90
- Holding meeting: Video conferencing provides a platform to work with others across a distance.
Example: Local government leaders in Rwanda from all districts are able to hold meetings and interact with the
minister of local government through video conferencing technology.
- Facilitate distance learning: Student in Rwanda are able to register and take courses offered in foreign
universities through online learning.
- Interview employees remotely: Public and private institutions in Rwanda are able conduct job
interviews without requiring the interviewees to be physically present within their premises. A popular
platform for this is Skype for business.
- Television and video broadcasting: Radio and television reporters are able to relay news on location
for broadcasting. Video conferencing also enables a reporter to interview news sources across the world.
E-mail: E-mail stands for Electronic mail. It is a method of exchanging typed messages and
attachments electronically between individuals. It used in Rwanda to communicate with employees,
customers, friends, and family. It has enabled people to communicate with others outside Rwanda.
Yahoo! mail
Gmail
Hotmail
Internet: The following are some of the application areas of the internet:
- Research
- Library
- Online books
- Socializing
Research: Internet has a lot of information which can be used for research materials.
Library: The internet has enabled libraries to be accessed from anywhere at any time.
Online books: Internet has enabled the availability of book online. A book can be accessed easily by
many readers.
Page 11 of 90
Example: Online book site is: www.magickeys.com/books
Socializing: The internet enables the creation of social network services that develop online
communications of people who have common interests and activities.
e. Service delivery
In Rwanda, the internet has made it possible for delivery of services to the public online. There are services that
are delivered through the website known as: www.irembo.gov.rw .
Example of delivered on this website include the issuing of driving licenses and birth certificates.
A computer: Is an electronic device that using a set of instructions, stores it, and gives information as the
output.
- Input
- Processing
- Storage
- Output
Input: This is data entered into a computer for processing.
- Speed
- Accuracy
- Versatility
- Reliability
- Power of remembering
- No Intelligence Quotient (IQ)
- Diligence
- Storage
Page 12 of 90
Speed: A computer can carry out processing of instructions at a very high speed.
Accuracy: Computers are very precise in processing data as long as they are fed with correct data and
instructions.
Versatility: A computer can perform more than one task at the same time. This is called multitasking.
Power or remembering: A computer can store and re-produce information any time because of its large
secondary storage space.
No Intelligence Quotient (IQ): A computer possesses no intelligence of its own. If the data fed into the
computer does not make sense, the output will also not make sense to the user.
Diligence: It can also perform long and complex calculations with same speed and accuracy from the
start until the end.
Storage: Depending on the size of its memory, a computer can hold tremendous amount of data. It also
has a variety of removable storage locations that could be used to back up data.
A computer system: Is a collection of components that work together to process data and manage information
in a computer in order to achieve a desired goal.
- Hardware
- Software
- Live ware (user)
2.2.1. Hardware
Hardware: Refers to any physical or tangible component of a computer. It could be mechanical or electronic.
Example:
CPU: Is also known as the Processor. It is commonly referred to as the brain of a computer system.
Page 13 of 90
It consists of three components namely:
Control Unit
Memory Unit
Arithmetic and Logic unit (ALU)
It is the part of the CPU that performs two main functions, namely:
Arithmetic operations: Such as addition (+), subtraction (-), division (/), and multiplication (x).
Logical operations: Such as OR, AND, NOT among others.
It is the part of the CPU that coordinates the activities of different section of the processor and input / output
(I/O) devices.
The above functions can be summarized in what is regarded to as Fetch Execute cycle.
Page 14 of 90
Memory units
Registers: They are temporary storage locations found inside the processor that are used to hold data,
instructions or information awaiting processing or output.
- Instruction register
- Accumulator register
- Address register
- Storage register
Instruction register: It temporarily holds and instruction before it is converted to machine readable
format.
Address register: It temporarily stores the address of the next instruction to be processed.
Accumulator register: It temporarily holds the last processing steps of the Arithmetic Logic Unit
(ALU)
b. Computer peripherals
Peripheral devices: Are computer components that are connected to the ports in the system unit through cables
or wireless media. They include:
- Input devices
- Output devices.
Input devices
These are hardware components that are used to enter data and instructions into a computer. They are classified
into:
o Keying devices
o Pointing devices
o Scanning devices
o Voice input devices
1. Keying devices
These are input devices that enable entry of data into the computer through the use of a set of keys. These
devices are used for typing letters, numbers, symbols, and commands by pressing a key or combination of keys.
Examples:
Page 15 of 90
- Keyboard
- Keypad
Examples:
- Traditional
- Flexible
- Braille
- Ergonomic
o Traditional keyboard: They are large and rigid keyboard. They are named based on the arrangement of
the first six characters in the first row of the alphabet keys.
They include:
- QWERTY
- AZERTY
- QWERTZ
- HCESAR
o Ergonomic keyboard: This is designed to minimize wrist injury. It is connected to the system unit
using the Universal Serial Bus (USB) cable. Some ergonomic keyboards are split.
o Flexible keyboard: This is a portable keyboard which can be folded and carried in a bag.
o Braille keyboard: This is specifically designed for the visually impaired. The keys have raised dots
enabling the user to feel and identify the character or symbol represented by the key.
o Keypad: This is a small keyboard, which is mostly used on devices such as:
- Palmtops
- Calculator
- Microwaves
- Washing machines
2. Pointing devices
These are devices which control the movement of a cursor or a pointer on the computer screen.
Examples:
- Mouse
- Trackball
- Joystick
- Touch screen
Page 16 of 90
- Light pen
- Touch pad
- Graphic tablet
Mechanical mouse
Optical mouse
Wireless mouse
Mechanical mouse: It contains a ball under Neath which is rotated when the mouse is moved hence
controlling a pointer on the screen.
Optical mouse: It uses digital image processing technology to track the position of the mouse.
Wireless mouse: It does not use cables. It uses infrared and radio waves such as Bluetooth to control
the pointer on the screen.
Mouse action
- Clicking
- Double clicking
- Right clicking
- Drag and drop
Clicking: This is pressing and releasing the left mouse button once. It is used when selection an item.
Double clicking: This is pressing and releasing the left mouse button twice in quick succession. It is
used when opening a file / folder, or starting a program.
Right clicking: This is pressing and clicking the right mouse once. It is used to display the content
menu.
Drag and drop: It is pressing and left mouse button on an item. The location and the button released in
order to move an item.
b. Trackball: It is a pointing device with a ball on the top that is rotated with the finger preferably the
thumb, or the palm of the user’s hand to control the pointer on the screen.
c. Joystick: It is a device that looks like a gear lever used to control the movement of the pointer or some
objects on the screen.
It is mainly used for playing games. A joystick can contain more than three buttons for further manipulation of
the object when playing computer games.
d. Light pen: It is a hand held input device that utilizes a light sensitive detector to select objects or to
write on the screen.
It contains sensors at its tip that send signals to the computer whenever light is recorded. They are often used in
design and can also be used for sensing information on magnetic bars and stripes.
Page 17 of 90
e. Touch screen: It is an input device designed to recognize the location of a touch on its surface.
f. Touch pad: It is a pointing device commonly found in laptops where the user places or moves the finger
across it to control the pointer on the screen.
It contains two buttons that are clicked once the desired location is clicked once the desired location is reached
in order to execute an action.
j. graphics tablet or digitizer: It is a pointing device used by designers and artists. They use it to draw a
picture on a computer screen by free hand without using a mouse or a keyboard.
It consists of:
- Flat
- Touch sensitive pad
- Some sort drawing device such as stylus.
Stylus: Is a pen like device moved over the surface of the tablet. Data about the stylus movements are sent to
the computer.
3. Scanning devices
They are also known as Scanners. They are peripheral components that capture data from the source directly to
the computer by converting it into digital format. The source can either be a paper or an object.
- Optical scanners
- Magnetic scanners
a. Optical scanners: These scanners capture data using light technology. Light is passed over the object or
paper to capture the image. The image is then analyzed by specialized software.
Examples:
A Barcode: Is a series of printed parallel vertical lines that differ in thickness and spacing. A barcode contains
information about the item ID number.
Once a barcode has been scanned, the computer reads the information stored on the barcode and accessed
details about the product from the computer data base.
Handheld barcode reader: It is also known as a wand. It is held by hand and passed over the product’s
barcodes to read the information.
Countertop barcode reader: It is permanently fixed on the counter and the product is passed over it to
read the information.
This is technology is used to read marks made using a pencil on a piece of pre-printed paper. They are used in
reading shaded area in multiple choice examinations, lottery tickets, and questionnaires with objectives type
questions.
Optical character readers consist of a scanner along with special user inter active software. They allow
scanning of characters on paper (Hardcopy) into a softcopy that is stored in the computer. The softcopy version
can be edited of formatted.
b. Magnetic scanners: These scanners capture data written using magnetic ink.
Examples:
Magnetic Ink Character Recognition (MICR): It is a scanner that reads characters printed using
special magnetized ink (the ink contains iron particles).
MICR is widely used by bank to authenticate cheques and obtain the information written using magnetic ink on
the cheque.
Mobile card machine: It is also the chip or the pin reader. It is a device used by bank agents to access
bank account details of the customer. A plastic card containing a chip is inserted in a slot. The user then
enters his or her Personal Identification Number (PIN).
Magnetic Stripe Recognition: This reads information coded in a magnetic stripe at the back of a plastic
card when the card is swiped through it.
They can also be used to control access to a building by swiping the card through the reader. The difference
between Magnetic Stripe Card Reader and Mobile Card Machine is that the magnetic stripe card reader reads
cards with a magnetic stripe by swiping; while a mobile card machine reads with a microchip.
Page 19 of 90
Magnetic Resonance Imaging (MRI): This is a medical imaging or scanning technology that is used to
image the human body the body systems. It is used in medical tests. It takes the pictures of human body
organs, including tissues and bones. The MRI is used to scan for and diagnose diseases.
These are devices used to input data in the form of spoken words into the computer.
Example: Microphone
Output devices
Those are devices used for displaying data and information. They are classified into two categories namely:
These are devices which produce output that is recorded on tangible media such as paper.
Examples:
- Printers
- Plotters
Printers
A printer: Is a peripheral device that produces hardcopy output. Printers can be broadly classified into:
- Impact printers
- Non-impact printers.
a. Impact printers
They print on paper. The print head physically strikes an inked ribbon. The ribbon then presses on a paper
medium to create the image hence the name impact printer.
Impact printers can produce multiple copies of the same document at the same time using carbonate paper. Due
to the impact made by the print head, impact printers are noisy.
Example:
- Daisy wheel
- Dot-matrix
- Drum
Daisy wheel printers: These printers got their name from the daisy flower. The wheel has hammer like
structures that resemble the petals of a daisy flower. These printers can only print one character at a
time.
Dot Matrix printers: The head of this printer consists of pins arranged in a matrix.
Page 20 of 90
Drum printers: Characters are raised in a cylindrical drum values of all characters are stored in the
printer buffer.
They are printers that use thermal or electrostatic principles to produce print on paper. The print head element
does not come into contact with the paper; hence they are quiet while printing. They print faster and produce
high quality prints compared to impact printers.
- ink Jet
- Laser Jet
- Thermal printers
Ink Jet printers: These printers spray little dots of ink on a paper forming the shapes of characters and
pictures when printing. They are commonly used for non-commercial purposes. Their initial cost is low
but maintenance cost is very high. This is due to the high price of buying a new cartridge and the low
number of print out papers produce per cartridge.
Laser Jet printers: They use the principle of light to form images on the paper. The printers operate by
shinning a laser beam that ionizes some regions on the drum.
Thermal printers: These printers use thermal (heat) technology to produce images on a special paper.
The print mechanism is designed to heat the surface of chemically treated paper referred to as
thermochromics or thermal paper.
They are popularly used at Point of Sale (POS) terminals to print receipts.
Plotters
These are special purpose output devices. They are used to produce high quality, multi-color documents or large
size documents such as charts, maps, architectural drawings, and three dimensional representations based on
commands from a computer.
Drum plotters: In this type, the paper is mounted on the surface of the drum in the plotter.
Flatted plotters: in this type, the paper is fixed on a flat surface ad pens are moved to create the image.
These are devices that produce information that can be seen, listened to, but not tangible.
Examples:
Page 21 of 90
- Monitors
- Projectors
- Speakers
Monitors
A monitor: Is also referred to as Video Display Unit (VDU) or the Screen. It is used to display data and
information.
1. Cathode Ray Tube (CRT) monitors: They are bulky and heavy. They produce an image (made up of
tiny dots) by firing electron beams against phosphor screen. Each dot is colored red, green, and blue of
different intensities combining to create millions of different color shades.
2. Flat screens: These monitors are becoming popular nowadays and are used in desktop and laptop
computers. They are all characterized by the flat shape which makes them to be lighter, less bulky, and
they consume less power than the CRT monitors.
Liquid Crystal Display (LCD) monitor: The monitor consists of two polarizing transparent plates and
a liquid crystal solution in between them.
Thin Film Transitor (TFT) monitor: This is made up of thousands of small pixels. Each pixel consists
of three transistors which are red, green, and blue. Each transitor can produce different intensities of
light which allow huge amounts of colors to be produced.
A back light: Is used to shine light onto these pixels to enable the colors to be produced.
Gas Plasma Display (GPD) monitor: It is a thin display screen. It works by enclosing neon gas
between two plates where each plate is coated with a conductive print.
Electroluminescent Display (ELD) monitor: This is an optical and electrical phenomenon where a
material emits light in response to an electric current passed through it.
These are devices that convert electronic signals from the computer into audible sounds. This is achieved
through the use of transducers such as speakers.
Page 22 of 90
A transducer: Is a device that converts energy from one form to another.
Projector
It is a device that uses light and lenses to take am image, magnify it, and project it onto a larges screen or a wall.
A connector: Is a part of a cable that plugs into a port or interface to connect two devices.
Connectors can either be male (containing one or more exposed pins) or female (containing holes into which the
male connector can be inserted)
Page 23 of 90
Storage
These are devices that are used for storing data, information, and instructions. These are divided into three
categories, namely:
Primary memory
Secondary memory / Mass storage
Tertiary storage
a. Primary memory
Primary memory refers to the computer’s memory, which interacts directly with the computer’s CPU. It is also
known as main memory. There are two types of main memory, namely:
RAM: Is a volatile memory. This means that the contents in it are lost when power is switched off. It holds data
temporally before and after processing; and also holds all the programs currently running together with the data
being used by the programs.
ROM: Is a non-volatile memory. This means that the content in it is not loss when power is switched off. The
content in ROM can be read but cannot be changed. It is intended for permanent or semi-permanent storage of
data necessary for the operation of a computer system.
Types of ROM
- Programmable Read Only Memory (PROM): Is a Read Only Memory that allows the user to alter it
only after the content is written on it.
- Erasable Programmable Read Only Memory (EPROM): Is a Read Only Memory whose content can
be erased and can be reprogrammed again.
- Electrically Erased Programmable Read Only Memory (EEPROM): It is a type of ROM that can be
erased and programmed again using electricity.
The computer’s main memory is always limited in terms of permanency and capacity. The secondary storage
devices provide an alternative long term storage of data, information and programs.
Page 24 of 90
These devices can be classified according to portability, as either:
They are called removable storage media because they require either a USB port or an external drive
connected to the motherboard using a cable.
Examples:
- Magnetic tapes
- CD / DVD disk
- Jaz disk
- Floppy disk
o Bytes
o Kilobytes (KB)
o Megabytes (MB)
o Gigabytes (GB)
o Terabytes (TB)
o Zettabytes(ZB)
o Yottabytes (YB)
a. CD / DVD disk: They use laser beam of light for reading and writing data.
Compact Disk (CD): This is a hard plastic disk on which information such as music or computer data is
stored. The storage capacity of a CD ranges between 650 MB and 700 MB.
Compact Disk Read Only Memory (CD-ROM): Data can only be read from it but cannot be written
to it. They are popularly used to package and distribute software and music among other types of data.
Compact Disk Recordable (CD-R): Once data has been burned on it, it cannot be erased but more data
can be added on the empty tracks.
Page 25 of 90
Compact Disk Read / write (CD-Rw): These compact disks allow the user to record, erase, and rewrite
new information as many times as desired.
Video Compact Disk (VCD): It is a compact disk that is able to read and view graphics, data, audio,
and video at the same time.
Digital Versatile Disk (DVD): They are also known as Digital Video Disks. They are optical media
used for storing digital data. They resemble CDs but have a higher capacity than the CD.
Examples:
- DVD-ROM
- DVD-R
- DVD-RW
- Blu-Ray
- USB Flash memory
- Memory cards
Digital Versatile Disk – Read Only Memory (DVD-ROM): In this media once data has been written,
it cannot be erased or modified. It can only be read.
Digital Versatile Disk-recordable (DVD-R): Once data has been burned on it, it cannot be erased. It
becomes Read Only.
Digital Versatile Disk Rewritable (DVD-RW): They allow the user to record, erase, amend, and
rewrite new information.
Blu-Ray: It is a high definition DVD format that is intended to replace the current range of DVDs. It is
used for distributing large amount of material such as movies.
USB Flash memory: They are also known as the memory stick (Men stick). Their capacity ranges
between 1 GB and 16 GB.
Memory cards: They are used in digital cameras and mobile phones for storing or transferring data
from a device to another. They are inserted in a special slot for data reading and writing. Their capacity
ranges between 1 GB and 16 GB.
They are known as fixed storage media because they are mounted media because they are mounted on the
computer motherboard. They are housed inside the computer unit.
An example: - Hard disk
Hard disk: It consists of one or several inflexible circular disks called platters which are coated with a magnetic
material normally Iron II Oxide.
c. Tertiary storage
The main purpose of tertiary computer storage is to store data on a very large scale.
Page 26 of 90
2.2.2. Software
Software: Is abbreviated as SW or S/W. it refers to a set of instructions that either enable the computer
hardware to perform its assigned tasks or help the user to accomplish specific tasks.
System software
Application software
1. System software
System software: They are software designed to many age computer resources and provide these resources to
the user.
Operating system
Utility software
Firmware
Programming languages
Networking software
Operating system: Is a group of programs that provide a platform for loading other programs known as
application programs. The OS acts as an interface between the hardware and the application programs.
Examples:
- Linux
- Ms DOS
- Ms Windows
- OSX
- iOS
- Android
- UNIX
b. Utility software
Utility software: They are system software that are used to perform routine functions aimed at optimizing,
analyzing, and maintaining the operations of a computer.
They manage computer files, diagnose, repair computer problems and help the computer to run more efficiently.
Page 27 of 90
Examples:
Antivirus
Disk cleaners
Disk checkers
Disk compressors
Disk defragmenter
Disk partitions
File managers
Language translators
Graphic editors
Text editors
c. Firmware
Firmware: They are sometimes referred to as stored logic. Those software programs that are stored in the
computer’s Read Only Memory (ROM), where they are available for immediate use.
They are not affected by loss of power hence the term firm.
Example:
- Basic Input Output System (BIOS)
These are formal constructed languages designed to communicate instructions to a computer. They are used to
create programs of a machine. They have language translators integrated in them.
Ex: C, C++, Java, JavaSript, C#, Python, Perl, Fortran, Ruby, Ada
2. Application software
Application software: They are programs that are designed to enable the user to accomplish a given task.
Customized software
Off the shelf software
a. Customized software: They are also known as in house developed software. They are tailor made to
solve a specific problem at hand, or to meet a specific need of the user. They only contain features that
are required by the user.
b. Off the shelf software: They are also known as standard software. They are software written by a
software engineer or a programmer, packaged, and then made available through a vendor, a distributor,
or a developer.
Examples:
- Microsoft word
- Open office writer
- Ms Access
Page 28 of 90
2.3. Computer family
Computer family: Refers to category of computers with the same operational design and microprocessors that
are compatible with each other.
Examples:
- IBM
- PC Versus
- Mac family
Microcomputers
Minicomputers
Mainframe
Supercomputers
1. Microcomputers
Microcomputers: Are popularly known as personal computers (PCs). They are designed to be used by one
person at a time. They are the smallest, cheapest, and most portable. They are commonly used in offices, for
training, entertainment, communication, business enterprises, and in homes among other places.
Examples:
- Desktops
- Laptops
- Tablets
- Personal Digital Assistants (PADs) or Palmtops
Desktop computers: These are computer designed to be used while placed on top of a desk or a table.
Laptops: These are portable computers. They have all Input / Output processing and memory devices
inside the system unit.
Tablets: These are small, portable computing devices, similar to a notebook. They are used for internet
access.
- A laptop has more ports and other plug in options to allow for connection of additional peripherals
compared to a notebook.
- A laptop has both the USB port and an inbuilt Digital Versatile /Compact Disk drive where as a note
book only contains the USB port.
Palmtops: They are also referred to as handheld computers, or PDAs. They are designed to fit in the
palm of the hand and easily fit in a pocket. They are commonly used in communication.
Page 29 of 90
2. Minicomputers
They are also referred to as mid-range computers. They are small in size and cheaper. They have a low
processing speed compared to super and mainframe computers. Their storage capacity is higher than that of
microcomputers.
3. Mainframe computers
They are the second largest in physical size. They are very large and expensive they are capable of supporting
thousands of users in a computer network simultaneously. Mainframes are used for centralized.
Examples:
4. Supercomputers
They are the largest in size, faster, most powerful and most expensive computers. They are used to process large
amounts of data at very high speed and they solve problems requiring complex calculations within a fraction of
a second.
Examples:
- In weather forecasting
- Advanced military application
- Telecommunication companies
The evolution of a computer has taken many years and it exists out of inventions by different scientists.
The following tools have been invented over time leading to the development of current computers:
o Abacus
o Pascaline / Machanical calculator
o Analytical engine and Difference Engine
a. Abacus: It was the earliest counting tool used by Baby lonians in around 300 BC. They later became
associated with Chinese more than 2000 years ago.
Page 30 of 90
b. Pascaline / Machanical calculator: The French mathematician, Blaise Pascal invented the first
mechanical calculator or calculating machine in 1642. It could add and subtract numbers, hence helped
his father who was a tax collector.
c. Analytical Engine and Difference Engine : Charles Babbage was an English mathematician, a
philosopher, engineer. He initiated the concept of a programmable computer. While Babbage’s
machines were mechanical and cumbersome, their basic architecture was similar to a modern computer.
Difference Engine: This was an automatic mechanical calculating machine. It could perform
mathematical calculations commanded by a fixed instruction program. It was invented around 1822.
Analytical Engine: This machine was a general purposefully program controlled, automatic mechanical
and digital computer. As a result of his invention, Charles Babbge day computers. It was invented
around 1832.
The main difference between the Difference Engine and the Analytical Engine could be programmed using
punched cards. In the 1840’s a mathematician known as Ada Lovelace developed a program for the Analytical
Engine.
They used vacuum tubes or thermionic values technology for amplification and as switching devices.
o The vacuum tubes were huge. They, therefore, made the computers heavy and bulky.
Page 31 of 90
o They consumed a lot of electrical power.
o They generated a lot of heat. This resulted in frequent breakdowns.
- Burroughs B 6500
- Honeywell 115
- IBM 360
They were smaller and less expensive than the previous two generations.
They had a higher processing speed and storage capacity compared to the previous generations.
They consumed lesser electrical power compared to the previous generation.
The initial cost was high due to the sophisticated technology required in the development of Integrated
circuits (IC).
Air conditioning was required since they still produced a lot of heat.
They used Large Scale Integration (LSI) and very Large Scale Integrated (VLSI) circuits technology
commonly known as Microprocessor.
Optical disks, magnetic disks, and magnetic tapes were used as secondary memory.
Virtual memory was introduced. Virtual memory refers to the use of part of the hard disk as main
memory for storing tasks held in the processor.
o IBM 370
o Macintosh
o Apple II
o Honeywell DPS 88
Page 32 of 90
They are smaller because of high level of circuit integration; hence they are portable.
They are cheaper since they are readily available in market.
They have very high processing speeds compared to the previous generations.
A computer:
b. Processes the work accurately when correct data is fed into it.
c. Performs a variety of tasks at the same time and helps the user to solve different problems while at the
same time offering entertainment. A user, for example, play background music while working on other
tasks.
d. Reduces costs: In an automated office environment, a computer is used to perform tasks that would
normally be assigned to several officers.
Using computers can lead to some health problems, especially if not properly used.
Computers and automation can lead to loss of jobs, especially for computer illiterate persons.
The use of computer technology has reduced the world to be one small village, also known as the global
village.
Page 33 of 90
Communication industry
Media sector
Business industry
Education sector
Entertainment industry
Medical field
Security system
Traffic control
Weather control
Office works
Storage
Manufacturing sector
Examples:
Through a computer that is connected to the internet, one is able to use electronic mail (e-mail).
Computers technology has enabled the generation of digital content leading to high quality signals for
television and radio transmission.
Computer technology has also enabled communication possible through social media platforms such as
WhatsApp! And Twitter.
Advertisement companies use computers to design advertisement bill board and place them on the
streets and at bus stations.
Digital cameras are used to capture high quality images and pictures which are used in bill boards, print
media, and broadcasting.
Television broadcasting has been changed from analog to digital systems.
Video conferencing facilities have enabled media personnel to broadcast information from two different
countries or locations at the same time.
Smart boards and tablets are used in news or events reporting.
It is possible to buy goods and services from anywhere on the globe through electronic commerce (e-
commerce). This involves selling and buying of goods and services through the internet.
For businesses that have embraced technology, they have improved their levels of customer service.
Computers allow businesses to create websites, advertise their products, and connect with other
businesses by uploading their latest articles, product images, and blog posts.
Accounting software allows business to input financial data and analyze it to establish their gains and
losses.
Businesses store data centrally for easy access from multiple computers or stored locally for individual
use.
Page 34 of 90
The education sector has improved a great deal due to the integration of computers. In this sector, computers are
used as an aid in teaching and learning activities. Students are able to register for courses offered outside their
country without having to travel abroad.
This referred to as Online learning, and it is done through the internet. Information technology has also
facilitated education through:
It is also known as computer Based Training (CBT). This refers to integration of ICT into the learning process.
It involves the use of computers in education and training.
o Education games
o Problem solving tutorials
o Drill and practice
a. Education games: These are electronic games that have content relevant to a subject area.
b. Problem solving tutorials: These are self-instructional programs that guide the learner through the
resource material acting as their virtual teacher.
c. Drill and practice: A set of questions from a database are given to students repeatedly to practice skills
and concepts.
Computer simulation is the modelling of a real life situation using a computer. It can be used to mimic a real
learning situation.
Desktop computers and portable computers are used for playing games. These games can be
downloaded from the internet or they can be bought from vendors.
Disk Jockeys (DJs) use computerized systems to mix and play music in social events such as weddings
and parties.
Computers have made it possible for artists to produce their content and store it in digital format. They
are also able to sell it online.
Computers are used in the medical sector to keep records of patients.in the Intensive Care Unit (ICU),
computers are used to control life support machines.
Machines such as Magnetic Resonance Imaging (MRI) scanners are used to generate images of a human
body during medical diagnosis.
Page 35 of 90
Patients also receive medical diagnosis and advice from medical experts through the use of
computerized expert systems.
Doctors can be reached easily through the use of cell phones and electronic mail (e-mail).
There are many mobile applications that are used in the medical field.
Computerized systems can be used to control traffic on roads, oceans and air.
a. Air traffic control: Every airport has its own air traffic control staff that use computer systems to
monitor every signal flight.
b. Ship traffic control: ICT helps with working out the logistics of shipping by providing a means of
monitoring ships efficiently.
c. Automobile traffic control: Computerized systems are used for controlling and coordinating traffic
lights.
Weather forecasting sensors and instruments collect the data, then send it to computers for storage and analysis.
Doppler radar
Weather balloon
Satellites
Doppler radar: This is device that uses beams to detect the location of storms, indicate wind direction
and speed of wind, and the amount of rainfall, among other weather conditions.
Weather balloon: It is s special type of high altitude balloon filled with hydrogen or helium. It is fitted
with a device called a radiosonde that records weather conditions.
Page 36 of 90
Satellites: They are used to take pictures that help in the creation of weather maps that show type of
coulds and the amount of rainfall.
Example: METEOSAT
Computers are used in offices to prepare memos, letters, and reports, among others. They can be used
for preparing daily programs for the staff.
They are also used for the purposes of keeping track of the computing activities carried out by
employees.
Computers with large storage space are used for storing volumes of files that could otherwise occupy a lot of
floor space.
Manufacturers use computerized machines called robots to do jobs that may pose danger to human beings.
Robots also help to reduce human labor costs.
Computers are also used for quality and process control in some companies such as chemical industries. Other
industries also use computers for inventory control, as well as preparing and processing cheques.
3.1. Desktop
3.1.1. Definitions
Desktop: Is the first screen that is displayed when a computer boots up.
To boot a computer: Is to start it so that it can load the operating system and make it ready for use. The
desktop consists of:
- Icons
- Task bar, …
Desktop icons: Icons are images that represent application programs, folders, and files.
- Computers
- Documents
- Recycle bine, …
A folder may also contain other folder within it which are called Subfolders.
Task bar: It is a bar usually at the bottom of a computer screen showing running programs.
Start button: It is the button in the far left bottom corner of taskbar.
Task manager: It is used to provide information about the programs that are running on a computer, as
well as the general status of the computer.
System tray / Notification area: This is of the taskbar in the desktop interface that displays small icons
on the opposite side of the start menu such as the clock, date and time, antivirus, and the icons of certain
programs so that a user is reminded that they are running in the background.
Quick launch: It is a part of the taskbar near the start menu where shortcuts to programs are added.
Customizing: Refers to personalizing the desktop to suit the user’s needs and takes.
- New themes
- Mouse pointers
- User images
- Gadgets
Page 38 of 90
o Taskbar buttons
o Notification area
a. Lock the task bar: Check marking this option ensures that the taskbar cannot be moved or changed in
size.
b. Auto hide the taskbar: Check marking this option hides the taskbar until the mouse pointer moves over
the area where it is hidden and it pops up.
c. Use small icons: This changes the size of the icons on the taskbar and the width of the taskbar.
d. Taskbar location on screen: It helps position the taskbar at the left, top or right of the screen instead of
the default location at the bottom.
e. Taskbar buttons: Helps select how application icons behave, that is, always combine, hide labels,
combine when taskbar is full, and never combine.
f. Notification area: It is used to select icons and notifications that appear on the taskbar.
Ehen the start button is clicked; two panes are displayed. The left pane shows the most used programs. The
right pane shows icons of programs pinned to the start menu.
i. If a program is not among the most used, click on All Apps. Right click the program name then
select pin to start.
ii. To remove a program pinned on the start menu, right click on it then select unpin from start.
o Click the start menu, select All Apps then click on setting. The setting dialog box appears.
o Click on personalization
o Click on start
Recycle bin: It is a container that temporally stores deleted files and folders before they are permanently
deleted. It allows restoring of files and folders that have been deleted accidentally.
2. Restoring: Is the act to rescuing and retrieving the deleted files and folders from the recycle bin.
Warning: Once items have been deleted from the recycle bin, they cannot be restored. Always keep a
backup of your work.
It is a graphical user interface found on the start menu which allows users to view and manipulate basic
system settings and controls.
3.2.1. Desktop background and theme, window color and screen saver
A background also known as wall paper. It is an image used to decorate the graphical user interface on the
screen.
A theme: Is a preset package used to customize the look and feel of graphical appearance details.
It replaces a computer’s ordinary icons, sounds, pointers, background, or screen pattern to reflect the
interests of the user.
i. Click the start menu, select All Apps then click on setting.
ii. Click on personalization
iii. To change the background, click on background.
iv. To change theme, click on themes in the left pane then click theme settings in the right pane.
v. Click on the desired background.
vi. Click save theme. Type the name of the theme then click save.
Page 40 of 90
Click start button, select All Apps then click setting and select personalization.
Select themes in the left pane
Click on desktop icon settings hyperlink in the related settings section.
Select the icons to appear on the desktop, for example, computer, network and control panel.
To change the way an icon appears click on change icon button, select a desired option from the
window displayed and click the Ok button.
Click on restore default button the setting to the original factory settings.
Click Apply then Ok to close the window.
Gadgets: Is a small application that is designed to sit on a user’s desktop screen and is capable of performing
different tasks.
Examples:
Clock
CPU meter
Calendar, …
You can keep gadgets on top of your open windows so they are always visible. To do this, right click gadget,
and then click Always on top.
If you do not want a gadget to appear on top of your open windows, right click the gadget, and then click
Always on top to clear the check mark.
Screen resolution: It determines the clarity of the text and images displayed on the screen.
Click start button, select All Apps then click setting and select system.
Select Advanced display settings link in the right pane.
Click on the box below resolution. Select the preferred resolution using the slide.
i. Click start button, select All Apps then click setting and select Time & Language.
ii. Click on Date & Time link in the left pane.
iii. Click on Change Date and Time formats. Select the preferred date and time on the respective list
boxes then click on the Back button.
iv. Click change button then select new date and time format on the list boxes displayed. Click change
to apply.
Page 41 of 90
This refers to the arrangement of keys.
3.3. Windows
3.3.1. Definition
A window: Is an open application on a computer’s display screen. A window shows the program currently
running.
Application window
Document window
1. Application window: It is the larger window that is displayed when an application is opened.
Examples:
- Ms Word
- Ms Excel
2. Document window: It is the smaller window inside the application window. It is used for typing,
editing, drawing and formatting the text and graphics.
Minimize
Restore down
Maximize
Close
Page 42 of 90
3.3.4. Common windows Accessories
File explorer
Math input panel
Windows journal
Paint
File explorer: it is also known as Windows Explorer. It refers to the graphical file management utility
that displays the drives and contents of folders ad files in the computer.
Math input panel: It is a program whose purpose is to use input devices such as touch screens, external
digitizers or even a mouse, to write mathematical formulas which are recognized and inserted into
different types of documents.
Windows journal: it is an application program that enables the user to make use of tablet pen to take
hand written notes on a tablet PC.
Paint: It is an application program designed for drawing images on the screen using a pointing device.
3.3.4. Files and folders
File: It is a group of related data given a unique name for ease of access, manipulation and storage.
Creating a file
i. To create a new file, click the File menu in the active program and click New.
ii. On the right pane, click create button and select Blank document under the available templates to
create a new file.
Folder: It is a specific storage location in a storage media. Folders are used to organize and store related files. A
folder may also contain other folders within it which are called Subfolders.
Creating a folder
Page 43 of 90
o Type the desired name to replace the name New folder then press Enter.
Saving
Saving: It is a process of storing a document in a storage medium or device for future reference or later use.
Save
Save as
Opening a file
Renaming a folder
To rename a folder
Rename a file
Cutting: It also known as moving. It is the transfer of the selected file or folder to a new location without
leaving a copy at the source location.
Page 44 of 90
The operating system automatically stores the cut data in a clipboard from where it will be pasted to the new
location.
Pasting: Refers to placing cut file or folder to a new location.
To move the selected file (s) or folder (s) to another location using menu:
b. Using keyboard
To move selected file (s) or folder (s) using the keyboard commands:
Page 45 of 90
By the end of this unit, you should be able to maintain a computer in good working condition and use it safely,
securely and ethically.
A computer laboratory: Simply known as a computer lab. It is a special room set aside for safe storage and
use of computer equipment.
Computers are expensive to acquire. They are also delicate and must, therefore, be handled with great care.
Some safety precautions and practices are discussed below:
General safety
Do not run in and out of the computer lab. This may cause one to knock down computer equipment
hence causing damage.
Always cover the computers with dust covers after use to avoid dust accumulation on the machined.
Reinforce the entrance to the computer lab by use of padlocks, burglar proof doors, and metallic grills to
ensure proper security of computer resources.
Ensure that the computer lab is well ventilated to ensure the right amount of temperature and humidity.
Always shut down the computer using the correct procedure. This is because improper shutting down of
computer can lead to either data loss or crashing of the hard disk.
Health safety
The screen resolution should be properly adjusted and where necessary use anti gale screens to prevent
eye strain.
Use ergonomics chairs, tables, keyboards and mice among others to ensure good.
Ensure there is proper ventilation in the computer lab to ensure good health of the user.
Page 46 of 90
Always take a break to prevent fatigue or repetitive strain injury.
Electrical safety
Be careful when handling power cables and Cathode Ray Tube (CRT) monitors
Do not attempt to repair power supplies or CRT monitors.
Always connect computers using uninterruptible power supply (UPS). This protects them against
damage by power instability.
Ensure cables are insulated to avoid short circuits or electrical shock.
Fire safety
Ensure that the computer lab is equipped with fire extinguishers that are regularly serviced.
Ensure that the computer lab has an exit door for use in case of emergency or file outbreak.
Ensure that the computer lab has fire or smoke detectors and alarms for warning in case of fire outbreak.
Do not smoke in the computer laboratory.
Do not use a cloth to clean any circuitry such as the motherboard and RAM.
Brushes and swabs: Soft bristled brushes and swabs that are lint free are used to dust off the hard to reach
areas and to wipe strains from electrical contacts.
Blower: It is a portable electric device used to remove dust and dirt from computers.
Portable vacuum cleaner: It is a device used for sucking dust, dirt, hair, and other particles when cleaning
other computer lab floor and other surfaces as well.
Non static vacuum cleaner: This is a small hand held vacuum cleaner that is designed specifically for use on
computers to suck up dirt and dust loosened by brush or canned air.
Canned air: Is also known as gas duster or compressed air. It is used to loosen dirt and dust form delicate
computer components.
Page 47 of 90
Fire extinguisher
It is a metallic cylinder usually red in color. It contains a substance that puts out a small fire. The computer
laboratory must be fitted with gaseous fire extinguishers filled with carbon (IV) oxide to be used in case of fire
outbreak.
Pull the pin. This will allow one to discharge the extinguisher.
Aim (point) at base of the fire.
Squeeze the top handle or lever to release the pressurized extinguishing agent in the extinguisher.
Sweep from side until the fire is completely extinguished.
a. General precautions
Computers should be connected to the UPS or plugged into a quality surge protector.
Avoid placing computers and related components at the edge of the table where they are likely to fall.
Engage the services of a reputable insurance company to cover the risk in case of loss or damage.
b. Power connectivity
Ensure there are enough sockets in the computer lab to prevent overloading.
Connect the power cable from the main power source to the UPS and to the power supply unit on the
computers.
Correctly turn off the computer when not in use. Always remember to switch off the main power source.
Install a stand by generator that can automatically be used in case of power failure.
c. Precautions for connecting the mouse, keyboard and other external peripherals
Maintenance precautions
a. System unit
- Switch off the computer system and unplug the power cable before removing the system unit cover.
- Use a damp lint free cloth to clean the outer part of the system unit.
Page 48 of 90
- Avoid using water to clean the internal components to prevent rusting.
b. Monitor
c. Keyboard
Do not punch down keys with excessive force since this may damage the components under neath.
Be careful to avoid dripping cleaning liquids on to or into the keyboard.
Do not remove the keys but instead use canned air and a soft bristles brush to clean hard to reach areas.
d. Mouse
Use a damp lint free cloth to clean the external part of the mouse.
Word processors were created to solve the problems encountered while using a typewriter.
Word processing application: Is a software that enables the user to create, save, edit, format, and print text
documents.
Examples:
Word perfect
Word star
Lotus word Pro
Ami Pro
Microsoft word, …
Click on Star button, go to All programs, select Microsoft office, then click on Microsoft word 2013.
Or
Page 49 of 90
If the Ms word icon is on the desktop, do one of the following:
Right click on the icon then select Open from the pop-up menu that appears.
Double click on the icon
Click on the icon then press Enter key.
In the environment of a word processor, the following basic tools or features can be used:
o Title bar
o Tabs
o Menus
o Toolbars
o Scroll bar
o Ruler
o Status bar
o Ribbon
o Quick Access Tool bar
Menus:
- File tab
- Home tab
- Insert tab
- Design tab
- Page layout
- References tab
- Review tab
- View tab
- Mailings tab
Scroll bar:
- Vertical
- Horizontal
Creating a document
Saving a document
There are two main commands used when saving a document which are:
Page 50 of 90
Save
Save as
Do the following:
Renaming a document
a. Font: It includes:
Calibri
Times New Roman
Arial black
Arial Narrow, …
o Bold
o Italic
o Regular
o Bold italics
c. Font size: It refers to how small or large the characters are set.
Superscript Cm3
Subscript H2O
Strike through: For draw the line over the text.
Double strike through
All caps
Small caps
Hidden
Sentence case
UPPER CASE
Lower case
Capitalize Each word
tGGOLE case
Paragraph formatting
Page 52 of 90
It improves the appearance of an entire paragraph. They include:
- Select the paragraph. Click on Sort from the Paragraph group in the Home tab.
- Under Sort by, select Paragraphs. Under Type select Text.
- Choose either Ascending or Descending sort orders. Click Ok to apply.
Proofing: It is the process of reading through a piece of write up in order to find and correct any mistakes
before printing.
Spelling and grammar checker: It is a feature that contains an inbuilt dictionary for checking spelling
and grammatical mistakes.
- Click Review tab from the menu bar. Select Spelling and grammar command under Proofing group.
- To make the correction, select the right word in the Suggestions box and click Change command
button.
- To leave the word or phrase as it is, click Ignore button.
Page 53 of 90
- If the word occurs several times in the document, click Ignore all.
- To add the word in the dictionary, click Add button.
- Once the spelling and grammar checking process is complete, a dialog box will be displayed. It notifies
the user that the spelling and grammar check is complete.
- Click the Ok button.
a. Moving a text
To move text
Or
Right click on the selected text and click Cut command from the resulting pop up menu.
Or
To paste
Click Home tab, under the Clipboard group, click Paste icon.
Right click and select Paste command and from the pop up menu.
Or
b. Copying text
- From Home tab, click Copy icon under the Clipboard group.
- Right click on the selected text and click Copy command from the pop up menu.
- Press CTRL + C on the keyboard.
- Position the cursor where the item is to be copied.
- To paste, use one of the following options:
o From Home tab, click Paste icon under the Clipboard group.
Or
Or
When they are used, the position of the cursor is automatically changed.
Scrolling: Is the process of moving around a document without changing the position of the cursor.
Multiple pages up or down the document Drag the scroll box to the top, bottom or middle
of the scroll bar
To the previous page Click the double up arrow
To delete text or image: Refers to remove or erase content such as words and picture from a document.
Deleting can be done using:
Backspace key
Delete key
Backspace key: Erases character by character from the left side of the cursor position to the right.
Delete key: Erases character by character from the right side of the cursor positon to the left.
Typing modes
There are two typing modes used to edit documents. These are:
Insert mode
Type over mode
a. Insert mode: It is a typing mode that adds text between words at the insertion point without replacing
them as the user types. It is the default typing mode.
b. Type over mode: It is also referred as Over type mode. In this mode, the text added at the cursor
position automatically deletes and replaces the existing text.
To active over type mode
Press the Insert key on the keyboard. To switch back to insert mode, press the Insert key again.
From File tab, click Options. From the Word option dialog box, click the Advanced tab then click on
the box next to use over type mode.
Page 56 of 90
Undo and Redo commands
a. Undo command: Is used to cancel or negate a series of the last commands executed starting with the
most recent in order to restore the status of the document.
Or
Click on the Undo command icon on the Quick Access Tool bar.
b. Redo command: Is activated only when the undo command had been used earlier. It nullifies a series of
the negated actions.
Replace command: Is used to automatically substitute the located word with a new word.
Find command
Replace command
Click on Home tab on the menu bar. In the Editing group, click on the Replace command.
Type the word to be replaced on the Find what box, and the word to substitute in the Replace with box.
Click on the Find next button to locate the word in the document.
Page 57 of 90
Click on Replace button to locate the word in the document. Or click on the Replace All button to
substitute all the occurrence of the word in the document at once.
Click Cancel button to stop the procedure and close the dialog box.
INTRODUCTION
- Manipulate a document
- Use advanced formatting methods in a document
- Add simple objects in a document
A document can be formatted and edited in order to make it error free and appealing. This can be achieved
through different ways for example:
It is used to specify the margins and the orientation of a page among other specifications.
i. Setting margins
Page margins: Are the blank spaces around the edges of a page. some items like Headers, Footers, and Page
numbers can be positioned in the margins,
Click Page layout tab, from the Page setup group and click Margins command.
Click the margin type desired from the pull down menu that appears.
Click Margins, then select Custom margins command on click on the dialog box launcher at the
bottom of Page setup group.
Click on Margins tab on the dialog box that appears.
Specify all the desired options, and click Ok to apply.
Page 58 of 90
ii. Orientation
Page orientation: This refers to the position of the page in relation to the text or graphics.
o Portrait
o Landscape
Portrait: This is where text and graphics are printed with the longest side placed vertically and the
shortest placed horizontally.
Landscape: This is where text and graphics are printed with the longest side placed horizontally and the
shortest placed vertically.
Click on the Page layout tab, in the Page setup group, click orientation.
Select either Portrait or Landscape.
Select the content on the pages or paragraph(s) whose orientation is to be changed to portrait or
landscape.
Note: If some but not all of the text on a page is selected, put the selected text on its own page.
Click anywhere within the page. Click the Design tab, in the Page background group, click on Page
borders.
Specify the settings, style, color, art, and width.
In the Apply to section, specify the area where the border will be effected.
To customize the margin, click on Option button.
Click Ok to close the dialog box and effect the changes.
iv. Background
To remove a background
v. Watermark
On the Design tab, in the Page background group, click Watermark icon.
Do one of the following:
- Select one of the predesigned watermarks
- Select Custom watermark command
- Select wither Picture watermark or Text watermark options. Click on Select picture button
and insert the appropriate picture.
- If text watermark option is selected, type the appropriate text in the Text box. Click Ok.
To remove a watermark
Click on the Design tab in the Page background group, click Watermark.
Click on Remove watermark command.
a. Track changes
It enables the user to view all the changes that have been done.
Click on the Review tab in the menu bar, in the Tracking group, click the icon. Click on Track
changes again.
To add a track changes indicator to the status bar, right click the status bar and click Track changes.
Then click the Track changes indicator on the status bar to turn track changes on or off instead of
using the menu option.
b. Comments
Page 60 of 90
Add a comment
Deleting a comment
Right click the comment, and then click Delete comment or click on it then select Delete command in
the Comment group from the Review tab.
To quickly delete all comments in a document, click a comment in the document. On the Review tab, in
the Comments group, click the arrow below Delete icon, and then click Delete all comments in
document.
c. Word count
When a document is being typed, Ms word automatically counts the number of pages and words in the
document and displays them on the status bar at the bottom of the workspace.
If the word count is not displayed in the status bar, right click the status bar then and click Word count option.
Select the text to be counted. Ms word will automatically display the number of words in the select at the status
bar.
Word count dialog box displays the number of pages, paragraphs and lines in a document. it displays the
number of characters, either including or excluding spaces.
a. Columns
They are created to enhance the look of a document. they can be created using predefined or user defined
options.
Predefined columns
To create a column
b. Breaks
A break: Is inserted in order to demarcate the end of part and beginning of another.
Page break
Column break
Section break
Text wrapping break
1. Page break: It demarcates the end of one page and the beginning of the next.
2. Section break: It is used to make other formatting changes on different pages in a document, including:
Click Page layout tab, in the Page setup group, click Breaks.
Select the desired type of section break.
3. Column break: It is used to indicate that the text following the column break will begin in the next
column.
Page 62 of 90
4. Text wrapping break: It is used to separate the text around objects on a page.
Note: Text wrapping break are formatting marks that aren’t usually visible in a document. to view these
breaks, turn on the formatting marks by clicking Show / Hide in the Paragraph group on the Home tab.
Styles
Nested lists
Drop caps
Headers and footers
1. Styles
a. Headings: These are styles that have been defined in word processing application.
- Heading 1
- Heading 2
- Heading 3
- Heading 4
Those are used when the user wants to create a table of contents.
b. Apply a style: Click on the Home tab, in the Styles group, select a set of styles desired. Apply the
styles from the convenient Quick styles gallery as the document is being created.
c. Create a style: It creates a style based on the formatting of the selected text.
Clear formatting
2. Nested lists
Page 63 of 90
Nested lists: Refers to lists at different levels (Sub – lists) that is a list within another list.
Bullets and numbers: Are used for the purposes of easier identification of items in the list.
Create the list with each item on its own line shown below:
Vegetables
Fruits
Cereals
Select the list then, click on the Numbering or bullets icons from the Home tab in the Paragraph
group.
From the resulting menu, select the desired type of bullet or numbering list to automatically apply it.
For example:
Vegetables
Fruits
Cereals
a. Vegetables
Cabbage
Press the Enter key and then press on the Tab key. A number is automatically inserted.
3. Drop caps
A drop cap: Is a large capital letter usually at the beginning of a block of text that has the depth of more than
one line of regular text.
Highlight any character with in the line of text where the drop cap is to be inserted.
Click on the Insert tab, select Drop cap icon under text group.
A drop down menu is displayed
Select either the Dropped or In margin option
Page 64 of 90
Click on the Drop cap options. Specify the position of the text, the number of lines to drop, font and
distance from text.
Click Ok.
Headers: Are lines of text or graphics that appear above the top margin of a page or selected pages.
Footers: Are lines of text or graphics that appear below the bottom martin of a page or selected pages.
Click Insert tab from the menu bar, then click on Header or footer command from the ribbon.
Under Header & Footer group, type the desired content to insert a header or footer respectively. Then
press Enter.
Click on the desired option
Page numbering
INTRODUCTION
By the end of this unit, you should be able to understand the rationale of a computer network and use the
internet efficiently and effectively.
A computer network: Is a set of interconnected computing nodes which communicate with one another
through a transmission medium using a set of rules. The nodes share resources and services.
Security
Reliability
Transmission capacity
Page 65 of 90
a. Security: It must provide protection data from unauthorized access.
c. Transmission capacity: It must have two or more computing nodes connected using a transmission
medium.
Advantages
Resource sharing
Speed
Communication
Work group computing
Security
Increased storage capacity
Entertainment
Disadvantages
Types of networks
There are 4 main types of computer networks classified according to geographical areas.
It is also known as Wireless Personal Area Network (WPAN). It is a smallest network used for data
transmission among devices within the environment of an individual.
Page 66 of 90
- A wireless printer
- A telephone
- A TV remote control
- A wireless computer keyboard
- A wireless computer mouse
Bluetooth: Is a wireless protocol that connects electronic devices over a short distance of up to about 10 meters
creating a PAN with a high level of security.
Infra-red: Is a wireless electromagnetic energy technology with a wavelength longer than those of red visible
light.
It is a network that covers a small geographical area for example, an office, a building, an institution, or an
organization.
A metropolitan Area Network covers a city or town. It can be made up of many LANs and can provide
internet connectivity in a Metropolitan region.
7.2.1. Definitions
Internet: Internet stands for International network. It is world wide network of computers connecting millions
of computer networks via communication media such as telephone lines, wireless connections, and fiber optic.
World Wide Web (WWW): It is commonly referred to as the web. WWW refers to as large virtual space in
the internet where information pages called web pages are installed.
Web page: Hypertext and hypermedia documents containing information about an individual or organization.
Web site: A collection of related web pages stored as a single file in a web server.
Web browser: It is commonly referred to as a browser. These are programs used for displaying and viewing
web pages on the world wide web (WWW).
URL: It is an abbreviation for Uniform Resource Locator. A web address is commonly known as URL.
Page 67 of 90
URL consist of 3 parts:
Protocol
Server name
Resource ID
ISP: This is abbreviation for Internet Service Provider (ISP). It is a licensed organization company that
provides access to the internet usually at a fee.
In 1962: Packet switching was developed and it formed the basis of internet connection.
In 1969: ARPANET began working on an experiment to determine whether computers at different universities
could communicate with each other without a central system.
In 1970: Vinton Cerf and others, published a proposal for protocols and later ARPANET began operating
Network Control Protocol (NCP) to enable computers to communicate.
In 1974: Vinton Cerf together with Bob Kahn presented their protocol for packet network interconnection,
which became the basis of the modern internet.
In 1978: ICP / IP was split into two protocols TCP / IP (Internet Protocol).
In 1982: TCP / IP was established as the protocol for ARPANET and by January 1983, all of the ARPNET was
switched over from NCP to TCP / IP.
In 1991: - The first World Wide Web (WWW) files were made available on the net for downloading using
File Transfer Protocol (FTP).
In 1993: The world started waking up to the WWW and at least 200 known HTTP servers were connected.
In 1994: Netscape communication was born and Microsoft created a web browser for windows 95.
In 1998: Google search engine was born changing how users engaged with the internet.
Today: The internet is everywhere, enabling people to communicate and share interests in many ways more
faster using sites such as:
Page 68 of 90
- Facebook
- Twitter
- Linked-In
- You Tub
- Blogs
- Wiks, …
Communication
Research
Business
Education
Medicine
Internet banking
Entertainment
- Dial up
- Broadband
- Wi-Fi
Dial up: It involves connecting a computer to an internet service provider (ISP) by use of a modem and
telephone line such as subscriber identity, Identification Module Card (SIM) only when accessing the
internet.
Broadband: This is high capacity transmission technique that used a wide range of frequencies to
enable a large number of messages to be communicated simultaneously.
- Wi-Fi
- 4G
- Satellite
Wi-Fi: Wi-Fi stands for Wireless Fidelity. This is a wireless Fidelity. This is a wireless network
technology that uses radio waves to provide high speed internet and networking connections.
o Laptops
o Cell phones
o Tablets
o Ipads
o Peripheral devices such as the mouse, printers, and keyboards, …
Page 69 of 90
7.3.4. Getting online
Web browser: Is a program that is used for displaying and viewing web pages on the world wide web (WWW).
Mosaic
Netscape navigator
Internet explorer
Mozilla fire fox
Opera mini
Google chrome, …
Title bar
Menu bar
Control buttons
Address bar
Search text box
Search button
Search Query
3. Control buttons: These buttons are found on the far right side of the title bar of the search engine and
include the following:
- Minimize
- Restore down
- Maximize
- Close
4. Address bar: This is where an address or (name) is typed so as to go to a given web page.
5. Search text box: This is where key words are typed to describe the information that one wants to find.
6. Search query: It is the information typed by the user to help the search engine decipher the required
information.
Web address
A web address: Is commonly known as Uniform Resource Locator (URL). It is a unique address of each web
page in a web sites which identifies the location of a specific web page on the internet.
Server name: It identifies the computer on which the resource is located. This computer is known as
Remote server.
Example: www.techrwanda.com
Note: Most web server names begin with the letters www. It always ends with a dot and a three or two
letter extension called the domain name.
Is a class or naming order system for computers, services, or any resources connected to the internet or a
private network.
Note: Domain is important because it usually identifies the company, agency or organization that is
directly responsible for the information or is providing the compute space where the information is kept.
Sometimes it indicates the country where the server is located.
A top level domain (TLD): Is a domain at the highest level in the domain name system of the internet.
Examples:
Page 71 of 90
7.4. Search engines
7.4.1. Definition
Search engines: Are programs that help a user to look for and identify items that corresponds to keywords or
phrases specified from the world wide web.
Advantages
Disadvantages
a. Google
b. Bing
c. WiseGeek.com
d. Wikipedia
e. Google scholar
f. Ask.com
g. Yahoo!
o Search box
Page 72 of 90
o Search verticals
o Page count
o Time the search took
o Related searches
o Images
o News results
o Sponsored links
o Organic results
o Pagination
o Disambiguation
- Click on one of the options within the sections to access the web page.
7.5.1. Definition
username@hostcomputer.domain name
Explanation
@ (at sign): Separates the user name from the rest of the address parts.
Host computer: The name of the remote server on which the email account is hosted.
Examples:
- Gmail
- Yahoo
- Hotmail
Disadvantages
When creating a password for the account ensure that the password is strong enough.
Note that:
Before sending and reading a messages, the user must open their account. The referred to as Signing in.
Sign In
Receiving a message
Upon signing in, the user’s inbox is automatically opened. The messages are displayed in three columns
showing:
The user can decide to select one of the following options available on the message window:
Reply
Reply all (CC, BCC, To box)
Forward
Move
Note:
Sending messages
User can either compose a new message or send on that already exists in their in box.
To compose a message
Note: To send the same message to a number of people the following options can be used:
CC (Carbon Copy)
BCC (Blind Carbon Copy)
CC (Carbon Copy): When this option is used, the list of all the recipients appears in each recipient’s
mail.
BCC (Blind Carbon Copy): When this option is used, the list of all the recipients is hidden from the
other recipients of the mail.
- Click at Subject text box to type the title that describes what the e-mail is about.
- Click Send button once the message is completed.
Page 75 of 90
The ways of organizing an e-mail
Move
Delete
Add or switch folders
Address book
a. Move
An e-mail in the inbox can be transferred from the in box to another folder.
b. Delete
An e-mail can be erased from the account using either of the following procedures:
Or
o Right click on the e-mail message and click Delete from the pop up menu.
On the left side of the page, click More at the button of labels list.
Click create New label.
Type the name of the new label and click Create.
Gmail does not use folders. Instead, it uses labels to help the user organize the mails more effectively.
Labels Folders
A conversation can have more than one labels You can only put a message in one folder.
A conversation can be in several locations You have to remember where you filed a
(Inbox, All mail, Sent mail, …) at the same message to retrieve it.
time, making it easier to find later.
You can search conversations by label. You can’t always do folder specific searches.
d. Address book
Page 76 of 90
Address book: Is an Online contact manager used to store all contact information and it makes it easy to keep
track of names, e-mail addresses, phone numbers, fax numbers and a lot more.
Once a contact exists in the address book, when the user starts typing thee e-mail address, a list of all the
possible contacts that match it are displayed.
Select the desired contact.
Press the Enter key.
It is possible to attach one or more files to an e-mail address. The attachment could be:
To attach a file
Note: Once the message is sent, a copy is stored in the Sent folder.
To download a file
By the end of this unit, you should be able to create a music sprite and add music with scratch and audacity.
Scratch: Is a free programming language that allows creation of interactive games, animations, music and
stories that can be shared around the world.
Stage area
Sprite list
Scripts tab
Scripts area
a. View full screen: It makes the stage area to cover the whole screen.
b. Project title: This is the name of the project. It only appears after the project has been saved.
2. Sprite list: It is located at the bottom left area of the scratch window and display sprites as thumbnails.
Thumbnail: Contains information about the selected sprite and tools for manipulating the sprite.
To change the sprite’s name, simply click in the box labelled Sprite1 and type the preferred name.
3. Scripts tab: It contains block that can be dragged on to the scripts area to make a project.
It organized into 10 groups of block palettes:
o Motion
o Looks
o Sound
o Pen
o Data
Page 78 of 90
o Events
o Control
o Sensing
o Operators
o More blocks
a. Motion blocks: They are used to control how sprites move and change angles or direction.
Example: For changing sprite color and making the sprite larger or smaller among others.
c. Sound blocks: They are used to control sound and play audio files.
d. Pen blocks: They are used to draw by controlling pen width, color, and shade.
f. Event blocks: They contain vent handlers which are placed on top of each group of blocks to activate
scripts to run.
Examples:
- Forever
- If then
- Wait until
- Repeat until
h. Sensing blocks: They are used to interact with the surrounding of a project.
i. Operators blocks: They contain mathematical operators and strings that compare sprite positons.
j. More blocks: They contain custom procedures (blocks) and extensions for the selected sprite. It
contains Make a block and Add an extension button that allow the user to create more blocks.
4. Scrips area: It is where blocks are combined to form scripts which in turn form a project.
Costumes
Sounds
Help
Stage backdrop pane
Page 79 of 90
A costume: Is a frame or other appearance of the sprite.
o Giga button
o Paint brush button
o Import / Folder button
o Camera button
Giga button: It opens the built in costume library on sprites from which a costume can be chosen.
Paint brush button: It opens the paint editor and is used to paint new costumes.
Import / Folder button: It opens a file browser and is used to upload sprite or image from a file.
Camera button: It opens a camera and is used to create new costume from camera.
b. Sounds tab: It contains a list of audio clips and is used to insert sounds and music to a sprite.
Speaker icon
Record button
Import / Folder button
Speaker button: It opens the sounds library.
Record button: It opens the sound recorder that enables sound to be recorded from an external device.
Import / Folder button: It opens a file browser and is used to upload sound from file.
d. Stage backdrop pane: It refers to a frame or background of the stage. It is used to choose a backdrop
from the library, paint new backdrop, upload backdrop from file and add new backdrop from camera.
This toolbar is used to carry out very important functions. It contains menu options:
File
Page 80 of 90
Edit
Tips
About
a. File menu option: Clicking on the dropdown arrow next to File displays the following menu options:
o New
o Open
o Save as and save
o Share to website
o Check for updates
o Quit
b. Edit menu option: Clicking on the dropdown arrow next to Edit displays the following menu options:
Undelete
Small stage layout
Turbo mode
d. About: It is an online feature that connects the user to the scratch website.
There are four buttons used to create a new sprite or import an existing image, namely:
Giga button
Paint brush button
Import / Folder button
Camera button
a. Giga button: It opens the built in sprites and enables the user to choose a sprite from the library.
c. Import / Folder button: It opens a file browser and is used to upload a sprite or image.
Select the location from where to upload the sprite, select the file name then click Open.
d. Camera button: It opens a camera which would be able to create a new sprite.
The default sound in the “Play sound” … “until done blocks” is Meow.
Click on Sounds tab to display the Sound library. Select the preferred sound from the library or any
other source.
Double click the preferred sound or click on the sound then click Ok. The selected sound appears as a
thumbnail under Sounds tab or in the Play sound block under the Scripts tab.
To select any other sound, click the Dropdown arrow in the Paly sound block.
Drag the Blocks under the Sound tool kit and click the Dropdown arrow to select the sound.
Click the Control tool kit, drag Forever block to enclose the sound blocks.
Click the Events tool kit, drag the When () clicked to the top of Forever block.
Note: To play a scripts, the user can click on the Green flag button or on the script.
Things folder: Refers to the folders in scratch that contain sprites. The Sprite library contains various folders
with different names.
Examples:
- Letters
- People
- Things, …
Page 82 of 90
A variable: Is a changeable value that can only hold one value at a time. It is created from the Data blocks on
the Script tab using the Make a variable button.
Clicking on this button displays the New variable dialog box that enables the user to name the variable and
specify its scope.
Local (Private)
Global (Public)
Could
1. Local variable: It is a variable that can only be changed by the sprite that owns it. It can be read by
other sprites using the Change () by () block but they cannot change it.
A local variable is created by selecting For this sprite only option button in the New variable dialog box.
2. Global variable: It can be read and changed by any sprite in the project. By default, For all sprites
option button is selected meaning that it is a Global variable.
Tool kit: Is used to add a music script to a sprite. The sound tool kit is displayed by clicking on the Sound
block under the Scripts tab.
Audacity: Is a free, open source software that is used for recording and editing sounds.
INTRODUTION
GIS: Is a system designed to capture, store, manipulate, analyze, manage, and present all types of
geographically referenced data; that is, data identified according to their location.
Arc Catalog
Arc Map
Arc Tool box
1. Arc Catalog: This application is used for managing spatial data contained in the computer and other
locations, managing database designs, recording and viewing metadata.
2. Arc Map: Is a mapping application that allows the creation of maps and query attributes and analyzes
spatial relationships and layout of the final projects.
Page 84 of 90
3. Arc Tool box: This application is used for data conversion and geoprocessing.
o Mapping
o Data management
o Geographic analysis
o Data editing
o Geoprocessing
Java edition (AEJEE): Is abbreviation for Arc Explorer – Java Edition for Education. It allows
viewing and querying local data as well as Arc IMS services from the geodata.gov or other hosted sites.
Post GIS: It is used for storing, manipulating, and retrieving such as distance, area, and intersection to
the database.
Arc Explorer: it performs a variety of basic GIS functions including display, query and data retrieval
applications.
Layers: Are the methods used to display geographic data sets in Arc GIS.
Raster data: Are items, usually images that are composed of pixels.
Vector data: Images such as streets, rivers, railway lines, lakes, city blocks, and any other features that
can be drawn on a map. These are represented by (X , Y)
- Points
- Lines
Lines: Are used to represent linear features such as road, trails, streams, and contour lines.
Page 85 of 90
It is used to manage the contents of the map display. It lists all the layers on the map.
a. List by drawing order: The layers are listed by the geodatabase or folder containing the data source
they reference.
b. List by visibility: The layers are listed according to whether they are turned ON or OFF.
c. List by selection: The layers are listed whether their features are selectable by the interactive selection
and editing tools.
d. Options: It is used to change the behavior and appearance of the table of contents.
File
Edit
View
Bookmarks
Selection
Geoprocessing
Customize
Windows
Help
a. File tab
- New
- Save
- Save as
- Save a copy
- Share as
- Add data
- Print
- Print preview
- Export maps
b. Edit tab
Page 86 of 90
It has the commands like:
Undo
Redo
Cut
Copy
Paste
Paste special
Delete
Copy map to clipboard
c. View tab
Data view
Layout view
Graph
Scroll bar
Status bar
Reports
Data frame
Data view
Layout view
d. Book marks
It is a tool kit that can be used to save a feature to a map. It provides short cut to a place on a map.
A spatial book mark: Is an electronic marker in a map. It identifies the geography of the map for future
reference or retrieval
To open the Arc Catalog, double click on the Arc Catalog icon on the desktop. The screen lists a set of possible
location for data in the Catalog tree.
To add directories for data, click on the Connect to folder icon on the top left toolbar.
Previewing data
- Navigate to Customize
- Select Arc Catalog options
- Under the General tab unclick Hide file extension and hit Ok.
Description tab
It provides an explanation of the files, spatial information, and a list of all of the attributes associated with a file.
Location
Attributes
Spatial relationship
c. Spatial relationship: These are properties associating an object with other objects.
Zoom In / Out
Fixed zoom In / Out
Zoom to full extent
Zoom to previous / Next
Pan
Zoom In / Out
Zoom In: Click + and then click anywhere on the map to be enlarged.
Zoom Out: Click – and then click anywhere on the map to be reduced.
Fixed zoom In: It enlarges the image from the center of the page.
Fixed zoom Out: It reduces the image from the center of the page.
Zoom to full extent: It zooms the image of the map to its full limit.
Zoom to previous / Next: It takes the image back to the previous extent after navigating.
Page 88 of 90
Pan: Is to move an image horizontally or vertically from a stationary point in order to view from
different angles.
Find tool: Is a navigation tool used to search for locations using address or name of a place to find features that
match particular attribute values and to find locations using linear referencing.
Find features
Find locations
To find location
o Click the Find tool to open the Find dialog box and click the Locations tab.
o Identify the Locator to be used.
o Enter the Place name or Address to be searched.
o Click on Find button to search for and work with the results.
Linear referencing
Linear referencing: Is the method of storing geographic locations by using relative positions along measured
linear features.
- Flash
- Zoom to
- Pan to
- Create book mark
The Identify tool identifies the top most layer in your map by default. Use the Identify from list at the top of
the identify window to choose the specific layer(s) to identify.
Page 89 of 90
The options can be used:
Layers in a Map
Ordering layers
Removing a layer
To remove a layer:
Renaming a layer
Page 90 of 90