Oxford excellence for the Caribbean Information T echnology THIRD EDITION FOR THE NEW SYLL ABUS with Glenda Ronald Gay Blades online support Oxford excellence for the Caribbean Information T echnology THIRD EDITION Glenda Gay Ronald Blades 3 Acknowledgements 3 The for Great Clarendon Street, Oxford, OX2 6DP, United publisher and permission to authors use would like photographs to and thank other the following copyright Kingdom material: Oxford University Press is a department of the University of Cover: Jim Arbogast/Photodisc/Getty Images; Oxford. p9: It furthers the University’s objective of excellence in Glenda Immfocus scholarship, and education by publishing worldwide. a registered trade mark of Oxford University Press in the in certain other (L): Federico Wavebreak Oxford University Press moral rights of the authors have been All published rights in Rostagno/Shutterstock; p11 (L): p17 (TL): form or No stored by (BL): IB part of this publication may p26: Shutterstock; p31 in a retrieval system, or any means, without of Oxford University by licence or Press, the or prior as permission expressly p21: the Rights Rose (BL): under terms agreed with the thanongsuk rights organization. outside the scope of Enquiries the Department, not impose should be Oxford University Press, at p23 p22: (R): p20: OUP; Carson/Shutterstock; Bplanet/ v74/Shutterstock; p29: p34: pixinoo/ Andrey_ p35: DR-images/Shutterstock; p39 (b): p39 Coprid/Shutterstock; (a): p39 harakunno/Shutterstock; p47 (L): Sean Locke p39 (d): jultud/ Photography/Shutterstock; (R): MARTYN Patti F. CHILLMAID/SCIENCE McConville / Alamy Stock PHOTO Photo; p55: LIBRARY; Juta/ p56: Alice-photo/Shutterstock; p68: Anton the circulate this same this work condition in any on other any form and you acquirer (T): Valentin Shutterstock; p72 Library Cataloguing in Publication Data p74: silverkblackstock/Shutterstock; (LTE): Valkov/Shutterstock; p72 Leszek p75 (3G): Lenscap Nor p72 (BR): Rose Oqbas/ p75 (BL): Carson/Shutterstock; p80: Gal/Shutterstock; (2G): Photography/Shutterstock; Kobusinski/Shutterstock; Tepsuttinun/Shutterstock; p85: Data Trial/Shutterstock; sent Shutterstock; British Caiaimage/ above. must must (BR): Chillmaid; concerning above p75 You F appropriate Foltin/Shutterstock; address Martyn in Shutterstock; to Hsvrs/ (MR): permitted p53: reproduction p17 p17 in p47 reprographics Gvictoria/ (R): be transmitted, Shutterstock; law, Photo; p19: Photography/Shutterstock; Shutterstock; (c): by Stock Images; Topimages/Shutterstock; writing (R): p11 Asharkyu/Shutterstock; Media/Alamy Edwards/Getty Popov/Shutterstock; any (TL): 2019 reserved. reproduced, p10 Sonate/Shutterstock; Tkachuk/Shutterstock; asserted p23 First p23 RoSonic/Shutterstock; 2019 Sam The p32: countries iStockphoto; © Auxin/Shutterstock; UK Shutterstock; and p15: studio/Shutterstock; Oxford p10 is Gay; research, Rvlsoft/ p79: Winai Rawpixel.com/Shutterstock; p86: REDPIXEL.PL/Shutterstock; available p91 (T): Whitemomo/Shutterstock; Shutterstock; p94 (TL): p91 (B): SpeedKingz/ Ronstik/Shutterstock; p94 (TR): 978-0-19-843716-1 Sirtravelalot/Shutterstock; 1 3 5 7 9 10 8 6 4 2 p97: used in the production of this book is a ALPA Andrey_Popov/Shutterstock; Images; Paper p96: p100 (TL): p98: product made from wood grown in p100 Aqabiz/iStock/Getty manufacturing process conforms to the p130: Printed in the India country by of Manipal origin. Technologies Ltd (TC): LightField Angellodeco/Shutterstock; Images. environmental Artwork of (TR): sustainable Studios/Shutterstock; regulations Chenn/Getty p100 natural, forests. The Steve KikoStock/Shutterstock; Mimagephotography/Shutterstock; recyclable PROD/Shutterstock; by OUP and Thomson Digital. p147: Preface In this, the third Technolog y that for edition incorporates Examination the syllabus. Almost how is invaluable O xford 20 are recent Council’s c lear of CSEC, we changes Information years information Information providing into and the to new the implementation) material Caribbean Technolog y new Caribbean millennium, it communications programming (IT ) the is textbook resource in ever y textbook aims the Caribbean student in to the support the and problem 11 introduces use of ICT tools support material to solving. It fully writing will provide you for syllabus. e resources through topic explore range questions. O ur and of this the ever y textbook discussion, worked educators design in from years across resource of the material section are examples of the most part, the be chapters the sections of the have used have a with wide Each students helped us to the of in Chapter 1 hardware and sof tware) and Chapter a to provide detailed treatment the coverage of syllabus Section 1 and Information 2 the practical 6 page chapters of these design), which for the theor y for the CSEC Paper IT 1: 9 (Problem is the ¼ hours: are for Based and compulsor y into the sections sy llabus. more take Microsof t and a on dierent based on the End-of-section the questions chapters. e and the examples. e teachers ne w exam appendix through as the individuals topics at the covered end approach; of intention is testing to with this format, approach using real- inc ludes SBA, useful whether hints c andidates or as a par t of a is our intention through this text to once again provide supportive resource for each candidate to achieve material and the in IT examination, as each candidate practical Assessment Chapter their to 10 embrace new technologies which will (SBA). arrive in years to come. (Program multiple -choice questions. Section 35 questions – Theor y 30% of final mark 15 questions – Productivity tools 10 questions – Problem solving Paper 2: 2 hours: Four compulsor y questions from all areas of the syllabus. 35 marks – Theory 45% of final mark 30 marks – Productivity tools 25 marks – Problem solving and programming Paper 3-1: School comprising word Based Assessment processing, web (SBA). page One design, practical assignment spreadsheets, Productivity tools database Problem solving and programming management, problem solving and programming. 25% of final mark Paper A 3-2: theor y Alternative and to practical the School paper Based testing the Assessment skills required for private for the candidates. School Productivity tools Based Problem solving and programming Assessment. 25% of final mark are group. Chapter Syllabus 60 V isual the processing, spreadsheets reinforcement students guidance Structure 1 introduces support (Computer updated provides solving) from other questioning inevitably Chapter 12 can Processing). examination School word subdivided which from prepares requirement is provide chapter success needed Chapter sections a ( Web method (Information It Among for objectives working Fundamentals this (Fundamentals for for used section. ere wor ld processing) with have to of programming comfortable aligned syllabus. However, we separation Pascal those code, while chapter specic questions eectively. been for Applications, which familiar ise maintained of management. learning with areas the each For these questions. presented and interacting region to use, while in and to which with database IT can support examples challenging choose for applications the students oer several now interest Basic productivity their to prove technolog y of of language to can sector, inc luding fundamentals education. is continued continues programming, with Chapter an have candidates. Teachers Contents 1 Fundamentals 1.1 Basic 1.2 Input 1.3 O utput 1.4 Primar y 1.5 Secondar y 1.6 System 1.7 Data 1.8 Application 1.9 User 1.10 Types 1.11 Common of computer devices hardware and sof tware components and media devices memor y storage software 5.4 Reviewing 6 5.5 Combining 8 5.6 Table 15 5.7 Mail 19 5.8 Printing 21 5.9 Fillable 26 processing End 2 software chapter and Data 2.2 Validation 2.3 Automated 2.4 File 2.5 Information 34 hardware exam-style problems questions and 3.1 Computer 3.2 Web methods and of 42 data capture access processing 54 exam-style networks 46 49 and questions web 60 technologies networks 4 chapter Implications 4.1 Computer 4.2 Misuse 4.3 Data 4.4 Impact of and cyber information IT Personnel 4.6 Implications of in in the workplace computer-related of chapter of Web page Word chapter 129 forms 130 exam-style questions 136 design 6.3 Creating web End of a to web web page design 138 page 141 page chapter 147 exam-style questions 150 Spreadsheets 7.1 Introduction 7.2 Common 7.3 Developing 7.4 Formatting 7.5 Searching 7.6 Charts 7.7 Printing 7.8 Importing End of to spreadsheets spreadsheet a simple a 152 features 154 spreadsheet 160 spreadsheet for 170 records 172 180 a spreadsheet les and chapter 185 linking exam-style data 186 questions 188 elds ICT exam-style questions Databases 8.1 Introduction 8.2 Common 79 8.3 Joining 81 8.4 Capturing 84 8.5 Searching 89 8.6 Calculated 94 8.7 Report 95 8.8 Importing 101 8.9 Developing End 5 document a 77 secur ity vulnerability 4.5 End misuse questions protection of 122 electronic End 120 70 exam-style of the Designing 62 technologies of data 124 6.2 8 End 116 importing merge Introduction 38 40 verication chapter and contents 6.1 7 information Computer 36 processing organisation of systems computer 2.1 3 31 computer Information End 29 interfaces of work les 27 6 of of your of to database database multiple and and management management database entering features tables data 193 200 203 sorting 209 elds 217 formats and 191 220 linking database chapter data 225 applications exam-style questions 227 228 processing 9 word processing solving Introduction 5.2 Document organisation 110 9.1 Introduction 5.3 Tables columns 112 9.2 Algorithm and to Problem 5.1 and program design 103 to problem design solving 231 233 9.3 Pseudocode Programming 235 with Visual Basic for 12 9.4 F lowcharts 9.5 Arithmetic, relational 9.6 Testing End 10 of chapter Programming 10.2 Writing a 10.3 Running 10.4 Testing 10.5 Program 1 1 of logical operators 252 exam-style questions 258 languages 260 266 debugging techniques documentation chapter Programming with V isual Basic for 283 Writing 287 in Information 2 Teacher Assessment VBA questions 272 3 School-Based guidelines guidelines Guidelines program Answers Pascal Technolog y for 292 the School-Based Assessment 268 270 exam-style to Applications 1 262 program and 12.2 Introduction Appendix program a 12.1 256 implementation 10.1 End and algorithms Program Applications 246 to 295 for problem solving and design end of 296 topic questions 298 Index 11.1 Introduction 11.2 Structure 11.3 Formatting of to a Pascal Pascal the 274 program output 305 of Pascal 277 programs 280 What's ♦ Answers to Q uestions ♦ with this Paper Chapter Exam-style Q uestions sample on answers all multiple online Paper to 1 2, worked for and choice SBA test, Paper 3 marking, SBA 3 Workbook Comprehensive this of book. with Paper advice Answers End website? analysis. alternative ♦ the Exam-style Interactive Practice ♦ in chapter examiner ♦ all Additional each on glossar y questions of terms used in book. www.oxfordsecondar y.com/9780198437161 A PT E C H 1 F U N D A M E N TA L S 1.1 Basic Computers are technolog y. A an computer important computer is of information electronic under the control of memor y. W hether network (such as on the its instructions own or Internet), it stored is the connected via name accept ◆ manipulate ◆ produce data (Fig 1 can: data (output) from the data and results for future use basic tasks of any computer represent 1.2). ere are ve general categories: and controls how the rest is of the brain the of a computer includes (Fig and logic instructions data in through control unit the the calculations unit (CU) and the (ALU). e software and CU carries directs the ow computer. e and logic ALU performs operations. Input devices get data into a computer. A mouse, a 1.1). keyboard 3 Data and a scanner Output devices get are all processed input devices. information out of a or information is Data stored for is or input computer, for example to a printer, computer screen a to short the the 2 cycle a (storage). the IPOS of processing of four parts (processing) out ese physical (input) results the the e central processing unit (CPU) arithmetic store to a works. It ◆ given in computer ◆ S O F T WA R E Hardware computer its AND device, is operating H A R D WA R E components aspect an OF the or long computer even to speakers. time 4 Memor y enables instructions 5 Storage media DVDs, and Information Data is and output in to to temporarily store data. USB ash hard disks, CD-ROMs, memor y sticks, while the is processed the computer include storage devices user a include hard disk drives, CD-ROM into information various drives and DVD drives. Most of these devices can forms read data whilst sticks, allow others, such data to be as saved as USB well ash as memor y read. Fig 1.1 Four basic tasks of the IPOS Cycle Peripheral devices Components e term machines games of a computer ‘computer’ generally and laptops consoles smartphones as and but well as it refers can to also portable are computer desktop include handheld devices, such controlled may basic tablets. components of hardware or is, they system. Input, output peripheral a computer are categorised can and be the CPU added storage to but a devices devices. is the name given to computer programs that as the hardware how to work. W ithout software the software. computer 6 it. at outside Sof tware tell either located as is e be by are hardware would do absolutely nothing, as 1.1 Information Storage Basic and computer components communication device Output (CD-ROM) device technology (monitor) System unit containing central unit case the Now that we have processed, stored we introduce Information describe Input discussed how data can be input, processing (CPU) the and two output to important Technolog y equipment produce information, terms: (IT ) is the (hardware term and used to computer devices (keyboard & mouse) programs or software) that allows us convert, store, organise, manipulate and information. IT may also refer to and to access, retrieve present the use data of such Output device equipment (printer) and programs Communications to describe which data to produce Technolog y (CT ) telecommunications and information the is information. the term equipment can be used through accessed. Examples Fig 1.2 The basic categories of computer hardware of there would following be no types instructions. Software of includes the CT and equipment are phones, faxes, scanners, modems computers. program. Questions Computer ese are programs instructions programmers System is to (programs) create system produced and application is List 2 State the basic tasks 3 usually called an operating system controls the works. e hardware most and commonly Windows, written by the how used all other software also includes What is par ts of Explain system a CPU just as car’s a aims to protect mechanic engine when and maintains it is by utility b CU c ALU. damage maintain the the smooth system working serviced. Examples software caused of (‘backing by Explain up’), and of the of stopped working Application to spreadsheets the cycle that represents the four listed a in general question name 1. given to the physical computer? what each of the following terms represent: the dierence between an input device and output include: protecting computer 6 What is another 7 What is the les after name for system software? general name given to each of the descriptions: software viruses, making recovering device. tasks computer programs that tell the hardware how copies work software (‘crashed’). telecommunications data and information equipment can be through which accessed. sof tware Application software computer of a b has computer. software, to les any utility software. is a against name the following undertaken of is an software tasks Corporation. 5 System basic software operating Microsoft four since 4 it the software. sof tware software 1 by carr y and out is a software specic databases are that instructs task. Word all a processors, application software. 7 Input 1.2 Data must computer be devices provided system to be in a and suitable able to media form process for any it. So, it Keyboard important to think of the dierent ways keyboard data into a computer, particular ly since needs to be entered as accurately as and various person to enter user responses erefore, an data from the Although desktop and do remote is into input most the device outside input realise control entered it! for using a a memor y is wor ld any a or computer. that be transfers across a time games are many to Other being dierent suitable others you use can a console, data keyboard. input and for a dierent general categories of input keys, a set of digit keys, so the keyboard is data in entered the form by of or numbers. W hen you press devices and data entr y are (DDE) has by the the which the keyboards on be a have that it picture is to do the animal. Akeypadis primar y of a to the easy to make just one consoles job and schools. e farmyard. Pressing computer a sent pressed. e toys, games in is keys. designed used cause (code) you wrong children’s robots would key disadvantage pressing found animal it number block of to make buttons the on noise that media, each purpose. e devices tell ‘keyboard ’ could an devices be to keyboard, a programmable manual digits, symbols or alphabetical letters. Keypads two can direct the letters, words special contain one alphabet function operating the keyboard of ere on mistakes connected come key computer computer. example, ever y television special a can probably For of device into devices computers, you not of data, programs, commands a and set possible. individual ‘Input ’ means a all the data has of keys entering keypad is A always and also be found on many keyboards. input devices. Mouse Y ou Manual input can range W ith data a manual into these the devices input device, you computer are also move data directly into a computer using must yourself. Some explained enter or transfer examples of input of input device surface, the next. direction. If devices. e called pointer the a most mouse. As on mouse the has common you screen two move moves is a it along in pointing the buttons, the left one Scanner Barcode Temperature Musical Mouse sensor Fig 1.3 Input devices: getting data into the computer 8 reader controller keyboard a at same Microphone Games a devices is 1.2 used to ‘select ’ items such to ‘access’ menus. e ball underneath e optical e cordless to text and mechanical help mouse as it uses roll light the mouse smoothly to track right one has rubber in its a all is is not physically Touch-sensitive devices instead uses infrared A touchscreen way It is to a screen with the radio waves to scanner text to to the to to input data touch, so (Fig you do 1.4). not use a keyboard or mouse. Banks, malls and use touchscreen kiosks or touch terminals provide information to the public. Touchscreens are commonplace and on handheld devices such as mobile iPads. scanner allows your sensitive computer. phones A another is to also Document is that the to communicate media movements. connected or and directions. restaurants computer, but devices used need mouse Input you to transfer computer. It bottom one line computer. Y ou can program, send it at then as an scans a time take email pictures, graphics the image and that from transfers copy and attachment or and the it use top to it print the in a it. Microphone Data can be entered microphone. e carr ying or out turning a the computer computer instructions spoken processor. ese or into are voice-response responds such words called as through to this printing into text in a a a data by document word voice-activated systems. Fig 1.4 Touchscreens, such as the one shown here, are popular in public places as there is no need to use a mouse or a keyboard Digitiser A Digitisers conver t drawings and images into touchpad senses For example, a digital camera captures still is images and stores them in electronic the printing or editing later. A webcam is a t ype for camera transmission Internet or webcams or connected for of other to see or live monitoring computer, S ome other on images chatting Other uses of highway s over users use movement online, A webcams digitiser is found in a a and light computers pen is the light a pen can signatures. It that uses graphics a a it a tablet are pen called also digitiser allows drawings and at, touch-sensitive special transparent screen is capture direct a shown element of interaction a ngers found on on its laptop and and function as a mouse does to similar stylus is devices a or used to a have stylus, felt to mouse, but tip that draw replaced which on is uses a is rarely it. A small since variation pen-like pressure graphics used instead tablets or of device of type ink. on to avoid using ngers on the screen. handwritten drawing monitor. this more graphics stylus. Images on or usually devices is plastic touchscreens tablet, that one are pointer. touch-sensitive other with of of devices Pointing A type also the sur veillance. Another which t y picall y computer while video. trac a moving network. each streaming inc lude still to surface of move digital rectangular format notebook for at and surface. ese video a data. kind with the surface from the ese W hen overlays screen. Remote-control a devices send abuttonis pressed by device another data on that devices through the signalseach device. e processes the signal time is received instruction. 9 1 Fundament als Remote and of control radio hardware devices station and are software used to channels, open change electronic television gates Barcode and A manage slide barcode Groups Biometr ic to systems uniquely biometric related systems use some identify systems to some part which of a them. ere that aspect can of person’s are identify the body two e body types someone. One using, for is and of are size group or iris recognition (Fig and shape of the hand. ese found bars are often consistent and rarely change. In and tone or pitch of voice 1.5), as xed behaviour. For your dierent widths. example, if you signature or voice may its to all represent above or included countr y price is the of not products dierent below in a the we buy. numbers barcode. barcode for a origin, manufacturer included in the barcode. are read into the computer using a wand or scanner. ere are related are are not also camera-based easily damaged barcode and can person’s to still be read if they are creased or slightly the can be printed using a normal printer ner vous, and then of well wrinkled. ey person’s bars characteristics contrast, a are used code. e normally signature vertical almost normally represent item on printed readers. Barcodes are of example, a the a numbers product of are Barcodes ngerprints, face as is presentations. Barcodes ese reader ink, and so are cheap to produce. change. Fig 1.6 A barcode is found on many products Fig 1.5 An electronic signature can uniquely identify a person A barcode e Direct A direct data data automatically barcode the entr y from into the information ese be – devices entered entr y a can transfer document – computer. Y ou information such do devices as not a form need to or enter manually. are into device (DDE) used the data large computer volumes of data quickly . Previously, it must Goods relatively long time for a supermarket cashier to then systems, enable and the cost of your grocer y items using a cash barcode systems make this task as are various DDE devices input devices, dierent DDEs are purposes. Some examples are of be of been sold. re-ordered. ese point amounts has of data sale to (EPOS) be input ver y of people now pay for their shopping using or store cards. e magnetic strip on the such a card is ‘read ’ as it is being ‘swiped ’ by a swiping transfers account information with suitable explained the cost of the goods, into the banking system. for type of system is referred to as electronic below. transfer 10 electronic what produce quicker. is dierent store to system. add and manual a used a register. much available. As tell is into card salesperson. is ere barcodes automatically large directly took back Nowadays to data accurately. credit, debit up enter from and systems, known Smar t to collected can Millions a used customers’ bills quickly when is at point of sale (EF TPOS). funds 1.2 To gather through the is information a machine magnetic scratched on the businesses A card now gets can to that be does set a special of circuit. Such more card, it quickly the and magnetic the corrupted. Such loyal not rely has a gold-coloured reader the soiled, then reward appearing. It a which pattern. If or card from inputs cards are sophisticated accurately area on card is reads the information a e swiped card stored used by on a magnetic information called strip electronic contacts. Putting the is also circuit the card held in swipe and numbers of form If smart cards are often called input an are actually simple storage of a or put into written data than Smart carr y a machine, data onto a it. A cards, unlike all necessar y at the be card read can from store a special all will marks draw. is mark into method recognition positioned scanner. is is read data as to fast the can and be to sheets mark data part have answer system data tests probably form. ese the of media marks data is on a then system. scanning to the optical precisely set and of your answer will your be them passed answers. is accurate. OMR that has been transmitted to is added the the the much automatically. e nal information can then card produced without any need for human inter vention. card more strip. functions do time called into multiple-choice used then them each devices devices, devices. W hen magnetic-strip-based card. erefore, they databases smart magnetic can the turns on by inputting therefore be is by OMR computer they is relies examinations, you way cards. enters read have through are system data and being you and Although and entering (OMR) on in the smar t cards. ey magnetic computer processed customers. built-in than is Input of not the and cards, can information require access to on the remote transaction. Fig 1.8 Data can be entered into a computer in dierent ways. Lottery slips are an example of optical mark recognition (OMR) Optical Another a way computer character is Fig 1.7 Smar t cards have a built-in electronic circuit and a set of gold- coloured character turned reprinted of entering system is recognition into by a a recognition le to scan the (OCR) that word handwritten can text (OCR) or printed using an program. e be text optical scanned edited, reformatted processor.e accuracy into of text and OCR is contacts variable to Optical ere are numbers you buy lines slip mark various ways automatically a lotter y through is recognition then of into a numbers a letters, words system. For ll in on machine can scanned be are poor,particularly of poor if the original pages quality . (OMR) inputting into ticket, you sets fed of be and the a that slip grid and example, when by putting (Fig1.8). is reads the marks. OMR and OCR are often turnaround document . A one it to which by be a has some computer added to it a together turnaround unique with by used other information is a document information human. It in then printed which fed is on needs back 1 1 1 Fundament als into a of computer information to hardware a and second the software time to transfer the added Sensors computer. e music interface Magnetic ink character recognition process millions of cheques each day . Every piano-type the cheque number, account number and branch on it using magnetic ink (Fig 1.9). A character reader (MICR) reads this with the amount of the cheque systems, so that the wide from one are readers inc ludes ey onl y can can onl y numbers read characters accurac y. Information also secure the ver y by since information magneticall y folding read and by into the cheques can be special punctuation quickl y it is not (as it to with also a which that marks. in with magnetic are of ten font, and possible over numbers cheque in of used by MICR and into ink 100% is collect which wind speed can sounds or set of respond be used system. For pen. e always damaged predict the from has through respond can to then be pads. to to a wide collect data example, the weather sensors sensors and humidity. is to not a Oce data space. ese change happens). the of keyboard signals. ey data is data processed weather. As large we forecasting around collect direction, hours accurate, but the on of wor ld help of and meteorologists know, the amounts and temperature, sunshine to systems forecast precise is data not are collected. Both Information thereader input that cashed. one pr inted sensors banks’ few ver y w r iting printed the a by variety available Meteorological MICR or information automatically information is digital magnetic variety along systems. Here, data keyboard struck. A Sensors ink instrument code generated printed musical cheque being has (MIDI) uses (MICR) a Banks industr y magnetic systems use sensors to input data so that ink the systems can decide what to do. W hen you approach areexpensive. an automatic there and sensors have makes to or the inform been sound Fig 1.9 Magnetic ink symbols printed on the cheque door, a opened the sensor door the or police tells the open. Burglar system when broken. is to be system alerted you alarms doors causes or an are use windows alarm to automatically. Table 1.1 Input devices: advantages and disadvantages Input device Manual Application input binar y (touch) key strokes into ◆ digits. Carries out function Disadvantages devices Keyboard Conver ts Advantages text the keys Used commands such as of ◆ manually into Used and ‘End’ and to to the ◆ Most ◆ Relatively computer type commands instructions computer ‘PgUp’ input common entering means of ◆ text Continued repetitive inexpensive ◆ to Errors strain cause injur y transcription are systems ◆ Speed the of input user ’s depends experience (touch) Mouse Sends positional to computer, the can common on scrolling in use of information by mouse clicking ◆ or Acts as an between buttons inter face the user and ◆ the directly computer ◆ Used to directly page issue to Commands commands the computer ◆ Can to can the be given computer selecting commands icons directly Hand-to-eye ◆ Shifting (e.g. down) activate ◆ by can be a problem between keyboard be coordination and mouse can confusing (continued) 12 1.2 Input devices and media Table 1.1 Input devices: advantages and disadvantages (continued) Input device Application Joystick Similar but to with Advantages Disadvantages (touch) a vehicle buttons gear for shift, ◆ Generally used in game ◆ playing different Ideal for racing games and such as car ◆ combat the the user to to press par ts ◆ activate Are located places functions and such in and public as shopping transactions ◆ restaurants malls can information be where ◆ made Easy capture hard-copy copy of to shapes and the Graphics Used an image create a in ◆ digital be used are options ◆ lines of a and ◆ pressure stylus on Voice -recognition that form. The by children and challenged is input input commands ◆ unable Relatively to use other a is Captures input signatures audio ◆ are then like drawings Resulting Allows or give to the (light are groups ever y codes and of bars are product are read using a of ◆ found ◆ cheap and easy to ◆ Depending on handheld use, flatbed you into wand or Data collected from the barcodes ◆ and can be a monitor users to dictate commands ◆ a monitor scanners can be the and the the hard-copy, scanner image quality scanner software ◆ Requires detailed digital drawings more ◆ More Can be used to as a some practice expensive than a mouse capture biometric text ◆ The for user can speak normally ◆ dictation Must be trained recognise computer ◆ Software voice to patterns cannot English interpret meanings or laser) Different groups of ◆ Data can be input much faster ◆ The order of the data than it takes to be keyed in stored cannot be changed easily numbers. These numbers ◆ Not represent the product's ◆ Can easily be country of origin, normal manufacture and item code so damaged printed printer cheap to using and a ink and produce ◆ Used and to record track transactions ◆ inventor y Prices of products easily updated ◆ Items can ◆ Can be can be ◆ Depends Internet easily on a reliable connectivity scanned (OCR) graphics copy of on (light) Character Recognition quality Allows artists to sketch signatures directly and update the database soft time (laser) is used to produce information as The of easily than by using a mouse images on hand- bars represent different scanner and a than devices Electronic Point of Sale (EPOS) Text at (sound) analysed entry computer Optical of displayed screen depends chosen created system in which widths almost fixed be expensive standard install or and reader Barcodes the joystick number can one More all data Barcode buy. The limited on ◆ processed on the devices across different applications the ◆ different A values physically documents and images displayed Direct of (machine -readable) tablet through Conversion of hard-copy used to import and export tablet for input Can who images to soft-copy can be image input movement Data sensitive (light) Scanner to to choices the given way and input Used become the movement screen different to at (touch) Touchscreen of has skilled commands Allows User are scanned ◆ Can be blocks used of to typed input text large speed process up the typing ◆ Accuracy be of the text can poor (continued) 13 1 Fundament als of hardware and software Table 1.1 Input devices: advantages and disadvantages (continued) Input device Magnetic ink recognition Data is or data as special translated Used ◆ magnetic into by banks cheques, ink. text (branch, Mark by additional values Optical Disadvantages (magnetic) character using is Advantages (MICR) printed characters This Application to process printing bank ◆ Is ◆ Both humans and machines details account number) quick and highly efficient ◆ Has ◆ As limited the use can interpret the data becomes ◆ Not is ◆ Data easy to forge in applications of cheques obsolete, its use decline (light) Recognition (OMR) Relies or on the absence presence of positioned marks being by read scanner. This processed Smar t A on a and form is strip owner the of input is ver y fast and There ◆ accurate issued is a number by Incorrect ◆ boards marking then may system limit of or the inconsistent on result being to responses the in sheet the data rejected (magnetic) data plastic lotteries sheets examination card magnetic with multiple -choice question special the encoded a a data by Popular ◆ precisely containing about card is Used ◆ the to debit, placed on and store credit, other data on loyalty, ◆ phone cards card Can be used financial to store transactions ◆ Transactions ◆ Saves the are user ◆ Can ◆ May fast from be damaged soon be embedded replaced by microchips carr ying cash Musical Instrument Inter face Can be create, (MIDI) used by musicians manipulate sounds in (sound) Digital a and to Used ◆ store to store instruments computer music or from voice for ◆ Once stored, arranged in the data many can be Special ◆ ways be editing software used music to into must translate a the musical score Questions 1 What is the general name for each of the f following on being devices: g a relies transfers data from the outside world into a precisely read by document a positioned special which marks on a form scanner has some unique information a printed on it by a computer, but other information computer needs b a at rectangular sur face which also fed movement c a system uniquely d transfers of that a nger uses identify on some its of a person’s body to 2 What transfers graphics and text to a a computer 14 such as a automatically form is data by information document, be added into the to it by a human before it is computer. the general name for each of the following processes: computer e back sur face par t them pictures, to senses or from barcode a into b the to is entered or transferred into the computer hand send time data at a abuttonis distance pressed through on the signalseach device. Output To get may processed need print or Soft the types copy : from a information output store common ◆ an is not computer ◆ Hard since to copy : it is a processed computer, you to show, data. e most are: permanent. It monitor, audio speakers, electrical computer of output this of device. ‘O utput ’ means results of out 1.3 devices signals and includes (sound) output output from from one another. this is printed also for computer. Examples called you are to permanent review printed away reports output from and the pictures. Fig 1.10 Various types of devices with displays Display Computers devices usually display output on a screen or Features monitor. Some be plugged such as screens into laptops some devices the can mobile to also the be additional inc lude smar tboards) are and system used as unit need their and computer for whiteboards monitors teaching or large touch-sensitive plastic 19 either directly by connections to a respond other devices such as a computer pen. e common most LCD (liquid types cr ystal (light-emitting of projector, tablet display display) diode) device atscreens screens on handheld the desktop measured screen screens which are shows from diagonally. Larger 14 sizes the inches are now determines how clear and detailed the output on screen dots can (one be. Pictures dot = 1 on a screen pixel). e more are made pixels up per of inch, or clearer and more detailed the graphic. Colour include and inches of or the magnetic dimension to tiny through the Resolution the input is called presentations. boards screen available. is ese computer output. Common to display (also a Size is keyboard. connections. Other of to unit. Others, devices, have system interactive used separate computer ’s and integrated Televisions with monitors e LED devices and to number 256 to 64 colours, the laptops. of colours thousand smoother displayed to 16.7 the can var y from million. e graphics 16 more appear, especially photos. A of monitor contains red, green blended to location and creates a up picture include colour as image of and bright RGB). ese of is resolution. each known seen pixels. element. Features size of dots can colours. Mapping image. is thousands (pix) of array information bitmapped of or (known millions computer its matrix blue display (bmp). e made and a on Pixel of a a bit as of a computer the data bitmap monitor stands be Cursor/pointer e cursor working for is on the a symbol the that screen. It mouse pointer shows may where appear you as for are text and location. is for screen Scrolling is allows down or the text brought or into graphic view on to be the moved or up or screen. 15 1 Fundament als of hardware and software as Pr inting that of a depending No matter how simple or complex the is, the nal result must be made a user-friendly form, and usually in the per form of to record. Printers are copy of devices which output the your work. e speed, quality choice of and quantity what scanner, a printers also photocopier categories of printer perform printer you and are fax the of for and ribbon, like are useful through acceptable printing printing continuous individual largely strike typewriter. ey for paper, and into a print require functions of Dot-matr ix a carbon are multiple sheets or noisy if or of copies inked and do using nancial paper at for Laser pr inters Laser printers of necessar y. Impact are to on in 1200 paper printer is for paper. e of are for uses pins main to print advantage printing main a of multiple disadvantage reproduction printers Colour laser more much stocked from characters do are not then output is and school used. faster documents than at a high inkjets. ey are or for using moving or xed can copies is be the read business actually toner onto print possible colour. e can to of tends (dpi). Many speeds of of sheets documents. 8 to to be lines 12 300 are pages per are also available. ey are to buy higher than element are and in is by is but colour inkjet printout and printers, are cheaper pr inters ermal printers paper form to use heat on chemically characters. Many treated automatic banking (ABM) receipts, debit or credit card slips even some ultrasound scanned images are printed thermal recent printers. ese ones print the printers are quiet quickly. However, the print eventually fades if and paper exposed is to the or heat. used. e heating, for pr inters and inexpensive (3D) printers are similar to inkjet to instead a 3D model is created layer by quietly. quality black-and-white can images cannot simple low-priced, good both quality relatively striking paper printers quickly buy print quality number quality printers inch quiet, print using pr inters that large are letters. powder the printing parts, these and a high laser per printers costly printers, but manufacture with they dot- more involve spray the because attained. ree-dimensional 16 are run. 3D example. Because now printers pattern pr inters paper. Instead, ink is be ver y most printed be produce light printers inkjet small-quantity attractive workplaces expensive, and It toner existence. printing, which Non-impact Inkjet the some using no can simultaneously, and can and has cartridges than cards, photographs produce dots minute to paper. e quality ese 6 are pr inter printers used frequently printers. Colour produce be printout printed tear printers still many machine be achieved. eir home, where and paper, and e that to in Thermal poor be more greeting quickly, can not carbon reports perforated now. However, there printers dot-matrix carbon to non-impact. but matrix 4 main far ofdots of a graphics. However, they payroll sheets obsolete dot-matrix A printed. Speeds pr inters printers usually be the used Impact to may laser use resolution Impact slower depends want, and machine. Two impact is replaced work. Ordinar y cost. Some are a required on printers a ideal hard on minute be cartridges permanent inkjet available need in printer, but data-processing pages operation laser devices be near ly as or good layer, from the over hours, as many bottom another. However inkjet, the each layer 3D to each layer instead printer the upward. e of uses previous is printed using melted one. model ink as plastic is on created top with that of the sticks 1.3 while (Fig loudspeakers who anyone wish around speakers that to t which inside has listen a listen them need ears. Earphones and play sound 1.13), however, headphones users that can or the to (F ig to be earbuds ear. A the same are a sound are headset is attached to set to people one for disturbing devices small a of devices popular without close ver y group more 1.14). ese placed microphone at the to Output are or small both headphones of allow headphones, you to speak time. Fig 1.11 3D printers create a model layer by layer Plotters Car designers, architects print accurate output uses not to coloured paper ways hold (Fig plotters a laser pens printer or 1.12). e paper roll engineers charts, diagrams depending the and on still the toner paper the paper but to is type while a to 3D a draw wish image in plotter on dierent plotter. F latbed pens to drawings, plotter. A an handled of the over and who plotters move. Drum cylinder, while pinchFig 1.13 Microphones record sound while loudspeakers play back sound roller of a plotters drum are a plotter is mixture that it of can the two. e produce advantage ver y large drawings. Fig 1.14 Headphones, headsets and earbuds are more popular for users who wish to listen to the sound without disturbing anyone Fig 1.12 A plotter can produce very large drawings Sound Audio Most devices computers sound card. is playback sold to allows (output) of music homes both and the schools recording sound. Microphones include (input) record a and sound allow is may from also a be output CD. Some word-processed can visually be ver y from a software text to important be to digital le or applications read young back to as will the children or user. the impaired. 17 1 Fundament als of hardware and software Speakers Modem Monitor Traffic lights COMPUTER Inkjet printer Plotter Headphones Dot-matrix printer Laser Robot printer Fig 1.15 Output devices: getting data out of a computer Questions 1 State three general types of output d devices. type of treated 2 What is the general name for each of the printer paper that to uses form heat on chemically characters following e a printer that uses melted plastic that sticks each descriptions: printed a tiny b devices dots c type that make up the pictures on a output a hard copy of your ver y work ears. of copies 18 printer using that is carbon useful paper for printing to the previous one screen f which layer multiple small audio output devices that t inside the Primar y Some right of the away needed e as for for methods the travel storage as computer’s quickly and circuit from specic its to to or be of at the CPU CPU the types examples board CPU data can is be Most computers of that be the (called computer quickly to be of of is a have from, written data called computer computer at address), can read amount stored to which a can word memor y. L et memor y and us their memor y memor y you temporar y a computer will nd operating programs CPU one or more instructions for its advantage major held data and receives are put of held RAM in RAM is the the is RAM is lost malfunctions. is data. is instructions is the store and data instructions be read, but not changed are available ever y time the is switched on. memor y is that almost that RAM when why the a computer between immediately. e is volatile computer we can need to is use – several memor y RAM types of and technolog y ROM memor y has develops, the become combine line blurred. Now, features of both. data turned other o ese devices called hybrid do not belong to either group; they are or memor y devices. Hybrid memories can media read and written as desired, like RAM, but maintain data. computer become can it their As ROM (read-only memor y) place be to on job. disadvantage in input/output the Recently, as access made, basic memor y Hybr id do is (RAM) computer the (ROM) RAM (random-access memor y) . ese computer, its e as computer’s (non-volatile), and to RAM can chips. ese called needs of processed. travel an data instructions where GB directly W hen the 8 memor y Random-access hold to standard. Read-only chips 2 Fig 1.16 Random- access memory (RAM) – a close-up of a RAM memory module Types a with instructions features. Inside come uses. located so to on processed of needed not dierent processed. Data largest be be may process memor y accessed to dierent some be will data for to directly location contents other is circuit that to computer time. erefore, dierent from so together are a appropriate located processed. e ere of main and is memor y moved look are board the address into possible. Main Main memor y main put periods purpose quickly on you processing, while long of main data 1. 4 memor y more programs and complex, the operating size of systems RAM has have increased. contents F lash without memor y typically used is to a electrical variation store of a power, just ROM like device ROM. that is code. 19 1 Fundament als of hardware and software computer How data is memor y Ever ything that the computer does results on and o of dierent and combinations are millions of bits. Computer switches called transistors storage size is therefore given in bytes (8 make 1 byte), kilobytes (kB), megabytes (MB), of gigabytes microelectronic there fromthe bits turning disk represented or (GB) or terabytes (TB). ‘Kilo’ normally bistable 3 means devices. e ‘o ’ and ‘on’ states of the transistors a thousand, or bytes. is used to represent the zeros (0) and ones (1) that the binar y number system. ese zeros and known as bits (binar y digits). A bit is the can of information work with – or either piece binar y of 0 data or that binar y a is 1024 is because computers count by twos (binar y) powers of 2 and not in tens like humans. erefore, is 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2, smallest that chunk kilobyte ones 1024 are . However, 1 make and up 10 are is 2 multiplied by itself ten times. computer 1. e more Table 1.2 Units of computer data storage bits a processor (work things easily. W hen are can out) you continually use, the and use the a being faster more it can compute memor y it computer, millions switched on or o can of by 1 kilobyte 1 megabyte 10 (kB) = 2 = 2 = 1024 = 1 = 1024 bytes = 1024 kilobytes access 20 (mB) switches an × 1024 bytes electric 048 576 bytes current. 1 A popular produced made up mounted range by of processors Intel. e over on of a 27 slice chip million of is the shown tiny i5 in or i7 30 (GB) series Figure switches gigabyte 1.17 is (transistors) 1 terabyte = 2 = = 1024 = 1024 = 2 = 1024 1024 megabytes × 1024 kilobytes × 1024 × 1024 bytes 40 ( TB) = 1024 gigabytes silicon. × 1024 megabytes Questions 1 Describe 2 What is types of a the the temporar y are be State work you all 20 the think les of all that of are the programs saved, you can on see a computer, plus that on each for the CPU. each of the following operating instructions for and its name with. be read, ever y but time not the changed, computer is on read information Fig 1.17 A close-up of an Intel i7 core processor If the can available maintains 3 name of computer switched can purpose general instructions and c main memor y : holds the b the or written contents given piece to of as desired, without the data smallest that but electrical a chunk power. of computer can Secondar y Secondar y used for to keep later data storage refers to the programs, data use. Secondar y is and storage permanently, whereas memor y, which media and methods information saves primar y available programs storage and uses main Magnetic with ferrous length of binar y form since temporar y. Secondar y storage information for future and and on the drives and whereas and tape hard ver y store local and storage Local media are hard drives to storage hard and to disk hard are and and computer retrieve from disks a are disks data, disk storage and media is of it. e Magnetic a a only the strip data is each of plastic recorded symbol width be means drive of retrieved or erase tape since is the the used access the tape the in it is 49 tape along tape. It the as it primarily to data of ten is moves not a at that precede reel a tape night or to head (F ig rapid in 50th to 1.18). back-up as creating done the one unique order magnetic as the in is same pieces a coated encoded from over data devices. Since process working accessing winds passing storage slow narrow stored. erefore, retrieving data read, write other across was by a tape, with can tape another of methods computer it medium storage devices. generally cloud-based a drives, compact media be of and disks, compact storage when can data, instructions record have programs piece hardware are drives. So important data Local ◆ physical information disk o. Secondar y of keep tapes. Storage devices media. Examples is media use. Examples instructions It media is oxide. e the data which Devices tape 1.5 st orage storage as with backup at the is end day. to turned grouped into storage. storage storage with their involves data in users their location. ese magnetic hard media having possession local such as storage or storage devices generally devices magnetic tape or knowing include: and disks Fig 1.18 Backup tapes such as this are used to make copies of large amounts of data on computer networks ◆ optical and ◆ disks such as CD-ROM, CD-R, DVD Blu-ray ash memor y. Hard disks Another Magnetic common magnetic e cheapest way to store and back up data is media, such as magnetic tape and hard Backing and stores data is a disk it is known as possible a to hard add disk (F ig external 1.19). hard dr ives , disks. most Magnetic that on Although magnetic de vice media are inside computers, protected by r igid c ases. tape up to tape organisations important and is or large vital for computer businesses amounts of which data networks need for a to store long time. Technic all y, the controls motion the the data. But hard most dr ive of the people is the hard use machiner y disks ‘ hard that which disk’ and contain ‘ hard dr ive ’ interchangeabl y. 21 1 Fundament als of hardware and software CD-ROMs the Write cannot the Once be major ROMs contain Read changed ROM e that is part of their they Compact and Disk Rewritable to be sold back with up can are (stored be CD-R data be saved comes to on is as CD- and CD hard that or dust. Compact that allow personal you of during disks. However, the so where amounts light, heat erased. Many drives such damaged of of from. drives types are variety. ey signicant (CD-R) on) programs created. is easily exposure also are optical Recordable to can they store (CD-RW ) written CD-RWs are from of or ( WORM) name can data. However, they handling Many once advantage that software can Disk data data on computers regularly disk. Fig 1.19 Structure of a hard drive Digital H a rd disks a re popular for use with any and laptops since they s t o re a l a r ge amount H a rd disks ranging f rom 700 kind GB to of 1 TB much a re n ow c om m on . External h a rd disks available internal Optical in and speeds similar to disks. A disks magnetic can store media. ere disk. Compact drives were are disk s Optical disk c a p ac i t i e s disk because much are drives they more three are use data basic also lasers than types known to store most ofoptical as optical and read in used already be ver y familiar with one digital data type more data feature and than lms replacing to used gaming for storing software. ey CD-ROMs, enough can a referred DVD ROM, read e by a be put on as digital video linked DVD-ROM storage fact that pictures, VHS can that DVD. ey to a video TV dr ive capacit y the as tapes a are or and is played monitor. linked to a DVDs, technolog y main result, DVDs computer of which disks. programs holds digital are cassette movies, and CD-ROM, massive the to holds player like the distribute DVD-V ideo better will for often with data. Y ou are a re known n ow (DVDs) in full-length c a p ac i t y Disks of store data. Versatile c om p u t e r s reason DVD- data and is computer. coupled produces DVDs replaced of videotapes. compact disk music. ere used only of the CD that computers. is (Compact CD-ROM stored audio is, though, another with CD-ROM e – allows Disk you plays type is of CD known Read-Only to your access up as favourite that is 650 Disks theDVD the Memor y). to Blu-r ay MB a is stor age f or stor ing we re des igned s e ve r al c apacit y of up distr ibution of v id eo f eature data. by (BD) lms that c an be to hours 1 00 to of G B. game v ie wed re p lace vid eo Its main s of t w are in using use a nd high-d eni t ion resolution. Many audio to computers CDs, but mean audio the CD CD-ROM term format that you can only drives CD-ROM which tracks. CD-ROMs means 22 any with are use is stores data play always taken data, rather read-only the can than media, which on the disks. Flash USB are memor y (Universal also ash known Serial as drives, and Bus) jump can be ash memor y drives, memor y convenient drives sticks or alternatives to 1.5 Flash memor y ese cards games are inserted cameras, mobile the contact unique numbers in size, and to 1 their TB. e appropriate many are not and other called a cameras, video music SIM number, along and text storage various type digital example, contain Module, also phone’s into computers, MP4s, digital phones phones, for Identity storage cards consoles, laptop Mobile Secondar y and a players. Subscriber card, that with data messages. ese capacity ranges stores such cards from devices, however, dictate size of memor y card it 2 as var y GB the uses, so interchangeable. Fig 1.20 Optical disks can store large amounts of data and typically used for storing digital data, movies and gaming software hard drives. eir storage 256GB,although ey can mostly can be used store used for and there for capacity are larger storage transfer transfer of data and is typically capacities data computer faster 8 to available. backup, but les, since than the CD are they and can Fig 1.22 Flash memory cards vary in shape, size and capacity and can be used be read by many devices. in a range of devices F lash memor y drives combine the best features of Cloud-based the memor y devices described thus far. ey Cloud-based large amounts of data, are low (to read, but not to write), and increasingly USB common connection with drives since involves storage of data by users multiple have they anywhere in the world. e location of this data is not known by its owners. become use computers computers electrically exact reprogrammable. ese storage cost, non-volatile, on fast storage store a and standard-type laptops. If you have used Y ouTube, have used a based e mobile storage cloud network can of store messages you have is Facebook, Twitter, Instagram an email app, then address you have Gmail probably or have used cloud- already. an unlimited and interconnected your and with or data such videos access to at the as any powerful specialised school remote computers. Y ou work, photos, email time, from Internet. is anywhere, once saves you from Fig 1.21 Memory sticks provide additional storage, and are non-volatile and faster than most magnetic and optical storage media deleting data from your secondar y storage device or 23 1 Fundament als transferring W hen stored you on it of to use a hardware other and storage cloud-based single software remote devices to storage, the computer free data can space. is world, but on lots of dierent computers. If stops working, your data is still cloud-based stored anywhere cloud-based Dropbox 15 GB their can and of Google stored is Drive in the purposes. Users change may storage free. For other devices and storage, millions of people in the wor ld can interact with the at the same time. Access to data is give never as the know cloud pay amount where for users for of your easy the their data access pay data to to access data is once they have access to the Internet. example, storage. However, businesses data backup or one. immediate Some computer on application another your one from computer using in W ith the it applications. not somewhere access As about of have your any data type of with storage, which similar email messages. Storing increases. Y ou be you a security storage, there becoming corrupted, whether and stored, but with as is always the accessed, deleted, stolen an error addresses sensitive or can data a deliberate receive in the each cloud risk or act. Users other’s can also concern. Table 1.3 Storage devices: advantages and disadvantages Storage Advantages Magnetic Hard media drive Storage getting capacity : many gigabytes many terabytes and capacity : Removable Storage getting ◆ Stores and ◆ External ◆ Used ◆ Low-cost retrieves hard drives data are quickly ◆ Internal ◆ Not hard are not por table por table hard capacity : drives many gigabytes and to back up data on hard disks storage ◆ Removable ◆ Relatively and generally used with desktop computers por table ◆ Slow – so only used for network back-ups ◆ Can cheap be they larger ◆ misplaced, are Need or damaged since por table specific computer Flash drives larger Tape Storage Disadvantages or cable to connect to device memory Storage capacity typically Storage 8 GB to of USB 256 capacity of memor y stick: GB memor y card: 2GB to ◆ Compact shape ◆ Operates faster ◆ Can more 1 TB hold than data an ◆ USB disk ◆ Some optical ◆ Can ◆ Data optical than an memor y do be not easily stick have requires a USB por t write -protection misplaced or stolen disk Cloud-based storage Storage capacity : users some of others who 15 GB for applications. pay for the individual Limitless ser vice for ◆ Users can the from anywhere interact same with the in the world application at or can be accessed, deleted, stolen corrupted time (continued) 24 1.5 Secondar y storage Table 1.3 Storage devices: advantages and disadvantages (continued) Storage Optical Advantages storage ◆ CD-ROM (Compact Storage disk read-only capacity : 650 memor y) MB CD-R (Compact Storage disk 650 (Compact disk 650 Storage versatile MB disk) capacity : 4.7 GB large a ◆ Possible CD-R MB DVD (Digital cheap on Good up to 17 ◆ CD-RW 25 GB up to 100 can Good for Excellent ◆ As with Blu-ray GB DVD. Can ◆ for As CD is read-only, (write) one up to the Slower ◆ Should session a files erased ◆ and reused as up and video CD-RW, of writing there CD-R ◆ Should access have times a a software cannot be CD-R than hard recorder drives to write to have a has var ying CD-RW capabilities recorder to write disk ◆ CD-RW ◆ Has is does not replaced quality (storing) data deleted disk ◆ to files showing or videos ◆ DVDs do ◆ Requires not work CDs, in all CD producing than work players better CD-ROMs in CD-ROM drives DVD Main be software required ways was feature as backing of on data than be CD-R range ◆ changed backing ◆ a par ticularly distributing more for produce, add ◆ ◆ capacity : to times data Storage of many GB Blu-ray in Good to scale way ◆ rewritable) capacity : Ver y ◆ recordable) capacity : CD-RW Storage Disadvantages intended use films is for and viewed in to the distribution video a replace of a Blu-ray player or optical drive games ◆ More expensive than CDs and DVDs high-definition resolution Questions 1 State saves 2 List the general programs three name and categories for data of the type of storage that 4 local storage. What use permanently. 5 type in Explain one associated 3 What is the main use of magnetic of digital secondar y cameras advantage with using storage and of, is mobile and most suitable for phones? one cloud-based concern storage. tape? 25 1.6 System S yst e m software controls Examples and is hardware of utility the and system sof tware name how given all software to other the software software include that works. operating systems software. Memor y management W hen program a memor y, a used to split required Operating e an most system commonly operating used and system system. W ithout an software is operating or called the blocks secondar y would not work. Popular Microsoft W indows operating 10, Apple’s versions of LINUX. Popular Mac mobile OS X include Apple iOS and Google are to to t into main can into blocks. e swapped storage large manageable between main accommodate be memor y the program management each device has a program called a driver that and the device to communicate with the computer, operating the systems program too vir tual memor y systems allows many is system, a Since include data called data. Input/output computer or method ow of information among devices must be Android. managed Process coordinated. management Process the and management CPU, checks on and signals when File management allocates processes the CPU is time for waiting processes to use the to use CPU, available. Fig 1.23 Common operating system logos: from left to right they are Apple, Windows, Linux and Android Files need to be saved, copied, renamed and deleted. A Booting le e process of starting a computer is known manager perform booting. e rst thing a computer does when on the properly power by button following is to certain check that it instructions is these chip known as the BIOS. It will held then tasks les in operating system to tell it what to do on system is loaded from disk to look memor y operating system and transferring data manages the organisation for or is specialised software that tries to the and maintain the system software. Examples computer ’s protecting software against damage caused controlling after between tasks like primar y devices like output. It hardware keyboard accepting and viruses, backing software has up stopped les and working recovering (crashed). input secondar y also resources and sets such mouse, the the as rules 1 Explain 2 Name used, CPU time allocation amount and e disk space system one applications, games or other how all programs computer operating State the following controls a the b a name 26 system software. operating system and of the term that matches process of star ting a computer software work one system. descriptions: on method used to split the manageable computer. of used. control operating purpose of 3 Sof tware the peripheral mobile memor y by (RAM). supports displaying of storage. Questions memor y to next. e control e needed sof tware computer Hardware memor y for include random-access of a protect operating and secondar y Utility software an amount working Utility ROM the you the turn checks as blocks. a program into the les Dat a Data It must can be then systems processed be for by transferred more the to most one processing, for or suitable more output means. for ◆ processing batch processing system is one where data together in a batch before operating run (work) processing processing is most suitable for tasks where amount of data is processed on a desktop regular a batch job begins, it will continue until an error process systems card batch utility and does purchase all the processed as examination as also not but purchases. e where such data a report receive one bill is is batch systems water process a bill card for monthly until it bill and end of include those that ◆ in each for separate that batch held the same credit Computers processing, they until the billing bill is cycle. so are that are for program example, using program while a graphics executing programs using two or simultaneously time when the computer the online a a the executing same allowing network two time more to using than access or only one the and it is peripheral the or a devices main can more one user same processor on le a at the computer you can o, then are to processing are online processor interact example, when button you modem to operator turned if real-time connected from Jobs for at online, for may be left running without human interaction. not time: one running and month’s online is same than time. Online an scheduled more include: batches. e If be the processors computer Once the data is submitted for processing, the computer can at still multi-user: data ◆ allowing multi-programming: electricity, payroll Advantages ◆ same is systems. Credit through collected the and billing created at the occurs. processing bills companies customer card of controls publishing is programs Examples system multi-processing: ◆ completed, or at basis. more W hen mainframe a ◆ large the starts. program Batch on is a collected program multi-tasking: to A same storage. Other Batch the time. computer or access 1.7 processing with they you are connected to when turned on, them. Printers are ready print. Most press and turn receive printers the oine. Y ou to, say, the to have machine can also Internet on. be through network. busy. A real-time processing system signicant delay, making processing system computers to it processes always data without up-to-date. Since a Disadvantage ◆ ere is always returned since a delay batch before jobs are work is usually processed stored up period of be connected to one or more process data, then it must also be online. over However, note a must and that online does not necessarily imply time. that processing delay with an is real-time online since there system. Examples may of be some real-time Time-shar ing processing A time-sharing system allows many users to share systems systems, electronic on a single computer. Each user is given a slice of CPU fast that reser vation time by the each user computer. e seems to be the computer sole user works of the so include aeroplane landing control time fund transfer systems and ticket systems. computer. Advantages One example bankcard of a time-sharing system, which allows system is hundreds a bank’s of people to ◆ No ◆ Information signicant is delay for always response. up-to-date. 27 1 Fundament als of hardware and software also Disadvantages for ◆ e computer must be dedicated ◆ e computer must be continually solely to the be used easier transfer e the computer users will, at some to transfer les between may need to time or at home to some such storage, by as a ash using a memor y their school work network secondar y stick les can the le take size, the Internet. Users pages from is le important up a large amount of disk of the longer it Internet takes will to also send know via that containing pictures can take a long time to via or by storage popular le formats give smaller le sizes a others because they are a compressed le type cloud- (Table based compression single computers. School transfer the a another, than computer into space. load. Some students together transmission. F ile larger web need les online. storage Most group task. because Data to 1.4). device emailing the work Table 1.4 File compression to themselves to retrieve when they are at school. Type Uploading data involves transferring data from be computer to another computer on the network of data to Compressed or downloading involves receiving compressed data JPEG ◆ (Joint or computer the from another Internet. Updates Microsoft Oce, are to computer software downloaded on the network packages, such from the on as le transfer protocol (F TP) (see transferring to reduce of a is le for known are the le data, it size. e storage, or as popular le for is also sometimes process of sending via the compression. W inZip programs for compressing the and the and file the file found Internet Network image computer to Video digital Graphic): format to on audio file for listening and digital of MPEG Group): contain audio, (Moving MP4 files video, Pictures can images, also and can data Questions State each 2 the of most the a printing b a computer c a printer State the suitable following 400 is cheques that of processing mode can suitable for employees’ wages access in and term the Internet turned for transferring one 28 you are data from using the process combining each on. of another the program 3 Suggest each following descriptions: a b for examples: plugged most type on Internet computers Exper ts text 1 a find devices Versions ◆ W inrar les. ey a music media size Internet, and (Por table MP3: ◆ necessar y reducing Exper ts image 3.2). Music Before common common Internet section a computers PNG ◆ a using Photographic to Group): your format the Graphics Internet, while le your to the of the the of reducing les most for suitable following a a picture b a video of c a recording of a a the storage size or of a le compressed format les: family bir thday of a par ty song by a and/or transmission. school choir. for Application Y ou have seen W indows is of the to do or desktop as this that sof tware specic is an essential we tasks use – a regular l y for has example, term sof tware Application sy stem computer publishing. e applic ation program. oper ating for software is word an number as work. been for or such to Most of years multiple processing can users application such and applications information created sof t ware Some be at that enables the the same programs error available (bug) anywhere or time. Popular (software) are free. online, where updated examples given in by of Table 1.5. applic ation dened computer generally even accessed as any Customised program is are 1.8 sof tware to carr y out one and custom-wr itten or sof tware more specic tasks. Customised that General-purpose most popular been applications to any used anybody. e are those that are organisation or business and can – for word programs you use at school the a word for a and programs software, because software for. For processor school specic tasks and for database are examples of general-purpose software can be customised by automating certain parts or the software modules purpose perform or writing and adding programming processing, databases, spreadsheets, presentations, drawing programs. ese to be of home modied software not that by general-purpose user. Word-processing, spreadsheet programs specic is sof tware the e has software to painting are the known user example, you write a – will as letter, or to what want design to perform specic tasks. such In general- decides might be to to a use use poster contrast, custom-written known written bespoke for militar y, in and play. as other use nancial used of by air thousands reser vation are of not trained software be ver y write of need to be tailormade aircraft; software; is (for in a before to an create can be than a use the of may it the software; users specic that ights airline design. ese of and these kinds engineers) expertise. Since take or a banks eciently. include manage the in business long time this it can to used. sof tware Specialised software rather to organisation and as involves software eld software such computer-aided particular to it able example, accountants specic costly also accounting and also equipment, or controllers, who Specialised task organisations medical general-purpose, since software are of trac for is software, is institutions. It users examples tailormade specic hospitals training, since Other in or software, which is written range of solely for a specic functions. Examples include Fig 1.24 Data in online applications such as Google docs, sheets and slides can be updated in real time and shared with multiple users the will General-purpose it has been used software by is millions much of cheaper people over because a software only Another would on allow your you example only allow mobile to would you phone manipulate to be an play for and online that your share card camera. It the photos. game, which particular game. 29 1 Fundament als of hardware and software package. Although Integrated integrated Many computers are sold with for a installed. Integrated program application and that (for database) includes software all example, word and brings Suite are the examples the major together Oce of is types into and large their software main companies application software, it such programs as choosing a you single are to Microsoft in sell software any decide carr y software. together programs Choosing of Adobe integrated the out a decide then e as these are sold as is not true integrated software, also still separate applications. term processing, spreadsheet them software package. Microsoft Creative such integ rated software as already packages sof tware for whether a to particular what choose important one tool should it the is no job. Just use a you dierent as drill task, so most when be with actually construction, a hammer software need appropriate choosing in or from to to you need produce, and program. is programs to use for is ver y your coursework. Table 1.5 Popular application programs Type Word of software Examples processing Desktop of application Microsoft Word, publishing Microsoft Adobe Google Publisher, programs Docs Google Purpose Writing Slides, letters, Producing repor ts and newsletters, other leaets documents and posters PageMaker Databases Microsoft Access Spreadsheets Microsoft Excel, Searching Google Sheets and Commonly crunching’ . sor ting used Also for data nance, used for budgeting creating and models, so-called ‘number simulations and ‘ What if?’ queries Graphics Microsoft Adobe Computer-aided design Paint, Adobe Illustrator, AutoDesk Photoshop, Adobe AutoCAD, Painting DesignCAD Producing (CAD) and Integrated Microsoft Oce, Adobe and Creative Suite software All major minimal PowerPoint, Prezi can plans for – are be or plans models, of programs closely related transferred often buildings or – in or word and the 3D. in Used the processing, output embedded into by design cars spreadsheet from each engineers of the other various with errors Delivering software e.g. application database programs Microsoft detailed architects, the and Presentation drawing InDesign normally slideshows using a large and presentations to an audience – screen Questions 1 State the most suitable term for each of the following 2 Name two applications that can be used online and descriptions: shared a software that is written for use in among users. specic 3 What type of application software would organisations b software rather that than a is written range of solely for a specic a creating presentations b monitoring task weather Meteorological c a program that application. 30 patterns functions includes all the major types of Oce. for the you use for: User User interfaces are found wherever digital technolog y Sof tware exists. How you interact with and use this inter faces technolog y Software interfaces is controlled by the as the human–computer interface interface involves various ways of capturing data booted between a user and the interface device therefore can be even up and audio–video-based, depending application, meaning that it can as Since a user system, it interface interface helps or a the be a have ◆ be ◆ have a ◆ have instructions that ◆ have a layout an attractive simple user to an online forms navigational to Alexa of interact are with on four for data systems their main ◆ command-line ◆ menu-driven ◆ graphical the computer interfaces entr y, dialogue in some interfaces vehicles and talking Echo speaker unit. types of software interface: interface interface to use quick user interface (GUI) design Command-line response inter faces time are easy to consistent if there Hardware are multiple cameras that of and were a such special discussed hardware controller (Fig touchpad, joysticks interface that as device with 1.25). e and hand carries out (Fig touchscreens, sensors, keyboards are in the a user layout grips the to type in a special language. is command-line special of for new W indows, it interfaces computer is called dicult users. In W indows recent PowerShell 1.26). input chapter. An interface of the together various using makes use, especially versions earlier you screens. inter faces Hardware interfaces require understand to user with a language games been both. commands example interact interface. Software Command-line interfaces devices has should: ◆ digital system hardware combination user operating on ere interface, software the the through Amazon’s the computer graphical, such text-based, or the computer include system. e after or or transferring available (HCI). A loaded, allowing user are computer–user interface , also has known 1.9 inter faces is a buttons, form the functions. Fig 1.26 An example of a Windows PowerShell command-line inter face Menu-dr iven A menu is what you as easy an a list want of to inter faces options from which do. Application alternative to learning you can programs program use choose menus commands. Fig 1.25 Hardware inter faces include games controllers with buttons that per form various functions Menu-driven interfaces were developed to tr y to 31 1 Fundament als make can the of hardware interface control the and friend lier computer by software and easier choosing to learn. Y ou Windows commandsand A available options from a menu, using the keys on window document keyboard or a mouse. For example, depending is a set of options may appear on for you to make another choice (Fig or until you reach your nal screen message. Most the whole programs screen that holds its own computers now use or (Fig can 1.28). A be window resized, moved can or take shrunk 1.27). is (minimised). Each continues the the up screen of onyour window-based choice, another part a time you open a folder, you see its selection. contents be open you in at want copy les a new the to window. More same move from time. is from one one window is than window particularly window to one to useful another or can if to another. Fig 1.27 Menus allow you to make a series of choices from a list which produces another list until your nal selection Menu-driven visual. An interfaces example is an can also be automated verbal rather answering than service, Fig 1.28 An example of two window-based programs (word processor and where for you press another 1 on the keypad department, or 0 for for a department, 2 the spreadsheet program) that are open at the same time operator. ese Icons interfaces can be easy to follow but can become An confusing as the number of menu options increase on you need to retrace your previous icon screen click user a tiny (Fig way. For computers are now user interface (GUI) regarded use. e for as the main type beginners, and drop’ data require a and lot A GUI also of a among interface GUI to simple number cut with WIMP. Figure icons and an object that is displayed 1.29). Normally, you can use the icon on the example, by icon of the using the Microsoft mouse Excel to spreadsheet and will start the program. graphical it is presently which include can its paste take slow is easiest ease or of ‘drag to use and processing longer functions 1.29 menus on or shows the than steps an necessar y required. and Pointers example computer of a desktop. Fig 1.29 Icons allow you to easily recognise programs in a graphical user inter face (GUI) 32 in double applications. However, GUIs tasks of a comprises Windows, Icons, Menus called GUI the user of with because memor y, which time. Sometimes because of ability les of supplied installed features of inter faces program, you All picture options. some Graphical is and 1.9 Icons are designed users. Instead you have Icons are to do not folders, the of to make having is to things remember remember just for recycle easier what the programs. ere bin for computer Pop-up menus User inter faces (Fig 1.30) are activated by clicking anywhere commands, all on the document screen using the right mouse button. icons Some standard commands and options are available on are look icons (wastebasket), disk like. these menus, including the cut, copy and paste commands. for drives and printers. Pointers e most common pointing device is a mouse. As the Menus mouse An advantage of using menus in W indows or on is that, for most programs, the rst few menus in the same order. ey also carr y out the pointer example, the other matter le things, to which menu is program rst create, save and and you are enables print a menu e menus item menu (such pulls are as activated ‘F ile’) down just by using you can scroll down below through the left the pull-down menus on or pop-up ver y important part to control the of computer select text in a a GUI, as and to document spreadsheet, and to pointing include, graphics devices pens button. for create use Improving it choose or cells in a drawings and shapes. Other with tablets, joysticks touchscreen and devices. inter faces item, and companies spend a great deal of time and items. More produce tr ying to improve the interface so that the additional computer pull-down a the mouse menu various can screen. you, among eort complicated is items, to Software you the document. clicking the around using. For digital Pull-down moves same window functions, no pointer are enables always moved, a a e Mac is is easy to use. An important part of this is to menus. design so that are the they work used, and People the use screen pleasing be system the exactly menus computers design and and and the are for application same always many screen way in hours colours for hardware the visually interfaces a time same be place. visually colours to become they day. erefore, must impaired have programs each the soothing. However, some impossible audio software might see, therefore useful. Questions 1 For each is hardware a of the combination a display b pressing c shouting with 2 Explain following, inter face, of a what on code a on it or a printer a keypad command cer tain whether inter face, both: screen a indicate software to a to open device a door which responds actions. would cause a menu to confuse a user. 3 State what a WIMP b GUI. the following terms mean: Fig 1.30 A pop-up menu from Microsoft Word 33 1.10 We need human and computer life: from travelling system to Ty p e s uses produce and green pack data of systems preparing to work machines or to output, such of trac eggs. A computer in school. For accept as lights or a the network ever y example, a as system one a of cars control usually point arm four which systems computer information system is collection of data, its responsible processing into Types the overall management and this applications and are elds output earlier in knowledge this to decide appropriate based on their in input, needs. of computer systems information systems can be chosen to suit for users and tasks. ey are also classied by information, their and and discussed apply another. dierent the were now computer-related Computer A points can to transports to rst chapter. Y ou processing, storage red, amber robot e various instructions the moving from aspect maintaining input changing communication through almost meals, to s yst e m s distribution of processing speed, storage and portability. this information. Mainframe Computers manage rate and large than communication amounts manual of devices information systems, such as can at a therefore the faster ling, sorting is term CPU capacity and originally or frame’. computers supporting mailing. ‘main referred with hundreds or simultaneously. ose mainframe prevent and to are built the mainframe administrators will and mainframes full-time W hen choosing a computer information system application, you need to what hardware output ◆ what is used, such as for input, storage used, including the custom-written, general-purpose and choice and of what processing what human–computer ◆ which ◆ what 34 people is takes are specialised place required. and and direct they for are their zEnterprise between may only to system the storage such as physical are therefore banks, airlines, departments expensive to peripherals connect the access secondar y ver y users components ows government is used what work not at they do called desktop system is easy a to to use buy, and operations, maintenance single and speeds access of (Fig to nd hard-disk multiple 3 1.32) and data ts sizes sizes on are an need and computer oce of 1 main sizes TB. Most (CPUs) use is for desk. tasks increasing storage processors and personal maintain. Its primar y GHz. eir work, games and computer, a user. Memor y contain school a buy, upgrade uncommon now interface involved spare IBM of systems simply (RAM) ◆ data or for software ◆ the of large consider: It is thousands as ver y CPUs, capable devices. Users have are containing a devices software such with cabinet upgrades. Also ◆ – sta Desktop particular even large. Organisations universities Fig 1.31 Information systems are now an essential par t of oce work several remotely, and computer. Primar y extremely the Mainframes breakdowns. Data communication to are but of 8 it GB computers working oce and entertainment, Internet communication (including is email). 1.10 ey can, however, be linked in a network with more Embedded Types of computer systems system powerfulcomputers. Anembeddedsystemis computersystemthat specic functions. ese embedded called an as a part power connect the to reliability and can washing a dedicated designed systems device. ey and may or Internet. e performance be found in trac drive interface, while of may or not aim the two therefore consume be is device ver y able to little to increase the device. Embedded watches, printers, ATM and one hardware main machines large embedded others are may digital vehicles lights. Some for complete machines, banking four-wheel as of embedded processing devices is a use and installations devices simple have menu even such no user systems or touchscreens. Fig 1.32 A typical personal computer Questions 1 Mobile State the most suitable type of computer for each devices of Mobile devices (also called handheld devices) include laptops, notebooks, netbooks, tablets, smartphones, the following a used b ver y by descriptions secretaries large capacity for of computer general computers oce with systems: work several CPUs e-readers and games consoles. ey are similar to c personal computers but are smaller, lighter and consumes may batteries so that they are not restricted to ver y little processing power and contain or may not be able to connect to the being Internet. connected to electrical outlets. 35 1.11 Common Troubleshooting computer basic hardware computer problems Pr inter is pr inting receiving power but is not correctly problems 1 A number of simple problems can occur when Ensure the cartridges a computer, but a few checks can be identify the possible cause(s). ese checks whether the problem can be technical or if there may be a need to seek If the laptop need Ensure or when that the mobile power power connector device and device is on plugged plugged into suppressor, check outlet Make can as sure be the is turned is installed. is poor, the ink or toner cartridge to be replaced. printer settings for ink cartridge alignment, cable is the back connected of the into the to and that done monitor power that the turned the by a power are correctly a or Briey bypass the low, check options are the set. provided print to set quality the quality print being used from the printer. Draft, Normal Best are examples of print quality you may see an inkjet printer. or Some printers use W i-F i, so check on the display outlet. to see if the printer ’s W i-Fi is connected. surge strip is connected If no paper 1 Ensure 2 Check 3 Verify is seen when you tr y to pr int on. electrical testing or strip – is the computer electrical used quality on it outlet with is no parts of the printer are open. working. is another device that paper is correctly placed in the printer. such that the correct data cable is being used, and printer. the 4 quality orientation, margins panel 3 toner does 5 an correct print the for power to the If and Ensure it that paper of respond If or print being 2 ink assistance. Computer, 1 more further 4 not or rectied 3 immediately one can may determine contains performed 2 to printer using surge suppressors, power cable is connected to the computer and the strips printer. and extension cables in turn, which connect the 4 computer the directly computer to turns the power outlet, to verify Ensure that Several printers Tr y using another power cable that is suitable device. If needs the correct may be installed, and the power turns on, then the required printer in the Ensure (Fig 1.33). cable problems the printer driver is installed on the computer. 2 Ensure or 3 that outlet Check and that the paper. Y ou the may to be. is an not remove may see see printer could and if paper plugged is turned stuck the need error lights is printer paper printer Y ou printer the the cartridge 36 the you print replacing. Pr inter 1 the selected for window the have printer. must on. choose 5 you that to is in a the remove stuck indicate strip printer. Open the under on power on. component message may into the what that ink the holds or cartridge. monitor the toner or error Fig 1.33 Check that the correct printer has been selected dialogue 1.11 Pr intout 1 Change 2 If the is blank the ink problem assistance require toner cartridge persists, seek since an or Batter y the nature experienced For further of the technical problem technician or a of may the new Figure Monitor 1 hardware problems adapter devices, check batter y. Move while to view shows the laptop the some the is of amount arrow connected remaining phases the cursor over to charge. batter y use. problems screen Check press the the turned has mobile the icon 1.34 computer problems and in batter y power printer. Blank laptops charge Common monitor button on. If to the power ensure power light that light power. Alternatively, if if the is the – it is o, then monitor on, then monitor is the monitor light is Fig 1.34 Dierent phases of battery use blinking may be or in in a dierent power save colour, then mode. Press a the key monitor on the e keyboard 2 or Check the ensure that to an the move the monitor the monitor cable monitor outlet, power data power strip cable connections. Check or is cable surge is to ◆ connected suppressor. Check connected to the Ensure the computer electrical another need charging outlet is working by mobile adapter the device ◆ the batter y detected the or ◆ or replacing if: is or shuts o when the unplugged powers icon device o soon indicates after that use a batter y is not found. testing Tr y with may laptop power correctly. 3 batter y mouse. another cord of the same make and model. If device. the batter y charges then the power cord may need replacing. Screen 1 difcult Monitor settings colour, contrast 2 Ensure are that near to to no the read may or need to be adjusted (such as brightness). strong sources monitor – of such magnetism as speakers Questions and 1 ampliers. 3 Monitors sources should such as be fans can kept and cause vibrate. Nearby away from uorescent the power screen sources external lamps image should power to check for be appear turned 2 You Monitors facing see. e light and minutes, o. Give then one videos your possible on your phone cause for this found a replace printer Since your car tridge your printer empty still enclosed needs car tridge ink, in you its decided with the one you does not print interference. bright sources of light such lights monitor can should make be the images turned away However, the printer still on as the windows 45 powers pack aging. found. 4 watching YouTube about problem. and to been for suddenly to o have phone radios. ese to You dicult from paper. Explain why this problem may occur. to strong sources. 37 End 1 Multiple 1 Which choice of the temporarily a of chapter questions 6 questions following store exam-style enables instructions a computer and a i b ii c i d ii input c memor y d peripheral Which how of all the following other software controls computer programs c operating system only only and iii peripheral Questions 3 and Which the hardware a i only. to 5 printer uses ink that fades over time? only b ii c iii d i, only only ii and iii. software Each of the system following unit and has its screen integrated with keyboard except: devices. are based on the following a personal computer b laptop c mobile d notebook devices: computer keyboard phone keypad computer. touchpad. 9 Which of the devices contains only a block of Which of the contain a i b ii c iii i digits and following systems relies on precisely buttons positioned that marks on a form? symbols? a EPOS b MICR c OCR d OMR. only only only and ii only. 10 4 only iii and the d printers? data? 8 3 non-impact works? b iii are devices. application ii following devices a i the hardware b d of to 7 2 Which Which of the devices is not suitable for the Which of the following holds the temporar y visually operating instructions for the computer, its programs impaired? and 5 a i b ii d i is ii the Light c Sound d Touch. Questions 38 c RAM d ROM. main method to use these devices? The process of star ting a computer is k nown as: Laser b iii CPU only. 11 ii ALU b only and What a only iii i data? only c a the 6 dot and 7 are matrix based on the following printer a memor y management b software control c booting d crashing. types: 12 The MPEG le laser a graphics thermal. b music c text d video. format compresses which type of data? 1 13 Softwarethatis is madefor use inspecic organisations 18 called: Circle the most following a customised b custom-written c integrated a data access d appropriate is retrieved storage the term from devices, beginning proceed required The type of inter face that allows a user to exam-style in each of questions the of the the sequential/direct device data to will be star t read from, computeror deviceusing a in a sequence, until it reaches the data. interact b witha touchscreen An example of a direct/sequential access storage is: device a chapter specialised. and 14 of statements: When from End is a hard disk drive. graphical c b hardware c menu-driven d software. Direct/Sequential access storage devices access data immediately without having to read data from the beginning through to where the data is located. 19 Shor t answer Figure at 15 Explain the 16 Complete meaning the appropriate 1.35 illustrates an access device. Data is stored questions of the following device from term ‘IPOS sentences the by each position on the device. cycle’ . using the most list: Fig 1.35 a A __________ records voices for presentation a software. b A __________ controls c A __________ is used multimedia to type data to the right, write the letter found in each position. projectors. for b a A __________ reads information from a A c __________ i ii remote is used in ight If the simulators. the iv graphics d tablet Categorise (D) a each storage of the device or following (M) examples storage as either media: be and from the write rst the location output in (C), each the were if the data from was 1 to 8, what accessed in order: the is appropriate no order/a on the diagram is speed to response: specic order to how the data device. illustrating sequential/direct The numbered output 82567. stored The 17 accessed 6783 Circle is microphone. is arrows positions There keyboard the following i reader ii joystick vi data would control microchip iii v the position. smar t card. e If follow document. d Starting from the rst position at the left and moving access access serial/random to data the on access or data. this device would be fast/slow. A DVD/magnetic type a b c of tape is most suitable for this access. d 39 A PT E R C H 2 I N F O R M AT I O N 2.1 Data Dat a is raw, unprocessed numbers 26, 29 know what mean just in or the and 30 three about degrees events and even Information facts. For represent anything the is information numbers Celsius, the – dates number processed of of data. We represent such ◆ example, the as the – do they students daily could temperature interschool data. e not in sports three three indicate what type of clothing to wear or based how Data on many the temperature, how exam processing is papers the the average print for manipulation information. So, taking nding to close of one the of the three the each of ◆ questionnaires: ◆ products: of how warm the days to contents value term keeping all the has system. We come time. Common systems W hat information system are examples collected across examples dictionaries these been is labels origin and obtain above, gives have any manual telephone in to of in order to provide common useful is collected for the culture, leisure, work, research systems information directories. is and the customer, the is information the decision making. ere information, including, for ◆ measurement: of that data have information formal and used many of cost of of distribution and the value more valuable the information the may be organisation willing to pay can to is charge more to the Internet, two has changed. e elements been reduced cost of to for get in this distributing dramatically for may have value. An may include or online pictures and newspaper links to stor y other stories on web additional the graphs same topic. use information is collected, it is often for it. In order directly for it to to the be person who wishes useful, information to must relevant: it must be what the user needs to know, planning sources be up-to-date of ◆ accurate: ◆ timely : it must be and word of information problem-solving output, cash communication: be: life. In mouth, meetings, announcements, inter views 40 the as correct as possible example: sales, productivity informal include providers. Also, ‘free’ information receipts ◆ can displayed ever yday mainly are ingredients, quantities, quickly. rise chain and and research dosage. more it. Also, customers ◆ organisations, however, it market information. purposes and cost purchaser. e communicated Information and information the Once (output) containing and an record- information (input), processed polls been. given of opinion are, value e in keep exams to examples have trends can W ith indication and class. data numbers reports tips, research, diseases production, the cool hurricane-preparedness newspapers, media chronic classes. numbers publications: e therefore PROCESSING ◆ before opportunities complete: problem it or should must are a provided critical stage for is reached lost represent solution be a ‘whole’ picture of a 2.1 ◆ in an using appropriate an whether ◆ appropriate by printed cost-eective: more medium: than the the should be communication material value cost it of or in its ◆ medium, storage should information and ◆ device information involved delivered indexing text as a ◆ other, less information that can be commodity bought or as abstracting and reference materials such as formal, publications bulletin such boards, which as in subject- some cases may commodity replace An such information ser vices databases specialised Information systems and encyclopaedias be collection. full retrieval Dat a is an sold. For item of the more traditional journals. information example, with online Questions information you may have to pay a charge ever y time 1 that you access that Explain what is meant when data is said to be information. relevant. e major types of information for sale are: 2 Name two relevance, ◆ databases, especially banking and other that give demographic, tracking would data, determine other if it is than useful. What is the term given to an item of information and that buying that of nancial 3 information characteristics can be bought or sold? trends 41 2.2 A Va l i d a t i o n common into a problem computer with system and ver if ication manually is that it is entering ver y easy data to Sof tware ere incorrect data. Examples include users and hardware mistyping are two types of or address in a database so that letters are the wrong person. However, it is also possible for to misread a barcode and therefore not information to might previously data. Hardware may develop a fault (often that corrupts data. Examples include bad provide sectors any here. Software corrupting a intermittent) device or sent entered to error a malfunction, erasing name errors input on a hard disk, bad memor y or a power surge. theuser. e application when that data may is appear retrieved to it accept is data correctly but corrupt. Errors Transmission Errors occur in any computer information Transmission ere are several approaches to dealing with errors (so errors do few that errors that they occur (so approaches are cause, specically do not that occur) they can and be errors occur when data received is not the the problems errors system. same as that transmitted by the sender (Fig 2.1). preventing detecting when corrected). Below a considered. Fig 2.1 Illustration of transmission errors Data entr y Sometimes errors data Validation cannot be automatically scanned into Data validation the system the data for storage, so a common way is to input directly into the computer system. Data as transposition errors, would then an operator enters data using a data for keyboard errors before up digits and/or letters. For accuracy example, the may data be entr y entered as 23. Other requirements 07/01/2019 as July 1 are 2019 errors not or 7 occur clear. Do Januar y entr y errors can be either you interpret 2019? accidental or of upon errors occur unintentionally : Range or faith, but a in command is issued by most Deliberate: user data mistake, in if errors are made knows to get around entering ctitious solutions permissions check data ensures range. For to 42 method(s) is being of to use will entered. that the data example, when a month numbers include a check data into to this imposed by vigilance cross-referencing sources. of of the data entered is within of the you enter year, the a a number range of is 1 to 12. check whether age of the a data child at obeys specied preschool criteria. could be disgruntled a 4 problem the years old, but not 14 years. Reasonableness company ’s are therefore used to detect doubtful data. include operating administrator with tests example, the Data system, better reliable methods any checks the dierent deliberately, then enough checks. Examples database. Possible access or conrm good about le not is For employee unreasonable does error. probably validation be deliberate. is the are appropriate Reasonableness ◆ may check acceptable entered that processed. It data. ere what corresponding Accidental is ese certain ◆ (data it when Range data of number depend 32 checking and validation. e mixes computerised occur the when the entr y incomplete) errors, such is type other type check and supposedly is is also known check. W hen a as a character database is or alphanumeric created, each eld will 2.2 accept into a a specic eld correct will an data. W henever will example error have of database type, for not, then data the type to that alphabetic message be check will be or data it is is of entered the would check numeric. If displayed, and It it is the re-entered. and the useful to still not claim working. In been have information ‘Unemployment should has be made for this on in a Validation consistency the ‘Are benets you and verication check unemployed?’ benets if example, therefore, either or cross- claimed?’ elds, since unemployment input to this is a deliberate you you an are error attempt Table 2.1 Examples of valid and invalid data types Field Date name of bir th Percentage Type Valid data Invalid Date 19/10/1994 19/19/94, Numeric 56, A+, 99 to claim benets of consistency while still working. Other examples data Pass, or checks are: 23 125, –15 ◆ Single mothers with children can claim for mark childcare children Notice that a type check is not a ver y good are many entries you could put in type e data’ column check data length type eld characters be but are is is dened that or Table clear ly check 2.1 that to store the checks are would pass the Only usually data. Any alphanumeric if a xed these would performed is type employees are paid overtime. Check elds correspond. on check can be example, ever y be assigned check data. check of entered. It extra length only of zero. full-time Presence important maximum number the incorrect. particular ly exceed lost. L ength alphabetic in not the the that ‘ Valid is that validation ◆ check. ere allowance. Check on to department used person a each ensures on in any a the data eld in particular a is entered in record the actually database. For database department. erefore, a employee’s is that could must presence ensure that a form. Table 2.2 Examples of valid eld lengths Field name Student Maximum length ID Valid data Invalid data 6 826025 82–60–45 2 B+, A++, Format is Grade C check the correct number A or consistency more elds check check to 9 compares make sure the that contents they make of two may represents also called identies check an inconsistency errors and compares data. For discrepancies new data with example, checking corresponds to the birth. Consider the check, since age the the calculation age from employee it Employment of check four digits Status unemployed? benefits of years the example, a format number and X national ID 999-9999-X999, where represents an alphabetic veries may that example, a the data password long, therefore result in an entered for a entering is the credit three correct card or may ve error. digit check digit is an extra digit added to the end No claimed? working occupation have digits a code. It is used to detect errors arising from Yes and also to ensure that codes originally 12 produced Current format. For a transcription Number entered Form of Unemployment been record: A you has check length. For be entered date is Check Are data mostly entered the the sense. It data. is previously that following in that character. Length is veries Fail in Consistency check by a computer are re-entered into another Foreman computer correctly. It is calculated from the other 43 2 Information digits in barcode the processing number. Check digits are included delete in or numbers. it les may the computer display verication of a its summar y validity Interpretation Before they the must responses be may edited to ask of input before of ‘Are the you data data coded questionnaires and coded before sure and is [y/n]?’ ask for stored. data can the be analysed, data entr y Fig 2.2 A barcode showing a check digit process. e no doubt as person to coding what these should be responses should entered. is may have sound Ver ication simple, but Data verication as transcription medium or guarantee is errors device that the to the checking when data for is mistakes copied another. Verication entered data is from the following case (Fig 2.3). one checks correct, it consider such only do not checks Fig 2.3 Coding involves assigning a label to each question that you the data should completed some entered be aware matches source data. erefore, if the original form incorrectly, then the entered data verication that the checks despite being was may Coding pass incorrect. as 1 in a you One way to guarantee that the data entered source data entr y. Data checks some each conrm where entered a the Visual they is with correct has that many can it the also to be pairs to a the their two other data be that rst. For enter password to applications program do a As example, passwords that such decide for as label to each response, such ‘no’. Sometimes, people ‘can’t what to remember’ or do. It could will write ‘unsure’, and either be ignored, new code and value could be added to the question. (data) program entered, the of can double the same. In be of method of user is not another books are example, consider classied Reference. is a database be 11 to being information where store as the the Alternatively, the a librar y where Fiction, Non-ction could be corresponding longest database stored eld as or text length in would classication, ‘Non-ction’. classications could be coded like this: match Classication Code Fiction F Non-fiction N Reference R re-entered. is to use entered is on-screen entered, it not personnel redisplayed to is by it the not in Coding space user information required information needs to and in. For know reduces speeds coding what the the up to the amount of storage process of typing work correct properly codes the ever yone are. reliable check verication and re-entered. ver y will or instructions. For redisplayed read document. Accidental prevented is correctly. If incorrectly, it entr y is is prompted verication source of data been data that conrmation 44 data set has data information against a any method since the values screen. e entered is users compares the verication prompts. After conrm using response must 2 a checks Another the are called against require more list twice entr y application there that procedure second that produces on a applications twice. e so is is ‘yes’ and assigning matches or the for involves read it Problems the shared carefully errors asking example, if In for you tr y two among people with data organisations, information received to associated various need to use is constantly sent and departments. Traditionally, if the same le, the rst person 2.2 who it; found the le to only to the that data that L et a other locate the the data One the le 18% at adjust the W ill in when who over written which of by both are data teacher will erase the in accessing (Fig 2.4). in IT teacher Geography from to the Fig 2.4 What happens if two people want to change data at the same time? main accepted? can lead rst who appear subjects!). W hat records changes not access received second saved be manner the the the course in of les? Taitt in verication drawer may both mark received changes this saves Amerra a and the mean may data were 96%. e mark both data teacher to persons access use returned through least, it the made networks both to rst search teachers records Data-sharing accuracy way errors the that adjust 69% and to student to the time. At two the (typo when database? good that for also cabinet!) until has same wishes 81% happens a original to to person the this record wishes ling waited le, but suppose the the drawer. Computers teacher from (in person neither way. Is us le Validation to are will saves problems have the changes of saved. e the marks changes made by last, the Fig 2.5 A well-structured database will prevent simultaneous access to the rst teacher. How can this problem be avoided? same database record Good one W hen the databases user or an same avoid system attempt to is record, a this problem access made a by message data a by allowing record second may be at a person provided own only to user ’s access (Fig usernames ere time. will 2.5). sy stems that provide shared access to have secur it y users from features in place. is not author ised computer to sy stem access vie w or should to data which modify. e be provided passwords For example, access processing, for pr ivileges to a student cer tain perhaps the login depending email at the the school sof tware facilities process. on such and as limited data access. A c lerk will have access to student pre vents records, gaining and access allowed Internet must also le vel. be word Computer are they users with personnel records, Internet access, email, are of and pay roll will have programs. e network administrator the the highest le vel of access, inc luding data their records of usernames administration and and passwords secur it y and the network sof tware. Questions 1 Explain 2 Give 3 Copy the an dierence example and Field of a complete Opening b Bulk c Standard d Centre the hours orders shipping number data data-related name a between table validation hardware below by and an Acceptable to verication. error. giving 8 am data example of valid data values for each Example item: of valid data 4 pm >250 3 to 5 days 999999 where 9 represents a digit 45 2.3 Many are of Automated the output devices Other is An printed devices output is in a example copy as are that output since it must instructions the in only to is a not a Chapter hard computer monitor. is printed on dat a 1 Optical of the recognition so on. document. Figure copy and can is that the process. called paper or capture mark turnaround electricity recognition are often and used 2.6 document optical together shows used an to character in a turnaround example record of the a reading on an meter. soft- other material. forms how a reports, graphs, charts Data-capture ese that of machine-readable, meaning form is output physical to discussed human-readable, meaning output met hods to are clear enter format for be the forms designed and data dates so that their concise, leaving onto could be the no form. For specied as doubt as example, ‘dd/mm/yyyy ’ Fig 2.6 The meter reader has marked the reading as 7618 on this turnaround so that the format ‘mm/dd/yy ’ is not used in error. document e responses from the forms are called human- Another readable since data entr y personnel manually enter the responses written capture liable on the forms. is method of example to transcription and other errors data is entered into the computer. One multiple-choice school avoiding transcription errors is double (data) the data is entered twice by two the computer will only accept the dierent data are if the turnaround document a human. It but is has has then newly two purposes. ey verify that ◆ added the has update is some a back into a accuracy already used and been information added computer information. ese are printed information sheet by the on to to it it and lls in the answer boxes using a is then returned to into a special reader. by by a transfer documents of ser ve information entered already entered with additional data. Fig 2.7 Multiple- choice exam sheet 46 examinations. on the number, subject multiple-choice computer. e to: completeness in candidate machine-readable information more fed this ◆ the printed document document that computer as is identical. Turnaround used student takes the grid by making marks in the pencil or ballpoint pen. e two fed A sheets people form versions such code appropriate and is entr y, test where document method answer of turnaround when and the a data Information is of the the examination council to be 2.3 Optical character recog nition (OCR) is read the student ’s pre-printed the form, whereas optical mark is used to read the the answers information can that have be read sheet into mark is printed without any often used is marked, and need for measure by companies and record and scientists changes in such as the temperature, the speed at which the ball is travelling in sports such as cricket and baseball, the the total are automatically been a computerautomatically. e capture logging conditions added. All dat a recognition to (OMR) of information Computers from methods used Data to Automated amount of light or oxygen in a room or even the human level of noise being made by vehicular trac near a inter vention. hospital. Turnaround documents information into allow cheap, fast input of Data logg ing a computer system. Data can where printed on turnaround documents in a analysis In some to turnaround industries, turnaround replaced by small handheld mobile devices. ese display screen many local readers day visited reader meter day the are visits readings involves on the a to the be to the of the issue the to sign signature as their the data capture reading from a sensor is input at regular of the data can then environment be processed (Fig to provide 2.9). equip she the end a be the meter the of the onto with package, the captured of the example drivers deliver y proof to types the of automatically delivers is meter customers or a example, start bills. Another that database automatic being have computer. As transferred issue courier stylus device. is uploaded now computer. At ser vices devices. As uses the can computer courier recipient addresses into devices computers. At into are keyboard. For customers’ homes, he readings the companies downloaded of computers, including touchscreen and method documents documents pocket-sized handheld names main these utility with the and a barcodeformat. inter vals. is Alternatives is alsobe document digitally and deliver y. Fig 2.9 This student is checking water quality using a sensor connected to a data logger. This data can then be processed to provide analysis of chemicals Fig 2.8 Turnaround documents are being replaced by small handheld in the water computers 47 2 Information processing Temperature sensor Input Output connections connections INTERFACE Computer Light sensor Fig 2.10 Components of a data logging system A data via an logging interface logging to software measurements will record as graph a system the or a a computer (Fig and consists at of and 2.10). e required data. e sensors some sensors inter vals results can connected data will the then be no take is small special output software displayed a device to read output output often is used as ‘printed ’ on microlm) microche) an alternative to the printer. 1 rather or a sheet than roll of of lm paper. In lm State to drawback microche print the microche of (COM) microlm is and with computer that a it takes special it. which method also (computer addition condenses or of the following soft-copy output is hard- copy output: to large a human-readable b machine -readable. output being stacks of Give an example paper readable. 48 or or (computer 2 faster, this microlm Questions output e of programming. e microlm special viewer amounts table. Microlm Microlm into of a document that is machine - Fi l e File organisation records, elds and and access relates to the use of les. o r ga n i s a t i o n ◆ add: ◆ update: put that ◆ A eld contains a single data item, and many the key a record. Each eld used to eld identify has the a name and already one A record is a collection of of dierent data related types) delete: data item for and treated as A data le is a type of collection of records holding has 1 It 2 e can the information but about dierent three important to a record is from normally update value is or the used delete. It unique record, the eld. W ithout be permanent records of secondar y the or le storage Records are the temporar y. are specially device. is delete organised is called on Master in the (or located) using dierent Many businesses modify and special le a is stores and store given names in main the master master le. to identify the record is a eld in the record to that Student record. For ID is instance, in normally used as a the a key eld to identify the record you to le delete or update records. amounts identify which of is master or matching in le delete the (sorted) operation transaction or cannot master there master on the le key functions the a transaction record. If the in master le, compare record is a with match, you record. If both eld, then this correctly, but le is that if can les record either unordered, record work. access, les. ese les purpose. A kept key records les regular ly their update are master up-to-date. It information, summar y data and key data. le permanent payroll organisations large permanent the transaction or ordered the and cannot primar y update le are accessed you matching ◆ remove characteristics: methods. ◆ eld objects organisation. e a individuals. le elds or the To 3 le record matching want want A a processing. key or master of exists primar y key student same the a whose ◆ into contents elds you single the record. A (possibly record is Record ◆ new 2. 4 access elds ◆ comprise a change and two data, such data temporar y contains employee as types employee status data, which of is and data: personal job updated data, title on a regular basis, Fig 2.11 Updating a master le with a transaction le such as hours worked and taxes deducted. ere A transaction le is a temporar y le which is are three possibilities when updating a master used le: to update end le of the each updates transaction operations: master day the le or le week, for master are af ter a to time example). e le. e used certain records perform in three (at the transaction the important 1 Transaction record e record is less than the master le key. transaction Next key record transaction is record added is to the master le. read. 49 2 2 Information Transaction record e transaction record Write is equal deleted record record key to the master is, they le is is or transactions master next record master and read. greater Table some lists during for to le errors 2.3 than the on master this new master master to le. or situations which of data the or in transactions through on file encounters file, then which master you are to to in No data Ordered M Record A H Record B Record B Record G Record N Record H there is A sequential in sorted le order sequential update on searching for a Record update delete or in invalid file, and it is not does not primar y transaction reach is on les customer exist the key record. end before of the transaction you in are the in If the end file, adding file, like of from need the problems. le may to master record which more the key records are stored invoices number, and class elds. Examples for customers registers of sorted sorted on last new or you the records file to are most file, or your be add file, a for a record and you Tr ying in master another, in the records order in are add a record to a cassette tape or watching a a particular o, you must section start at or continue the from beginning and until you reach the specic one. for a record search for a particular record, all the preceding must be read. e main drawback to inserting, or amending les is that records the in entire both le serial must and be read and the records written to a new le. Since disk access is slow, computer are added to is involved. For into be time a read insertions wasted instance, if 1000-record from from the the even old if 10 le, then master transaction only a few records 1000 le are to records and le, 1010 after will the records are le arranged they nature, that exists simplest which ver y file organisation organisation. e left for ward records the its current 10 is by the have organisation sequential not find sequential access Searching be and is corrupt to already tape either then searching the in or the sequential the one one include listening you deleting master 50 you you records updating le if in the T o Serial order master then transaction master Ser ial mainly or scan file location stored used the lost other be day, found the found are in been or is les) the file master you have can useful Record where If data also for le Record movie. To the that les serial is hardware unordered order. can just record made le name. Magnetic If list. Serial are particular customers purposes. Recording le any called for memor y. A transactions restore (also invoices shopping tape, disk backup les into processing. file’ marker transaction no serial sorted Error master an ‘end of been unsorted Unordered errors not typical master record. Situation the a which record. Table 2.3 Error messages during le processing If have include updated. for Processing occur is key. more Read key Examples record Transaction No record key. master Next 3 processing type one were of le after added. at written to time insert T o to the maximise new a master new record eciency of organisation, where the the eld value of the key le. It with therefore serial are common long sequential arranged to a organisation. processing, use records takes all in order records. by 2. 4 the Summary of reading, writing and same order improves File the organisation eciency of the and access updating sor ting process. for sequential Read ◆ les access Records are To read from the beginning of the le 1 the desired item is amend If accessing a All record, access time is increased to entire records Write le are or to many be records but decreased if quire data records the record applied accessed to the end However, middle records amended the sor ting). in the e access Adding a sequential le: with a key value less than the record the new to of it the of is the le dicult is easy to (may add or are read and then written to le. to be updated is read, any changes are few 3 ◆ in read 2 the record found be ◆ a until to new it and the updated record is written to le. Finally, all the remaining records are written to the re - new delete le. le. Deleting a record Sor ting W ith ◆ Sequential les are often sor ted on the record key is make time Adding processing consuming a simpler. for large However, sor ting can serial to create les. end deletion. To delete les, you simply add the new record of the le. However, the les means major purpose is that to preser ve the record the ordering must be of inserted the correct serial records position and not at the end of be If into the it the le les. Also, you in create sequential a new algorithm All the cannot just insert all le for records inserted e les into the existing that contains the adding a record with a key value are read and then record to be inserted is Finally, the remaining le inserted – Updates a records marked in a serial le: record with a key value of the record (since the transaction is not sorted). le the record to be deleted, then write that the the new le. record written to to the be new deleted is encountered it is le. Finally, all the remaining records are written to the le. records. delete a record in a sequential le: less than the record All to the new written to the new are written to the records with a key value less than the record to be deleted are written to the new le. le. W hen the record to be deleted is encountered it is le. written to the new le. the Finally, all the remaining records are written to the are normally the done using updates are magnetic gathered tape in together Direct le, and then applied to the master again accomplished new le which contains the updated direct master le and transaction le access le, also called a random access le, access to a particular record in the le using key. is makes it much easier to nd, read, delete, records. update the organisation by a a le le allows together. Updating, therefore, is access into A transaction creating le. record mode. All Sorting the le. Updating a not W hen new batch omits you 3 new which is: written records each to not 3 records changes 2 2 le record record to be delete as 1 1 to le To e a deleted is new must way le. 4 to only of not with new Compare 3 the les, the to 2 in of record sequential is a for to the types be 1 For both to records and insert records. e le is organised like a in one-dimensional table on disk where each record is a 51 2 Information part of index the to processing table. e allow you record to nd number the acts like a table organised primar y records. key record. It Y ou can access a record directly or randomly its location using a going you input uses it to location directly an ID the mathematical record. For number, the produce on to disk a value where the points record access les also support to can the be formula Many the records to be storage direct one records in a direct access le after are access or descending order, but hard audio compact not sorted songs in are make a stored must be to disks, direct access disk, for random is possible. W ith example, you order or go hear. However, not to be can play the the where storage the location key (page is stored. require a mix of sequential records. Consider with three a le containing elds: ‘ Account ‘Balance’. Ever y time a and Number’, purchase, his or her customer credit limit and checked; this requires individual his or her record. Ever y month, a statement produced for each customer; this requires directly to the access only must the random access to records, but be organised so that you can go index track want to retrieve. is can the le organisation, as on a to is a special record at the beginning and run get to the song you want to of records with two and in the the storage indexed address le. A of the partial the highest or the lowest key in each block of records is useful when the itself is organised sequentially. Ideally, you want to have the index in main memor y. en you can tape. Y ou the tape the index quickly to obtain the storage address, for ward and you key record containing search start le the compared magnetic le. itself to sequential whole medium directly be the you index you to the value until book to an index for to a index in corresponding have to information of limit ’ and to attributes: record of an in An must as disk. e order. W ith allow index pointer the accounts sequential want the used on another. must random is stored by access ascending a processing balance e where customer found. sequential read like has applications wants allowing just table and formula ‘Credit Direct the order example, when mathematical that in (topic) number) and is ascending by value calculating in then retrieve the required record in a single disk hear. access. Summar y of direct access le organisation Searching is organisation is best the les which seldom ◆ les which require change in frequent search ◆ processes ◆ storage record enquiries and require is compared index key that with the comes index before keys the to one nd you searching for. en a linear search is performed updates there onward, until the search key is matched or updates until which key highest from single record size are ◆ a for: e ◆ for fast access to the record pointed to by the next index entr y is records reached. only of master (such as le hard records on direct access media disks) For ◆ accessing disk le records sequentially or example, suppose the items order If processed directly, they need not be processed in An in 52 a sequential indexed le le. Y ou can is used think to of le speed it as a are in a supermarket where are (Fig stored on 2.12). Y ou the wish shelves to nd in alphabetical forks. Instead of order. walking Index you directly. up and listing (index) which aisle down of what each is in aisle, you each look up aisle. is at tells the you organisation up the key search one-column table to stop listing to walk looking (Fig down once 2.13). you to nd have the found forks. Y ou forks on know the 2. 4 In spite by this respect of the kind to a double of le access search, the sequential le (index decrease is in + data) access needed time with Summar y sequential and access access le signicant. Instead have Highest index organisation organisation ◆ Index of File 12 Apples 13 Bananas 15 Cherries an from ◆ of entr y the L eave having for lowest spaces in an index each or block highest each entr y of for each records record, starting record. block to allow for easy key insertions. 1 15 2 18 3 24 4 30 Table a 19 Cups 21 Forks 23 Plates 2.4 variety summarises of le methods of access to a record for structures. Table 2.4 Searching for a record can be achieved through various le organisations File structure Structure Access method Fig 2.12 Index sequential le access name details Serial file Unordered Sequential access Sequential access access records Sequential file Ordered records Par tially Ordered Sequential indexed file records followed first by record sequential desired in the index, access group, access to to then find the record Fully indexed Unordered Sequential file records followed data to direct access by to direct the index, access to the file Direct access Unordered A calculation provides the address file or (location) of a record, followed by ordered Fig 2.13 Supermarket aisle signs are similar to index sequential searches records direct access to the record Questions 1 2 Write Why the are connection master and between a transaction eld, les record needed and in businesses? 3 What is the normally le. most 4 State a special identies name a given record? to the eld the following of le organisation for each of the descriptions: records in that type arranged which they one were after in the order added b records stored in sor ted c records stored in random d records stored with denote another, order order director y-type listings to location. 53 2.5 e a Information processing machine An or example when the of data into processor of this water is information acts an processing on the electric temperature occurs input kettle reaches it when receives. which boiling senses point for goods exchange and of ser vices, communication, and information with other people the around the world. and Table 2.5 Advantages and disadvantages of information switches o. A car production line can sense when processing a car body is in a certain position and then act to Advantages weld together the relevant parts of a car. ◆ processing is only valuable if the information can Tasks can and and retrieved cannot Setting be up Before changed an processing setting quickly,accurately and be completed It ◆ eciently and because information processed accidentally. ◆ information data at can be and amazing high initial equipment training. More ◆ money speeds. needed Computer storage devices specialised can store enormous operate amounts of data and information up an information processing to may be employ staff and to design the should consider the following computerisation really solve questions: the processing system, a Automation can system. be introduced. That W ill a in system ◆ ◆ need investment information for future use. business may be faster stored Disadvantages Information is, Some ◆ tasks lost jobs as a may result be of particular can be completed with computerisation, which problem? little ◆ Is ◆ How it cost-eective in the long term? ◆ ◆ Is ◆ Can large high is the amount processing speed of data really to be hand led? present sta manage the Data W ill the changes caused by more and analyse and morale ◆ How ◆ W hat can of the computerisation be quickly. of jobs be hand led information done to help sta adapt sectors of popular shared Face -to-face ◆ of with other between by phone or information through can be can use such on as the bills be done for can be research where to aairs nd almost a and all increasingly paid either people and ◆ maintain ◆ monitor processing patient in health records in patients’ vital care may hospitals signs ◆ perform computer-assisted ◆ research and ◆ operate use which education assignments and ◆ reports fact, anyone wealth news, stock banking in becoming electronically. In Internet current can also Internet. Other classes materials, online 54 is where submitted the may be reduced. be and used to: clinics in hospital, and at home processing online interaction staff information processing home be care Information business. It at must retrained. to processing Information or of properly? computerisation? Examples members. staff morale sta ? loss be staff trained the lower Health can lower Some ◆ computers. the may system? can ◆ can information trends important? inter vention. Management new ◆ the human of information prices, educational investments, shopping implanted allow surgical require great heart enable train to live instruments precision, for tests conditions such as pacemakers longer during example operations laser eye that surger y surger y ‘telemedicine’ through conferencing ◆ medical medical devices patients control and ◆ diagnose computers with capabilities surgeons before they perform surger y. video 2.5 Information processing Banking Computers are used to keep transactions. Customer ever y time a payment accounts or point (EF TPOS) sale shop. e to the then to made that of of card sale is is is useful inserted (POS) directly the all bank to be made updated whether EF T (electronic funds transfer) bank point of need transaction cheque, card of track from shop. e for into customers a reader terminal. e the customer’s procedure is as by at in the a attached payment bank is account follows: Fig 2.14 Using a bank card in a reader attached to a point of sale terminal 1 e cost of up, usually all of on a the items to be computerised purchased cash is added register. Payroll 2 e customer presents his or her debit or credit Input: to the shop example card is may details, such 3 e card swiped card is inserted through number a and so the chip magnetic expir y can strip date to be read e card reader a to input number, payment company bank’s 5 e that computer customer 6 e the bank’s account 7 If the has sold using types a enter key computer details card a the and is in an valid goods modem four-digit to identity looks up accounts and the are and in of employees’ his or her on sent to telephone the the the line. are be input used to keypad and process. has and or paid by and the number OCR P rocessing: rates if the hour, then timesheets would validate the number of hours of hours overtime, possibly using techniques. Using spreadsheet or a software more application complex computer then needs earned each employee, any such database. then rates, bonus the customer’s customer account salaries, pay of personal continue as employees by as tax, national amount earned by to accounting calculate the as a software gross bonuses, any insurance, etc. and each such the amount deductions hence the net employee. enough Output: money database computer. amount identication number (PIN) presses a the OMR the from or worked 4 come assistant. payment e computer would need to print pay-slips. is Use an impact printer if the pay-slip is required in approved. duplicate 8 e money is transferred electronically from printer customer’s bank account to the company ’s for the employee’s signature, or a non-impact the other wise. Update the employee database using bank a database integrated with the accounting software. account. O utput Sometimes the automatically read magnetic strip can the enter magnetic has card the strip card been reader number cannot from damaged, then number using a the the small details clearing card. If sales the assistant bank of ser vice accounts summar y payments to pay using to money a banker’s directly electronic automated into employees’ commerce. Print reports. keypad. Librar y Payroll A payroll system print to out W hile system uses calculate pay-slips accounting an the and purposes. information wages record of each the processing employee, information for travelling regular activity adjusting for the online their digital access to for a librar y many to borrow students, libraries collections, ser vices world. Most for their books sta and university and may have be a been environments libraries students via provide an 55 2 Information processing e-information databases for for article and allows users e-journals, e-books, and online, digital search portal. is or and e-librar y. In request then a travel some collect it if articles version it is online a the televisions, video search in cases, users paper-based to to can of built-in also ◆ the button. In All available. After search logging in to the online librar y, the entering for an article information or the in an online database title e (tables) magazines key such of a as a journal a subject, the or entered e-librar y what engine a management to do. is can system control engine fast. Remote-control locks respond which the from ow going document content software oers formatted libraries also indicate if a to or name or a it Kindle features provide book links copy is a the book able your for a signal the key to operate the locks on the doors. of Buildings with air conditioning have sensors which an the temperature and humidity inside the system the heating or air conditioning on needed. uses search. is options available to to for download it as special online visually impaired images. Some other when turn have browser, with the o and books, device. Some page to the dierent be in would librar y. e show may read deliver hard the about conduct may you audio to in to article. databases details example, if reading, then PDF online journals texts. For e-reader is and e the librar y ’s containing terms Output: online have by or P rocessing: view have the buildings the systems stops detect les audio user ◆ author the and and from can to recorders systems. cars engine room, remote-control example too Input: the fuel sitting control modern tells of Librar y the e-libraries or online and may available. Fig 2.15 Control systems are around us all the time In Control Y ou are surrounded probably do not by know computer it. Here control are some systems ◆ in lights vehicle the not are triggered interacting road would outputs. In the examples trac! program sensor detects that know (Fig be with 2.15). A ver y by useful movement the trac or sensor light safe if it sensors or from embedded control did not system digital sensor would environment the system to the To do which oncoming this, there is vehicles has constantly to be looking and the sensors output the and device making (the trac kitchen, microwave tumble a have digital example, the embedded approaching vehic le needs only a vehicle is there or not. So an at decisions lights) dr yers all have the to make them do their job at should how able or hot to tell cold. It or how digital the would cold it temperature system not be that able the to tell is. of information is usually integrated into a control system a processing which has sensors to input information, to unit the (computer) inputs, and which output decides devices how which to do what what required. A control system also needs an interface unit do. the computer and the input sensors and the machines systems the be hot adequate. A data about ovens, washing control only is is computer devices. is unit turns the signals from the sensors inside into them press something that the computer can understand, and of the 56 lights an sensor processing output and sensors stop between In the respond is ◆ trac whether on/o respond the of of e adequately the many systems. Trac the examples but to control these systems signals from the computer into something that will 2.5 work the make all output parts devices. e of the system purpose work of with the interface each is to e has other. number changed workers e processing unit in a control system may be which has a program built into it. It you not change be like the the computers program by that loading a you need disk. e processing in electronic unit has a circuits. Such a new is program in their electronics called controllers to do the to a designed make because keyboard, a been to tested do. is they mouse to make do or a sure makes not them need have job much disk screen. Once that it elements are not needed. e that are being the a the Micro and as take monitor readings readings now doing keep the activities. to at the regular time inter vals computer. Sensors temperature, pressure, liquid may be ow rate and on. devices, it has P rocessing: decides e computer whether action analyses needs to the be readings and taken. should, will be e computer sends output signals to devices the manage the process to increase pressure or screen. temperature, for Status themselves, they cheaper system outputs controlled, not than the only which things changed. Rather skills example Sensors send Output: these reduced. e work they storage behaves of an so were tasks running measuring one also areas program and embedded controller . Embedded have been such program resident system usually in use, where Input: its needed will Industr y from and repetitive machiner y usually people processing a the computer of Information display actuator, which example. Some is a device that systems reacts to use a an computer processor signal board and operates a simple device such as a tap, motor O I U or switch to regulate liquid ow. N T P CPU P RAM U Most ON of these systems use feedback, where the output U T OFF T aects S the input. S PAUSE ROM Automatic door Weather Program Sensors to detect people (inside Sensor to between Some of the control world’s most powerful computers are used outside) to forecast the weather, which of forecasts. People improves the accuracy people who rely on these forecasts include doors television Door forecasting here approaching and detect stored companies, shipping companies, farmers, the motor militar y and outdoor sports organisations. Computer Fig 2.16 A typical control system looks like this. Note that it does not have a systems are also used to track hurricanes and tornados, screen, disk or keyboard. The program is stored in ROM monitor Industr y systems Sometimes, in is controlled Computer repetitive industr y, a whole automatically manufacturing tasks. In by a manufacturing computer systems electronic do circuit process global of recording currents for are automatically put tedious circuit boards and then ◆ It speed and in the right automatically accuracy at ◆ Computer is more are greater than those of which skilled place the workers from the heat soldered by having these advantages: than manual data collection. data can be collected continuously humans in by soldering may situations get tired, and not safe for it can also be humans. It is extremely fast. Computers can easily take machines workers. e generated automatic several data into of measurements in a second. is means danger soldering events which could not be measured by a is person removed has for on that to Niño. Automatic forecasting accurate thousands work El ocean production, the ◆ position. e weather as the and collected the such monitor system. many whereas components warming, and can now be recorded for analysis later. systems. 57 2 Information processing Table 2.6 Sensors and their applications Sensor Quantity Temperature Light pH sensor sensor sensor Proximity How hot/cold How light/dark The sensor acidity Detects If the Light Detects an Detects when infrared Weather Input: (PIR) forecasting Millions of is it Monitoring is Turning liquid close Button Passive Application is an object collected from to Detecting button is pressed being object a pressed passing warm object the moves gate into an example pieces of a Activating a (obser vations satellites, weather such weather radiation) buoys. All respective an it is oven dark a vehicle ticket to a speed burglar these at traffic paid or when its driver is car lights park acceleration alarm if oce’s of someone ships readings meteorological is wall balloons, aircraft, radar, weather data in when pollution arriving the a on close to cars Measuring area water how Obtaining through temperature lights near Detecting temperature, pressure, humidity, infrared are is reversing being the street Monitoring object a gate pad it a If as pad of how another Pressure measured are and sent objects enters a room automatic to computer the systems. stations, weather Two-way Hubble Space communications Tracking and data Telescope relay satellite Two-way communications TDRS to space ground link Two-way communications White Sands complex in New Mexico International Space Station Fig 2.17 Data is collected from satellites orbiting the ear th P rocessing: rst data task e is to data is stored perform (validation) and a to in a quality reject large database. e control all check invalid on the Output: and e local forecasts charts of data is formatted to t in with a numerical readings. From this computer model, forecasts made. e bulk of processing is businesses 58 solving thousands of global information. stock control need to hold stocks of goods. need to hold stocks of goods they sell, and ‘number-crunching ’ manufacturers and as can Shops be weather produced model Most of normally readings. Supermarket e are inter-related equations. need to hold stocks of raw materials and 2.5 nished goods maintaining they stock make. e levels is task called of recording stock and ◆ Goods control. to a must not be minimum, a money invested in stock deteriorating stock levels also overstocked. By business stock Information can and before reduce it limit also can storage warehousing, heating, lighting A real-time Input: to e pass e barcode on scanner and computer the reads the sends checks product ’s disk. e control at the barcode up stock operator name it a each code code name and the of risk of sold. Minimum costs such as security. terminal item past number to a price are only a needs laser stored scanner. in the computer. e and, if and price amount reduce and stocks system POS directly the keeping the be processing it in sent is valid, looks data back les to held the on POS terminal. In this way itemised prices used are usually a P rocessing: As so reducing can needed that a that be can item be is customer can provided for be on or an systems, shelves and customer keyboard sold, the ser vice the out not on confusion. that can be read. stock can can changed stock print POS cause mistakes for counting with keypad queues. Few can marked cannot each customers. Prices bill only has barcode updated terminal items, which terminal if POS receipt. Note individual Each the be be are much made easily. A customer. No on les in quicker, charging fully sta itemised are shelves. Fig 2.18 A point of sale terminal Output: A stock control system must keep an re-order record of all the stock held and place orders for and if stock factories use runs low. Large computerised are printed when stock levels reach a point. Customer receipts are printed using fresh thermal deliveries Orders up-to-date printers. shops, supermarkets stock control systems. Questions Stock control is important as: 1 ◆ Adequate stocks must be maintained to Give an example determine a customer with goods with minimum will go nd goods are regular ly out the processing required to if a customer ’s bill is overdue. delay. If 2 customers of supply of stock they Give used three to examples of data that sensors can be measure. elsewhere. 59 2 End Multiple of choice chapter exam-style questions 7 questions A __________ le __________data 1 The manipulation of data to obtain information is in a temporar y the main le which is used to le. is i transaction, delete ii transaction, update called: a input b output c processing d storage. 8 iii master, delete iv master, update. To nd a record repeatedly 2 Information that represents a ‘whole’ picture of or solution a accurate b complete c is a sequential record until the search, required read b save c write d update. timely. __________ or more a check compares the contents of A fully indexed elds to make sure that they make address range c data d format. errors following, except: the record key and the sense. a average b exact c highest d lowest key key can be caused by any of value The of a bad b corrupt sectors power key value of doubtful on a hard key access value. method that calculates the exact address le of a record is most suitable for which type structure? disk a serial b sequential c fully d direct RAM surge program Which value the (location) indexed malfunction. the following checks is used to detect Shor t access. answer questions data? 11 a contains the: type Hardware d of consistency b c le two 10 5 a found. a storage 4 using is: 9 A le relevant d 3 a a record problem in __________ A data logging system is used to record, at specic length inter vals, b range c data d reasonableness. the temperature of the water in an aquarium. type a State one capture b 6 An area code must contain three digits Explain checks are data b format c length d range. what the temperature that can be used to readings. logging of the system water is Describe one advantage of could too output if high. monitoring type using 60 hardware suitable, except: c a of temperature only. The the following item the this data logging system. the water 2 12 Aaron uses a login screen as shown below : d The four completing during the descriptions list of statements descriptions the End chapter below the sheet. with the exam-style show the experiment Match most each dierent when of suitable questions the term from below : Terms: source document/turnaround machine -readable document/soft document/ copy/hard copy Statements: i The blank results ii a Give a b two user to types log Describe screen two d Explain whether f example Explain After password, A student measures iii require has re -entering used needs to the screen using? on the the entered password the system by username press e twice. twice one of A The could the is show ii user. on a data from No that contains the type 14 of Consider for instructions Results on what to number temperature temperature dierence 1 40 50 the a sheet which are PDF are le. used viewed to on a and 70 char ts copies are of printed. the sheet for the items are two being the printer printed, print possible following are of would be task. causes illustration placed in even icon if the repeatedly. of of this a problem. supermarket, aisles: Locator Item # 35 25 – Carrots 27 – Cucumber 29 – Lettuce 32 – Sweet b 50 65 15 52 68 Yes errors were made in the results Explain these each a State results the b Suppose path type range 43 – Scrub 47 – Sponges taken to locate ii of the following checks as it sheet you soap buds the: were sponges. look ing for item #30 (ginger). relates State the aisle and locator that you would above: and the item # that would indicate check whether it is there or not. check. ii Describe Disinfectant Liquid lettuce choose data – – errors. i the 38 40 sheet. i Explain 50 pepper 110 3 Three ii print type selects 2 c on as sheet Temperature i data char ts saved enter: End to in an Star t b writes headings Experiment a and sheet to this 1 and of which pages Explain where following sheet student class. Explain teacher two continue. What next suitable and the the set needs Aisle experiment from the experiment. scanned completed teacher i the is a before the monitor. validation. entered his to be the or that entered Aaron enters must verication information he on is Results iv password messages the Aaron buttons the of two on screen would sheet produce security why based that displayed. Explain e applications on. c an 13 of The sheet from how the student could conrm that What does the number of the locator the represent? data from the table is equivalent to the data on c the Explain whether this is an example of direct, sheet. sequential or index-sequential le organisation. 61 A PT E C H 3 COMPUTER 3.1 Computer Previous single will chapters computer look at have linking communication and its computers among the fundamentals peripherals. Now together users, whether to in of a or across the can Many computer computer to is the between users other or may at at a remote want their transmission two need or to more be able of ◆ data computers. to computers, whether to site. For connect located in example, oce communicate workplaces working want to the access from with data wherever world, and the essential for home on they electronic systems a their or mail interchange (GPS), online a data. Two congurations direct link between two network using information to computers one ser ve computer the connected needs to it to of in transmit several a data and terminals network. close popular way of transmitting data is through microwaves, which are high-frequency that the radio signals computers may travel through atmosphere. ey are used for be users high-volume, long-distance communication. Microwave signals, however, only in may o satellites travel to cover straight longer lines. ey can be distances. Low- (email), voicemail, satellites travel closer to earth, so weaker signals conferencing, can data ways, or communication (fax), telecommuting, video electronic dierent workers computer Internet. Data in broadcast: orbit facsimile in transmit point-to-point: bounced is linked same A by T E C H N O LO G I E S wor ld. Data communication information WEB are: computers and be congurations, to we enhance the Computers ◆ oce AND n e t wo r k s covered system NET WORK S (EDI), global ser vices, social be processed while consuming less power. An positioning media and example of a system network that that uses microwaves is a cellular the supports two-way communication. ese Internet. networks Many schools, businesses computers transmit such as together data disk and to and form a other organisations network information to drives, CD-ROM so share that link they and programs such as word Network and databases. ere cellular) can be transmitted between computer network are two ways to upload computer the ◆ to to another download the means to send this computer on data the from one your network from Internet. site – such means another to receive computer data on to the or your network can be (LAN). Many or dierent data communicate connects computers so that as printers can be shared among come in dierent sizes. A few computers: Internet computer 62 data that that computers, printers ◆ sites congurations computers. Networks data cell phones. processors, peripherals spreadsheets interconnected (or or A printers use mobile can les, resources drives, modems with or in sites and linked small a (W AN). A network is good Internet. hard small large over a disks local – usually area be geographical linked example of a in a on area wide wide on network computers, located large countries, can network the in and spread dierent large area area 3.1 A a Metropolitan W AN area be and like a owned Area LAN. It city and or Network is large campus. A operated by (MAN) enough MAN a single falls to between extend might to an the network. e resources and computer programs is with now Computer ready other to network s share les, computers/users. therefore To organisation connect computers to a LAN using cables, you need: (forinstance, a and other useful in university) associated connecting and accessed by students organisations. MANs LANs to W ANs like ◆ network ◆ a network ◆ a hub ◆ a le ◆ system the Internet. Computers that stand-alone system device has if it not networked computers. Data to is are be to transferred be used on that are is using a another known on a all networks are connected are wireless networks. A ( WLAN) is a LAN that cabling; W ireless great or remote computers to connect to you Local have networks are also benecial in for network are a hub it may be dicult or impossible to provide poor security and a large interference from light and electronic also slower than LANs even when that the cable to a central device or more hubs (if there of computers on the network) are to a le computer ser ver. A le ser ver containing large is a high- capacity hard cables. drives that are available to all network users. It is susceptible application programs and data can be shared to devices. ey all are by 3.1). One number connected where to likely buildings install are is LAN. disk However, they school, it connected (Fig performance where in allowing the older a Area then W ireless software. some are laptops hubs) Hubs computer. is computer storage called Network each ser ver computers networks in stand-alone secondar y with (or card as If Not cabling are connected users on the network. A le ser ver is not used as a using normal computer terminal, as its job is dedicated only cabling. to To connect plug the the a computer network cable computer. Y ou software which then enables to a into LAN the have the to using cables, you network set up computer adapter the to on system operate on the also all task use a printers computer of managing printer on a ser ver is les. Some dedicated network. W here controls hierarchical shared that others, the one networks to managing powerful network is called a network. Fig 3.1 Layout of a typical computer network 63 3 Computer networks Peer-to-peer and web technologies unconnected network parts. Bus networks, with W hen a network does not have a le ser ver, it a peer-to-peer network . In network, each computers peer – network hard disks computer its also and Network peers – acts on allows as the users a a of network slower trac than star limited to Mb per second. peer-to-peer ser ver to network. A to speed are is 10 called the networks access the other peer-to- each other’s peripherals. layout Fig 3.3 A bus network Careful ere planning are computer three of a main networks: computer types of star, bus network layout and is essential. (topolog y) Unlike of end ring. to In a star network (Fig 3.2) all the nodes are the a central hub. is means that each a bus the rst computer has connection to the network and that a will not aect the working of other break in will hub not breaks down, then all work. However, star expensive to install than the computers types, are ring or 3.4) is loop. As has no connected with a the cable breaks it will aect all the on the network. Ring networks are also than star networks, with the speed of network computers. If on networks, although other a (Fig (computer) a trac the ring network node node, forming network, if slower cable last its computers own network, a line. e connected bus to to the limited to 10 Mb per second. hub more thequickest. Fig 3.4 A ring network e Internet spread is a vast throughout collection the of computer world, which involves networks all these Fig 3.2 A star network dierent A bus network the in but 64 network Figure if the is the nodes 3.3. Bus cable simplest type (computers) networks breaks the are are of in a cheap network is topolog y, where line, as and split shown reliable, into two way as to bre ways link linkingcomputers. e computers optics however, are radio of waves. or on a telephone linked by network is most by cables lines. W ireless infrared common such networks waves, microwaves or 3.1 WLANs light the use high beams, or lasers workstations workstation some sort and of frequency and le to the le or ser ver on a the signals, infrared communicate ser ver transceiver radio or antenna to they between network send and were wireless hubs. Each wireless data. Data has receive mobile or by is relayed physically transceivers connected. For communication telephone between can also Computer longer take as if distances, place technolog y, microwave network s through transmission satellite. LAN HUB Transceiver Remote computer Transceiver Fig 3.5 Remote computers can connect to the LAN through the transceivers as if they were physically connected. Transceivers are often built into hubs, laptops and por table devices Bluetooth both e and provide main W i-F i wireless purpose of (short for wireless connectivity Bluetooth is using to delity) radio replace connect waves. certain W i-Fi provides high-speed wireless access network or the Internet. Bluetooth allows of data over short distances for wireless devices. WLANs among provides easy between wireless devices from as a with W i-Fi, such access phones, games consoles or MP3 network is with a a public area as small as a room or as many square miles that oers hotspots can Internet be in access cafés, and hotels. W i-Fi connections can be made up to about 300 feet away from a hotspot, to keep users dierent as wirelessly while commuting. Customers computers, may mobile is WLAN. W i-F i connected manufacturers. Devices wireless wired to information a the airports and if range. hotspot over exchange Internet to large a the cables, A while to have to pay for this ser vice . players, can 65 3 Computer networks and web technologies Table 3.1 Advantages and disadvantages of networked systems compared with stand- alone systems Type of Advantages Disadvantages system Stand-alone ◆ Ideal computers ◆ No ◆ Can ◆ No for most network be home card dedicated need licence for Security ◆ Access computers ◆ Share files ◆ Share resources from to modems users with, specific software or task, e.g. licences composing – only music ◆ single -user user than Activities of network as to any sites be messages drives, to, ◆ other CD-ROM word-processing, which own on are the stored same file. These software network computers be drives, users available for centrally. file rather programs stand-alone and to spreadsheet such users be than are If ◆ for each cheaper as risk by ◆ Direction the method of used for transmitting communications channels disk or which can be by hard time hubs and data to ser vers a can network transfer rates and connectivity can a stops stop computer (hackers) for more viruses gaining network data working ever ybody (known on the as a network computer Need lines by external connection reduced users of an unreliable security. With of large can users and access manager be there of to is a greater unauthorised to network manage data the costly ow and media can also be classied or according medium it only use cabling, ser ver system. This channels is file to par ticularly others storage, and in using Poor ◆ amount controlled the from per need cards, result data, with transferred online ‘crash’), computers things can Possible or share data, costly. Wireless may manager communication channel or Network Transmission e can consuming workstation disk as work their space Communication Data unreliable (such one -off storage of modem. Will printers users having other send such software) user on from and programs network of a easily amounts drive network database ◆ Cannot ◆ required ◆ Share to network Networked ◆ users needed to the direction in which data can ow. data. Characteristics include transmission Simplex mode, direction of data ow, transmission medium and Data transmission in a simplex just like trac receive-only Transmission modes or rates determine the number that in a one-way line. Examples printers, public can be transmitted in one in only one direction, street. It are is a send-only or radio, TV, computer address systems or any other one- transmission. second. Two Half duplex are: Data ◆ ow of directional modes can modes to Transmission characters line speed. asynchronous: data is transmitted at but inter vals, and at a low speed of one in a half-duplex line can ow in both directions, irregular character at only one way at a time. In other words, data can either sent or received at any given time. CB radio and time walkie-talkies ◆ synchronous: data is transmitted at high-speed of large duplex blocks of in a full-duplex line can be both sent and data. received at the same time, like street. Most modem duplex. is increases same 66 half-duplex. simultaneous Data transmission are regular Full inter vals, with be a pair of wires in trac connections today eciency, as both in data directions a two-way transmit ows on full the simultaneously. 3.1 To choose decide any how given slow which channel much use, you information time, how transmission you important rate, as full-duplex, half-duplex Transmission to well or it want is as should to to simplex a fast you at or want a channel. Fig 3.6 Twisted pair cable is used Fig 3.7 Ethernet cables are used as with telephones network cables media Coaxial Data can be transmitted through various types (wired) or wireless media. Cabled media broadband to transmit data. W ireless media transmits the air. Cabled media include twisted can transmit data at a rate thousands of characters per second. Examples of data broadband through channel uses of wires cable of A cabled network s rst transfer have whether Computer channels are coaxial cables and bre optic pair, cables. coaxial and bre optic satellite, microwave cables; and wireless infrared media include methods. Coaxial cables videos Cabled and optic media A per form easy a pair or of to handle ethernet channel second (bps) transmitting handle modem to and do analogue pair, coaxial and bre can to transmit 9600 data is and pair data bps. e via cheap, but data at rate most telephone relatively telephone a of insulated copper lines. is slow. Y ou lines not the digital wires are used pair (U TP) (Fig is 3.6). ese wires twisted interference are data for to which are network (Fig found this common cables round from dierentiate has weaker grey in various the 3.7) cable.It larger. ese usually cable insulated dicult high-speed to install since the cable rigid. Fig 3.9 Fibre optic cable is used by televisions, video and cable T V large telecommunication companies in form of Fibre optic cable large telephone each and 3.9) are similar to those telecommunications used companies. in have adjacent (Fig pairs cables other pairs consist of clear glass bres and data is of through them as pulses of light rather to electronic signals. is eliminates the problem of and interference. It is the standard for connecting devices. ethernet cable slightly are of Fig 3.8 Coaxial cable is used for networks is but capable need built electrical electrical of thickly televisions, is than eliminate forms use on popular transmitted An found 300 ese other TV. ey are F ibre optic cables twisted cables and somewhat by telephone wire transmission transmission. Unshielded help are cable this, since computers. Twisted data twisted is voiceband bits include cables. Twisted cable 3.8) media copper Cabled (Fig is have from colour. Like lengths, but strength of the of resembles cables them one a the most phone dierent phone any the cables cable, an longer the popular cable but colours moisture signals twisted between and over pair which at vastly ethernet broadband cable, the interactive buildings, as lightning. Fibre much longer cables. ey greater for is optic distances can speeds. is ser vices it such also not cables than it video aected can by transmit coaxial transfer makes as also and information possible to use conferencing and ser vices. signal. 67 3 Computer networks and web technologies Wireless transmission Remember that satellite a ver y ese and short any infrared two media over signals a direct points, such include methods. A wavelength, hence powerful distances wireless Intranets can be microwave the word projected line-of-sight as microwave, signal e has ‘micro’-wave. over path now similar have their between antennae close microwave are intranet using two to each is microwave is located in other, it uses a but set up used to types of used in schools are line-of-sight broadcast. Line-of-sight there infrared that hits 68 to within be the an of and the direct a outside the would can communication walls sent and out use saved as training. An business the or business intranet. A its a browser web or company looks to to is not can also directly intranets gateway and send access pages. It some so-called intranet, it workers intranet Internet, but Internet, via an allow and may, depending local on an a area on other how networks (W ANs). A do allow computers. functions rewall as is are and used networks, including ser ver acts they (LANs) intranet. Instead, all proxy ser ver deciding go out while need what from, a slow a be down are a that just is set like up, wide to the stop Internet, communication outside the gatekeeper, ltering les or messages computer used organisations there to Intranets line transceiver. If line-of-sight obstruction transmissions receiver. Internet is network. e Internet in should come network. communication unblocked information infrared o within access and is by many to: a ◆ distribute ◆ share ◆ distribute ◆ access ◆ help ◆ facilitate ◆ enable documents sent information the software network. bounces the must workstation transmission, the Scattered on and or wireless based sites infrared and communications kind one other the networks proxy common sta of of through Fig 3.10 Dish antennae point to satellites located in space each the accessing again. is able intranet to computers walks and schools website. area person is an for users consist the network available information Intranets between only company a that private to For means a messages access scattered businesses intranet. organisation. No connected most led intranets. Many space. be two has up satellite can e own set dish organisation that to transmission. other that Internet Intranet standards of the organisations antennae. Satellite to However, instead of extranets long An transmissionis success other and is a broadcast multiple ceilings until it of directions eventually databases with sta training group work teleconferencing. businesses and other in to, 3.1 Intranets build are and manage Also, users them popular of as than they are other intranets because they are look less types of familiar and expensive private with behave how like data to network. a to orders use special the Internet. is saves time and way and to (EDI). Electronic transfer business invoices, between data network s interchange documents, such is as computers. websites e on interchange Computer money on aim of EDI is to speed up communication sta between businesses and other organisations, and training. eventually More and more schools intranets. Internal examination are school setting up their information, such timetables, room own often as code changes, sports to do involves to stop away with putting other the people paper data transactions. EDI into looking special at the computer data. teams Questions and results, can students. Each be readily shared department in with the sta school and can have its 1 State own intranet page(s) along with relevant the data a term that students, such as revision guides and also have the with from computer opportunity to share a each user ’s of the following: computer in the to network data that is received to a user ’s computer from their another work describes homework b tasks. Students sent information another for that is computer in the network. others. 2 Give two 3 Name examples two of peripheral using microwave devices that are signals. usually Extranets connected Once that intr anets businesses wanted to and al low customers, is were to would othe r othe r s , have lead d e velope d, to bec ame org anis ations such l im ite d a it as c l os e r to a nd their relations hip 4 some t imes sup pl ie rs access c lear a better e xc han ge of WAN b LAN c WLAN d MAN. ecienc y. e re f ore, de veloped. limited Extr ane ts access to an al l ow inf or ma t ion e xt r anets author is ed in tr an et. Not access to an e x tr anet. al lowed. e y mus t h ave valid What par t of and the an id e n tit y extr anet th e y that c an is the name 6 Name 7 What three enable businesses to aut h or i sed an car manufacturer, for extranet to allow all of its es tablishe s closely various tyres, lights, windscreens, seats showrooms to keep in ver y and close and deliveries. An develop on) contact extranet State is the term could as to information exchange not data programmes. Data available and can to be to the develop and 9 (of over exchanged have a of a network. to an area that oers Internet a WLAN? the type of transmission for each of the descriptions: data can ow b data can ow data State each car at a in only one in both direction directions, but only one time can the of be type the sent of and received transmission at the media same that time. describes following: a uses wires b transmits to transmit data data through the given a air. regarding be used public, as joint given a What is the name to network that is private to to share not together. 10 orders does whi c h suppliers so that an d acces s . example, might network users c A a is use r nam e s work of arrangements direction Extranets represent: ser ver? following passwords terms outsid ers 8 are following were e ver yone Onl y the a nd access al lowed network. wit h le impro ved what a a i ntr ane t . 5 customers, Explain to a business? well training using electronic 69 3.2 e We b Internet has technologies been networks’, connecting described billions as of ‘a network mobile a of set standard computer devices, laptops, microcomputers, minicomputers, mainframes coming and supercomputers in and educational T oday they ◆ people ◆ they can set up advertise can can in commercial, government email reach websites what they on do the and enquiries, orders an international Internet what and so they main ser vices provided by of a le of the computer the is Electronic mail (email): is communication Email using means special anywhere between messages software in the a method computers that from world, via can one be on sell to Internet ’s WLANs. e mail is then a download to to as another dierent of email software O utlook and an Data exchange: or transfer Internet available on C of equivalent thousands for downloading to and of popular users les to onto F TP software, such Excel, although (send) use it can as also be websites. to the Internet can be connected access the to the Internet connected, users Internet, you are in said to be need: a modem, router and/or switch which is connected a telephone line include a network interface card (NIC) or network adapter, Gmail. Sending data to another receiving data from a is usually already installed in your computer computer ◆ (uploading) the the computer electronic which ◆ is to or LANs ◆ Microsoft given made computers ways. Once online. To to mailbox. Examples les updates upload Computers network. such in name Barbados of computer kept in that information include: ◆ and B information, so understand computers. Millions Microsoft W ord sent ‘electronically ’ networks can Internet. F TP Connecting ◆ the server, with individual requests Internet transmitting Germany that: audience. the from across used e for in France. F TP les networks. businesses ◆ linked A software on as browser your computer or mobile device (such computer a web and email package) (downloading). ◆ ◆ Instant messaging: is feature allows users Internet a are connected exchange in real brand the Internet text, images, video time. Dierent names Messenger ◆ to for and this the is the main Internet. e which are or the same audio providers ser vice, for have time messages their example linked web and way is of accessing based viewed A own with the mouse on a modem your Facebook e on by a as information pages web known of the link words displayed in on information are jump to another location (links the in the you will web page or are available on virtually every topic File of transfer rules and between 70 protocol (F TP): A procedures components that of in a ser vice provider (ISP). more than a you your is to to convert addition the and with to the by Internet. analogue and Digicel computer in provided access land line include one router with is a the and Internet. F low. If you modem, then modem. is the ‘trac cop’ of a network. It directs data the modem and sends it to the dierent devices page, or are connected web to it. Devices such as computers, to consoles, digital televisions and mobile pages can be connected through cables directly to the imaginable. protocol govern Internet modem Caribbean need router router ◆ with usually devices are subscription colours), you web website. Millions the between laptops, games another a browser. By dierent on an provides of signals using that can typically (modulator/demodulator) purpose from underlined called ISP ,who ISPs A clicking company digital (www): Popularly is to W hatsApp. e W orld Wide W eb web. is at ser vice, which who is a transmission network. Each or wirelessly. set network A has switch can be simply expands connected to a the number router. Some of devices routers, such that 3.2 as Netgear models, combine components having – the modem, router separate devices with three and switch cables ◆ networking – instead joining Broadband: of line them. uses not A network interface card (NIC) or network (DSL) a is method ser vice, which phone line necessar y to to hardwarethat is usually already part of a a laptop. It provides the computer with a to a network. ese cards can or wireless connections to the be used and Cable: the World W ide Web (www) is based on pages of information linked together and Internet browsers allows is a also software to the Many digital called web cable resources and browsers. A include application that allows you and websites Microsoft Internet on the are Direct TV carr y using is a several data digital for types of (broadband mobile means the to that phone while customers cable modem a can which connection system. Cable connect sends to a television ser vice channels at once sent and – a – and bre such single which received can also set access rather the at cable results ver y Internet than ese associated phones with connect to Internet in high a at home on computer. ser vices are mostly mobile the Internet since through they your are used provider. or connections are slower than ser vices, including cable), and wireless and cable. e amount of data sent (3G received is restricted by your provider, who devices. charge form of connection is the slowest to use your way monthly Internet. Y ou need connect you to cannot the use Internet the via phone are rates for the companies data and that is used. universities to oer free W i-Fi for users who are within the landline vicinity, to telephone the 2G, 3G and 4G-L TE: that to a through being However, there Dial-up: is connect land line, Explorer. can ◆ a Edge, Firefox, Google and 4G) use broadband television broadband or have ser vice dierent dial-up, DSL to television data However, these ere do Internet. Popular to Internet you to ◆ Chrome is web a browsers it online Internet. television speeds. Users access you cable Internet unlimited browser but the viewed can by make millions as of Internet to email optic e the land line dial-up. It network. receives browsers to than for to Web faster subscriber dedicated ◆ wired digital computer connected connection a technologies adaptor broadband or is connect have connection. However, if is uses Web avoid using up personal data allowances. dial-up. is while online. e ‘G’ refers to systems. Table the 3.3 generations compares the of mobile phone generations. Table 3.2 Methods of connecting to the Internet Dial-up Requires the DSL High than can is Similar more be Leased line to an a fixed modem Digital the of not does Uses Satellite Connects per to connect Subscriber Internet to wireless to in an pairs a while to Line using for to provide that example connect to by the using connection phones, line. The ordinar y company amount Internet Internet mobile than month, change, the telephone use data. The cable T V laptops, to together fee line a to ordinar y expensive amounts A a Asymmetric connect grouped For and the ISP . A point-to-point connection is established to connect to (ADSL) the that landline. is used with However, a DSL more modem data can be to connect received to the from Internet. the Internet sent. Cable T V Wireless landline speed Users ISDN a Internet. is amount even can line Internet. a controls, does has It satellite, or Wireless remote this a has an pay line, faster rent charged a T1 you telephone data can not fast of 1.5 on a and often per speeds, coaxial Protocol controls how megabits download Application how data much you digitally communications depend antenna, upon transmit at use 64 the line. kbps. ISDN ISDN is lines can transmission. dedicated speed gaming depends but cable ( WAP) tablets but line the to line send is and used. Speed of large a leased second. slower upload speeds and Windows-based can receive be used wirelessly to software connect without a devices physical like connection. 71 3 Computer networks and web technologies Table 3.3 Comparison of 2G, 3G and 4G-LTE Generation Features 2G Text Problems messaging, messaging, and 3G All the of video and 4G-LTE All SIM 2G, access, web browsing, downloading, 3G speeds picture smar tphone plus and Phone caller ID calls dropping transmission and slow data rates card plus other of multimedia Internet Example Major sharing limitation network of the 3G network is coverage technology significantly increased email, faster Still network problems with network coverage coverage A Web technology host (ser ver) provides In order to access the computer ser vices on the ser vices such some terms web will help technolog y you to become familiar W ith so together in e set on dierent the which sending as computer Internet, there dierent networks has and receiving chunks, or the data (transmission protocol). TCP/IP on networks rules, sometimes TCP/IP to packets, which reassembled into its are known over be a to address (Internet usually so sent ver y many. W hen the post, you to down are PO box identify it. is has address four Protocol numbers its own unique is known as address). e separated by IP an IP full address stops: rst network, with identify original the It protocol, for Internet data to is into other ensures to the you for have to be a that computer a letter specic house number. e known little computers the on when using the two or three the rest the individual computer. data is is much easier name, such as to IP address. But the IP address browse the a in and remember www.cxc.org, than the or type is web scenes. is as far as the crucial. Ever y page, your way your IP having to computer time you address Internet is usage a domain remember is concerned, send sent can an email, behind be tracked! be there sent where and principles address the when to about number same computer form. right address the site on the Internet has an address known as URL (uniform enter its resource locator). To access a site, you through you address (URL) into the web browser. ere want space at the top of the screen (labelled ‘address’) for postcode, or have a are to to enter the URL. For example, typing be www.nationnews.com would give you access to the Internet. Nation other 72 that other together. protocol/Internet sent then a important, particularly go, providing applied computer numbers you a to example, 194.238.196.100. e a it one linked Ever y is host address Internet data Internet is data standard linked as the control breaks Internet. TCP/IP Getting or protocol many of Internet concepts. identifying way the email, news with is Internet as Internet, the computers. Each following on concepts newspaper Caribbean for up-to-date newspapers. news and links to is 3.2 Web technologies Table 3.4 Understanding Internet addresses // / A double A slash slash (/) in (//) an in an address address shows gives the you path the path (route) to to the where computer resources (ser ver) are on stored which on the the resources ser ver. In other are stored words, the exact location http This tells you computer ftp File .com .com transfer .uk .uk .edu .edu .bb Barbados’s .org .org in in an an in in an .gov in .net .html or .htm will tells you see a in a an at the but sites organisation: countr y Other transfer) is for the set of that allow rules you example, Kingdom: (protocols) used to show web pages on a of include some .tt kind: to transfer files across the Internet www.nationnews.com for www.uwi.edu extensions organisation (.bb the for United example, countr y is ser vers websites, non-profit a web university : example, – The University for Trinidad for www.bbc.co.uk of the West and Tobago example, and Indies .lc www.rss.org.bb for is St. the Lucia Regional extension) government depar tment or organisation: for example, www.bgis.gov.bb – the Barbados Ser vice Internet appear not Barbados indicates or are (hyper text from commercial extension. Information often a that indicates located network sites indicates address addresses that browsers the it today Instead, you is a do just that that not type starts websites, but across the name ser ver is a transmit names sites the ser vice end of provider: an http://. e require save you you to ‘www ’ followed with that address for example, and indicates www.sunbeach.net that it is a file which contains hyper text: that is, a web you may ‘ftp’. F TP allow you sites to the the also on time, most type by via http see are ‘ http://’. hypertext a link, you which may computer rest links are be at a on the taken on the page. at from same remote one is, when website computer or to a you click another, dierent location. an not transfer les Internet. of the web computer web pages are start website. To address. Sometimes address e a will Ftp Http retrieved page Y ou of is .html website. indicates countr y address System a been indicates address an is protocol. address Government .net it have address an Security .gov that that prexed ser ver which over by is next uses the the URL. A software Internet. Many www, for com, www.sunbeach.net. If in special example you enter web to web ser ver www.caribsurf. the web ser ver Fig 3.11 The Internet homepage of online Caribbean newspapers name for into the the web site. is is browser, you like the title will page see in the a homepage book from If which other related pages may be accessed. Y ou will you message if there is no homepage not use a engines is the located le name web server then the name name extensions on of comes the web the le pages folder being are where the web is an information search retrieved. T ypical htm or retrieval system users to connect from one website that have html. Whenever to visit engine. A nds their of you of the site you search engine websites own nd again, you want, you is a software using keywords. Search websites, such as www.google.com. favourite a site that you can ‘bookmark’ sites. By opening think it, by your you would adding list of it to like your favourite which sites, you enables URL le list e the available. application After know get can a do to can go straight to any site you have bookmarked another without typing the URL or using a search engine. 73 3 Computer Search is engines indexing known new this networks as sites way index is the that updated allows web you by on billions software continually web to technologies words undertaken spiders) or and search pages. Indexing search using of web robots the web web pages. plain the for pages as keywords. are pages using and send the Internet, your web les on your hard disk as you pages les it speeds and les folder. is the les of up already access are stored in a Some is known ‘temporar y ’ pages the been more display to. is quickly called vlogs Internet and users (podcasting) viewers in email m e s s age you need to ha ve an e mail as a and pages of because from hard a your own an d know the email add ress intended re cip ie nt. An advantage of u sing is that les contain ing pictures , s ou nd, v id eo text c an be attac he d to the m es sage. A l so, more cache les is sites important, that you computer disk than does can in from one email an c an le c an message. not need email be to list sent be to attac h ed W hen be f or an an and e mail is on l in e. e t he or with s ent, t he mes s age re cipient in d iv id u al se nt a to is read . group one recipient st ore d One of e mail p e ople podcasts post to ‘blogging’ for vlogs data) simultaneousl y. ‘vlogging ’ for or of is frequent commentar y, descriptions audio w ritten temporar y web. Blogs, an of eac h than caching have are up’ the view and as codes ‘mark browser email them. ese e to cache you Internet formatting (appear ing Email of stores the data document. address W hen and the in To Internet text amongst (also can can posts be to of video on the of events, graphics, video personal posts of posted reply of items websites. is text or entries any picture called is or also entries or ‘ vlogs’. Blogs subject, and readers/ post. Fig 3.13 There are dierent web apps for storing email messages Here are some advantages of email: Fig 3.12 Vlogging is a popular way to share information ◆ Creating Hyper text based by a web create, codes format data is create a which and to It to (HT ML) web pages formatting instr uct display be Ordinar y sent L anguage used browser. of page. e pages Markup language consists 74 web the displayed the is browser the since how on pages ◆ display is the to web w ritten Emails as it ◆ takes several immediately, and recipients text- language, information on a for mail check do typical ere paper, is not have replies email received as can soon be as email. to be as formal and structured letters. no or their days, but go company. need to a to ge t po s t s tam ps , b ox or envelop es the p os t or room in a 3.2 Disadvantages of email include the compared following: A ◆ Not ever yone has access to a computer or smartphone application to use the email Emails ◆ Replies email Voice to are are and over transmit such as Internet private dependent the ( VoIP) sound over Skype telephone that the it as reading IP convert not the of to users the an avoid 3.14) is an telephone example of a ser vice. wireless that instant can deliver messaging VoIP , access and browsing email the and be used Internet. letters. recipient Internet voice others ordinar y accessing the message. users connection. A some on personal into protocol digital Internet. Software enable calls is as (Fig an facility. for ◆ using technologies the device software with Web to use with major paying or the used form and applications Internet without advantage to make another of international VoIP call is charges Fig 3.14 Smar tphones are an example of a wireless device with VoIP capabilities Email World Media wide web streaming (www) Mobile Personal and computer and phones tablets laptop Social E-commerce online media and banking File sharing cloud and storage Fig 3.15 The main services provided by the Internet 75 3 Computer networks and web technologies Table 3.5 Advantages and disadvantages of the Internet Advantages ◆ You can you like There ◆ – is Disadvantages find enormous collaboration – of shown on research – gathering – access – to – information of interactive Some web on vir tually any topic The ◆ potential, students par ticularly : (and teachers) on dangerous experiments, can be Many data, and access can have the weather web the the can on work commercial ser vices be and data multimedia: that is, text, child the net: or on be the quality therefore may Also, be some highly some connections and high of information information offensive, material is may such illegal available as and not racist obscene, such pornography – many schools, organisations access is hackers possible Searching ◆ sound it is knows possible to have It ◆ demand from organisations on Internet, equipment, can for the colleges, Internet to gain businesses via a access, and computer via the other network. Internet, to is rather than in an It ◆ is for adver tise, example, sell goods shopping to information to difficult easy home for how to narrow protect download possible held to on a can down be copyright copyright download computer difficult searches music on a unless a material: the search for without computer or in example, paying viruses user that for can it any three of the main ser vices provided by it network or and the 3 each Internet. 2 Explain the a modem b router c switch d network Name purpose of the following devices: a the of type the allows you inter face card (NIC ) or mostly network that is most suitable for following: connected b of to to use a the landline phone while Internet associated with mobile 4 What is the dierence between a 5 What is the name text-based phones. blog and a vlog? network of a language used to adaptor. create 6 What web is conver t the the transmit 76 it pages name for of sound over the display the of by a Internet voice into Internet? web browser? protocol digital used form is harm Questions List the engine banking 1 It network Internet, and T V now control accurate Security ◆ fun animation to games as information exper ts to on such more no be as out is computer charges on data provide of propaganda. office ◆ cost There ◆ web video, people as finding online explore faster such and to education between the – graphics, ◆ the interest simulations, With on telephone projects ◆ information to and End Multiple choice of chapter 7 questions Each exam-style of phone 1 Which of the following devices provides access to the following systems, 3 questions features are typical of 2G mobile except: the a caller ID b Internet c multimedia d video Internet? a b c router d switch. A network connect a messaging modem 8 2 access adapter that to it is allows called mobile and other devices A streaming. double slash it is a (\\) in an Internet address a that b the web c the path to where the resources d the path to where the computer shows: le to page on the computer a: are stored LAN b MAN c WAN d WLAN. (ser ver) is located. 9 To send an following, 3 Bluetooth of a b the allows for the exchange of data across to have each of the except: a a le to attach b your c information d the to the email shor t email to address type in the email distances wired d wireless email address of each intended recipient. devices devices. Each of email, term another own distances c a need following, except: long The you each 10 4 email, for sending computer data on a from your network or computer the Internet the following reasons are issues with using except: to a emails are b emails can not c not d you private is: be sent immediately create b download c modify ever yone don’t has k now access if the to a computer recipient has read the email. d upload. Shor t 5 Which of the following connections has the 11 speed a to send and receive large amounts of Eli creates to share about his favourite football matches with What viewers input on devices the Internet. would be most suitable when satellite c wireless d leased b is He to type of creating needs to his edit videos? his videos so that they are about line. ve A videos dial-up he 6 questions data? a b answer fastest network where no one outside is allowed access is called this type telnet b extranet d Explain intranet d Internet. the e on Explain videos c of is the general name given application? process that can be used to place his a(n): videos a long. What an c organisation minutes What the what on Internet. type the generation viewers mobile have of storage is used to keep Eli’s Internet. in of mobile order to network watch Eli’s should videos his on their phones? 77 3 Computer f Eli networks and checked the watch it but Within two as soon he for to Eli his videos of his laptop. audio. lack of gained videos, the are on no produces characteristic when is the days, subscribers technologies video there explanations g web Give can c possible who another with address to access the games and join the group. will 400 be one. his Give that i Jarad is plays connected explaining a online What What the type accessing 78 the what input playing b to games he using Internet. likes device is his He about most required one ii television, ensure records of television Internet? with most suitable points the game. when he for one that members videos is on e is As of games. suitable the the State Jarad the is other during type play an names State the of in type check member time online the the that is might used enters they log game, top-right players of that the on. the number corner, who to same are along joining output that is to name chat game. of with the protocol that allows other players while the displayed screen. the be registration. of each shown information the each information which games? the Explain describes subscribers. then the Describe notied d 12 Jarad is part of an online group that plays computer games. They must all register using their email audio. around information shared He two playing A PT E C H 4 I M P L I C AT I O N S 4.1 Computer Organisations and money systems and spend tr ying are to secure systems, their Internet data cannot considerable make be sure various their amounts that importance and MISUSE their of information hazards, both of securing network ◆ time access natural ◆ internally not vulnerability is damage ◆ a weakness or aw in one computer systems, or lack of connectivity to weakness even the can be used to its data. e created which not to kept access software may be in locked rooms or software (known awed and as proprietar y may as a result data anti-virus for programs to scan email viruses former employees whose passwords and security computer information systems. is SECURIT Y or ◆ more CYBER software produced software) the overstated. and passwords computer to hardware attachments Computer AND vulnerability against man-made. e OF gain access have not been removed from the and system damage system or fact that the ◆ system is exposed to the possibility of theft or employees money is its vulnerability . A computer system’s and its hardware, software, data to fraudulently obtain using the company ’s payments for name, for non-existent example by orders. communications users. Vulnerabilities classied External ◆ attempt vulnerability receiving includes who damage as systems being from and their external data and can be internal. sources: minimal and of or their oods no data and protection from other of natural natural computer systems disasters, for phenomena example (hurricanes, earthquakes, volcanoes) ◆ lack and of protection spikes software ◆ terrorist with that and from could stored activities computer electrical damage data that power computer surges hardware, Fig 4.1 Power surges could cause damage to computer hardware les target systems, for buildings example or rooms bombings, arson. Threats A security threat vulnerability indicates Internal and a or secur ity attempts weakness possible to in danger take a to advantage system one or or its more of a data. It computer sources: systems, or ◆ errors ◆ no by employees backup who procedures in over write place for or erase data les data security software by refers extension, a to the resources network. protection against their of Computer hardware accidental or and deliberate 79 4 Implications of damage, theft Data or security intentional misuse is or and cyber corruption the (in protection accidental Computer users can company ’s computer security the of case data of software). the greatest cyber threat persons of an so that should have access security. Only to organisation. Computer each programs user and duties. Each username has data access they user, for the to only need to for with and/or focuses access computer a unauthorised on network stopping or other attempt via the threats systems to access a Internet. Cyber that in attempt the to network. It a the network by maintaining logs on attacks are and attempted breaches, monitoring and protecting against sources of attacks systems future ones. structured various performing example, is andpassword the an authorised computer networks is security protects system threat system, device against damage. represent A provided which they access and their with log in a to use networkresources. Deliberate Hacking is damage the networked or or data damage can occur unauthorised stand-alone and when computer use systems programs. Deliberate there is a planned of to steal damage attempt to bypass Fig 4.2 Cyber security focuses on stopping threats to systems in a network all legitimate occurs when Network access restrictions. is security access administrators logs to monitoring should obser ve be the is damage not enforced. maintained resources usually by being network Questions used 1 at any time by users and the time of their logging Name could and logging out. ese software access restrictions to ensure system security is maintained. Answer Accidental genuine the most from damage by recent also to computer computer data occurs secondar y or as occurs users, such entering a storage data channels term result as incorrect of devices information to save is vir uses or via transferred time. Information vital decisions that depend computer that that based security and on the data terms security. describes: the protection of data b the protection of hardware over writing resources c commands. against damage attempt to and software damage take advantage of a weak ness in system. transferred 3 Internet. an against Select the appropriate beginning for each of the statements: Deliberate/Accidental via is needed on the content of a planned computer electronic often is to b login damage electronic of viruses by persons other occurs eorts may represent than the when sensitive information. all requirements. damage erroneously occurs as transferred a from storage devices. Cyber threat/Security is an unauthorised intended deliberate to access a system via the Internet. attempts d access bypass transmissions attempt receiver. Such to the c intercepted attempt Deliberate/Accidental secondar y communication. However, all 80 questions the result to sources vulnerable. communications Valuable be internal a there can two systems through a make following threat, the following Data and computer damage errors Damage the security State Accidental external make are 2 necessar y two in Cyber and threat/Security attempted maintains breaches. logs on attacks a Misuse Organisations of gather sources, including information their from a wide variety and Propaganda competitors. W hen people information to organisations, it use of is usually inevitably specic purpose such as hospitals, clinics and and the some Measures should therefore be in place to ensure is not common. e than other the 25 a those misused. However, security use for of information which common. Agencies companies names and earning bank for to direct it was for personal countries a tr ying you to both material. e widespread use computer users has created a readily you should you have information is may agent subscribe a mailing between level letter to choice passed as to a lists example, support to 18 and sold by computer become personal use mind propaganda material. In may be used to sway favour of one opposing party group or in an groups. your use computerised systems information, date who you that are others to believe or make transfers birth typically online identities cash are of by that by to and used by people’s other banks telephone. ey expensive using you steal your are to then purchases or information conducting the to online transaction. on. and theft checking can bank be prevented and credit by : card statements for sof tware increasingly systems, it in details those make dependent becomes more purchases on ◆ information such thef t unusual organisations such discredit card facilitate not whether credit prove targets may Criminals ◆ data transmitting to another software. Y ou a be as from of intended clients. For persons salar y receive sell provide insurance advertising. If may may of given Propr ietar y their information spreading breaches Identify As for purposes originally potential addresses associated magazine, you this, but seeking above an company by means Identity also distribute use that attempt is harmful Internet public information other to their agencies. accessible are in health of insurance systems resulted for benecial a computer voluntarily has provide 4.2 information employees, customers, e suppliers of using a secure website when making online important purchases to protect those systems and the data they contain. ◆ e data and software developed and used not making card by the organisation is known as must often be used by employees for go to using a debit which is connected to your main source great funds day-to-day ◆ operations. Organisations purchases proprietar y data of and online exclusively lengths to not using public computer systems to enter personal protect information. the integrity and security of this data. Financial Computer Developments contributed processing to and fraud in a fraud. e which computerised growth the information. is Another use has following information in of led electronic computers to a rise examples can systems be in show misused. have to misuse computer-based various ways example individuals transaction in abuse have accounts accounts to examples that do of not and unauthorised changed the advantage. ere people exist computer-based gained nancial their of in setting order up to fraud access details have websites accept is for to of also where those been companies people’s credit card payments. 81 4 Implications Phishing Phishing email though bank and cyber Industr ial attacksinvolve that tr y the are from university information password in a an in may order or to as in of websites you into appear ocial such form use totrick information. ey or security attacks they personal or misuse messages personal a of and entering to look organisation trick your reply you credit to an Some your as such into card competitors examples include email marketing typing have this number photographing out asking done at send a money later to help date. Y ou someone should who ignore will these repay are intended to steal money from attachments in email that you do not know contain a virus or malware the that and other personal they has been from searches computer systems so much data or impossible computer is to type access their and for of results attack processing legitimate attack CXC is a that or in a network to it to to access it the time devices tr ying to see of any to websites or or receiving results performance, especially of a openles stored on the inability any lots in of an network attack to the is possible to gather a distance, by using equipment which can the radiation emitted by the being displayed without the at the time knowledge of can the is the electronic more groups of electronic communications without communicating data use the permission parties. is includes communications, voice, fax, phone computers being can be transferred communication modied in any channel to electronic such as and intercept form telephone network waves and so on. In some companies, it or the policy for all electronic communications to reach a regularly monitored, including junk W hen email. inconvenienceto a majority of of their telephone and email employees. the person who intended to individual. this threat is done by of invasion to avoid unauthorised of privacy persons, however, becomes real. It idea transmitting sensitive a information caused sabotageonly is users electronic form unless there is an encr yption an system or the accessed website although usually organisation 82 viewing hacking when in the or the information include: good the data monitor email. Some the on and by cloud diculty is it from available process two messages ◆ achieved user. computer be ◆ that Electronic eavesdropping between resources. students same attack dicult their network 20,000 at an makes with is the databases computer obser ved lines, radio attempting be when over whelmed other portal of occurs are users similar web online. Signs decrease can passing contain. shown and be along ◆ it insiders information. networks systems, devices the break-ins, illegal attack (DOS) or would for computer denial-of-ser vice they attachment then A research, past eavesdropping monitor. e Denial-of-ser vice information from receive passwords the documents, and organisational commercially may on. In to their you. Avoid messages since access over messages, as data senders advantage it It downloading an strateg y, latest so through of gain you Electronic they and to gaining information. Now information to tr y illicitly plans email. messages their by expansion into Other organisations about as espionage in place to ensure that the data is secure. 4.2 Most companies (often by the ensure that communication transmitted. If intercepted is the useless since intended which even receiver the this data is persistent their can often by have be not the the decoded enough eavesdropper from is software) information will data is before wrong it not is and key the abide Many and software accessed programs online by However, these or users les are organisations. ere programs and limitations music on how erefore, when to music money a recording what you can a do are specifying use an or the or are can in is by world. individuals for should program and be or used. listen restrictions e of or to to occurs obtain piracy the them for when of rightful their from of owners does from illegal copies creative information someone permission results distribution prevents usually an use, software from or getting eorts. hackers on of they see they their target to does this their and are commit critical as a gaining that of varies; of access they system in some against is those sucient their are to access. game-playing, skills destructive acts into’ a authorised form computer just more ‘ break have inltration organisations changing ‘hacking ’. Hacking not activities match and as electronically behind adversar y towards to individual them. Others as it. an access referred tr ying the purpose where all permissions some which be the licences music online song, there with owned rules due involves les anywhere legally programs you of from type rules Unauthor ised piracy music the piracy of most inter vening. and by music, and with is Sof tware music sharing, selling read. However, stop or owner. is persons, it unreadable. e decr yption to Software encr ypted Misuse for intentions: antagonistic ‘electronic vandalism’ such data. Questions 1 Explain the dierence a computer b phishing fraud and between: and propaganda identity b hack ing c using For each of the following state the type of and computer a tr ying indicate or to whether multiple it aects to information monitor electronic over whelming a a that system it makes with it so much dicult to data and access. single systems: electronically ‘break authorised electronic devices software processing threat viewing communications theft. d 2 and electronic in’ without access 83 4.3 W hether methods or to Dat a a threat should minimise be its procedure, either reduces or is protection deliberate taken to eliminates a accidental, all prevent eects. A physical or it from occurring countermeasure or logical, that Depending is a be used to software the create techniques recognises, on for and to computer users who data to protection hardware against loss or damage. It with also data laws, which set down rules information can are several monitoring devices. be kept by others utility sof tware that passes into and out of a network can be is also known as ‘packet sning’, about where what attack. ere can refers monitored. is data an sur veillance, it can All their prevent the threat. refers protect or of sur veillance, including Monitor ing Data protection purpose about a packet is the message being checked. Messages you. can a be monitored computer on using the utility network software which can or by using obser ve all Sur veillance packets Computer sur veillance technolog y from the to gather involves computer, often knowledge. Monitoring with methods typical of to method security is to without employed the to protect with them. Common physical security exits building and is a method physical and Monitor ing Physical together personnel the is in user threat. is surroundings, that computers the a approaches keystroke device a the more to inc lude: closed-circuit TV hardware the network. all device information sophisticated itself. e devices in then be be inserted of retrieval into by be the user over retrieved reproduced. Other can the hardware requires are keyboard. is made can can ‘ bugs’ the devices, which disadvantage and devices called keystrokes time. e keyed hardware implanted record of information, can obtain more computer devices physical is that entr y into monitors the ◆ electronic ◆ computer-controlled alarm with loggers can period and rooms or placement ◆ through of the user ’s and authorised identify use from entrances identify used the information passing place where the computer is stored. is can be a systems legal locks that check oence and is a violation of privacy without legal employee authorisation. badges ◆ biometric recognition, such scans voice and rooms ◆ access or to as authorise ngerprints, retina entr y to dierent buildings Protection Data codes. should including also the from be risk of protected are some negative consequences to optical loss ◆ lack ◆ potential privacy of diculty scope ◆ 84 of limited for the such user of security misuse monetar y ◆ disasters, damage, dust reproof and cabinets and keep critical data stored on media such as sur veillance, including: ◆ of use natural of safes computer from re, storm humidity. Organisations However, there nature of information, possibly for in determining sur veillance measures to the source activities prevent in and some computer possible organisations sur veillance. electrical hardware of gain disks, tapes an and microlm hazards. Computer power surge against outages systems protectors electrical can be to to protect should protect surges and minimised against make computer spikes. e with the use uninterr uptible power supply (UPS) . is contains a electricity batter y during which a supplies power outage equipment so use that data eect of device with can be 4.3 backed be up and performed a normal (Fig shutdown of the hardware can Today, hundreds ever y 4.3). are those three that attached those to a small the to of virus infect the le, the run is les of new viruses appear system that with tells Access. e macro as the computer system. By into application is is program les. e boot how is le to infecting memor y is written virus the code well. computer are virus when boot loaded the an and or operating is virus: les. e loaded viruses. ese associated of program virus whenever macro types program program rest boot ◆ that main infect loaded, the ◆ thousands protection day. ere ◆ or Dat a is load this and is able on. in a such carried language as by Microsoft a database le Fig 4.3 Uninterruptible power supply (UPS) provides electricity for a shor t and is executed when it is opened. period after power outage so that computer data can be saved and systems can be safely shut down A it Protection from worm does is not another require electronic a schools often lock computers to the desks theft of the system units and is still the capable theft of memor y drives, CD and a to virus, be DVD can be transmitted via email and of copying themselves into memor y. Mass worms can create infected email messages chips, and hard order peripherals. mailing However, there in to are prevent threat. Unlike program thef t transmitted. Worms Some host drives, printers, inks send them to the addresses saved on the infected and computer. other accessories. Organisations authorised computer persons and should maintain limit records access and logs to of usage. Preventing V irus data Computer viruses protection for computer les and vir us makes is a intercept them program do that something infects viruses copy of the virus unexpected program is a computer le, and when the le is into Computer has by users become email, or USB and memor y, other unaware infected. If given memor y the are les to one other stick, then become that of a the users used other program a or les device computers best a is such are le sent as a infected an increasing threat to Install 1986, there was only one computer known to protect anti-virus protects against viruses a computer the sof tware. operating viruses. It and Anti-virus data in and system or against viruses then for any system, programs regular ly removes software storage Anti-vir us software can scans any be a viruses set up devices, Internet viruses. Because and les computer to that are found. automatically downloads new for and viruses are systems. being In computer’s to: check virusspreads. are infect a from software. way emails V iruses to scan protect and infected. infected on attempting only also inserted ◆ loaded not but or is into viruses computer e damaging. A programs harmful application A viruses computer discovered on a daily basis, leading anti- virus. virus software products such as Avast, AVG and 85 4 Implications McAfee of misuse have downloaded and cyber anti-virus from their security updates automatically websites to keep protection up-to-date. ◆ Turn on program programs– have is for built-in the virus protection. Some example, Microsoft macro case, make virus sure applications protection. W hen that it is turned – this on (enabled). ◆ Tr y to know use. In – the hence the age the origin of the need for of each program Internet, this anti-virus is or ver y le you dicult software. As a Fig 4.4 Files can be restored from backup copies rule, Most beware of free software and software modern automatically from the Never open an email attachment that contains executable le VBS, even if with how viruses an extension EXE, COM many you Protecting know are who sent the email. is spread. les contains Some and the raw oods databases data for in an therefore Maintaining of several all its aord generations critical les of are backup preferably les in should separate be are its to lose the backups as well in and businesses it is or (copies) and other of reproof away from even agents if booking ights or lost. ink they les is to in storage stored online as often as in such that as a location to hurricanes, volcanoes, would vicinity, along remote destroy with any other backups equipment. remote data backup, stores and companies buy for easier access to data. However, data prone out of to deletion if the online storage business. main archive a preser ves regular les basis. By space could can that become what not would use a important. depend on damaged, released extracted on for if example, an the recovered) doctors prevent regular become data from as on who that you no longer need putting hard them disk (or in an archive, network drive) can the not like up of les damaged or they the backup valuable be copy, and often the tax may for for be reference. For preser ve forms can archives future of reference past only. and cyber secur ity address cyber threats with encr yption this is decr yption are techniques. ey encode data before essential. business information arises, usually organisation and les. Archives access restored backups need current for corrupted, then contain, can by happen database could situations backing normal. How how your use ledgers, receipts that it appears unintelligible unless it using a software key. (or can made is. so the decr ypted 86 stored disasters is goes transmission does depends day, or safes, or or happening, the continue also cyberspace. Users Companies patients’ details. To les, and other alternative, called Network le performed master the always organisations essential. F iles travel a be archives backups corrupted If are earthquakes online be to day, ever y immediate storage databases can centre. Backups For CD-RW. Backups as on Making to lifeblood. An computer les records. advised. e stored buildings work against or company and data information. organisation cannot or backups backups archives of necessar y. Another databases Companies backups is in the performs tape each protect Often which or deemed database software an after A have Internet. magnetic ◆ networks downloaded Users with users on an a network individual accessing an can each be given password. is individual’s a username prevents other le, changing program is 4.3 settings, or Other installing, copying techniques through storage include networks, email devices and Copyr ight Copyright is deleting preventing or by software. virus sharing Software attacks and secondar y the rights of things as given person(s) text, a and software. e main to the protection responsible for piece program. e costs the in year. A of music, a illegal software copyright law copying painting copying and industr y would make or to be caught look also make it copying an like copying of a or oence copy ◆ run or distribute copyright two or more software software software computers agreement Intellectual would and be responsible for these enforcing music, printed material for has the are: (and its packaging) to tr y to make genuine product selling recordable CD-ROMs that pirated downloading software software from the Internet; just software can be downloaded from certain software. It permission been same allows Aairs bought time does not mean that it is free or legal for you to ◆ on unless using than the software the it software the on number software more of computers computers for in a network which there are licences. it. oce enforcing against piracy criminal stealing without (licence) Properties campaigning laws are of dollars Because e use to: that at a and download ◆ and of sites would distribution programs a stealing millions it of software because oence computer law ◆ a of Caribbean, countries piracy types contain software thef t creating ◆ computer the and it such the protection piracy name the is unauthorised copyright ◆ of the piracy programs. In media. and the or Dat a in law piracy a countr y on copyright (Fig 4.5). have of all enacted of these laws computers. People prison the ◆ make found it guilty countries illegal receive example, it is to a illegal misuse large to ne or any of do a following: deliberately plant les copy computer ◆ hack into or a altering use a paid use to into your the personal programs to create this illegally with commit a the damage (computer intention crimes ctitious non-existent employer’s countries protect that of piracy) seeing information unauthorised Some viruses data computer computer example computer and ◆ ◆ which sentence. For program ◆ activities, many (fraud), for worker person’s computer to and bank carr y get money account out work. also have individual legislation from the that potential information. Contents of such seeks to misuse of legislation include: ◆ Information which it was should be used only for the purpose for provided. Fig 4.5 Software piracy is against the law in many countries, but is not outlawed worldwide 87 4 ◆ Implications e of misuse individual contents of and has any cyber the security right personal to examine record ◆ the representing the e information should be reection must periodically of the be to be a All of accurate. Information updated true measures the not ◆ e necessar y information threats individual. should be held for longer than necessar y. ◆ individual. ◆ Information should privacy be of in the for against ensuring physical the and security electronic place. individual should be protected. Questions 1 Explain why storage 2 is mak ing b archiving. Indicate a Virus following methods of An d le 3 whether the following statements are true for of programs harmful piracy individual him/her. of is a should not be held for longer than the distribution no right personal to examine of of the individual protection for should each of be protected. the to keep to to critical disks protect data stored protected computer and prevent on from media risk hardware of following such against electrical spikes theft of the system d to monitor suspects, k nowledge. often units without as re and peripherals the representing type surges and c record the optical b authorised privacy descriptions: computer ’s programs. has any scan viruses. computer contents only The State a protection Information necessar y. e backups Software use c the false: data b of impor tant: a or 88 each their Impact ere are systems life – numerous play from an examples increasingly programmable of how televisions control information important part and in is your of devices important discuss, the remote- IT in to the e-commerce therefore following to 4. 4 wo r k p l a c e be using aware eects of the Internet. It of, and be able to computers. Table 4.1 Eects of IT in the workplace Social impact ◆ Less ◆ A large ◆ It may ◆ Privacy Work social contact increase become in among the easier use to considerations employees of computer keep – how in touch secure games with is (time people personal wasting; (email, no social social contact; addictive; some are educational) media) data? patterns ◆ The Internet ◆ Advantages ◆ Disadvantages ◆ Advantage Cashless and WANs include to are have flexible a lack company of allowed hours, social includes a employees more contact no relaxed and need to to work from home atmosphere possible provide and disruptions office space, no or commuting distractions heating, refreshments and so on society ◆ Workers ◆ Credit are ◆ Main ◆ Disadvantage and automatically debit cards advantage is is no the paid are by used need to electronic more carr y possibility of for funds transfer (EFT ) into their bank accounts payments cash fraud or lost or stolen cards Employment ◆ Practical ◆ Possible ◆ New ◆ Workers Health skilled jobs and jobs created need to in be Attention needs ◆ Radiation hazards ◆ RSI (repetitive Changes ICT the if a decline more IT-related efficient fields IT-based such as system replaces programmers, workers systems analysts, to be strain in paid from to posture monitors and problems eye from sitting for long periods the has brought workplace. Most systems, often oces are used about will connected as for managing the need oces now connected therefore using cables technolog y. Applications such databases mobile by a LAN by email, and millions of become have W AN place and without oces. the the sectors and, or as with word people ever y Internet participants more in these areas, employees are required more skilled in the use of information to perform their duties. e skilled use hardware and software that involve is necessar y information for most collection, processors, day. Video to and distribution. are conferencing meetings having becomes wireless telephones enables information their Loss via economic or processing used many use occupations and in widespread of networks computer Computers technolog y W AN. Most a workplace to computer at strain injur y) the revolution in maintenance retrained important changes robot safety ◆ e on redundancies to leave of jobs and retraining take their Computers previously are now done by being used people. For for jobs that example, as were more 89 4 Implications customers of buy reduced. e stamps there that and Work use be of an has cyber of security online, sta email may in replace mail, but, on increase purchased that and products deliver y could were misuse in the stores the the may purchase other deliver y of However, telecommuting be of job hand, lost in an oce repetitive jobs, such calls to oce as telephone operators dangerous areas jobs, such with oce jobs as extreme using ICT that can defusing bombs or heat be skills, for or ecient can hours automated or take less some jobs now example be require saved quickly are among retraining. Some new some people, retraining workforce. L earning on-the-job to the is typing and or edited ICT a more to for future to keep funds in important short remain the in-house using IT and outsource and in courses to the a typing aspects since the money for a or a of be instead a in the to accessed of by the by is it would or world with less the more or part-time using with a their advantage electricity telecommuters are working compensate 90 to to a decrease in have to work. is allows spend on leisure pursuits. of people use as devices video and information recorders. e where people a small as the can is if Internet, has share no were an of led information longer they growth in issue, with living closely village. about the eects on young of spending a long time using computers and cost computer in traditional of their games. Some people argue that basis, at computer employers or must from their of reducing or mobile and/or oce air-conditioning also their face higher socialise playing employees for this with games encourage youngsters withdrawn others, whereas can develop collaboration and others argue problem-solving and less skills teamwork. as Health concerns Millions people of device and computers leisure. As with regularly any other for work, equipment, to is space, usage, but bills businesses added use move should be used safely and in a way that clients. utility homes. Some makes workers, now home or use method people, known remote and to doesn’t has such disagreement computers is led completing employees work. Millions full- communicate has skills education around and thought, millions communicating together learn that telecommuters, teleworkers work, on systems them. now travelling to ‘global village’. Distance likely location people people second situation people of Telecommuting can working computers, mobile prolonged Work of many devices playing to information telecommunications, including so, for marketable. IT business saves ways that time people jobs of use. ere help use re-typing remain computer take to skills necessar y use people skills people. reduce time system Most other may a cold personal that with environment of working W ithout documents socialising home aspects concerns widespread more ◆ enjoyable the extensions the in often the more for who more ◆ is in the isolating includes: e direct of be productivity. Social ◆ one Distractions products online. been employee, as can if they may expense. harm evidence that not properly can aect examples users’ health. is using your of using computer computer health this a are is and given for a long equipment result in important, as in or there time, and furniture, injur y. Some Figure 4.6. 4. 4 ◆ Hold the mouse continuously ◆ Use ◆ Arrange wrist Make sure D uring regular hands, wrists ◆ Relax Back Back Fig 4.6 Using a computer for a long time without proper furniture and posture – RSI don’t that your from is your and enough hands neck be in use the the keyboard the or breaks, stretch can IT workplace mouse rests. so there rest and of periods. separate that to arm desk and keyboard ◆ long and/or use, tilted ◆ loosely for your Impact as a by easy to screen. space in front of the arms. and form caused is move of your exercise. tension. problems problems posture when can be using caused furniture by poor or or incorrect equipment. can result in health concerns What Repetitive strain ◆ Aches are all and pains, swelling symptoms of and disorders diculty aecting of and neck that can be caused by Use of computers. e common name repetitive strain injur y (RSI). RSI and is caused or using the by mouse, or back problems? long and even poor a chair that is adjustable that has a tilting in height, able to Make sure that the chair backrest. for these can be regular is at the correct height for improper to use the keyboard and screen. disorders Sit in a comfortable position and regularly change extremely periods of workstation way you sit (consider your posture). typing ◆ or stop and the painful to ngers, wrists, lengthy ◆ is done swivel you use be movement ◆ arms can injur y Use a desk large enough to take all the computer setup. equipment. ◆ Take frequent short breaks and stand up or walk around. Eye Eye to problems strain using fonts Fig 4.7 Repetitive strain injury (RSI) can be caused by long periods of typing are too and What the most computer problems being is can also close be Computer screens linked to, or colours common done screens to too used to for in health long poor far from, the eye linked periods. Eye lighting, glare software stop problem can and screen. e aect the size of eyes. problems? should: and using the mouse What ◆ can Take be done regular are RSI? from breaks of the 5–10 computer minutes or the mouse keyboard. immediately to the ever y left not ◆ have change hour recommended. P lace the stop breaks activity. Short ◆ to ◆ or right of icker brightness easily ◆ tilt ◆ be contrast settings that can be changed and swivel positioned lights and or to avoid windows, and reduction glare be and tted reections with from glare- lters. 91 4 Implications of misuse and cyber security been Stress some trees) Using by computers, or computers, can communication notebook be people always be your work as data and mobile cannot contacted take as Legal, email, portable phones, mean proper breaks immediately. is as e they too systems can ethical great will deal Environmental also concerns been (stealing) had adoption of information systems need to power millions eects. On of the computers one consumption has while, on the is held passed of to has been of electricity reduced as and other computers and have teleworking and How forms of heating control systems. Information from to and from work home. is and to be moral eects an area information Act and try tries to to stop of information of concern is held on to users. A computers. that personal responsibly . Laws hacking this ef fects of ensure processed software. All moral far issues, such should raises and the some have pirating important as the following: therefore can a as the the law go in giving police, access to government ever yone’s personal data or How should emails in order to ght crime? airfar established and new technologies, systems as closed-circuit television (CCTV ) and mean microchip travel digitally. energ y such less stored therefore hand, the ◆ conditioning enabled and (and increased other carefully and moral personal Protection ocers, such consumption paper hand, the ◆ electricity of has ethical environmental and continue of Data information also use communicated legal, ethical e widespread the monitored bestressful. e is on stressful. Also, modern technologies, such computers thatsome can having saving smart cards, be used to monitor people’s reduction activities? in trac pollution. Although the age of the truly ◆ paperless oce is some years away, there has W hat will happen to people who cannot aord to already buy, or gain access to, a computer system? Table 4.2 IT skills required in the workplace Category Office of worker employees Teachers Skills required ◆ Word processing ◆ Budgeting ◆ Communications ◆ Basic ◆ Word ◆ Database ◆ Preparing ◆ Network ◆ Operating – for and document example, – via troubleshooting processing, preparing fax, of email, – financial statements and invoices forum/newsgroups hardware spreadsheet management preparation and software manipulation creating and searching databases presentations use – accessing hardware – and using computer school systems LAN and resources peripherals (for example, printers, scanners, multimedia projectors) Engineers ◆ Installation and ◆ Software ◆ Installing ◆ Manipulating ◆ Using basic troubleshooting programming hardware – and ability to hardware design, test and and software implement new software software peripherals communications the of such as systems – sensors, controllers LAN, WAN, and graphics tablets (design) Internet (continued) 92 4. 4 Impact of IT in the workplace Table 4.2 IT skills required in the workplace (continued) Category Medical of worker Skills personnel required ◆ Word ◆ Exper t system supplies ◆ Prepare budgets, ◆ Manipulate media personnel document medical hardware, processing examining bills, patient references insurance claims monitoring and for surgical using procedures, financial imaging software systems – for maintain for – inventor y example, example, of QuickBooks ultrasound, MRI and CAT technology ◆ Conducting ◆ Using music ◆ Using MIDI computer Mass and consultation, medical scan Musicians processing ◆ storing ◆ Word ◆ Database teleconferencing notation (musical systems and software – searches for instrument to add retrieving processing meetings and composing digital instrument music used for among tracks from information music inter face) sounds, preparing doctors optical retrieval and – different preparing hardware special ar ticles, in lyrics produce music and inter facing with effects storage news to locations media scripts searching for past ar ticles, news ar ticles from other countries Law enforcement ◆ Communications ◆ Using hardware ◆ Word personnel ◆ Database Movie ◆ Word ◆ Animation ◆ Accounting industr y personnel using and processing processing – – fax, for document accessing and some and software and searches email, are budgeting film and sound preparation records document movies forums/newsgroups kept software with – the used used on preparation made – – for known used use to editing of before preparing to case the final repor ts, press letters and so on offenders for preparing computer create going cost and movie graphics income scripts and animation estimates for for some scenes movies Questions 1 Name two replace 2 With changes employment if computers workers. increased causes in each a back b eye of use the of computers, following explain health what problems: problems problems. 93 4.5 is topic Pe r s o n n e l lists the computer-related Computer support jobs specialist: to computer specic application. converts e users programmer: specications the for personnel software will provides who working into into technical need translates algorithms programmer application some c o m p u t e r- r e l a t e d f ields in elds. directly Computer of in assistance with a analyst-prepared algorithms applications write, test assistance and and programs. maintain the software. Fig 4.9 Network engineer working with a server Social media using social social specialist: media media to create platforms employers’ social brand ’s communicates such media and as with share the public content using Twitter. Manages accounts, working to their build the reputation. Software developer: develops the applications that Fig 4.8 A computer programmer allow users another Systems to analyst: assess their recommends analyses systems suitability upgrades for for currently in or computer Systems systems. system needs Database administrator (DBA): security the the of integrated designs, creates the database database. e are also the integrity responsibility of W eb and area networks and wide area and maintenance of the up access passwords and and security computer or to a and the maintains organisation’s network, and the system permissions on the assigns and network. builds websites, which code necessar y developers for involves an oversee writing ecient and and direct development of the website from idea stage to its networks, and network measures rewalls. Also users website. Web published such ensures state, ensuring that loading times are components. minimised Sets adds security programming nal schedules a maintains the local monitors security. Determines developer: stable designs, develops on and the administrator: tasks and DBA. Network specic device. administrator: updates maintains complete place computerisation existing to that as user all so that users can access information quickly. IDs, shared Questions resources, such working as printers and disks, are monitored and properly. 1 List three types of computer-related Network engineer: attends to any hardware faults in the equipment. Installs new that work in and 2 malfunctions administrators professions. Explain the dierence between the jobs of a computer systems support specialist and a social media specialist. and 94 ser vices computers. Implications We life need to systems prepare assignments in almost ever y meals, maintain and travel to distribution Computers manage of large than and mailing. human or responsible overall communication for management amounts manual of devices information systems, such as a what ◆ what processing ◆ what human–computer ◆ which ◆ what the and faster ling, sorting people data e rst Y ou can is four now systems is choosing a computer information system used, including and for this and takes are situation, you need to what hardware output is used, such choice purpose of custom- software interface and is used what work they do points apply were this discussed knowledge applications are as to Chapter decide appropriate elds. Some chapter, such in examples in 1. which various are illustrated commerce, education, law a and recreation. Y ou should consider: rst ◆ the place involved enforcement, medicine particular general 4.6 ICT required. computer-related in W hen software written, specialised can at ◆ our school. An information. and rate and of cars, complete work information system , however, is collection, processing aspect of as input, storage of and recognise computerised summarised devices the in advantages information Table and disadvantages systems, which are 4.3. Table 4.3 Advantages and disadvantages of computerised information systems Advantages ◆ Save ◆ Rapidly ◆ Work ◆ Data Disadvantages enormous find, amounts calculate of and paper sor t and filing space ◆ data time automatically easily ◆ impor ted (brought in) from another system or program ◆ Data easily program ◆ Data ◆ When to easily the more same (moved or copied) from one system or another entered computers network, at expor ted (by are than keyboard linked one or scanner) together person can Some in a or updated computer access the The systems to be can spent computer(s) work due fault. If these ◆ Data ◆ Some to an be on may electrical is unless be staff and/or require a lot of training running ever ything times complicated the information failure or a computerised, backup power system may not hardware/software no or work can systems are be done at available incorrect people may attempt information. Therefore, to access security is confidential extremely impor tant information time Research Business Computers and in development this industr y analyse existing sales Commerce data Computer systems are used to help make and the Appropriate more needs and well ecient, cost-eective of their sales. responsive customers. Popular development as and marketing of new and areas products the and monitoring are to the research ser vices, as of likely market for a new product. organisations trends in computers and to printers designs and programs hardware process and incudes images, scanners graph advertising are used to network plotters for and to the input producing signs. Specialised create personal detailed designs, new software designs for the product. 95 4 Implications Stock of misuse and cyber security price management All D uring product development and for the product Keeping raw an must be monitored automated materials stock purchased ver y control can items an adequate supply ensure for bought and added system that for there cards are system can also reorder materials before the a customer database are sof tware. automatically up and any discounts debit cards can be made due to using loyalt y credit or using a reader. e money is automatically is through networked computers to the manufacturing provide stock by by any early levels account. A bill, listing each item that notice has to maintained given. Payment supermarket ’s process. e is closely. transferred always item manufacturing, listed each each been bought, is then printed and given to the become customer. critically low. Marketing Marketing and scanners included in inform products. ey the production word-processing and distr ibution departments existing automate and and also can of use vivid of new computers advertising database allow customers to material, using software. Computers product pictures to be advertising. Sales Y ou may know used, and of goods small are shops still where priced computers individually by are not hand. Fig 4.10 A barcode reader can be used to check inventory and prices on products However, when also be prices change, the changed. Itemised price receipts for labels the must products sold Each sometimes have to be handwritten. Checking the and levels in the shop before re-ordering items is checkout done counting the dierent items in the may be linked to a warehouse the main computer system through a wide area by network. As individually computer stock the items are swiped through the barcode product readers at the checkouts, the stock levels of each lines. Compare this with system. Goods do (F ig4.10). is that of is sale swiped (POS) is a business not need because through a computer to that be each uses computer individually item barcode a has reader terminal at the a at product line stock a of are product automatically priced barcode computer the to point sales selling checkout. e automatically too re-ordered system gures well gets at can so low, the from give that any updated. W hen can in see the can be warehouse. e managers they branch the product the instant which access items are countr y. Table 4.4 Hardware and software for commercial applications Industry Marketing Example and ◆ to distribution of application Automated inform direct Hardware mailing customers of ◆ new High and Software quality printers adver tising for flyers ◆ material ◆ instant Banks ◆ is Monitoring of stock payment Electronic of money levels and goods transfers ◆ Point-of-sale terminals ◆ Use or ◆ Networked of credit machines 96 debit ◆ cards automated (ATMs) teller inventor y ensures products Sales An control supply to system retail agents efficient Software direct to for e -commerce, customers ◆ Specialised ◆ Banking ATM software software selling 4.6 computer use, student information Implications was kept on of ICT sheets Banking of Banks now depend on computer systems to run paper or index cabinets. W ith business. Funds are instantly credited and debited using special banking in folders kept in ling computerised database records, searches from are customers’ accounts cards, or their faster, and information is produced when it is software. wanted. Networked customers automated to teller withdraw machines cash and (ATMs) check their allow account Teaching balance. Credit and debit cards enable most retail customers Software buy goods and ser vices at outlets, with cost automatically debited (deducted) designed customers’ accounts. Online the need banking is for process millions of cheques. Customers online banking via computers or of the ser vices oered their with (CAL) subjects is and teachers alike. Computer (CAI) and Computer Aided software and cater can for be purchased students of any for age. mobile can use them to study topics at their own online pace, take banking students Instruction Students devices. Some instruction can many access for replacing L earning to specically from Aided the instruction the available purchase and to practice tests and monitor their progress are: as ◆ checking ◆ transferring a bank balance money they such between accounts and to other as move Moodle® the group customers’ accounts the countr y ◆ paying learning ◆ viewing/printing bills online current and previous from one also members or helps the topic helps are to with located wor ld. is people learn the next. Software group in dierent form new work, even of areas if of collaborative information together. bank Using online software, instructors can also monitor statements online ◆ applying for new quizzes and evaluate the results, including how accounts. long the each quiz student (Fig spent completing each question in 4.12). Fig 4.12 Using Moodle software to evaluate the results of an online quiz W ith so much information or information even available complete essays on the can be Internet, found Fig 4.11 Online banking can be done at any time, from anywhere, using a online or purchased from others. Assignments mobile device or computer obtained or by slightly these methods rearranged for and submitted grading is as is illegal. Using Education someone Databases In schools, the student that collection information database is management and made organisation more ecient programs. Before and of by using widespread it is else’s your work own universities certicates students is ideas called expel awarded have or and be others plagiarism. Some students can making for made schools plagiarising ‘null and believe and void ’ if plagiarised. 97 4 Implications Hardware of misuse devices and used multimedia-ready cyber in security classrooms computers, networks, multimedia projectors, printers, earphones independent along inc lude and microphones for up with with a image a rules for ‘prediction’ for situation. In provide work. certain the scans of the medical diagnosis the processing, to outcome eld, the when given a of a expert set of come current system may symptoms or body. Medicine Medical is area covers a wide range of models applications. However, Modern the most important ones are found in medical large which includes access to online medical online health amount research information well as involves systems storing data Most using which details of medical study patients information doctors program to today keep use a details the models human and and body as theirillnesses. systems medical about illnesses. Patient information computer while medical screen information name, age illnesses doctor has entered print and and a any found the is and if the drugs out prescription the are are patients be data the also can collect a about a person’s internal systems. can then be processed on a special cause of a medication, the that can database connected be can to via taken the an record be usually ‘glues’ the three-dimensional locate to precisely, for decide what software whole collected slices to do next produce or as back model. is example, a to body a a part series together model of to allows tumour, and a of three- it. ‘slices’ make doctors helps (Fig4.13). of your your the computer a sent program the on illness, and to the is of their having you. Once your customised model doctor. e from have to the up using information them and brought seeing given prescription doctor’s two their can to information program, apart prescribed Sometimes, the from you address, will of of collected dimensional the Medical scanners ser vices. computer Medical whole-body information e and medical research, has can pharmacist. electronically pharmacy ’s database extranet. Fig 4.13 A slice image through the brain can be obtained by magnetic Other medical health ser vices, such as imaging and resonance imaging (MRI) ultrasound ser vices, can along those with of be connected medical to a professionals network and pharmacists. Patients’ information, together results, can personnel network then across for be shared the wor ld consultations via the can and be Vir tual-reality with test V irtual network. Medical articial given that faster access to the diagnoses. e systems exper t system intelligence of data aspects 98 that (known of the is as is one example designed a to knowledge application of store a base) area. It vast amount related draws on to this and sounds images articial are and world ’ seem the part headset eyes and uses software environment they special the Exper t reality simulations two of ts which that the sounds more past are senses data, However, some gives the the user’s ears immediate are users environment around sometimes from applications then programs use the or an feeling reality. A face, covering block to user’s used create all sights surroundings. Other used realistic. A mostly to to make sight with touch the and virtual as ‘ virtual hearing reality. another 4.6 sense for a surgeons more can procedures human realistic now be without model can experience. As trained to perform endangering be an life. A created, and a police example, new surgical virtual-reality trainee scene to search marks perform the sensor operator illusion can of through real to systems feedback to thing. e imaging surgeon surgical control which connected the gives the sense the safe to surgeon feedback system, but master includes more of to can create be is manipulation suspects and is will of the Dr iver licensing help the By a law, all driving can also used in actual 3D created a issue crime image of a brain tumour can be produced by be drivers driving kept series of slice images drivers aected brain, using be used pilots all in or Imaging other (MRI). V irtual training deep-sea divers) reality simulations and (for interactive can If example, of games on a in systems their are help ght held police in on Data for public computerised on of their millions and Assistants photos ever y roads driver vehicle driver of must licence have system registration and computerised records. Apart ght of database against driver could information and ever y vehicle database from can be licensing accessed by crime. take minutes required. By be vehicle found in using information can paper-based systems, computer on security against forces around crime. Millions computer database of the particularly across a impressive number or a records hours were to nd computer, the seconds. Compared information with systems of the world. Each year to process requests for who want to nd computer information information and stolen from about vehicles. Searching new criminal computer in other countries for units are just in law become United and communicating be some of the enforcement. is provided to a systems also ocers have uses in the region in to most common 4.14). Computer uses games industr y in States and software producers are striving for new ideas for themes and for their consumers. Computer hardware be congured to suit game-playing specications, information powerful graphics cards, amplied sound systems, seconds. Regional networks use the made that share monitors and powerful CPUs. Game- participating playing countries of (F ig multi-million-dollar high-resolution security one with with then is systems records, accessing can computers enter tainment crime concepts mobile and suspects, constantly databases searches police the statistics, storing out technolog y have robberies carr ying categories. criminal of ocers when dierent systems Game-playing used can cameras vehicles massive Recreation throughout of Personal enforcement records army and databases vehicles, the paper-based, it for are is as digital licences millions and these the Computer world scanners, portable also ages. Law anyone Magnetic the Resonance of crime- scenes. licence. A involving the identity for surger y. For can example, the scanning matches visual, important touch. is an such and documents. Details from the ngerprint computers (PDAs), printers the instruments. V ir tual reality conrm nd operation. give the the feedback the and to to ICT arrested. handheld e and records of surgeon Hardware can the Implications consoles have also been created as dedicated sur veillance game systems. information. V irtual A ngerprint system can provide fast access reality example, some databases of convicted criminals’ ngerprints as well collected from scenes of crime. is also be used by game players. For allows programs include a physical device that as is marks can to attached to the computer, such as a tennis racket, the 99 4 to Implications play Both a game players real-time feel the of misuse with will and able the of cyber another be use impact and to actual the security user see in the racket virtual ball the online moving to on ball swing the wor ld. to in ‘ hit ’ and monitor. Fig 4.15 MP3 players are very Fig 4.16 DJ Controllers are used to add popular for providing access to your sound eects to music downloaded music les while away from your computer In the movie industr y, computers have been used to Fig 4.14 Vir tual-reality helmets improve the experience in online games create also Multimedia computers can play music CDs special movies movies for entertainment. Many Internet download music and movies from the graphics for playing CDs and DVDs is of graphics included the multimedia latest designed computers, usually operating for systems. ere storing and playing bund led are MP3 made scenes. ere exclusively and animation. is requires workstations with powerful special music in order to process the data quickly graphics of a high quality. with players les 4.15). 1 In the music industr y, DJ controllers are used Name dierent types of music. Along softwareprograms, these devices with include music the strips and better of using other control songs laptop 10 0 music than of knobs, backlit components the software having touchpad. to use a (Fig sound containing computer the and explain how it is used improve the monitoring of stock levels in eects buttons, touch 4.16).ey device businesses. 2 with a to to blend the multi-core Questions (Fig are with with produce most been movie Internet. processors Software have some users use also that in and computer DVD eects provide play keyboard list or Name two ser vices that are oered in online bank ing. 3 Name two applications of vir tual reality. and End Multiple choice of chapter 7 questions The following three 1 The of a exposure theft or of a computer damage is called system to the exam-style main a are carried threat c vulnerability d countermeasure. The computer-related messages mass professional using Twitter emails to a computer b social c systems d web clients is suppor t media and who Facebook Place the by a b do c infect program d infect system database they : le not require a host program The use the the stages systems is to distribute potentially called: a propaganda b cyber c computer d industrial security fraud specialist in espionage. Preventing rightful owners of music from getting threat, d vulnerability, attack, in the correct order money due k nown as: vulnerability, vulnerability, threat, countermeasure, threat, you websites into or entering them for their creative eor ts is to a piracy b propaganda c cyberbullying d eavesdropping. attack, threat attack vulnerability countermeasure The to of to cybersecurity : countermeasure, c k nown computer information les. a: elements countermeasure, trick boot administrator b use or specialist following attack, The of les sends 10 email your messages personal to tr y best way to protect a computer against viruses is never: to information a scan b open for c turn d install viruses is email attachments from unk nown senders as: on virus protection propaganda b identity c nancial d phishing. abuse Shor t answer Vanessa laptop The use of technology to obser ve a user ’s software. without the user ’s k nowledge, is is to questions work ing email to k nown Apar t from a unauthorised b industrial complete her a project on her new super visor. keyboard, list one other input device as: that Vanessa a to actions, a often anti-virus theft 11 5 that describe developer. represent a viruses except to posts and 9 4 used attack b a be a(n): harmful 3 of can possibility 8 2 statements types 4 questions could use to help her complete the access project. espionage b c computer Vanessa tried occurred d denial-of-ser vice reason Using devices to monitor Write their permission is to an explain a example appropriate Vanessa document, tried to but attach it. an error Give one possible of a cause suitable of email the error. address that for Vanessa decided to to upload use. the document. Explain cyberbullying the b computer c denial-of-ser vice electronic term ‘upload’ . sur veillance e d the she called: d a email time users’ communications is without each attack. c 6 to sur veillance State the name of the term that enables the attack project to be uploaded Explain where via the Internet. eavesdropping. f once it has the been document could be stored uploaded. 101 4 Implications g of After misuse four cyber security hours, Vanessa document two and was possible not realised uploaded. explanations, that the Explain, why this c giving might Vanessa any of have of i a realised programs whether that each of she could require the occurred to a not d password. following her access website elements data: i the to a she to threat or should help general her call with name attack. a iii computer the Explain happens a given to e this an case His notes. 10 2 one of a only an of the power are course in hurricane hardware device August, which State that he the privacy. type a special access of to network course the have page course that the be clicks on another that provides stating by the web page. caused this that the a ‘denial-of-ser vice’ able Explain ii He has the has to He has how resolve is actions, of the and appropriate by that discuss for a at in or in his has the whether or on using him the can explains school who hours oor around body but six the work ing authors term over on ar ticles ar ticles the that problem. for information the of explain professional glancing Cameron’s aected of names the relaxing lots term. which work ing quoted Describe this occurred. occasionally two by examples been He while meant computer-related has laptop. is two negatively should email impacted attack assignment. from on have i season. outage. located students Describe level online during lectures where this be what as Cameron his tak ing Suggest in b is to opens connection an been Describe types Cameron special receives has may laptop. professional? 12 Cameron which attack. such thinks professional is page, topic the Cameron ii vulnerable What that attack Vanessa a Describe threat an iii i later cybersecurity ii course of action. her Discuss the name occurred. h On and television. be this way. assignment not included ar ticles. Cameron’s not it assignment. is A PT E C H 5 WORD 5.1 Word to Introduction processing type end of down your the to on a computer text, typically rst the line next to the using cursor line. is wo rd is a processing simple. Y ou start keyboard. At will feature the automatically is called move Before you should know one it means you cannot make a line that you make a spelling error as you is too to correct it type, you immediately. Some word do underline typing or grammatical you can mouse or you cursor can keys position to delete the errors or cursor add you the want to entire your work and to or downloaded a make words at return from look to it do later typeface in online good can your – for with not – is need you either can storage save a document, you blank your le document, open with a new name. launch a word-processing application, to type using a blank document. Y ou can open an existing from a le current to a new document document to a new window screen your having to close any documents. a letters, words, however once, because changes. Documents typewriter, you the paragraphs change. Also, you document or your or rst begin switch Key phrases, sentences and with your processors without attention, but created start of not or will to look long. also have how the word-wrap, you If improve already W hen and PROCESSING (Fig to can to also much features text type save continue be emailed 5.1). Making straightfor ward, too. Unlike have dierent styles and sizes of document. Fig 5.2 shows some of the features when working with a document 1 Title are bar: is presently document a new at Ribbon: used tabs the and top 1’, for is Microsoft earlier using of document, the ‘Document 2 indicates is to format with the name of that you of screen. W hen in recent replaces contains your groups the name shown It shows application the you document create will be example. Word. It versions which of the the versions Menu menu document. It similar of has of bar found on commands multiple commands. Most of the Fig 5.1 Word-processed documents can be emailed 103 5 Word processing Standard versions 3 Quick used 4 screen: appear e where as document ’s the to bars: and the Scroll toolbar your is shows the and part to Redo of your text. information word used earlier commonly and document displays are from tab. Save, Undo bar bars items Home screen page as bar such count. scroll the upwards, downwards or page on from left right. Ruler: As as status screen, such the is type bar: the on input you e Menu such Status Scroll 7 and Access Toolbar: screen 6 now commands Input 5 toolbar e tabs you ruler of your prepare layout of size, paper displays a the the document. document, it page. is source measurements, indents and is important includes orientation the of the to understand margins, paper page. Margins It is and usual the a are is add a of a small the 1 between inch from number is or also a importantly, most right edge the size type the the of each edge Paper Y ou the one of of the the page to the the you can typing to you prints cannot page the a bind want on each print normally right in a margin. need when printers a on edge. L eaving that and text called useful top, bottom, left by the when page. Y ou separately is heading page. More to gap important together. It page gap page. is typically especially document to see edge Margins margin to select margins or distance from Fig 5.3 Margins can be customised for each document Sometimes known text. as portrait is known as tall and landscape is wide. size can select dierent sizes of paper on which to Fig 5.4 Por trait and prepare your document. e size of paper aects landscape orientation thepage length and width of the workspace. 1 Ty pic alsiz es are let te r s iz e (8 " × 11"), Editing 2 text 1 A4 (210 × 297 mm) and legal s iz e (8 " × 14"). 2 Once you it. is have means entered that you your can text you correct can easily mistakes edit before Or ientation presentation Documents are in one of two orientations, which known as por trait and landscape (Fig the nal of the you may have to select more than one word, or 5.4). sentence, paragraph text 10 4 document. Most are time usually of by using the or page. Y ou mouse or the can cursor select a block keys. W hen a of 5.1 block of text has font, style, size be been and highlighted, it alignment of can the be block edited: of text the can changed. Per forming are three main ways of editing To select a word, double-click ◆ To select a sentence adding, deleting ◆ moving, copying ◆ searching for and retyping and and pasting replacing To deleting and ◆ text To add or delete text, place retyping the Shift cursor and and click the left mouse basic at the text, start typing! e button existing the right to accommodate the text new the Delete or Backspace will delete all text to the key will delete right of text. To key. e the key text to the can create blank lines by Delete cursor left pressing It is also and copying possible to with First new select the text new part of of while the the your Insert to be key type-over bottom mode the will you causes or of the to third at the most cut the it text such the Ctrl All). and paste operations work the W indows placed in a applications. Text temporar y storage that is place must ‘cut ’ or remove the text from is and ‘paste’ it in its new location. T o do this, text and then click the Cut icon on the Standard menu Ctrl + X or on Home the tab of the keyboard). e ribbon text (you may disappears and to the cursor then click clipboard. Click keys to where the you mouse want to pointer move the or use text and replace that the Paste icon or press Ctrl + V . e text moves as the new location. part disappear any text ‘typed to the over’ as in and be alternative toggles appears then right you application is type- of the insert status when replaced type. e between the start bar the at and the type-over Fig 5.5 Using cut and paste active. way to select beginning pressing and dragging of text the is to place required holding the mouse the similar down text. Select the left across the the mouse text process the mouse button at then to click where select a word or a it the block the is Copy but the clipboard. Move end of select the text icon word (or use Ctrl processor + C). e keeps a text copy in the cursor to where the text will be of text paste it. e text appears in both places. the is as you are commands typing, it to move is to easier to another use part of the to document. Table block copying. First be keyboard to for button Sometimes way used text selection. quicker is cursor inserted, and selected, releasing perform (for down c lipboard. your the A is text, you the use stays and document, hold key. and by end. the A A A the beginning, hold cursor. Enter delete, and type. An keyboard mode. OVR side wish text replaced on left is paragraphs, and text mode, which cursor entire at the text delete you selected whatever over click at text. typing. e by or text, click key to words, sentences the in or move moves Moving a delete also Y ou of and press toolbar, Edit Backspace on move select will block copy, cut way where text, press paragraph, triple-click once. To T o to it. desired called insert or on text copied location a select key text. same To processing it. select the text e Adding, word text: ◆ ◆ in to operations ◆ word ere block Introduction 5.1 shows some of the commands you operations. can use to move the cursor. 10 5 5 Word processing select If Save, your you select saves the are working Save, the the word word newer As from document Y ou will a the new then a you saved processor, without to older File replace version the is menu, then lename have asks previously version document. e Save in processor both or old save and in new and you, version you can a lename. warning older you a document lost. If it for select give new of the location. versions saved. Fonts Fig 5.6 Using copy and paste A Table 5.1 Keyboard commands used to move the cursor <Ctrl><left arrow> <Ctrl><right <Ctrl><up Move arrow> arrow> <Ctrl><down arrow> <Home> to previous Move to next to previous Move to next Move to beginning is supplied word Move font a style with a from. Dierent word For paragraph of wide are range fonts example, plain Roman writing. Modern good are fonts for of fonts useful such writing for as word for you to dierent Arial letters processors choose purposes. and Times and are New reports. paragraph <End> Move to end <PgUp> Move to previous of <PgDn> Move to next <Ctrl><PgUp> Move to top of line line screen screen left of screen <Ctrl><PgDn> Move to bottom <Alt><Ctrl><PgUp> Move to beginning <Alt><Ctrl><PgDn> Move to end <Ctrl><Home> Move to beginning of right of text of on of screen text on screen screen document Fig 5.7 Dierent fonts are useful for dierent purposes The Undo and Redo Font commands size Most If you make a drastic change in your document that be did not intend (like accidentally deleting a whole fonts panic! As in most Windows scalable, which means that they can as big or as small as required. e size of a font is page), specied don’t are you applications, you by a number known as the font size. Sizes 10 have and 12 are the most common for writing letters and Undo reports. Font icon or using the Ctrl + Z keyboard changes may not be reversible, but your clicked will the often Undo warn you icon, and of you this wish beforehand. If that you fonts your icon. Many Undos Save Under and vs. word action, you processors can click allow on you to 1/72ths of an inch. the do at size 72 are one inch tall and fonts at size had half an inch tall. not 12 Redo Size multiple 36 Redos. save F ile Save As. If 10 6 last in you Size undone specied word are processor are combination. So Certain sizes on as the you are Menu bar working are in a options new of Save document and and you Size 72 Fig 5.8 Font sizes 36 5.1 Font Each e e style font six can have common a range styles of extra styles applied to it. of the versions ◆ Normal: ◆ Italic: no the slightly special font to style will be the right. lines used is applied displayed as to if the it is Bold: extra ◆ ◆ thick to Underline: a Superscript: line ◆ the and line the printed Subscript: and make the printed text at a draw the will text at to a is text be is the stand drawn raised smaller will be to to stops. In the Page top the of text. the tab the below Style the line are a size. Italic Style superscript Underline Bold Layout to see located to any show tabs Word, click on the (Fig on your ruler at 5.11). In the ruler the later to insert versions (like 2007) you can select tab from the menu to reveal the tab box. position left Style by location the location by on distance the arrow as you on the ruler on the clicking the shown on is margin alignment tab Normal and earlier dialogue shown just V iew, Ruler Microsof t tab A the are processing drawn out. underneath up page of tabs word font. size. lowered smaller font where to leaning stops ◆ shows document. Click top are: ruler Introduction the line. Y ou the in Figure ruler. Y ou drag the can leftmost click. en or of the tab choose edge 5.11. e set can tab the tab place to location of the the from desired ruler dierent by move it tabs clicking more than to as on one another ruler. style Style subscript style 2 Left Centre Decimal Right Fig 5.9 Examples of font styles Alignment Left Alignment describes the position at which aligned text Centre appears on a line on the page. Alignment is sometimes 10:50 known of as justication. ere alignment: shown in are left, right, centre Figure four and dierent fully types justied, as Right aligned 5.10. Fig 5.11 Four types of tabs Format Painter Sometimes document another button is on the is have would like may called formatted the have Standard formatting same noticed one part of formatting the the on ‘paintbrush’ toolbar Format button. Format paragraph a and may part. Y ou button useful you Painter, Painter from . and copies one place it is a character to ver y or another within document. Fig. 5.10 Alignment of text To Working Tabs enable centre Y ou or can such with as you full also to align your justication, or automatically periods or copy paragraph formatting: tabs text align insert dashes, before to to the a decimal specic the left, right, point. characters, tabs. 1 Select 2 Click (drag the the text. paintbrush across) formatting the text button that and you then want to paint apply the to. 107 5 Word If processing you double-click becomes a toggle formatting to the so Format that several you Painter can paint button the it new indented from cursor the Double-click within the paragraph where you copy the Click the 5 Select Format indent a Painter paragraph reformatted If you have way, press will to look or text like activated Esc return to indentation the that rst should today ’s precisely ere of is the no pressing e when the Format you’re Painter nished and in can be block before your mouse Pages them normal. word processors, it amount longer the of any Enter between choose will another space need key select some is possible between for the twice to can also text. If spacing the select line line lines, also whole applied can typical the the your be line typed, you and in text. Y ou typing Tab key. the indent paragraph icon : to L eft the left margin or Right for the right margin. number ing in in your document order. Note in the should that header or page footer be numbered numbering section of to may the keep also be document. formatting changed of the this to paragraphs. old typewriter separate can number to called document style paragraphs. determine you all the do, the text you text spacing spacing block you and or line 1 Click Insert. 2 Click Page 3 Select pages like this: the 5 Use select the page start Position on page Format dialogue numbers if the page (top or bottom) and the (left, right, centre). button. box (F ig appear, the numbering 5.12) to number does not adjust from start how which from your they the rst page. you you the Number. 6 Click OK to return to the page. been the 5.2 keyboard Click spacing has of 4 specic until wish. T able their a spacing text part in line type value. Also, once a line spacing, or the control spacing space the from from alignment Line pressing the paragraph. Y ou W ith placing be added Paragraph and by button. Page 6 word paragraph, select indented. Click indentation the the simply formatting. for 4 of margin want be to left left paragraphs. To 3 to the document shows shortcuts. Table 5.2 Types of line spacing Single Inser ts larger a line than spacing the size a of little a Ctrl as + 1 formats single text spacing character 1.5 Lines Inser ts a line equivalent a-half spacing to times Ctrl one -and- the size of as a + 5 formats text one -and-a-half spacing character Double Determines twice the a size line of a spacing Ctrl character as + 2 formats double text spacing Fig 5.12 The Page Number Format dialogue box Find Indenting An indented away 10 8 from word the or paragraph margin (left or is set at right). A a distance word may be e and Replace F ind and Replace Search and Replace) function will rst (often look called (search) through 5.1 the document to nd one or more words that Introduction to word processing you Questions specify. Once the word is found, the computer can 1 automatically you type replace in. is is Alternatively, you Replace. is is is safer it usually can asks with use you because to you another the Replace another approve may word not All option each Explain a Open simply a you b Save and Save As. 2 What 3 You do you understand by ‘selecting’ text? replacement. want to make have two paragraphs of text typed, which you the to edit. How many paragraphs would you have ever ywhere. start dialogue to between: New called if If dierence and option. want change the that your box continue search will the pop search somewhere up in conrming from the start your copied b cut and pasted c clicked Undo d clicked Redo e clicked Copy. paragraph 2 document, whether of you: a the you paragraph 1 wish document. 4 State the single, double 5 Describe 6 Explain using keyboard the one the and combinations one -and-a-half benets of advantage Replace used All using and the one line to create spacing. Format Painter. disadvantage of option. Fig 5.13 The Find and Replace dialogue box Practical Exercise 1: 1 Open 2 Type exercises Selecting a blank the Microsof t Word text Word following morning. She using was Script document. text: at It the was 5am airport on Saturday waiting to 2 Use – Double-click 4 Triple-click on the word the the paste the text text. Click three on the Copy Click at the beginning Shift key and click Type of the rst to select a at the end of the Hold down the Ctrl block of all the text in key the 3: Find the 1 Type 2: Block the Travel operations (press (press and press A (for All) Replace text: you click Online embed code for V ideo, you can paste in the video you want to add. can also type a keyword to search online for video that best ts your document. to Use the 3 Format 4 Create Find and Replace function to change all the an of the text to indent word ‘video’ to double for the ‘recording ’. spacing. rst line of the paragraph. Enter) Enter) order document. following: Workshop and following occurrences Exercise alphabetical text. 2 select into paste rst the 6 text and sentence, hold Y ou paragraph the cut, copy times. the the move or icon, W hen 5 operations ‘morning ’. 1 and to Enter) Education, Script, Travel, Workshop. Exercise on Enter) (press block options come home. 3 (press Education 5 Insert page numbering centred at the top of the page. 10 9 5.2 Document o r ga n i s a t i o n the Headers and body of quotation Suppose you want to place a heading or logo at the each page of your document, or maybe a page the bottom of all the pages of the appears margin, is bottom at the known of each as top a page of each page header. T ext is known as but inside which a the Microsoft broken Word, the lines. Any automatically subsequent placed at text appear pages. A the providing header typed in a a reference of is each footnote or for a endnote is up of two parts: a reference number in the text the actual entr y at of chapter the bottom of the page or at appears end the or text. Using auto-numbered at footnotes or endnotes rearrange your allows you to delete, insert and the footnotes or endnotes without having footer shown this similar footer bottom in is text. A top to In to the document. T ext the which in number and at text used top made of the footers within on similar, except (Fig placed that section, will position page the worr y are all that it is about after a contains placed the numbering. Footnotes separator the line footnote together at the at the bottom reference end of are a of usually the page number. Endnotes section or the entire document. 5.14). Section To breaks understand your document sections. A end how of a section specic formatting stores as the that is margins, headers with the a break of break with is a a of to that footers appears the dierent mark formatting and works, think inserted kind or as of to as page end double section the of the mark orientation, sequencing a or show the section. is such of chapters document, and applied mark name section book part section numbers. e a of page dotted break in line the Fig 5.14 A header and footer centre. In e Header ribbon and when Footer the toolbar, or header or footer Design areas are tab on the there the tools bottom margins you need to format the four top a document. Y ou can use header and footer throughout a Continuous: document it for part of the document. For use a graphic in the rst-page Next the document ’s le name header, and in the pages. Many word processors starts Odd: type special information number into codes such the as which the header will current header will for also or automatically date footer of or a inserts the same inserts the inserts breaks: a break and starts the next page a section as well as a page break next a section section on break the and next starts page the new current on an odd page the Even: inserts a section break and starts the new let section you Word then ◆ following on Page: section include section Microsoft example, you ◆ can of as or and change types such the ◆ same processor and section in word active, ◆ provide are a on an even page. insert page document. Fig 5.15 Section break in Microsoft Word Footnotes Footnotes from 1 10 and and endnotes supplying extra endnotes have many information Section uses, ranging about a topic within breaks dierent section therefore formatting breaks in the will allow begin following you and to specify end. Y ou situations: where might the use 5.2 ◆ dierent are working footers ◆ headers on dierent in a on and needs various to if have the document dierent multiple you headers it and schemes: where into a columns. If column automatically pages numbering document footers: the if table you of are you Document have format, your put in the text prepared word section organisation and processor put will breaks. working contents needs Questions dierent Roman ◆ numbering such as letters, numbers and numerals dierent paper sizes: if you want a document to 1 What is a section break? 2 You have a document that contains sections breaks. State whether odd section breaks or even section breaks contain portrait pages for text and landscape pages would have been applied to pages 17, 22 and 35. for tables and charts 3 ◆ dierent margins: if the rst page of a letter Give be a two-inch margin, and the following pages need situations columns: you can use your word Describe column feature in the middle of page, and place Practical 4: section Insert breaks exercises Headers Navigate or of sections would an example of how a footnote is used in a to in and the before and using after What are Microsof t dierent Footer versions of similarities and dierences between icons footnotes? Word 8 and the and the footers Header document. a footers 1 use processor’s 5 newspaper Exercise the margin word-processing ◆ where appropriate. a 4 dierent two needs Y ou should see the added information page. Alternatively, switch ( V iew view Microsoft your newly added to Print header and on your Preview to footer. Word). Exercise 2 Select Header of page. to insert a header at the top 1 the 5: Footnotes and endnotes right Type the sentence ‘ is is a footnote, not a footer.’ 3 Type ‘Practical 4 Move your below the exercise using a header’. 2 cursor to the bottom of the Navigate to Footnote dotted lines to view the be no text in that Click the Insert Page 6 Click the Date/Time (this Click Close double click on on the the Number icon to Header main option versions and select may be dierent in of Word). Select the Footnote to bottom insert and part option. e cursor moves icon. the the Footer of the of the page. Type ‘Example of a date. footnote.’ Y ou 7 tab section. 3 5 References footer. ere previous should the page toolbar have just created a footnote. or document. 1 1 1 5.3 Ta b l e s Creating A table is a organised rows and these be a convenient is columns. e and merged shows of way of of height, width can also together) owners grouping constructed columns (joined list columns tables manner. It rows and and or the be text cells and in an grouped borders of changed. Cells split. e names table and in can below ages of their pets. e table Owner Pet Rashid Tur tle 2 Jurnee Dog 4 Jana Bird 1 feature allows Age you to (years) select the number of Fig 5.16 Conver ting text to a table rows one and or columns more rows needed. In can be an added existing above or table, below the Creating selected row, while one or more columns can Y ou added to the left or right of the current and columns can also be can divide a page deleted, and cells table can also be added the table up, down, to or deleted is particularly to shift data left or right of the is the and table table achieved then by placing the right-clicking cursor to show in a the cell various options. design on e layout of a table can be modied useful the type of border, the style of the lines thickness of the lines in and around column or cells can also be your shaded out text you want leaet to which produce could a be in two or more columns saves in page. feature column (Fig column can be created section 5.18). Word breaks will in the middle placed in automatically a of a column section breaks. Note that a put column in break used to stop text at the end of one column and table. continue Rows, columns if a and is the or by the changing the page. W ith and columns. in format e parallel current space cell. is several in folded. Laying the into in newspaper, newsletter the up column. is Rows columns be it in the nextcolumn. dierent colours. Questions Y ou can also functions although to apply a this limited table is not spreadsheet. W hile method of sometimes into a using you this, once the paragraphs or tables Tab need is to have key to replace replaced to align convert specic by other 1 the data Excel 2 columns, tabbed option Explain and old in Describe data one 3 the adding State the shown in dierence a (F ig of using between row to a number of rows Figure achieves a table in 5.16). adding of a table a and columns word column in 5.17. of a table Type Name Example Fish Small Flying Fruit Seeds Cherries Fig 5.17 Example 1 12 a table. Example tabs, commas, character example processor. document, the some to Table separated single and word-processing Convert Text data a a intended the may table. e in summation the table 5.3 Tables and columns Fig. 5.18 The column feature can be used in the middle of your text Practical Exercise 6: A the 1 Create Creating Navigate Type using Microsof t tables Word 3 Save the document B Change 1 Make sure 2 Move the as ‘Competition’. table columns 2 exercises to the and the text Insert ve in Table feature. Insert the width of the table columns six no part of the table is selected. rows. the table as lines First Last Company name name Mala Tuim Gaming Claver y Lotte Team Alison Ross Fees Mem- Group bers # in arrows $250 5 4 ALL $300 7 2 Zacton N-Ta-Tane $175 3 3 Allen Master $300 8 3 3 Click the lines and pointer increase or the until left or the it and between drag to allow table pointing parallel Inc. mouse to one of the vertical shown. changes them mouse decrease to the to double-click move width to a to pair two of . rows. Alternatively, some you shape right, with the of gridlines the columns applications adjust the width of a Gamers column. 1 13 5 Word C 1 processing Sor t the Select table the icon E whole table and choose the Sort . Change Check that option Header Row is the table by Last name in Change Double-click Click 4 By to sort the Header header row Merging and the rest of the Row in the Sort Inser t a row and add P lace (titles) will not the cursor be P lace the cursor 2 formula the 2 Tab. A bottom table. In the Press the rst Tab cell to go of last new the to To cell new the row in the will Group appear row, type Fees at Select the Design above merge and select menu the 3 Type sum 4 of Press box the Tab Select the and go is option entered click to =SUM(ABOVE) as a cell Formula 4 Centre on from the icon. Check in the see Exercise’. the rst row with and select the Insert rows above to insert a new headings cells the of of the new Group box 5 Note row cells, right-click from into and one, select the Table menu. for Gaming Competition’. heading. that once a right-clicking cell is highlighted it can be split from for in the Table row choosing dialogue Split box that will allow you to choose the resulting of columns and rows. 7: Columns column. time and and menu. e the Exercise # the that 1 Open 2 Type a blank word-processing document. change ‘=rand(6,3)’ (without click on the quotes) and press in ‘ V ideo provides a OK. the way sentence paragraph and paste Enter Select 4 Navigate on 5 in the of the you paste three it each three the prove three your ve point.’ Copy times. Copy sentences, press paragraph rst to help and the Microsoft e to between 3 of Fig 5.19 Add a formula to a table table. Table =COUNT(ABOVE) dialogue the Formula OK. Repeat icon. is to all all the powerful 1 14 ‘ Table in Enter. Alternatively, type the to ‘ Totals’. column. the Formula Field 1. the column. Formula Members to in ‘Registration number dialogue to cells Insert the cells appears =SUM(ABOVE) 3 the cells tools Update from #, using # by 3 le headings. Right-click Merge column. Press of Alison Group rows. a in for the sorted highlight 1 for dialogue row D the splitting option. Select with number total button, select result. Save the box, the mouse on f igures table. 1 selecting group # Ascending F OK the Group clicked. order. 3 the 2 the Sort of 1 right 2 one more Enter the twice times, pressing paragraph. paragraphs. Columns Word, it is icon. In found in recent the versions Layout tab ribbon. Columns Figure option 5.20. box is displayed as shown 5.3 2 From the versions tab 3 on From e text menu, select of the the Microsof t Insert, Break Word, select ribbon, select list, select moves and Tables or, in the columns recent Layout Breaks. Column now and starts Break. from the second column. Exercise W ith sizes 1 a 9: Unequal column for each P lace the Equal 2 3 Two left 6 Select 7 e selected two columns. If the 8 two paragraphs e document text reads Select Columns Exercise e 8: on column the option Using will the right to break columns. 1 the is cursor paragraph. e the subdivided set unequal on the left the (in column at Columns earlier the start option of and versions, untick column narrow setting and which gives the makes right width. spacing between the columns as left of the OK. into information column same, except half page only. that and half. fth paragraphs. Use three the columns. breaks used at ll create column be enough the left and will isn’t remains fourth between P lace there down the to columns. columns, it continues 9 L eft more 0.5". Select for possible width). column Maintain is the columns column column in 1. Click More Choose the Fig 5.20 Creating columns layout, it column. cursor paragraph select columns the cursor only for subdividing beginning should be of at the the text fourth leftmost Fig 5.21 Formatting text with uneven columns column. 1 15 5. 4 Before it is Reviewing you best print to or share proofread errors. Y ou may also it yo u r your for want document spelling to wo r k make and with others, grammatical comments that spot ‘their’ instead useful later or for others to read when you share features such as Word Count word processor yourself your or (knowing others) are what useful has been options edited when cursor position spellchecking from and checks to the end of the the spellchecker reaches the end of the you want document, a dialogue box opens, asking if reviewing to continue spellchecking from the work. Just as in paper-based you would cross out, circle document, as or well make as a comment check for repeated processors can easily perform these of the document. Spellchecks also nd words. errors, e word Spelling icon in the P roong group provides functions options for starts by beginning a of and document. W hen Track Changes ‘the’ instead the the document. Other ‘there’ or will Y our be of ‘they ’. for handling errors. Y ou can select a range of you. text that Proong Before you errors, you may will UK English use containing e to to want have the or grammar. to your conrm proofread ‘s’ and to review recognises language then block of click the Spelling icon to spellcheck only text. language begin you and your the also document the of from conrms checked for for language work. For spelling ‘z’ dierently option document spelling that example, words US English. whether errors in you wish spelling Fig 5.22 Spellcheckers can review an entire document or sections of it Spellcheck Here is a options list of the options available in the spellcheck Spellcheck dialogue A spellchecker any spelling spelling correct checkers can word will should accept correctly Spellcheckers thousands examine mistakes. W hen word you. Y ou the will of your a attempt be and one of and mistake to is some found most the suggestions suggestions or ◆ Ignore Once: ◆ Ignore quite All: retype ◆ words that Add to are dictionaries supplied with ignore ignore meanings: word ever y Dictionar y : computer’s large their just one this of one the time selected words to yourself. have box, with identify ‘guess’ what make the text ◆ Delete: ◆ Change if dictionar y delete a word a word it if can it you be type is not in the added occurs only once with the All: change all occurrences of a highlighted word word processor. However, there will be some words that are ◆ not in the dictionar y, such as people’s names. Y ou AutoCorrect: correct usually add extra words to the spellcheck typed 1 16 the cannot wrong spot mistakes word. For computer will automatically this word ever y time it occurs dictionar y ◆ A the can where example, it you will have not Options: the and gives dictionar y words you many choices, such language, ignoring with numbers. as changing uppercase letters 5. 4 Word e status in bar the lines of and at the provides lower a left of summar y of a work word-processing the number document. However, for summar y, the Group your Count document words Reviewing Word icons Count shows characters the in the a more of detailed option in the Proong number of pages, words, document. Fig 5.23 There are options when correcting an error Thesaurus Most word check A and processors features. is thesaurus same grammar will meaning might suggest also a oer dierent suggest as (synonyms). For is check word thesaurus from alternative that example, if you you ‘ large’, ‘ huge’ and a or spellcheck. words have type grammar with typed ‘ big ’ the the in thesaurus ‘ vast ’. Fig 5.25 The Word Count feature summarises the number of pages, words, characters, paragraphs and lines in the document Tracking changes in your document eTracking any editing this feature feature that is a you be colour insert such you as text, it edit changes in or the useful make red with will way to the be the and monitor text typed that retain document will usually crossed in feature so to document. W hen text, it Changes them a edit document reject to delete also underlined. e each a used, ever y highlighted. As to you is is you the a change out. As colour used can is to but accept original will review your text. Fig 5.24 A thesaurus will suggest alternative words with the same meaning A grammar any text checker you grammatical have will typed errors. examine and may the structure highlight of some Fig 5.26 Sometimes it is useful to track any editing in a document 1 17 5 Word processing can update the name of the document to include, say, Comments ‘version1’, ‘version2’ and Adding comments is an alternative to editing in document directly or using T rack Changes. It is where A if you the are content comment can the text, then An alternative and delete comment selected reviewing is be not created method comments and been by and is to (Fig added responded document being right-click has a changed placing select use the the to, or all in the New use the current the any way . le name until cursor Occasionally near you Comment. tab more so your to add marked one be can can be be viewed. as as that you have document share the have it may is multiple versions password selected who have specic access the document. A the use of document or in digital other a to restrictions formatting be no can the also a same can information as level on of to and include that used ensure could it. is document need the and the le make e feature few located or even protection conrm has a not scan conrms be save on in a that make it, only text. Most to word changes realise location your original storage with saves of the a latest have will an work is update changes as Save As major to feature and can also over writing changes create a to copy a of be used previous to document, use the avoid edits. If you updated the saving you a have Save As document. Y ou you do example, also printing the validity you your to signature a document device, it the to that processors automatically secondar y that you is modied. them. option 1 18 when it or involves that document minutes. So, if document made then original AutoSave ever y times to changes, document. be a if includes Review tab on the ribbon may if that email, for Fig 5.27 Comments can be inser ted in a document using the icon in the ere are read-only be document placed valid document document. signature is a changes saved editing, copying accessed signature protect changes, track higher digital to persons. Just password comments, general A can password-protected preventing a as nished. others. If document by the want with nal. A accessed not you sharing made, the than document, each comments be are Users Protecting date someone Review 5.27). Once to for on, or also backup useful so a Fig 5.28 Documents can be protected using dierent options of the 5. 4 Reviewing your work Questions Practical 1 You have State the typed most following a document appropriate using feature a word for each of Microsof t the will not detect used b will leave 1 a deleted phrase the allows d a you method to to 10: Spellcheck leave check a the document, but the driver’s sentence the is taking the test for his liscence.’ for a amount user ’s of a Perform a spellcheck b Right-click on the sentence. attention text within and select Synonyms from the a box to nd alternative words for limit. ‘test ’ and Explain ‘Eli text note the in Type option specic 2 Word whether ‘the’ , ‘their ’ or ‘there’ was correctly c using descriptions: Exercise a exercises processor. dierence between a spellchecker and ‘driver’. a c Use the Word Count feature to summarise thesaurus. the 3 List three ways in which a document can words and characters in the sentence. be d Use Track Changes to delete ‘is’ from the protected. sentence e Insert ‘Did a he and replace comment pass the at it with ‘was’. ‘test ’ and type the note test?’ 1 19 5.5 It is Combining useful to move f iles information from and one impor ting part dat a of Impor ting a document other to another documents documents. If you pictures, tables not have images to in the are spaces allow of programs and some you to just and insert paste adjust word are the the size the designed to stick in of from the the is to How do these other they in will layouts it a to 1 you your from the default to is between opened cut the or three sections documents. One documents Select by using necessar y document that an assignment of combining copy or cut documents. Note all copy the for way that and you in a paste rst need documents. Go has from. Select the and text Cut you or wish the the cut document where may edits the all be W ith edits documents combining two you hidden updated feature from tables desired have that as two Copy want to need to be useful creates tracked that with you view or location documents the place and a le program the created dierent you will probably carefully screen which and can you as a type you are that using is at will choose format. Sometimes you to may dierent will do by 5.29). simplest common le type word-based is TEXT (TXT programs a TEXT le. ere font, style information it into a save and does Word this your it le did not Format into in look or (RTF) saves well the as another the the problem will the is be the able to need a new same you to be in you the new new what that one that document so be such to and not save you import repeat all with on. viewed as formatting. it. overcome formatting should created document should to words. W hen Combine combined, start have font, style have document, and select the into the when designed Paste document changes. If another can is do les, information. Hence, the program, it program TEXT formatting. was the with words. ey formatting settings problem. It RTF a document, and appearance Text only is Fig 5.29 You can save a le in dierent formats 12 0 a OK. L ook onto from by work, you containing combined method documents, then combined this click dierent save the your text. feature. is highlights or copied you or at document. Another Documents can cursor or comments several the as the Sometimes nal one (Fig a or information, as to Click open then comes extension). All Rich text. 3 in however. ey the text. 2 le information understood save menu the les have separate have and then that be you drop-down open features will W hen name sure information. Combining few make that to le three a need e Suppose you program box save especially complex the see word-processing perform do one give document that by types program? images. A information that File some included, you les them) processors arrange not be enough ways. Remember combined to where data or word-processed reports need big information into writing charts copy location interesting of leave (or limitation not or add programs later. Y ou programs at or and you import look the an same 5.5 ere to are many particular these you any may also of appear le programs import tr y other – garbled and but them. If types you you they when which may will are are well need to be able check incompatible viewed (Fig of specic some to before your the screen. As users an prefer applications. To alternative to do Combining use using Tab to impor ting the Task switch dat a Bar, between this: 1 Hold down 2 W ith the Alt key. 5.30). 3 the see Release Excel is a Alt the the key held name Alt of key spreadsheet even T o for the insert an Excel program the converts to the data the Word data to key until want. application. makes data number ver y easy – challenged. example, into exists in spreadsheet, select paste table Tab you that presenting already and a to that worksheet, for spreadsheet, open text, switch switch and the application mathematically document, once Fig 5.30 Incompatible le formats can lead to unreadable text down, press the to crunching, organising between + to and text you Switching Alt les the an Word Excel and copied a copy the text. Word format. applications Questions To integrate necessar y to switch between to data have from all between open dierent relevant them. For Word and applications applications les by is often running example, you Excel it can and 1 the two documents switch selecting Explain 2 Explain why dierent application’s button on the Task Bar at the ways into a of joining one user nal would information in two document. want to switch between programs. bottom 121 5.6 L ong have Ta b l e documents a found table near Figure of the that the contain beginning is not document of the a the of headings contents a table, but are in page a as number usually shown list sections order should is document. As dierent headings with many table actually describe document. ese in contents contents. A 5.31, it headings that of of in they to Heading they 2, Title, and can be Subtitle that suggest where applied. in short the appear locate each Fig 5.32 Using styles simplies the creation of a table of contents section. Generating Once the styles headings, the place the where T able table the of from you contents the at see contents applied contents the list icon menu that will been of near Contents generated then have table cursor the to should be of dierent levels contents Fig 5.31 A table of contents provides an overview of the document’s contents and how it is organised of the contents need to headings headings can add or be is of the using specic one be a font step. If you can style select with one compared to colour the styles 122 for that style main point should and be to is a and colour heading is the a simple black click. is has create Arial, 12 each after processor headings selecting are numbers heading ways style, size the Arial, 14 heading a word easiest style. A page to create time-consuming, especially modify Fortunately , every One and in in table to of apply labels a in should another black, then faster 5.32 created. text document font, then you contents selected and table feature. to choose much if been colour, while and available, with has this way a point heading. Figure it a the required when the size shows such and some as of the Heading 1, select styles indented for generating a table of Typing document contents Fig 5.33 Group of icons Selecting the and 5.34). e various required generated. First, placed. en (Fig. 5.33) (Fig the be beginning location. If the can list Fig 5.34 Options for generating a table of contents a locate the suitable list were in or is selected, the list. 5.6 Linking to a to page either list e contents number. e the actual section page key e the with word cursor at a shows contents page in while list list where heading can the tapping entitled the processor line in and used is to its located for go to ‘Cohorts’, hold the the page and include the page new numbers heading only, or (Fig the contents entire 5.36). to that the the ‘Cohorts’ (Fig to the of page navigate example, to for locates heading be heading document. For heading that each update Table Ctrl 5.35). places the document. Fig 5.36 The page numbers or the entire list in the table of contents can be updated Deleting is also e Fig 5.35 The Ctrl + Click key combination navigates from the contents list to one or achieved table updated is more using updated page headings the same with the from the Update contents Table remaining list option. headings and numbers. the select page Questions Updating If you wish the to contents add another list 1 heading to the table List of of the main contents. Heading contents, select the heading and apply the return to the contents list and select one Update Table Practical Exercise 1 11: Using the Generate 2 Use dialogue exercises Table of with a in each table box using prompts Microsof t of heading contents 5.31, make on a new placed If a new + at 4 page. the start heading. en heading called to navigate press Enter to the twice Registrations and add section is that Use to the table Heading 1 and added can to a document, update the table what of are contents? Ctrl Return the of contents list and update table. + Click heading. Delete of 5 Click for table 2. methods Return the a document. Ctrl only a Word 3 Figure styles generate you contents headings document the options. A the to of two the Use required appropriate 2 style, then steps to the to navigate this table to the Cohorts heading. of contents list and update table. a Fees. 123 5.7 Mail merge Mail Why Mail merge is an processors. Such Sometimes a business will want to send a to a lot of people but each letter has to be in and some way. For example, if a business send out reminders for unpaid bills then the be identical except for the customers’ names and reduce the amounts and could it, and be then done by making customer. e editing to the do and a – delete then ver y type tedious hundreds of in the the and and new to be standard would address for make and each this other job, especially document with data list of it to; if details, 4 Company Clavery Lotte Team is a second the details there be are are are list of of the the is a must details people master are to be people letter. is creation uses of complete 5 Username Password Clalo Lotte Inc. such Zacton N-Ta-Tane Aliza Zacto 3 Allen Master rosal allen 3 you in into saves of the a labels mail the produces list by spaces lot and of as Gamers 3 4 5 find your login information Primary with If you are unable Remember the to log in, workshop please will be respond visible Your password is: Dear marked in time. Along printing the as appropriate the with envelopes letters master letters, the are popular merge. Tuim Clavery, Thank you Your username Your password for your response. is: is: Please find your login information on to this Lotte Apr 28 at 6pm to letters- letter in for the each list Ross, below: Thank you Your username for your Your password If you response. is: Please find your login information below: rosal document merge message below: Clalo 6 is: allen fields have the password reset. are unable to log in, please respond to this message to have the ECT reset. Fig 5.37 Mail merging lets you make many personalised letters from a list 124 two choose Mala, Dear Please these many putting person response. to markers correct), you One your want letter, with Merged for the 2 Ross you as Group Alison Thank two 6 4 ALL 2 create added. W hen (and function. is information Gaming one the merge there easy would the Dear 3 Tuim repetition. Y ou edited. Secondary 2 letter, saving needed information. But repetitive letters the changes facilities name of owing. typing all the addresses documents is word t ype and where addresses most this letters write would in were names to feature automate slightly documents: dierent programs standard job letter advanced Merge? Remember the workshop will be visible on Apr 28 at 6pm ECT password 5.7 ere are create four main mail-merged steps that must be followed Alternatively, select to using letters. right 1 Create the list: If the list containing the names mail of not of already the people exist then to it send must the be letter to Write the letter: e letter to should be word processor. Special in the letter where of codes must 2: customers 3 Link the now be letter be Per form to the letter addresses which put into mail performed, one one for so addresses the of W hen in is in on process documents the Mail the must Merge names Click 2 Select 3 In and mail produced the merge type each is and this method of other personalising individualised names and W hen letters list, this merges which For mail is are letter. 4 called are a much produce To example, a club need to renew or correspondence only for some mail useful could than select of the people merge. Selective ever yone their simple in the a mail in W hen In to these of from a by Par t 1 1: window relevant to (Fig your not any set have button a and ll if letter in you under address ever y want eld. to add, eld. entr y, click at to 5.39), New Entr y. Add all time. nished entering all of your data, save location merges, reminder letters Address putting 7 Click 8 Select saved your so list that List a window , save name in the in My somewhere you can nd the it le Filename Data else the for folder. Y ou remember the nal the eld. is Sources but for mail the merge. Save. Edit Recipients List. e contacts in the people list will appear in the Mail Merge Recipients database could where you can edit the list if you need then that you can also browse for a list that already saved Word to by to use as selecting your Use data, using an Existing Select List. per form merge Creating Navigate select tab: people. Microsof t mail is List Customize have usually Recipients a Mailings List. do another Save list is can mail is Using the example, title, name rename you to. Note sent for OK. the list a database. names membership members. Mail-merged be identical to window of that for data, one new who labels. In Address the make data selective letters is information. to more recipients organisations merge sent and New data on delete 6 Selective the Labels. Recipients. a New eld; click circulate of or records selecting Type the Click 5 use L etters, Envelopes data information. Y ou containing list. e of Select the each the up envelopes 1 the Businesses, clubs, schools one the the letters. person lled two contains document be and that le merge: each will ese together knows addresses list: on to placed appear. and linked function 4 should names new appear document. Choose documents: Setting creating the will are created e the Word pane you created. send in the task if does Par t 2 merge. A wizard merge and types addresses the Mail the to a letter, the Mail label, Mailings Merge or tab or envelope (Fig Start 5.38), then Mail Merge icon. Fig 5.38 Mail Merge functions are on the Mailings tab 125 5 Word processing Fig 5.39 Adding details to the New Address List for the mail merge Par t In 2A: the Manipulating Mail specic Merge records recipient, or if by your data Recipients checking there are a window, you the lot of boxes next recipients can to select 4 Click 5 Repeat into each you the arrow next to the column heading to select categor y in that column. If the the main arrow next 4: column heading categor y is blue, that already. To heading recipients list, click check all has 4 until Close. all the elds are inserted document. selected names in the merge Before previewing labels, click the option to to the layout of the labels. a 2 particular to Completing replicate any 1 click a 1 particular steps then can Par t click Insert, and Click Preview Results to view your letters, labels or your envelopes. click Clear heading have OK Par t of All. To the nished to return 2B: Select sort item to Data the sources ASCII ◆ Microsoft Word ◆ Microsoft Excel ◆ Microsoft Access ◆ O utlook Par t Y ou 3: contact now your to sort data Merge you can the for all names, by. W hen the 3 Click Finish 4 Click Edit 5 In type the to sure to merge insert use To merge all with Word b To merge only c label information names, addresses elds and To list. To insert a P lace main 2 or 3 126 In cursor at Insert Mail the Merge Fields window, select the on the where other the merge then To 6 Click 7 Microsoft 8 Print a documents, click the window, click range type document of the that All. you Current numbers in in Record. documents, click record see From, the From boxes. OK. Word will create a new merged document. or you data save the document just as you would any page. document. want using the Word will open one new document that eld: the appropriate position in the Under F ield or, if using W izard, select window, click the the eld the Step More you by Items. want. all your you individual and SBA would letters circumstances, you document. It document for the most merged Merge Document merge: envelope document. Click Step the to document and contains 1 want and Microsoft recipient New a les merge Documents. W izard. lists. the to you other Be Merge records les your Individual merge, click the letter, Merge. you documents the & column les Completing can uncheck list, click want Mail ◆ text the you selecting All. To merge you any is it need more again to document do if you the were not useful save for that to merged. need save need to the the main to. However, document grading. save just as 5.7 Mail merge Questions 1 Identify 2 State Mail two two benets of documents Merge the that Mail can Merge be feature. produced with 5 State 6 Explain 3 Why 4 Give one data sources. selective 1 12: Create mail advantage Practical Exercise choices of output for a merge document. three ways of selecting records to merge to a feature. new is three the merge of the using exercises Per forming letter a mail shown document. useful? dierent types using of les as Microsof t WORKSHOP merge and save Word it as Dear «First_Name», WORKSHOP . 2 Create the Word data source. e eld names for Thank the data source should be: youfor information Company, Username, Password Include the records below your response.Please nd your login Firstname, Lastname, and and name below : Group. the data ◆ Your username ◆ Your password is:«username» le is: «password» INVITEES. 3 4 Merge to Retrieve merge a new the again document. WORKSHOP to all persons If le in and the list perform in the Group you are message unable to have to log the in, please password respond to this reset. 2. Remember 6pm the workshop will be visible on Wed at EC T. INVITEES Firstname Lastname Company Username Password Mala Tuim Gaming Maltu Tuim 4 Claver y Lotte Team Clalo Lotte 2 Alison Zacton N-Ta-Tane Aliza Zacto 3 Ross Allen Master rosal allen 3 Inc. ALL Gamers Group 127 5 Word processing Exercise 1 Use set 2 13: the of P lace Creating same labels the a data of eld set as your of in labels Exercise 12 to create a choice. names on the label as shown below: «First name» Group 3 Name the «Last name» «Group» document with the merge elds as Labels. 4 Before the 5 mail of Name the Use set 2 14: the of P lace the merge, click layout Exercise 1 previewing the nal same the 10 the and option completing to replicate the labels. merge Creating size labels a data set as as LabelsM. of envelopes in envelopes eld names Exercise (41/8 on the × 12 to create 91/2 envelope a inches). as shown below «First C/o name» «Last name» «Company» Fig 5.40 When creating labels, you need to update the layout before merging 128 Printing In order Print to print processors. is printer. ere to Pr int at your monitor sends + the various you have option P) print colour includes e black on is in displays allows scroll order you bar but that command the File many the and word default that you need document. take document the features screen news to same such as if your to to you or do review all the scroll slide printed in not arrows or as the on the printed footnotes, headers will the only in white. print Print page displayed and to the and can be black of the see columns it. e through dierent you have features a printer white, characters document is to your numbers, multiple and the good you look breaks. Note, however, that in the on options nished enables generally footers, page print found document document. e will result. is and document, select Ctrl 5.8 document Preview Preview look (or are know, once e your commands the your Preview printed document PgUp and page. using PgDn keys. Y ou the or can Esc also key print is on the Pr int choose the to quit Print keyboard document if to there Preview return are no to by the tapping document changes. range option document lets that you are indicate to be the pages printed. Y ou of can the choose to Fig 5.41 Options when printing a document print the entire pages. Once document you select page, one the print page option or you selected want, the Questions print command sends the job to the printer. 1 State two ways in which you can activate the print feature. Copies 2 is option lets you indicate the number of copies What is the Preview print, and whether multiple copies are to be in order) or grouped (all page 1, then and so the Print and Print Name the three ways of indicating which pages of a all document page2 between commands? collated 3 (printed dierence to are to be printed. on). 4 Explain copies two of a ways in which you can print several document. 129 5.9 A l lable Fi l l a b l e electronic inf or mation in sof t electronic f or m is copy. It ver y c an forms use ful be f or g at he r in g email ed Table 5.3 Content controls for llable forms or Content completed data. It online c an also w ithou t be having com p l eted on to a re-enter the comp u t er, control Description icon l ap t op Users can type multiple paragraphs Rich or mobile de vice. F il l ab l e f or m s c an be u sed text f or Users online up job quizz es, sheets, sur ve y s , pay ing applic ations, than in com e f or paper-based online tax regis tr ati on, online e x am ple. e y f or m s b ec aus e an d are the Plain s ig n- online Check example, to accept elds c an on l y be the required c an f or matted to d at a. acce p t be Select box For yes/no respons e s or an op tion from of text from list of choices or type in information text , Only Drop-down dates, amount an X in the box to select the option Combo f or matted limited Used for options: clicking in the box places box bet t er eld s type text a select from list of choices list . list Date Browse to current date inser t a dateor select today for picker Design Used Mode Used Command form button be Creating a e steps following form using Add the to in customise advanced for text forms as llable explain Submit or on to processing. These labelled Microsoft the a form submit buttons Click the may OK form how to create an electronic Word. Fig 5.42 Online llable forms can be completed using a mobile device ere are llable some applications electronic designing forms that specialise forms, however using Microsoft we will Word in creating focus and on Google Forms. content Developer it must most c om m on c on t ro l s and their i c on s used to c re a t e fi l l a b l e forms a re rst descr ibed the the the Developer added the to the ribbon. e it list tab to is hidden of visible steps may display by default, tabs dier the by of Microsoft W ord you are slightly based using. Once the in tab has been added, the list of content controls 5.3. will Fig 5.43 The Developer tab must be added before a llable form can be created 13 0 be version Developer Ta b l e display which on a re uses controls. However, as customising The to controls Microsoft W ord content tab be available to create your llable form (Fig 5.43). 5.9 Open a template document Microsof t to Word or create design has the many a Fillable electronic forms blank form online templates that can Fig 5.45 Content controls are used to create llable forms in be used to help you design your form. Once you are Microsoft Word online in this various However, feature allows categories you document to can for also create you to search business, use your a templates education blank own for or spor ts. word-processing form as shown Set change proper ties for content in For F igure or controls each content control, the properties icon can be 5.44. used to format example, it down is list, or used how Customise Clicking the customise For is ‘Click here enter the to the the generic to enter the for your for the for you drop- to content the text ’, you last a form allows label enter presented. For displayed. icon labels be options be of Mode here will will labels generic ‘Click data date Design the Protect the to a the example, if control to how controls. text can content modify it name’. form Fig 5.44 Sample online form with information added Once Add content Depending on to the create the content, you can create a type the text and controls in the various cells the layout of the form by aligning the content boxes, text controls. A boxes, date form can pickers have and multiple drop-down entire form the on what information is required on the should increase the font size layout appropriate font style, such as of ready to for headings Times New click the Restrict Editing icon tab to prevent others from modifying the form. Forms form. and a Google Form is useful since it is created use and can be easily emailed or shared with others. Roman Responses or are lists, online an designed, you check Creating Y ou and Developer Google based been labels the and has to in organise form table the to your form can also be viewed as soon as the user clicks Arial. the a Content submit any and spreadsheet. ese the online form, you will need to know the types check of controls. ese data in the boxes, text lists, and can forms be can downloaded also be to created Google Drive or accessed more allow you to form. Content boxes, date advanced features enter and such as entering in a search engine. specic controls pickers by dierent www.google.com/forms content data controls using For button inc lude drop-down Y ou should content name control your for the form rst and then select the rst question. command buttons. 131 5 Word processing Fig 5.46 Example of a Google Form using a content control for a multiple- choice question Note that the Google Form Google+, Facebook, and attachment is to the user ’s submitted, individual responses can be can also Twitter, and email (Fig responses viewed (F ig be shared sent as 5.47). As or a via an the summar y form of 5.48). Fig 5.47 Google Form received as an email Fig 5.48 Responses received via Google Form 132 5.9 Fillable electronic forms Questions 1 Explain one advantage paper-based forms and and one online disadvantage of 3 Order i forms. ii 2 Explain the dierence between each of the following Protect Add the steps for creating a llable form: form. content to create the form. the iii Customise iv Add the labels of the form. following: a rich text and plain text content the Developer tab to display the content controls controls. b combo box and drop-down lists. v Open a design vi Practical Exercise ese 15: Word. Y ou the the depend can Developer use Developer on a your tab Open 2 Click a version browser to of search Microsoft for Type NEW SERVICES en merge the ‘Adding blank document to for content controls. a table with two two columns and FORM columns in in the eight the rows. rst same row. rst row. Type the information in the left column and document. and then content Q uick controls in the right column as Options. Alternatively, shown the proper ties 3 apply click a form. change Create tab’. blank File the create 2 4 1 or or exercises Adding steps Set template Access toolbar and select in the table below. Change the font style More to Arial and the font size to 10 or 12 point. Commands. 3 Click Customize NEW Ribbon. CUSTOMER 4 L ook for the Developer Main check Tabs list box. Click and select 16: Create a f illable text content control CUSTOMER’S FIRSTNAME Plain text content control CUSTOMER’S LASTNAME Plain text content control OK. form METHOD Check L et ’s use based content control type ‘Cash’ Word Check 1 box using then Microsof t FORM Plain the PAYMENT Exercise SERVICES NUMBER on a blank Figure customers who document 5.44. e are to create online applying for a a form new form is then for Check then Internet NEW ser vice. SERVICE REQUIRED box content type ‘Debit box control Card’ content type ‘Credit Drop-down list control Card’ content control 5 SIGNATURE Plain DATE Date A drop-down question. Add drop-down 6 W ith the the list the is used text for content content picker the control content ser vice control box control required for the list. drop-down Properties option list in still the selected, click Developer on tab. Fig 5.49 Example used for creating a llable form in Microsoft Word 133 5 Word processing A dialogue options to box the will list show (Fig so that you can add the 9 Click Add again, to add DAT A PLAN. Click OK. 5.50). 10 Click 11 In the edit of OK close Developer the the to dierent content the drop-list tab, select control controls dialogue Design box. Mode options. Replace as shown in to each Figure 5.51. Fig 5.51 Example in Design Mode to edit the text 12 Click and as on Select others 7 Click on Add in the dialogue box to in icon in so labels Figure that of form the you the 5.52. To Mode entire from Mode the Design the Editing Fig 5.50 Adding options to the drop- down list Design shown click 13 on customise can content preview edit controls the form, again. and click Developer modifying the the tab layout Restrict to of prevent the add form. INTERNET . It Name and Value will appear in areas. Click the Display OK. 14 Test the form. Type number, your 8 Click Add CLOUD again, to rst and last as the name, data customer plan as ADDITIONAL STORAGE. Click Fig 5.52 Editing the text in the form 134 add 120163-03 the option the current from OK. date. the drop-down list and select 5.9 Exercise 1 17: Create a Ensure that for exercise. this 2 Type 3 Select 4 Create To have a Form 6 Google a blank the of a the Gmail the account in a your email option email to the address ‘Include to test form completed in form the electronic form. Click email’. Click (Fig forms Send 5.54). browser. form. same new or Add to www.google.com/forms add right you Google Fillable form as shown question, click in the Figure plus (+) 5.51. to the form. Fig 5.54 Exercise – Emailing the Google form Fig 5.53 Exercise – Creating a Google Form 7 5 Click Settings in the top corner to preview the Check the the form email and of the submit Google form. Complete it. form. 135 End 5 Multiple of choice chapter exam-style questions 7 questions A list of shor t sections 1 Each of the following are methods of editing text in document, a moving c Find d spelling and and and Text that is at and column b mail c primar y d table to just below the line merge document b indent of contents. Sending size is referred to a document to only some of the people in and is a feature in: as: a selective Mail b Find Replace c moving d password and and Merge copying subscript protection. superscript. Questions The to feature nd one that or automatically 4 page a: grammar. smaller alignment d 3 called Replace a c dierent their copying lowered a is a alist printed the with expor ting 8 2 describe along except: impor ting b that document in numbers a headings the a copy b drag c Find d spelling Text and more the endnote footer c footnote d header. that with you specify another 9 and 10 refer to Figure 5.55. document word and is called: drop top b it the Replace and a through words change grammar. whichappears inside look paste and and will at margin the is top of called each page but a(n): Fig 5.55 9 5 The feature make a to a that highlights document is any editing that Two content drop-down b command c plain d rich spellcheck c Track d Word the form are: button button and rich text text text and and command drop-down button list. Changes The content control where users Count. document following 136 in command you amount a used and comments b A list called: 10 6 controls a can be protected by each of of data a rich b plain c check d drop-down is called text the text features, except: box password b read-only c Mark d Save as A. Final list. (a): type only a limited 5 Shor t 11 answer Oliver as a 12 questions nished a repor t on his computer and saved End of along with a proposal document, to 15 potential authors. it Name two input devices that would be useful him when work ing on the UniPress What does .docx in the name of the repor t Mr. and what type application was used 1, the Chuchu Diamond repor t? We Mr. are for proposed next copy of create day the the he wanted original updated to update repor t. it Describe but keep how he St. Chuchu: pleased proposal The City to Dear create Main 2019 Tzay 147 represent, Rd, repor t. July that you completion. have chosen Please our contact publisher the editor and below would who appreciate has Explain page e The i how of his repor t Oliver Editor's add a graphic to the Explain why for Explain be could to review our your Email address rod@unipress.org cover a a table table of of Yours truly, Ms Jara contents. contents would be E. Senior ii you repor t. needs useful if assigned could repor t. can been publication. a Rod d questions Catherine needs to send a copy of a letter (Fig 5.56), Fordox c exam-style Repor t_OT.docx. for b chapter the where placed in Griffith Editor repor t. the the Ref#:51718 table of contents should repor t. Fig 5.56 iii Write an example contents of a containing suitable the table following of titles: a Introduction Updates to Additional for the project of of Mail new new sta ii at Oliver 10 of i ii iii now his wants to send the updated repor t to iii colleagues. Explain how that one no List two the repor t can make methods Describe to one his can that protect the changes he could to repor t so b i to of Use the the for FName Address 131 Mr Birnbaum Steve 2042 230 Mrs Bradhurr y Eleanor 9 727 Mr ChuChu Tzay 147 520 Mr Fosten Terence P . O. Box 881 750 Ms Rhone Jos P . O. Box 98 622 Sis Stens Cecile 127 Drive Rogers Dia the Rd Hill St Pacif for list Lane the your Merge feature required for Mail in the will letter, change identify in the above. applications that can be Merge. feature the was that sor ted which bottom to and list create authors only was used to create the data. in of of ascending author ’s the rst application data. Then envelopes assigned order name by would be list? word-processing letter feature LName Mail documents which other two with Author#, Title the address elds Name at Author# the ve shown If method. c main document format ii each two from Name send colleagues. disadvantage use The following data was saved in a le called ‘Authors’ . it. use the least used Oliver to Merge. Apar t sta wishes letter. State Summar y f assistant this i sta Assignment Location Her to of use size the 4 to create Mail 1/8” × Merge 9 1/2” Rod. Editor Email ResponseDate Raci rachel@unipress.org 08/31/2019 Gena geneva@unipress.org 08/15/2019 Rod rod@unipress.org 08/15/2019 Gena geneva@unipress.org 08/01/2019 Rod rod@unipress.org 08/31/2016 Raci rachel@unipress.org 08/15/2016 137 A PT E C H 6 WEB 6.1 Introduction Aweb pageis It contain may other web a document to you we b can text, images, videos pages and les. Web view page using are abrowser. usually Now, new are a language called HTML (HyperT ext being universal language that was website produce the confused by language – a web layout of thinking it isn’t. It browser uses web that pages. Do HTML contains to is codes present the a not and can be a web page. e browser then linked together ‘tags’ that and categories of e ◆ and use To of HTML share users To link the interprets read other a page in two HTML documents can to web helps documents: share browser ◆ format on basic for was the images these to on tags the address HTML hyperlink views Any e the web code either the to Internet, so for the the can common be used browsers to are Static The website the content same Edge, Microsoft use related access a Google Firefox, Opera and Apple Internet a les, but Y ou open not This brochure brochure website updated website a web page by so past Dynamic Here a website add called a URLin on web page for engine to nd a the or This website online A web Web application be the early provide 138 days, web Explorer, Mozilla entering text. Y ou web information pages for 6.1. websites this way is remains like an generally online brochure. Viewers for content. the that interactive Content visitors is can version stored search of as the it for is web pages or other and content. user can login inser t and create images and new content, generally is what a is viewed website that on payments apps added from provide to having to Twitter Lite, a is the website. integrated visitors push device’s download it to to the notifications home from screen an app receive website. and can without store. page. let you phone Pinterest and weather apps are or that push notifications to the user's browser. view a unique are popular because they cater to all types audiences for bar. For education, entertainment, sports can also or web purposes. Knowing the purpose of a example, therefore sets the tone for its content and the a website that is formal or use reects the seriousness or carefree impression page. that In in is content, E- commerce informal asearch in Table them. theaddress this this ar ticles, organisation. Creating web explained Chrome, ‘www.oup.com/oxfordcsecforit ’ opens support links. Some in website typing web an informational address are website. view of can multiple any material Safari. Browsers create or navigational paper-based search Editable Websites HTML of and of examples Microsoft page help that documents page. Clicking downloads day. document. Hyperlinks related ones view. document. browser most for web through websites control Internet ever y existing to ways: created HTML documents : you major and Table 6.1 Categories of websites cannot produce modied standalone version the created become programming called text being developed general to updated are Markup pages Language), a websites written A in DESIGN design andhyperlinksto pages PA G E were intended education and the to only government. visitors browse types the of will use to decide pages. Table websites and 6.2 their if they provides purpose. continue to examples of some 6.1 Introduction to web page design Table 6.2 Descriptions of websites and their use Use of website Enter tainment Corporate Explanation Examples These websites use videos, graphics and live streaming to market their products, or YouTube, for entertainment. Many online games and video sites use Adobe Flash software to spor ts display content, so sometimes people call entertainment sites 'flash' websites. games Also called conduct and Shopping can These are These such the business provide news form website customer e -commerce and pay websites as website, business. The also products Information a of it with selling with a around encyclopaedias, the website information for to marketing users about and the not to cxc.org, online oup.com company suppor t. products. methods users happens uses provides websites online provide as which Netflix, sites, such as a repositor y the training or world. Users credit of historical Other general can browse card or and websites and select Amazon, eBay PayPal. current provide information, information Wikipedia, in Fox education. News, MSNBC, CNN Notesmaster, Caribbean360 Community-building These or with social networking websites others events Academic or Users professional Personal or with share potential blogs Personal profiles online life or focus who friends, their the and are specific and interaction interest. of Users people share who want personal to communicate details, pictures Facebook, and Instagram, acquaintances. por tfolios and created and or career accomplishments online for LinkedIn, may Academia, ResearchGate owned editorials writer Flickr, SoundCloud, Twitter clients. interests. These journals business. The social common resumes, websites diaries, a family employers and on share by individuals websites that even are reflect comment who weblogs whatever on or is politics share blogs going or their – on news personal Personal generally in or the share forums, writer ’s blogs, video blogs (vlogs) personal opinions. Mobile These websites to normal the content is are ideal version viewed of better for a mobile website on a devices when narrow and are often connecting screen width offered with and a as mobile uses less an alternative Any device. Their data to display for the website viewing mobile created on a device information. Directories These websites alphabetically, are a users type can of online search director y. terms and However, phrases in interest Planning your web rst task is to decide the purpose of your do you want your or how content it will you be are website going to organised, and enough to do? is more Yellow to Pages, Google, encourage repeat Bing visits. e use of put how on your the web pages combinations of colour, images, sound, and tone of language can capture or lose a determines visitor’s what searching website. video W hat of engines. pages one Y our instead search attention. pages, are linked. Organisation Web pages should be well organised, with information Content arranged It is of is ver y important presented those in who a e main supply manner visit visitors’ interest it. e so screens enough that that and the message that captures initial they want and to your the screens connecting information of attention should browse web website pages maintain a attract the site. should visitor’s the and be user in to browse logical selected sketch and the how how categories further the you content through manner, so for that each subcategories. is information interesting reading. Y ou various would on and web want web pages your in sequential sub-topics should relate website a helps to can therefore each visitors other to view page. 139 6 Web page design Navigation Navigational menus visitor the go to or to connect Other are website the to an web seen in a a to the sub-categor y of or be pages of to able in or a are one to move through manner Hyperlinks web pop-up documents. Any logical pages the a or or are used locations documents. web visitor page, with before breadcrumb and trail page it. An should visitor must Also, not so or time aware view all modem the be users to have for also number seeing the a page aimed take the same dial-up view videos. Websites devices the before speeds taken of web page that has pages of Internet customers at, or this of a interest. connection, may many optimised loading-time increase images for, issue into consideration. header. would each Y ou mobile ‘ breadcrumbs’ which path current or external below the the pages other page line pull-down interest. links show access breadcrumb or web single other should pages navigational include to area same Breadcr umbs taken can categories directly within links hyperlinks a main Economy Secur ity have one being example of a is: A website should condence as credit features if have users card or should ample are security providing personal include features sensitive information. ese measures to to assure data, such prevent security hackers Home > P lants > Potted > F lowers and e the visitor can go breadcrumb including opening directly by c licking ‘Home’, which screen or to main any on will web of the take the pages hyperlinks them back page. Another in in to of links websites websites that are can related provide to your are those website’s web shows page, also the called address the or URL of integrity of data, hardware. Questions to other Name the application that is used to view a web page. content. State a the to name of produce the web universal language that is pages. particular 3 State the 4 Suggest names of three common browsers. path locate 5 a Explain two ways web the in which a user can open or page. association between a website and web page. Fig 6.1 The URL of a web page is shown in the address bar 6 7 State the login to State the that 8 is categor y edit used online b viewing c socially State of website where users must content. general a purpose or categor y of website for: purchases three planning 14 0 the useful used 6.1 and compromising it, the 2 Figure from information 1 set viruses a on a small interacting features website. device with that others. should be considered when Designing As you will be layout start your interested and web page that are links is design, you in to the web other need pages to think and about consider pages. Remember dierent, but most have that certain who e left menu the ever y the web to all web pages.ere right or website templates formatting builders so and that that users more oer spend time free less are focusing design time on content features that you more general layout of a web page is shown each a of navigational the major bar or sections of area contains the most important or images place and here staying on the should on the web page. e attract web the page or information visitor into reading website. content. e A includes to many with the links 6.2 page page. paragraphs online sidebar shows we b features e common or that a in Figure footer is important It should and include should include there, any Header Left should any other information that 6.2. how contact privacy notices. Web page be included recently information the on all content and web pages. was placed copyright, legal or Right Content sidebar content sidebar Y ou should that you page really know you have create a web something page about. If created, do not based this make it is too on a the topic rst web largeand Footer ambitious. Some Fig 6.2 General layout of a web page advertising a landscaping e header displays the name of the name, logo or company name. e name placed at the top left corner simple of each web header also provides a short statement or explains the purpose of the web page. If you a the web page header that takes is the not user the main back to page, clicking the as hairdressing, production. main structure will be sucient to develop your at preparing the information for display and the site. Sketch a plan of the website’s structure get an idea of what you want to share (Fig 6.3). Y ou are can on such couldinclude phrase to that music business pages page. building e or or web is skills usually trade for website, web A page, blog ideas on in page. also the visit each of syllabus. Each the one stores, blogs, business recommended provides and website samples personal of builders online websites. HOMEPAGE Planting Flowers Payment ideas Schedule Potted and Plants delivery a Garden visit Seeds Seedlings Fig 6.3 Plan the structure for your web pages 141 6 Web page design Backgrounds and themes What’s W hen using you a create a web background or page, you theme to should help capture images of or a watermarks background used to visitor. is for give your your to includes create web web an a use of colour, interesting pages. A pages the theme can professional be having all navigational links the background colour, the font and you tree shade, it that come not but across only a provides it does. and with there’s maintenance to worry about similar, ble and often ample while look, for looking not shade no example sale! the It’s attention for consider font to grow in climates with hot, colour dry summers, and even tolerant of consistentthroughout. pollution and urban conditions, you can Text Many and images website upload, edit Images builders or and remove videos can have your be options for you text, images embedded to and insert, Flame videos. among the fall text, of or the text can ow around the image (Fig 6.4). If red color the simple web pages using Microsoft the document compatible web will format and not single create web web page converted when page. Although could be other you ear ly save versions any text a the pages, saving converts to of for autumn Bush makes foliage it an really landscape draws plant... attention and when information in rows. In summer, the web- document Microsoft your and ery seller Word, any planted in The best you it text, graphics, tables, hyperlinks the Burning excellent create is as a Word document formatting as a into Fig 6.4 Images are useful to suppor t the content on the web page. The hyperlinks on this page are shown in bold. HTML code. Any compatible graphic images are also converted into web- formats. Y ou Hyperlinks and bookmarks should navigational hyperlinks Hyperlinks and bookmarks can add and navigational functionality to your be to a website use page to web page. A hyperlinks hyperlink to move or word that automatically would can be an for viewing. Y ou click opens on another le be directed to another web ◆ be directed to another position a hyperlink page, le or within ◆ open a details new as using email given on a of visitors Word, and to the an actual web page. Y ou send same can so that when the user clicks that of text or even an image, the user place in the current use as create the particular is directed document, to to a web or to a given email contact address (Fig6.5). document the web can also ll out a ScreenTip describing page who may want a description. using contact website. Fig 6.5 The underlined text in blue indicates a hyperlink 142 to interest. Hyperlinks function bookmark) message the in on specied those known areas allow to: Y ou (also specic to contents or page ◆ area of icon, your document home table from portion image select created hyperlink web to or a web they page. V isitors area have structure, can organisation therefore the link to 6.2 Designing a web page Fig 6.6 A hyperlink can be created to link to dierent documents and locations Bookmarks part of large are a the hyper links web location later. is whole a on with the ◆ begin ◆ page not when have you or feature with can many that document that are name, word means bookmark that page. ey documents typically Note are a can the a and spaces may than locate that underscore for on ver y you to assign reference through the to the location, the it. the to useful want include between dierent sections. ey bookmark, it can a looking searching easily naming letter any use page or phrase you rather to especially words or that jump should: numbers words. However, join words for longer names. Fig 6.7 Bookmarks are hyperlinks that jump to a dierent par t of the web page Questions 1 In the general layout of a web page, explain what is you would displayed in the rearrange the web pages for a dierent header. perspective. 2 Use a Figure Write 6.3 the for the following breadcrumbs navigated to that questions: show you 3 Explain 4 Describe Figure be 6.3 is a book mark is similar to a hyperlink. three ways in which a user can be directed Seedlings. by b how have not organised. the only Create way another that the sketch website on click ing on a hyperlink. can how 143 6 Web page design Practical Exercise 1: 1 Open 2 Type exercises Adding a blank text document as 3 Select the 4 Select Insert choose 5 Type 6 L ocate To 1 go the a Select on Web Enter. is the Menu creates or 6 left pane, select Existing File or Page. Browse the to locate and select the ‘Chapter6Ex’ document. page. bar the 7 Click 8 Move ribbon, then Ctrl OK. the + pointer Click to over open the word ‘HERE’. Press the ‘Chapter6Ex’ document. ‘ Top’ and click paragraph Add. and select the last paragraph. on the Menu bar or ribbon, then Bookmark. the to the sixth Insert choose Type press document. Save word on On document. and your name the in Select 5 ‘Chapter6Ex’. rst Word Bookmark the word 8 Word in Microsof t bookmark =rand(6,4) random 7 a using name ‘End ’ and click Add. bookmark: Insert choose on the Menu bar or ribbon, then Fig 6.8 Linking to an existing document Bookmark. Exercise 3: Using hyperlinks to be directed to a website 2 Select 3 Tr y the bookmark name and click Go to. is locating the Top and End exercise hyperlink To 1 delete Select a bookmark: Insert choose on see the Menu bar or ribbon, then this Select 3 Delete the bookmark the name bookmark Exercise 2: existing document and click Type named Using a blank the contains hyperlinks to be directed to access be versions a website create a should in your have browser. To access to the online. Word Select the word 4 ClickInsert and and a Another the select Hyperlink the format of web paths, so when you type in or that Enter or the Enter it text. For a automatically example, type Word Spacebar, the document. As website becomes link that looks like www.oup.com/caribbean HERE.’ create a hyperlink using specic text: ‘HERE’. Menu recent option le Spacebar hyperlink press bar and Open a blank versions of Link is to (or from document and type the sentence: ‘ is Sentence contains a Microsoft the right-click Word select link Word, you other press following Hyperlink. In recognise sentence 1 on Word document. sentence: ‘ is hyperlink 3 of ‘www.oup.com/caribbean’ in following a in creates an To 144 to End. a click how Delete. you 2 you Bookmark. one Open to and addresses 1 show happen, you Internet Most 2 will bookmarks. on Insert the to a website.’ tab. text 2 Select the word 3 Select Insert ‘website’. and on the Menu bar or ribbon, then Link). click Hyperlink click on the text (or Link). Alternatively, right- and click Hyperlink (or Link). 6.2 4 On 5 In the the left Address dialogue 6 Click 7 Hover Ctrl pane, select area box, type Existing in the File lower or Web part of Page. click ‘www.oup.com’. + pointer Click to over open the the word link in Select ‘website’. Press your Insert Hyperlink the OK. the 3 browser. on 4 On 5 Select 6 Press 7 e a 8 (or the the on Menu bar or and click pane, select bookmark Hyperlink ‘P lace named a web ribbon, then Link). Alternatively , you text left the the Designing in can (or is page click right- Link). Document ’. Top. OK. selected text in the paragraph now looks like hyperlink. Use the Ctrl word. Y ou to the Exercise + will location 5: Using Click option notice at the that top hyperlinks on the of to the cursor the be hyper linked has moved document. directed to a new document is exercise uses the Chapter6Ex document. Fig 6.9 Linking to a website 1 To create a hyperlink using an L ocate rst 1 Open by or a blank copying using options and the in Word Insert Select the 3 Select Insert on Hyperlink click on On In the the and into add the selecting an image the left the (or image Menu and area in click or lower Insert click on of the On the left 4 For the new hyperlink Link). or Web pane, type 5 can use 7 Click 6 Click 8 Hover the 7 Hover link and OK. Click to open the link the in a then select the image. Press Ctrl + browser. (or Menu click le, type the or ribbon, then Link). Alternatively, right- and new bar Hyperlink Create the New name (or Link). Document. ‘Exercise 5 – document ’. current location shown under Full such as the desktop or your secondary storage device. Select over and path or click Change and browse to another location Page. ‘ www. Y ou the pane, select to 6 pointer paragraph paragraph. text 3 and (or the oup.com’. the on one ribbon File Select the Hyperlink Hyperlink Existing the second in click Link). Alternatively, right- pane, select address bar 2 word document image. click 5 tab one and Illustrations. 2 4 document pasting the image: the to a the option to Edit the new document later. OK. in new new pointer press over Ctrl document + the text Click named to you be Exercise created directed 5 – the to hyperlink document. Exercise 4: Using hyperlinks to be directed to a bookmark is to exercise move the Open the document 2 L ocate word is Chapter6Ex to a similar place to with fth the at least a six the same bookmark. document paragraph paragraph. document within using Chapter6Ex the in the cursor document. It 1 uses or use paragraphs and select a of the text. rst Fig 6.10 Creating a hyperlink to a new document 145 6 Web page design Exercise email A 6: quick way is you to create a blank 4 email may create typing and a to hyperlink the pressing address want Copy right to by document the hyperlinks message message if Using link use email Enter is this to to a blank address or be the in in new some in text 5 option. In a blank Word document, type Support ’, then select Select Insert on the Menu bar the Hyperlink click on 3 On the 4 Type the left (or text or click pane, select Hyperlink ‘Email address of 5 Type ‘Exercise 6 Click 7 Hover + it to 7: or Copy a in In 2 Select and your Figure blank the named Select or (or on on your the Text 2 to new to help you hyperlink display at the the then of the look at the you how to do in you Edit the Even More to line. en text to look at open the the steps this. top step of hyper link so that it opens a new 4 the and change dialogue on the document Chapter6NewEx. Y ou can Exercise 5 with Remove the to help you box second named click press hyperlink ‘More’ and can look right-click menu item in Ctrl with a the hyperlink right-click option to on the Edit, pop-up you ‘ less’ and the how menu is a appears Document for on you the in hyperlink 4 less’. this. that First. Y ou to remind ‘First ’ in when with bookmark do named Exercise this. L ook a steps to create bookmark in ‘More create at at the steps in this. named specied. removing the look the have left Even More. Use use tree of selected pane. Fig 6.10 Removing a hyperlink 14 6 can move More’. message. message have and and document, type steps that is text hyperlink. e remind the pasted do 6.11. can bookmarks the hyper links, rst word to new to Link). ‘mailto:’ appears subject email copying Word to over new the the from the Enter the address’. alternatively (notice subject word 1 jump P lace a First. Y ou Exercise will open Remove 1 3 pointer image, and or shown 6’ as Editing, manage text hyperlink text automatically). the recipient To the press OK. Click Exercise a ‘Even the itforcsec@gmail.com front line. Paste and to Link). Alternatively, right- and email lines cursor ribbon, then 7 your the the text. line click ‘More’, move ‘Email 6 2 of Exercise Edit to Customer word ‘Chapter6Ex’ document. Y ou the 1 end create word Spacebar. However, included second a a email the shown in Figure 6.11. Creating ere users are W hile pages also many with a word and online creating web their processor connect recommends can them a few via available and create a web basic builders and such to assist set of other web website pages. hyperlinks, the web webnode.com, weebly.com Getting builders websites web syllabus wix.com may contain your also includes and text builders email address require registration of the and password before along with an initial video; website website and you can start to create any you could lter and select have that be have one registered, you you for Now you that can made some one Adding need to select contain information, while graphics text and or videos. e pictures change your font own for web other sample you to builder types, font sizes graphics, pictures wish to create. For personal use or your website that will templates be used to for web you create have the chosen options overall available to background image. Added of Google your business, a available for colour or features, such Maps contact visitors If you are not builder to your preview content. using to sure web template, browse and add of to navigate form or upload as the to the location subscription to receive updated the order or builders allow you drag-and-drop add a logo, special personalise your Finalising your the page information. example, will business? selection, the edit the content you use to add your may web pages, most Once options background are your for for designs name of you of suitable page. However, the alignment; integration website type contact random web are user’s a pages. Once or that 6.3 page 6.12). Some sections contain preview or web the (Fig we b star ted Most for designs columns, graphics designs as page concept a web publishing should preview slogan or social your rearrange are media web them options icons to pages. your the to of options. Lastly, there your Before layout web web pages pages checklist to on test the your Internet, you website: Fig 6.12 Templates help you decide on a suitable design for your web page 147 6 ◆ Web page Make design sure colours that and website so and all on are the headings, links, images, font complement not too dark the or purpose too small of content your easily? viewing Is the design suitable for this small window? when Once you are satised that all links and web pages are previewed. functioning, you ◆ Click you ◆ on to the Check they each hyper link correct that any web to make sure that it Most or sounds play as should. ◆ Check that ◆ Check for email addresses are valid pages. ese are and pages web builders use website. However, you and orphan ready to publish your website. directs page. animations, videos are features as a single can click to continue to publish update your content necessar y. working. that Questions contain to the no links back to the previous homepage. Sometimes the web only page way to or go 1 to What do before the previous does not page always is to use the Back button, but Check that 2 work. the page titles on each web page and not too wordy . Page titles are List some of a they browser ◆ Since appear in search engine results applications require website? the features that are available for Explain why you should test your website before important, and it. in 4 Describe 5 What three checks to test a website. bookmarks. you do not know how your visitors will website, you should also preview it is the name of the web page that contains access no your a website. publishing since create are 3 sensible web-building can this creating ◆ most you using links back to the previous web page or to the a homepage? mobile device Practical Exercise 1 8: L ocate to see Creating and required Type the a open in demonstrates 2 it looks. Can exercises WordPad. Note not how static using web the how writing syllabus it following a view the notes program page Notepad, or that you 3 the alternatively HTML but this code as <head> A title goes here <h1> is is a page. </body> </html> 148 Browse line page of that be should change viewed 7 as a sure to can note le. en save it on EXACTLY minimise this the the see the le. en le. your the blue MyPage.html in text in the browser. MyPage.html window, and ‘text=“ blue” ’ to green. Save the again. Now e will the locate Now, maximise </h1> text to 6 le web make saved Y ou </title> bgcolor=“white” text=“ blue”> A you MyPage.html. Y ou but 5 </head> <body desktop as double-click possible. <html> <title> le window. exercise 4 accurately the where is works. as Save maximise colour the browser of the text changing the colour and should refresh change the in page. your browser. web 8 Tr y saving the browser html after le each each to orange, red time, and change. and violet, refreshing the 6.3 Creating a web page Fig 6.12 Creating a static web page Practical exercises using an 1 online Exercise web 9: Use a builder free web Select for builder to create web Select one of the recommended free in the syllabus and L ook at the and at create least two a on sketch levels of a concept of a detail in complete the Select one of the recommended free website free and, if you have not done so already, registration. Create in and options. Decide structure. then 2 the website builders online of website 2 builders your homepage pages the 1 one the a basic web website page structure to using structure one develop of an the idea in Figure complete the free online registration. 6.3. 3 Give the 4 Select 5 Add 6 Create website a suitable name. rectangles for your a design appropriate to the business idea. web at least two graphics, pictures or videos. page. 3 Include pictures and text to enhance the look a hyperlink to link same page relevant text to of content: your 4 web Ensure the page. that the fonts and colours are suitable 10: Using a web builder to create a wish to following create business a website based on one of the ideas: b in another c to an web web hair email Preview the evaluate for displays 8 a the page address. website 7 ◆ in topic. Exercise Y ou a for O btain website user and use friend liness the checklist and that the to content eectively. permission from your instructor before salon publishing ◆ online ◆ gardening. the website. gaming 149 6 End Multiple 1 2 An of choice example of a chapter exam-style questions questions browser is: 7 The header of a docs a summar y b forms b a c sheets c major d Chrome. d copyright, An e -commerce a website: a is b receives standalone c stores resumes d stores ar ticles, online web 8 page payments and web por tfolios pages and for its users other logo or a web page usually contains: information company sections of legal name the or web privacy page notices. A bookmark can connect to any of the following, except: a HTML b an code c another web d another position email message page, le or within document the web page. content. 9 3 Browsers let you __________ HTML les. 5 an a email edit b titles b view c links c create d major d delete. The least commonly used browser is: The on the following ser vices for Wix b Opera b Word c Firefox c Weebly d Navigator. d Webnote. is a visitor called would have taken to access a web Shor t are answer there are no: to all other the web web pages page. examples of free online web websites, except: questions Nathan wants to use a special keyboard to play list music b web c hyperlink d breadcrumb. at State play b A current page in the name of a special keyboard that can music. records a video of him playing music on keyboard. path Home / Water / Bottled / i Reusable the friend the The weddings. page a Explain what type of input and output is: devices a Home b Water ii State c Bottled d Reusable. c Nathan his i should name these decides of use a for the website recording. where users can videos. to use a web page to adver tise music. Describe most ii he the watch 15 0 means a: 11 a page page on creating a path web sections Edge The web connecting a page 6 orphan addresses a 10 4 Usually, the categor y suitable for him of to web page that is design. Give one free online website that he could use. 6 12 He wants Music, of him per to with name links his to playing. The hour and website Nathan’s Speciality samples main book ing of his content form, music and provides along with i videos the costs copyright Sketch a sections b Nathan to Day iv Date v layout with of the designed make Type iii information. a Email ii the state page, showing an online 13 (Fig the form 6.13). name of For a for each of chapter exam-style questions address of par ty of par ty Submit. Write an example children’s clients suitable of the information. book ings following, web End par ty of a book ing in the form for a on Wednesday. the content 14 Explain of control: 15 his Nathan it, but this 16 what music A Nathan to clicks there is the on no a needs web to do to transfer videos page. video sound. on the Explain web a page possible to view cause of problem. few weeks website type of Nathan later, Nathan adver tised computer and his by sees his someone system videos else. misuse has on another Describe what aected videos. Fig 6.13 151 A PT E C H 7 SPREADSHEET S 7.1 Introduction Spreadsheets when you results used in in are want a to particularly work with nance-related advanced statements features modelling that tasks such are as useful spreadsheets good choice numbers graphs. Spreadsheets payroll, nancial to are such and and therefore as software the widely preparing invoices. ey columns select display ‘what-if ’ analyses in of of cells. By individual single cell clicking cells B4 or has a with range been the of mouse, you cells. In this can case, selected. budgets, also and have forecast business. Fig 7.2 A spreadsheet is a grid of cells organised in rows and columns Fig 7.3 Each cell has a unique identier. In this case, cell B4 has been selected An extremely the ability an equation T o spreadsheet is a grid of cells organised in rows enter (Fig 7.2). Each column is given a row a number. is means that each cell has reference identied by the column B and will 152 row see example, B4 4. Look how the at the species the example in spreadsheet is cell letter in Figure organised you the wish formula cells. A spreadsheet to into sign. Formulae another. For and a take on cell, you formula what any is actions spreadsheet need to is type data. the often calculate how one cell relates example, to add together the values in A1 and A2, and show the result in cell B1, you row would number. For tells into spreadsheets a cells unique a formulae of letter, and to each that feature and equals columns enter (calculations) Fig 7.1 Samples of how spreadsheets can be used A to powerful type in cell beauty of a B1 the formula =A1+A2 (Fig 7.4). column 7.3. Y ou into rows and e entered only spreadsheet once into a is that cell. In a the formula example needs just to be given, 7.1 the formula cells the A1 was and entered A2 formula. In can into easily fact, the the be cell B1. e changed formula can values without in aecting having the result. For is changed to 100 and the value allow automatically you the value in new result – 900 – will in cell A2 to entering B1. By simply automatically changing the recalculate perform the result, ‘what-if ’ calculations. a formula, you appear values in tell the spreadsheet calculation to perform, for example adding, 800, and subtracting by using in operators cell spreadsheets cell multiplying, dividing the to to automatically example, if what A1 program spreadsheets W hen recalculate the Introduction such as plus (+), minus (−) and so on. cells, and Fig 7.4 A formula is an equation that tells the spreadsheet what actions (calculations) you wish to take on any spreadsheet data. In this example, by entering the formula =A1+A2 into cell B1, the result (300) will automatically be calculated Questions 1 List three examples to explain how spreadsheets are used. 2 a add (the b multiply c divide d subtract contents cell cell B4 C4 by by of ) cells B4 and C4 2 3 Copy and ll in the blanks in the following sentences: a A is allows into b In a a D12 grid and application numbers of and rectangular spreadsheet, letter, c text, an formulae cell be cell B4 from cell C4. that entered 4 Identify what each label in Figure 7.5 is showing. cells. is a the to each each species program given a number. in D and 12. d To add you e To subtract you f together would would type the calculations g 3 If A 33 cell popular was C4, the allow in in A2 into A1 and to A2, . the value formula you in A1, . a per form b modelling. spreadsheet the cells from or entered write values formula value type Spreadsheets the the cell program B4 formulae and that 3 is . was would entered be into c usedto: Fig 7.5 Diagram with labels for completion 153 7.2 People Common generally use the spreadsheet terms ‘spreadsheet ’ and ‘worksheet ’ interchangeably. However, to with Microsoft and other features publishers we be consistent shall Y ou can sure the term sheet ‘worksheet ’ to where you place mean your the or le, such Most of of the as the mean the calculations, and type of Excel type over the data does computer screen chart is devoted can to contain sheets. We worksheets Excel extend or It has worksheet down worksheet, and the 16,384 chart has the lettered to A that to the minimum of by sheets the Excel contents. Note: the old have to be deleted rst; it is replaced on it to modify its contents the one display or shall refer last a million numbered extend Z, of c an be amount of Delete key to erase it and type in new more to references ‘sheets’ to AA to rows AZ, A that from across column. one the information. references row row are the sheet, and combination 1. added. is to BZ, workbook is memor y is example, the of column A1. Examples Z25, BC304 and of upper-left letter other cell cell of references a are GG100. the BA an number. For worksheet Types of data c an are two types of data: labels and values. Labels unlimited non-numeric data that a spreadsheet will not use restr icted available to calculations, such as a person’s name or an address. store Values the current data press in onl y new double-click are number cell’s not ◆ ere a ways. First, make either: sheets. over worksheet, columns continuing contain the ◆ and An various application Cell represent in term Cell or cell Excel. workbook, which worksheets a active. en row-and-column by ‘spreadsheet ’ to edit is use ◆ the also cell are numeric data which can be calculated. le. Cells Active e active with is cell a darker located in worksheet and cell in border the by you Excel has have document so you window can worksheet. Y ou using horizontal Once the the scroll arrow where can keys move or with highlighted the cursor around the the vertical bars. entered several tell is ways data to into the complete a active cell cell, entr y. ese Fig 7.6 Labels and values in a spreadsheet inc lude: Labels ◆ press Enter ◆ press Tab ◆ press Shift ◆ press an In + arrow ◆ click another ◆ click the 154 a Tab button letter any is data dened ‘Lastname’. Note key cell cell Enter Excel on the formula bar. and cannot that as a that be begins with label, for labels included letter example are in a or ‘Y ear’ or left-aligned numeric includes within the calculations. 7.2 e Values Merge and Center headings. Select If the rst thing you type in a cell is a it to be a value. Note that values are in cells and are used in calculations. For sum of money a telephone would be considered a would not be considered a If this you type do treated not as a of want a is prevent the the cell identication telephone number entr y can of used numeric the number calculation. Examples 2018), an rarely cell’s value, then apostrophe, or will data be text as must are (such to begin for used format A1 through then click text on in the A1 Merge will & Center appear to be icon centred the cells, although it is still located in cell A1 7.8). For this feature to work correctly, the heading be in the left-most cell in the blockrange. calculations. contents being number (such in formatted from example centring value must since cells, for for value. However, (Fig number useful example, across a several is features right- (Fig7.7). e aligned option spreadsheet number, Excel C1, and considers Common in a as be with an text. is a numeric year (such 826045) or as a 111-2525). Fig 7.7 Merge and Center is a useful spreadsheet feature Default displays Default means that automatically, unless other wise, numeric side in of the the left you a can enter default side and so be of always for on, by data values directly 31, 2018 format displayed (or text) specify in is the right displayed cells. entered Jan formatted is cell. Non-numeric Formatting Dates data you such in as decimal a and into cell, it dates cells. For will be example, if formatted 31-Jan-18. Values can also placement, commas, dollar selecting Cells from the to Fig 7.8 The text is still located in cell A1 be signs Formatmenu. Cut, e copy Cut, Copy consistently Text Text alignment alignment or spreadsheet. e command justication Formatting is also toolbar common includes in a four that a Align L eft ◆ Align Right space comments Center ◆ Merge e and Center. left, centre cell. Y ou block of can or change cells. If cell, then right the changing Column options alignment text the or align on a number alignment data single is has as within cell wide no or as eect. the a the By but a is the on that column has then be that holds moved Excel and and their are row in width width hidden. Rows clipboard. e temporarily columns a information Cut and clipboard places is information. (pasted) copies the resulting to entire values, formats. widths a operate applications. e selected the may cell contain commands Microsoft formulae and default, all can Paste location. Note cell, including ◆ all removes information another ◆ in paste and information storage is buttons: and of Excel of 0 heights up to are 8.43 255 12.75 wide, characters. If (zero), then typically spaces the points column high 155 7 Spreadsheets (approximately right as size 409 (zero) your text only 6 be long cm), which font. A will and the few a a as next letters is can need value is the ◆ Drag high ◆ Double-click just be height often heights. If displayed rst row inches), but row will the 0.4 row. Y ou and too or default the data is inch (almost widths data, then be the hide cell, your If t points will column a to 1/6 as of to 0 big for t ◆ of also your contains text the largest height. e ◆ From will the row border column’s a the a dierent border column to is size. AutoFit widened the to entr y. row ’s row right means cell to is bottom adjusted Format menu border to the choose to adjust largest the font row size. Row, Height or Column, W idth. visible. If ere are several ways of changing the size of the the Excel (Fig mouse is used to change the column width cells or in or a Double-click ‘#####’ (Fig7.9). cell column column. AutoFit change too a row height, a screen tip appears that displays the 7.10): current size. Formulae W hen the a cell Bar. If formula and a the To be is functions created, the formula number automatically will and used is in displayed a recalculate result formula the is in displayed the Formula changes, Excel formula and in a new will result displayed. start a addresses formula, enter of arithmetic operation the cells operators to use in to an be used (Table the equals sign. en in 7.1) the enter the calculation. e specify the arithmetic calculation. Table 7.1 Common arithmetic operators used in formulae Fig 7.9 In this illustration, the text in cell A2 is too long while the value 8500112256 is too big for the cell Operator Meaning Example + Add =A1+A2 − Subtract =A1−A2 * Multiply =A1*A2 / Divide =A1/A2 % Percentage There One to the enter A formula use the mouse Formulae Paste A can can be to keyed point also be are way the copied as value ways follows: of cell to to A1, do add you would into cells by a you using cell, or want the you to Copy is dened as a built-in and mathematical Fig 7.10 Adjusting the width of a cell to t its contents formula 156 included in Excel. Functions are used can include. buttons. function this. 5% =A5*(1+5%) directly to different is for 7.2 common Four calculations common SUM: ◆ AVERAGE: automatically divides MAX: by business functions ◆ ◆ in adds the used personal spreadsheet features use. are: totals the number to and Common a column values of in cells determine the the in or row range the and range largest value in a range ◆ MI N: used to determine the smallest value in a range. AutoFill W hen other e you cells, then AutoFill including row enter or such as formula the that AutoF ill command with to instructs adjacent text months or and you will Excel from to copy help to one cells. Y ou numbers actual need feature formulae, functions column AutoFill a you. copy cells, selected may without also to cell, use formulae, numbers. Excel’s AutoF ill Fig 7.12 Place your mouse pointer on the Fill Handle at the lower right corner will ll a block depending are the on of cells what is with either located in numbers the rst or text of the cell and drag down to auto ll the formula to the remainder of thecells cell. Here Cell steps: ranges Often 1 Click 2 Move on the cell with the more the mouse to the bottom right corner of pointer should change to a thin in Excel, you may need to select than one cell. A range is a group of cells that a rectangle on the screen (Fig 7.13). In Excel crosshair there (Fig working the form cell. e while data. are several ways to select a range using the 7.11). mouse: 3 Click (Fig W hen and drag the mouse to ll the other cells 7.12). working with numbers, however, you ◆ Drag ◆ Make two cells of data so that Excel knows much the numbers should be rst cell of cells. a range active, hold down the key and click the last cell needed to complete by the how the adjacent must Shift enter across increased range. each ◆ Use Edit/Select All or Ctrl + A if you need to select time. ever ything ◆ Click entire ◆ Click an Excel the ◆ on within row a worksheet. headings (row number) to select an row. on entire also column headings (column letter) to select column. has several ways to select cell ranges using keyboard: Shift + ar row key : selects the active cell and moves Fig 7.11 The Fill Handle is at the lower right corner of the cell in the direction of the arrow 157 7 Spreadsheets a name give that ranges range, you the name Here are means something meaningful can select it rules to to you, so names. Once by clicking you you on should have the named arrow next a to box. a few follow when ◆ Range names must ◆ Range names cannot have cannot contain begin with the a naming a range: letter. same name as a cell address. ◆ Range rst names letters, an underscore or spaces. Use a fullstop to uppercase separate words. ◆ Range names as hyphens, dollar or number Fig 7.14 If you have to use a adjacent cells, click on the rst range often, you should use the cell and drag to highlight the name box to name the range other cells of data Shift ◆ Ctrl + + Spacebar : Spacebar: selects selects the the Keep in is identication. Use for row or column. names and scroll remain W hen you wish to select cells that are not is just as Press ◆ Click and hold one or the more column letter. Release the Ctrl mind Y our Ctrl key. the required cells, or row number or that are rows range produces upper-left address of the to use a range click in the name cell by a an address so address and colon. In selected cells often, you box, type when allow e idea of worksheet 158 using easier a is the Figure lower-right 7.14 (A2:A7). If should name meaningful 7.14, and range to in a idea less of to the than using names that data spreadsheet they you remain scroll when on around you columns you always and or a 256 characters range are they names simple, yet represent. can the a be locked screen anddo sheet. Locked perform vertical (xed rows scrolling, remainstationar y when you scrolling. Locking to place titles in both your rows and spreadsheet displayed. in column the the press names work is to with. Just must xed rows perform columns cell column and in is a before xed any columns you row selected, just or data x cannot them. If column, the as if you of data be as you give these you tr y entire selected a to row row or heading. a hor izontal set Select the row directly beneath of a the le the section as want to remain visible (Fig Enter areas in range: name, such make editing you you Figure that contained select which ◆ ‘ language’ in the related horizontal Freezing have contain key. address, separated range or locked columns ranges selected includes cell cell that columns edited. Y ou Naming signs, ampersands simple: Data ◆ such adjacent, the perform ◆ should stationar y whereas procedure cent characters locking ‘frozen’) not special signs. Range Title current current signs, per ◆ Rows ◆ contain ◆ recognisable Fig 7.13 To select a range of cannot ◆ Select V iew ◆ Select Freeze on the Menu Panes. bar. 7.15). that 7.2 ◆ Select Freeze Top Row to lock the rst Common spreadsheet features row only. Freezing ◆ a Select ver tical the section set column that you of immediately want ◆ Select V iew ◆ Select Freeze Panes. ◆ Select Freeze First Freezing both on data the to to remain Menu the right of the visible. bar. Column. hor izontal and ver tical and to data Fig 7.15 Select the row below the row you want to freeze ◆ Select the section cell that beneath you want ◆ Select V iew ◆ Select Freeze Panes. ◆ Select Freeze Panes Removing on frozen the to the remain Menu again right of the visible. bar. from the list. headings ◆ Select V iew ◆ Select Unfreeze on the Menu bar. Panes. Fig. 7.16 The column headings now stay at the top even when you scroll through the rest of the data Questions 1 Explain the work book, 2 For similarity a or dierences worksheet each of the function or a and following, a between a spreadsheet. state whether it is a formula: =SUM(B1:G4) =E3*5% =MAX(E4:E6) =(E6-E4)*10 =MIN(C1:C10) Fig 7.17 Spreadsheet for Question 6 =AVERAGE(B1:C9) =H2/3 3 Explain why it is useful to name a range of data. g Write the name of the appropriate function for cell E7. h State to 4 the name of the function that should be used calculate: Answer the following questions based on information i for dance lessons a Identify as shown in Figure i the name of the feature used in row Identify c State the the d State a e State the i f cell Write the active letter row for number column that justication dance of lessons. cells that does used ii range limit ii the highest cost. Explain the why gure cells and F6 and F7 describe are how displayed it can be as shown corrected. cell. a A5 the lowest 1. in b the 7.17. contains not contain a a value. value. in: cell that D6. contain the times for j State can whether be each of the following instructions iv freeze row 2 v freeze row 2 achieved: i freeze row ii freeze column iii freeze row column 1 1 A and and column B. A 159 7.3 As with Developing other computer a simple applications, the best spreadsheet results come ◆ Order means anything raised to the power of a 2 from thinking about worksheet, ask the yourself task the in hand. When following four planning a ◆ questions: number, such as Division Multiplication the 1 W hat is the goal of 2 W hat are 3 W hat data 4 W hat calculations the desired is desired needed results to are order Addition calculate needed the to results produce is and to be carried as they up just one quickly not to e get will creator four many of form see created author of questions will and never one it such times, but is some questions Another the and important. No worksheet the user other it to solve than will above, just only take its a a layout appear in the formula. is the in be a the last two operations be time of used still will in order from left to right in the formula. a spreadsheet, formulae based on are used mathematical to calculate creating equations formulae, you may that you use: ◆ actual ◆ cell ◆ a values (=7*5) addresses (=C4+D4+B25) the combination of the two (=C17*8). To enter a formula: way. used it. So the of calculated is consider using appearance are once. be with out. Again, these set structured that will is creator would one more and are problem appearance only not creator little again. It the spreadsheet worksheet the used result, but since a they Subtraction appear create. W hen for as the In spreadsheet right next, in (inputs)? answers a to calculated (outputs)? results? Sometimes lef t are worksheet? ◆ the and 2 above 1 Click 2 Press 3 Enter 4 Press the the cell where equals the you want to insert the formula. sign. formula. Enter the Functions spreadsheet will probably be better. Functions e nal categor y of spreadsheet is one set up structure someone above else. More time questions, and the must be taken spreadsheet to will answer and good documentation. Since need other good the have access worksheet times it so until may that it is to this have they spreadsheet, the to can meet make with these users and of or many = have many An do formulae operators in a formula, it to follow the rules for the order have probably ‘BODMAS’ stands for in the come across maths. e the rst a Brackets of part 16 0 of formula the function arguments (for name, most an open bracket, functions) and a bracket. use is mostly a cell reference, a (number). ere arguments, but brackets. e you number are some still of range of functions need the arguments open will cells that and var y in functions. e frequently used following examples illustrate functions. mnemonic letter take of each precedence computer in is: word AVERAGE (parentheses) the or operators. operator: operator. e syntax is over AVERAGE must brackets calculate rst. function calculates the average any range other sign, constant not e ◆ function argument some Y ou a more dierent important Excel. e function name (one or more arguments) closed you of approve or If part the nalised. Ar ithmetic powerful people creator suggestions of equal closed will a the one design are for of cells. the e syntax is =AVERAGE( range of cells) of a 7.3 As an example, if B5, B6 each and day B7 for calculate a your you how were much week, this average to enter into cells money you spend function can be daily B3, B4, on used lunch $10. Notice $10 because donating to that the exactly only Developing two function students did not a simple donated include spreadsheet less the than option for $10. spending. Fig 7.19 Using the COUNT function to determine how many collections were made Fig 7.18 Using the Average function to estimate daily spending COUNTA e and syntax is COUNT =COUNT A( range =COUNT(range ese functions Notice while such that of text COUNT or cells) and cells) count COUNT A as of the number counts counts the cells in a range. numbers in a range numbers non-blank cells in of but the also other data range. Fig 7.20 Using the COUNTA function to determine how many classmates Suppose you and some members of your class volunteered volunteered to collect collected money into COUNT received which blank cells (Fig charity . Y ou C1 function to to may the count is number contain enter C4. en 7.19). ere counts or for text the also of you the in contributions can number cells (Fig the of use the contributions COUNT A a range that function are not 7.20). COUNTIF e is syntax is function =COUNTIF( range counts the number of of cells, cells criteria) that meet given criteria. In Figure 7.21, the function =COUNTIF(B3:B6,“<10”) Fig 7.21 The COUNTIF function uses given criteria when counting within a is used to count how many classmates donated less than range of data 161 7 Spreadsheets DATE e syntax is a MAX is =DATE( year, month, day) function date. For 12, cell example, if A2 contained produces combines contained the cell the number 5/12/2020 values A1 in three contained number 2020, then or 5 Tuesday, May Saturday, December cell containing date as Apart is you from the =TODA Y() space or the want text display DATE returns between is the cell e MAX value number A3 produces sure in Using largest a the is =MAX( range function range of student donation of produces cells) the largest or maximum cells. volunteer can be example found by in Figure entering 7.19, the =MAX(B3:B6) formatted 12/5/2020 that to the display the it. function, another the the produce syntax 12, 2020. 5, 2020. Make function to and to =DATE(A3,A2,A1) Alternatively, =DATE(A3,A1,A2) or cells e current useful date. Note brackets in this function there is no function. IF Fig 7.23 The MAX function nds the largest donation e syntax is =IF(logical test, value if true, value if false) MIN is on of function whether two a allows you condition to is make met or a choice not and depending returns one e syntax complement produces Suppose you have than $10 decided that if you spend an lunch determine or of cells) make the on next whether your own lunch, then week. e you IF should you should statement continue to make is MAX smallest or function, the minimum MIN value in a function range of cells. 7.24 shows the least amount of money donated. your useful buy the the average Figure more own =MIN( range values. T o or is to lunch lunch. Fig 7.24 The MIN function nds the smallest donation PMT e syntax loan e to is rate, number of payments, amount) PMT function calculate number the =PMT( interest of the interest a nancial payment payments repayments yearly is are rate and made and for a loan based constant on the a function a on interest monthly number that of a is used specic rate. If basis, then payments the need Fig 7.22 illustrates how the IF statement determines the outcome if the average amount spent on lunch is more than $10 162 to be converted to frequency of payment. To do so, the 7.3 interest of rate must payments quoted in be should divided by by 12, while multiplied by 12 the if number they Figure illustrates a $5000 loan with a are rst rate of 7.65% that must be repaid in means that the monthly range sorted the at 12 number of interest repayments is rate years × months = 24 payments at function is therefore or a payment of years. Y ou may $225.34 note the top press representing an the list per month over who is that the outgoing repaying A2 to the nish A7 with and six B2 times to in the person with the fastest time of the list. e cell range B2:B7 is named cell C2 type =RANK(B2,racetimes,1) number 1 in the function indicates is in ascending result is a payment the indicates that it order, while is 0 or omitting descending. e rank of the rst athlete, Matt, is =RANK(B2,racetimes,1) and negative from the value 1, which is rst or rank 1. Copy the the function person that Enter. e number shows value race =PMT(B2/12,B3*12,B1) the two by sports are B3*12. e a returning from group positions calculated that loan contested data a nal spreadsheet is and 2 of as order, so racetimes. In B2/12, and closely the simple two is years. is a how a yearly ascending interest in athletes. e years. 7.25 illustrates determined are B7 Figure 7.26 Developing to the remainder of cells in C3:C7. Excel loan. adjusts the cell references =RANK(B3,racetimes,1) that the as Rich same = 2 for nish time as 2. Position so Ole Eli, and 3 would is is in 4th = 2 since therefore skipped be next rank Eli. However, note =RANK(B4,racetimes,1) position rank, and appropriately. e because he also of has ranked the tied position. Fig 7.25 The PMT function calculates payments on a loan RANK e syntax nd, range In later is of =RANK( number numbers , versions of order Excel of this whose rank you want to rank) function has been Fig 7.26 In this example the RANK or RANK .EQ function is applied to determine renamed e to syntax RANK.EQ. is nal results of competitions =RANK.EQ( number whose rank you want SUM to nd, range of numbers, order of rank) e is in a of 1 function sorted (see produces list, so section duplicate that 7.5 numbers the for are the position rst more given item on the of a number would sorting same have or a rank data). Note rank. syntax is =SUM( range of cells) item that If to you wanted B175 you to add could together use (B1+B2+B3, etc.). is the + the numbers operator would take to you a in add cells the long B1 cells time! 163 7 Spreadsheets It is much quicker, and function. e SUM easier, to function use can be the the SUM used in four ways: adding values, for example class), and column2 is ◆ Jazz not for the sorted, so adding cell ◆ adding ranges ◆ adding a references, for day searches of the ‘false’ is across class. e entered at example day returned is example values, for combination of list the row of end to classes of Saturday. e the example the function =SUM(B3,C3,F4) =VLOOKUP(B8,class,3,FALSE) of the =SUM(1,4,9) function. e ◆ then above would return 10am =SUMC3:C10) as the time to return of the class. e column number is changed options, for another set of data based on the class. =SUM(B3,C4:C10,12) Fig 7.27 illustrates the calculation of total donations using SUM Fig 7.28 VLOOKUP is useful when searching for information in large tables VLOOKUP e syntax is =VLOOKUP( value you want to look up , Relative the range column, of the containing data where column the the value number additional is located relative to the information you in the rst column need , Copying formulae list in the rst column of the range is sorted absolute addressing can be extremely useful. whether Consider the and rst or the spreadsheet shown in Figure 7.29A, not where a 5% discount is calculated on three data plans. sorted) As you out VLOOKUP searches the rst column in a table the create for a value. If the value is found, any other discount that row can be selected. e V in looking vertically down example for grades list is is or a list in is a the lookup on until a rst the the 7.28 grade is is could similar correct the be searching ID associated those steps. column in a range named class cells in is cell and C3 copied resulting when Excel using Excel (in want keep the is to to copy discount =B3*B1. If cells C4 cell and is the if each it case each you as the it C3 is. containing C5, Figure is other using time) need why to adjustment cells is addressing. is to time, such explains result formulae. is copied relative this above help sheet (for the formula not =VLOOKUP(B8,class,2,FALSE) rst other formula two found. e to plan, you work 7.29B column. noticeboard. e located. en until Figure the pinned vertically name function searches 164 performing searched function e on searched number row of to formula shows An each automatically VLOOKUP the represents on to value e in spreadsheet of formula data a the incorrect the is useful refer as cell to your copied (Figure to an assumption the left exact discount cells and value an of by the but cell one does location return 7.29C). a example sometimes an of on in error the B1. or 7.3 Developing a simple Fig 7.29 Copying formulae can sometimes give the wrong result Fig 7.30 Naming a cell is useful for cer tain calculations Without W hen the as naming formula shown in might containing use the name name to cells cell C4 multiply in B4 and box B1 and the the B5 work 5% the C4 you columns and/or not to have function or in (absolute copied corner results in use cell a to also to usually formulae the are with the this, spreadsheet copied down addressing the correct in and down to one insert you must row, and and a so add a row, all row. For row a will example, in above insert rows the new ever ything in word row at it, will automatically Figure 7.31, if ‘German’ (fth the fth become you wish row), row. e the move sixth fth row, on. to costs insert columns one or more table. However, you over, because you of cells cells, name illustrate absolute B1 other you C5. rows in the to referencing), should (B1). T o left forget rows allows both. Excel references may start that top and Manipulating Sometimes when Discount. As discount for cells discount C5, the 5% more 7.30. erefore, you in as or not Figure cell to one spreadsheet spreadsheets insert rows manages your sheet to to or do have a columns adjust any cell compensate for Fig 7.31 To inser t a row above the word ‘German’ (fth row), you must inser t a the change. new row at the fth row 165 7 Spreadsheets Inserting a row or column oers four choices (Fig 7.32): Deleting (Fig ◆ Shift cells the to will cells also moved row: entire is to the to column: located. e moved to appears the to the is a cells left one other contents cell or being cells of in row a the that in ◆ the moved side are column where or not Shift the will several aected. below the above column the cursor just the is one the ◆ cell located. cell selected where (not newly row also oers cells to left: the column are located also Shift to move cells several Moves left. e up: cells not the to the contents contents of aected. e right the Moves up. e of the of the one choices or other contents cell being several cells of in the moved left. the contents other cells in just the one inserted selected ◆ (the row). cursor cell) column column). ◆ Entire row: Deletes located. e row not cell. just Entire one column: is is now deleted located. e left to and ll row below Deletes entire the the a where of one the the a one or row are column to where (not the Fig 7.32 Inser ting a row or column oers four choices cursor deleted column column column the just right deleted. Fig 7.33 Deleting a row or column oers four choices 16 6 four not aected. down, not of one or 7.33): cells down. column (the row of cell, column several cells in move Inserts entire the the contents appears right the of the moved row of of right. cells also Inserts row contents right the contents aected. e other of the Moves will inserted Entire not down: contents newly ◆ are down. e Entire e Moves right. e move cells being ◆ the located Shift e right: column cells ◆ cells a is is is moved the one up, cursor cell) moved is to the 7.3 Developing a simple spreadsheet Questions Use Figure 7.34 to answer the following questions. 6 7 Write complete a the lowest b the average c the number Write an CANCEL IF if other wise 8 If the 9 Write of Identify 1 the name box on the Write 3 If the formula that calculates would the be entered in cell amount donated to the the Classical class, write donated from the If the the formula for 10% is now entered CHARIT Y. Write from the Explain 5 Limit Latin the Hiphop 1: 1 Type 2 Merge to H1 that I3 the in output less the than word 30, space. copied would statement if is to is to display cell number of J3 cells the to calls I4 word output is less to I6, then CANCEL. the than name the the class, other wise output the number of limit calls. function in cell J3 is copied to cells J4 to J6, write the output for that column. State the location of the data in cell D5 after each of class. which for add a column exercises Creating the the is following: named amount a inser ting a column b inser ting a row c deleting a column d deleting a row at column B donated at row 5 to the left of at column G the at row 6. using data in bottom containing Sheet1 left) A and the columns (you nd rename it A this as Highlight the headings in row 3 and make them bold. title to on 5 B. the Save the spreadsheet as DONATIONS. tab MAIN. B Donations Excel 4 Sheet1. collected ’ across on Microsof t spreadsheet heading Double-click the a following ‘Donations 1 cell blank cell I3 calls column. Exercise at in formula in a cell of class. steps Practical 3 the in number oered. the the 4 classes charity 11 amount IF following: F4. then from of output class the limit statement the cells calculate gure. 10 =F3*10% an the for 2 the to cost function state Fig 7.34 Spreadsheet showing schedule for summer classes functions C D E collected F Required 4000 2 3 Item 4 Water 5 Received Shipping date Shipped Transpor t 12000 02/09/2019 8000 Air Tin food 4950 03/09/2019 3500 Sea 6 Dry goods 9870 06/09/2019 6500 Sea 7 Medical supplies 1150 10/09/2019 1000 Air 9 Tarpaulins 3500 15/09/2019 2500 Sea Sheet: type More needed? MAIN 167 7 Spreadsheets Exercise 2: Use MAIN the Using functions sheet to 23 continue this A loan In cell A10, type 2 W iden 3 In 4 Insert ‘ Total quantity of is A to t the title in collected 7.25% and cell B10, type =SUM(B4:B8) row at row 6 and enter and the the following pay to manage sta. e repayment and data press time the interest is 5 years. data in the same MAIN at column for J. Enter J a used A10. Sheet, starting cell was donations’. Type column $30,000 donations exercise. rate 1 of K another 1 donation: 5000 tins of baby formula were 2 donated, but on 5 6 only 3000 can be shipped via Air 06/09/2019. In cell A12, type ‘ Total quantity of items shipped ’. In cell B12, type =SUM(D4:D9) and press 3 Loan Amount 30000 4 Interest 7.25% 5 Years 6 Repayment 5 7 Enter. 8 7 In cell A13, type ‘Smallest quantity ’. 8 In cell B13, type 9 In cell A14, type ‘Largest 10 In cell B14, type =MAX(B4:B9) =MIN(B4:B9) and press Enter. quantity ’. and 24 In cell 25 Save K6, type the =PMT(K4/12,K5*12,K3) spreadsheet again. press Exercise 3: Using formulae Enter. 1 11 In cell A15, type ‘ Types of items Type the following DONATIONS 12 In cell B15, type =COUNT A(A4:A9) A16, type ‘Number and In A cell of in a new sheet of the items spreadsheet. press Enter. 13 data donated ’. shipped 1 by B Costs per C D E F day 2 15% Air’. 3 14 In cell B16, type Job Service Cost Quantity Total code and press cost Enter. 15 In cell A17, type ‘Average 16 In cell B17, type =AVERAGE(D4:D9) quantities shipped ’. 4 FL Fuel/gal 3.75 5 LC Landing 1275 5000 6 2050 5 2250 6 charge and 6 press Discount =COUNTIF(E4:E9,“Air ”) SF Storage Enter. facilities 17 Use 18 In the name box to name cell F1 as QTY. 7 cell F4, type PT Por t fees =IF(B4<QTY,QTY-B4,“”). 8 19 Use the AutoFill feature to copy the function in Sheet: cell 20 F4 Insert to a row donation: 7000 21 Use cell 22 A F7 total this 16 8 at row of via been data. paste 3250 8 and torches AutoFill and EXPENSES F5:F9. 8650 shipped the now cells Air were on feature it in sets data for another donated, with 10/09/2019. to cell of enter copy the function donated. Update the Rename 3 In 4 Use 5 supplies have spreadsheet with cell Use Sheet2 E4, type the from in F8. medical 2 E4 to Name EXPENSES. =C4*D4. AutoFill cell the as feature cells Box to drag the formula E5:E7. to name cell F2 as DISK. 7.3 6 In of 7 cell Use F4 the Discount decimal Update 10 Name 11 Save a each formula to calculate ser vice. Type AutoFill cell Format 9 enter on the from 8 F4 15% to feature cells cells in columns to a (Storage discount is =E4*DISK drag the in formula for Cost, Total currency cost with the and 4 two the the F2 by range changing A4:C7 spreadsheet as 15% to 5 12%. In 4: Reviewing Use EXPENSES cells E10, E11 press again. to sheet and calculate expensive to continue this In cell E12, enter the Total E13, enter how average, cheapest In cell an many E14, enter calculate amount how of costs appropriate function Save the cell in data 5: are ser vices had function Type spreadsheet the for following the in a discounted cell in C2 cell from SF to LC. C3. the compares rst LC column in of cell the C2 and with SERVICES Expenses sheet to nd LC. en third shown column in cell is selected (Landing C4. job code in C2 from LC to HE. that an error #N/A appears in cells C3 C4. is is because the code is not found in SERVICES range of data. Save the spreadsheet again. Exercise 6: Viewing your functions and formulae $2000. Press Ctrl and ` (located above the Tab key on again. data in keyboard) formulae information Sheet3 of Adjust in the to the cells display the functions and spreadsheet. to show the functions and the clearly. spreadsheet. 3 A in updated the the formulae DONATIONS code to 2 1 close oered. appropriate than Searching in and Change your Exercise simply to 1 4 sorted. If respectively. ser vices an many more or items and 7 3 TRUE not the appropriate the calculate are C3. FALSE that exercise. and 2 code) add cell =VLOOKUP(C2,SERVICE,2). Enter. is Notice most in indicate spreadsheet functions 6 functions job is ( Job could in to simple C4, type charge) In the shown a =VLOOKUP(C2,SERVICE,3,FALSE) SERVICE. the 1 as ser vice cell and function column bracket range the the were, you ever y Exercise facilities) to rst Change e places. cell the they F5:F7. the added Developing B C Press Exercise Job code 3 Service 4 Cost and ` to display your results once again. D 1 2 Ctrl SF Return 7: to 1 In cell 2 Select Using the the MAIN G3, type the RANK range function sheet for this exercise. ‘Priority ’. C5:C10 and name this range as 5 SHIPPING. Sheet: MENU 3 2 Double-click 3 In cell on Sheet3 as MENU. in C3, type ever y range en Enter. is cell in in the the the compares rst in the SF column EXPENSES data cell G4, type later versions =RANK(C4,SHIPPING,1) of Excel or type =RANK.EQ(C4,SHIPPING,1) =VLOOKUP(C2,SERVICE,2,FALSE) press In in of sheet second cell the to C2 and SERVICES nd column is 4 with SF . Copy the W hich 5 If the the function items rank format have in the function of the cell G4 same cells G5:G10. priority? produces dates to an error, then check entered. selected 169 7. 4 Fo r m a t t i n g a spreadsheet In Formatting the Format desired Y ou can use a variety of formatting features such as changes and font size to display your data 7.35). e options on the Home tab or feature (Fig 7.36) the change the number ◆ change the alignment ◆ format text ◆ add ◆ shade cells with can make the areas, including data, customising fonts, borders and shading. After making the changes, click OK to close the dialogue and return to the worksheet. format of text individual kinds tabbed Format box dierent box, you the can: ◆ and of numbers, aligning customisation Cells dialogue each eectively applying (Fig in bold, formatting alignment Cells features of or data characters borders colours or patterns Format Y ou can numbers use a number’s a number dialogue ◆ a a Y ou the to box so style can of formatting (Fig of the Number 7.37) where number tab features on in you a the can to cell change containing Format Cells choose: (currency, percentage, date on) (decimals, commas, and also icons variety view categor y and ◆ a appearance. Right-click on perform the basic Number so number section of on). formatting the Home using tab. Fig 7.35 Spreadsheets have a variety of formatting features to display your data eectively Fig 7.37 You have a choice of formatting features to change a number ’s appearance Align e the data Alignment position of tab text (Fig 7.38) within a has options cell. is tab to is change used to determine: ◆ the horizontal selected Fig 7.36 Right- click on a cell to reveal the Format Cells feature 17 0 cells and vertical alignment of data in 7. 4 ◆ the ◆ whether the orientation cell long of cell ( Wrap data in entries selected should whether width ◆ ◆ the to selected cell should be wrapped within of shrink to t the Practical exercises Exercise cells should be merged to form a 1 cells) the text can also perform 8: (left to basic data right). using on the formatting spreadsheet DONATIONS created Apply a in Exercise Excel 1, and le select which the sheet. the comma format to numeric data in the the icons the MAIN alignment Excel Formatting Open you 2 Y ou using column t) (Merge direction spreadsheet text) size (Shrink whether single text a cells Microsof t ◆ Formatting sheet. Keep the decimal places to zero. toolbar. 3 Highlight them 4 Change Arial 5 6 Use the row 3. Select headings Wrap all the to the of the text a in row 3 and tab headings blue option headings make in in row 3 to colour. on the the headings in worksheet F3). drop-down Border Home font point, with A3 Click the the 14 (cells 7 the bold. icon and in arrow the select Font the to the right section O utside of of the Borders option. 8 Save this spreadsheet le. Fig 7.38 The alignment option changes the position of text within a cell Question Protection 1 e Protection tab provides a privacy feature Identify the your worksheet unauthorised moving from or or workbook. By users deleting opening or are adding prevented specic modifying cells an from of three following features that are found in each of formats: password, a number b alignment c font. changing, data entire a any to in a sheet, or workbook. Fig 7.39 The Protection tab provides a privacy feature to your worksheet or workbook 171 7.5 Searching for records Sor ting Sor ting Y ou can sorting sort rearrange according (Fig to e or or sort the individual specify. Y ou Z) to rows can can be (9 based columns by lists to on in Excel cells sort descending or values 7.40), Microsoft columns you the 1; in a the A) order contents of 1 by 2 order (1 to 9; (Table one or Decide list on by the more the rows than or one columns eld that you want to sort. you rows, sort ascending to list list. W hen rearranges using Z the the of a Make click that sure the the Sort cursor icon is on located the Data within the tab, or list and right-click A from the 7.2). menu. Notice more 3 columns. list Select and Fig 7.40 Data can be the range of data will be selected. Select the rst eld you want to sort by from the drop- down 4 that and Add third specify level elds Ascending and you repeat want or step to Descending 3 sort for by the (if order. second desired). sor ted in ascending or descending order Filter ing Table 7.2 Examples of sor t lists Filtering of Order Alphabetic Numeric Date Ascending A, B, C 1, 2, 3 1/1/2019, Descending C, B, A 3, 2, 1 1/15/2019, 2/1/2019 2/1/2019, a will be the worksheet list criteria 1/15/2019, is records only and viewed process on the those hides at any of selecting basis records the of certain that has of the records criteria. Excel match others. e time. Excel some full the set selection of data AutoFilter can and 1/1/2019 Advanced based Sor ting 1 Click a in list any by cell one of the column only allows eld you want to use lters. AutoF ilter on more a single complex eld allows while selection selection Advanced criteria Filtering criteria. to AutoFilter sort the list. Select 2 Click either the Sort Ascending icon or of Descending icon on tab (Fig 7.41). is can a table be Excel go Data version of or menu option, depending to a Data header option row on and the for ear ly Menu versions bar, click found Filter, and the with Sort on select AutoFilter from the sub-menu. In your Excel. on the headers Click Data now on one tab have of a of the ribbon. Notice drop-down these arrows to arrow in reveal a that their list of all the cell. possible lters. ◆ Clicking on a ◆ Clicking on Show on Top value will All lter will for that display value. the table Top Ten in its entirety. ◆ Clicking box. In for or Fig 7.41 Select a cell in the column and click the Sor t icon 172 Top the dialogue or Bottom, a Percent. For for the Ten Top 12 activates box, you Items may number example, you or the the choose value, and could 20 to lter either decide Bottom dialogue to Items lter Percent. 7.5 ◆ Using a the Custom range, such as F ilter greater allows than 15 you and to lter less for than 30 from tab the in sub-menu; later click the Searching Filter icon in for the records Data versions. (>15and<30). Advanced Although the simple, you criteria itself can the be and tell location use the pasted in criteria are the than To deactivate Data option the on AutoFilter, once the Menu bar and again click select AutoFilter on the now 11 of the criteria or headings in selecting more criteria Filter the and copied shown range on in in consists the to same be the records control on to the of whether the records. Y ou the the another Figure over ver y spreadsheet select location to in 1 records, list should location. We 7.43 to illustrate (Rank, Language, population) and range of<11 and row, this selected data then of G1:J1 Speakers and row Percentage G2:J3 and A1:D21) place computer example record click have Advanced the and criteria For an can to makes Filter. the Speakers and wish in-place Advanced Fig 7.42 Drop- down arrows reveal a list of possible lters may use ltered Notice AutoF ilter used. Y ou then will Filter has to the be is can be copied G6:J6. e >150. Since an AND Rank greater has to than data these criteria. be less 150. We with the original (the choose the Data, Advanced range Filter Fig 7.43 Option box for the Advanced Filter showing original data, criteria range, and output area 173 7 Spreadsheets menu options, or Advanced near the Filter icon in later choose we versions. Data must include If you click in the table rst, the can if now you you enter click would should selects be on the correct the range for the Copy to then also range a 7.44 for criteria Another choose copied. Figure the Advanced remember the third to row Filter change to menu the G1:J3 in options, however, criteria this range to example. computer Figure automatically > range the shows the list you get when you do this. table. Y ou (G1:J2). Note: L ocation where shows 7.45 the the option, new resulting list list. Fig 7.45 Use Advanced lter to nd the languages that either rank in the top 10 OR have more than 150 speakers Pivot tables Fig 7.44 Result of using the Advanced Filter to nd the languages that rank in As your data increases, it can become more time the top 10 with more than 150 speakers consuming If we moved create from G2 record 174 OR of the criteria. For to will one G3, we show if criteria to example, if create OR EITHER the next line, we “<11” is criteria. is criteria is update formulae. Depending moved means to results, a a true. W hen we data pivot table without Even if more is on the of how makes altering data ranges it data, functions you easy original added to need the to to and display summarise location of your your your spreadsheet, the data. 7.5 pivot also To table be can be created create a from pivot worksheet, you as quickly a updated. Pivot pivot table for records can table. from should charts Searching a check set of that data your in a data is arranged follows: ◆ Y ou ◆ Each should have column of at least data three should columns have its of data. unique eld heading. ◆ Y our and data not have headings ◆ Check rows should and that or a be organised blank the the row rst data a between row set in of also tabular the format, column data. does not have blank columns. Fig 7.47 The pivot table dialogue box is displayed with your range of data selected ◆ Review the data to accurately. Mixing ensure up that data it has causes been entered incorrect results. are a To create a pivot table, click on any cell in your eld data, click Table the option Insert (Fig tab and then select the to dragged either the to the Rows Values area or area. If the you also Columns drag area, set you of usually can create a one-dimensional pivot table. Pivot 7.46). Suppose you wish subject received eld the in Values the a area. e elds new Row to to nd out how results. Figure area while pivot their table the sheet, while the new original on the eld the pivot data students shows Grade shows areas. is many 7.48 is left table remains in as is in in each Subject the you drag located its in sheet. Fig 7.46 Make sure the cursor is in the data before selecting the Pivot Table option on the Inser t tab e dialogue selected (Fig table on Y our pivot using the box is displayed 7.47). Y ou new table sheet is data but or in a with by it to on moving options. is dierent One-dimensional your choose display created drag-and-drop original can pivot range place the same elds creates of the a of data pivot sheet. data view of the format. table Fig 7.48 Creating a pivot table to show how many students in each subject By default, Excel summarises your data by either received results. The pivot table is shown on the left while the elds that summing or counting the items. If so, numeric values formed the pivot table are in the lower right pane 175 7 Spreadsheets Two-dimensional pivot two-dimensional table drag A one-dimensional pivot table shows a column another of drag data. If another you eld drag to a the eld to the Columns Rows area area, then eld to table the is created. Make Values area to sure complete to the or pivot row pivot table. and a Fig 7.49 Creating a two- dimensional pivot table to show the number of students who gained grades I to IV in the dierent subjects. The Subject eld is in the Rows area, the grade eld is in the Columns area, while the grade eld is also dragged to the Values area Frequency distr ibution wish Sometimes you times a value times a specic occurs dates. Creating information you 176 have a may in a payment a of to set for count of was frequency quickly list want data made or number how with of many between distribution you. For students the two provides this example, suppose their ages, and you year to nd out inter vals the initial the age to area. Grouping frequency who many registered pivot eld how table both the the distribution registered for for that ages the students exams. Figure is created Rows in for grouped area and inter vals those subjects. in after of the 7.50 you the 2 in two- shows drag Values produces two age the ranges 7.5 Pivot Now table, a you pivot results. To within can create your Chart. Y ou a pivot the can OK. Y our sheet summarise chart section, locate same for records char ts that click Searching as can pivot you Analyse new select pivot pivot to data in a select the option and will a cell Table select chart be pivot your any Pivot suitable chart into visualise chart, rst table. en now the help your Tools Pivot type placed and on the table. Fig 7.50 shows the initial pivot table created by dragging the age eld to both the Rows area and the Values area Fig 7.53 Pivot char t created from the frequency distribution Modifying Fig 7.51 Right- click in the Row labels and select Group to enter the interval for As you set of add pivot or delete data, these updated by the tables columns changes pivot are or rows not table. To in the original automatically update a pivot table, the age ranges right-click anywhere in the pivot table and select Refresh. Sometimes your on pivot the shows the or may not want table. Filtering arrow include only you next list of leave grades I to to the options out. In data row to to view can or the done column select F igure be all those 7.54, we results by in clicking labels. is you will want to to view III. Fig 7.52 The frequency distribution showing the number of students in the two age ranges who registered for the subjects 177 7 Spreadsheets Fig 7.56 Select the COUNT aggregate function to replace the SUM function Fig 7.54 Removing the check mark for the grade IV option so that it will not be and click OK shown in the pivot table Pivot tables summarise your data by either summing or Questions counting of the calculation Right-click of items. Y ou Age (Fig in such on this 7.55) in average, maximum, or cell with the example), then and (COUNT the as can, however, change select this the new example) aggregate select Value aggregate and click the type minimum. function Field 1 State the most following (Sum a rearranges a pivot table, select the b selects c extracts makes up the pivot OK entire table, then (Fig not alter the original data or range press other of may want to delete the if that is of data in order records pivot sheet that that meets one meet or cer tain more criteria criteria it to another summarises data in location another on the and sheet sheet the original without location. Delete. It tables You with the have the following information on where you or lunch and how much you spent: pivot Amount Location easier. Monday $15.00 Lunchroom Tuesday $25.00 Desk Wednesday $10.00 Café Thursday $13.00 Lunchroom Friday $14.00 Desk a Write was 3 i Fig 7.55 Right- click on the Sum of Age cell, then select Value Field Settings result from the above table if the data sor ted: by Amount ii by Day iii by Location by Amount Write ii the i the ltered 178 list data Day table the data ate charts. Y ou describes 7.56). 2 will a specied altering that that function d delete term Settings copies To suitable descriptions: in result by the Amount Location in ascending ascending rst in from in order order ascending descending the following above table criteria: <15 = “Desk ” or order Amount and then order. <15 if the data was 7.5 Practical Exercise 1 9: Enter exercises Using the starting Sor t, Filter following at cell and data A1. Save using Pivot into the a Microsof t for records Excel Table c create a table Subject worksheet workbook Searching in students as with the Grades in the columns. en obtained each grade rows show for and how the the many dierent subjects. RESUL TS. Exercise 10: Sor ting, f ilter ing and frequency distr ibution Sheet: RESUL TS 1 Student ID Subject Grade Enter the starting 1 following data into a worksheet Age English II at cell A1. Save the workbook as 14 LANGUAGES. 2 Spanish III 15 5 French I 18 6 French II 18 Sheet: LANGUAGES Rank 10 Spanish IV 16 11 Spanish III 16 Language Speakers Percentage of population 12 2 Select the English range of II data and 3 Sort the data by Grade 4 Sort the data by Subject 5 also by Grade Use the a information b all c students subjects d all who II an feature the with in subjects Create for a under 935 0.141 2 Spanish 390 0.0585 3 English 365 0.0552 4 Hindi 295 0.0446 5 Arabic 280 0.0423 6 Por tuguese 205 0.0308 7 Bengali 200 0.0305 8 Russian 160 0.0242 9 Japanese 125 0.0192 LANG. order. ascending order, and order. to view : 18-year-old Grade are it ascending in Mandarin 16 name descending AutoFilter Grade 6 in in 1 students IV 18 years old 10 Punjabi 95 0.0144 11 German 92 0.0139 with subject ending Advanced a all students who b all students with in ‘ ish’. F ilter, to obtained 2 Sort the data by Language 3 Sort the data by Percentage grades I to I OR students Use the Pivot Table feature count the Use the number of in students who Advanced Filter to nd the languages that for each Use an the top 10 with more than 150 speakers. Advanced Filter to nd the languages either rank in the top 10 OR have more subject than count the have that results b order. to: 5 a in 17. rank 7 order. population older 4 than ascending of II descending Grade in select: number of students in each 150 speakers. age 6 Create a frequency distribution of the speakers. group Show in inter vals of 150. 179 7.6 Char ts Graphing (charting) data patterns, comparisons having strong easier rows and visual to is and columns impact. is a ver y trends of useful in data, a often way to show data. Instead graph makes can the make data information more of a much A is understand. chart or a can an can create e major a number of chart types with types and their purposes is to chart be having in able to the sheet. W hen worksheet, but data or formulae to analyse interpret a worksheet this the is be of data. (Fig7.57) done, the chart may data set sheet entered chart has no into the Excel. are shown sheet. If a chart is set up as a chart sheet, it must in be Table no chart embedded individual chart chart a without be separate cells, and Y ou in quickly printed on a page by itself. e chart may be printed 7.3. alone or with the worksheet data. Table 7.3 Types of char ts Pie Shows par ts the of a Compares Column Similar the Line Shows Scatter values bar Similar trends over to at a char ts; difference values among whole Bar to relationship given used between and point to show items change of time line char t; shows the Fig 7.57 Char ts can be embedded in the worksheet difference between two sets of values Area Similar to amount line of char t; change shows over Creating the the of be two- or three-dimensional; a 2D the chart will a horizontal (x) axis and a vertical (y) a 3D chart displays three axes (x, y and chart is linked to the worksheet data that from, and it is updated it automatically data when chart is contained 18 0 a is to what to determine present data will the be in what type data. e put on the can create numerous chart types, the most being column, bar and pie (Table 7.3). simplest way to create a chart is to rst select the that will be used on the chart. Data for the chart normally begin with column headings followed by changes. pictorial in suited data the the A important specic is will worksheet illustrate z). data created to axis, e A is best consideration common while be used chart chart. Excel displays is worksheet, it chart other may char t time Since Charts a the or Excel visual representation worksheet. e idea of of data plotting numeric data. Chart not necessarily can be created adjacent by data is selected ranges. For selecting the in ranges example, a range B2:C9 but chart (Fig 7.58, 7.6 6 e 7 Vertical horizontal 8 Horizonal 9 Main axis 10 Vertical 11 Horizonal 12 L egend that plots the categories title axis chart axis Char ts title title axis gridlines axis gridlines Fig 7.58 First select the data that will be used on the char t, whether in columns next to each other (top) or not (bottom) top). However, to by Type, select the Ctrl key create the while another range chart, of A1:A9, then selecting C1:C9 the press (Fig premiums and hold 7.58, bottom). Fig 7.59 Par ts of a char t Titles on and the subtitles chart W izard after icon on it should is the set not be selected: up. Next, locate Standard toolbar or enter the the them Chart Insert Modifying A or the Recommended Charts icon on there and series chart and is of dialogue being modify boxes created, you your chart if to create may see a the chart. As sample chart completing probably it to need prevent to it the resize preview is in the desired its Moving an using the wizard, you embedded the chart worksheet and correctly . Make location, decide sure the chart for it to be if it shows there is enough meaningful for to move it to its all charts of data being need plotted Click the end legend formatting Figure for 7.59 is a legend. If and the data unnecessary . Also consistency explains the move it, it and place borders around it. is there is dened and look at and readability , if dierent parts the chart move new a to chart location a new by in location selecting the same it within and then worksheet. in the background (white space) of the chart. the chart now has eight ‘hand les’. Make sure you select of a the whole chart, not just one of its user. For only by such as the title or legend. one an Click the left mouse button and drag the chart to its axis new title, the can information 2 set you the components example, not data: the that on worksheet char ts worksheet. Y ou Notice data other size, delete possible dragging move data. When is the will 1 chart like necessar y. chart covering is the It After char t follow change the a tab location in the same worksheet. change needed. Sizing char ts chart. e chart may be resized so that it displays data better. 1 e area comprising 2 e plot area 3 e data 4 An the chart 1 points that are plotted to form the Click eight optional label for a data e vertical axis that plots the background of the chart. Notice the ‘handles’ on the chart. point 2 5 on chart the P lace the tip of the mouse pointer on one of the values handles. 181 7 3 Spreadsheets W hen click ◆ the and pointer drag Using one the of changes mouse the to to corner a double-sided resize the hand les arrow, chart. resizes chart to Some the see of menu the options types of for modifying changes that may the be chart. available are: chart ◆ Chart ◆ Source Type: modify the chart type proportionately. ◆ Using one of the left, right, top or bottom the chart vertically (taller) or change the location of data that is options that you sides used resizes Data: to create the chart horizontally ◆ Chart Options: modify the same (wider). had Deleting char ts the Backspace chart key and to press delete the Delete key or Chart the it. char ted Add are linked to the L ocation: the and place chart so the (add or remove data on). chart on a dierent Data: add data to a chart by setting a new range data ◆ Charts created worksheet ◆ Changing you labels, legend, titles ◆ Select when selected data. W henever Add Trendline: show the ‘ best-t line’ for a series of the data data changes, the chart automatically adjusts to reect ◆ those changes. Using the mouse, right-c lick on 3D V iew: modify orientation of a 3D chart type. the Questions 1 Give one reason why a char t can be more useful than 4 analysing data in a Explain char t 2 Explain the dierence between an embedded a char t and Dene the categor y following axis, Practical Exercise 1 11: Enter range value char t axis, objects: data exercises Creating the data a char t L ocate 3 V iew the the between a column (or bar) char t. Explain whether a legend is necessar y for the char t in using Microsof t char t shown in Excel 4 Figure 7.58. Select Chart Once the the your design options Chart W izard Types 7.57. series. on and the Insert choose the chart of and tab. the Column and the 1 12: 2 Select in Chart New (Fig to various and will axis can layout colour add of title to Type Investment. Give modify the axes of the to Plan Chart Investments’. the the text that horizonal axis Sheet the layout the Moving Right-click Move Fig 7.60 Selecting the char t type the vertical created, you chart, including title ‘Individual Exercise been changing chart. Edit the has the chart. Choose chart. 182 pie title, B1:C9. 2 dierence sheet. Figure 3 a char t 5 and the sheet. char t to corner of a new your sheet. chart and select 7.61). and Click OK (Fig 7.62). 7.6 3 e chart will be moved to a new sheet named 2 Chart1. Format the values for currency with no Char ts decimal places. 3 Create for a line each chart Format 5 Name 6 Name the vertical 7 Name the main 8 Move 9 Change the 10 Explain which 11 the the Save chart chart the include to of as as a type of axis axis title type type the to horizontal the this show total payments language. 4 for to as titles. ‘Day ’. ‘Amount ’. ‘Amount new spent on lunch’. sheet. chart of axes to a chart pie is chart. more appropriate data. spreadsheet again. Fig 7.61 Selecting the option to move the char t to a new sheet Exercise Create chart a Fig 7.62 Completing the process of moving the char t to a new sheet Exercise After wish 13: Monitor ing spending to Using use the a set lunch money chart of to data for spending lunch track you over trend below, create a a this trend. Remember that cell 1 Type save the the when creating following sheet as Amount Day in a the compare language set the of data fees below. e charged for teaching languages. following A1, and data save it as in a spreadsheet Language starting Classes. A B Language Fees C 2 Chinese $250.00 3 English $125.00 5 4 French $175.00 8 5 German $275.00 10 6 Latin $150.00 5 7 Spanish $200.00 6 Payments 6 of line spending. chart to formatting data Create a bar or column chart to show the fees for is language class. 3 Format 4 Name the the horizontal chart to include 5 Name the vertical 6 Name the main axis titles. spreadsheet, and Monitoring on using a charts. data spent learn 1 each useful, even the to week, you 2 show chart foreign Type at Fees should various 1 14: axis as ‘Language’. Spending. lunch Amount Monday 15.00 Tuesday 5.00 Wednesday 10.00 Thursday 13.00 Friday 14.00 axis title as as ‘Dollar ‘Fees for Amount ’. Each Language Class’. 7 Move 8 Save the the chart to a new spreadsheet sheet. again. 183 7 Spreadsheets Exercise of 15: Compar ing payments is for exercise number of the language expands payments number 3 classes on the formula remaining Exercise needed Copy for 14 to each compare language the 4 Create total c lass. a rows bar payments Remember: 1 Use 2 Create the same a bar of payments to select column as in column for each of text the next Name the horizontal 5 Name the vertical 6 Name the main Language 7 Move 8 Save Exercise the to title chart to a as number the the Ctrl rst key while data. axis as Determining titles. ‘Number of of Payments sheet. total cost for expands cost 1 Type 2 Use a the of each in Chinese payment of Exercise language heading formula for on each D2 to cell for determine D1. calculate classes. Y ou $1500.00 to class. ‘ Total’ in cell 14 should Chinese. the have the Ctrl total a total to rst key column for each select Format 6 Name the horizontal 7 Name the vertical 8 Name the main 10 chart to to the show language of text selecting 5 9 D2 language. data the the class. non-contiguous column while cell each data, then next hold column data. the Language Payments’. class exercise of ‘Language’. again. the the class. Remember: ‘Comparison new 16: cost of select the Classes’. spreadsheet total axis as the language hold include axis 14. show data, select column Format the chart then 4 is the data to language 3 for Exercise chart non-contiguous selecting 184 data or or from for Move Save the the chart to include axis axis title as as as axis ‘Language’. ‘ Total ‘ Total to a new spreadsheet sheet. again. Cost ’. Cost Class’. chart titles. for Each Printing Microsoft to Excel change change footers the margins, adjust and modify document is page up is set 1 Go 2 Select to may 3 provides a appearance other correctly File tab dierent Customise the should by or print with the Print area: Specify optional can headers/ 7.63). Before always previewing settings page. Y ou (Fig 7.7 spreadsheet ensure the that print a the job. menu. ways sheet of printed features Print. Depending be a orientation, add printed, you the number of a on to your view the features Sheet tab on version setup that Page of of aect Setup Excel your the there page. overall (Fig 7.63). Fig 7.63 The Page tab options on the Page Setup dialogue box is one place you 4 the block to be printed. If a can adjust the appearance of a printed page block of cells option, the 5 Print or selected print titles: the is area Specify columns to before will rows be you already to be printed select be displayed. printed along this along the left the of top each page. 6 Print: W ith options ◆ Gridlines ◆ Black and ◆ ◆ – and white suppress white for quality fewer graphics and and – – column Comments ◆ Cell errors and – up the sheet colour the suppress headings letters – print grid lines images to black printing speed column ◆ or convert faster Draft Row for: around include specify the by printing grid lines print the cell the – printout the border row of numbers the printout Fig 7.64 The Sheet tab gives fur ther options in the Page Setup dialogue box notes content printed in cells Question containing errors Page – 1 ◆ order specify the order in which the Explain one printing will Exercise 2 Select data and Monitoring data the a exercises Pr inting the the Print have 3 17: Open type and one disadvantage for your data or char t. print. Practical 1 advantage pages in data the in printer, tr y and print in worksheet Exercise the Excel 4 spreadsheet. If printing the Microsof t char ts Spending table the using data you to a do the or 5 13. le. 6 the data Print have not PDF Open in the a Select Language the data table in the printer, tr y and print classes in Exercise the or type 14. spreadsheet. If printing the worksheet data you to a do not PDF le. chart. chart. 185 7.8 Impor ting f iles and linking dat a In Impor ting les into step data Y ou can import les from an outside source into of data menu Text le 1 le there or or you of is way can of distinguishing the the the Text wizard delimited be a le (F ig or one the wizard Files the of one column if (Fig you 7.67), you want. Y ou can can format even the choose to import a particular column. column File, Open type to a want, Excel will take W izard. 7.65) xed of each type. you Import select the le character separating you change required choose would tab) a another. W hen other through S tep the from have option, you W hen you you in Excel, not providing 3 Excel will width. (such column let If as a from you it is if delimited, space, the decide comma next. If it is Fig 7.67 Formatting each column of data xed width, spaces were used to line up the columns. Linking Sometimes cell In to the then in cell the in on View the you the cell two the tab from in another the make switches data where links to the cell click Excel open a les one want in will the cells. It the is in worksheet link link or Excel another is a very go, type worksheet is best to simple. Using Window workbook to simple equals and have in a process. sign, press both Switch menu the an le. Linking Enter. les Windows earlier versions, other. Fig 7.65 Formatting the text to be impor ted Figure Figure look 7.66 like then xed exact you choose between treat if shows one had the chosen column width, you step character consecutive spot(s) what and would you of the wizard delimited. Y ou that indicates another. If delimiters where 2 as click you one. If in want the the a data would wish, you data area at splits result 7.68 will the shows be exclamation separation your column would part of the displayed. e mark cell. Figure worksheet name (!), separates 7.69 shows the of the the sheet nal where sheet, then name result. can were the to be. Fig 7.68 The sheet where your result will be shown Fig 7.66 Determining the columns of data 18 6 your Fig 7.69 The value is now linked from one worksheet to another from an 7.8 Impor ting les and linking dat a Question 1 The following function was used in a cell: =MAX(PRICES!A4:A12) a State the name of the function. b State the name of the sheet c State the range of cells. d What is the Practical Exercise 18: purpose of the exercises Impor ting 1 L ocate and open 2 Type the three columns. linked exclamation using the cells. mark (!)? Microsof t data Excel 1 Notepad following that or data. Use WordPad. tabs to separate Double-click on sheet. Sheet1 becomes name the 2 Go ‘ Week to Sheet1 1’ and Sheet2 of at bottom of highlighted. Type press the the the the Enter spreadsheet and name it ‘Summar y ’. Name Type Age Brown Mixed 12 Sheba Alsatian 14 Duchess Great 10 3 Save 4 In a the le new as Dane 3 In cell 4 Click press 5 Y ou 6 In A1, type on the ‘=’ Week 1 sheet, click on cell B1 and Enter have linked the cells containing Annissa. Dogs.txt. spreadsheet, open the le cell A2 of the Summar y sheet, type ‘Average of the Summar y sheet, type ‘ Total Import. spending ’. Remember to select the Files of type option as 7 Text In cell A3 les. spending ’. 5 Click Next. 6 Ensure 7 Click 8 Y our that Next the and Tab delimiter then is 8 In 9 Click should be B2, type ‘=AVERAGE(’ on the Week 1 sheet. F inish. 10 table cell selected. imported in a sheet Select the range B3:B7, then type‘)’ and press labelled Enter. Y ou should see the average amount spent. Dogs. Exercise Open the at the cells cell 19: Linking Monitoring as shown 11 Click 12 Select 13 Click on the Week 1 sheet. cells or Spending enter the worksheet data A1: below and edit starting type 14 B 1 Name: Annissa 2 Day Amount 3 Monday 15.00 4 Tuesday 5.00 5 Wednesday 10.00 6 Thursday 13.00 7 Friday 14.00 15 on on your Click see the and name Summar y the the Week 1 range sheet ‘=SUM(Money)’ and Click to A B3:B7 and press sheet and as in Money. cell B3, Enter. change Annissa name. on that the the Summar y cell has sheet been and updated you will with your name. 16 Click on money 17 Click the for on averages Week one the and of 1 the sheet change the days. Summar y total and sheet to see the updated spent. Sheet1 187 7 End Multiple 1 2 3 of choice Spreadsheets are chapter exam-style questions questions most useful for work ing with: 6 A pivot table that uses the same a videos b payroll a pivot c networks b frequency d brochures. c one -dimensional table d two-dimensional table. A values spreadsheet is a grid area is called eld in the row and a: char t distribution of : a cells b rows c columns a bar d addresses. b column c line d pie. 7 Which of the following char ts shows the data horizontally? Spreadsheets allow you to per form calculations. 4 a ‘how b ‘what c ‘when d ‘why Which loan 5 to’ 8 if ’ the following functions involves calculating payments? a moved b pasted c typed d written. COUNTA b PMT c RANK produces d VLOOKUP . except: 9 Consider ii iii the relative following terms: addressing absolute naming addressing a range of i and ii b i and iii c ii d i, and ii copy data Each of the of Excel data in is a AND b IF c NOT d OR. following the into a Word the Word iii functions automatically outcome ‘ True’ or ‘False’ as 10 The purpose of the VLOOKUP related iii and the a a result, data. Which of the terms perform the same tasks? a inser t document. a i 188 you document, is’ not ’ . of When a delete b nd c replace d summarise. records. function is to 7 Shor t 11 answer Keith is End of chapter exam-style questions questions traveling to conduct workshops across the region and needs to keep track of his depar ture and arrival dates. 1 A B C D E F G TR_ID Countr y Arrival Depar ture Days Claim Day o? 2 6985 Guyana 05/09/2019 05/12/2019 3 6987 Trinidad 05/16/2019 05/20/2019 4 7295 Jamaica 05/25/2019 05/31/2019 5 7324 Barbados 06/15/2019 06/28/2019 6 7361 Antigua 07/13/2019 07/16/2019 7 7455 Belize 07/21/2019 07/29/2019 H I 8 9 150.00 Fig 7.70 a Cell H9 has purpose b Write of been formulae answers to named naming or each a as AMT. range functions of the of to How many countries ii How many days did did he the d questions: Keith spend State the calculate following i Explain data. visit? e in How E ii Column F . The i days did he spend travelling in is the longest time that he spent ii K eith how $150 overseas. much for each Using money he day AMT, has he has f determine In cell than the vii ve cell Total claimed for on shown c State seen the in in output ‘ Yes’ if days in a number column results the needs D5 been to should occurred used be of updated: have been Explain and to each data: 06/18/2018. has a he has countr y, spent more other wise of b wants times G. i and spreadsheet. be ii Suggest g As a what prevent 06/18/2019 what type checks of could it. ii that would be the and the an guide to the spreadsheet update advantage of using alternative give one it. The shown and a when le is he stored one memor y option open for the a this formulae complete and for disadvantage exercise, data functions can stick. one practical enter b access he disadvantage leave that ‘ Yes’ could to that memor y le, of so Describe blank. the of have Keith i G2, in error travels Antigua. vi date of for what happens to the data currently in row 5. claims spent columns formatting He needs to insert a row of data at row 5. Explain overseas? v appropriate spreadsheet The instead many What following Column total? iv most i Antigua? iii the of blank stick. storing this spreadsheet, question in his option. tasks a and to d use as a spreadsheet. 189 7 Spreadsheets 12 Norla is preparing to A submit travel information B that C she entered D 1 TRAVEL for in the spreadsheet E July to Sept shown below. F G 2019 2 3 Countr y Arrival Depar ture 4 Guyana 07/09/2019 07/12/2019 Days Claim 3 150.00 450 5 Trinidad 07/18/2019 07/21/2019 3 450 6 Jamaica 07/29/2019 07/31/2019 2 300 7 Barbados 08/17/2019 08/19/2019 2 300 8 Antigua 08/23/2019 08/26/2019 3 450 Fig 7.71 a State: i the feature that ii the type date to b d Write the a Norla of State an it/they ii 19 0 or of been format applied that Depar ture formula days advanced countries the has and number uses names i Arrival function average c of to she lter where List the the advanced row 1 applied spent and the ii the two which that lter. would be Explain that days. column output from that what she her spreadsheet two her Describe who procedure does Describe recover iii to. countries i travelling. extract realises le is corrupted. columns. produce to she to been spends criterion/criteria apply has Norla lose options she data that should in the she follow so future. could tr y to data. one could not computer-related help to retrieve her professional data. A PT E C H 8 D ATA B A S E S 8.1 Introduction to dat abase management Examples Manual and of how we use these large databases include: computer ised ◆ booking ◆ using databases holidays an online products ◆ for accessing from a Although a large Ver y ◆ e more of way and of requests about have similar dierences: used numerical in millions information for text, whereas work of items. databases main in range database, with want often handled they a item stolen applications often tickets search who or three complex large more are amount handle ◆ ocers are to computer spreadsheets Databases air line particular suspects features, there ◆ store police police criminal a and applications spreadsheets calculations with can more thousands of with easily. entries are databases. the background is dierent. Fig 8.1 Data can be collected on index cards and stored in ling cabinets. In W hen you work in a spreadsheet, you view the this example of a school database there are three ‘tables’ (les) of students, data teachers and grades the Nowadays, computerised use, as that they they help people want. ey databases to also quickly var y in are nd size in and the information on what isrequired. Small as those that keep information be run on a personal databases now play about a any program how our society retrieval important works. Industrial, commercial organisations use databases to and to to you see have more to of is the term hand les the storage, modication of data, as well as controlling who has the maintain information. Database programs, such as Access, L otus Approach, FileMaker available on personal Pro and computers and their people to create their own databases at home, ser vices. computerised information that Paradox, are school Other display – and allow businesses time role Corel public dierent the only at Microsoft in or at see music computer an report entering database, you information. access home. Larger a are a database management system (DBMS) and collection, can you entering. In databases, for such are use A depending data request widespread the you systems databases and include database or work. ight systems in public libraries. 191 8 Dat abases Table 8.1 Advantages and disadvantages of a computerised database Advantages ◆ Can Disadvantages save enormous amounts of paper as well as ling ◆ space ◆ Data The computer(s) can easily be entered by keyboard or ◆ scanners If the then ◆ Speed – data can be found, calculated and sor ted ◆ ◆ Data can ◆ Data needs easily presented dierent to in be be changed entered many queries and only dierent and updated once, ways. repor ts can A be yet get can whole be ◆ range Data ◆ Passwords can be can permission data with to be elds created. restar ted to the required can be ver y of The a produced of Data ◆ A ◆ Databases can be database computer a access database even only can after paper-based includes le can can be par t the network, is not working, used ver y impor tant to hacking database computer In Making into le the can some program can cases, backup some or to the database of the may attempt sometimes by data corrupted lead the copy people information, become virus. This a as condential or le infected not may database not is by working work at therefore to those with ◆ There is ◆ Some databases can ◆ Some databases require often a limit to the size of a database le be the system be complicated to use changed, database would has have to be training, which can be much time to be spent on sta costly scratch impor ted is be essential ◆ ◆ is properly. entr y allow computer cannot database added, A from on set use structure new been checked or database access illegally all. ◆ computer, the Security to The peripherals ver y quickly ◆ and expensive and be automatically shared of a expor ted with local or other wide to other linked users area to if Data may be stored incorrectly programs others the network. This Internet Questions 1 Give an example of a ‘paper b database’ . She she 2 Give two examples of large databases that might then to help members of the to store week ly the from amount cake sales of so money that ever y be three used wants receives months she can analyse her prots using a public. graphic. 3 Annissa is opening a small cake business. Explain c whether a word processor, database or a Annissa items would be suitable for each of the wants following She rst needs information ordered 192 of and to store her the the names customers, occasion. and types keep used of to ensure scenarios: available a to track of the quantities of spreadsheet contact cakes in storage. she has sucient ingredients Common L et ◆ us rst e examine main stores what purpose this data in of a a makes up a database number of database. is to store related dat abase management ◆ A table ◆ A record ◆ A eld consists of consists a collection of a 8.2 features of records number of elds piece data data. It is the smallest of that can be les , more stored. commonly called tables. BOOKSHOP CUSTOMER CID LAST PRODUCT FIRST PR-ID DESCRIPTION Rich P3122 Pocket Diary Clips Database ORDER COST CID PR-ID $8.95 1128 P3430 10 QTY $4.15 1128 P3639 500 $2.75 1128 P3902 50 $3.95 1138 P3745 100 $7.55 1145 P3122 5 1167 P3430 10 Table 1122 John 1124 Aks Todd P3429 Jumbo 1128 Tedd Lou P3430 Small 1138 Yod Ed P3639 Round 1145 King Bev P3745 Receipt 1167 Wall Ann P3899 Highlighter $1.75 1170 Cain Zed P3902 Black $1.25 Clips Labels Book Pen Record Field Fig 8.2 Database components Figure may 8.2 be shows other relating to table has database tables, but the Order. Each a about three are bookshop. One table columns is made with up eld of of a bookshop. ere shown the tables rows names in of that the is database record e the that called records. Each describe records. Each of information that is stored in each the units of 8.3, the Order table has three columns names CID, PR-ID and QTY, and customer the with product row ID with of the 1138 ID elds Order (Ed P3745 Y od) of table data. suggests ordered (Receipt 100 Book). power of a database is that information contained in can be searched, grouped, sorted and/or exported with – eld fourth three eld. In elds Figure in has the e type record therefore seven rows often in a matter of seconds. In Microsoft Access, you of create a database create the tables by to giving enter it the a suitable name data. Table 8.2 before you illustrates ORDER the CID PR-ID 1128 P3430 10 1128 P3639 500 1128 P3902 50 1138 P3745 100 1145 P3122 5 various components of a database. QTY Table 8.2 Database terms and denitions Object Components that make up a database (i.e. tables, forms, 1167 P3430 10 1167 P3639 100 Database Table database A collection such PRODUCT CUSTOMER CID LAST FIRST PR-ID DESCRIPTION Query queries, A Asks as repor ts, can of consist records students specific or macros of and multiple about a modules) tables specific topic, vehicles questions about the data in the COST database 1122 John Rich P3122 Pocket Diary $8.95 1124 Aks Todd P3429 Jumbo Clips $4.15 1128 Tedd Lou P3430 Small 1138 Yod Ed P3639 Round 1145 King Bev P3745 Receipt 1167 Wall Ann P3899 Highlighter $1.75 1170 Cain Zed P3902 Black $1.25 Clips Form A graphical for Labels Book Pen user inter face designed specifically $2.75 entering, displaying, and searching data. $3.95 This $7.55 Repor t is an alternative to entering spreadsheet-like view Summarises formats or quer y and data data from in the either table data Fig 8.3 The data in the Order table links to data in other tables 193 8 Dat abases product Creating a three Before you or create the database and its tables, you choose an eld appropriate name for the database its purpose. en, provide suitable names the tables based on the type of records – programs than one table CID, PR-ID a dash word (Fig 8.3) contains and QTY. In some or makes an up underscore a eld is used name, such if as names First_Name. In for Order that more describes countr y. e must database rst a table that will others they can be written together, as be FirstName. stored in them. Data For each table following in the database, you should consider types the e components: data entered ◆ eld name, which ◆ eld type, also database identies called program data what the data stored type, which kind of data tells goes in a as text, numbers or eld length, which perform with in the example in (also eld eld is operations the data can database be can the data. Again, using the Bookshop Figure known 8.3, the as eld character CID or would be of type alphanumeric), but determines the size of each would be a Number. It is therefore important eld work out the data types for each eld. e most table description purpose ◆ what of dates common ◆ as kind the to in well what the QTY ◆ as determines eld Text eld, such type of the to allow you to describe data types are shown in Table 8.3. the Table 8.3 Common data types found in tables eld properties, which include checks that the data valid. Use this type ... When the eld’s data is ... Text Long (Memo been has renamed as and or shor t special text – letters, numbers characters Long Text) Number as a (also numeric known Numbers, for example 12345 field) Date/Time Date – day, month and year information (for example, 26/08/1992) including time information (for example, 9:32) Currency Dollar-and-Amounts $(Dollar) Autonumber A number as Yes/No as a logical OLE (also Boolean known or field) Object each Only a or £ that record one of checkbox money or increases is two to of (Pound) € – (Euro) automatically added values (for example, tick, Yes/No, True/False, On/Off ) Picture, video clip, sound file or object from another program ( Windows only) Lookup Wizard Fig 8.4 When creating a table, it is impor tant to have the correct eld name, A drop-down box that offers you a limited choice of options for a data type, length and description entry Hyperlink Field Attachment e be Web address that links to a web page name name of each eld meaningful. For which identies example, you should the data not should have An image, spreadsheet file, document, chart or other type of supported file that can be attached to a record; similar a to attaching a file to an email message eld labelled referring 194 to a ‘Name’, since rst name or you a would last not name of know if it is someone, a 8.2 Field all important database tables eld attribute require you to is eld set a length. Not maximum Proper ty type Description Field Size Limits a Text many do. is is because, if you decide the maximum length of a eld, the le be kept as small as possible and there is no field or a to a specific Number field number to the of range it can of store size Format can features in numbers advance management eld characters length, but dat abase Table 8.4 Proper ty types for elds in a database table length Another Common Controls the way data appears in Datasheet wasted view storage space. Also, the kept a time taken to process data is Decimal Places to minimum. Input Mask ink what you would have to do when setting Displays a Number and Sets a length for a surname eld. A eld length pattern of would be right for those whose four characters, such as that decimal fields places in only determines the input of data, such number, as the for hyphens example in a 224-5860 surname Caption contains of four telephone characters number Currency the format eld set ‘Glen’, but not Specifies a label other than the field name that suitable appears in the table and on forms and reports for ‘Ronald ’ (six eld lengths stays (5 30 – characters). Some for example, 30 characters characters) is long even tables allow characters. e when the name xed Default Value Displays eld a specified value for a field in new records Smith entered. Validation Limits the data entered to meet a certain Rule requirement. For example, you can specify that the CustomerID field cannot be less than 1000 Field Validation Text descr iption Specifies in Y ou can enter an optional description for each an error the Description column in the design appears on the status bar on entering brief or the Field data a form. Examples comments that should of about be a when the description the stored purpose in eld error of include has a set of properties the eld Required Specifies when it. that control the However, you to set or you can change create display any a table the property in Design Design view at properties available in Field quotation Design view window (Fig 8.4) pane depend on selected types are in listed the in design Table grid. Some of the the can Usually e 8.4. item which called eld the must is used to eld of identify primar y key eld uniquely identify each the record contains record. is . is each value in you enter, say, 900 in the the field data whether marks (“ ”) is no data up retrieval for cannot into or in a not a that be left empty record you field field can to in enter indicate the that key fields of are data in a record field. automatically All indexed used to CID eld uniquely in the identify Customer not use First or Last eld each customer. names, as more one person may have those names. property need of database particular at data key one if Speeds example, the be would think Pr imar y star t of than type example, IDs time Bookshop Properties up enter Determines Y ou the entered For . settings. the data rule. field that Length table e appear way view any pop you primar y when the to message ‘Customer Allow Zero Indexed properties if validation CustomerID proper ties eld want is there Each message the 1000’ will accessed you grid. e the description tex t eld violates in the eld the record. Using an and is your key the you for a what for nd database – becomes happen if that a there more number are than unique (key clear you Smith. Smith and have identication eld might John may therefore, to key is wanted a of to on search such It as which is a surname Smiths John! reference eld) you common lots one when in better, an to search. 195 8 Dat abases Other A unique is keys candidate key can also unique. However, only primar y table A contain composite two or more cannot are one key. Candidate may be a key is a primar y a primar y eld keys none, one the must are or primar y elds. In multiple be key be entirely several key Bookshop key in the occurrences of 1128 it chosen so product is as the optional, so of that if done same that and a customer more than can one order more customer can than order one the product. a them. made up of database, CID Order and table 1167 as in there that Fig 8.5 A composite key is a primary key that can comprise multiple elds column. Also, PR-ID Order listed table more composite either than key cannot because be a primar y P3430 and P3639 once. erefore, F igure using two elds CID key 8.5 and in are the also shows a PR-ID. is In a database more a where tables, if foreign key it in is the a the same primar y other eld key is in found one in two or table, then it is tables. Questions 1 Put the following smallest: 2 Explain what following last, 3 rst, State terms database, in eld, descriptions and whether PR_ID, whether order record, can they from largest to table. be are used for suitable use lives f centre with g day h vehicle registration I receipt number J quantity of eld of the following eld of a primar y key, or foreign candidate It is impor tant before ID printed on a student ’s school b student ID printed on a student ’s exam structure creating of a database one. The is to contain information on following members of family. ‘Relation’ represents what relation card this member is to you, such as sister, uncle or self product code used to identify the name of product (meaning subject code printed next to each subject on exam code is Choose an adult on a list of the subjects oered the this or most a child. suitable eld type for each eld at (see Table the whether card a school yourself!). ‘Adult ’ states a member student ’s g the star t repor t your f plan you key : student e to key, a d ordered. names table c number CID. use key exam names: carefully composite mother? code the 6 represent e 8.3, which shows dierent eld types). school passpor t driver ’s ID to collect licence ID to student ’s collect exam student ’s b Choose c Explain the maximum eld length for each eld. card whether a eld in the list can be used school a primar y key. If not, explain what eld can be repor t created h student ’s receive ID and subject student ’s grade code for requested that Explain why a primar y key (such as StudentID) all numbers would be given a data type FirstName of text and not number. Relation 5 Identify a suitable data type for the following elds: Month a subject b mobile c name d days ID Male? number Adult 196 of school absent from school primar y Field that LastName comprises the key eld. subject. Field 4 as to of Bir th type Field size Key eld? as 8.2 Practical Exercise 1 1: Start the exercises Creating the Access Microsoft dierent a using Microsof t Exercise Access depending by double-clicking icon. ese on your icons version of may on 1 Now 2: Creating that to 2 you to provide a name for for close database, or you can browse to open database. Select the option to database that this folder if and database you do type is not the saved name in specify created to on the create the a database so, then delete Access Bookshop database table, labelled as le program called you Table1, may right-click on its a are be label it. provides table, quer y, form or options report. e to create Bookshop will require three tables, called Customer, an create and Order. Each table is created in a Design new features the Product existing time you. If and database new management table have empty Microsoft a requires is a table. Depending Access. created Access you database, it look using, an 2 dat abase Access database program Common view. Bookshop. Note your Documents another location. Fig 8.6 Creating a database called Bookshop Fig 8.7 Microsoft Access provides options to create a table, query, form or repor t 197 8 Dat abases 3 To the create icons Table is the or and called rst table labels view that its (called will Customer), locate allow design. For you to now, the Create new a table Table1. Fig 8.9 Entering the design of the Customer table 6 At this value point, you uniquely should identies choose each one record eld in a whose table. Fig 8.8 Star t with a blank table in Design view If 4 Click then in the press choose rst Field Enter. In the Text the description the Field the as the descriptions area your to and Type Enter ‘Customer following in box Data type, press Properties size. Enter Name type then ID’. Click type eld 4 when for the the type below to are name Field type Text Customer ID Customer ’s Last First Text Customer ’s First the the calculations other wise are the chosen. Click not Use the eld is Text, since performed Number data again the on on type CID this would eld 8 eld, Field 198 the following Size: do or as + Key S to the Customer and that no CID icon save one exercise, make number this, select Ctrl create key, meaning four-digit Primar y table dialogue eld . en the and two c lick table. click OK to eld box. Y ou have created your table. same Bookshop labels Table and Enter the that view its will database. L ocate the in allow you to Create a design. following descriptions be name or this eld names, types and table. and Field enter primar y this to Name icons CID table. For like Name 7 the the would key, Microsoft Number Text that a primar y Description Last Note the a you the has icon Customer 5 if same. To Save close CID you eld select Name Field dene save item the the table. asks CID and and not you ever y eld names, types do Access ‘CID’, column, and you name Field type Description properties: PR-ID Text Product ID Description Text Description Cost Currency Unit 4 Validation Rule: Validation Text: of product >999 Customer IDs start at 1000 cost of the product 8.2 9 Make as 10 PR-ID primar y key and save the table 12 Product. Use the another be 11 a used Enter blank to name Bookshop table create in the following descriptions Field CID key. Select same the Make in this Field database Design Order eld to create view. is will table. and table. type and the the Shift the Primar y elds names, types Common PR-ID CID key, select will Key have dat abase composite row, then the icon the the management while PR-ID in the Primar y primar y pressing row. en Menu Key features click bar. Both icon next to them. 13 Save the table as Order. Description CID Text Customer PR-ID Text Product QT Y number Quantity DISCOUNT Yes/No 10% ID ID from inventor y ordered discount oered on Product 199 8.3 Tables and should be coordinate connected to Joining enter is joined, so the same means the you in you to related can create dat abase can the saves in create data you all tables information allows from that information tables. Joining addition, it queries multiple access elds you several of in at is, a from the many tables. In the smaller, more the having reports, forms tables t ables and database ecient le. can be related when you need access to the in one employees, or one record matching the records is matches employees shown Department in the many example, one many department. is in table table. For one in are assigned Figure table Employee records department can has to 8.10, where have many table. tables In that record other applications such as Microsoft Access, the linking of data. tables is is called shown in a relationship. A Figure 8.10 by a one-to-one line relationship connecting the Relationships two e linking of two tables can occur in one of two entities with relationship. A with ◆ one-to-one ◆ one-to-many. of M the or an is type of (1:1) linking understand usually takes place when key in one table matches the one-to-many innity table. An example of primar y one-to-one key in employee has a personnel linking record, or a the is is created on each employee. In one record in the Employee table Figure that in many Bookshop who 8.10 record in the PersonalRecord links with a with a when foreign key or primar y a key combined in key one in Fig 8.10 Linking common elds between pairs of tables 20 0 has by database Order ordered linking to both a pairs are should ‘many ’ end other use example one with tables, how which of that you the do you product? is tables tables. ere customer elds. e (1:M) one texts, you and product. Figure table. occurs there the is that have a eld can is related place one or data in more these orders table. their is denoting shown one for One-to-many (∞) is there tables, since other sign relationship personnel common is the that achieved record of the identify each ‘one’ ends best. Customer, Product second the the Using primar y denoting relationship. Although conventions One-to-one 1 ways: table links another table. 8.11 primar y shows key three eld is tables again underlined in with each 8.3 Linking CID LAST FIRST PR-ID DESCRIPTION Rich P3122 Pocket Diary $8.95 Aks Todd P3429 Jumbo Clips $4.15 Tedd Lou P3430 Small 1138 Yod Ed P3639 Round 1145 King Bev P3745 Receipt 1167 Wall Ann P3899 Highlighter $1.75 1170 Cain Zed P3902 Black $1.25 John 1124 1128 ensures that the multiple data in dat abase the t ables database PRODUCT CUSTOMER 1122 tables Joining remains COST wish Clips $2.75 Labels will a as possible. For customer not allow who you to has do example, if placed so until you orders, the the orders for $3.95 customer are deleted. at way, no order can be $7.55 placed Pen accurate delete database that Book to as without having a customer’s data linked to it. ORDER CID PR-ID 1128 P3430 QTY 10 1128 P3639 500 1128 P3902 50 1138 P3745 100 1145 P3122 5 1167 P3430 10 1167 P3639 100 Fig 8.11 Creating a relationship between pairs of tables for the Bookshop database Questions 1 Use Figure 8.11 to answer the following questions: DIVISION a State whether relationship b c State State the the ordered d State e 2 How Answer Spor ts a rst of key names have in of each the a one -to-one the of the customer table. customers customers questions product with placed based on Code Category U13 Under 13 U20 Under 20 O20 Seniors relationship. who labels. description by tables one -to-many primar y many the or round the ordered pairs ID that was a State b How many the names records of c How many elds d In the tables. 1145. are in the Athlete table? orders? these two tables in are in the Division table? a each table, state the most appropriate eld database: that e can State be the used name as of a primar y the table key. and the eld that is a ATHLE TE foreign AthleteID NameOfAthlete 121 Jade 231 Shade Boyce 351 Neil Skeete Hall Code Gender U13 F U13 F U20 M key. f Identify g Explain one h or Figman McJig O20 whether Eli Jarad U20 that the is used tables to are link the linked tables. as one -to- Explain whether can be the row deleted for the from Under the 13 Division table. M i 187 eld one -to-many. division 142 the Explain whether the row of data for athlete 142 M can be deleted j Write the k What division from name(s) is of the Athlete the seniors. Athlete 231 table. in? 2 01 8 Dat abases Practical Exercise 1 3: Open in exercises Linking the tables Bookshop exercises 1 and in using the Bookshop database 2. L ocate Microsof t that the database was Access 6 toolbar have created Customer created Database Y ou 7 Repeat and the contains the Relationships icon relationship Order between between the tables. procedure relationship that a in steps P-ID in 4 to the 6 to create Product a table . and P-ID in the Order table. 2 Exercise Show Table icon on the toolbar to make 4: Linking tables in other databases it 1 Return to the previous example on the Sports appear. database. 3 Double-click on the Customer, Product and 2 Order tables. W hen you have nished adding Create the database called Sports, and then the create the two tables. tables, clickClose. 3 4 Now click table and on the CID eld in the Link enter drag it to the CID eld in the Ordertable. 5 An Edit Relationships (Fig8.12). Make Integrity press OK. is enforce with option rules and sure is that remains the ticked means so your valid pops Enforce in that Fig 8.12 Enforcing rules on your data 2 02 window the data up Referential checkbox Access is the tables using a common Customer will valid throughout its and help to you start use. the data in each table. primar y key, and Capturing Y ou the can start table table. Another you database to sure views view, simply corner A of form is your record form have there Access and to in is table. It and a ver y good means of will to you a give data in to enter view eld of as in and (Fig where your form still be your a primar y this the eld. To Design hand all 8.13). It you table a work the as on if in have elds a also name same you the one change table. many in is with the means you can dierent changed when see you top-left data. is use elds in screen. Fig 8.13 If you keep were in scrolling Sometimes related you useful they to Field Data on see a may to (Fig Datasheet that create with are on wish sub-form along to you data may the all form 8.14) their need view, you at to record see a eld the see in the far for would left one one orders of the costs, quantities have and form. For one You can enter data using a datasheet (top) or a form (bottom) to orright. record the example, customer. It customer showing 8. 4 dat a completed eld data entering window. the also can a the table both same form, it in enter they the always records can each Datasheet program delete table, but into button way have allows selected is the the you view data representation information a click datasheet. Y ou from A that another add, update a you once view, Datasheet raw between the graphical the enter table. If key, make switch data design. Design database allows entering and data products ordered with is a ordered and whether discount. options entr y should be as simple and quick as possible. Fig 8.14 A form showing the customer ’s name along with a sub-form of the is is particularly hundreds or important thousands of if a database records. Data products ordered, their costs, quantities and whether they are on discount has also needs to In be accurate. To help with this, you can set the most values options for elds. One entr y option is to get data automatically entered into a eld. For into eld could automatically enter the number each new record need to enter the same a eld repeated ly. For example, it is much and more accurate to choose a product from a than having to type it in each time. A value 0 list for also example, the list, rather Q uantity will to quicker be databases, you entr y (or combo box) lets you do this by choosing a value entered. from a list (Fig 8.15). 2 03 8 Dat abases Other entr y Instead check of a of typing box tick options where means buttons, also of data entr y inputting include Y es a or tick No a in means ‘No’. Another known reduce as check a (Fig eld, you ‘Y es’ and option option the box is can the to of have a absence have buttons. ese possibility 8.15). error radio methods when data. Questions 1 Explain Design 2 the dierence view when State the name of table that allows State two data between creating the you a graphical to Datasheet view and table. quick ly representation add of a records. Fig 8.15 Value lists are a quick and accurate way to enter data. Here a list 3 entr y options that can be in database. used to is shown where only one product can be selected. A check box determines quick ly and accurately enter data a whether a product is eligible for a 10% discount Practical Exercise 1 5: Open exercises Enter ing the Exercise using Microsof t Access data Bookshop ◆ database that was created 3 and 1. Double-click To switch Design on views the Datasheet ◆ Design : : and the click view view types Customer between view, simply ◆ data modify select in ◆ 2 To the to datasheet button allows allows table you you descriptions to into in to open and the your To delete record record replace select the a it if and with you eld the have you text Record (F ig want you record, right-click Delete made an to error, update, want. on the row and 8.16). top- enter enter it. the a raw elds, database table. 4 Click on shown Datasheet below CID into view the and enter Customer Last First 1122 John Rich 1124 Aks Todd 1128 Tedd Lou the table data and save it. Fig 8.16 Deleting a record from the Customer table 5 ◆ To add next 2 04 a line new and row, press enter the Enter or select information. the Click CID on to the rst record 112. Press validation rules Enter working again and (Fig and you change should 8.17). the see your 8. 4 Capturing and entering dat a Fig 8.17 Entering a number that is not valid results in an error message 6 Select the Product table and double-click to open it. 7 more complex create Enter the following 1 Description P3122 Pocket Diar y P3429 Jumbo Clips P3430 Small Select 9 Enter the the Order basic table $8.95 three $4.15 2 $2.75 and Open double-click to open it. records: Product ID the icon 3 QTY P3430 10 1128 P3639 500 1128 P3902 50 Microsoft form, and a Access even basic does a is provides a good Form of database with tables. Each the table Customer, should have data. Customer the table. en Create tab and in the then menu the or Form option in the creates a simple form using all of the Use the table. form to enter the following records in the table: Y CID form ver y Order Discount 1128 Create to . Customer 6: Bookshop and ribbon, select 4 Exercise steps form: records Select elds ID the Product Cost Clips following Customer these records: PR-ID 8 a forms. First, follow job of W izard creating for a creating Last First 1138 Yod Ed 1145 King Bev 1167 Wall Ann 1170 Cain Zed 2 05 8 Dat abases Exercise 1 7: Select Create the the table the table. en versions of , which More Select a some using icon the 2 form Product W izard. In an a or Forms elds quer y option needed from on for the wizard activate the Access, there can the also be drop-down Form may found view be in ribbon. the form by on your from the pane to them Tables/Q ueries form (Fig the F ields Selected would select use Available the pane. Y ou selecting menu. To use > elds arrow window Fields >> the if to in window you are you want move the in them left the right selecting all 8.18). Fig 8.18 Using the Form Wizard to select elds 3 Click 4 Select 5 Y ou Next. the may light be 6 Click 7 Give 8 Y ou 9 Enter you asked background to if wish select you and the are click style going to Exercise Next. you desire. Use print your a form. Next. your the Order 1 see the name your following Product and click form. data Description Labels using the form: Round P3745 Receipt P3899 Highlighter $1.75 P3902 Black $1.25 Pen Completing the data entr y Use the Form the W izard following or data another in the the method Finish. Customer Product ID ID QTY 1138 P3745 1145 P3122 5 1167 P3430 10 1167 P3639 100 Discount 100 $3.95 $7.55 with Order Cost P3639 Book 8: table enter form should PR-ID 206 layout Yes to to table: of 8. 4 Exercise 9: Creating 1 Select the 2 Activate 3 Select the Q ueries move form Form elds a from the pane to or ll 14 Available the from form the menu. Use F irst F ields Selected in leave for quer y CID, then the sub-form table. needed table a W izard. drop-down the with Customer the selecting a and Last window Fields > arrow eld in window to names the in Click the First: June 25 for and the entering quantity dat a and blank. add of a new data for record. Enter a new the order: Jar way QTY: the to record 1199 PR-ID: left icon CID: Last: elds. Enter discount following by Tables/ the those the Capturing P3745 25 rightpane. 4 Practice so that adding the additional elds are elds selected in from the the tables following order: a Select the PR-ID b Select Order elds the Select QTY 5 Click 6 If the and (Fig and add the CID and and add the and add elds. Table Discount again the elds. Next. prompted, view will Table Cost Order and 8.19a). Product Description c Table be able to see the the data by form Customer. Y ou and sub-form in the Fig 8.19a Selecting the Order table preview 7 Click 8 L eave pane the layout form and 11 L ocate Finish 3 the of Add in the to record customer At leave 3 L ou as the the name (Fig see to of sub-form as Next. Form sub-form Click option click Customer Order 13 and Type 10 12 8.19b). Next. Datasheet 9 (Fig of name the of the main sub-form as 8.19c). the nal view the form (Fig orders for 8.19d). the Tedd. bottom of the form you will see Record: 7. the the following PR-ID and order enter for L ou Tedd. Click P3745. e Customer Fig 8.19b Viewing the data by Customer – you can see the form and ID, description and cost of that product should sub-form in the preview pane 2 07 8 Dat abases Exercise contains 10: Create the Team a form and for the Division Spor ts database that tables TEAM AthleteID NameOfAthlete Code Gender 121 Jade U13 F 231 Shade U13 F 351 Neil U20 M 142 Figman O20 M Boyce Skeete Hall McJig DIVISION Code Category U13 Under 13 U20 Under 20 O20 Seniors Fig 8.19c Naming the form and sub-form 1 Create a database 2 Create the two appropriate 3 Select 4 Create a data form Sports. tables, choosing suitable a called types in primar y to enter each key the the most table. for data each in the table. tables as follows: ◆ Main form: Division ◆ 2 08 and Categor y from the table Sub-form: Gender Fig 8.19d The nal form showing the orders for customer Lou Ted Code AthleteID, NameOfAthlete from the Team table. and Searching Computers systems have since important they automatically, to sort data known into can make some as data advantages work extremely calculations useful over and form. All a manual quickly, and to retrieve these and functions are list of can it run quer y will you realise what to want database that search (conditions) to you is for the reasonably must for. Y ou nd, but quer y (also a tell do the this software straightfor ward program by search. Y ou the known question is as using searched particular giving might does precisely clear know not – once a lter or ordered Ann Y ou as the to nd condition. A ‘List round and may that match you the have needed. Even if you add condition created the more a results data that quer y, you to of the the table. W hat data ◆ W hat sort is data in a all the quer y is the rst labels.’; it names is not of the what you Q ueries you tell it. used several questions. W hen a queries quer y is to that question the ‘run’ it (elds) order do will I do I want need help queries, ask to yourself: ask? displayed? me the most? To can search a be as simple or database, you into one or more as complex must elds rst for as enter their you the like. search tables. en instruct (for dierent produces as the the program conditions to that nd you all have the records set. For that example, to match the products with orders that are less than 50, you you customers results ask question your to type <50 in the QT Y eld of the Order table. who example, L ou). make design database. e records the to criteria until search) begin ◆ would ask, such as updated specic nd a be W hat match database often ◆ you answer as you criteria A records quer y. Once 8.5 sor ting processing. Searching a the the W hen Searching all dened and First Description Lou Small Bev Pocket Ann Small Clips Diar y QTY 10 5 specic Clips 10 output Fig 8.20 Using the Query Wizard to select elds in a query 209 8 Dat abases Fig 8.21 Creating a query to list the products with orders of less than 50 After executing records e that the were comparisons quer y, you produced that you may from can see your make one or more search. in queries is inc luded the criteria the dollar on which database program you are 8.5 lists some common operators using nd one e to word nd ones want up 210 ‘criteria’ in only that to for certain do not limit specic the specic a database records meet the results criteria. If a and of your record records means you ignore others criteria inc lude or text as any percentage the marks. For quer y, you those result: below (the can the illustrates want conditions). If meets not ($) also in Table formatting symbol 8.5 that such as (%). Any criteria is enc losed in double example, suppose you wish used. to Searching does sign results. Note using. quotation Table the will search depend in you set criteria, it the specic to Small how with Clips you eld only that wish costs, make you to sure ID wish the only in you see can their product those two the wish elds to produces $2.75. Figure P3430 where other see P3430. is costing place name records. e indicate you product criteria to be nd row the selected results as description elds 8.22 are (ticked) well. If and the selected. 8.5 Searching and sor ting Table 8.5 Operators used in searching databases Operator Meaning = Equal Example to “P3122” searches that > Greater < Less >= Greater than > than Less than * Asterisk, or or equal equal to used the >= to known to as a wild-card represent one or character, more can 5 searches than or <= searches to be searches the product product cost ID number field to find all products with ID field to find all products that cpst more than $5.00 < 5 searches the cost field to find all products that cost less than $5.00 than <= 5 identical 5 the to cost field to finds field to find products whose cost is greater $5.00 the cost products that cost less than or equal $5.00 “R*” or characters equal begins like “R*” will with R, for find all products example Receipt whose books first and character Round or letter labels Fig 8.22 Searching for a description for product P3430 Also the notice elds table that you then there need the your result. To and Figures nd press 8.23 those that and and products you the begin the may a in key more duplicate on Description Pocket one from records the in design, select table your than in deleted quer y other ‘R’ (F ig selected. If found be remove show cost with nd table are should table Delete one quer y select 8.24 that only tables delete table, right-click table for other quer y. Other wise is or select Diar y Receipt Book Cost $8.95 $7.55 Fig 8.23 Query to nd products that cost more than $5.00 and its result the the keyboard. examples $5.00 of (Fig how 8.23) to or 8.24). 21 1 8 Dat abases Quer ies Y ou can create together nd the than $5 shows more more than customers in on in the names. is more who of search more joins the two queries by products than Access criteria one row example, costing less 100. Figure8.25 <5 and but queries eld linking condition. For ordered Microsoft same than complicated one quantities how placed using >100 under with are their the eld AND operator. Another products quer y costing quantities of Microsoft labelled one are the is OR than Access as in $5 less more <5 the in the same More $5 >100 ‘or ’. It criteria result ordered products are not the joins below 8.26 placed does or row. is than OR who 100. Figure and operator. e or customers than than can shows on row two be how two matter OR the with in lines which once they queries saved as with L ess 100. First Description Lou Small Clips $2.75 10 Ann Small Clips $2.75 10 Lou Round Labels $3.95 500 Ann Round Labels $3.95 100 Lou Black $1.25 50 Pen Fig 8.24 Query to nd the names of products that begin with ‘R’ and its result Fig 8.25a Query to nd the customers who ordered products costing less than $5 in quantities of more than 100 212 the ‘criteria’ and entered not nds Cost QTY 8.5 Searching and sor ting Fig 8.25b results from query to nd the customers who ordered products costing less than $5 in quantities of more than 100 Fig 8.26 Query to nd the customers who ordered products costing less than $5 OR quantities of more than 100 Notice since if that elds elds in these were from queries needed the all from Customer three each and tables were more used AND table. However, Product tables Order table should not be deleted or OR to quer y. e join two dierence conditions between using is: were ◆ needed, the complicated since AND: Find only records which match both of the it conditions. is linking these two tables in the database. For example, ◆ suppose the Bookshop needed to contact all OR: Find records that match either or both of the customers conditions. who ordered would be Product Black selected ID Pens. e from (PR-ID) the or First and Customer Description Last eld names table, while for the the Black Reversing Sometimes could be selected from the Product table and not not match to nd Lou. e words used may want to search for records which a particular criteria. For example, you may table. want e you the do Order quer ies Pens to AND link two and OR simple are the only conditions ones together that to can make all customer keyword NOT orders is used except to do those this for (Fig customer 8.27a). be a 213 8 Dat abases Fig 8.27a Query to nd all orders NOT placed by Customer Lou Figure 8.28 is to used shows order how the the sort option in Design view data. Fig 8.27b Result of query to nd all orders NOT placed by Customer Lou Sor ting Most databases displayed order ◆ in you which a will let specied must eld you sort data order. To sort so a that it is database into an specify : in the database you wish to use to order Fig 8.28 Design view showing how the last names of the customers can be the records sor ted in ascending order ◆ whether or Sorting you records records in order. Being of Microsoft of sorting e can 214 a to to times sort a sorted A) three the ascending order reorders the may quickly have one result show name eld Z) Figure 8.29 option in shows how is the view is Sort used and to Filter sort menu the data. one on or sort descending of the your more remains how in also and or Datasheet database can ascending records to . order. Y ou in examples last (A browse, update, export data. However, the by in database. Depending Access, you your to particular using following be (Z you and able of records temporarily allows numbers, dates advantages the descending le. Sorting print want your version methods the same. results ascending order. Fig 8.29 Using the Sort and Filter menu option in Datasheet view to sort the data 8.5 Figure order All 8.30 the these uses the Sort option Searching in the eld and sor ting names to data. methods will give the following Last First Description King Bev Pocket Tedd Lou Small Tedd Lou Round Tedd Lou Black results. Cost Diar y Clips Labels Pen Wall Ann Small Wall Ann Round Yod Ed Receipt QTY $8.95 Clips Labels Book 5 $2.75 10 $3.95 500 $1.25 50 $2.75 10 $3.95 100 $7.55 100 Fig 8.30 Using the sor t option to the right of the eld name to order the data Questions 1 Select the sor ting i ii most data suitable as A to options that describe b the the c Write descending d How iii top iv bottom Use the You to 2 to wish to shown in Figure 8.31 to answer 3: list the names that would be used in the the eld would to name the list and criteria the the criteria change products if that for the the quer y. quer y cost $3.00 was or less? top. template and eld changed bottom quer y under names of the products that 3 You wish to list on discount. a Write one the or names more of tables the that products would that be are used in cost the quer y. List the $3.00. b a List quer y. Z: ascending questions 2 of Write one or more tables that would be used eld names that would be used in the in quer y. the quer y. c Write the eld name and the criteria for the quer y. Fig 8.31 Query template 215 8 Dat abases Practical Exercise 1 Use 11: the exercises Searching Bookshop and using Microsof t sor ting database e to create queries f the names b the products c the names discount; d all the of products that the sort customers the 216 of by cost more products the who customer’s that last name ordered name cost than that of Black g all customers than $5 in customers than orders $5 who ordered quantities who OR except of ordered quantities those products more than products of placed more by costing 100 costing than 100 Customer L ou on product Pens; the less $3.00 $5.00 are the under the less to list: a Access sort by h the names i the customers ‘ Y ’. of products whose that last begin name with begins ‘R’ with Calculated A calculated e value more eld in elds this is a ‘ virtual calculated from a table or eld ’ in eld is a a quer y or function of report. one or In this syntax of a calculated eld is two QTY ), and quer y. eld e case, the involves always the may expression elds the from for the contain $27.50 as this calculated Bookshop multiplication 8.6 f ields table operator. e one of the eld (Cost Total calculated and Cost eld same: results. New eld name: [Expression] Mathematical Calculated For example, the Total Cost elds syntax with for the numbers calculated eld An called is: aggregate Access to perform these Total Cost: [Cost] * that quer y allows you specic functions is are functions a special to type group your mathematical shown in of quer y within numerical data functions. Some Table of 8.6. [QT Y ] Table 8.6 Aggregate functions where Cost is the cost of the item and QTY is the Group quantity ordered (Fig matching values in a field are grouped together 8.32). By Note Sum that: will give a total groupings ◆ ere ◆ Only ◆ e must be a colon after the new eld in eld the eld names names must are be table, other wise enclosed written the in square exactly system may as not brackets. they are will give fields Min will Max calculated eld name (such as Total be a meaningful name and can records the in Group this By field for the field return average each of all records in the specified grouping the single lowest value the single highest from the group of will return the value from all records grouping Cost) Count should the within within e the in records recognise them. ◆ all name. Avg the of indicated counts the number of entries within the designated contain field spaces and underscores or dashes. Fig 8.32 Creating a calculated eld for the total cost of a product 217 8 Dat abases To use quer y an aggregate either view. Add click extra row the and icon SUM e total criteria then nd the cost (Fig result. Save of the the the from quer y to to the be are a the By for Design calculation. causes list an suitable can each be customer, quer y, click the Cost Group Costs using a viewed. customer's as in create added. A cost in rst or . is total eld each used Group results 8.33). en function cost be area must wizard icon from the the can Totals function adding Totals which the example, to after the on in aggregate For activating elds Next selected by function, you By order of on eld list is the select (Fig 8.34). shown in the Fig 8.34 Clicking on the Totals icon in the query produces an extra line ‘ Total’ in Orders. the design grid, where the list of aggregate functions is shown Y ou can choose to sum the items, giving an overall Results total of the ‘Sales’ and items click sold on the (Fig 8.34). Save Datasheet view the quer y icon of using the SUM aggregate function: as to Last Total Cost King $44.75 Tedd icon Table again to perform other functions shown $2,065.00 in Wall $422.50 Yod $755.00 8.6. Calculated Suppose product you ID calculated wish and eld this Product the ampersand contain eld a Desc [PR-ID] (PR-ID (&) text eld description. e expression table with produce called case, the the to its Desc: In elds syntax for the the is: & [Description] involves and two elds Description) operator. So, the ‘P3639Round containing Labels’ as one Desc of from and eld the may calculated results. Instead of having PR-ID and Description run together Fig 8.33 The Totals icon is used to create aggregate queries. The icon is found in the Design view of the query menu in the new separating modied Desc: the eld, you two may parts. e prefer syntax to can have a space therefore be to: [PR-ID] ‘P3639 218 Desc Round & “ ” & Labels’. [Description] to produce 8.6 Errors in the you query , you parameter elds quer ies Sometimes, after run Calculated have see a value’. is incorrectly and your misspelled eld created dialogue occurs (Fig calculated box when database name a asking you program 8.35). T o you spell a the and to ‘Enter eld cannot solve eld nd name the problem, Fig 8.35 A Spelling error in a calculated eld simply correct the spelling mistake in the eld name. Questions 1 Given the eld Description produce a Join result b Join is Join is 2 What 3 Using is similar Exercise similar 1 Use a the b c nd how 10% the New pens of an the much cost name the elds so that the cost error produce a write quer y? calculations Microsof t discount of on × create on the each is the queries deducted cost of product the that product the identify e calculate Exercise 13: 5 Open 2 T o the most the expensive total an number least 6 7 product of aggregate Bookshop a activating Add the cost that of all will deducted the if there product where New produce: the product that is the least c the product that is the most d the total Click on number orders of expensive expensive products. the Datasheet in Design view icon view, in a to see new the eld type Cost:[Cost]*[QT Y ] Remove the QTY only Click Select quer y products. checkmarks that Last on the show and in those the the rows columns Total Datasheet the Cost view icon for of are to Cost data, so shown. see the Last wizard name icon now has an the Group each Change eld the on extra in Group line By the By the Menu bar. Y our ‘ Total’ in option is the now design shown quer y. in the Cost and QT Y database. calculated the Totals grid, while under quer y query , create a or using eld in the to Expression, and change the Group query, either Design in the Total Cost column to SUM. view. 9 3 is product b By by each of 1.10. function columns produce where results. Creating the on cost total and 8 1 × the ordered Cost discount the Total if where is on × product a that product the much mark-up cost results. en to: expensive d State = each Quantity how discount the of Access 1.10 the nd = cost to: 4 to total cost 10% Cost $1.25’ . in the calculate is 4 to using database discount = that f ields mark-up Cost so elds Bookshop, exercises calculate nd called elds Jane’ . Cost nd Total to c Lastname and cause Calculated is elds Smith’ . and to ‘Black Bookshop there calculated Lastname to ‘Smith, typical table 12: and Description Practical a Lastname, b to ‘Jane similar the the create Firstname the output Cost, Firstname, following: Firstname the result c and the the names Customer Click on the Datasheet view icon to see the table, results. Cost eld in the Product table and QTY eld in 10 the Order table to the Save the quer y as ‘ Total Orders’. quer y. 219 8.7 A quer y Repor t simply selects database. Often elds from records way you to in with a and particular may records particular present have data the you your control formats that in the kinds of minimum, maximum in found and or report and the is only the some display an the eective format, because appearance report subtotals from display printed size headings. F ields dierent are a records to order. A data over want can including be of the grouped sum, average. Fig 8.36 Example of a tabular repor t Typically, a report ◆ which elds ◆ where to ◆ the ◆ how ◆ what statistics from the in tabular columnar are (set a of the you table. e a out as types of items databases things: together database to calculate of records, formats (Fig form) of 8.36) (Fig or 8.37). printed, multiple the order could in the could into be print record elds provided report will displayed either: a is what the be example, number page. Each names on the table) report. Grouping names Most be as table. Options the these elds). report in should grouped want can each determine eld the on be (for of out (set specify elds repor t tabular printed in on a you reports ◆ you records should values ◆ W hen the records Standard let display which records Standard to display order average will are the takes report used are to each by group at will a line the top let printed the example, the on one divide groups. For grouped up printed names be records supplier. separate Fig 8.37 Example of a columnar repor t page. Columnar form. Usually Columnar such 22 0 as reports each reports tickets. print form are is each record printed often used on for a on a separate dierent printing page. items Creating e fastest using a a repor t and easiest database such way as to create Microsoft a simple Access is report with 8.7 a wizard which arranging neatly To all of automatically the formatted create a 1 Activate 2 Select elds creates from a a table report or Repor t formats by quer y into a report. report: the the Report table drop-down or menu W izard quer y (F ig on from the the Access menu. Tables/Q ueries 8.38). Fig 8.39 Decide if you wish to group any elds 8 Decide the if you records should here. Select to choose Click wish the from Next to to sort be Last any elds (Fig sorted, identify eld ascending to or be a sorted 8.40). If sort by descending order and click order. continue. Fig 8.38 Select the table or query from the Tables/Queries drop- down menu 3 Select the report by Fields window Fields window. Use to move button elds elds >> the to 4 Click 5 Depending on may Decide you them left the at a all not to the like to right to double group arrow button> arrow once. the on this the Selected arrow tables options see at in Available the right or of the to move always the displayed elds number would 8.39). Click single time have be from pane the button the may data. Y ou (Fig should the one Next if in move database, you 6 that transferring next in screen. your how to view your option. your elds button > to Fig 8.40 Decide if you wish to sor t any elds add 9 those elds to be grouped. Use the Priority If there are values, you to change the order of the grouped elds if one eld is Click Next to the report that contain numeric can choose whether to apply certain functions such as sum, average, max or selected. min 7 in more summar y than elds buttons to the report. For example, you may want to continue. sum the Click quantities Next to of items ordered (Fig 8.41). continue. 221 8 Dat abases Fig 8.41 Summary options can be added to the repor t Fig 8.43 You can adjust the repor t if the elds are too wide 10 Select want the and layout click regarding 11 On and the the nal select to mode. Click Y ou may print and Next the if paper there orientation or screen, name open the wish to it are any the style the typically Finish the other report in button preview orientation you (Fig Print to options desire. 8.42) Preview create report you the before report. you it. Fig 8.44 Order repor t after elds are adjusted Fig 8.42 Finally, give your repor t a title 12 If the look elds of the mode and adjust the are too report choose width wide (F ig you the adjust 8.43). Close Design of can view or the Print Layout nal preview view to elds. Fig 8.45 Order repor t with summary elds included 222 8.7 Pr inting Once your printed activate or or the report it print to processor. In are able is exported the export to a ready to option format recent export to your O utlook. Rich a report to Word is a as word (Fig report Microsoft to an text your compatible of report or distributed, it can applications. Y ou versions Microsoft Microsoft be print that text, HTML as to other PDF , rich exporting To repor t is formats email a be can to with a a printer word Access, you such as common processing format document a Select the 2 Double-click 3 Use 4 Select 5 Y ou the rich will 6 for Select the such of export useful to to rich that open icon text be the to report V iew location via report 1 Excel, attachment export the the option to to to the wish has to export. report. Print export Preview. the conrm report. the name and report. open operation formats format: select exported option view you and prompted text Repor t the been exported destination le after completed. is is report. 8.46). Fig 8.46 Repor ts can be printed or expor ted to other applications Questions Consider 1 the Explain repor t whether type shown the of in Figure repor t a the data each b the grouping c the sor t d the calculated eld e the title repor t f how is 8.44. formatted as tabular or columnar. Identify : eld eld eld of many the products Lou Tedd ordered. 223 8 Dat abases Consider 2 the following a the data type b the grouping c the sor t of repor t. each Identify : eld eld eld Payroll for d the calculated eld e the title repor t f the summar y of the function used in the repor t. September Depar tment Last Name First Name Days Worked Fees Marketing Summary Betham Milo 28 $4,200 Janis Yannick 31 $3,720 Pimmot Ross 28 $3,360 Rithmont Cath 22 $2,640 for ‘Depar tment” (4 detail records) Sum Human Resources Summary Practical Exercise 1 14: Create a 2 for Jomes Mike 28 $3,360 Steele Jonat 29 $3,480 Ummer Rain 28 $3,360 Human report using Create the reports b Create the report c Group the elds d Sort e Use by g V iew Use the shown block are the using records) Sum $10,203 Grand Total $24,127 Microsof t in in by Bookshop F igure Figure First 8.36 and 8.37. 8.43. and on Last. so same the to that the rst and last row. name again database produce the elds b Group c Sort d Name the the report data the Order Report. that a you created report. (e 3 Create a Group b Sort c Name NameOfAthlete Jade Boyce 231 Shade 351 Neil 142 Figman Skeete Hall McJig by and Categor y. Gender. ‘Report by by report on Athletes by Code the Sports database. Gender. the report is Gender using Categor y. gender’. in data another here.) 121 by report DIVISION AthleteID Categor y, NameOfAthlete Categor y ’. report. Sports 10 the Use Gender. database. TEAM 224 Access a the layout report the Exercise detail Description. the Give (3 repor ts a f Resources exercises Creating names $13,924 Code Category Under 13 20 U13 F U13 U13 F U20 Under U20 M O20 Seniors O20 M ‘Report on Athletes by Impor ting Y ou can from For to import another data from application example, schools the national another into could sports an each database existing send association for a database the write le, or If database. le it go meet. is data can then be database so that the imported into age groups can be organised categories of the data. It is also without possible to import on having merge or more database data the Here are two to Name your a import importing the you to use problems if to Access: One way using one-word typical you word, especially eld names, but it may is best have eld names with more the words in if there are spaces between If to the possible, export the If the tr y right- select Import. ere are many which application you wish to use are most from common another methods Microsoft of Access to use underscore eld name or import a spreadsheet from export the data a is a text le. database using database or the copy containing a and paste table or that is to (_) or be copied (exported) to another and the table highlight or quer y it. en in the select all Database the data them. 8.47) and click on the Copy icon. Open an Excel simply or Word document and paste the table or quer y in together. the ◆ table. en than sheet keep the give (Fig erefore, it run. names. Access window one and Excel database. Find you long table. table, select data. e data Expor ting data quer y allows the records, then (combine) database when elds a choose method. Open ◆ full in many les. to hints to table database, an Impor ting the time too to importing two import save not sports to re-enter and will elds, but the options and of 8.8 dat a upcoming click association’s linking queries. is lots ahead To sports some has and small test amount required location. of data. table has importing lots the of rst records 10 and but last not 10 too many elds, records, then Fig 8.47 Selecting all data in a table or query Questions 1 What is the impor ting 2 What is Access dierence another to between expor ting and data? method a Word of expor ting data from document? 225 8 Dat abases Practical Exercise 1 15: Open exercises Impor ting Excel starting at and cell an using Excel create the A1. Save it Microsof t Access f ile e following as Y ou can append worksheet f DAT A. Select or, if A 1 B StudentID choose it the you an import existing worksheet have it a a new table, or table from named to the pop-up range, select window it. C Name g Click h If Next. Age 2 1123 Angelo 16 3 2212 Shanico 15 4 3346 Franco 17 5 3358 Vanessa 16 you get contains valid les should be formatted a message some eld assign Generally, spreadsheet to to data that that names, click valid eld the rst cannot OK to names. Y ou row be let can used the for wizard clean this as up later. follows: i a e top row should contain only row If the not or b eld Either to remove import or any copy cells the that ones you that do you not the le do j Click Open Next. k Select l Y ou ‘In can the and its name of the worksheet and new change while Select to location. iii create existing a new database, or open one, depending the change Click on where you wish Excel le. For called Data this example, create the tab with for Excel or Enter Y ou the the icon to Excel version the not the name visible folder import data type data and the of of in Microsoft the the where for the 226 select it. whose clicking eld key choose the and will Click depending name you anywhere wish in that name and which click will be Next. In this StudentID. name ‘STUDENTS’ for this click Finish. receive a message importing the that Access has le. le If the it is Excel le was not formatted properly, and Access. you Import OK. on wish to import window, browse located. In this spreadsheet le get an error message, return to Excel and is prepare the le If were as in step 1. to exercise, named there blank lines in the Excel DAT A may and a select 4 browse of option. you If type the 3 d data a n L ook your and TEST . menu, activate External eld by primar y nished c name to m the the Next. Choose table database On Next. an iv b click importing: the example place table’ and column Access. Either a le. the a it. to ii 2 Headings’ is worksheet. Remember the Contains wish i d Row checked, tick eld Save ‘First names. another c box headings wish to delete these ‘records’. le you Developing Before the you most create a ecient information so database and that it you need convenient can be way to think to store retrieved in the W hen about you the it want. Although has been a created, it database is much can be easier modied to get with. Points to consider have e names and reports. Like reect the of your it put some right e way any which can be other you example, names run the names, they information elds – they wish store the of people title, initials exibility normally should have at and last name – to in using the data; require at least six appropriate). queries the tables of tables might information be you are e names of and elds linked. T ry might the want you to to require think get out of of and size. Y ou but are in can elds. ese length, but use advised A–Z to data your to be following if may about and avoid you all sensible Y ou have that do e size of 15 0–9 using wish names the be is in a the up to more your spaces to separate which are elds. For eld size of 8 for a Text harder codes. at means more than eight one and eld table all e type of data to that sales contain text or specic that you that Y ou data have opposed to names. T ry might stores in the will not calculations, dates, currency, etc. is decide eld want to consider you should re-evaluate with to a large the might number same of elds subject. For contain elds with your customers as well as elds information. Each table should about only one subject. elds that are intentionally left blank in many records those records. is because they usually are not means applicable that the to elds in another table. to Y ou have a large number of tables, many of which the same types to elds. For example, you have choose tables for Januar y sales and Februar y sales, eight- to be that to or retrieve. for local customers and remote customers, in accidentally need numbers data and you store the same type of information. Tr y eld. in what as cause names be used will the information about a single in one table. Y ou may also need to add an in be eld, for example to identify the sales date. used can help for each use all aware extra calculations, as mind symbols. Use cannot entered. Y ou numbers in can normal subject of keep self-explanatory . characters be to problems use, maintain that relate table consolidating ◆ pitfalls database. which enter to signs about or character is 64 eld example, you eld common information separate a database design: not contain ◆ the the ◆ choose test problems database. ese are database belong underscores reports how ◆ characters and design several design contain ◆ it correctly. example, one number if that elds, for and e to so similarly, ◆ ◆ database give name, street, town, county, postcode (if the least building/house countr y into information. your addresses database, contain. to e maximum your tested Common should your three of are: you For structure database, tables, forms, queries information in the to ere ◆ up should: operating ◆ set after ◆ begin you 8.9 applications format ◆ you dat abase you Questions eld. Y ou may primar y key elds as Why it star t to 2 Give four 3 Why should 1 Text ◆ e elds design taken if they of to not forms. If from, for ecient do involve the example, a design your information paper online is advisable is form, it form so create is entered in the same is that order the paper design using the a database before you computer? as design suggestions that relate to tables. more you enter sample data into your the it is initially? read 4 from it being database information to calculations. Explain one common design problem. form. 227 8 End Multiple of choice chapter exam-style questions 7 questions Datasheet your 1 When a customer database a table b form is c quer y d repor t. makes updated by an online using hotel book ing, mak ing a payment a elds b raw a online, the database real-time c HTML d e -commerce. c data d descriptions. The types correct database view similar to a that presents spreadsheet a datasheet b design d data in a format Cost of the following in a d description. databases and columns Price: [Cost] b Price: [Cost]*.10 c Price: [Cost] d Price: Cost*.10 Data can × a eld 10% be × [10%] impor ted to a database using any of the except: a text b tab-separated c comma-separated d Por table what k ind of data delimited text values Document (CSV ) Format (PDF). A primar y key eld that appears in one table but is is located in a foreign b alternate c candidate d secondar y data types, b eld names, c records, records, to the rows refer to another is called a(n): key key __________. 11 is BGI database form a types do questions training For all of the following ways, i of of the and that branches to assign tasks, would be in update the its trainers. describe most suitable use: A list of employees workshops a add upcoming b modify Resource c merge d delete. ii with needs following application recent except: company company workshops each one names. can a schedule records eld answer key. Caribbean. The records data Shor t key __________ to 228 Price in is: denes tables refer a A item length and 6 called an database? name d eld of type c In a cost repor t. used 5 for the is: a also b of print Which a syntax 10% that 10 4 database calculates following, c into mode b is __________ in: batch The enter is 9 3 to data named updated you the which When allows table. a: 8 2 view database are workshops Director Payments who along for of travel calculated for have with are sent each and completed a to the of Human business. hotel monthly schedule accommodation salar y payments. 8 iii Flyers are produced to adver tise End of chapter exam-style questions new TABLE: SCHEDULE workshops. TR_ID iv Electronic payments company ’s v A list is online needed par ticipants workshops or b not Identify who in be payment to store each that can made on along completed, would computer-related be responsible for Arrival Depar ture G10 6985 05/09/2019 05/12/2019 V31 6985 05/09/2019 05/12/2019 V31 6985 05/16/2019 05/20/2019 K21 6985 05/16/2019 05/20/2019 V31 7295 05/25/2019 05/31/2019 G10 7324 06/15/2019 06/28/2019 K21 7361 07/13/2019 07/16/2019 G10 7361 07/13/2019 07/16/2019 V31 7455 07/21/2019 07/29/2019 G10 7455 07/21/2019 07/29/2019 all with ongoing completed. the COID the screen. data countr y were via professional managing databases. c The trainers designed related use for a materials Suggest the during general pack age that whether it is special program par ticipants could to the type be of used o-the -shelf, that access was course - workshops. application and explain customised or Fig 8.50 custom-written. a 12 State: A database was used to store requests for training i the number of records in the Company table. and assigning trainers. The three tables in Figures8.48, ii the data type of the TR_ID eld. 8.49 and 8.50 show a sample of the data. b Copy to TABLE: the draw the links in Figure that 8.51 create and use it relationships COMPANY between CO_ID diagram Country Company 6985 Guyana Rumaba 56 6987 Trinidad Mariob 45 7295 Jamaica Cour tstreet 87 7324 Barbados Ever yInc 42 7361 Antigua St. 50 7455 Belize Maggow pairs of tables. NumtoTrain Micks 68 Fig 8.51 Fig 8.48 TABLE: TRAINER TR_ID FName LName Subject G10 Georgia Inns Management K21 Keith Kettis Housekeeping V31 Van Hall Accounting Fig 8.49 229 8 Dat abases c Consider created the form using the in gure 8.52, which was d database. A letter is sent scheduled i ii in Identify Which to companies Antigua the and workshops word that processing appropriate to send with training Belize. will feature letters to be is oered. most those companies? iii Indicate other the elds name would of the be table required and for what the letters. e State the elds following i Fig 8.52 What were ii i Identify the names of the two sections of Who and criteria for each of the questions: are the names requested are the by of the workshops that Maggow? trainers scheduled to travel the before 5/15/2019? form. f ii State the total number of trainers, Identify the calculation Georgia, as shown in the State the name calculates Georgia iv Write the 23 0 be formula the be in the total would calculate would the of function number of that par ticipants training. (named number Belize. of feature that per forms the in par t e. form. g iii database including DAYS) days that that will Georgia Determine the results of the questions in par t e. A PT E C H 9 PROBLEM 9 .1 Introduction Software tell is the (instruct) therefore name the given to hardware includes to computer how computer problem to programs that that create 2 Execute application problem rst software. Each existed, and a program solution was exists because needed the 3 Maintain should a to develop problem. An now, let ’s an algorithm which results your algorithm is in a a to focus on the sequence of solution. If is vague and has conicting you rst the algorithm phase. problem following summarise precise a the correct solving logic, you Specify the the rst 1 Clearly 2 Propose is usually broken into two phases. a or more Design phase, there dene the solutions the most to are ve general steps: 2 Specify problem that you want to and evaluate each reasonable algorithm that out your to solve the a precise and works must correctly as phase, there be sure output are you Will this output be output in program? readable Will it and text, or form be or is it displayed even for on a can copy, printed input: If specify you what or stored know values what are in a the le? output needed for the can be captured by an from a input device secondar y such storage or even entered via voice recognition. the processing: W hat processing should done before you on the input to get the necessar y output? your can write example, what calculations are needed? Is the a your are three main grouped algorithm as the data is as a batch or completed in real captured? using programs also: steps: a Specify the storage: Determine how the data and programming even such as phase 4 language this soft the Specify Most Translate of it. Implementation 1 program? keyboard, transferred time this this another processing for In kind well For program objectives: problem. algorithm. Y ou algorithm and solution. is be Test organise to one. 3 thought specify meant solve. device an to is phase as Select used numbers, text, numbers Is input. Data 4 are output: W hat from graphic? is, you 3 steps should program answer. monitor In four the will input Algor ithm problem, you your one Problem a is, what program’s expecting get analyse objectives, that do. e solve 1 algorithm 5 program. solve problem rst instructions not code. a W hen the DESIGN problem. Solving Y ou program the Dening that PROGRAM system For and AND solving work. Software programs S O LV I N G BASIC, Pascal, C or the information or results will be stored V isualBasic. temporarily or for future use. 231 9 Problem solving and program design Example Input–processing–output Y ou (IPO) IPO ◆ charts inputs: are the used to identify information to the the outputs: An IPO with steps desired the chart three you temperature by temperature readings. Y ou need to solve the the average needed to convert the component goal is of not the problem actually a chart, but column input, output is not given information and minimum then calculate and output IPO chart is shown below. Processing Output max_temp Calculate average_temp a table min_temp (max_temp represents usually and processing. e documented in + min_temp) / 2 three the 3 storage Read chart. a a problem do is the you of goal nding or the output? sum of number, add 10% and output the result. Processing W hat result three Output or goal a number input is input result which is the sum of made up of the values = number * (number * 0.10) result 1.10 steps are needed to the goal(s) or output? e 4 the regular price of an item; calculate the of amount at 20% of the regular price and convert also into + the discount numbers. W hat input(s) number have? is numbers. e = OR Input the maximum Input Example output three using 1 numbers. W hat the average solution. number three the temperature: completed Input Example e nding input Example are of outputs columns. Each components: Y ou problem the: e ◆ the (max temp + min temp) ÷ 2 processing: data given char ts problem ◆ are 2 the item’s discounted price. O utput the discount processing amount and the discounted price. requires: ◆ ◆ the input adding of the the three three Input Processing Output regular_price discount discount numbers numbers together and saving the = result ◆ the Notice as a single output that of the number the sum of processing 0.20 * regular discount the numbers. column = is written is shown amount price amount price regular discount price – discount amount price in Questions English. e completed Input Processing number1 Add the IPO chart below. 1 Explain 2 What the two major phases in problem solving. Output three numbers Result of the do the letters I, P and O refer to in an IPO addition char t? number2 together 3 Explain 4 Show the purpose of an IPO char t. number3 Y ou can follow an IPO chart by reading each The from left to right. For example, the input that you input three values. In the you add column outputs the the values result that of were the input. e addition. third select order solution design iii dene iv test v 232 correct are: processing ii column steps column i indicates the column algorithm problem algorithm propose solutions when solving a problem. Algorithm To help the simplication and development of the Var iables programming problem, algorithms can be created or algorithm required have a to set is a set obtain of of the rules, be step-by-step is explain solution explicit to a and problem. It have a clear really used to expand the variable that instructions must holds Both of the chart or English-type using diagrams for the a should keyword major ver y start undertaking, so important. It requirements the same some is of general algorithm a for title usually stored when it is input. should that a contain is an area program text or or space might numerical in use memor y or manipulate. values. is for a type that of variable where algorithm. Examples the of values constant do not values owchar ts and end program algorithm 3.14 for pi (π), 0.175 for value-added tax (V AT ) or may to can be satisfy complex algorithms. A all at and solutions. However, there designing e is completely be for a year of birth. with design possible algorithm problems in a always good complex goals good not a time. Some require is pseudocode. e END. Developing the hence with constant data constant 2002 algorithm data ‘processing ’ part are statements or could change IPO how stopping A point. It constants owcharts. A An and as Let ’s pseudocode 9 .2 design are good values in a variable algorithm as names number name text are so to that them Variables types of data you and is data are change throughout processed. Examples and can total. Each assign refer typically can to store values shown in variable values them such later of Table of a to given a numbers read given variable is as the the or values. type. Some 9.1. be: Table 9.1 Basic data types ◆ cor rect: it inputs!) should and response or accept output a all inputs correct (even answer or invalid Data meaningful type Integer Description Examples Integer 63, or ‘whole’ numbers, message positive –12, 0 or negative ◆ simple: each step of the algorithm should perform Real one logical step in solving the Numbers including 12.63, 0.5, –8.0 problem fractional numbers, ◆ clear: the algorithm should be easy to read and positive or negative understand Character ◆ precise: the algorithm should present the A single such steps precisely low-level ◆ easy to easy and (program implement: to translate concisely code) the into without a referring to as should be relatively programming language should the as a alphabet details algorithm character ‘G’ , ‘b’ , ‘*’ solution String A shown letter or on collection such as a of the punctuation, a of keyboard characters word, phrase “A+” or “Good Job!” or sentence ◆ ecient: the algorithm enable program Boolean code the to produce problem results size, and quickly, depending not waste any Can contain two values only one of TRUE or FALSE; YES on memor y or NO; MALE or NOT or MALE time. Now that should terms you have become apply to been familiar both introduced with some pseudocode to algorithms, you terminolog y. ese and owcharts. Y ou should programs review so the variables use meaningful that logic will be if of you the easy or someone data to variable being names else in your needs to processed, then remember and the understand. 233 9 Problem solving and program design a Statements and number between corresponding A statement is a description of the processing that an action or condition. Instructions within are or are called keywords Examples of carr y Using WRITE. times the decisions to out of an in the program. is includes be made be want executed a set of conditions (carried deciding out). For statements are returning the which to statements example, you execute only if the week. Other subroutines instructions, such as printing the saves writing conquer’ or method goal, and manageable the then same of several focusing separating components top-down code design. e is on the called ‘divide individual in can even be tested in isolation to check are that to then invoice. main into subroutines a of program. is program’s and allow day subroutines program statements Conditional statements and keywords INPU T , READ, OU TPU T , DISPLAY, PRINT Conditional 5 the headings statement and can might include 1 keywords they correctly perform their function. might certain met. Questions Loops 1 L oops are is, they until from to will the a see useful for repeated ly end you must have after the block is of is a of have a method the returned statements program. at of order for the the rst to State whether the following statements are true or false: program exit a An algorithm can b An example c Flowchar ts use English-type d Flowchar ts use specic e A of be written pseudocode as is a pseudocode. owchar t. sentences. checking task. Once to in a section satised. In completed terminates, control parts execute condition loop, you if repeating a symbols. loop owchar t can be developed into an algorithm. statement 2 Explain the purpose of 3 Explain the dierence using a variable. loop. between a variable and a constant. Subroutines 4 For by big programs, it separating ese the sections ‘modules’ or section of a to perform of the is easier algorithm are known program a given that set of work into as ‘procedures’. A to on small individual sections can be is a repeated ly instructions by it returns a the b someone’s current c a d is e your mobile called other it day 234 another part of the program, such suitable data type for each the year height phone or number night? on blood type. For each of the descriptions in question information as of parts suitable to most named 5 program. Sometimes the following: sections. ‘subroutines’, ‘functions’, subroutine State accepting variable name to store the data. 4, suggest a 9 .3 Pseudocode Pseudocode is English-type to be the easily same programming and converted phrases into code, but that are uses clear programming Example to and loops create the described in instructions the for code. It uses Pseudocode_5a: INPUT number1 INPUT number2 INPUT number3 programming a problem. Pseudocode solution to can also number1 from an IPO chart to specify what + number2 + number3 be OUTPUT developed Add_three_numbers previous Add a 5 enough statements, keywords, variables, conditional statements section not words data result of number1 + number2 + is number3 input L et ’s and rst processed review into the information. IPO chart that END nds the sum pseudocode of If three of the three variables that contain the three numbers numbers. have Input Processing number1 Add number2 together the the Output three numbers The result of the line the same data statements as shown to in type input the (for the example, an values updated can be pseudocode integer), then placed on one below. addition number3 Note that number3 the will variables store the number1, number2 rst, second and and third Pseudocode_5b: Add_three_numbers INPUT number2, Add numbers number1, number1 OUTPUT + number2 result of + number3 number3 number1 + number2 + number3 that are input. END e processing explaining values how that number2 column column the were and data input that is are the short the variables added. e result of the Now number1, third name of the segment three_numbers. e are an used to input output can be monitor. e that such as pseudocode keywords indicate device of soft as data a is and to END the or screen STOP the end of the we of the with variables, we calculation in a can also variable. L et ’s result OU TPU T using Pseudocode_5c: Add_three_numbers INPUT number2, number1, result number1 OUTPUT result END pseudocode of + number3 number2 + number3 the of e new variable will contain result on the left side of the statement a the answer from the calculation of the denotes from the right side of the statement. statements. pseudocode in Example 5 is produced from can include the left arrow ( ) or the the IPO familiar variable Calculations e are result this numbers the pseudocode is Add_ input, usually keyboard, while copy keyword INPU T is place that name addition output. e of statements managed. Here, the into number3 indicates involves equals sign (=) to indicate that the result of a chart. calculation is stored in a variable. 235 9 Problem Here is solving yet and another program set of design pseudocode for Example 5 Conditional using dierent keywords to READ in the data Conditional to PRINT the result. e keyword END can also on its own to denote the end of the branching is used when there is a choice be between used branching and two options. Two types of conditional statements. branching are IF–THEN and IF–THEN–ELSE statements. Pseudocode_5d: READ number1, Add_three_numbers number2, number3 IF–THEN result PRINT = number1 + number2 + e result END IF–THEN more Sequential executed statements statements, such one after the as other those from IF in the Example rst 5, are statement statement statements condition Sequential statements number3 or (the the will only answer condition THEN (carr y suggests to is out be a that one considered or based on a question. true) one or more statement) to ENDIF the last. Sometimes L et ’s look which again nds the at the IPO average chart from temperature Example from 2, two values. the end of the the below the of general the Processing max_temp Calculate min_temp (max_temp average_temp + min_temp) / sequential the IPO pseudocode statements is from produced L et ’s the information in e the use 6 test = (max_temp + for into the the the variable minimum stored variable mark is calculation maximum temperature ( max_temp), then temperature is (min_temp). e is placed input the into the is 236 then output. to the to output the total if the total mark is of use the IF–THEN greater statement. that variable. e a then variable used 50. We that shows to do will than 50 marks named check not be the if know three are added total. e the the total value its value is are and the IF–THEN mark of input. erefore, IF THEN marks is the the total output. e in result of the statements resulting in there. 7 sum of three numbers if their total is greater is Pseudocode_7: Add_three_numbers READ number2, value number1, number3 the number = number1 + from total > 50 variable stored stops 50. THEN (average_temp). e below a in greater Example IF the is than total second wish only case, we into marks Print for specic part min_temp)/2 average_temp value this three than input is sequence min_temp END First, the not statement therefore Find_average_temp max_temp, OUTPUT input greater temperature. average_temp example. Y ou results, but statement Pseudocode_6a: INPUT an 50. In each average and is indicate statement. pseudocode sum Find statement. Any pseudocode pseudocode to using chart. Example the used 2 than following in is Output three e ENDIF IF–THEN ENDIF IF–THEN Input keyword average_temp PRINT ENDIF END total number2 + number3 e condition greater than (or question) asked is: is the total mark 50? Consider student we If it is, then the condition is true, the mark is the is want following younger to output than 50. e next statement in the the 13 to years nd old. If statement Pseudocode out if a so, then “Student is not a indeed teenager”. For greater than example 9 .3 this, we need to use an IF–THEN sequence statement. indicates 20, 25 the to and total output 10 as mark the the is 20 total three + 25 mark. at marks + 10 = to be is, if we used input, then 55. Since 55 Example 8 is First, create greater be than 50, it is expected that the value 55 output. Input age e IF–THEN statement does not consider if an IPO the Processing Output Check if If true 13 is not is less statements than in or the even equal pseudocode to 50, as that there instruct are that be output. If the total mark is less than or condition (THEN will PRINT be total) false, then in the the sequence next is equal pseudocode reaches the END can write the pseudocode above without printing INPUT this PRINT , ENDIF example and number2, number3 are END. e and READ, IF , THEN, variables general format of are number1, (condition THEN is < 13 output a an IF statement is: student ’s age is not a teenager” variation year of of the of the birth pseudocode and the is current to input year to the calculate student. true) Pseudocode_8b: is true, execute = Is_student_a_teenager 2019 T-statement(s) INPUT birthyear age thisyear = - birthyear keyword. IF Condition is value “Student T-statement(s) condition is Is_student_a_teenager age thisyear IF in total ENDIF If written END the IF is ENDIF Another The it sentence. age THEN in as skipped, and IF keywords much statement anything. e output “Student teenager ” to Pseudocode_8a: the a no the 50, the < result Y ou to then total age mark chart. will is a Boolean either TRUE or expression, which means its age THEN FALSE. < 13 OUTPUT “Student is not a teenager” ENDIF END T-statement(s) are included only if the one or result more of the statements condition that are is TRUE. Note ENDIF nish tells the computer that the IF–THEN statements here. where e data If the do condition not execute is FALSE, skip T-statement(s) – that that the thisyear value variable is = 2019 2019 is is not an example modied in birthyear, however, changes of a the constant algorithm. when new input. is, them. 237 9 Problem solving Example and program design condition 9 to Consider the following example that checks for another of 80 or valid set of or true. e statements algorithm if the is directed outcome of the exam condition marks is is not valid or false. over: IF (the condition is true) Pseudocode_9a: INPUT IF THEN (carry out one or more statements) mark mark THEN Exam_results >= ELSE (carry out one or more statements) 80 OUTPUT OUTPUT ENDIF “Excellent!” “Please see your Example teacher” 10 ENDIF As an example, suppose you wish to print ‘the sum is END less than 50, but e pseudocode will output the following values stored in the variable output Value or of mark greater Example of mark Statements 86 Excellent! Please less than 80 sum their sum you have 71 Please see the THEN use of indentation two print INPUT mark your >= in Total number1, = + number3 number3 the following number2 this case, use “Excellent “Please READ results!” see your teacher” that is true 80 or both statements will and the variable mark is equal to 80. Nothing stored in the mark greater be output contains variable is printed if the If + true, then Output Total if If total > 50 false, ‘ The then sum is Output less than 50’ IF–THEN–ELSE the statement. e modication. a if = Example of Statements mark 86 80 Excellent total a PRINT total PRINT “The following statements if the number3 sum is less than 50” examples also illustrate the IF–THEN– statement. results! see directs your the outcome of 11 output Pseudocode_11: thisyear INPUT birthyear age thisyear = age < – birthyear 13 THEN OUTPUT “Millee is a ELSE OUTPUT “Millee is not algorithm the Is_Millee_a_teen INPUT END more + 50 ELSE ENDIF or number3 number2 value statement statement > + THEN IF IF–THEN–ELSE number2, number1 value 71 IF–THEN–EL SE Add_three_numbers the teacher 238 print mark Please than shows number1, total Example of the Pseudocode_10: 80 OUTPUT than than one either IF- ELSE to can Output number1 number2, e e you sum. Read IF condition less 50. is Exam_results OUTPUT suggests or than than teacher END 80 less teacher ENDIF Value greater is mark THEN less is options: the Processing pseudocode greater it numbers statement: Pseudocode_9b: is if Input In IF three output your see or Check Notice of mark: comment 80 the statements means for 50’ if teenager” a teenager” 9 .3 Y ou could produce also the choose to output Millee’s age to If following: the for age < 13 be OUTPUT is”, age ELSE OUTPUT “Millee is a teen, her be then also is not a general form ELSE if statement Howe ver, the ‘P lease Other wise, the output. statement the for statements see your mark is teacher ’ 70 satisfactor y regard less or results of the mark, to await the end of term repor t is output. of an IF–THEN–ELSE statement is: the statements result of statements (condition THEN results!’ and then Loops e IF greater, teen” ENDIF The or age another “Millee 80 output. greater, will THEN is ‘Excellent will IF mark Pseudocode is a of a loop are arranged variable. Most as loops to cycle depend on through the follows: true) T-statement(s) ◆ Input a starting value to a specic variable – this F-statement(s) variable usually determines whether or not the loop ENDIF If condition execute If is true, execute T-statement(s). Do not F-statement(s) condition execute is false, execute F-statement(s). Do executes or ◆ Test variable ◆ Execute ◆ Update the the body value of of the the a condition. loop. variable. T-statement(s) ◆ are Nested ◆ IF–THEN–ELSE involve the use of statements, either combined. Example 12 shows a IF–THEN separately nested and an when of loop you times to do statements: not repeat know the in loop advance ( WHILE or loops) denite: when you times repeat know in advance how many or to the loop (FOR loop). or condition Indenite IF–THEN–ELSE types many REPEAT conditions Nested conditions two indenite: how an the against not ere using not. loops IF–THEN statement: WHILE Star t Example loop value (then) (then) Pseudocode_12: INPUT mark Exam_results REPEAT >= is true per form statements value IF “Excellent “Please mark THEN (then) per form statements 80 OUTPUT OUTPUT ELSE condition loop (then) THEN if mark Star t IF check 12 >= see if condition is true results!” your teacher” WHILE 70 OUTPUT check loop “Satisfactory e WHILE loop repeated ly long as executes one or more results!” statements OUTPUT “Please await the end of as the condition is true. e term condition in a WHILE loop is tested at the beginning report” of the loop, so it is possible for the statement not to be ENDIF END executed at all. 239 9 Problem solving and program design d The general form of the WHILE loop e loop Number WHILE (condition is is repeated: is: is increased to 4. true) O utput is ‘the number is 4’. Statement(s) e condition (number <= 3) is checked. at is ENDWHILE (4 The ENDWHILE statements in keyword the indicates the end of the e <= L eave that statements are indented ENDWHILE next are some loop. W here be repeated loop can examples the may still be number be that of known used illustrate times or when that the the loop is statement following the loop is executed the ENDWHILE statement). unknown, the the condition output is: the number is 2 the number is 3 the number is 4 should WHILE for stopping of loop known. Example Example 14 13 In this those Pseudocode_13: number WHILE loop: WHILE loop out the false. statements. e Here the now between WHILE (after and is loop. e Note 3) = example, the statements that are is within used the to indicate WHILE loop, Numbers_in_a_loop without 1 These (number indentation <= using the BEGIN and ENDWHILE two statements 3) keywords. are executed BEGIN only number = OUTPUT “the number + the loop 1 number in is”, Pseudocode_14: number age ENDWHILE OUTPUT = 15 WHILE “out of loop” (age age Output Note that the number. is Here a is Number e (1 b how value is also the Enter 3) is containing is the Number O utput is assigned called loop condition <= 1 to the initialising a W hile variable. the (number value <= 3) 1 is enters the loop. checked. at is true. is is 3) e increased ‘the is loop age is (age then <20) soon ‘Y ou as to number 2. is is 24 0 is a teenager” the are variable a age is teenager’ will less be than 20, output. again reaches not a by 1 and checked passing the value teenager ’ is through 20 then in the the the condition loop. As statement output. (number 15 <= 3) is checked. at now tr y an example of a loop where the number is times to repeat the loop is unknown. First, create an chart that will repeated ly read each students’ exam repeated: increased ‘the condition <=3) ‘Y ou before Example to into number is (number true. a variable. It is not known how many exam 3. are to be entered, but a mark with the value of 3’. <= 3) is checked. at will indicate that it is the last mark. Once all marks is are (3 1 not 2’. −1 e teenager” true. is is of increased age are marks O utput value statement mark Number the the IPO c + are a loop: condition <= age “You are executed: of (2 = 20) “You variable L et ’s e < Output END Younger_than_20 entered, the average mark is calculated and output. 9 .3 Input Processing mark While Output (mark Add is mark Calculate not to the equal total to −1) average mark marks S ometimes algorithms statements, conditional Example 15 it can conditional example of the WHILE the corresponding pseudocode is shown you use of a and sequential e ven loops. WHILE expanded As you to loop; practise inc lude more a with and even wr iting programming some want to test the marks. Testing program the by algorithm is Average_of_exam_marks in a later section, but for now, consider 0 what = 0 average = rst OUTPUT the fur ther statement. would explained count be pseudocode entering Pseudocode_15: = statements of below: code, total use using writing loop illustrates the average however, An require Pseudocode the output exam could be if a user − enters 1 as the mark. 0 ‘enter INPUT mark WHILE (mark a is mark’ not equal to total = total + mark count = count + 1 ◆ e condition in ◆ e condition is ◆ e loop which ‘enter a WHILE now true loop since is mark tested. = − 1. -1) ◆ OUTPUT the is is bypassed would would be to calculate average cause an = error the average mark 0/0. since 0/0 cannot be mark’ determined. INPUT mark To avoid this error, after the ENDWHILE statement ENDWHILE the average = DISPLAY average following pseudocode for IF–THEN–ELSE total/count statement can be added: END IF count THEN e logic ◆ of the ree total ◆ pseudocode variables are marks, the and the average e user is is as follows: initialised number of to DISPLAY store marks the enter the rst exam e = DISPLAY average Once the mark is not −1, the loop is entered. b e the is added to the total/count total construct statements false. Note a mark entered’ loop REPEAT more rst marks entered mark. L ‘no average REPEAT to 0 ELSE mark. prompted = that loop, so the as long this repeated ly as the condition statement will executes specied is tested always or condition at be one the end executed is of at and least once. O counted c e as user the is rst mark. prompted to again to enter O The another mark which is stored on general form of the REPEAT statement is: input. REPEAT P d ◆ e Once a loop is mark repeated of −1 is at a Statement(s) entered, the loop is UNTIL (condition is true) exited. ◆ e average of ◆ e average mark the marks is is calculated. output. 241 9 Problem solving Example and program design therefore 16 is is example uses the REPEAT loop to output output checked between 1 and 3, unlike Example a WHILE is before the condition statement. W hen the checked and the is true, then UNTIL the next statement is loop. when Pseudocode_16: = UNTIL following executed. is number once 13, which statement used the least some condition numbers in at there means may be that no you will attend classes school! Numbers_in_a_loop 1 Example 18 REPEAT number = OUTPUT “the UNTIL number (number OUTPUT “out = of + Alternatively : 1 number is”, number Pseudocode_18: 3) INPUT loop” day REPEAT END OUTPUT UNTIL e Attend_classes variable number is rst initialised to 1. Here (it “do is a not go school to school” day) is END how the loop is executed: a Number with b Number is O utput e 2 > is ‘the is not executed c Number d O utput Since 3 value to number condition 3 e the increased 1 is (number true so the enters the loop. As 2. becomes 3) is checked. statements in the once loops are again. is is = ‘the number 3, ‘out output to of output example, the until the there means may be 2 the number is 3 is that is checked you will is a not school output in the stay go at to day ’ least UNTIL home one day 3. is 3’. loop’ is Example now 19 output. age is statement ‘it ‘do school! Pseudocode_19: number statement condition condition statement. is is: the the true. Again, the before when increased alternative school’ is 2’. > an = Under_20 18 REPEAT OUTPUT out of “you are under 20 years old” loop age UNTIL Example = age (age = + 1 20) 17 END Pseudocode_17: Attend_classes e INPUT statement will be output even though the value of day age may be 20. is is because the condition (age = 20) REPEAT OUTPUT UNTIL (day ‘attend = is classes’ weekend checked Example Along In this example, the be output statement ‘Attend it is checked to determine is, say, Saturday or output. 20 with Sunday. e used the when statement WHILE loop, the REPEAT loop is the number of times to repeat the loop unknown. L et ’s look again at Example 15 which will is repeatedly 242 is whether is data statement classes’ will also before the day) END the after read students’ exam marks into a variable. 9 .3 Since it is not known how many exam marks are to ◆ be entered, a value of −1 will indicate that it is the A mark all marks are entered, the average mark and example the REPEAT be entered to be outside Check if count is 0. is means no marks output. of the and corresponding pseudocode IF–THEN–ELSE using statements entered average to so nothing to count and no calculate. is ◆ shown must loop. were An −1 is ◆ calculated of last the mark. Once Pseudocode Other wise, the average of the marks is below: calculated. ◆ Pseudocode_20: e average mark is output. Average_of_exam_marks_ using_REPEAT_loop total = 0 count = 0 average = FOR loop e FOR loop is used only when the start value and 0 the end value are known. REPEAT DISPLAY ‘Enter mark’ The INPUT IF mark mark = FOR general <variable> value> -1 form of = the FOR <star t loop is: value> TO/DOWNTO <nal DO Statements(s) THEN DISPLAY ‘end of marks’ ENDFOR ELSE total = total + mark count = count + 1 Note: ◆ The variable must be in order so that it can be counted. UNTIL IF mark count THEN = = -1 ◆ The variable begins ◆ The variable changes with the <star t value>. 0 DISPLAY ‘no marks by 1 ever y time the entered’ statements are executed. TO counts up DOWNTO ELSE counts average = total/count ◆ OUTPUT down. The loop terminates when the variable reaches the average nal value. END ◆ e logic of the pseudocode is as ree total and L a variables are marks, the the e average user is denotes initialised number of to store marks the help following you end of the FOR loop. understand Example to enter written the FOR in pseudocode will loop. entered mark. prompted examples the 21 rst Pseudocode_21: exam the follows: e ◆ ENDFOR School mark. Saturday = Sunday 3 2 O b If the mark is c Other wise, the −1, the loop is exited. FOR rst mark is added to = day = Saturday to Sunday DO the O OUTPUT total and counted as the rst “It is weekend” mark. ENDFOR P d e loop is repeated at a END 243 9 Problem e variable integer with In and the integer FOR assigned is design initialised variable Sunday with is the Example rst value of variable Saturday 24 initialised 3. statement, the the number program Saturday 2, and the the the solving day Pseudocode_24: Printing_numbers FOR to is number = Output which is OUTPUT 1 “The “Out of 2 DO number is”, number loop” ENDFOR 2. END ‘It is weekend ’ is output. e day is then given represented ‘It is by the the weekend ’ is next value number again which is 3. the values for number is 1 e number is have the been 2 start and end of the of loop FOR reached, the statement ‘It therefore output twice, once for once for between sum. It adds Pseudocode_22: 1 and uses a 20 inclusive REPEAT countdown loop. e OUTPUT 10 DOWNTO = 0 count = countdown 1 END IF count THEN numbers 10, 9, 8, 7, 6, 5, 4, 3, 2 and 1 are count = UNTIL count DISPLAY END time = OUTPUT Daylight daybreak “it is to not sunset DO night” ENDFOR END a day consists of daybreak, morning, noon, afternoon, evening, sunset night ’ will through 244 sum be the printed loop six from and night, then times, for daybreak to each ‘ it time sunset is = even sum output. count 23 Pseudocode_23: even displays equivalent Sum_of_even_numbers 1 REPEAT If then 25 ENDFOR FOR and Countdown = sum Example the is: Pseudocode_25: e all 22 Example FOR which Sunday. pseudocode Example algorithm Saturday the and another is numbers weekend ’ is is: output. Consider statement here e Out Since output Sunday, is it not passes sum > + 1 20 + count 9 .3 Pseudocode Questions 1 Correct one the REPEAT b FOR IF = total WHILE State and a (count (count<= count 2 statements where each contains a count = REPEAT i ii = of count 20) -2) THEN count = 25 i DO *5 count display which Loop Write * 5 the following statements dene WHILE b loops: i at condition is least arithmetic Boolean State once checked after ii statements are each algorithm that operator operator. whether the left algorithm contains any of following: loop conditional iii sequential iv output statement statement statement. statements are performed until condition is TRUE. You B not always condition checked are the before per formed statements are until condition is sequential b a WHILE Write 5 algorithms: and Pseudocode_9.3.3right WHILE word word <> = 4 INPUT Met = 5 IF INPUT Num THEN Display ‘OK’ Blu = 2 Blu ELSE Display ‘Oh Met = Blu - Met ENDWHILE Num, Met Num + + Num Blu, = the from total four class tests, mark. Write the statements pseudocode to input value −1 the an should c a REPEAT d a FOR unk nown stop loop loop. number reading of numbers average. ‘page’ Blu word mark print loop calculate BEGIN each and using: a Pseudocode_9.3.3left DISPLAY input integers. The following * to calculate pseudocode executed is statements Consider wish then FALSE. 3 iv the completed iii keyword i executed Loop ii constant iii A from a(n): variable v 4 b example ii count completed iii an represents a c following error: ‘page’ No’ END 245 9 .4 F l owc h a r t s F lowcharts depict the are algorithms input, processing information. ese to that illustrate the pseudocode. Table and symbols ow of 9.2 use use data as shows symbols output the the the of same to ◆ data and of terms statements symbols ◆ in with Use arrow ow e may main Decision their (or descriptions. ◆ heads not (also the ow of page be symbols to ow lines where the direction obvious. used known Sequence) e on in as a owchart Selection) are and the the Process symbols. sequence the is bottom generally of the from the top of page. However, this Table 9.2 Flowchar t symbols can Symbol Name Description Terminator Used var y : ow star t to identify and end sometimes back to a there process or are loops which need to decision. the of a ere are also ese rules some important rules for the symbols. flowchar t Input / Used to accept data also generally apply to algorithms and or pseudocode: Output to output information ◆ Process Statements symbol in Processes have only one entr y point and one exit point. this per form ◆ Lines ◆ Decisions with arrow heads indicate the ow of sequence. calculations Decision Also called a Y es) statement. Used to question the next to step line than Connector A in one link to or but element or included point, one TRUE (or exit point and one FALSE (or No) exit point. should also know when and IF–THEN–ELSE to use the IF–THEN e REPEAT structures. option. decision. at execute external detail in entr y loop has a process before the more out an one determine ◆ One only ask Y ou a have conditional the not the important visible ◆ e is, a REPEAT process point WHILE to loop at least loop will once. is always is an remember. is generally the reverse of the flowchar t REPEAT Flow lines Lines with arrow the flow from one the process. e symbol represents an action or most symbols, text is used that it is loops to the data, while the to describe what they of data from one symbol to arrows indicate rules for owcharts the Ever y owchart must inc lude: have a symbol, unless owchart. e terminals 24 6 or Start you and are Start symbol drawing Stop terminators. that illustrate a until you the the condition the is condition practise orderly owchart confusion or practise and drawn true, the becomes true. drawing ow of owcharts data in an is not created properly it can and a symbols section are produce result in drawing incorrect statements that are the owcharts information. Y ou not symbols presented and in then the draw examples should some so rst of that the you a can Stop usually next. sample ◆ is the logical Some loop is cause ow while loops important algorithm. If happening WHILE condition. since W ithin rst, followed another It Each comes symbol REPEAT to decision of so data the heads by determine loop: of called compare and improve as you continue to practice. a the e following were written owcharts using represent pseudocode in some the of examples previous that section. 9 .4 Sequence Similar to executed statements pseudocode, where one af ter the other a set from Start of statements the rst are statement Input to the last, owcharts statements by using also depict the sequence shown in F igure 9.2, symbols. ere connector symbols 2, a owchar t has S tar t par t are of a joined arrow larger by are also which one small indicate (F ig directional pointing to 3 number circ les that it and 9.1). 2 + arrows. Each the 3 owchar t statements symbol arrow + number called S equential another 1 and Output is 1, number symbols. number S top number number of Add As Flowchar ts has pointing result of addition an away Stop from it to another sy mbol. e sy mbol also contains Fig 9.2 Flowchar t for nding the sum of three numbers text that explains the processing to be carried out. e owchart Start symbol O utput symbol shows to symbol is the sequence Input and similar a to Stop that of symbols symbol, Process symbol. e of the IPO text chart from the symbols, within and is each an Statement example of Example of two 6 pseudocode. in the previous temperatures. e section nds owchart is the average shown below. Statement Notice need of Fig 9.1 Flowchar ts have sequential statements Consider a owchart created Example 5 to what that from that the specify text the processing detail each in the precise is process calculation. A carried calculation symbol out are or both a does not description series of symbols acceptable. which Start nds and the sum of pseudocode three are numbers also given (Fig here 9.2). e for IPO chart comparison. Input max_temp, min_temp Example IPO chart 26 to nd the sum of three numbers. Calculate average_temp Input Processing number1 Add the Output three numbers together The result of Output number2 the addition average_temp number3 Stop Pseudocode_26: Add_three_numbers INPUT number2, Add number1, number1 OUTPUT + result number2 of + number3 Fig 9.3 A owchar t for Example 6 number3 number1 + number2 + number3 END of pseudocode 247 9 Problem solving and Conditional Conditional or program statements statements IF–THEN–ELSE IF–THEN e design for owcharts Start use IF–THEN structures. owchart Figure contains for the 9.4. Note a mark mark > structure IF–THEN structure is shown No Is in Input question that the where condition the answer symbol is one = 80? usually of only Yes two options, such conditional as yes statement or can no, true or selectively false. e skip or Output include “Excellent statements based on the outcome of the results!” condition. Output “Please see your teacher” Boolean Stop condition Fig 9.6 A owchar t for Example 9b T-Statement the Start/Stop initialise e the symbols). A variable IF– THEN is Decision Process symbol is used to year symbol in Figure 9.6 shows Fig 9.4 Flowchar t for the IF–THEN structure that Figure 9.5 shows the owchart based on Example the two statements true, other wise e algorithm accepts a birth year, calculates the on the current year and then displays a below the student is a teenager. is owchart and Decision the condition is they the last are skipped output to join the statement. e directional gure also two consecutive O utput symbols, but depending contains on Process, Input/O utput if comment shows if output age arrow based are 8b. symbols the algorithm, both output statements can be placed (also in one to the symbol. Notice Decision that symbol the are in ‘Y es’ and dierent ‘No’ placed locations near when Start compared This year = must 2019 be Input Birth to match used at the the the owchart logic = This year in the appropriate Figure 9.5. ese algorithm point of and the can labels therefore symbol. year IF–THEN–EL SE Age of − Birth structure year e owchart shown in for Figure the IF–THEN–ELSE 9.7. Note that the structure condition is symbol Yes Age < 13? again contains result of the a question. However, depending question, the ow of data is on directed the to No dierent Output “Student is statements. a teenager” Figure Stop Fig 9.5 Flowchar t that calculates an age to determine if the student is a teenager 248 9.8 10, which ree shows the illustrates numbers are owchart the based on Example IF–THEN–ELSE input. ey are structure. added, and the 9 .4 Flowchar ts Start Input Boolean True this year, birth year False condition Calculate T-Statement age F-Statement Yes No age < 13? Output Output Fig 9.7 Flowchar t for the IF-THEN-ELSE structure “Not a teen” “Is a teen” Stop Start Fig 9.9 A owchar t that displays dierent comments based on an age Input number number 2, 1, number 3 Example 27 Start Total = number number 2 + 1 + number 3 Input No mark Yes Total > 50? No Print “The sum is Print less than Total 50” Stop Output Output No “Satisfactory “Excellent Fig 9.8 Flowchar t for the IF–THEN–ELSE structure that determines whether a results!” results!” number is greater than 50 Output Output is stored in a variable named total. If the total see is your the than other wise it 50, then displays the a owchart displays the end of teacher” term greater “Please “Please await result report” total, comment. Stop Figure 9.9 expands the owchart of Figure 9.5 to Fig 9.10 A owchar t can combine conditional structures that output statements based on the result of a mark show the whether IF–THEN–ELSE a student is a teen structure or on determining not. Pseudocode_27: Nested conditions Figure illustrates INPUT IF 9.10 a combination of mark structures that output >= 80 two THEN conditional statements OUTPUT in marks. e Example data does accompanying 27. is ow from pseudocode owchart the start shows to the is how stop “Excellent results!” based OUTPUT on Exam_results mark shown the ow symbol ELSE even IF mark THEN of OUTPUT “Please >= your teacher” 70 OUTPUT “Please see “Satisfactory await the end results!” of term report” though the statements are not from top to bottom. As ENDIF you trace the owchart, notice that regard less of the END mark, the same nal statement will be output. 249 9 Problem solving and program design Loops Start e do WHILE not know and in REPEAT advance loops how are many used times when to you repeat the Number loop. e starting repeat FOR and the loop ending is preferred values or when the you number do of know times 1 to loop. No Number Figures = the 9.11 and 9.12 compare the owcharts of <= 3? the Stop Yes WHILE and REPEAT structures. Number Number = + 1 False Output number Decision Statements Fig 9.13 Using the WHILE loop to output numbers between 1 and 3 based on a condition True Statements Start False Decision Number = 1 True Fig 9.11 Flowchart for the WHILE loop Fig 9.12 Flowchart for the REPEAT loop Number Number Note where loop. e the Decision condition in a symbols WHILE are loc ated loop is in tested = + 1 each at Output number No the beginning statement not of the to be the REPEAT loop the statement will loop, so it executed is tested is at at possible all. e the end for the condition of the in loop, so Yes Number al way s be executed at least = 3? Stop once. Fig 9.14 Using the REPEAT loop to output numbers between 1 and 3 based on Examples Compare 28 the and two 29 a condition owcharts in Figures 9.13 and 9.14. e Each owchart displays some numbers between 1 are 4 based on a condition in each pseudocode number WHILE = while loop example 1 again shown Pseudocode_29: number (number <= 3) DO = number OUTPUT “the END 25 0 “out 1 number ENDWHILE OUTPUT + loop” = for comparison. e REPEA T FOR by either repeat the WHILE loop or example 1 is”, number number = OUTPUT “the UNTIL (number OUTPUT of and REPEAT BEGIN number the WHILE loops loop can be loop. represented Pseudocode_28: for and END “out number = of + 1 number 3) loop” is”, number the REPEA T loop. 9 .4 e owchart numbers in Figure between 1 9.15 and 6 adds and together then all displays the the even sum. As you continue remember ◆ Ever y ◆ e Start = It 0 owchart Process is ◆ = 1 If the there placed ◆ IS e has a symbol a drawing start can by a and be calculation represented with COUNT practice owcharts that: completing SUM to Flowchar ts end point. anything to from describing rectangle an action. containing the text description. is in a a question or Decision connection of condition, it is most likely symbol. ‘what symbol follows next ’ is COUNT False True an shown with arrows between symbols. even number? SUM = Questions SUM + COUNT 1 COUNT = COUNT + 1 False IS COUNT > 6 2 Name and of following the draw a indicates b per forms c directs d asks e prints Draw a the a the symbol that is suitable for each statements: end of a owchar t calculation the ow of data to another symbol question a the result. owchar t symbol including suitable text True DISPLAY for each of a display b read c add the a the Fig 9.15 Flowchar t adds all even numbers between 1 and 6 may e major appear why reasons quite would are you that a simple want by to comparison use to owcharts? 3 d double e ask Use if the message ‘Call value 15 to variable owcharts, so statements: SUM Stop Pseudocode following a into a a taxi’ variable age variable age and store the result in a old the the value taxi has of pseudocode corresponding a variable named cost arrived. below owchar t to draw the segment: owchart: Pseudocode_9.4.3: ◆ is ◆ more easier to read closely WHILE follows a standard, using symbols, word INPUT IF unlike ◆ lends <> ‘page’ word word = ‘page’ pseudocode itself program more readily to conditional and THEN DISPLAY ‘OK’ ELSE DISPLAY ‘Oh control No’ structures. ENDWHILE 251 9 .5 In many A r i t h m e t i c, of the examples in relational this chapter you and may logical operators have Logical seen fragments of pseudocode such as (age < 20) e (number < 3). ese conditions are evaluated in conditional, WHILE, REPEAT look at and them logic in unit more (ALU) of the CPU. L et perform a basic result in order to determine a example, WHILE IF −1 number <= 3, mark = that is and IF either age < TRUE 13 or must each produce FALSE. at a is, when operators mathematical operations addition, subtraction, multiplication produce values result. For values which is a or are compared using these TRUE FALSE. operators, the such result as compare detail. two ese FOR us result Ar ithmetic and the statements Arithmetic operators and division is either or to L et ’s number. look at the example WHILE number <= 3 more closely. Table 9.3 Arithmetic operators If Arithmetic + – Meaning sign) (minus * / (plus operator addition sign) (3+3) subtraction (asterisk) (for ward (3–1) multiplication slash) division MOD integer whole (3*3) (3/3) produces DIV the ese will compare the remainder in division–produces number in result the result see these quantities operators condition. e in algorithm only (5/2 = equal (2<=3), which each algorithms on a condition to the is true or false to 3 <= 3 number contains The NOT set of result Not whether there the know how to statements. is may loop Table or 9.4 explain jumping the the to another variable dierent age set = 20 is of determine therefore of is a a the is is 2, then 2 is if 2 is less TRUE. e than or outcome of TRUE. However, if value 4, then the result of the FALSE. are condition TRUE Accept, 1 then it is or or is one of two FALSE, Y es 0. at FALSE. If has means not a or No, Accept result 1, then it is options. is not or TRUE, 0. result following tables use examples to illustrate how the proceed include and OR operators can be applied. ese exiting tables a value operator NOT , AND next the the 2) other. Y ou where is to (4<=3) Examples with relies to 3 number e of contains with condition operators two number compared e Relational variable (example) are also called tr uth tables statements. In used as the example to Suppose a line of pseudocode IF day = Sunday. en operators. FALSE) other based statements contained on will the be the result statement (TRUE or performed. Table 9.4 Relational operators Logic operator Meaning Example = equal age = 20 > greater than age > 19 >= greater than age >= or to equal less than <= less than <> not IF 9.5 day two Sunday and condition can be examples the written use in for of a the these typical NOT condition operator. e ways: 19 or 16 < 19 <= age to equal IF day is NOT Sunday IF day is NOT equal IF day <> Sunday age NOT(IF to age <> day = to Sunday Sunday) 19 If the would 252 = shows to < equal Table result is TRUE, then produce a result of a day other FALSE. than Sunday 9 .5 Table 9.5 Truth table for NOT Since there Arithmetic, are two relational conditions and day = NOT Sunday (If day = If Sunday) day = NOT Sunday (If day = (term = 3), the possible Sunday) TRUE FALSE 1 0 FALSE TRUE 0 1 Now ◆ The AND student a is we the rst segment of promoted pseudocode to the next indicates class if an that the of we conditions 2 = 2 = 4 results. need column of 2 to four rows: ll half of the and half with rows (that is exam / 2 = 2) third term is 70 or with rows 1 and TRUE FALSE. So, a 2 contain TRUE and rows 3 and 4 mark contain in know becomes operator 4 Suppose combinations that Use formula operators ( mark >= 70), number If logical FALSE. greater. ◆ Use the second column to alternate TRUE and FALSE. IF (mark >= 70) AND (term = 3) ◆ THEN Display Use ll e condition of the both values must be in the If the of the both ◆ If value next of one then one the condition condition conditions any of is the result column and any additional columns to is is is TRUE TRUE, then and the the result also is NOT TRUE Column value of TRUE. values results. true. Row ◆ third ‘Promoted’ (FALSE) FALSE. 1 Column 2 Column Condition1 Condition2 1 TRUE TRUE 2 TRUE FALSE 3 FALSE TRUE 4 FALSE FALSE 3 Outcome/Result Table 9.6 Truth table for AND The mark >= 70 Term = 3 (mark >= 70) (mark AND (term >= AND = 3) (term OR = 3) TRUE TRUE TRUE Promoted TRUE FALSE FALSE Not OR works next FALSE TRUE FALSE Not promoted FALSE FALSE FALSE Not promoted IF example shows the result class for a ◆ truth table, you should list all the for the conditions so that contains the four outcome rows of of each. Notice combinations of in student mark >= the top 70) OR Display If the you value is is 70 is or promoted greater or of to 10 of the the (rank class. <= 10) ‘Promoted’ that of one condition is TRUE, then the TRUE. However, if the value of all the conditions are can FALSE determine exam a segment possible ◆ combinations an that a the given. creating if ranked result In indicates (mark THEN column dierently. Suppose promoted student rightmost slightly pseudocode the e operator 70) Table TRUE then the result is FALSE 9.6 and Table 9.7 Truth table for OR FALSE. To calculate needed, you can how many rows of number number TRUE 2 use represents or the the FALSE, Y es formula two or 2 or are conditions . e options No, 1 of options available, such 0, Promoted or as mark rank (mark >= <= (rank 70 10 >= <= 70) 10) OR (mark (rank >= <= 70) OR 10) TRUE TRUE T RUE Promoted TRUE FALSE T RUE Promoted FALSE TRUE T RUE Promoted FALSE FALSE FALSE Not Not promoted. promoted 253 9 Problem solving and Combinations program of design Using operators the TRUE As you practise the use of operators in algorithms or owcharts, longer expressions can and FALSE to of nd A and the B above, use result of A OR as (NOT pseudocode representations B). be expected. First, create another For example, if an exam mark in the third term is 70 the and the class, then student the is also student is ranked in promoted the to top the 10 next truth column and given a NOT the A and pattern B, then from add Table 9.5 to B: class B: NOT B plaque: mark IF use with of A: and table or nd greater the (mark (rank THEN >= <= 70) AND (term = 3) AND 10) Display ‘Promoted and awarded a >= 70 rank <= 10 TRUE T RUE FALS E TRUE FALSE TR UE FALSE TRUE FAL S E FALSE FALSE T RUE plaque’ e values for all three conditions therefore must be Next, using TRUE in order to display ‘Promoted and awarded the values of A and NOT B, and the a pattern for the truth table for the OR operator from plaque’. Table Expressions can also be replaced with a A: as A the A or B, or basic AND a phrase expressions B, A OR combinations of B for can ease be . is of mark >= B: NOT B A OR Display completion. en written also 9.7, gives: character, such as makes NOT it 70 rank <= 10 (NOT B) TRUE TRU E FALSE TRUE Promoted TRUE FALSE T RUE TRUE Promoted FALSE TRUE FALSE FAL S E A, easier to write operators. Not promoted Example 30 FALSE IF (mark THEN >= 70) Display OR (rank <= we still have TRUE TR UE Promoted ‘Promoted’ e Here FALSE 10) two only outcome that is FALSE for A OR (NOT conditions: indicates Let A represent mark >= 70 Let B represent rank <= 10) greater that or class, then if the a student ’s student the is student exam ranked is not mark in the is not top 70 10 of or the promoted. Questions 1 Identify each of the the area arithmetic following a An code b The c There were d There must cashier or be deducted be more 15 operator used in statements: must two relational or three $2 for digits. the sale passengers more in item. the passengers car. 3 on Write the Employees e Pension f A The are following a There are b Citizens picture rst three must ID. statements one is done using for relational you. sisters. Answer: sisters = 3 be at least 18 in order to obtain a 65 is cheque variable the following operators. The 254 There d contains board. 2 c > students have from is not LE T at age 65 equal contains number statements, a (LE T b (CHR c (LE T > 16) OR d (LE T > 16) AND e (CHR with most and to the number the < 16) OR < (CHR (LE T < LE T ) < LE T ) CHR) 8 II. vacation. and answer either TRUE LE T ) (CHR Grade of older. 16) < at weeks cash. 24. Write as passes four or CHR to the FALSE: B) 9 .5 4 Consider the following algorithm: 5 You are Arithmetic, to create a relational truth table for and the logical operators following statement: password count = = 1 =‘ ‘ ‘page’ IF word WHILE (word (count password) = password) AND THEN Display ‘Access’ ELSE Display ‘Forgot (count <=3) and password’ <=3) INPUT word count = IF <> (word word a count = + Identify : 1 password THEN Display ‘Access’ ELSE Display ‘Forgot i the conditions ii the two outcomes (results) from the statement password’ iii the for number the of truth possible options/rows needed table. Identify : b a an arithmetic b a relational c a logical Draw the truth table. operator 6 How many possible combinations of options (rows) operator will be needed for a truth table that has three operator. conditions? 7 Let A represent The outcomes and if FALSE, following go to Boolean a (NOT b NOT (A A) c NOT (A d A AND Saturday are OR OR and if TRUE, town. do B represent some Create I t ’s raining. gardening, truth tables for the expressions: B B) AND (NOT B) B). 255 9 .6 Desk for Te s t i n g checking the correct manually checking e the keeping with of the track the your of and steps Example explaining logic process processing executing one, while and is algorithms of in the 12 reviewing by an output. Y ou the algorithm do this algorithm results. We going by one started through Start the replacing READ verify your a SOLD a point INV = 4 - SOLD VAL then = 5 * INV algorithm trace table is an will important help you to part test is you at trace of a sequence you have a of steps ‘freeze’ the which seek algorithm ‘snapshot ’ of the state at of to from any all that table 1 as you one of is to state in a to a of the ver y check your useful tool, which row algorithm of the algorithm variable FOR - loop DO SOLD 4. Y ou Example tells can you that therefore ‘SOLD’ with the ll SOLD in numbers the must go column 1, 2, 3 and 4. the next step is to perform the two calculations within allows loop. the at that with table and shows each step. e algorithm for as much you the column trace state shows table SOLD is 1, INV = 4 − 1 = 3. detail of Write the number where SOLD 3 in the table under INV, in the row the = 1. allows e errors. number 3 can calculation, giving now be V AL = used 5 * 3 in − the second 1. 31 Complete the trace given the number that 4 point. wish. Each step value you the 1 VAL to labelled W hen see = and the to with END e e algorithm output. problem. If variables the algorithms. algorithm solve in loop Now, the An QNTY 4 FOR Print testing. Using each 4: by desk each by number table 4 for is the the following input value Remember the rules (Brackets Order in mathematics: BODMAS algorithm, – – Division – Multiplication – Addition for – Subtraction). ey tell you in which order to do the QNTY. arithmetic erefore READ operations. Computers V AL = (5*3) − 1 = 15 follow − 1 = the same rules. 14 QNTY FOR SOLD = 1 to INV = QNTY - SOLD QNTY VAL = 5 DO Write * INV - 14 in the row where INV = 3. SOLD QNTY SOLD INV VAL 4 1 3 14 4 2 4 3 4 4 END PRINT QNTY VAL SOLD INV VAL 4 4 4 W hen 2 in SOLD the table is in 2, INV the = row 4 − 2 where = 2. Write SOLD = the number 2. 4 Now 256 INV = 2, so V AL = 5 * 2 − 2 = (5*2) − 2 = 8 9 .6 Write 8 in the row where INV = 2. W hen 0 QNTY SOLD INV VAL 4 1 3 14 4 2 2 8 4 3 4 4 in the Now 1 in SOLD the Now table INV = is in 3, INV the 1, so = row V AL 4 − 3 where = 5 * 1 = 1. Write SOLD − 3 = (5 = * the number 3. 1) − 3 = 2 in the row where INV = −4 = in is in 4, INV the 0, so the = row V AL row 4 − 4 where = 5 * where 0 = 0. Write SOLD − 4 = INV = 0. = (5 * algorithms the number 4. 0) − QNTY SOLD INV VAL 4 1 3 14 4 2 2 8 4 3 1 2 4 4 0 −4 4 = −4 2 e Write table INV Write W hen SOLD Testing maximum value in the loop has been reached, so 1. you QNTY SOLD INV VAL 4 1 3 14 is move to print algorithm 4 2 2 8 4 3 1 2 4 4 So when table when V AL on to next V AL. e is line ver y in last the value algorithm, which of V AL in the −4. you shows freeze the QNTY = the = the algorithm, the values at that 4, you have last time. For SOLD = row this of the example, 4, INV = 0 and −4. Questions 1 The marks 25, 30, 12, 10, −1 are to be entered using 2 the following algorithm. Trace the values of Trace the marks count and average as the Pseudocode_9.6.1: marks are variable mark and the output when the total, 65, 71 and 82 are entered: entered. Calculate_average Pseudocode_9.6.2: Exam_results START START total = 0 count = 0 average = OUTPUT INPUT IF mark THEN 0 “enter a mark” ELSE INPUT mark WHILE (mark is not equal to mark >= “Excellent OUTPUT “see IF mark THEN -1) total = total + mark results!” count = count + 1 ENDIF “enter a mark” OUTPUT OUTPUT INPUT mark 80 OUTPUT >= results!” teacher” 70 OUTPUT “await your end “Satisfactory of term report” ENDIF END ENDWHILE average = total/count DISPLAY average END 257 9 End Multiple 1 The choice two main __________ a of exam-style questions 6 questions phases and algorithm, chapter of problem solving c denition, execution d denition, implementation. Column Accept 1 IF refer letter THEN to the diagram Columns 1, a read, b output, c write, d input, 2 2 is Column A, grade grade and store c NOT d AND. B or C 3 and store Column Print is = ‘F’ an 5 b star t c WHILE d conditional symbol loop statement. A(n) __________ a FOR b IF c REPEAT d WHILE. 9 output. The process example of a __________ statement. of and a compiling output debugging b looping c pseudocode c sequential d desk d conditional. terms ‘letter ’ and ‘grade’ in column 1 are: ‘Freezing’ an ‘snapshot ’ of the constants is keywords a program c variables b trace d subroutines. c owchar t d truth loop decision. a DO b REPEAT c WHILE d UNTIL. executes a process statement achieved algorithm b a have star t and end is an algorithm k nown for the correct as: check ing. a __________ must reviewing b The loop read logical The a: table a before 258 have truth values. input and owchar ts a = ‘P ’ 10 4 is: grade write and process 2 operator 3 represent: and process All processing 3 relational below. 8 ELSE 2 > a implementation Column letter b of comprise 7 4 / execution algorithm, to example a __________. b Questions 2 An by table table. state using at of a: any all point the to view variables at a that point 9 Shor t answer v questions Create End an countr y ’s 11 You were asked to write a shor t program that information about companies in six the number of employees requiring The is one trainer for ever y 40 IPO employees. trainer is needed if there are at char t of the employees over the least 15 should sample of the data to Suggest be entered is shown Country Company 6985 Guyana Rumaba 6987 Trinidad Mariob 45 7295 Jamaica Cour tstreet 87 7324 Barbados Ever yInc 42 7361 Antigua St. 50 7455 Belize Maggow On entering a NumtoTrain the countr y ’s number of Micks code, will calculate and sent comments to by ten the appropriate used to application draw the IPO that char t. and the best method to send the char t personnel. one describe The for following writing Initialise Prompt in disadvantage par t pseudocode the of the method you ii. was written in preparation program: variables to enter data in each variable Calculate the number of trainers Calculate the number of extra 68 name, employees the Explain 56 to be print the trainers required company trained, number total number of trainers needed the a program an be Describe Iii Output and for below : 12 a drawn requirement. to CO_ID be personnel or ii A one day. should more entering data. However, i another for questions training. end There char t exam-style countries programming and chapter will b accept IPO of Draw a owchar t to represent the ve lines of of pseudocode. trainers assigned. b i Identify the variables Write to ii State the data type for each of the in par t line Write Determine following the output statements for if each of DIV 30 numberofempl MOD 30 is conditional purpose of the two the line 4. The program maximum would statements be Identify statement number of extra that would trainers required for of should six most three be able countries. to enter Explain data which for a loop suitable. examples of data that could be used in to par t detail 56: e the fur ther the numberofempl numberofempl Explain add i. d iv to 1. a calculate iii pseudocode variables c listed additional required. test the algorithm for correctness. iii. 259 A PT E C H 1 0 PROGRAM 10.1 Chapter by Programming 9 introduced the writing algorithms and languages concept of drawing problem-solving owcharts. It Choosing the the implementation phase that an be converted into actual programming called source code. In this problem chapter, we examples of programming languages to process of writing short using how up with a phase, there are Translate language V isual your such four main Basic correct and algorithm as for almost into a L ocate Applications are solution to that a computer can actually instructs the a problem since it cannot solution to a problem itself. is what a to set do of instructions and how to do that it. ese usually converted into a sequence of or ( VBA). If algorithm, the this C++, or you have translation a code in called machine order to code processing carr y out which unit the is (CPU) stored in interprets instructions of the program. should select the type of programming language line-by-line. and syntax correct any errors in the code such is suitable errors, which are the errors incorrect use of the logic syntax errors those made or made by using the task. ere are many languages that can be used to write or create other kinds of software. ese programming violation by your as: languages language for resulting programs from ◆ solve central programming ◆ language program memor y. e programming that 2 a codes First, you be the steps: BASIC, Pascal, C precise writing phase numeric 1 to computer instructions this a programmer computer tells In of programs. A Implementation art introduce come the the share computer some is language interpret. A statements language algorithm a must programming is Programming during I M P L E M E N TAT I O N of syntax programmer, such wrong signs or are grouped into two categories: rules ◆ low-level ◆ high-level as arithmetic languages languages. operators. Low-level 3 Execute the program code. is includes using ese data to ensure that the program is expected, and can produce error languages are machine-dependent. at is, the working code as languages test messages written can only be understood by the particular as computer or processor that was used to write the code. needed. 4 Maintain the program writing as the well program. is throughout comments as on comments includes the how coding to within use the documenting process the by program, program on Machine the binar y 10110000 code. An the digits instruction 0 and might 1 be to make written 01100001. Advantage: code runs ver y fast and eciently works. because 26 0 uses how ◆ it language it is directly executed by the CPU. up as 10.1 ◆ Disadvantage: the programmer confused the massive the with program. It is also may amount the become of 0s and 1s in language commands as programmers has machine to use of carr y out the instructions in the machine-dependent. the same language abbreviated mnemonics, instead can languages CPU. ◆ Assembly computer Programming structure but and program ◆ allows words, called binar y. So instead of Advantage: can use English-type code, making Disadvantage: machine it programs easier have words to to to write create. be converted to language. writing Table 10.1 Examples of high-level programming languages code as 10110000 01100001, the equivalent assembly Pascal language code may be ‘add A, B’, generally meaning Named ‘add the contents of A and the contents of A language for ◆ Advantage: can be easily converted to machine a program called an the 17th centur y mathematician Blaise Pascal. that teaching uses structured purposes. Pascal is programming, an easy to mostly learn used language that code is by after B’. an alternative to BASIC. assembler. VBA ◆ Disadvantage: still dicult to understand compared Visual Basic for Applications, is a programming language to the high-level languages. Still machinedeveloped by Microsoft and derived from BASIC. Programming dependent. in VBA uses a graphical user interface using drag-and-drop techniques on a form (window). Controls, such as text boxes High-level High-level languages languages languages in that and buttons, are used to design the layout on the form to work are they dierent are not from low-level with Microsoft applications such as Word, Excel and Access. machine-dependent. e erefore, programs written on one computer other sections program, running generally be used on another similar in use keywords similar to chapter focus on writing the or executing the code, debugging computer. ey techniques, testing also this can English and are the program with data and easier documentation. to write. Question ese languages are designed to be easier for you to 1 understand. ey are converted to machine Explain and like translating from one language to the dierence between low-level languages code, rather another, so high-level languages. that 261 10.2 Although slightly part e Wr i t i n g dierent dierent writing 2020 the programming a language Examples for code and data becomes has not is not too programs illustrative languages types, for easy with specied language, but that of program programming code syllabus a it is a best shown in the most to practice. state choose to four statements could recommended complicated are ◆ have learn. to establish the include program headers the name program was ◆ declarations ◆ Program ◆ languages of author of or and the program: comments a date that to the written of variables statements constructing purposes. the start expressions and (blocks types of code), which arithmetic, relational (AND, OR, NOT ) and using include: Boolean appropriate operators Once the programming language has been selected, ◆ you can start designed need to writing your use a the program. Once algorithm text editor and to tested type it the you on implementing provide an your programming have dierent editor that code. Most constructs such and can be used to programming constructs (looping) formatting semantics which you ver y precise way in in a program must be which be understood. It is a set of written rules in various elements that make up in for a syntax allows the a correctly structured three each although it does not code to programmer will be statement that symbols For end is and the of have from a meaning Pascal, a guarantee the meaning language that make in other that the simple example dierent of a program statement up (;) are elements; is with the the words, language. represents it the may and programming VBA in Microsof t show the program header, output the line ‘Hello to all structure: 262 if required, e ver yone’ on screen. ere is also a comment pur pose of the program. Y ou should within are the no program var iable when the indicating inc lude you dec larations line of of code; how since and the each syntax you just code do not become is need familiar w r itten. compiler has to write in this S ome slight understand with the code may variations your rst the determined overall by the Example programs Output PRINT share a pattern also var y their 1 Programming REM structure structured in e ver y requirements. a language: sentence BASIC Optional purpose Nearly languages: Excel. ese constructed semantics. Program program the languages meaning. Statements various of associated semicolon statement, while another a useful! punctuation example, in manner. is example, Semantics user-friend ly to code. ere statement a programming comments ‘ legal’ – in combining the create output is Pascal computer language. e conditions order and the terminating the programs to and program following BASIC, statements (IF), iteration must written the conditional languages e is as type follow. Syntax pseudocode program. Most Sample syntax remaining paper, you ◆ programs the have similar overall Hello to ever yone Output comment of the on the program statement 10.2 Programming language: a program Pascal Minimum Program Writing sentence; Keyword age to obtain licence: Program 18 followed of by program name then Cost a of drivers permit: 250.95 semicolon(;) Class { To output a sentence} Comment of the on the of licence: B program Example Begin vehicle purpose Keyword to 2 indicate Programming statement(s) will language: BASIC follow below Writeln(‘Hello to ever yone’); Output End. Keyword for program Visual ‘ To Basic output for a Applications Sub example2 Dim age Dim cost Dim grade age = As Integer of As Double code Comment the Private end (VBA) sentence REM statement on purpose of cost As String 18 = 250.95 program Keywords for star t of class = ‘B’ PRINT “Minimum PRINT age PRINT “Cost PRINT “Class code age to obtain licence: “ CommandButton1_Click() MsgBox “Hello to ever yone” Keyword to statement send to the the of drivers permit: “, cost screen End Sub Keyword for program end code Programming Program In order to compiler that will declare use a needs be or variable to know stored state in the within in a program, the advance it. For this variables the type reason, you you are using of language: start of the program. Variable licence: “, grade Pascal example2; age: data integer; cost: real; the class: ver y vehicle var must at of of declaration char; means Begin giving a new name and a data type for the variable, for age example, age: := cost Y ou should use meaningful variable names in := that if you or someone else 250.95; your grade programs, so 18; integer. needs to := ‘B’; review Write(‘Minimum the programming code later, the variables will be licence: to remember and understand. In the following age to obtain easy ‘); example Writeln(‘age’); programs, three variables named age, cost and class are Writeln(‘Cost declared. Each variable is then used in the programs of drivers permit: ’, as cost); part of a sure you statement to be displayed on the screen. Make Writeln(‘Class note the variable names to understand of vehicle licence:’, their grade); purpose. End. In each example following the statements are to display the output: 263 10 Program implement ation Programming language: VBA Conditional e cell locations A2, B2 and C2 in the spreadsheet in Example Figure 10.1 are referred to in the VBA statements programming 3 code. Programming form IF = BASIC 3 form ELSE language: = 3 PRINT THEN PRINT “Not “Promoted promoted to to Form Form 3” 3” Fig 10.1 VBA Example 1 Programming Private Sub Dim age As Dim cost Dim class age Var Integer As grade form String If Range(“B2”).Value = Conditional; form: Range(“A2”).Value = Pascal integer; Begin Double As = cost Program CommandButton1_Click() language: Range(“C2”).Value := 3; (form = 3) then writeln(‘Promoted else writeln(‘Not to Form promoted to 3’) Form 3’); MsgBox “ & “ Minimum vbNewLine age to obtain licence: End. & MsgBox Range(“A2”).Value MsgBox “Cost Programming of drivers permit: “ language: VBA & Private Sub CommandButton1_Click() Range(“B2”).Value Dim MsgBox & “Class of vehicle licence: form form Range(“C2”).Value = Integer, examples languages have However, for illustrate slightly the most form that dierent dierent programming String = 3 Then syntax part, variable and data declaration the program requirements = “Promoted types. result = “Not do the variable promoted to Form 3” If = result declarations. End Program 3” become MsgBox Program Form is Range(“C4”).Value complex, so to Else End straightfor ward. As more As Sub result ese result Range(“C3”).Value If End As “ Range(“C4”).Value Sub statements statements are the instructions the program. e which will carr y Looping out the requirements of following e examples such and a then 264 as illustrate the use of conditional IF– THEN–ELSE. A value is assigned determines to which it. A variable form is should examples illustrate the use of looping be constructs such In the as WHILE and FOR. dened conditional statement message following statements displayed. each ‘IT for of following CXC’ 10 times. examples, the code will output 10.2 WHILE loop Example FOR 4 Programming line = WHILE line FOR < line 10 + program 5 Programming 0 line = BASIC a loop Example language: Writing DO language: I = PRINT 1 “IT BASIC to 10 for DO CXC” 1 ENDFOR PRINT “IT for CXC” Programming ENDWHILE Program Programming language: Pascal forloop; Pascal Var Program language: line: integer; whileloop; Begin Var line: integer; for Begin line := While 0; (line line := writeln(‘IT < 10) 1 to for 10 do CXC’); Do End. Begin line := line Writeln(‘IT + 1; for CXC’); Programming Private language: Sub VBA CommandButton1_Click end; Dim i As For i = Integer End. Programming language: 1 To MsgBox Private Sub Dim row As row = CommandButton1_Click() Integer, line As Next Do “IT for CXC” i String End line 10 VBA Sub 1 = “IT While for row CXC” <= 10 Questions MsgBox “IT Cells(row, row Loop End = row for CXC” 2).Value + = line 1 Explain the semantics 1 dierence in does it a between syntax and program. 2 What mean 3 Why should your programs? to declare a variable? Sub you use meaningful variable names in 265 10.3 Running Usually, you can even view output ready your will type to see from your program Next, it source called program your to be an so several steps editor it for this the is you have into machine can carr y are typed source code. do A compiler time stage, you called CPU you alone correctness. To translated that before instructions, let run. After tested be code program program. At program must object through program using needs code go your a so, the can be an is will the then source output, code to object may source Converting a program from source code to object performed by a ‘translator’ program. Sometimes listing is shown, which is a printout or its logic issued the own (F ig errors are (A). are cause (B). executed onl y needs Once unit to then the the star t Error it and compiler executing incorrect Other wise, be that program another time one performed, produces each to 10.3). detected, control program at program the is compiled t y pe of object r un, once. but If the there any modications to the source code, then it a must program be instr uctions code are is code on unexpected l y, the will program errors the stops be is no instr uct or program code and If all ‘stand-alone’ object and summar y program. a (r un) syntax compiled error From for error out instructions. translates produces executed checks language the and be recompiled. COBOL is a language which is soft compiled. copy of while the source working program with and instructions coding the as a reference program. 1 Program 2 A List of syntax or Compiler ese from are programs one language that to translate another – a specic from a program source code logic errors high-level 3 language to compilers a low-level and language. Interpreters, assemblers are all Object code translators. 4 Execute the 5 An interpreter translates the source program line- B Working program object code obtain by-line, and aborted the if an error (stopped) interpreter translated is (Fig detected 10.2). If instructs the instruction. is then no errors control cycle translation unit will be are to repeated instruction in the program. is is an easy Fig 10.3 Illustration of the process of a compiler for way of executing written machine (running) programs code. BASIC is a language the computer is compiling or interpreting not your in errors but Often, when inecient errors the Programming every Run-time results is detected execute to which source code, an error, whether minor or major, will is cause it to either output wrong results or not reach the interpreted. stage of which output will at cause all. ere your are program dierent to types of errors crash. Source Interpreter code Results Syntax Syntax errors errors language occur rules or a variable or a sentence language. Examples of when of mistake structure syntax errors keyword. Syntax is made of the the programming include errors in stop misspelling the program Errors instructions code. T ools Fig 10.2 Illustration of the process of an interpreter 26 6 errors quite or source used with easily. code the being converted program usually to machine detect syntax 10.3 Examples of syntax errors Executing If if (age 42) then Incorrect you have “OK” since an as < or > errors, you program Spelling X = 1 to 5 Do keyword error ◆ nal the linking: errors as occur in the using when a programmer sequence the in an of wrong the program mathematical expression and see the terms commonly used with copying in a program order to put from the hard disk program in state various pieces of code and data to or incorrect compiler object generate program will be will able to syntax errors with or it use of from be loaded program is run it produces that of a logic your on of source < 10) does code that can be done at load time and also at run time. compiles, you may either see your screen, or you may see another type of error. Runtime errors Runtime errors not occur as the program compiles or messages, but the wrong errors are usually due to unexpected events results. as division by zero or lack of memor y for the error code will output ‘A page’ when x < 10: be ver y THEN PRINT (“A programmer to manipulate dicult most of to the trace the as data. Runtime the program errors may can produce time. page”) Example However, the object code results (x memor y. Linking program the computer segment executable is, such Example in time, at ‘runs’. ese the single looping logic errors warning a formula, wrong compile; convert code. Compilation any usually form sentences, results structures. e intended the of a runtime error statement FOR to it makes Once operator IF execute are: combining compile is now memor y ready-to-run can when code errors mistakes to two loading: main together the can execution program a such object BEGIN End L ogic to in to Logic program is ◆ For your operator missing Bgin program program translated results. e such a syntax without print the Running average = 1 to 5 DO be: Results IF (x > 10) However, the code means than 10 THEN error the and of PRINT putting output not when will it (“A the be wrong printed becomes = results/(average – 1) page”) symbol when greater x than is in the less 10. e the program computer becomes e will to produce an ‘freeze’ when error the message value of or cause average 1. statement will be: results = results/(1 – 1) Debugging … which Debugging the source occurred often the is code process program through or does of nding the errors (detection), understanding (diagnosis) found program the the not and correcting error messages operating behave as why system, or expected. division by zero! they them. Errors generated is in are by because Questions 1 What of the 2 is the the name source Explain the given to the printout or soft copy program? purpose of a translator and give three examples. 3 Explain why debugging is necessar y. 267 10. 4 Testing Te s t i n g and debugging development program and put begins and into are cycle, and early. Testing when are you until use. It debugging necessar y they continues daily and is start the used stages best you the to incorporated to plan program to in techniques ensure completed that variety application (program) is complete of and it was meant to attempts debugging when you ensure ◆ runs ◆ and the carries nd and problems xes debug the your in your box crashing user a for helps user the unexpected may or be reasonable messages a range to user program values. It is is important branch, loop actually tested and by using a cases. testing a (Fig module provides problems. Typically, program, you need or to ‘ black executed loops no of not. Black end out of term being code; it: without that ◆ isolates test that to test of 10.5) is used to check that the is as expected given certain inputs. do. e Testing the range conditional does output what of a ever y a Black computer consider that statement the is must ensure of generating unable action or messages resolve produces error 1 input 2 process 3 display not used information the test box the the to about module testing values because the examined. e the actual black whether are actually attempts all code box test statements necessar y or to: program data values returned from the program. scenarios continue or to error box’ is is or system restart errors the program if Input occur. data Output results Program Errors can occur at any stage of a software application. Fig 10.5 Black box testing checks the output from the values input ey may using as a the result happen frequently application, for of problems if you make example, but such as a power errors they also while occur failure. W hite examine one Testing cannot prove that your program is fully of can certainly nd defects (bugs) in the is no way to be sure that there are the the cases inner most (F ig 10.6) structure important of test are the designed program to and methods. e are the accuracy of the module from test input, through program, but ever y there test correct. checks It box absolutely possible path through the test object, to the no output. errors in earlier the a the logic defect program is of the program found, the code. erefore, the easier it is to x it. Testing involves: 1 creating a set 2 running the 3 checking of test cases program that the with each performance test of case the software is as Fig 10.6 White box testing examines the inner structure of the module expected. Since Test A test cases case compares when 26 8 a choose documents the the predicted program testing is values results that with executed. W hen are the input actual choosing and results test cases a range conditions of which produce ever y of (Table test value values to impractical, you check 10.2). Y ou data, if errors. is specic should any, would be also should error be aware expected to 10. 4 Table 10.2 Testing strings and numbers – examples of values to test Testing has program string often subroutines String consisting String with Special be solely leading characters or of white trailing such as -, space white #, “ , ‘ , & these space and tests Although typed on to this with be often which determine quality tested varies sections before includes they the debugging of testing from of the system the their interact. e quality techniques of other results of application. to system, some < common ‘Foreign’ characters and planned. Some have completion, and Strings Empty to Testing international attributes include: keyboards ◆ Reliability : is is the probability that the inputs to Numbers and No number Zero (that is, leave input blank), if a 0 ◆ Small and large positive Small and large negative Positive numbers Negative out numbers Numbers with Combinations of out leading of numbers of zeros letters and such ◆ range as the in the correct screen program username (Fig that and gives in user password software access entered in based the on in 10.7). ◆ A under software will not to the and a by cause it to crash for does clear expand user Portability : is be operating to result program or in messages the for run robust if an irreversible at it the is to debug, appropriate eects. should output form must allow should and be be exible also easy provided be to in a understand. ease one on easy side system results can is designed adapted stable how well-structured form system the software error the not undesirable interpret, and that is means user. e and conditions. application. without the certain system operation Usability : e input log- time its locations a the Maintainability : is modify 0034 numbers ◆ Consider Stability : damage range required of specied error numbers required use possible with type of dierent which a software computer computers can and systems. Questions 1 Explain the a testing b black dierence and between: debugging Fig 10.7 Testing a username and password access screen Examples of usernames and passwords as test cases can 2 Give two testing include combinations of values as shown a white examples of box what testing. should be done when program. List three attributes Username: Password: 1 Admin newday2019 2 01boss Admin which 3 00112233 newday2019 answer. Write 4 New Empty completed 4 day2019 and below: 3 Test# box You to have test written will the of rigorous add a a good program that has testing. program these to numbers examples of input and values two integers output that the could be used program. 269 10.5 Program Documentation design is an document ation important process. Several types part are of the produced the software during the sections will help you understand more about programming. process. Example with Documenting programming the 6 shows the keywords or listed programming symbols used for languages adding code comments. Documenting or comments Comments are useful then tr ying to to it write a the Many students nished later, you and may what that some write their working. If doesn’t your may be leave why you REM Apr 28, supposed REM ******************* REM This others or used to single since REM it. the a BASIC time Ali James 2020 program will output a sentence ******************* program comments used language: by and after the REM some were Programming or and reviewing comments the spend code 6 Written SBA you Example doing. code, especially will you is phases debugged help variables resemble be sections your remember dierent code for therefore of short programming to code moderator not method, used code a your later, you purpose or typing your needs your month remember teacher what alongside achieve. Comments your means program you understand is the review code describing placed if updated. If your for Programming language: Pascal certain another set requirements. en {Written by Ali {Apr 2020 James } of 28, } you {******************* may resort to typing in comments that are similar {This the code. is is not a good program in will output a method. single Comments } to programming code should include the sentence } {******************* } following: ◆ An over view rephrasing ◆ e ◆ e or If of step the date that the reviewed. is you process the have of for program nally of was found the than Visual program and created good or modied guideline of how updated. a Basic you to did while 27 0 did and explain Adding seem that not solution include that a tedious writing any section comments like work, you your to your should comments of (VBA) Written by the to a part of document that ‘ Apr 2020 ‘ ******************* ‘ This 28, program will output a single would code you help that may add ******************* what User process. However, if nd James the code. may Ali sentence programming code, you Applications ‘ ‘ code for even programs. was a tasks, rather code. some provides program and your authors information recently ◆ the each name(s) contact of them explaining User documentation documentation program do what does it is and is concerned how supposed the to end do. It with user is what makes usually the the the program rst 10.5 contact of how they to have input printer, save the the data, how les program with and and so how system. It to format on), how to to interpret may give output access any details (use the features system of messages. ◆ facilities can reader familiar is its concepts an optional explains User documentation should be structured in such that it is not necessar y to read it all before and use the application. It is usually integrated with how to the manual system assumes and that the understands terminolog y system administrator’s react to situations guide which which arise the system is in use. It also carries out system starting housekeeping to used. is document ation a while way be Program as part tasks such as making a system of backup. online share help, with information system user lots more on of blogs how to online chatrooms troubleshoot eciently. Five documentation and common and use components to the of are: Questions 1 Give two when ◆ a system over view which explains what the ◆ an and cannot installation install the Explain why document, which explains system and tailor it for write your how to when congurations. e recover things illustrations ◆ an a from go reference system to errors wrong. It and introductor y terms, how ◆ is impor tant should you include State the comments as you keyword manual with manual, which available each include 4 a Pascal b VBA. Describe the explains, in the to the simple system describes user or in of symbol the dierence documentation which started in used following to identify a programs: suggests problems examples get facilities basic should code. particular document and programming how comment hardware documentation application. do 3 to why an system 2 can reasons designing detail and all how 5 Explain two a program b user and between user components program documentation. of the following: documentation documentation. the these 271 10 End Multiple of choice chapter exam-style questions questions 7 1 The par t of the programming instructions a computer code of the in that order program to is carr y out errors a test in b CPU c ALU d ROM. Errors resulting from rules a data b logic c syntax b syntax c wrong d d error results are incorrect use of messages. Debugging is test b messages c source code d object code. process of nding errors in the: data programming called: A test case documents to the compare values them that with are the actual __________ work ing a as data ensures that the program a program is __________. a input, compiled b input, executed c output, compiled d output, executed. is expected. correct b output c sample d source. 10 An example graphical of user a VBA b BASIC c COBOL a programming inter face language that uses Adding comments a when b while c after d when a user to has writing a program tested the is best achieved: it program a the program is written is: 11 The it is keyword maintained REM a error b comment c data d loop. in in BASIC the future. refers to a(n): message PROLOG. variable such as a that stores word, a string b integer c number d character. a phrase collection or of sentence type characters is a(n): 12 Testing a program involves each of the following, except: 6 Which of the following are true for a star t b end value c both star t and end values are d both star t and end values must value must must be be a creating b xing a c running d check ing set errors the of in test the cases program program with each test case FOR statements? 272 results runtime. Using A the a when 5 produce: errors __________ d can the: 9 4 program CU language 3 a data the 8 2 Logic interprets k nown k nown optional be k nown. the per formance of the software. 10 Shor t 13 answer Consider the following using While total = 0 count = 0 average = samples of average of exam marks loop ‘Enter mark WHILE (mark a mark’ Pseudocode_B: using Repeat total = 0 count = 0 average = questions is not equal to –1) INPUT total + mark IF count = count + 1 THEN ‘Enter a mark’ ELSE OUTPUT INPUT mark 0 UNTIL DISPLAY ‘No marks entered’ ELSE average = total/count DISPLAY average ‘Enter of exam marks mark’ mark mark ENDWHILE = average loop 0 DISPLAY = THEN exam-style REPEAT total count chapter pseudocode: 0 INPUT IF of questions Pseudocode_A: OUTPUT End = –1 DISPLAY ‘End of marks’ total = total + mark count = count + 1 mark = = –1 IF count 0 THEN DISPLAY ‘No average = marks entered’ ELSE END OUTPUT total/count average END a For one with b or both samples, documentation language assigned Enter following the program. were nal For able to results each by i 23, 15, 18, A+, 23, 15, 18, –10, iii –1, 23, 15, iv 23, 15, 18, your all of if –10, suitable Algorithm: Training code Declare programming data to test explain the data the whether and state you the Declare countr y, Prompt to Accept Accept 14 14, –1, A+ Prompt 18, –10, 14, A+ Accept 14, –1, Consider accept the Training information requiring algorithm about the opposite number of that will employees code, name, company and employees to be trained are company a trainers, extras as as literals/string code enter countr y countr y to enter company company to enter numberofempl numberofempl number of trainers Calculate number of additional extras >= / = numberofempl trainers / (extras) 30 from 30) 15 number Then of enter (numberofempl training. countr y ’s numberofempl, Calculate If A to Prompt A+ Accept 12 code, code Prompt any. –1, variables number teacher. sample errors, ii a sample, enter or write using entered trainers = trainers + 1 when Output the number of trainers needed prompted. End There is one trainer for ever y 40 another trainer is algorithm employees. a However, of needed if there are Convert the following algorithm into code for a at programming language approved by your teacher. least 15 or more employees over the requirement. b The program trainers will assigned. calculate and print the number Inser t lines to appropriately document the program. of c Update for six the program to accept the information countries. 273 A PT E C H 1 1 PROGRAMMING 11.1 e Introduction programming language to computer schools. is is Pascal is used programming to teach in Pascal promotes a and logical approach to rst program you start Ez y Pascal, the Pascal editor will systematic, appear well-organised your many W hen because PA S C A L Pa s c a l Wr iting introductor y WITH (Fig 11.1). e upper green area is to show the learning result of your programs, while the lower blue area is programming. used is chapter shows implementing the Chapter this you will 10. If need a programming or programming written Y our the and number digit not able your basics on to as a building a for baking bench. Pascal as English code. language, started. ink recipe program in programming get the of introduced rst language, just or text is of wrong few phone call knowledge is aspects typing is is of a a cake one one spoken language. mobile your practical language instructions and the programs for has a when that message. en made, or how keypad it is you message you you use click dialling a type send sent, without done. However, if are to you the type number, you a will Fig 11.1 Ez y Pascal opening screen be to contact the correct person. In Similarly, a computer uses an application your shown a compiler to produce a result by translating in a program you write into a computer can instructions, the interpret. If compiler you cannot type the produce below. In in place it produces syntax errors or any in place Pascal runtime errors. this are a number chapter, Ez y online for ‘Ez y of is 274 Software. rst line, be sure to type your ‘type your name here’ and today ’s ‘today ’s date here’ My your ºrst name here} simple program written Pascal} compilers used. Y ou Free available. In To should Download ’ from search type Program output today’s one line} date here} Sentence; Begin Writeln(‘Hello Dolphin End. Bay program compiler Pascal Pascal Pascal the type type {Title: {Date: ere of of {Purpose: a Pascal results. in Finding short wrong {Name: Instead the form date the editor, type the name instructions Pascal called to everyone’); 11.1 e is word the Program rst line program. In of this tells code the that Pascal compiler contains example, the name the of that name the of a this name the program memor y is be two will main section of a program starts at the nishes at ‘End ’. W ithin this specic instructions the compiler that need to be solve our executed included to the words, then words. So, for name name of remove ‘Sentence’ as the the program will will spaces example, ‘One ‘OneSentence’. Pascal the Sentence’ add the extension .pas to the program. Y ou will see the of the program above the Ez yPascal menu by (Fig are more the Pascal section, name the program. If the become type to word default ‘Begin’ and the or between Sentence. e of stick). en Introduction 11.3). programming problem. Fig 11.3 Your program is given a name and shown at the top of the Ez y Pascal screen Compiling e Pascal program the compiler from into machine unit can rst or checks click the screen be your errors were (also location you that to icon on of the the in central ensure the that the will the an bottom no of you compiler typing be a of message the or typed output bottom error will editor processing Run, Compile menu. If compiler error Pascal correctly. e successful’ at at the typed the made. Select 11.4). Other wise displayed convert program correctly, the (Fig possible so program ‘Compile to statements the Compile ever ything message the needs language execute syntax program the will screen) and highlighted a on a Fig 11.2 Typing Pascal code into the editor line Notice and the are always rst four ignored start by your lines the of code. ese Pascal programs are compiler. Y ou with the of code. comments should following comments: ◆ your ◆ the ◆ a ◆ the name title brief of the program description of the purpose of the program Fig 11.4 Compiling the program shows a message at the bottom of the screen date the program was created. that there were no syntax errors Saving Y ou the should program save program, click save your ever y In program you File, Save. Browse program (such as the to type. To where save you Documents folder or 11.5, the immediately the want Figure to where at the the end below error of is the compiler the has highlighted error. e located: the orange semicolon the arrow was line shows omitted line. 275 11 Programming with Pascal Running Once (run) you the the have click the program no program output. From or program as the Run compilation to see Run if in produces menu, select icon. e shown it errors, you program Figure can the the will correct Run compiling multiple may not and removing corrections, and know which errors. erefore, it more errors, if errors correction is best to caused make you 11.6. make appear, then the you additional corrections in this order: 1 Identify 2 Save 3 Compile Y ou and the should there are message each error individually. program. the program continue no is correct errors to and again. Fig 11.6 The output of the program named Sentence compile the the program ‘Compilation until successful’ shown. Questions 1 State which Pascal 276 of the program: a Add numbers b 10Lines c For d ThreeChoices e maxValues Loop following are valid names for a 2 List three program. steps to follow when option execute Fig 11.5 The compiler has highlighted the line immediately below the error W hen execute compiling a in a St r u c t u re Congratulations! rst Pascal Now that program, you you have should completed compile and your execute it to see of a your Pascal of a Pa s c a l results. Table 11.2 program 11.1 shows the basic structure program. Table 11.1 Structure of Pascal program Program Program Example(s) Explanation Program All header name; Sample; For Ez y Pascal Pascal word, programs Program, is must have a Program heading. The first compulsor y. Or Program Sample (input, output); For some other compilers Declarations Const Const pi = 3.14; Const when Var Var Mark, Test: Count: Grade: Title Procedures Begin and integer; Var real; is must char; as = ‘Hello’; is shor t you shor t first for create for variable. declare integer, Test include constant. You assign as integer, a value to a constant it. Before it. These real real, and you can examples Grade character as and use a variable, declare Mark character. Variable literal you and Count types (string). functions Begin Denotes Read(Mark); These Writeln(‘ Thank You’); input, the star t of one or more programming statements Statements If (Mark Else > 30) Then Grade Grade := ‘P ’ include: output, := ‘F’; conditional (IF–THEN–ELSE) assignment. For count := 1 to 5 Do For Begin loop Begin Test := Mark * Writeln(‘ The count; test output is ‘ , test); a compound statement) compound statements have End; Mark > 30 two or more consecutive statements End; While (of Do (of While a compound statement) loop Begin Writeln(‘ This is Writeln(‘More a sample while statements can loop’); go Can include compound statements enclosed compound statements that in Begin and End here’) End; Repeat Repeat Writeln(‘this is Writeln(‘More Until End. End. Mark > a sample Repeat statements can loop’); go here’) loop Can include and End may not need Begin 30; End. (with a full stop) indicates the ver y last line or end of the program. 277 11 Programming with Pascal Punctuation no e semicolon is used to separate declarations Else most statements. Many Pascal programs are written Writeln(‘This a structure, such However, since declarations program to and will Program the as those semicolon compile Sentence; everyone’); previous separates statements, the also in and the following Pascal If a a semicolon syntax e Writeln(‘Hello End. last ‘End.’ keywords ‘Begin’ and ‘End’ act as the individual error line e brackets is placed for of full Comments e within Newline); examples. run: Begin is to line’, follow semicolon End and the ever y stop in { } with the End, this IF–THEN–ELSE Pascal program’s denotes can the however end be would code of cause statement. the written must be program. after this last for statement. multiple but statements, so usually after End there to is show no the semicolon end of the after begin statements. Statements ere are some occasions when no semicolon is Statements after If End, as in (line Then the following Pascal give instructions to the computer. A simple example: statement is statement comprises are >80) Begin in used {perform the following two within statement a single instruction two ‘Begin’ and is useful if or while more a compound statements ‘End ’ keywords. A you need to that compound perform some statements} instructions Writeln(‘This is over the on Newline := Newline – in sequence or repetitively before moving line’); to the next set of statements. Various types of line; statements are explained in Table 11.2. Table 11.2 Types of statements Statement Example Explanation Input Read; The cursor stays Readln; The cursor moves statement Read and Readln reads data from keyboard, and waits for the Enter key on the keyboard to be pressed Assignment Places data statement in a next to to the the text next entered line after the text is entered Mark := 30; := variable is called the assignment operator The variable is on the left of the assignment operator The value is on the right of the assignment operator The semicolon (;) ends the statement Here, Mark is assigned the value 30 Output Shows statement the output on the monitor screen Write; The cursor remains Writeln; The cursor goes Write(Mark); Outputs 30 Outputs 30 Writeln(Mark); | Write(‘Score of ’ ,Mark); Writeln(‘Score of ’ ,Mark); (| statement Begin Mark of 30 Outputs Score of 30 Mark 1 Writeln(Mark); End; 278 (| 5; Two End; (of or a is a same star t of place the cursor) statement) consecutive compound statements statement) on next | compound more (of the the cursor) Score Begin :5 the at the Outputs | Compound is to the line screen 11.2 Structure of a Pascal program Questions 1 Explain the a a b write c := dierence compound and and a between: statement and a single writeln = b 2 Consider Fragment these two fragments of Pascal Determine line statement were i line := 85 ii line := (line > 55 Fragment Initialise line if the values for the variable to: 1 into a Pascal program. code: to any value and Newline to 85. 1 and run the program. 80) i Then Writeln(‘Extra Initialise := Newline the value for the variable line to line’); 85 Newline output Conver t Compile If the initialised – and run the program again. Note the line; results. Writeln(‘Same line ’ ,Newline); ii Fragment If (line Then > 2 55 80) and the run value the for the program variable again. line Note to the results. Begin c Writeln(‘Extra Newline Change := line’); Newline Repeat of – both par t b for Fragment 2. Compare the results programs. line; End Else Writeln(‘Same line ’ ,Newline); 279 11.3 Fo r m a t t i n g Sometimes you to the output expected. ere look at your of are code a Pascal times again the to output program is just however, when see what is of you Pa s c a l what programs e result missing, has Enter errors, or sample maintain run look not set programs program and is in the the in logical illustrate Example 1 you typed result given your of it steps. e various into indentation it. If like out the following results. Type Pascal code, then to compile output two should Suppose numbers in you or were to output text. Update Example 2) to statements your include program input and that once output combine again (as statements. below. Example Example integers | the editor. Tr y correctly, your is: need 2 1 Program Program var Bigger; num1, Var num1, Bigger; num2: num2: integer; Begin integer; Write(‘Enter Begin Write(‘Enter two integers two integers ‘); Readln(num1,num2); ‘); Writeln(‘You End. ’, entered ‘,num1,’ and num2’); End. e result is: W hen Enter two integers press e vertical Notice bar where it ‘|’ in is the output represents the cursor. then now, you program the did program cannot not enter have code run this program, type the number 3, then the Spacebar, then press the Enter type the key. e second program number ends 56, there. located. e For you | to any any data, since input change the is: the statements. Modify output result statement as Enter You two integers: entered 3 and 3 56 56 follows: Dividing Write(‘Enter two integers two numbers ‘); Adding, subtracting and numbers program in a Pascal multiplying integers involves and real assignment to statements. However, division numbers Writeln(‘Enter two integers cursor 28 0 and now? run the program integers or real slightly dierent numbers. Tr y ‘); and Compile are is again. W here is the running the following two programs: if the compiling 11.3 Example is 3 It Program Var Formatting time, your may look answer is the not output quite of what Pascal you programs expected. like: Int_division; int1, int2, result : 1.00000000000000000E+0001 integer; by Begin int1 := 10; int2 := 2; result := 2.00000000000000000E+0000 equals 5.00000000000000000E+0000 int1 Writeln(int1, ‘equals divided div ‘ Y ou int2; divided by ‘,int2, ‘,result); need more to apply the user-friendly modied from the formatting feature output. Example version in 5 Example to has 4 produce now by been formatting End. the Your result should be similar to output of divided by 2 equals 5 5 Program Var Example numbers. this: Example 10 the Real_division_2; realA, realB, result : real; 4 Begin Program Var realA := 10; realB := 2; Real_division; realA, realB, result : real; result := realA div realB; Begin Write(realA:2:2, ‘ divided realA:=10; by ‘,realB:2:2, ‘ equals realB:=2; ‘,Result:2:2); result := realA div realB; End. Writeln(realA, ‘,realB,‘ ‘ divided equals by ‘,result); e result now looks like: End. 10.00 divided by 2.00 equals 5.00 Questions Conver t each of the following sets of pseudocode to a 2 Pascal program. Be sure to: number ◆ include comments in the WHILE ◆ declare all = 1 program (number <= 3) DO variables BEGIN ◆ include appropriate indentation. 1 number = Output “the number + 1 number is”, number ENDWHILE Algorithm Calculate_age OUTPUT INPUT thisyear INPUT birthyear age thisyear = – age < = integer 13 OUTPUT “Millee is a age = 13 OUTPUT “Millee is to 19 DO teen” Output ELSE loop” 3 FOR THEN of birthyear age IF “out not a “You are a teenager” teen” ENDFOR ENDIF 281 11 Programming with Pascal 4 Pseudocode: total = 0 count = 0 average = average_of_exam_marks 0 REPEAT DISPLAY INPUT IF ‘Enter mark mark THEN mark’ = -1 DISPLAY ‘End of marks’ ELSE UNTIL total = total + mark count = count + 1 mark = -1 IF count = 0 THEN DISPLAY ‘No average = marks entered’ ELSE OUTPUT END 282 total/count average A PT E C H 1 2 PROGRAMMING 12.1 V isual Introduction Basic Microsoft ’s for Applications programming customised to Visual ( VBA) is programming code in Basic part language. Y ou WITH for write in Word to complement their and output earlier FOR A P P L I C AT I O N S your versions of results. To Excel add (such as the Developer tab 2007): Access, Excel 1 and B ASIC Applications code of can VISUAL built-in Click on the Oce button (top-left corner of the functions. screen) Each application also has the built-in V isual Basic 2 Editor. If you use any of these applications for Select Excel Option School-Based Assessment (SBA), then you will to submit additional les for the Select since it is included in the will be used examples in ere two place the are a or ways write following editor using in to 1 Add 2 P lace 3 Change the box. the Popular tab on the left and check the Developer tab in the Ribbon option 12.1). programming VBA steps Excel on code the VBA within summarise Excel, and code. Either spreadsheet one how the access editor. way to to to access write the programs code: the a write Button Microsoft VBA illustrate the chapter. Command code e this to of le. Microsoft (Fig Excel corner programming Show component lower-right not 3 need Options, in your Developer Command the name tab if it Button of the is not visible. on the spreadsheet. Command Button to an Fig 12.1 Adding the Developer tab in Microsoft Excel 2007 appropriate 4 Type the name. VBA code into the editor and set up the To add the Developer tab in later versions of Excel, spreadsheet. such Test your program by clicking on the can also bring up the (2013 VBA editor Alt + Right-click Under side the Developer tab you on Ribbon the (Fig ribbon, and then click 12.2). have added the Developer tab in of editor becomes available to the the dialogue Ribbon, on the box, select Main check (Fig right tabs (if Tick the Developer box 12.3). an Click application, the Customize necessar y). 3 Once anywhere the F11 2 Adding 2016): by Customize pressing and Command 1 Button. Y ou as write OK. your 283 12 Programming with Visual Basic for Applications Fig 12.2 Right- click on the ribbon and select Customize the Ribbon Fig 12.4 Locating the Command Button on the Developer tab Fig 12.5 Inser ting a Command Button on the worksheet If you wish to move the Command Button to another location: Fig 12.3 Check the option to Add the Developer tab 1 The Command Command Button is similar to the Once a form the and or Close buttons dialogue V isual Basic box. It that is you used Design would to the Mode place a use execute to code in As you the Button on your 1 following Click the click on the shows circles at the edges, you can it or cut and paste it in another location. create number more for the Command Command to Buttons Button on the sheet, increases CommandButton2 from and worksheet, use so the it, then close editor. Command select Button. button CommandButton1 To to Submit, OK, drag Cancel on Command Button 2 e Click on. steps. Developer tab, then click the Insert Using the VBA editor button. Once 2 In the ActiveX Controls group, click the your Command worksheet, you Button 3 Click icon on rectangle the will (Fig has been placed on the can now add your VBA code: 12.4). worksheet that worksheet 284 (Fig Button Command be 12.5). or the drag to create Command 1 the Button on your Right-click that be the on the Design selected. CommandButton1 Mode icon on the icon. Note ribbon should 12.1 2 Click (Fig V iew Code. e V isual Basic editor appears 3 P lace 12.6). Introduction your cursor to Visual between the CommandButton1_Click() lines. Y our these 4 As two your MsgBox Edit In rst VBA visible. If select Private and always example, type is my Command Command is should for End be Applications Sub Sub typed between lines. “This the the code Basic editor Button it is first code shown message in below: VBA!” Button window make (Fig sure not, then Properties the 12.7), to the click rename Properties V iew in the the window menu and window. Fig 12.6 Getting ready to add code to your Command Button Fig 12.7 The Visual Basic editor where programs are typed and edited 285 12 Programming Y ou can use following with the Visual Basic Properties changes to for Applications window to make the Saving no Click the caption program CommandButton1: Y our 1 the option to change the name need to Click is to part save Click the Font option to to save the type and size of this to by Calibri 14 clicking point the box and your bold. Y ou with three can the font dots to the you create another set of code in the same Command Command Button. A sheet can therefore Buttons Button each for a dierent not will also be numbered so that you so among that menu ◆ you Select they your need File to do as a Macro-Enabled dialogue box, use the this. them. Alternatively , you relate to the purpose of program produce the output text can their also location will display error messages as expected. e VBA editor to indicate that an error occurs after of shows the the line and error. Figure column 12.9 number shows that the rename is found on line 2, column 7. e error in this tasks. is double First As errors the point. It the code Testing Save can error them workbook the task. Each of dierentiate will have that Command le. However, you is sheet, add highlights many there name. and another so right Sometimes As another worksheet access Correcting of as Excel the drop-down font it your Here. Workbook. In 2 of from need CommandButton1 code that a single quote was used instead of a quote. program to close and click the V isual Close Basic and editor: Return to Microsoft Excel ◆ Alternatively, you clicking in Once 1 can Excel switch icon to under the the Excel F ile sheet menu by option editor. you Make on 2 the the are sure in the spreadsheet: Design Mode is deselected by clicking it. en click the Command Button on the sheet. Fig 12.9 The VBA editor highlights the text to indicate that an error occurs after Y ou should see results on the screen. Figure 12.8 shows that point the message that should be displayed. Questions 1 What 2 Give must two What is the Command 4 What must running 5 Fig 12.8 Clicking the Command Button shows the result 28 6 How are done examples Command 3 be to of access names the VBA that can editor? be used for Buttons. name of Button be done the VBA Excel the icon to controls is group where the Command Button code? sheets the found? with VBA code saved? before Wr i t i n g Congratulations! rst VBA your code, worksheet data from section your will variables, Now let ’s and SBA. Excel provide some that all and code you how have it S ince sheet conditional Remember that show to you create examples loop is w ritten can be may with using code, this statements, control w ritten be VBA of your used str uctures. between you may names indents of the of lines the 12.2 the of and shows editor to start parts sometimes dark some of blue for adjusts capital even the 12.2 VBA with code, and various comments Table that variables some some for notice of in changes syntax examples of the such keywords VBA the letters, in as colour green your code. statements. the Table 12.2 Useful VBA statements Private S ub S ub lines CommandButton1_Click() that are found in the code and the window End editor. Private Sub CommandButton1_Click() Must be the rst line of code when using a Command Button ‘This Declar ing var iables and data types A VBA variable contain with e a no or are data types shown in be less special number. Each main SBA must spaces than variable that Table 255 characters you must may characters, and have want not a data to use Remember a to comment use Range(“cell begin type. for is your 12.1. This statement comments data info Places = from your code address”).Value accesses data Range(“C4”).Value Places in the in = variable a cell info named info into cell C4 Range(“B3”).Value data from cell B3 into a variable named info Table 12.1 VBA data types Worksheets(1).Rows(1).Select Numeric data types Non-numeric data types Selects Integer String row 1 in the current worksheet (characters) Worksheets(1).Columns(3).Select Double (for real numbers) Date Selects Currency Boolean (true or column 3 or Column C false) Worksheets(1).Cells(1,1).Select Selects e syntax Dim to declare variableName a as variable that the following three A1 Selection.Copy DataType. Then Note cell is: copies the data in cell A1 lines: Worksheets(1).Cells(2,1).Select Selects cell B1 Dim mark As Integer Dim cost As Double ActiveSheet.Paste Dim exam As Date Pastes End can also Dim be written mark exam As As on one line Integer, as: Must cost As data in cell B1 Sub be the last line of code Double, Displaying Date e MsgBox display information and messages InputBox or are two information via keywords a that dialogue box. Statements Remember to include comments in your code. ese the start of MsgBox are denoted e by following with data on a single quote statements your are at quite spreadsheet. As useful you a statement. when write working your code, “text message’ MsgBox data in message” a displays dialogue box. Range(“B3”).Value stored in cell B3 ‘text in displays a the dialogue box. 287 12 Programming Unlike with MsgBox, the variable to which two statements e variable it Visual Basic InputBox can below return that use for Applications keyword requires message a the results. Consider the InputBox the the cell is displayed (Fig must be declared as an Integer data = InputBox(“Enter Required ”) shows a a Y ear”, “Information prompt in a dialogue box First line click for a the user to button, and input then text to outputs an the box to the screen (F ig 50 or less is found in 12.12). 1 empty area contents Sub of or CommandButton1_Click() code of Two score variables As are Integer, result As String declared the score text of that Dim waits value type. Private year a keyword. Example year if 12.10). value If if = in Range(“C3”).Value cell C3 score score is is placed > greater 50 in variable score Then than 50 result message is = placed “Good!” in variable namedresult Range(“C4”).Value message End Last is pasted in cell = result C4 Sub line of code Fig 12.10 The InputBox displays a prompt in a dialogue box and waits for the user to input text or click a button Note the slight variation in the following Inputbox statement: year = InputBox(“Enter Required ”, 2019) the input shows a Y ear”, “Information the default number 2019 in Fig 12.12 Example of the IF-THEN statement area. IF–THEN–EL SE In Example based on the Example line Dim of dierent value found message in cell J8 is placed (Fig Remember to save your workbook as a Macro-Enabled Sub eligible two is As Integer, If e following THEN and statements examples If cell = J8 is Range(“J8”).Value placed illustrate IF–THEN–ELSE the use of the IF– eligible the result Then statements. value place in eligible in = >= eligible is 5 Then >= 5, “Yes!” message ‘Yes’ in variable result Else: IF–THEN Other wise In Example 1, the code places a message in a cell result based on the value found in cell C3. Notice that 288 = “Sorry!” no Place 12.13). result Workbook. Conditional J15, CommandButton1_Click() variables eligible Value cell code Fig 12.11 A default value can be par t of the dialogue box Declare in 2 Private First 2, a another message in variable result As String 12.2 End End If of Place the IF–THEN–ELSE the integer Range(“J15”).Value message in cell Last = result Star t Sub line of G10 and place in VBA saleamt of Case Case saleamt statement J15 Case End from in statements Select Place value Writing If Is value is >= >= 3000 3000 code disc = Assign Case If to Is value is disc is 2000 2000 to Is value discount 0.1 10% Case the >= >= = Assign If 0.15 15% the >= discount 1000 >=13000 disc = Assign 5% 0.05 to the discount Fig 12.13 Example of the IF–THEN–ELSE statement Case Else Other wise Nested e IF–THEN–EL SE code in Example (CASE) 3 determines whether disc the No discount on the 0%, 5%, 10% or amount of 15%. e sales entered discount in cell amount is G10 in G12 cell and (Fig the amount 12.14). e due Case is calculated placed statement is and used in End can become ELSE confusing statements. e with syntax too for many the Select of case Range(“G12”).Value since discount Case statement is: Case amount due (1 and place - in disc)*saleamt cell G15 Sub Condition when Condition = value_1 when Condition = value_2 when Condition = value_3 Else Code cases End the value_3 Code Case = G12 value_2 Code Case disc value_1 Code Case cell Range(“G15”).Value End Case in = IF– THEN– Calculate Select statement placed Place it 0 is End cell = discount are to execute when all the other False Select Example 3 Fig 12.14 Example of using a Case statement Private Sub CommandButton1_Click() Loops Dim saleamt, Declare two saleamt Round disc As Y ou variables can use dimensional = (Range Double (“G10”) .Value a single range loop of to cycle cells. is through means one a one- row or one column. 289 12 Programming Example list of 4 is items with used after Visual to a Basic for calculate 10% Applications the discount updated is cost of applied. e a Cells(cost, 2).Value code * 3).Value = Cells(cost, 0.9 Calculate 90% of the value and place it in the next column works as follows: cost ◆ e While loop starts from row 2, column 2 (cell Go ◆ Checks if it is a blank cell, which is denoted by = cost + 1 B2). to the next row “” Loop (contains ‘Shirt ’ for the rst cycle). Return ◆ It takes the value in row 2 column 2 (cell End is the is then cost is the ◆ in Cycles by same the to Returns as items which is calculating it from the next row in to the top 10% of the blouse, and 90% of cost. e in column loop the Do While the the item Sub cost. and cost is 3. (or column B) row. to check cost goes 2 of updated column variable empty . T akes the calculates but the is and row one to item same the adding the the subtracting placed ◆ of to B2), which for if row through the the cell for 3, column loop 2 again. Fig 12.15 Example of loop before the Command Button is clicked Example 4 Private Dim cost Declare cost Star t Do Sub at As variable = Double cost 2 the first While The While CommandButton1_Click() item in the list (Shir t) Cells(cost, cell is not 2) <> “” empty Fig 12.16 Example of loop after the Command Button is clicked Questions 1 Create a Command Button that will display your 4 name in a dialogue box when Use is 2 the Case statement to output whether secondar y or ter tiar y level a student clicked. Create a Command Button that, when clicked, will display at age primar y, based on the entered. a message if the data stored in cell D5 is equal to 10. 5 3 Modify ◆ if the there code are in Example more than 4 2 as follows: passes at Grade a II, ' Well 15% if there output ◆ add are number Plaque’ . 29 0 fewer "Good the is cost of a list of than 3 passes at Grade of greater passes than 6, for all then grades. III, If ve drinks after applied. Conver t each code. Be of the sure following sets of to: then ◆ include comments ◆ declare all ◆ place ◆ include in the program work" number is tax updated done' VBA ◆ the then 6 output Calculate variables the output ‘Prize and the data in separate appropriate cells indentation. pseudocode to 12.2 a 7 Pseudocode: Consider the in VBA code: calculate_age Private Input following VBA Writing Sub CommandButton1_ thisyear Click() Input birthyear age thisyear IF = age THEN ELSE < – Dim amount As Double Dim interest As Dim years Integer Dim payment birthyear Double 13 output “Millee output is “Millee is a As teen” not a As Double teen” amount = (Range(“C2”).Value) ENDIF interest = Range(“C3”).Value b Pseudocode: output number = WHILE (number years numbers 1 <= 3) DO = Range(“C4”).Value payment = years 12, * PMT(interest Range(“C5”).Value BEGIN number Output = number “the + number End 1 is”, / 12, -amount) = payment Sub number a List the names b List the cells of the variables in the code. ENDWHILE Output “out of that are used to store data in a loop” spreadsheet. c Pseudocode: a determine whether State c used teenager age = FOR integer age Output = You d 13 “You to 19 are a the in DO the teenager” at grid write ENDFOR this now repay name of the Excel function that is code. wish 8.5% the of to borrow per cells data annum and in the use $50,000.00 for the 7 years. code appropriate in and Copy C to cells. d Pseudocode: total = 0 count = 0 average = average of exam marks A B C D 1 2 0 3 OUTPUT ‘Enter a mark’ 4 INPUT mark WHILE (mark 5 is not equal to total = total + mark count = count + 1 ‘Enter a mark’ OUTPUT INPUT -1) mark ENDWHILE IF count THEN = 0 DISPLAY ‘No marks entered’ ELSE Average = total/count DISPLAY average END 291 Appendix Appendix 1 Group or individual SBA Information Technolog y School-Based If Assessment you for e Information Assessment requir ing Technolog y (SBA) the use (I T ) compr ises of an database, integrated spreadsheet project and sof tware. It also invol ves the web page using free online web page how your word-processing sof tware. It is you intend for design will be expor ted you have expected meet as among most or al l of the SBA should skills project also invol ve and the abilit y to w r ite a shor t language to use is expected to be designed and administered by the IT to by so 2 of SBA, but the the fth SBA allow. Interim year can is be deadlines spent the within should make ideas idea to components. Data from one all be used to complete set if is completed is or for each more others. e determined by may var y each year. e SBA is group way on the using guidelines provided of of teacher the should project. applic ation It areas provide will be you based suggested the in which project marked the with the sy llabus. e project of the and be per formed in the by c an do, through become how tasks descr iption of expected teacher you for copy 292 to see each idea of expected also It is scheme read the to the results provide exactl y how to the the wel l. SBA stored on times are your ve your so useful to set up an online the group can collaborate progress on through the the SBA. It SBA is also individually a so are familiar with the project. member can make suggestions and each other about suitable methods to or complete a task and to troubleshoot areas. your data description of the project to decide where the of data needed, such birth, items and as so names, on. Start to out the most suitable layout for the data. en or in data using in the the most application suitable indicated application in the based project on the a folder multiple for your folders SBA for les. Y ou each may component want so to that your to you be also keep be an memor y so that through a good electronic stic k. Make sure to description will awarded read organised. have label of includes SBAs named each and most your recent document your name to may document D2 teacher one. with for will want the know D1 with or that review, and appropriately quickly. Y ou submission, then you ever y names. Remember many document feedback name that members’ last are cr iter ia is you var ious you will would and project tasks teacher. Y our marking that the description. expected the when marks It instr uctions you and has applic ation. complete impor tant as se veral what applic ations, provide task. mark to the may c an your are with leader, as Projects compr ise recommended descr iption familiar you using the group the work Read be of members start. Gather create to be itself the Ty pes should will the Create in arrange syllabus. the one under group, then components order in on on the type Y our a ever yone also members each from problem work teacher to who that would addresses, dates and SBA schedules to SBA entire be the Use can sure work Prepar ing four the will teacher. working earlier be tasks. Y ou teac her. mainly started through assigned determine that approach Term the using learn school working been and share at SBA complete some program determined to some that programming e plan these good a a that to problem-sol ving of make sof tware forum applic ations. e aspect own, then of description. It data your own. well or on word- to a working responsible S chool-Based If processing are guidelines to second which your so short your group teacher having help start for a you the Draft draft 1 so each to get name of your that submission or is both the Appendix Keep to backup copies of yourself. Keeping have to start anything your your backups project happens work to will again your at all times mean from that the or email you do beginning it not if Have to a make may It is best teacher with to in meet order time. Failure that fail you the to forfeit your the for teacher interim the SBA complete 25% subject. If a of to your section be set by completed submit nal the mark means processing, web page is SBA for as be sketch cannot of progress. Once design, problem solving – should still of page the incomplete sections contents documents if merge to other – this people your nal in times errors to English document and few correct possible, people of a SBA, you documents and their teachers, the should give or workplace. include created your by design web page can be created using a word processor a free online web page software. Remember that it may limited a help layout you you or have if you do something entered data not have web a to to indicate in a your continue to keep your teacher progress. L et your teacher page one the layout of your data and web page. If a word processor is being and so an where you or the group or in a at the that end separate of the the design of the word-processed document. web page builder is used, then paste hyperlink accuracy need to the online web page on the last feedback on. Make may created online of of your the word-processed document. However, any screenshots in case the web page has not been eort published show recommended informed include calculations, tables, queries is suitable provide the it is document page to the your submit the your about of mail of documents or If format of the part all worthmarks. teacher le, a is formatting. Ask used, then Y our it review merging. possibly is still table member (database, spreadsheet, incomplete, you marking the primar y, secondar y or your group perform submission Y our programming) a example, and e on SBA and for your Web word any critique deadlines and to regenerate les! or suggestions. If want tweak Working friend assistance so that the moderator can still review the or design. what stage you have reached. It Tr y to meet draft submission deadlines – is important number your submission ready your teacher. e for sending or that you place your candidate have delivering near the top of the web page as a form of to identication. preliminar y provided is before any mark along feedback should be with is used for an to that that you have your the is to to for may not provide details of the part adjust of your review. Ask need been you submission. is important tr y resubmitting tasks marks intention may marks the your based be process on Spreadsheet or and work teacher with a awarded. preliminar y assistance awarded with about needed this is start to data used complete the to case for planning Consider any the Usually, the the in your tasks your your in spreadsheet the SBA other will applications. If assignment, then spreadsheet be model is an early necessar y. following: mark ◆ W hat is the best way to organise the data using one scheme. or Word Y our be more ◆ W hat ◆ How ◆ W hat spreadsheets? suitable row and column titles are needed? processing word-processing developed with the task and overall web page theme of design the marking to incorporate criteria. the requirements project based data items are required in each sheet? should functions and formulae should be used for in the mind. Tr y many on the ◆ calculations? W hich values addresses in can be referenced functions and by using absolute formulae? 293 Appendix ◆ For any criteria advanced should resulting data lter be be or pivot used, and table where tasks, what should the to the placement report should be How should features textual such merging as data be formatted bold, italic, use of (for How numerical borders and Problem data be formatted collaborative or currency and number type of chart(s) should be used, what placed to create them, and where should of (on the other same sheet as the data or as solution that and part of of for your database, then of the need required the to SBA this requires data will be that you used in rst your and/or the a report. design has its advantages SBA. However, if helps this you to seek the in are advice component. Tr y through you discussions and/or SBA this working of others to approach with your teacher to your group understands the of the problem. Create your import to the demonstrate sizes, or to not to be review. Y our accurate group perfect but at least have can guide teacher solution based on would have submitted. solution with the what one you you assignment. Alternatively, you to appropriate may more your data from the database. However, you your ability to eld construct names, suitable modify the design of your language selected by spreadsheet your teacher your test data the – test your solution thoroughly and record will data and output in the form of screenshots. tables types any errors arising from your tests until the working and solution eld the teacher towards Fix using program requirements Implement be the a management sections may for sheet)? assignment a and certainly algorithm. It create required they scope separate the calculations approach managing ensure If titles, data the Database all places)? necessar y be includes the of whilst is seen. at of (for alone, it W hat and solving component example, accounting ◆ orientation cells)? should decimal clear ly and example, A ◆ headings placed? subtitles, elds ◆ of and suitable output is reached. imported tables. Final Primar y keys appropriate your for design emphasise benet of necessar y elds database ultimately e are of in all should the then entr y design anyone who should tables. Ever y creation data good and form of assigned table part of created a form, queries forms and features will a be make clarity use of it for relationship, and sub-forms and to for reports. should the (your Note submissions that teacher PDF in the SBA marker). Consider of elds, the the form type and size of the SBA of the a group quer y appropriate required ever y for quer y labels and the database should be should saved produce using submitting folder save folders your with leader. Inside – Word solving according les to in the SBA. your this some your name folder or create the name four processing, Spreadsheet, Database, and program design. Save the les into folders. W ord If you have requirement, then layout important columns of since may the you should database should display information some not processing: secondar y an a be eld in a headings displayed document le), web (even page mail if and merge have it is nal a the as a primar y spreadsheet merged and or letters in folder. result. Attention ◆ 294 in to to data name. queries, reports the them need submitted colour, layout this to may be displayed. result, and Like IT must teacher ◆ Ever y place Create an work copy. Y ou for the being soft your requirements Problem font of format, or subfolders or all report or is narrowed properly. Adjustments Spreadsheet: S preadsheet used for folder as the All spreadsheet folder. If mail well. it is les the merge, then in same copy the le the that le was in this Appendix ◆ Database: it is the then ◆ same copy P roblem a should in the can of in and your was this database used for folder program dierent les as included in one with the the in this le. Again, if mail can could folder, as of the be SBA are por tal provided. for have shown information document. submitted as a le. a specic their on a the The sheet information essential since supplied it is used here to This can be identify your f or a Word provides the problem that You Algorithm are document will Source A code be statement was expected pseudocode for of of It no is where hard students drive grading been also used to can be a any email created will moderation. their with store safekeeping track to create created folders for to print folders can and chosen be to advisable student. ese for need re view. en or uploaded until A progress eac h component d ur ing the comp leti on of that chosen to the that for include par t of the programming written language in each submissions from of code or may type that wish list, so the chosen for over view by to that counts code for student should contain the the requirements of the SBA. Y ou coding flowchar ts segment folder the written copy is are theirSBA. e denition can SBAs is submissions Problem each have spreadsheet Cover for stick submissions samples there address submissions of the submission. email name the for memor y their S ince moderation, documents Y ou word-processed code merge, well. design: below. However, most program separate that le solving list be e le the number contain you your of the out do each not requirement, similar omit students! anything. Ever y e following requirements for the list to the mark provides an SBA. the teacher Trace using table test data Supply the output to test data that determine produced whether the the Requirements ◆ Word-processing have been per formed screenshots of the program showing SBA Documents which require with table formatting of data of text with working subscript, contents execution the correctly task(s) Submit Program for tasks entr y and superscript, tables, results fonts and different page layout line spacing, produced ◆ Y our teacher should inform you of the process Any two files, submitting your IT SBA. Y ou may be required to SBA, in attaching teacher it for which to the your case you email can zip the message. Be submission of your to meet folder guided before by mail your SBA. Any is ver y important your Web page design ◆ processing marks to for submission. Time received SBAs before must be allocated uploading the for nal A two of : merge logo table of and/or depicting contents, fillable the concept of project Defined areas navigational ◆ At ◆ on the links minimum, the CXC. two page and for content hyperlinks of following: link to web Appendix tables teacher’s ◆ deadline(s) and/or forms the Again, it inser ting/impor ting columns email ◆ your of : for a location within the page 2 ◆ link to an ◆ link to another email address Teacher guidelines for the School-Based Assessment (which Teachers are encouraged to use the following make sure that all the requirements for the or may page not exist) guidelines ◆ to may web link to user-created files students’ 295 Appendix A ◆ Spreadsheet/s maximum (e.g. create modify No ◆ the more of the data, ◆ block ◆ adding ◆ changing tasks spreadsheet; use Creation of on of (e.g. Also sor ting functions and and data) no tr y of ◆ THREE ◆ T WO eld to as cut, copy and paste records denitions. award more formatting bold, underline more and than 6 marks features italics; single such for as and/or layout justication; double than T WO superscript and/or subscript; font and font char ts tables or queries bullets and table, (using and numbering. files criteria from Appendix one such deleting document size; Databases or not spacing; types operations than THREE formulae ◆ major spreadsheet) requirements of two more than 3 one Guidelines for problem solving and prog ram design table) ◆ ONE calculation ◆ ONE form, within queries e showing a main general-prociency individual sub-form (e.g. to search for or previous ONE ◆ to to the next problem with grouping involving T WO of an project worth 90 marks. Students should follow the steps below in developing the or record) repor t, sor ting move consists a therefore record, SBA and and their solving and program design section of project. or THREE Teachers are advised to use the Assessment Criteria tables A ◆ Algorithm statement problem development (e.g. calculate the company ’s IPO, ◆ that defines you may average want salar y to of a employees) flowchar t found in marks for mark CSEC each the syllabus project. e alongside as a guide for allocating student ’s CSEC copy criteria project when online portal containing should be submitting the student ’s uploaded the with sample and/or projects pseudocode the the of to the provided by the Caribbean solution ® Examination Program ◆ Trace ◆ Program code implementation If ◆ listing compiled necessar y, you used produce from as showing free the the provided of In mark devising test the data trace output a Dene that table are certain tasks conrming instead list of of that that the manually skills therefore mark should be 1 printout that should scheme, remember cannot Specify tr ying candidate used correcting cannot not be be Find words! veried included that verify, such by in Here is problem objectives to a the sample 3 allocating marks in your candidate’s SBA use ◆ Find 296 of a spellchecker and Replace using user: steps: state what the type you of are person program. output: from Explain and this this variable Specify the desired is, you Again, write W hat kind program? names and a of Y ou brief output can are write description of input: can Since specify meaningful of each you what know the variable what input names the should and a be. brief one. for: 4 ◆ six one. output scheme. and desired description Avoid requires accomplish be expecting each Replace mark problem meaningful moderator, and your the will Specify you there as and the Dening 2 you ). to scheme your (CXC your errors who SBA Council table Specify the the input necessar y desired go processing: through output? in W hat order for processing it to should provide the Appendix Design the your program code is {Prompt is second stage consists of two Design begin details to using write IPO your charts algorithm or owcharts: using en for above will be used as a guide a when the you start Do you a structured design walkthrough: Y ou should go to and be check see if anything has been omitted corrected. Y ou the logic of your can also use a trace and document is where starts. It consists 1 the to Select the that actually prompts the user your code, it conditional is best to statements include and the of actual three appropriate you will be writing main of the the the order 1 by your to the language: For syntax: the programming be included anywhere in the code to logic of some sections. test a program there are three things you desk-checking: making sure Manually its logic go through the works. Debug the program: Use a compiler or interpreter language detect Y ou can start writing the any programming errors. en locate and or algorithm. Most a particular syntax these errors. program Test the program with real-world data: After you programming make have can teacher. owchart languages code. However, your 3 the the do: correct Follow of program Per form to chosen purpose program steps: programming using the program 2 from write before explain program 2 code algorithm. must stage SBA a table In is on or Test Code typed through clarify needs to be program. comments the can as writing loops 2 number} such number. comments your a comment pseudocode. en, as is for example, a steps: line 1 doing. For which you sure that the program is correct, you must test must the program by providing it with input and seeing follow. what 3 Put comments in programming is is when your code you code: the write First, write purpose of comments your to the output is. in program. explain what Make your sure that program you to take include screenshots with your of the output of submissions. 297 A n s we r s Topic 1 data, manipulate/process data, produce storing the 3 hardware IPOS data a central control c arithmetic input while an 7 an 1 2 accept device gets output of unit. data device out operating logic into gets the a computer processed 2 computer. system a software communication 3 technolog y. 1.2 input device b touchpad c biometrics d scanner e direct f optical g turnaround a manual b remote or 1 touchscreen 2 data entr y mark (DDE) device recognition virtual 1 (OMR) 3 entr y 1 2 3 devices, printing devices and audio 2 b printer 3 c impact d thermal e 3D f earbuds. b online c online. a import b le a JPEG b MPEG 3 c MP3. 4 dot-matrix printer 1 to complete as possible processing instructions as b specialised c integrated Google a random-access b read-only c hybrid presentation memor y memor y (RAM) 1 (ROM) hardware b hardware c both. 1.5 memor y 3 as 4 ash 5 Advantages: users at can any time or (hard drive), optical disks, drives multiple the users data can time data they of 1 to from have access make on anywhere Internet being hardware softwareworks 298 computer mainframes c anembeddedsystemor embedded device. businesses amounts primar y 3 access. batter y could cartridge be may printer, the properly dead after serial b sequential c direct d index and how all other balance or on the due amount of date or modify data is greater ow than 0 rate, light. 3.1 upload b download. paging not be the cartridge or the ink correct may may not be applicable or appropriate or network local area network c wireless local area network d metropolitan area network. 5 peer-to-peer 6 star, bus 7 hotspot 8 computers and network ring a simplex b half-duplex c full a cable b wireless. duplex. intranet be dr y Topic in 3.2 electronic for the or user. 2 a cost- information as (email), uploading web, le data, internet transfer analogue between the sends data verication: sectors a 10am b 300 c 3, 4 d 100233. on (or any any 5 a to detect hard disk time number days when or bad between greater errors occur. 3 memor y 8am than and 4pm) 4 the provides a broadband 2G, 3G of 250 posts video a chat, browsing newsgroups. digital and signals the to Internet dierent it of devices that can a with a dedicated network. or 4G-L TE of text or picture entries; vlog: entries 5 Hypertext 6 Voice over Markup IP be router computer to or modem to number to the b blog: the connected expands connection errors. and telephone from data, relay protocol converts devices a d prevent networks ser vices b c to cellular) and b commodity (or communication area 10 one systems, mobile personal wide 1 validation: or update access a the or and containing a 2.2 bad store les sequential. connected data or printers 2.1 data a elds le 4 commodity. 1 elds and data 3 9 prolonged cartridge. information Topic sheet, microlm. key a and accessed, deleted, of records the 1.11 accurate, timely, complete, appropriate 3 the records help of related temperature, pressure, liquid interface. b is of 2 pointers e corrupted. control user and 1.10 data collection records proximity sub-menus 2 updates; 1.6 to a 2.5 eective same their once risk to Topic 1 2 Topic and personal Topic cards access Concerns: stolen at is collection downloading storage memor y a if storage media document options a the le is le or graphical the data 1 2 b e or 2.4 A Topic or software. windows, icons, menus for backup software, PowerPoint a installed ash Slides, Microsoft use. 2 bit magnetic or 1.9 e choice computer Slides custom-written many document, multiple sheet, handheld software software. quickly memor y. 2 software Docs, Sheets a Topic turnaround large PNG custom-written Topic 1.4 secondar y 2 compression. or copy copy. elds download a too soft or or 1.8 a hard b record real-time printer printer 1 1 or 2.3 a Topic batch 1 pixel Topic 1 lotter y 1.7 b 1 or Topic 2 control. a Topic systems: memor y. Google devices 2 LINUX, UNIX, operating 365 1.3 display mobile a Topic Topic systems: OS; iOS, Android booting document. data operating a Topic a questions b Topic 1 and computer Apple 3 unit topic W indows, Mac results unit b Topic or results processing information 6 and storage cycle b An of 2 and and 5 end 1.1 input, output, processing 2 4 to Language ( VoIP) (HTML) posts Answers Topic 1 4.1 public external: natural natural disasters: phenomena volcanoes), power activities that computer internal: no 3 other on target and spikes buildings or or rooms protection of hardware programs from with or backup and/or procedures, 1 a data computer c security a Deliberate b Accidental c Cyber threat d Cyber security. data not 1 a be security 2 threat. fraud is is distribute messages that to the nancial use of the use of trick a unauthorised industrial c electronic d denial-of-ser vice b even lost. Saves into and needed thef t to other is 2 3 steal personal access, single (DOS) 2 3 become a les regular that are no 2 text existing another text – over a for cabinets power c lock to 3 the persons computer supply desks and (UPS) or limit maintain document; access + by using required the 1, CTRL apply it word replace Pages the the + 2, CTRL formatting saves to time replace parts of + 4 from one set to 17 4 shows part 22 of 35 will breaks your A 4.4 manually or poor the or of creation incorrect furniture using poor too jobs, retraining or of posture dierent 5 jobs it. Disadvantage: words you you the the will use can document next want a In when using screens be in to end use an of odd even used is dierent lighting, glare from) the or long being too periods, close to give be appears more database, network 2 Computer assistance media and support directly specialists systems specialists to at footer page is in computer users; with or mail signature. Combine into one Heading of Documents document 1 or 2, place contents contents is to be list. only or the entire list heading to be sent having to to many retype allows you merge, saving at the you breaks have people; letters to choose unnecessar y and a for of text bottom the same be a of footnotes a text repeated and is A column current rows; useful source, select or the select creates Print entire 4 collated page and multiple a page in the are Topic all a is added column; a row. 3 and to or row the is left added data and email box (eld message next or to the heading at records. size, paper hard copy Preview would 2 (prints the (prints and so all source of shows look if it your on page copies of layout screen were how the printed. or document or document, selected in order) page pages or 1, then all of on) 5.9 Paper-based forms: Advantages: don’t complete, can may both while varies organising or the categor y document, single grouped page write enter the Online a soft be like need data to aligning right above of or access text. the below 2 a Internet distributed a in access a to face-to-face class. Disadvantages: incorrect information, need analyse users to re- it. forms: Advantages: from in for the errors. 5.8 3 page. Dierences: reference retype typing document, printer environment footers to orientation set bottom have introduce data top) while break. orientation about not document landscape the do saves copy, data paper, can can the Rich be be distributed downloaded specic elds. Disadvantage: 2 4 as envelopes to Print 5.3 table 3 save password; digital table merge 2 page. another social not margins, paper formatting section margins information can A provide communicate to the 1 administrators or numbers analysed, captures Topic 4.5 1 the new 1 (or screen. using letters by data blank the 1 Similarities: a a a words. replace section if portrait have footnote for time record, select you that to Y ou 6 document page footnote found equipment computer far new for a spelt 5.7 5 document. automation paste page the personalises Topic and page if use apply generate the include possibly of pages. sur veillance. to 1 5 searching other characters which Section or document; nal; are dictionar y ; alternative information where and update Topic the text. another mark the usage 2 duplicate 5.2 of records placed the elsewhere. a words lename. usually the lename create that given printing. to and uninterruptible Topic an to or headings cursor specic may true. b with drag Advantage: true a you as a 5.6 Select the a the cut, and 2 e skills resaves allows the 1 New or combine e d reproof to 2 applied a 2 d quickly 2 copy Selective 1 of games document; document to 5.5 1 letters, labels to 1 Topic bank document. your of editing; 3 false Topic restrict ensure suggest mark 2 false computers blank saved copy 3 5 longer a questions funds, saves CTRL or interactive a will read-only ; account. viewing/printing and create will according 2 c d 3 can topic Count. spellcheck c b logs or Word A b Topic and cards automatically of Changes thesaurus basis. b Comment 3 false authorised a As to contain updates Track c a a to is business’s retrieves Highlight 4 attack, multiple. damaged, corrupted spellcheck b correctly (POS) automatically balance, transferring time, or mouse eavesdropping, multiple on the gives Save entering systems and email espionage, multiple and content end 5.4 a Topic rst for can terminals simulations Save systems 4.3 Files share point-of-sale money online document identity information b a to at credit/debit that bank Open b 6 1 specialists 5.1 a accounts; websites computerised card access computer users information; of so bills training information. is use unauthorised details. Topic inventor y ; checking Topic modication credit used computer swiped paying 3 Phishing the 2 to creates personal 1 statements Computer to readers transferred security propaganda b Topic focus computer 2 Barcode 4.2 and media specialists resolving 4.6 update 1 Topic social and others. linked systems b support d software, no ex-employee computer with Topic error, no or troubleshooting problems; terrorist systems. anti-virus 2 and (hurricanes, earthquakes, surges employee removed oods to not type of ever yone and data is for online to form. text: users can paragraphs. P lain amount of type text: multiple users type limited text. columns the 299 Answers b to Combo type in select 3 end of box: topic select questions from list of choices information. Drop-down from list of list: 4 or only choices. a column Topic b cell 1 c row. iv, v, ii, vi, iii, i Topic Topic 1 6.1 1 web 2 HTML 7.2 A spreadsheet of browser multiple is also a workbook that consists 2 7.5 a sorting b AutoFilter c Advanced d pivot a Filter table. i worksheets. Day 3 Google (Hypertext Chrome, Microsof t Internet Apple 4 type Markup Explorer, Mozilla 2 Language) Formulae: 3 URL (web address) or use a search 4 A website 6 dynamic consists of one or more web Location Wednesday $10.00 Bench ursday $13.00 Café Friday $14.00 to save Desk Monday $15.00 Lunchroom Tuesday $25.00 Desk =(E6-E4)*1, =E3*5%, =H2/3 time having to select the cells repeatedly engine 5 Amount =SUM(B1:G4), =MAX(E4:E6), =MIN(C1:C10), =AVERAGE(B1:C9). Edge, Microsoft Firefox, Opera or Safari the Functions: pages. a Merge b C5 c D, E d 1 and Center ii website or F Day 7 a shopping or b mobile c community e-commerce or Amount Friday 8 e building or social content, organisation, number security networking. of web i features Topic 1 C3:C6 g SUM logo 2 3 or the website, web company a Homepage b Sensible A Y ou are > is part a of either > Garden hyper link the > j Seed lings i yes ii yes iii yes arrangement. web directed e the F lowers that jumps to a page. to another web page or iv yes v yes data in width the of column the is too narrow for location within the current web page, or Lunchroom $13.00 Café Tuesday $25.00 Desk Wednesday $10.00 Bench Day cell b a $15.00 ursday iii MAX iii name, name suggested bookmark page, blog Monday MIN ii of dierent 4 i 6.2 name Amount a $10.00 Bench ursday $13.00 Café Tuesday $25.00 Desk Friday $14.00 Desk Monday $15.00 Lunchroom i to document. Topic 1 Topic email 2 web address page sizes and your own to edit text the contact 3 to all too check audio that all Topic 1 the sure 3 30 0 the or it is displaying and ability colour of name or add 4 F6*CHARITY option 5 right-click upload Entire a Maps business; to add a 6 well, e.g. that correctly, text background is in colours and email are video are playing addresses link to the check are that valid; make homepage or that page appropriate page $13.00 Café Friday $14.00 Desk ii on Day cell or E2, select Select Insert column E and and click select Amount Location Wednesday $10.00 Bench Café $25.00 Desk a =MIN(D3:D6) Friday $14.00 Desk b =AVG(E3:E6) c =COUNT A(A3:A6) C D the or same range – in use =COUNT(D3:D6) the to same range in – use A, B or Topic 1 Count columns 7.6 chart 2 An cells 9 =IF(G4<E4,A4,G4) 10 25, 81, 61, Latin 11 a E5 b D6 c D5 d D5 can that I6 as is the title: top the of Topic c column/row 1 d =A1+A2 e =A1-A2 f WHAT–IF , forecasting g Microsoft a =B4+C4 b =B4*2 super/subscript; c =C4/3 border d =C4-B4 a plot Currency, percentage, comma, increase/ decrease b Excel c wrap decimal text, merge include and centre cells, horizontal/vertical in alignment the cell style, size, bold, italics, underline, pattern colour cell; A column chart indent; colour text; visual impact than the 5 A your on sheet data which on the dates the data the same contains but the is exists shown axis: a chart on and a the the x-axis; salespersons. Value charted include range at identies horizontal being examples series: (or bar) two shows of on the numbers data and selected or the chart more is useful similar percentage of for items. A the pie wedges in chart. legend one located chart. comparing orientation, increase/decrease font 4 places is chart heading y-axis; the to charted years. Data 7.4 a identies vertical column/row chart chart. Categor y being axis: b greater worksheet. Chart examples spreadsheet a data. A attached separate 3 data a make embedded page 8 and A numbers. G. =IF(G3<30,“CANCEL ”,“”) I3 COUNT A columns 7 payroll ursday corner =E4*D4 column for 7.1 statements, invoices or left-hand I8 $13.00 are sure check top cell Bench Tuesday the check the $10.00 ursday animations, correctly ; Location Wednesday Insert for hyperlink; or in active =F4*10% types, page, etc. working is the =D4*E4 to Google box shows 3 font video; your subscription that change or integrate location budgets, nancial 2 to bright each orphan image; position pages titles 5 to graphics not alignment; background form make correct 4 the 2 password graphics, pictures background navigate and designs, options Amount 7.3 that 6.3 1 Location Wednesday Day open Desk right f h $14.00 left ii pages or Location 2 set of is not data necessar y being since plotted. there is only to Answers Topic 1 7.7 b Advantage: charts the that you or have a hard or uses paper, which may Topic soft to be use no view copy your them them in data away to case costs the need money you damage data to or and if you after wards print or from lose so the printing 2 contributes are then Customer: not there c L ou d Pocket and e 4 a Athlete b Fees Payroll c 2 f SUM d Athlete and Division table: AthleteID, Division Athlete table: Code f Code PRICES h It A4:A12 d e to separate from the division cannot linked used be to i Y es, this has deleted this many since athlete athletes. there categor y. e removed/deleted cell. 1 are athletes athletes must deleted from 8.1 1 telephone 2 an book, dictionar y electronic librar y, travel or recipe agency book. or k Under database b a spreadsheet into c a word view 1 processor. 8.2 2 last and would rst be FirstName to or ID 5 a text b is should to but use for h; foreign are a ProductID key : mainly for key : based on a of you check box and value Topic 1 2 and 3 in elds a ascending or Product b Description c Cost < d Cost <= and a Product b Description c Discount and = top e Y/N 3 f g h text i text incorrectly & “ ” & “ & “ spelling a NewCost:[Cost]*1.10 1 to 12); Male?: (Boolean); you are Since in the may an you Y/N of the or birth: of 1 as character Boolean (Y says may have with to let more the the than same one rst database Order (1:M) Order (1:M); make Product and the creates application in a an in copy existing included all the required. lengths; can to break down appropriate be linked; elds; give the tables sure the design stores and retrieves correctly. that contain should many unrelated contain duplicate data; data; tables elds of blank that elds contain data. 9.1 2 I 3 IPO = phase input, P charts input = identify into the true b false c false d true 2 name A stores 3 e values values do in a not string d COUNT . d Boolean e string a year b height c mobile_num Cost, d day numbers e blood_type 5 8.7 formatted like a table with columns. First, Last Q uantity (Cost is and and and TOT AL currency); Discount b First and c First (sorted d TOT AL e Order f 3 Description TOT AL Last are the in text; are can Y es/No also or grouping automatically Cost are COST COST is – needed to convert outputs. with descending Februar y the program to work or or (or can for a change while the constant. text text. night) be Boolean. elds. Topic 1 a the order 9.3 REPEAT count b COST Report for variable real it data change c since data desired phase output with. [QTY ]*[Cost] MAX and the = true variable c rows implementation 9.2 a integer Tabular; and processing, O iii, v, i, ii, iv e [cost] 4 grouping); and from opened names. a 8.3 Customer tables b a key. how MIN name, it create be have is eld SUM person data method. addresses a a of can paste you that b Topic 1 and algorithm number, months adult) best primar y of Y/N, size Adult: family be Month $ ” & eld Deduction:[Cost]*.10 text, 15; cost: cost c number. sure 1 , ” &[F irstname] b 4 and adequate Tables Topic [Lastname] date numbers To Topic text text, 15; bottom 4 Total AutoNumber copy Discount a the Have data 8.6 2 (using to ‘Y ’ number (Boolean) a which another copy make that Order d 2 3 list Cost and [description] FirstName: types table. 1 Topic and a 8.9 To the c and names, data calculation eld. is eld. application. Importing meaningful table. Design database saving from the think data 3 text LastName raw 3 c a eld your ordering a [Lastname]& a, b enter Fees 8.5 b or to database enter into text Topic your to [Firstname] c you 4 form PR- f performed. Unless text refer more d used Use the can use candidate allows it LastName, to eld allows 3 CID. e; are created be as better view descriptions 2 1 Relation: 1 names each is information a j 6 it key is and types calculations primar y then key : data it such a, b, c composite Numeric where but names key : to lastname, rstname. ID CustomerID primar y g; 4 and refer appropriate ‘identication’; meaningful 3 could more data names Datasheet and database, table, record, eld 13 8.4 a 1 1 2 Topic a Topic McJig online store 3 Figman elds; database. Topic j text the table. Topic of be 2 be questions September application another rst. can topic 8.8 Exporting current one of table: Topic e for are currency e c is or 4 b mark numeric Ann Diar y end Department, LastName, F irstName DaysWorked Code worksheet a LastName 1:M; the 3 d g of Order: c MAX exclamation PR_ID; Department a name Product: b it. 7.8 the CID; CID+PR-ID others or copy. Disadvantages: environmental going can print distribute data to the should you computer that 1 so Y ou to FOR count c IF = (count (count = total THEN = count - 2) UNTIL 25 = count = 1 * count display to 20) DO 5 * 5 count 3 01 Answers 2 to end a L oop A: b L oop B: of topic questions Topic REPEAT 1 3 9.4 3 WHILE. i Num ii Blu and Met b b iii BEGIN, INPU T , DISPLAY, END iv + v no i and 4 c operator ow line 5 d yes yes. + b =, <, <= AND a Decision i (word iii no v <> WHILE, IF , THEN, ELSE, arithmetic a Call a (word <> password) AND (count <= 3) T RUE Access T RUE FALSE Forgot password FALSE T RUE Forgot password FALSE FALSE Forgot password of conditions 3 = 6 2 7 See 2 = 2 × 2 × 2 = 8 conditions yes ii Read AGE below yes iii no iv yes. Topic c a input hours, total b input cost, amount, cash output = hours * = 10, O utput amount – OLD = cost, cash Cost = Cost × 9.6 1 Age + 15 total d 5 count <= 3 taxi operator b 4 3) T RUE number i <= password ’ Output e constant 2 no ‘Forgot password BEGIN iv password), (count 4 word = word DISPLAY, ENDWHILE b <> ‘Access’ and b Right: iii true a ii iii ii false e no iv i false d c no ii false c Process – Boolean false Stop a L eft: a a b 2 Mark Total Count Average 25 25 1 25.00 30 55 2 27.50 12 67 3 22.33 10 77 4 19.25 a INPUT mark1, mark2, mark3, mark4 −1 total = mark1 mark3 + mark + mark2 + 2 Has 4 arrived? OUTPUT mark = 65 await b mark = 71 Satisfactor y report; results!; await end of 82 Excellent results!; see your teacher; 0 3 total = WHILE (number await end of term report 0 Input <= 4) 3 Start word DO BEGIN INPUT mark Total = Total + Sum Count 0 2 2 3 2 4 6 5 6 6 mark word ENDWHILE = OK “page”? OUTPUT term report; mark = = of total; term mark end taxi e Total END Topic 10.1 c 1 mark = Oh Total L ow-level languages are machine-dependent 0 = Stop No and not easy to understand by humans. High- 0 level languages must be converted to machine REPEAT language UNTIL INPUT mark Total = (number OUTPUT Total = + Topic mark 1 4) END d 2 FOR Count = 1 a to INPUT mark Total = 4 are easier to understand by humans. 9.5 = Topic b Total and 1 c + d >= a sisters b age c passes =7 d weeks <= e pension f cheque 10.2 Syntax is a set programming = meaning 3 of rules when writing language. Semantics associated with the is a the words, symbols DO Total + <= and 18 2 punctuation Variable that declaration make means up the giving language. a new name mark and 4 a data type for the variable. ENDFOR OUTPUT 7 302 (Topic 9.5) T >= 3 65 so that they are easy to remember and Total = TRUE, F = <> understand cash FALSE A B NOT A NOT B A T T F F T AND B A T OR B (NOT A) T OR (garden) (town) B NOT (A F OR (town) B) NOT (A F AND (town) B) A F AND T F F T F T F F (town) T (garden) T F T T F F T T (garden) F (town) T (garden) F (town) F F T T F F T (garden) T T (garden) F (town) (garden) (NOT B) (town) (garden) Answers Topic 10.3 Topic 11.1 program listing 1 a end of topic questions 2 {Name, 1 to date and purpose of invalid program} 2 A translator converts program code to machine b invalid c invalid Program code. Examples are compilers, interpreters and Var assemblers. d Q2; number, count: integer; valid Begin 3 Debugging nds errors in program code and e valid {initialise corrects them. 2 identify and correct each error the variable individually ; number} save the program; compile the program again number Topic := 1; 10.4 While 1 a Testing tries to nd problems in your code. Topic (number <= 3) Do 11.2 Begin Debugging isolates and xes the problems. 1 a A compound statement: comprises two or {Increment b Black box testing is used to check that the more statements within Begin and count correct output of a module is produced keywords. A simple statement comprises the input. W hite box testing checks single := count accuracy of processing from input, b write by 1} 1; the number} instruction. Writeln(‘You the + a {Output from number End places the cursor immediately have entered’, after number); through ever y possible path through to the the text that is written on the screen. writeln End; output. prints the text on the screen then places the Writeln(‘out 2 Input values, recording expected and actual cursor at the beginning of the next of loop’); line. End. output. Ever y must be conditional tested at least branch once, and and loop follow c as := an is used in operator an to assignment check statement. = is equality. 3 many paths within each module and function 2 {Name, a date and purpose of Output with as program} possible. line 3 reliable, stable, easy to maintain, easy to Examples of values: 4, 5; 2, 2; −2, 4; 85 Program portable 4 = use or 0, 2.5. Fragment Fragment Var 1 2 Begin For Extra Topic line Extra Q3; age: integer; age := 13 to 19 Do line Writeln(‘You 10.5 are a Same 1 to allow others to maintain the application teenager’); if line the original allow programmer others to see is internal not available; and user 5 End. to details b of Output with 4 the application line 2 if the program updated, to or needs to be understand supposed to debugged what the = {Name, 55 code date and purpose of program} or is Fragment Fragment 1 2 Program doing Var do Q4; total, count, mark: integer; 3 a curly brackets b single Same {} line Same line average 30 quote ’ : real; 85 Begin 4 System documentation is written by c and d technical persons for technical persons and are practical answers concerned with how the program program does program do is concerned and how the with end what it is user supposed as to obser ve in parts a the and same {Initialise total := 0; variables} count := 0; b to Fragment 2 the makes mark the Topic what output works. User e documentation work is := 0; {Prompt to enter a mark} 11.3 Write(‘enter do. mark’); 1 5 a over view of the process and tasks, name(s) Readln(mark); {Name, date and purpose of While of the authors of the program, date that (mark <> -1) Do program} Begin program was created or modied or Program Calculate_age; {Add the mark and increment reviewed Var b overall system specication thisyear, birthyear, age : integer; how the requirements are the count} showing broken total := total + mark; count := count + 1; into Begin a set of interacting describing how acceptance which each test must be programs; plan test program unit describing satised plans before is the the tested; tests Writeln(‘enter {Prompt Write enter two this dates} year:’); Read(mark); End; {If system Readln( is to (‘Enter thisyear count were description explaining system can and cannot do; a then no marks birthyear:’); count = 0 what Then Readln(birthyear); the 0 entered} If functional = ); accepted Write(‘Enter c mark’); writeln(‘no marks installation entered’) document explaining how to install the {Calculate the age} {Else application and gicing suggestions how age := thisyear calculate Else to recover when from things go errors and wrong; basic problems to get explaining started manual with describing in simple the average} birthyear; begin average:= total/count; introductor y If manual the – terms system; system age < 13 Writeln(‘The how average is’, average); Then Writeln(‘A Else Writeln teen’) reference End; (‘Not a End. facilities teen’); available facilities to the can be user and used. how these End. 3 03 Answers Topic to end of topic questions 12.1 b 4 Private 1 add the Developer Sub CommandButton1_ tab Click() 2 submit, OK, Cancel or Dim 3 activeX 4 make Controls ’Name, age As Integer, message As clicking as a it by Mode is deselected of Private remove macro-enabled the Sub CommandButton1_ by = Range("G10").Value Click() highlighting. 'Place age Select Case in cell G10 Dim number, count As Integer workbook Case Topic purpose group Design age 5 and program String sure date Close Is >= age number 18 Do = While 1 number <= 3 12.2 message = "Tertiary" Case >= number = InputBox(“Enter 1 Private Sub CommandButton1_ Click() Dim message 'Type a As String message in cell Range(“J5”).Value 'Click command output message End button = Case >= Is message J5 MsgBox Is message Case End an 11 = "Primary" = "Nursery" ' Private Sub number & = = message in the “You + by 1 1 count have entered “ number MsgBox Output count Loop message 2 ‘Increment MsgBox Select “Information 0) ‘Output Range("G12").Value Sub integer”, Required”, count Else message to 16 "Secondary" G12 End “out of loop” Sub CommandButton1_ End Sub Click() c Dim info As Integer, message 5 As String info = 'Type If Range(“D5”).Value number info message = = in 10 cell D5 Then “Correct names A2 A6 to cost B2 B6 to of drinks in Private Cells of drings in Dim cells = Dim “Sorry!” Sub cost As = As age MsgBox CommandButton1_ Next cost If age For Click() message Sub CommandButton1_ Click() 'Type Private number!” Else: End 'Type End Integer Integer = 13 “You To are 19 a teenager” age Sub 2 d Range(“J15”).Value Do = 'Click command output message button cost eligible = > 4 “Well <> eligible < = cost + = * 1.15 Dim 1 Total Integer, Loop mark End String Sub = 3 “Good a Private Then = 0 Count = 0 Average Sub CommandButton1_ thisyear, As total As Count As Double, Message As = Integer, = 0 0 birthyear, While message this “Enter year thisyear String mark <> -1 age = InputBox(“Enter mark”, Integer MsgBox Click() As As CommandButton1_ mark Dim Integer, Integer, Total Do Sub As As Average Click() work” Dim Private CommandButton3_ Then mark result Sub Click() done!” 6 If 3).Value Cells(cost,2).Value Sub result 2) Private Cells(cost, to 3 If Cells(cost, “” message End While and = two a “Information Required”, If Then 0) dates, birth mark = -1 Message = “End day” of marks” InputBox(“Enter Else total = Range(“J8”). Value + Range(“J10”). this year”, “Information Total Required”, = Total Count Value + Range(“J12”).Value birthyear = add numbers in cells J8, your birth = mark Count + 1 InputBox(“Enter End ' + 2018) If year”, Loop J10, “Information J12 Required”, 0) If If total > 6 ‘Calculate Then the Count Message message = “Prize and age = thisyear = 0 Then age - = “ No marks = Total entered” birthyear Else If Plaque” age < 13 Then Average MsgBox Else: “A / Range(“C4”).Value message = MsgBox If Range(“J15”).Value = message 'Put End Sub answer in = cell J15 End If End Sub “Not a Average teen” 7 End If End Sub a amount, interest, years, payment b C2, C3, C4, C5 c PMT d Cell C2 contains 8.5%, C4 50,000, C3 contains 7, C4 contains contains =PMT(C3/12,C4*12,-C2). 304 Average Else “Sorry!” MsgBox End Count teen!” Index A C adding text 105 algorithms 231, 233 algorithm phase basic types data conditional and subroutines testing alignment phase 231 keywords and 256–7 constants 233 software software customised and software popular 7, 29 software packages specialised 29 operators 156, 252 66 17 problems backups bistable bits 37 systems devices 10 20 Blu-ray Bluetooth bookmarks broadband browsers bugs 140 67, 71 71, 72 networks 20 22, 25 64 95–6 congurations computer networks computer security 79–80 computer systems 34–5 computer vulnerability features of a charts 182 troubleshooting charts storage cables columns 181 problems 181–2 conditional 23–4 67 cabled interfaces 31 channels conditional 66 data ow transmission modes Communications 66–7 67 list 234, 264, structure 68 list Technolog y fraud linking 81–3 computer programs to updating 7 design control 233–4 cyber a page the text copyright (IPO) contents 123 headings 122 contents systems copying 246–51 the 122–3 selecting computer 248 structure 122 generating 7 list 123 56–7 105–6 87–8 security 79–80, 86–7 232 252–4 D problem denition problem solving 231 damage 231 data documentation programming languages programming with 270–1 260–1 Pascal 274–82 with Applications pseudocode a V isual ( VBA) Basic 283–91 235–44 program testing algorithms testing and 256–7 debugging a 80 8, 15, 19, 40–1 data logging data processing data security 80 data transfer 28 data validation data verication data-capture 266–7 techniques 268–9 writing 236–8 statements 248–9 contents 66 transmission running 236 statements IF-THEN-ELSE media for 36–7 statements IF-THEN 67 transmission charts 62 hardware 288–9 media wireless 15 238–9 95 of basic IF-THEN-ELSE 112–15 79 screen congurations branching IF-THEN 62 62–6 computer deleting charts stand-alone broadcast point-to-point programming 142–3 84 business bytes (BDs) 65 breadcrumbs 182 and 66 180–1 program 74 Disks 6 disadvantages charts operators 20 blogging bus 27 problems biometric data input-processing-output 10, 13 processing batter y (CPUs) and networked creating owcharts readers units charted algorithm 55, 97 barcode batch 91 86 banking 180–4 (CT ) B back charts direction 29 transmission devices 30 154 processing communication 30 software asynchronous references commerce 30 programs 86 arithmetic cell command-line software application software 157–8 central coaxial 29 of 154 cloud-based custom-written general-purpose integrated cell ranges sizing 85–6 22, 25 cell moving 253 6 advantages systems changing 107, 155, 170–1 application archives 234 67, 71 154 active 234 234 operator anti-virus audio cells 233 algorithms variables AND 231 234 statements media CD-ROMs statements implementation loops computers cabled direction how data of is importing 47–8 computer–user 262–5 interfaces 31–3 problems data 42–4 44 forms data 46–7 ow 66–7 represented data interpretation program 27–8 20–1 120–1 of coded associated data with 44 shared 44–5 305 Index proprietar y data spreadsheets storage data 81 property 154–5 21–5 queries protection 84 viruses copyright and network and 85–6 piracy cyber protection from nature protection from theft spreadsheets 86–7 databases 86 84–5 85 and disadvantages 192 calculated elds 217–19 217 with numbers 218–19 keys and foreign 196 tables entering data types problems a report creating a table entr y 203–4 types 194 terms systems and from name eld options importing move line save desktop 34–5 direct 82 direct data display le organisation entr y (DDE) devices 225 and paper a tables 15 database 225, 226 database functions in tables eld 217–18 searching 211 report and 118 and 195–6 223 drives DVDs transfer) sale embedded systems (EPOS) 13 57 35 86–7 110 entr y software 99–100 concerns errors and transmission eye 55 82–3 92 42, 50, 219 ethernet 104 a 42 errors 266–7, 286 hardware errors cables errors 42 42 67 69 problems 91 F 116–19 document bre 118 110–11 index 16 le sequential processing record 99 serial 26 22, 25 access 67 49 organisation le organisation 52–3 44 databases cables 51–2 28, 62 6, 21, 24 optic organisation direct 103 entr y le 122–3 printers licensing drivers of 97–8 104 downloading driver funds controllers extranets contents data instruction point 110 129 typefaces and embedded data 106 107 electronic 110 124–8 106 eavesdropping endnotes 105–6 108 commands tabs (electronic errors endnotes text electronic columns footers breaks dot-matrix as redo environmental 120 104 size of copying programming and printing double key les merge section 200–2 used screen 106 formatting entertainment comments footnotes table databases computer to 97 encr yption 103 protecting 203–4 a a 15 proofreading 194 to of orientation database 195 mathematical operators devices used 108 with teaching EF T documents and education 9 cursor and working 116 access the vs. save undo attacks systems commands paragraph 105 107–8 108 spacing moving 86–7 dictionar y Painter keyboard records retyping 107 indenting 267, 268–9 margins 219 a multiple printing specic denial-of-ser vice mail 193 primar y 213–14 and 106–7 Format 214–15, 216 headers length, description joining for text 104–5 105 fonts 220 112–15 queries eld text adding, deleting 209–10, 216 combining 193 properties 30 6 sorting adding 191 denitions editing 200–1 queries debugging creating management exporting 227 220–4 data elds in 194–9 data eld reversing features design creating in found 194 (DBMS) 70, 74–5 eld 10–12 data common database one 51–2 and 203–8 common database than e-mail alignment formats digitisers candidate, composite errors report deleting with elds capturing more relationships decr yption elds numbers E 210–11 calculated calculated a 193 searching 84 86, 97, 99, 191, 193, 227 advantages in text searching 171 sur veillance databases and using records security les elds 195 212–13 87–8 protecting for table 209 queries computer types database errors matching and sequential organisation le ser vers les 7 50 49–50 63 50–1 le Index combining les 120 le compression le types switching les forms add form a the labels template or 131 protect the content ash form a design graphics cards 23 statements symbols 248–9 hard disks hard drives hardware 246 health 110 home Painter formatting 107–8 the programs hubs output of Pascal Google 155–6, 170–1 Forms in full-duplex functions 130–5 131–2 arithmetic formulae data ow 160 AVERAGE operators 156 COUNT 161 58–9 57–8 40, 95 95 97–8 99 and 98–9 recreation and moral eects 93 entertainment 99–100 Information eects of skills Technolog y IT in the required printers devices (IT ) 7 workplace in 89 the 92–3 16 6, 8 advantages and disadvantages 12–14 140, 142-3 biometric I systems data entr y 10 (DDE) devices 10–12 32–3 identity manual theft 81 impact index statements printers devices devices 8–9 9 236–8 remote-control devices 9–10 statements touch-sensitive devices 9 16 charts 120–1 52–3 organisation Internet les 57 52 interfaces 33 70 2G, 3G indexed 31–3 improving le (IPO) 232 interfaces 108 sequential industr y input pointing input-processing-output indenting 161 control disadvantages enforcement medicine input 65 importing 66 160–1 and COUNTIF 95–6 inkjet 238–9 156–9, 160 COUNT A 90–2 73 IF-THEN-ELSE formulae and workplace 63 IF-THEN 152, 156–9 common used form systems 97 IT concerns pages hyperlinks icons llable arithmetic 84 stock forecasting business direct 130 a 31 hardware 280–2 spreadsheets creating with 96 110, 141 hotspots 103, 108 formatting formulae interfaces monitoring headers applications information 54 legal, ethical 6, 26, 42 devices an banking law 21, 24 hardware 247 66 21–2 commercial 249–51 statements up processing advantages ow 56–7 54 education data 54 55–6 information 13 80, 83 half-duplex 110, 141 Format 32 54 disadvantages 55 weather H 106–7 footnotes 33 41 81–3 57 system tablets hacking and supermarket 131 108–9 32 commodity processing care setting (GUIs) 33 windows for 131–2 a 55 payrolls interfaces as information systems libraries 32–3 menus 32 footers user 20 90 Forms icons the 131 conditions sequence forms create 233, 246 owchart (GB) village Google 22–3, 24 conditional fonts the 81 memor y owcharts folders of to controls replace nested gigabytes global properties abuse memor y ash control industr y pointers change and banking 164 G graphical form nancial 130 131 document or display 131 blank set 163–4 82 40–1 advantages VLOOKUP to controls controls customise tab of information 163 health content open SUM the misuse 162–3 RANK create espionage information 162 PMT Developer content nd to 162 MIN 121 industrial information 131 the the 86 130–5 content form databases 162 162 MAX and between applications add IF 120–1 protecting llable DATE 28 and advantages blogs, vlogs 4G-L TE and and 71, 72 disadvantages podcasts 76 74 3 07 Index broadband cable 71 medicine 71 expert connecting to creating web dial-up 71 the caches Internet protocols browsers Internet medical understanding addresses 72 main (MB) 72–4 73 menus job losses 89–90 joysticks keyboards 8, 12 keyboard move keypads commands the cursor used kilobytes devices phones 2G, 3G music (kB) 20 memor y) 19 and text interfaces ink 12, 14 musical 35, 36 laser law printers driver licensing 71, 72 printers line spacing network hubs 16 storage logic errors digital interface 21–3 logic operators congurations 252 289–90 magnetic mail tape merge selective using a mail manual merge margins master 125 Word to 125–6 devices and les 49 phishing network layouts cyber 86–7 64–5 printers operator security piracy pivot 16 Pascal rst processing operating system booting attacks tables software operators distribution 96 control 26 82 distribution pivot tables combinations operators of used databases operators in 211 searching 254 portrait printers tables 175 pivot tables 176 74 devices 9 orientation 16–17 177–8 pivot 33 pointing 176 177 17 pointers 252–5 34–5 15 podcasting 26 64 174–5 charts plotters control 277 274–5 94–5 two-dimensional pixels 26 hardware 8–9 27–8 program 6 computers modifying 7, 26 278–9 program networks devices frequency 252–3 a your Pascal 276 275 83, 87–8 pivot online perform 104 marketing personnel O 34 input personal and 66 and in one-dimensional merge Microsoft mail disadvantages stand-alone program program of 274 280–2 278 the peer-to-peer 21, 24 124–5, 127–8 mainframes and network NOT 64 compiler output 55 peripheral networked non-impact M networks 6, 62 the 275–6 280–1 140 payrolls systems 234, 239–44, 250–1, 264–5, paths program Pascal the writing 62–3 108 numbers punctuation structure 63 advantages of 239, 249 239–44, 250–1 networks 267 a running peer-to-peer 108 local loops 99 the two formatting conditions loops databases formatting compiling nding 14 108 274 dividing 83 84 104 statements nested 99 55–6 line 308 sizes Pascal N 16 enforcement libraries 104 16–17 90 sning saving orientation devices numbering paragraph L landscape 15 P paper instrument (MIDI) 17 devices printing packet 4G-L TE 6, 15–18 devices 31–2 character 105–6 piracy 104 outsourcing 8–9, 12 moving 234 (OMR) 253 devices audio 9 mobile mouse 8 keywords output page mobile to 106 orientation 48 microphones (OCR) 22 recognition operator display (magnetic microlm K mark OR 22–3 (read-only recognition) 13 19 33, 103 MICR disks optical 19 menu-driven J optical (random-access ROM 68–9 98 19 sticks memor y) recognition 11, 14 memor y RAM Internet systems 20 memor y memor y character 11–12, 13, 47 6, 19 hybrid 71, 72 optical 98–9 information megabytes 74 addresses intranets 70–1 74 memor y Internet web Internet pages 98 systems 104 Index troubleshooting printer problems 36–7 printing SBA 129 copies Print print range working 185 SBA documentation documenting code documentation the language SBA phase language 260 116–17 81 pseudocode 235–6 conditional 236–9 statements 236 the data (random-access real-time records processing recreation a relational research retraining injur y a 64 smart memor y) 19 program code to object errors errors S 96 vs. save 266–7 106 software 81 pivot in tables relative 247 156–9 into Excel 186–7 Excel rows 186–7 and columns 174–8 185 236 sorting le sorting 50–1 eld title 66 star a 7, 29–30 programs 7 software interfaces software piracy software 260 96 79, 81 31 83 7, 26 by more by one list eld 172 154–5 computers 63 64 234, 236–9, 247–9, 264 statements in Pascal statements in V isual Applications devices advantages and and 278–9 Basic ( VBA) management storage one 158–9 data networks stock than 155 statements 85–6 list 172 stand-alone applications addressing 171–2 a of values 90 software absolute locking types 15 software 171 and 164–5 6–7, 26, 42 code functions les protection software source dates 160–4 les printing ow proprietar y system as and 10–11, 14 computer and manipulating 23 application 170–1 and 154 sorting commercial 267 values 165–6 data concerns software formatting 80 smartboards 155 170 features linking accidental 141 cards heights 172–4 formatting labels 80 statements anti-virus 266 programming runtime 266 267 81–3 sequential data records functions 140 cards social source code sidebars row paste numbers formulae statements and simplex 37 and importing and organisation SIM 105 debugging save 95 70 running sales 91 89–90 text (read-only from (RSI) serial ltering format 262 sequential 9–10 development networks routers 252 295–6 12, 58 sequence devices strain semantics sensors 106 operators and retyping 50–1, 52–3 99–100 remote-control repetitive websites record SBA 296 110–11 security damage 49 for command ROM 27–8 and 155–6 fraud deliberate widths cut, copy 79–80 proprietar y key searching ring 19 49–50 primar y redo memor y) 295 73–4 breaks 172–3 155–6 142 engines 160 180–4 column 15 problems formulae 157 154, 157–8 charts 297 scheme 155 AutoFilter 297 173–4 170–1 arithmetic AutoFill 296 program for computer RAM solving Filter data alignment cells problem mark security R 293–4 the requirements section align 296 teachers search 239–44 problem for ScreenTip branching teacher design program monitor conditions Advanced 292–3 guidelines screens 292 297 the the SBA 116–19 propaganda sequential test 260–1 your 152–3, 154, 160, 167–9, 179 SBA document the design programming implementation nested and dene 260 294–5 data for program code 270–1 languages proofreading with guidelines and programming your 116–17 spreadsheets individual program programming proong 270 270 choosing or preparing 129 spreadsheets user 129 spellcheckers 292 submissions group Preview 9, 13 guidelines nal 129 program scanners for 287 96 media 6, 21 disadvantages 24–5 cloud-based local storage storage 23–4 21–3 30 9 Index stress 92 stylus uploading 9 USBs subroutines 234 user supermarket stock sur veillance 84 monitoring devices 58–9 hardware system utility check transmission 66 data type format errors 266–7 software 7, 26 107 terabytes visual 92 (TB) 20 testing algorithms testing programs theft 256–7 268–9, 286 43 printers printers 27 touch pads touch screens Changes transaction les transmission modes troubleshooting not monitor when device power is 37 36–7 information Command using 84–5 Button your the 286 VBA 286 editor 284–6 power supply systems 13 67 and pages 73, 74, 138, 141 and themes 142 139, 141, 147 designing a economy 140 footers 57–8 141 web page 63 68 replace 108–9 103–4 of 108 89 of IT in the 92 in the 92–3 and retraining concerns 89–90 90 92 worms 85 writing a 154, 160 program conditional 262 statements 264 264–5 program statements program structure sample 89 90–2 required jobs workplace concerns concerns skills loss 103 numbering looping 141–6 139–40 104–8 features social forecasting content (UPS) key text worksheets weather 106 nd IT pages 117 workplace W 80, 83 Count processing health 74 147–8 32 environmental program pages 19 eects 287 their 32 workplace program backgrounds uninterruptible 287–8 web transmission word and ( W indows, Icons, Menus stress web command types your web wireless page the voiceband U undo data your networks word 138 147–9 websites wireless Word and 11–12, 46 47 access 286 of page Pointers) editing voice-recognition 103 unauthorised 288–9 289–90 testing vlogs documents 283–4 284, 285–6 statements errors statements mobile 36 problems alternatives typefaces loops 37 or problems turnaround the saving respond on Button tab 285–6 66 problems turned printer edit 67 36 computer, laptop WIMP and websites web 65 windows Developer variables displaying 49 media 85–6 Applications 287–91 116, 117 transmission does 9 planning W i-Fi viruses 72–4 139 nalising 283 declaring devices 26 for the correcting 9, 13 use 99 conditional 9 touch-sensitive batter y Basic of a description 44 142 concepts 73, 138 categories 80, 85 Command time-sharing Track reality adding 16–17 42 images 9 websites check 141 141 and webcams 44 virtual ( VBA) (3D) 43 139 technolog y creating checks preventing 16 three-dimensional text web 233 memor y V isual 140 140 sidebars 42 virtual viruses 85 thermal bookmarks structure security 42–3 check verication 90 43 43 reasonableness telecommuting 310 check check variables planning check check presence 112–15 teleworking and organisation 43–4 check length T tabs 147 141 hyperlinks 42 digit consistency range tables headers 7, 26, 84 141 started navigation validation with 262 syntax 31–3 software V 84 synchronous layout getting interfaces utility 84 software general 142-3 with monitoring syntax control 28, 62 22–3 program 264 262 262–4 Information T echnology THIRD EDITION Oxford Information Technology for CSEC® , textbook, has Caribbean As well the as been updated to Secondar y Examination comprehensive School-Based application of knowledge and meet skills solving, for the this it a market leading requirements Cer ticate coverage, Assessment. With problem the the (CSEC®) provides focus course examination on the the latest syllabus. essential suppor t development provides and of students for and with the beyond. Oxford Information Technology for CSEC®: Explains the key concepts Contains practice exam-style Contains relevant coverage in School-Based students Online and questions of Assessment the most (SBA) and recent developments provides guidelines for teachers suppor t packed with extra practice material, along with 9780198437208 answers Is in Is clear Has full colour and fresh easy and Fur ther with to many illustrations to help understand up-to-date learning useful with content online with suppor t Caribbean examples at: www.oxfordsecondar y.com/9780198437161 FO R N S How to get in Y T H E 9780198437215 E LL W B A S U touch: IS B N 1 web www.oxfordsecondary.co.uk email schools.enquiries.uk@oup.com tel +44 (0)1536 452620 fax +44 (0)1865 313472 9 9 7 8 -0 -1 9 -8 4 3 7 1 6 -1 780198 437161