Copy of OUP - Information Technology for CSEC (1)

advertisement
Oxford
excellence
for
the
Caribbean
Information
T
echnology
THIRD
EDITION
FOR
THE
NEW
SYLL ABUS
with
Glenda
Ronald
Gay
Blades
online
support
Oxford
excellence
for
the
Caribbean
Information
T
echnology
THIRD
EDITION
Glenda
Gay
Ronald
Blades
3
Acknowledgements
3
The
for
Great
Clarendon
Street,
Oxford,
OX2
6DP,
United
publisher
and
permission
to
authors
use
would
like
photographs
to
and
thank
other
the
following
copyright
Kingdom
material:
Oxford
University
Press
is
a
department
of
the
University
of
Cover:
Jim
Arbogast/Photodisc/Getty
Images;
Oxford.
p9:
It
furthers
the
University’s
objective
of
excellence
in
Glenda
Immfocus
scholarship,
and
education
by
publishing
worldwide.
a
registered
trade
mark
of
Oxford
University
Press
in
the
in
certain
other
(L):
Federico
Wavebreak
Oxford
University
Press
moral
rights
of
the
authors
have
been
All
published
rights
in
Rostagno/Shutterstock;
p11
(L):
p17
(TL):
form
or
No
stored
by
(BL):
IB
part
of
this
publication
may
p26:
Shutterstock;
p31
in
a
retrieval
system,
or
any
means,
without
of
Oxford
University
by
licence
or
Press,
the
or
prior
as
permission
expressly
p21:
the
Rights
Rose
(BL):
under
terms
agreed
with
the
thanongsuk
rights
organization.
outside
the
scope
of
Enquiries
the
Department,
not
impose
should
be
Oxford
University
Press,
at
p23
p22:
(R):
p20:
OUP;
Carson/Shutterstock;
Bplanet/
v74/Shutterstock;
p29:
p34:
pixinoo/
Andrey_
p35:
DR-images/Shutterstock;
p39
(b):
p39
Coprid/Shutterstock;
(a):
p39
harakunno/Shutterstock;
p47
(L):
Sean
Locke
p39
(d):
jultud/
Photography/Shutterstock;
(R):
MARTYN
Patti
F.
CHILLMAID/SCIENCE
McConville
/
Alamy
Stock
PHOTO
Photo;
p55:
LIBRARY;
Juta/
p56:
Alice-photo/Shutterstock;
p68:
Anton
the
circulate
this
same
this
work
condition
in
any
on
other
any
form
and
you
acquirer
(T):
Valentin
Shutterstock;
p72
Library
Cataloguing
in
Publication
Data
p74:
silverkblackstock/Shutterstock;
(LTE):
Valkov/Shutterstock;
p72
Leszek
p75
(3G):
Lenscap
Nor
p72
(BR):
Rose
Oqbas/
p75
(BL):
Carson/Shutterstock;
p80:
Gal/Shutterstock;
(2G):
Photography/Shutterstock;
Kobusinski/Shutterstock;
Tepsuttinun/Shutterstock;
p85:
Data
Trial/Shutterstock;
sent
Shutterstock;
British
Caiaimage/
above.
must
must
(BR):
Chillmaid;
concerning
above
p75
You
F
appropriate
Foltin/Shutterstock;
address
Martyn
in
Shutterstock;
to
Hsvrs/
(MR):
permitted
p53:
reproduction
p17
p17
in
p47
reprographics
Gvictoria/
(R):
be
transmitted,
Shutterstock;
law,
Photo;
p19:
Photography/Shutterstock;
Shutterstock;
(c):
by
Stock
Images;
Topimages/Shutterstock;
writing
(R):
p11
Asharkyu/Shutterstock;
Media/Alamy
Edwards/Getty
Popov/Shutterstock;
any
(TL):
2019
reserved.
reproduced,
p10
Sonate/Shutterstock;
Tkachuk/Shutterstock;
asserted
p23
First
p23
RoSonic/Shutterstock;
2019
Sam
The
p32:
countries
iStockphoto;
©
Auxin/Shutterstock;
UK
Shutterstock;
and
p15:
studio/Shutterstock;
Oxford
p10
is
Gay;
research,
Rvlsoft/
p79:
Winai
Rawpixel.com/Shutterstock;
p86:
REDPIXEL.PL/Shutterstock;
available
p91
(T):
Whitemomo/Shutterstock;
Shutterstock;
p94
(TL):
p91
(B):
SpeedKingz/
Ronstik/Shutterstock;
p94
(TR):
978-0-19-843716-1
Sirtravelalot/Shutterstock;
1
3
5
7
9
10
8
6
4
2
p97:
used
in
the
production
of
this
book
is
a
ALPA
Andrey_Popov/Shutterstock;
Images;
Paper
p96:
p100
(TL):
p98:
product
made
from
wood
grown
in
p100
Aqabiz/iStock/Getty
manufacturing
process
conforms
to
the
p130:
Printed
in
the
India
country
by
of
Manipal
origin.
Technologies
Ltd
(TC):
LightField
Angellodeco/Shutterstock;
Images.
environmental
Artwork
of
(TR):
sustainable
Studios/Shutterstock;
regulations
Chenn/Getty
p100
natural,
forests.
The
Steve
KikoStock/Shutterstock;
Mimagephotography/Shutterstock;
recyclable
PROD/Shutterstock;
by
OUP
and
Thomson
Digital.
p147:
Preface
In
this, the
third
Technolog y
that
for
edition
incorporates
Examination
the
syllabus. Almost
how
is
invaluable
O xford
20
are
recent
Council’s
c lear
of
CSEC, we
changes
Information
years
information
Information
providing
into
and
the
to
new
the
implementation)
material
Caribbean
Technolog y
new
Caribbean
millennium, it
communications
programming
(IT )
the
is
textbook
resource
in
ever y
textbook
aims
the
Caribbean
student
in
to
the
support
the
and
problem
11
introduces
use
of
ICT
tools
support
material
to
solving. It
fully
writing
will
provide
you
for
syllabus. e
resources
through
topic
explore
range
questions. O ur
and
of
this
the
ever y
textbook
discussion, worked
educators
design
in
from
years
across
resource
of
the
material
section
are
examples
of
the
most
part, the
be
chapters
the
sections
of
the
have
used
have
a
with
wide
Each
students
helped
us
to
the
of
in
Chapter
1
hardware
and
sof tware)
and
Chapter
a
to
provide
detailed
treatment
the
coverage
of
syllabus
Section
1
and
Information
2
the
practical
6
page
chapters
of
these
design), which
for
the
theor y
for
the
CSEC
Paper
IT
1:
9
(Problem
is
the
¼
hours:
are
for
Based
and
compulsor y
into
the
sections
sy llabus.
more
take
Microsof t
and
a
on
dierent
based
on
the
End-of-section
the
questions
chapters. e
and
the
examples. e
teachers
ne w
exam
appendix
through
as
the
individuals
topics
at
the
covered
end
approach;
of
intention
is
testing
to
with
this
format,
approach
using
real-
inc ludes
SBA,
useful
whether
hints
c andidates
or
as
a
par t
of
a
is
our
intention
through
this
text
to
once
again
provide
supportive
resource
for
each
candidate
to
achieve
material
and
the
in
IT
examination, as
each
candidate
practical
Assessment
Chapter
their
to
10
embrace
new
technologies
which
will
(SBA).
arrive
in
years
to
come.
(Program
multiple -choice
questions.
Section
35 questions – Theor y
30% of final mark
15 questions – Productivity tools
10 questions – Problem solving
Paper
2:
2
hours:
Four
compulsor y
questions
from
all
areas
of
the
syllabus.
35 marks – Theory
45% of final mark
30 marks – Productivity tools
25 marks – Problem solving and programming
Paper
3-1:
School
comprising
word
Based
Assessment
processing,
web
(SBA).
page
One
design,
practical
assignment
spreadsheets,
Productivity tools
database
Problem solving and programming
management,
problem
solving
and
programming.
25% of final mark
Paper
A
3-2:
theor y
Alternative
and
to
practical
the
School
paper
Based
testing
the
Assessment
skills
required
for
private
for
the
candidates.
School
Productivity tools
Based
Problem solving and programming
Assessment.
25% of final mark
are
group.
Chapter
Syllabus
60
V isual
the
processing, spreadsheets
reinforcement
students
guidance
Structure
1
introduces
support
(Computer
updated
provides
solving)
from
other
questioning
inevitably
Chapter
12
can
Processing).
examination
School
word
subdivided
which
from
prepares
requirement
is
provide
chapter
success
needed
Chapter
sections
a
( Web
method
(Information
It
Among
for
objectives
working
Fundamentals
this
(Fundamentals
for
for
used
section. ere
wor ld
processing)
with
have
to
of
programming
comfortable
aligned
syllabus. However, we
separation
Pascal
those
code, while
chapter
specic
questions
eectively.
been
for
Applications, which
familiar ise
maintained
of
management.
learning
with
areas
the
each
For
these
questions.
presented
and
interacting
region
to
use, while
in
and
to
which
with
database
IT
can
support
examples
challenging
choose
for
applications
the
students
oer
several
now
interest
Basic
productivity
their
to
prove
technolog y
of
of
language
to
can
sector, inc luding
fundamentals
education. is
continued
continues
programming, with
Chapter
an
have
candidates. Teachers
Contents
1
Fundamentals
1.1
Basic
1.2
Input
1.3
O utput
1.4
Primar y
1.5
Secondar y
1.6
System
1.7
Data
1.8
Application
1.9
User
1.10
Types
1.11
Common
of
computer
devices
hardware
and
sof tware
components
and
media
devices
memor y
storage
software
5.4
Reviewing
6
5.5
Combining
8
5.6
Table
15
5.7
Mail
19
5.8
Printing
21
5.9
Fillable
26
processing
End
2
software
chapter
and
Data
2.2
Validation
2.3
Automated
2.4
File
2.5
Information
34
hardware
exam-style
problems
questions
and
3.1
Computer
3.2
Web
methods
and
of
42
data
capture
access
processing
54
exam-style
networks
46
49
and
questions
web
60
technologies
networks
4
chapter
Implications
4.1
Computer
4.2
Misuse
4.3
Data
4.4
Impact
of
and
cyber
information
IT
Personnel
4.6
Implications
of
in
in
the
workplace
computer-related
of
chapter
of
Web
page
Word
chapter
129
forms
130
exam-style
questions
136
design
6.3
Creating
web
End
of
a
to
web
web
page
design
138
page
141
page
chapter
147
exam-style
questions
150
Spreadsheets
7.1
Introduction
7.2
Common
7.3
Developing
7.4
Formatting
7.5
Searching
7.6
Charts
7.7
Printing
7.8
Importing
End
of
to
spreadsheets
spreadsheet
a
simple
a
152
features
154
spreadsheet
160
spreadsheet
for
170
records
172
180
a
spreadsheet
les
and
chapter
185
linking
exam-style
data
186
questions
188
elds
ICT
exam-style
questions
Databases
8.1
Introduction
8.2
Common
79
8.3
Joining
81
8.4
Capturing
84
8.5
Searching
89
8.6
Calculated
94
8.7
Report
95
8.8
Importing
101
8.9
Developing
End
5
document
a
77
secur ity
vulnerability
4.5
End
misuse
questions
protection
of
122
electronic
End
120
70
exam-style
of
the
Designing
62
technologies
of
data
124
6.2
8
End
116
importing
merge
Introduction
38
40
verication
chapter
and
contents
6.1
7
information
Computer
36
processing
organisation
of
systems
computer
2.1
3
31
computer
Information
End
29
interfaces
of
work
les
27
6
of
of
your
of
to
database
database
multiple
and
and
management
management
database
entering
features
tables
data
193
200
203
sorting
209
elds
217
formats
and
191
220
linking
database
chapter
data
225
applications
exam-style
questions
227
228
processing
9
word
processing
solving
Introduction
5.2
Document
organisation
110
9.1
Introduction
5.3
Tables
columns
112
9.2
Algorithm
and
to
Problem
5.1
and
program
design
103
to
problem
design
solving
231
233
9.3
Pseudocode
Programming
235
with
Visual
Basic
for
12
9.4
F lowcharts
9.5
Arithmetic, relational
9.6
Testing
End
10
of
chapter
Programming
10.2
Writing
a
10.3
Running
10.4
Testing
10.5
Program
1
1
of
logical
operators
252
exam-style
questions
258
languages
260
266
debugging
techniques
documentation
chapter
Programming
with
V isual
Basic
for
283
Writing
287
in
Information
2
Teacher
Assessment
VBA
questions
272
3
School-Based
guidelines
guidelines
Guidelines
program
Answers
Pascal
Technolog y
for
292
the
School-Based
Assessment
268
270
exam-style
to
Applications
1
262
program
and
12.2
Introduction
Appendix
program
a
12.1
256
implementation
10.1
End
and
algorithms
Program
Applications
246
to
295
for
problem
solving
and
design
end
of
296
topic
questions
298
Index
11.1
Introduction
11.2
Structure
11.3
Formatting
of
to
a
Pascal
Pascal
the
274
program
output
305
of
Pascal
277
programs
280
What's
♦
Answers
to
Q uestions
♦
with
this
Paper
Chapter
Exam-style
Q uestions
sample
on
answers
all
multiple
online
Paper
to
1
2, worked
for
and
choice
SBA
test,
Paper
3
marking, SBA
3
Workbook
Comprehensive
this
of
book.
with
Paper
advice
Answers
End
website?
analysis.
alternative
♦
the
Exam-style
Interactive
Practice
♦
in
chapter
examiner
♦
all
Additional
each
on
glossar y
questions
of
terms
used
in
book.
www.oxfordsecondar y.com/9780198437161
A
PT
E
C
H
1
F U N D A M E N TA L S
1.1
Basic
Computers
are
technolog y. A
an
computer
important
computer
is
of
information
electronic
under
the
control
of
memor y. W hether
network
(such
as
on
the
its
instructions
own
or
Internet), it
stored
is
the
connected
via
name
accept
◆
manipulate
◆
produce
data
(Fig
1
can:
data
(output)
from
the
data
and
results
for
future
use
basic
tasks
of
any
computer
represent
1.2). ere
are
ve
general
categories:
and
controls
how
the
rest
is
of
the
brain
the
of
a
computer
includes
(Fig
and
logic
instructions
data
in
through
control
unit
the
the
calculations
unit
(CU)
and
the
(ALU). e
software
and
CU
carries
directs
the
ow
computer. e
and
logic
ALU
performs
operations.
Input devices
get
data
into
a
computer. A
mouse, a
1.1).
keyboard
3
Data
and
a
scanner
Output devices
get
are
all
processed
input
devices.
information
out
of
a
or
information
is
Data
stored
for
is
or
input
computer, for
example
to
a
printer, computer
screen
a
to
short
the
the
2
cycle
a
(storage).
the
IPOS
of
processing
of
four
parts
(processing)
out
ese
physical
(input)
results
the
the
e central processing unit (CPU)
arithmetic
store
to
a
works. It
◆
given
in
computer
◆
S O F T WA R E
Hardware
computer
its
AND
device,
is
operating
H A R D WA R E
components
aspect
an
OF
the
or
long
computer
even
to
speakers.
time
4
Memor y
enables
instructions
5
Storage media
DVDs, and
Information
Data
is
and
output
in
to
to
temporarily
store
data.
USB
ash
hard
disks, CD-ROMs,
memor y
sticks, while
the
is
processed
the
computer
include
storage devices
user
a
include
hard
disk
drives, CD-ROM
into
information
various
drives
and
DVD
drives. Most
of
these
devices
can
forms
read
data
whilst
sticks, allow
others, such
data
to
be
as
saved
as
USB
well
ash
as
memor y
read.
Fig 1.1 Four basic tasks of the IPOS Cycle
Peripheral devices
Components
e
term
machines
games
of
a
computer
‘computer’ generally
and
laptops
consoles
smartphones
as
and
but
well
as
it
refers
can
to
also
portable
are
computer
desktop
include
handheld
devices, such
controlled
may
basic
tablets.
components
of
hardware
or
is, they
system. Input, output
peripheral
a
computer
are
categorised
can
and
be
the
CPU
added
storage
to
but
a
devices
devices.
is
the
name
given
to
computer
programs
that
as
the
hardware
how
to
work. W ithout
software
the
software.
computer
6
it. at
outside
Sof tware
tell
either
located
as
is
e
be
by
are
hardware
would
do
absolutely
nothing, as
1.1
Information
Storage
Basic
and
computer
components
communication
device
Output
(CD-ROM)
device
technology
(monitor)
System
unit
containing
central
unit
case
the
Now
that
we
have
processed, stored
we
introduce
Information
describe
Input
discussed
how
data
can
be
input,
processing
(CPU)
the
and
two
output
to
important
Technolog y
equipment
produce
information,
terms:
(IT )
is
the
(hardware
term
and
used
to
computer
devices
(keyboard
&
mouse)
programs
or
software)
that
allows
us
convert, store, organise, manipulate
and
information. IT
may
also
refer
to
and
to
access, retrieve
present
the
use
data
of
such
Output
device
equipment
(printer)
and
programs
Communications
to
describe
which
data
to
produce
Technolog y
(CT )
telecommunications
and
information
the
is
information.
the
term
equipment
can
be
used
through
accessed. Examples
Fig 1.2 The basic categories of computer hardware
of
there
would
following
be
no
types
instructions. Software
of
includes
the
CT
and
equipment
are
phones, faxes, scanners, modems
computers.
program.
Questions
Computer
ese
are
programs
instructions
programmers
System
is
to
(programs)
create
system
produced
and
application
is
List
2
State
the
basic
tasks
3
usually
called
an
operating system
controls
the
works. e
hardware
most
and
commonly
Windows, written
by
the
how
used
all
other
software
also
includes
What
is
par ts
of
Explain
system
a
CPU
just
as
car’s
a
aims
to
protect
mechanic
engine
when
and
maintains
it
is
by
utility
b
CU
c
ALU.
damage
maintain
the
the
smooth
system
working
serviced. Examples
software
caused
of
(‘backing
by
Explain
up’), and
of
the
of
stopped
working
Application
to
spreadsheets
the
cycle
that
represents
the
four
listed
a
in
general
question
name
1.
given
to
the
physical
computer?
what
each
of
the
following
terms
represent:
the
dierence
between
an
input
device
and
output
include: protecting
computer
6
What
is
another
7
What
is
the
les
after
name
for
system
software?
general
name
given
to
each
of
the
descriptions:
software
viruses, making
recovering
device.
tasks
computer
programs
that
tell
the
hardware
how
copies
work
software
(‘crashed’).
telecommunications
data
and
information
equipment
can
be
through
which
accessed.
sof tware
Application software
computer
of
a
b
has
computer.
software,
to
les
any
utility software. is
a
against
name
the
following
undertaken
of
is
an
software
tasks
Corporation.
5
System
basic
software
operating
Microsoft
four
since
4
it
the
software.
sof tware
software
1
by
carr y
and
out
is
a
software
specic
databases
are
that
instructs
task. Word
all
a
processors,
application
software.
7
Input
1.2
Data
must
computer
be
devices
provided
system
to
be
in
a
and
suitable
able
to
media
form
process
for
any
it. So, it
Keyboard
important
to
think
of
the
dierent
ways
keyboard
data
into
a
computer, particular ly
since
needs
to
be
entered
as
accurately
as
and
various
person
to
enter
user
responses
erefore, an
data
from
the
Although
desktop
and
do
remote
is
into
input
most
the
device
outside
input
realise
control
entered
it!
for
using
a
a
memor y
is
wor ld
any
a
or
computer.
that
be
transfers
across
a
time
games
are
many
to
Other
being
dierent
suitable
others
you
use
can
a
console, data
keyboard.
input
and
for
a
dierent
general
categories
of
input
keys, a
set
of
digit
keys, so
the
keyboard
is
data
in
entered
the
form
by
of
or
numbers. W hen
you
press
devices
and
data
entr y
are
(DDE)
has
by
the
the
which
the
keyboards
on
be
a
have
that
it
picture
is
to
do
the
animal. Akeypadis
primar y
of
a
to
the
easy
to
make
just
one
consoles
job
and
schools. e
farmyard. Pressing
computer
a
sent
pressed. e
toys, games
in
is
keys.
designed
used
cause
(code)
you
wrong
children’s
robots
would
key
disadvantage
pressing
found
animal
it
number
block
of
to
make
buttons
the
on
noise
that
media, each
purpose. e
devices
tell
‘keyboard ’ could
an
devices
be
to
keyboard, a
programmable
manual
digits, symbols
or
alphabetical
letters. Keypads
two
can
direct
the
letters, words
special
contain
one
alphabet
function
operating
the
keyboard
of
ere
on
mistakes
connected
come
key
computer
computer.
example, ever y
television
special
a
can
probably
For
of
device
into
devices
computers, you
not
of
data, programs, commands
a
and
set
possible.
individual
‘Input ’ means
a
all
the
data
has
of
keys
entering
keypad
is
A
always
and
also
be
found
on
many
keyboards.
input
devices.
Mouse
Y
ou
Manual
input
can
range
W ith
data
a
manual
into
these
the
devices
input
device, you
computer
are
also
move
data
directly
into
a
computer
using
must
yourself. Some
explained
enter
or
transfer
examples
of
input
of
input
device
surface, the
next.
direction. If
devices. e
called
pointer
the
a
most
mouse. As
on
mouse
the
has
common
you
screen
two
move
moves
is
a
it
along
in
pointing
the
buttons, the
left
one
Scanner
Barcode
Temperature
Musical
Mouse
sensor
Fig 1.3 Input devices: getting data into the computer
8
reader
controller
keyboard
a
at
same
Microphone
Games
a
devices
is
1.2
used
to ‘select ’ items
such
to ‘access’ menus. e
ball
underneath
e
optical
e
cordless
to
text
and
mechanical
help
mouse
as
it
uses
roll
light
the
mouse
smoothly
to
track
right
one
has
rubber
in
its
a
all
is
is
not
physically
Touch-sensitive
devices
instead
uses
infrared
A
touchscreen
way
It
is
to
a
screen
with
the
radio
waves
to
scanner
text
to
to
the
to
to
input
data
touch, so
(Fig
you
do
1.4).
not
use
a
keyboard
or
mouse. Banks, malls
and
use
touchscreen
kiosks
or
touch
terminals
provide
information
to
the
public. Touchscreens
are
commonplace
and
on
handheld
devices
such
as
mobile
iPads.
scanner
allows
your
sensitive
computer.
phones
A
another
is
to
also
Document
is
that
the
to
communicate
media
movements.
connected
or
and
directions.
restaurants
computer, but
devices
used
need
mouse
Input
you
to
transfer
computer. It
bottom
one
line
computer. Y
ou
can
program, send
it
at
then
as
an
scans
a
time
take
email
pictures, graphics
the
image
and
that
from
transfers
copy
and
attachment
or
and
the
it
use
top
to
it
print
the
in
a
it.
Microphone
Data
can
be
entered
microphone. e
carr ying
or
out
turning
a
the
computer
computer
instructions
spoken
processor. ese
or
into
are
voice-response
responds
such
words
called
as
through
to
this
printing
into
text
in
a
a
a
data
by
document
word
voice-activated
systems.
Fig 1.4 Touchscreens, such as the one shown here, are popular in public places
as there is no need to use a mouse or a keyboard
Digitiser
A
Digitisers
conver t
drawings
and
images
into
touchpad
senses
For
example,
a
digital
camera
captures
still
is
images
and
stores
them
in
electronic
the
printing
or
editing
later.
A
webcam
is
a
t ype
for
camera
transmission
Internet
or
webcams
or
connected
for
of
other
to
see
or
live
monitoring
computer,
S ome
other
on
images
chatting
Other
uses
of
highway s
over
users
use
movement
online,
A
webcams
digitiser
is
found
in
a
a
and
light
computers
pen
is
the
light
a
pen
can
signatures. It
that
uses
graphics
a
a
it
a
tablet
are
pen
called
also
digitiser
allows
drawings
and
at, touch-sensitive
special
transparent
screen
is
capture
direct
a
shown
element
of
interaction
a
ngers
found
on
on
its
laptop
and
and
function
as
a
mouse
does
to
similar
stylus
is
devices
a
or
used
to
a
have
stylus,
felt
to
mouse, but
tip
that
draw
replaced
which
on
is
uses
a
is
rarely
it. A
small
since
variation
pen-like
pressure
graphics
used
instead
tablets
or
of
device
of
type
ink.
on
to
avoid
using
ngers
on
the
screen.
handwritten
drawing
monitor.
this
more
graphics
stylus. Images
on
or
usually
devices
is
plastic
touchscreens
tablet, that
one
are
pointer.
touch-sensitive
other
with
of
of
devices
Pointing
A
type
also
the
sur veillance.
Another
which
t y picall y
computer
while
video.
trac
a
moving
network.
each
streaming
inc lude
still
to
surface
of
move
digital
rectangular
format
notebook
for
at
and
surface. ese
video
a
data.
kind
with
the
surface
from
the
ese
W hen
overlays
screen.
Remote-control
a
devices
send
abuttonis
pressed
by
device
another
data
on
that
devices
through
the
signalseach
device. e
processes
the
signal
time
is
received
instruction.
9
1
Fundament als
Remote
and
of
control
radio
hardware
devices
station
and
are
software
used
to
channels, open
change
electronic
television
gates
Barcode
and
A
manage
slide
barcode
Groups
Biometr ic
to
systems
uniquely
biometric
related
systems
use
some
identify
systems
to
some
part
which
of
a
them. ere
that
aspect
can
of
person’s
are
identify
the
body
two
e
body
types
someone. One
using, for
is
and
of
are
size
group
or
iris
recognition
(Fig
and
shape
of
the
hand. ese
found
bars
are
often
consistent
and
rarely
change. In
and
tone
or
pitch
of
voice
1.5), as
xed
behaviour. For
your
dierent
widths.
example, if
you
signature
or
voice
may
its
to
all
represent
above
or
included
countr y
price
is
the
of
not
products
dierent
below
in
a
the
we
buy.
numbers
barcode.
barcode
for
a
origin, manufacturer
included
in
the
barcode.
are
read
into
the
computer
using
a
wand
or
scanner. ere
are
related
are
are
not
also
camera-based
easily
damaged
barcode
and
can
person’s
to
still
be
read
if
they
are
creased
or
slightly
the
can
be
printed
using
a
normal
printer
ner vous,
and
then
of
well
wrinkled. ey
person’s
bars
characteristics
contrast, a
are
used
code. e
normally
signature
vertical
almost
normally
represent
item
on
printed
readers. Barcodes
are
of
example,
a
the
a
numbers
product
of
are
Barcodes
ngerprints, face
as
is
presentations.
Barcodes
ese
reader
ink, and
so
are
cheap
to
produce.
change.
Fig 1.6 A barcode is found on many products
Fig 1.5 An electronic signature can uniquely identify a person
A
barcode
e
Direct
A
direct
data
data
automatically
barcode
the
entr y
from
into
the
information
ese
be
–
devices
entered
entr y
a
can
transfer
document
–
computer. Y
ou
information
such
do
devices
as
not
a
form
need
to
or
enter
manually.
are
into
device
(DDE)
used
the
data
large
computer
volumes
of
data
quickly
. Previously, it
must
Goods
relatively
long
time
for
a
supermarket
cashier
to
then
systems, enable
and
the
cost
of
your
grocer y
items
using
a
cash
barcode
systems
make
this
task
as
are
various
DDE
devices
input
devices, dierent
DDEs
are
purposes. Some
examples
are
of
be
of
been
sold.
re-ordered. ese
point
amounts
has
of
data
sale
to
(EPOS)
be
input
ver y
of
people
now
pay
for
their
shopping
using
or
store
cards. e
magnetic
strip
on
the
such
a
card
is
‘read ’ as
it
is
being
‘swiped ’ by
a
swiping
transfers
account
information
with
suitable
explained
the
cost
of
the
goods, into
the
banking
system.
for
type
of
system
is
referred
to
as
electronic
below.
transfer
10
electronic
what
produce
quicker.
is
dierent
store
to
system.
add
and
manual
a
used
a
register.
much
available. As
tell
is
into
card
salesperson. is
ere
barcodes
automatically
large
directly
took
back
Nowadays
to
data
accurately.
credit, debit
up
enter
from
and
systems, known
Smar t
to
collected
can
Millions
a
used
customers’ bills
quickly
when
is
at
point
of
sale
(EF TPOS).
funds
1.2
To
gather
through
the
is
information
a
machine
magnetic
scratched
on
the
businesses
A
card
now
gets
can
to
that
be
does
set
a
special
of
circuit. Such
more
card, it
quickly
the
and
magnetic
the
corrupted. Such
loyal
not
rely
has
a
gold-coloured
reader
the
soiled, then
reward
appearing. It
a
which
pattern. If
or
card
from
inputs
cards
are
sophisticated
accurately
area
on
card
is
reads
the
information
a
e
swiped
card
stored
used
by
on
a
magnetic
information
called
strip
electronic
contacts. Putting
the
is
also
circuit
the
card
held
in
swipe
and
numbers
of
form
If
smart
cards
are
often
called
input
an
are
actually
simple
storage
of
a
or
put
into
written
data
than
Smart
carr y
a
machine, data
onto
a
it. A
cards, unlike
all
necessar y
at
the
be
card
read
can
from
store
a
special
all
will
marks
draw. is
mark
into
method
recognition
positioned
scanner. is
is
read
data
as
to
fast
the
can
and
be
to
sheets
mark
data
part
have
answer
system
data
tests
probably
form. ese
the
of
media
marks
data
is
on
a
then
system.
scanning
to
the
optical
precisely
set
and
of
your
answer
will
your
be
them
passed
answers. is
accurate. OMR
that
has
been
transmitted
to
is
added
the
the
the
much
automatically. e
nal
information
can
then
card
produced
without
any
need
for
human
inter vention.
card
more
strip.
functions
do
time
called
into
multiple-choice
used
then
them
each
devices
devices,
devices. W hen
magnetic-strip-based
card. erefore, they
databases
smart
magnetic
can
the
turns
on
by
inputting
therefore
be
is
by
OMR
computer
they
is
relies
examinations, you
way
cards.
enters
read
have
through
are
system
data
and
being
you
and
Although
and
entering
(OMR)
on
in
the
smar t cards. ey
magnetic
computer
processed
customers.
built-in
than
is
Input
of
not
the
and
cards, can
information
require
access
to
on
the
remote
transaction.
Fig 1.8 Data can be entered into a computer in dierent ways. Lottery slips are
an example of optical mark recognition (OMR)
Optical
Another
a
way
computer
character
is
Fig 1.7 Smar t cards have a built-in electronic circuit and a set of gold- coloured
character
turned
reprinted
of
entering
system
is
recognition
into
by
a
a
recognition
le
to
scan
the
(OCR)
that
word
handwritten
can
text
(OCR)
or
printed
using
an
program. e
be
text
optical
scanned
edited, reformatted
processor.e
accuracy
into
of
text
and
OCR
is
contacts
variable
to
Optical
ere
are
numbers
you
buy
lines
slip
mark
various
ways
automatically
a
lotter y
through
is
recognition
then
of
into
a
numbers
a
letters, words
system. For
ll
in
on
machine
can
scanned
be
are
poor,particularly
of
poor
if
the
original
pages
quality
.
(OMR)
inputting
into
ticket, you
sets
fed
of
be
and
the
a
that
slip
grid
and
example, when
by
putting
(Fig1.8). is
reads
the
marks.
OMR
and
OCR
are
often
turnaround document . A
one
it
to
which
by
be
a
has
some
computer
added
to
it
a
together
turnaround
unique
with
by
used
other
information
is
a
document
information
human. It
in
then
printed
which
fed
is
on
needs
back
1
1
1
Fundament als
into
a
of
computer
information
to
hardware
a
and
second
the
software
time
to
transfer
the
added
Sensors
computer.
e
music
interface
Magnetic
ink
character
recognition
process
millions
of
cheques
each
day
. Every
piano-type
the
cheque
number, account
number
and
branch
on
it
using
magnetic
ink
(Fig
1.9). A
character
reader
(MICR)
reads
this
with
the
amount
of
the
cheque
systems, so
that
the
wide
from
one
are
readers
inc ludes
ey
onl y
can
can
onl y
numbers
read
characters
accurac y.
Information
also
secure
the
ver y
by
since
information
magneticall y
folding
read
and
by
into
the
cheques
can
be
special
punctuation
quickl y
it
is
not
(as
it
to
with
also
a
which
that
marks.
in
with
magnetic
are
of ten
font,
and
possible
over
numbers
cheque
in
of
used
by
MICR
and
into
ink
100%
is
collect
which
wind
speed
can
sounds
or
set
of
respond
be
used
system. For
pen. e
always
damaged
predict
the
from
has
through
respond
can
to
then
be
pads.
to
to
a
wide
collect
data
example, the
weather
sensors
sensors
and
humidity. is
to
not
a
Oce
data
space. ese
change
happens).
the
of
keyboard
signals. ey
data
is
data
processed
weather. As
large
we
forecasting
around
collect
direction, hours
accurate, but
the
on
of
wor ld
help
of
and
meteorologists
know, the
amounts
and
temperature,
sunshine
to
systems
forecast
precise
is
data
not
are
collected.
Both
Information
thereader
input
that
cashed.
one
pr inted
sensors
banks’
few
ver y
w r iting
printed
the
a
by
variety
available
Meteorological
MICR
or
information
automatically
information
is
digital
magnetic
variety
along
systems. Here, data
keyboard
struck. A
Sensors
ink
instrument
code
generated
printed
musical
cheque
being
has
(MIDI)
uses
(MICR)
a
Banks
industr y
magnetic
systems
use
sensors
to
input
data
so
that
ink
the
systems
can
decide
what
to
do. W hen
you
approach
areexpensive.
an
automatic
there
and
sensors
have
makes
to
or
the
inform
been
sound
Fig 1.9 Magnetic ink symbols printed on the cheque
door, a
opened
the
sensor
door
the
or
police
tells
the
open. Burglar
system
when
broken. is
to
be
system
alerted
you
alarms
doors
causes
or
an
are
use
windows
alarm
to
automatically.
Table 1.1 Input devices: advantages and disadvantages
Input
device
Manual
Application
input
binar y
(touch)
key
strokes
into
◆
digits.
Carries
out
function
Disadvantages
devices
Keyboard
Conver ts
Advantages
text
the
keys
Used
commands
such
as
of
◆
manually
into
Used
and
‘End’ and
to
to
the
◆
Most
◆
Relatively
computer
type
commands
instructions
computer
‘PgUp’
input
common
entering
means
of
◆
text
Continued
repetitive
inexpensive
◆
to
Errors
strain
cause
injur y
transcription
are
systems
◆
Speed
the
of
input
user ’s
depends
experience
(touch)
Mouse
Sends
positional
to
computer,
the
can
common
on
scrolling
in
use
of
information
by
mouse
clicking
◆
or
Acts
as
an
between
buttons
inter face
the
user
and
◆
the
directly
computer
◆
Used
to
directly
page
issue
to
Commands
commands
the
computer
◆
Can
to
can
the
be
given
computer
selecting
commands
icons
directly
Hand-to-eye
◆
Shifting
(e.g.
down)
activate
◆
by
can
be
a
problem
between
keyboard
be
coordination
and
mouse
can
confusing
(continued)
12
1.2
Input
devices
and
media
Table 1.1 Input devices: advantages and disadvantages (continued)
Input
device
Application
Joystick
Similar
but
to
with
Advantages
Disadvantages
(touch)
a
vehicle
buttons
gear
for
shift,
◆
Generally
used
in
game
◆
playing
different
Ideal
for
racing
games
and
such
as
car
◆
combat
the
the
user
to
to
press
par ts
◆
activate
Are
located
places
functions
and
such
in
and
public
as
shopping
transactions
◆
restaurants
malls
can
information
be
where
◆
made
Easy
capture
hard-copy
copy
of
to
shapes
and
the
Graphics
Used
an
image
create
a
in
◆
digital
be
used
are
options
◆
lines
of
a
and
◆
pressure
stylus
on
Voice -recognition
that
form. The
by
children
and
challenged
is
input
input
commands
◆
unable
Relatively
to
use
other
a
is
Captures
input
signatures
audio
◆
are
then
like
drawings
Resulting
Allows
or
give
to
the
(light
are
groups
ever y
codes
and
of
bars
are
product
are
read
using
a
of
◆
found
◆
cheap
and
easy
to
◆
Depending
on
handheld
use,
flatbed
you
into
wand
or
Data collected from the barcodes
◆
and
can
be
a
monitor
users
to
dictate
commands
◆
a
monitor
scanners
can
be
the
and
the
the
hard-copy,
scanner
image
quality
scanner
software
◆
Requires
detailed digital drawings more
◆
More
Can
be
used
to
as
a
some
practice
expensive
than
a
mouse
capture
biometric
text
◆
The
for
user
can
speak
normally
◆
dictation
Must
be
trained
recognise
computer
◆
Software
voice
to
patterns
cannot
English
interpret
meanings
or
laser)
Different groups of
◆
Data can be input much faster
◆
The order of the data
than it takes to be keyed in
stored cannot be changed
easily
numbers. These numbers
◆
Not
represent the product's
◆
Can
easily
be
country of origin,
normal
manufacture and item code
so
damaged
printed
printer
cheap
to
using
and
a
ink
and
produce
◆
Used
and
to
record
track
transactions
◆
inventor y
Prices
of
products
easily
updated
◆
Items
can
◆
Can
be
can
be
◆
Depends
Internet
easily
on
a
reliable
connectivity
scanned
(OCR)
graphics
copy
of
on
(light)
Character
Recognition
quality
Allows artists to sketch
signatures
directly
and update the database
soft
time
(laser)
is used to produce information
as
The
of
easily than by using a mouse
images
on
hand-
bars represent different
scanner
and
a
than
devices
Electronic Point of Sale (EPOS)
Text
at
(sound)
analysed
entry
computer
Optical
of
displayed
screen
depends
chosen
created
system
in
which
widths
almost
fixed
be
expensive
standard
install
or
and
reader
Barcodes
the
joystick
number
can
one
More
all
data
Barcode
buy. The
limited
on
◆
processed
on
the
devices
across different applications
the
◆
different
A
values
physically
documents and images
displayed
Direct
of
(machine -readable)
tablet
through
Conversion of hard-copy
used to import and export
tablet
for
input
Can
who
images to soft-copy can be
image
input
movement
Data
sensitive
(light)
Scanner
to
to
choices
the
given
way
and
input
Used
become
the
movement
screen
different
to
at
(touch)
Touchscreen
of
has
skilled
commands
Allows
User
are
scanned
◆
Can
be
blocks
used
of
to
typed
input
text
large
speed
process
up
the
typing
◆
Accuracy
be
of
the
text
can
poor
(continued)
13
1
Fundament als
of
hardware
and
software
Table 1.1 Input devices: advantages and disadvantages (continued)
Input
device
Magnetic
ink
recognition
Data
is
or
data
as
special
translated
Used
◆
magnetic
into
by
banks
cheques,
ink.
text
(branch,
Mark
by
additional
values
Optical
Disadvantages
(magnetic)
character
using
is
Advantages
(MICR)
printed
characters
This
Application
to
process
printing
bank
◆
Is
◆
Both humans and machines
details
account
number)
quick
and
highly
efficient
◆
Has
◆
As
limited
the
use
can interpret the data
becomes
◆
Not
is
◆
Data
easy
to
forge
in
applications
of
cheques
obsolete,
its
use
decline
(light)
Recognition
(OMR)
Relies
or
on
the
absence
presence
of
positioned
marks
being
by
read
scanner. This
processed
Smar t
A
on
a
and
form
is
strip
owner
the
of
input
is
ver y
fast
and
There
◆
accurate
issued
is
a
number
by
Incorrect
◆
boards
marking
then
may
system
limit
of
or
the
inconsistent
on
result
being
to
responses
the
in
sheet
the
data
rejected
(magnetic)
data
plastic
lotteries
sheets
examination
card
magnetic
with
multiple -choice
question
special
the
encoded
a
a
data
by
Popular
◆
precisely
containing
about
card
is
Used
◆
the
to
debit,
placed
on
and
store
credit,
other
data
on
loyalty,
◆
phone
cards
card
Can
be
used
financial
to
store
transactions
◆
Transactions
◆
Saves
the
are
user
◆
Can
◆
May
fast
from
be
damaged
soon
be
embedded
replaced
by
microchips
carr ying
cash
Musical
Instrument
Inter face
Can
be
create,
(MIDI)
used
by
musicians
manipulate
sounds
in
(sound)
Digital
a
and
to
Used
◆
store
to
store
instruments
computer
music
or
from
voice
for
◆
Once
stored,
arranged
in
the
data
many
can
be
Special
◆
ways
be
editing
software
used
music
to
into
must
translate
a
the
musical
score
Questions
1
What
is
the
general
name
for
each
of
the
f
following
on
being
devices:
g
a
relies
transfers
data
from
the
outside
world
into
a
precisely
read
by
document
a
positioned
special
which
marks
on
a
form
scanner
has
some
unique
information
a
printed
on
it
by
a
computer,
but
other
information
computer
needs
b
a
at
rectangular
sur face
which
also
fed
movement
c
a
system
uniquely
d
transfers
of
that
a
nger
uses
identify
on
some
its
of
a
person’s
body
to
2
What
transfers
graphics
and
text
to
a
a
computer
14
such
as
a
automatically
form
is
data
by
information
document,
be
added
into
the
to
it
by
a
human
before
it
is
computer.
the
general
name
for
each
of
the
following
processes:
computer
e
back
sur face
par t
them
pictures,
to
senses
or
from
barcode
a
into
b
the
to
is
entered
or
transferred
into
the
computer
hand
send
time
data
at
a
abuttonis
distance
pressed
through
on
the
signalseach
device.
Output
To
get
may
processed
need
print
or
Soft
the
types
copy :
from
a
information
output
store
common
◆
an
is
not
computer
◆
Hard
since
to
copy :
it
is
a
processed
computer, you
to
show,
data. e
most
are:
permanent. It
monitor, audio
speakers, electrical
computer
of
output
this
of
device. ‘O utput ’ means
results
of
out
1.3
devices
signals
and
includes
(sound)
output
output
from
from
one
another.
this
is
printed
also
for
computer. Examples
called
you
are
to
permanent
review
printed
away
reports
output
from
and
the
pictures.
Fig 1.10 Various types of devices with displays
Display
Computers
devices
usually
display
output
on
a
screen
or
Features
monitor. Some
be
plugged
such
as
screens
into
laptops
some
devices
the
can
mobile
to
also
the
be
additional
inc lude
smar tboards)
are
and
system
used
as
unit
need
their
and
computer
for
whiteboards
monitors
teaching
or
large
touch-sensitive
plastic
19
either
directly
by
connections
to
a
respond
other
devices
such
as
a
computer
pen.
e
common
most
LCD
(liquid
types
cr ystal
(light-emitting
of
projector, tablet
display
display)
diode)
device
atscreens
screens
on
handheld
the
desktop
measured
screen
screens
which
are
shows
from
diagonally. Larger
14
sizes
the
inches
are
now
determines
how
clear
and
detailed
the
output
on
screen
dots
can
(one
be. Pictures
dot
=
1
on
a
screen
pixel). e
more
are
made
pixels
up
per
of
inch,
or
clearer
and
more
detailed
the
graphic.
Colour
include
and
inches
of
or
the
magnetic
dimension
to
tiny
through
the
Resolution
the
input
is
called
presentations.
boards
screen
available.
is
ese
computer
output. Common
to
display
(also
a
Size
is
keyboard.
connections. Other
of
to
unit. Others,
devices, have
system
interactive
used
separate
computer ’s
and
integrated
Televisions
with
monitors
e
LED
devices
and
to
number
256
to
64
colours, the
laptops.
of
colours
thousand
smoother
displayed
to
16.7
the
can
var y
from
million. e
graphics
16
more
appear, especially
photos.
A
of
monitor
contains
red, green
blended
to
location
and
creates
a
up
picture
include
colour
as
image
of
and
bright
RGB). ese
of
is
resolution.
each
known
seen
pixels.
element. Features
size
of
dots
can
colours. Mapping
image. is
thousands
(pix)
of
array
information
bitmapped
of
or
(known
millions
computer
its
matrix
blue
display
(bmp). e
made
and
a
on
Pixel
of
a
a
bit
as
of
a
computer
the
data
bitmap
monitor
stands
be
Cursor/pointer
e
cursor
working
for
is
on
the
a
symbol
the
that
screen. It
mouse
pointer
shows
may
where
appear
you
as
for
are
text
and
location.
is
for
screen
Scrolling
is
allows
down
or
the
text
brought
or
into
graphic
view
on
to
be
the
moved
or
up
or
screen.
15
1
Fundament als
of
hardware
and
software
as
Pr inting
that
of
a
depending
No
matter
how
simple
or
complex
the
is, the
nal
result
must
be
made
a
user-friendly
form, and
usually
in
the
per
form
of
to
record.
Printers
are
copy
of
devices
which
output
the
your
work. e
speed, quality
choice
of
and
quantity
what
scanner, a
printers
also
photocopier
categories
of
printer
perform
printer
you
and
are
fax
the
of
for
and
ribbon, like
are
useful
through
acceptable
printing
printing
continuous
individual
largely
strike
typewriter. ey
for
paper, and
into
a
print
require
functions
of
Dot-matr ix
a
carbon
are
multiple
sheets
or
noisy
if
or
of
copies
inked
and
do
using
nancial
paper
at
for
Laser
pr inters
Laser
printers
of
necessar y. Impact
are
to
on
in
1200
paper
printer
is
for
paper. e
of
are
for
uses
pins
main
to
print
advantage
printing
main
a
of
multiple
disadvantage
reproduction
printers
Colour
laser
more
much
stocked
from
characters
do
are
not
then
output
is
and
school
used.
faster
documents
than
at
a
high
inkjets. ey
are
or
for
using
moving
or
xed
can
copies
is
be
the
read
business
actually
toner
onto
print
possible
colour. e
can
to
of
tends
(dpi). Many
speeds
of
of
sheets
documents.
8
to
to
be
lines
12
300
are
pages
per
are
also
available. ey
are
to
buy
higher
than
element
are
and
in
is
by
is
but
colour
inkjet
printout
and
printers,
are
cheaper
pr inters
ermal
printers
paper
form
to
use
heat
on
chemically
characters. Many
treated
automatic
banking
(ABM)
receipts, debit
or
credit
card
slips
even
some
ultrasound
scanned
images
are
printed
thermal
recent
printers. ese
ones
print
the
printers
are
quiet
quickly. However, the
print
eventually
fades
if
and
paper
exposed
is
to
the
or
heat.
used. e
heating, for
pr inters
and
inexpensive
(3D)
printers
are
similar
to
inkjet
to
instead
a
3D
model
is
created
layer
by
quietly.
quality
black-and-white
can
images
cannot
simple
low-priced, good
both
quality
relatively
striking
paper
printers
quickly
buy
print
quality
number
quality
printers
inch
quiet, print
using
pr inters
that
large
are
letters.
powder
the
printing
parts, these
and
a
high
laser
per
printers
costly
printers, but
manufacture
with
they
dot-
more
involve
spray
the
because
attained.
ree-dimensional
16
are
run.
3D
example. Because
now
printers
pattern
pr inters
paper. Instead, ink
is
be
ver y
most
printed
be
produce
light
printers
inkjet
small-quantity
attractive
workplaces
expensive, and
It
toner
existence.
printing, which
Non-impact
Inkjet
the
some
using
no
can
simultaneously, and
can
and
has
cartridges
than
cards, photographs
produce
dots
minute
to
paper. e
quality
ese
6
are
pr inter
printers
used
frequently
printers. Colour
produce
be
printout
printed
tear
printers
still
many
machine
be
achieved. eir
home, where
and
paper, and
e
that
to
in
Thermal
poor
be
more
greeting
quickly, can
not
carbon
reports
perforated
now. However, there
printers
dot-matrix
carbon
to
non-impact.
but
matrix
4
main
far
ofdots
of
a
graphics. However, they
payroll
sheets
obsolete
dot-matrix
A
printed. Speeds
pr inters
printers
usually
be
the
used
Impact
to
may
laser
use
resolution
Impact
slower
depends
want, and
machine. Two
impact
is
replaced
work. Ordinar y
cost. Some
are
a
required
on
printers
a
ideal
hard
on
minute
be
cartridges
permanent
inkjet
available
need
in
printer, but
data-processing
pages
operation
laser
devices
be
near ly
as
or
good
layer, from
the
over
hours, as
many
bottom
another. However
inkjet, the
each
layer
3D
to
each
layer
instead
printer
the
upward. e
of
uses
previous
is
printed
using
melted
one.
model
ink
as
plastic
is
on
created
top
with
that
of
the
sticks
1.3
while
(Fig
loudspeakers
who
anyone
wish
around
speakers
that
to
t
which
inside
has
listen
a
listen
them
need
ears. Earphones
and
play
sound
1.13), however, headphones
users
that
can
or
the
to
(F ig
to
be
earbuds
ear. A
the
same
are
a
sound
are
headset
is
attached
to
set
to
people
one
for
disturbing
devices
small
a
of
devices
popular
without
close
ver y
group
more
1.14). ese
placed
microphone
at
the
to
Output
are
or
small
both
headphones
of
allow
headphones,
you
to
speak
time.
Fig 1.11 3D printers create a model layer by layer
Plotters
Car
designers, architects
print
accurate
output
uses
not
to
coloured
paper
ways
hold
(Fig
plotters
a
laser
pens
printer
or
1.12). e
paper
roll
engineers
charts, diagrams
depending
the
and
on
still
the
toner
paper
the
paper
but
to
is
type
while
a
to
3D
a
draw
wish
image
in
plotter
on
dierent
plotter. F latbed
pens
to
drawings,
plotter. A
an
handled
of
the
over
and
who
plotters
move. Drum
cylinder, while
pinchFig 1.13 Microphones record sound while loudspeakers play back sound
roller
of
a
plotters
drum
are
a
plotter
is
mixture
that
it
of
can
the
two. e
produce
advantage
ver y
large
drawings.
Fig 1.14 Headphones, headsets and earbuds are more popular for users who
wish to listen to the sound without disturbing anyone
Fig 1.12 A plotter can produce very large drawings
Sound
Audio
Most
devices
computers
sound
card. is
playback
sold
to
allows
(output)
of
music
homes
both
and
the
schools
recording
sound. Microphones
include
(input)
record
a
and
sound
allow
is
may
from
also
a
be
output
CD. Some
word-processed
can
visually
be
ver y
from
a
software
text
to
important
be
to
digital
le
or
applications
read
young
back
to
as
will
the
children
or
user.
the
impaired.
17
1
Fundament als
of
hardware
and
software
Speakers
Modem
Monitor
Traffic
lights
COMPUTER
Inkjet
printer
Plotter
Headphones
Dot-matrix
printer
Laser
Robot
printer
Fig 1.15 Output devices: getting data out of a computer
Questions
1
State
three
general
types
of
output
d
devices.
type
of
treated
2
What
is
the
general
name
for
each
of
the
printer
paper
that
to
uses
form
heat
on
chemically
characters
following
e
a
printer
that
uses
melted
plastic
that
sticks
each
descriptions:
printed
a
tiny
b
devices
dots
c
type
that
make
up
the
pictures
on
a
output
a
hard
copy
of
your
ver y
work
ears.
of
copies
18
printer
using
that
is
carbon
useful
paper
for
printing
to
the
previous
one
screen
f
which
layer
multiple
small
audio
output
devices
that
t
inside
the
Primar y
Some
right
of
the
away
needed
e
as
for
for
methods
the
travel
storage
as
computer’s
quickly
and
circuit
from
specic
its
to
to
or
be
of
at
the
CPU
CPU
the
types
examples
board
CPU
data
can
is
be
Most
computers
of
that
be
the
(called
computer
quickly
to
be
of
of
is
a
have
from, written
data
called
computer
computer
at
address), can
read
amount
stored
to
which
a
can
word
memor y. L et
memor y
and
us
their
memor y
memor y
you
temporar y
a
computer
will
nd
operating
programs
CPU
one
or
more
instructions
for
its
advantage
major
held
data
and
receives
are
put
of
held
RAM
in
RAM
is
the
the
is
RAM
is
lost
malfunctions. is
data. is
instructions
is
the
store
and
data
instructions
be
read, but
not
changed
are
available
ever y
time
the
is
switched
on.
memor y
is
that
almost
that
RAM
when
why
the
a
computer
between
immediately. e
is
volatile
computer
we
can
need
to
is
use
–
several
memor y
RAM
types
of
and
technolog y
ROM
memor y
has
develops, the
become
combine
line
blurred. Now,
features
of
both.
data
turned
other
o
ese
devices
called
hybrid
do
not
belong
to
either
group;
they
are
or
memor y
devices. Hybrid
memories
can
media
read
and
written
as
desired, like
RAM, but
maintain
data.
computer
become
can
it
their
As
ROM (read-only memor y)
place
be
to
on
job.
disadvantage
in
input/output
the
Recently, as
access
made, basic
memor y
Hybr id
do
is
(RAM)
computer
the
(ROM)
RAM (random-access memor y) . ese
computer, its
e
as
computer’s
(non-volatile), and
to
RAM
can
chips. ese
called
needs
of
processed.
travel
an
data
instructions
where
GB
directly
W hen
the
8
memor y
Random-access
hold
to
standard.
Read-only
chips
2
Fig 1.16 Random- access memory (RAM) – a close-up of a RAM memory module
Types
a
with
instructions
features.
Inside
come
uses.
located
so
to
on
processed
of
needed
not
dierent
processed. Data
largest
be
be
may
process
memor y
accessed
to
dierent
some
be
will
data
for
to
directly
location
contents
other
is
circuit
that
to
computer
time. erefore, dierent
from
so
together
are
a
appropriate
located
processed. e
ere
of
main
and
is
memor y
moved
look
are
board
the
address
into
possible. Main
Main memor y
main
put
periods
purpose
quickly
on
you
processing, while
long
of
main
data
1. 4
memor y
more
programs
and
complex, the
operating
size
of
systems
RAM
has
have
increased.
contents
F lash
without
memor y
typically
used
is
to
a
electrical
variation
store
of
a
power, just
ROM
like
device
ROM.
that
is
code.
19
1
Fundament als
of
hardware
and
software
computer
How
data
is
memor y
Ever ything
that
the
computer
does
results
on
and
o
of
dierent
and
combinations
are
millions
of
bits. Computer
switches
called
transistors
storage
size
is
therefore
given
in
bytes
(8
make
1
byte),
kilobytes
(kB), megabytes
(MB),
of
gigabytes
microelectronic
there
fromthe
bits
turning
disk
represented
or
(GB)
or
terabytes
(TB). ‘Kilo’ normally
bistable
3
means
devices. e
‘o ’ and
‘on’ states
of
the
transistors
a
thousand, or
bytes. is
used
to
represent
the
zeros
(0)
and
ones
(1)
that
the
binar y
number
system. ese
zeros
and
known
as
bits
(binar y
digits). A
bit
is
the
can
of
information
work
with
–
or
either
piece
binar y
of
0
data
or
that
binar y
a
is
1024
is
because
computers
count
by
twos
(binar y)
powers
of
2
and
not
in
tens
like
humans. erefore,
is
2
×
2
×
2
×
2
×
2
×
2
×
2
×
2
×
2
×
2,
smallest
that
chunk
kilobyte
ones
1024
are
. However, 1
make
and
up
10
are
is
2
multiplied
by
itself
ten
times.
computer
1. e
more
Table 1.2 Units of computer data storage
bits
a
processor
(work
things
easily. W hen
are
can
out)
you
continually
use, the
and
use
the
a
being
faster
more
it
can
compute
memor y
it
computer, millions
switched
on
or
o
can
of
by
1
kilobyte
1
megabyte
10
(kB)
=
2
=
2
=
1024
=
1
=
1024
bytes
=
1024
kilobytes
access
20
(mB)
switches
an
×
1024
bytes
electric
048
576
bytes
current.
1
A
popular
produced
made
up
mounted
range
by
of
processors
Intel. e
over
on
of
a
27
slice
chip
million
of
is
the
shown
tiny
i5
in
or
i7
30
(GB)
series
Figure
switches
gigabyte
1.17
is
(transistors)
1
terabyte
=
2
=
=
1024
=
1024
=
2
=
1024
1024
megabytes
×
1024
kilobytes
×
1024
×
1024
bytes
40
( TB)
=
1024
gigabytes
silicon.
×
1024
megabytes
Questions
1
Describe
2
What
is
types
of
a
the
the
temporar y
are
be
State
work
you
all
20
the
think
les
of
all
that
of
are
the
programs
saved, you
can
on
see
a
computer, plus
that
on
each
for
the
CPU.
each
of
the
following
operating
instructions
for
and
its
name
with.
be
read,
ever y
but
time
not
the
changed,
computer
is
on
read
information
Fig 1.17 A close-up of an Intel i7 core processor
If
the
can
available
maintains
3
name
of
computer
switched
can
purpose
general
instructions
and
c
main
memor y :
holds
the
b
the
or
written
contents
given
piece
to
of
as
desired,
without
the
data
smallest
that
but
electrical
a
chunk
power.
of
computer
can
Secondar y
Secondar y
used
for
to
keep
later
data
storage
refers
to
the
programs, data
use. Secondar y
is
and
storage
permanently, whereas
memor y, which
media
and
methods
information
saves
primar y
available
programs
storage
and
uses
main
Magnetic
with
ferrous
length
of
binar y
form
since
temporar y.
Secondar y
storage
information
for
future
and
and
on
the
drives
and
whereas
and
tape
hard
ver y
store
local
and
storage
Local
media
are
hard
drives
to
storage
hard
and
to
disk
hard
are
and
and
computer
retrieve
from
disks
a
are
disks
data,
disk
storage
and
media
is
of
it. e
Magnetic
a
a
only
the
strip
data
is
each
of
plastic
recorded
symbol
width
be
means
drive
of
retrieved
or
erase
tape
since
is
the
the
used
access
the
tape
the
in
it
is
49
tape
along
tape. It
the
as
it
primarily
to
data
of ten
is
moves
not
a
at
that
precede
reel
a
tape
night
or
to
head
(F ig
rapid
in
50th
to
1.18).
back-up
as
creating
done
the
one
unique
order
magnetic
as
the
in
is
same
pieces
a
coated
encoded
from
over
data
devices. Since
process
working
accessing
winds
passing
storage
slow
narrow
stored. erefore, retrieving
data
read, write
other
across
was
by
a
tape, with
can
tape
another
of
methods
computer
it
medium
storage
devices.
generally
cloud-based
a
drives, compact
media
be
of
and
disks, compact
storage
when
can
data, instructions
record
have
programs
piece
hardware
are
drives. So
important
data
Local
◆
physical
information
disk
o. Secondar y
of
keep
tapes. Storage devices
media. Examples
is
media
use. Examples
instructions
It
media
is
oxide. e
the
data
which
Devices
tape
1.5
st orage
storage
as
with
backup
at
the
is
end
day.
to
turned
grouped
into
storage.
storage
storage
with
their
involves
data
in
users
their
location. ese
magnetic
hard
media
having
possession
local
such
as
storage
or
storage
devices
generally
devices
magnetic
tape
or
knowing
include:
and
disks
Fig 1.18 Backup tapes such as this are used to make copies of large amounts of
data on computer networks
◆
optical
and
◆
disks
such
as
CD-ROM, CD-R, DVD
Blu-ray
ash
memor y.
Hard
disks
Another
Magnetic
common
magnetic
e
cheapest
way
to
store
and
back
up
data
is
media, such
as
magnetic
tape
and
hard
Backing
and
stores
data
is
a
disk
it
is
known
as
possible
a
to
hard
add
disk
(F ig
external
1.19).
hard
dr ives ,
disks.
most
Magnetic
that
on
Although
magnetic
de vice
media
are
inside
computers,
protected
by
r igid
c ases.
tape
up
to
tape
organisations
important
and
is
or
large
vital
for
computer
businesses
amounts
of
which
data
networks
need
for
a
to
store
long
time.
Technic all y,
the
controls
motion
the
the
data.
But
hard
most
dr ive
of
the
people
is
the
hard
use
machiner y
disks
‘ hard
that
which
disk’ and
contain
‘ hard
dr ive ’ interchangeabl y.
21
1
Fundament als
of
hardware
and
software
CD-ROMs
the
Write
cannot
the
Once
be
major
ROMs
contain
Read
changed
ROM
e
that
is
part
of
their
they
Compact
and
Disk
Rewritable
to
be
sold
back
with
up
can
are
(stored
be
CD-R
data
be
saved
comes
to
on
is
as
CD-
and
CD
hard
that
or
dust.
Compact
that
allow
personal
you
of
during
disks. However, the
so
where
amounts
light, heat
erased. Many
drives
such
damaged
of
of
from.
drives
types
are
variety. ey
signicant
(CD-R)
on)
programs
created. is
easily
exposure
also
are
optical
Recordable
to
can
they
store
(CD-RW )
written
CD-RWs
are
from
of
or
( WORM)
name
can
data. However, they
handling
Many
once
advantage
that
software
can
Disk
data
data
on
computers
regularly
disk.
Fig 1.19 Structure of a hard drive
Digital
H a rd
disks
a re
popular
for
use
with
any
and
laptops
since
they
s t o re
a
l a r ge
amount
H a rd
disks
ranging
f rom
700
kind
GB
to
of
1
TB
much
a re
n ow
c om m on .
External
h a rd
disks
available
internal
Optical
in
and
speeds
similar
to
disks.
A
disks
magnetic
can
store
media. ere
disk. Compact
drives
were
are
disk s
Optical
disk
c a p ac i t i e s
disk
because
much
are
drives
they
more
three
are
use
data
basic
also
lasers
than
types
known
to
store
most
ofoptical
as
optical
and
read
in
used
already
be
ver y
familiar
with
one
digital
data
type
more
data
feature
and
than
lms
replacing
to
used
gaming
for
storing
software. ey
CD-ROMs, enough
can
a
referred
DVD
ROM,
read
e
by
a
be
put
on
as
digital
video
linked
DVD-ROM
storage
fact
that
pictures,
VHS
can
that
DVD. ey
to
a
video
TV
dr ive
capacit y
the
as
tapes
a
are
or
and
is
played
monitor.
linked
to
a
DVDs,
technolog y
main
result, DVDs
computer
of
which
disks.
programs
holds
digital
are
cassette
movies, and
CD-ROM,
massive
the
to
holds
player
like
the
distribute
DVD-V ideo
better
will
for
often
with
data.
Y
ou
are
a re
known
n ow
(DVDs)
in
full-length
c a p ac i t y
Disks
of
store
data.
Versatile
c om p u t e r s
reason
DVD-
data
and
is
computer.
coupled
produces
DVDs
replaced
of
videotapes.
compact
disk
music. ere
used
only
of
the
CD
that
computers. is
(Compact
CD-ROM
stored
audio
is, though, another
with
CD-ROM
e
–
allows
Disk
you
plays
type
is
of
CD
known
Read-Only
to
your
access
up
as
favourite
that
is
650
Disks
theDVD
the
Memor y).
to
Blu-r ay
MB
a
is
stor age
f or
stor ing
we re
des igned
s e ve r al
c apacit y
of
up
distr ibution
of
v id eo
f eature
data.
by
(BD)
lms
that
c an
be
to
hours
1 00
to
of
G B.
game
v ie wed
re p lace
vid eo
Its
main
s of t w are
in
using
use
a nd
high-d eni t ion
resolution.
Many
audio
to
computers
CDs, but
mean
audio
the
CD
CD-ROM
term
format
that
you
can
only
drives
CD-ROM
which
tracks. CD-ROMs
means
22
any
with
are
use
is
stores
data
play
always
taken
data, rather
read-only
the
can
than
media, which
on
the
disks.
Flash
USB
are
memor y
(Universal
also
ash
known
Serial
as
drives, and
Bus)
jump
can
be
ash
memor y
drives, memor y
convenient
drives
sticks
or
alternatives
to
1.5
Flash
memor y
ese
cards
games
are
inserted
cameras, mobile
the
contact
unique
numbers
in
size, and
to
1
their
TB. e
appropriate
many
are
not
and
other
called
a
cameras, video
music
SIM
number, along
and
text
storage
various
type
digital
example, contain
Module, also
phone’s
into
computers, MP4s, digital
phones
phones, for
Identity
storage
cards
consoles, laptop
Mobile
Secondar y
and
a
players.
Subscriber
card, that
with
data
messages. ese
capacity
ranges
stores
such
cards
from
devices, however, dictate
size
of
memor y
card
it
2
as
var y
GB
the
uses, so
interchangeable.
Fig 1.20 Optical disks can store large amounts of data and typically used for
storing digital data, movies and gaming software
hard
drives. eir
storage
256GB,although
ey
can
mostly
can
be
used
store
used
for
and
there
for
capacity
are
larger
storage
transfer
transfer
of
data
and
is
typically
capacities
data
computer
faster
8
to
available.
backup, but
les, since
than
the
CD
are
they
and
can
Fig 1.22 Flash memory cards vary in shape, size and capacity and can be used
be
read
by
many
devices.
in a range of devices
F lash
memor y
drives
combine
the
best
features
of
Cloud-based
the
memor y
devices
described
thus
far. ey
Cloud-based
large
amounts
of
data, are
low
(to
read, but
not
to
write), and
increasingly
USB
common
connection
with
drives
since
involves
storage
of
data
by
users
multiple
have
they
anywhere
in
the
world. e
location
of
this
data
is
not
known
by
its
owners.
become
use
computers
computers
electrically
exact
reprogrammable. ese
storage
cost, non-volatile,
on
fast
storage
store
a
and
standard-type
laptops.
If
you
have
used
Y
ouTube, have
used
a
based
e
mobile
storage
cloud
network
can
of
store
messages
you
have
is
Facebook, Twitter, Instagram
an
email
app, then
address
you
have
Gmail
probably
or
have
used
cloud-
already.
an
unlimited
and
interconnected
your
and
with
or
data
such
videos
access
to
at
the
as
any
powerful
specialised
school
remote
computers. Y
ou
work, photos, email
time, from
Internet. is
anywhere, once
saves
you
from
Fig 1.21 Memory sticks provide additional storage, and are non-volatile and
faster than most magnetic and optical storage media
deleting
data
from
your
secondar y
storage
device
or
23
1
Fundament als
transferring
W hen
stored
you
on
it
of
to
use
a
hardware
other
and
storage
cloud-based
single
software
remote
devices
to
storage, the
computer
free
data
can
space.
is
world, but
on
lots
of
dierent
computers. If
stops
working, your
data
is
still
cloud-based
stored
anywhere
cloud-based
Dropbox
15
GB
their
can
and
of
Google
stored
is
Drive
in
the
purposes. Users
change
may
storage
free. For
other
devices
and
storage, millions
of
people
in
the
wor ld
can
interact
with
the
at
the
same
time. Access
to
data
is
give
never
as
the
know
cloud
pay
amount
where
for
users
for
of
your
easy
the
their
data
access
pay
data
to
to
access
data
is
once
they
have
access
to
the
Internet.
example,
storage. However, businesses
data
backup
or
one.
immediate
Some
computer
on
application
another
your
one
from
computer
using
in
W ith
the
it
applications.
not
somewhere
access
As
about
of
have
your
any
data
type
of
with
storage, which
similar
email
messages. Storing
increases. Y
ou
be
you
a
security
storage, there
becoming
corrupted, whether
and
stored, but
with
as
is
always
the
accessed, deleted, stolen
an
error
addresses
sensitive
or
can
data
a
deliberate
receive
in
the
each
cloud
risk
or
act. Users
other’s
can
also
concern.
Table 1.3 Storage devices: advantages and disadvantages
Storage
Advantages
Magnetic
Hard
media
drive
Storage
getting
capacity :
many
gigabytes
many
terabytes
and
capacity :
Removable
Storage
getting
◆
Stores
and
◆
External
◆
Used
◆
Low-cost
retrieves
hard
drives
data
are
quickly
◆
Internal
◆
Not
hard
are
not
por table
por table
hard
capacity :
drives
many
gigabytes
and
to
back
up
data
on
hard
disks
storage
◆
Removable
◆
Relatively
and
generally
used
with
desktop
computers
por table
◆
Slow – so only used for network back-ups
◆
Can
cheap
be
they
larger
◆
misplaced,
are
Need
or
damaged
since
por table
specific
computer
Flash
drives
larger
Tape
Storage
Disadvantages
or
cable
to
connect
to
device
memory
Storage
capacity
typically
Storage
8
GB
to
of
USB
256
capacity
of
memor y
stick:
GB
memor y
card:
2GB
to
◆
Compact
shape
◆
Operates
faster
◆
Can
more
1 TB
hold
than
data
an
◆
USB
disk
◆
Some
optical
◆
Can
◆
Data
optical
than
an
memor y
do
be
not
easily
stick
have
requires
a
USB
por t
write -protection
misplaced
or
stolen
disk
Cloud-based
storage
Storage
capacity :
users
some
of
others
who
15
GB
for
applications.
pay
for
the
individual
Limitless
ser vice
for
◆
Users
can
the
from
anywhere
interact
same
with
the
in
the
world
application
at
or
can
be
accessed,
deleted,
stolen
corrupted
time
(continued)
24
1.5
Secondar y
storage
Table 1.3 Storage devices: advantages and disadvantages (continued)
Storage
Optical
Advantages
storage
◆
CD-ROM
(Compact
Storage
disk
read-only
capacity :
650
memor y)
MB
CD-R
(Compact
Storage
disk
650
(Compact
disk
650
Storage
versatile
MB
disk)
capacity :
4.7 GB
large
a
◆
Possible
CD-R
MB
DVD
(Digital
cheap
on
Good
up
to
17
◆
CD-RW
25 GB
up
to
100
can
Good
for
Excellent
◆
As
with
Blu-ray
GB
DVD.
Can
◆
for
As
CD
is
read-only,
(write)
one
up
to
the
Slower
◆
Should
session
a
files
erased
◆
and
reused
as
up
and
video
CD-RW,
of
writing
there
CD-R
◆
Should
access
have
times
a
a
software
cannot
be
CD-R
than
hard
recorder
drives
to
write
to
have
a
has
var ying
CD-RW
capabilities
recorder
to
write
disk
◆
CD-RW
◆
Has
is
does
not
replaced
quality
(storing)
data
deleted
disk
◆
to
files
showing
or
videos
◆
DVDs
do
◆
Requires
not
work
CDs,
in
all
CD
producing
than
work
players
better
CD-ROMs
in
CD-ROM
drives
DVD
Main
be
software
required
ways
was
feature
as
backing
of
on
data
than
be
CD-R
range
◆
changed
backing
◆
a
par ticularly
distributing
more
for
produce,
add
◆
◆
capacity :
to
times
data
Storage
of
many
GB
Blu-ray
in
Good
to
scale
way
◆
rewritable)
capacity :
Ver y
◆
recordable)
capacity :
CD-RW
Storage
Disadvantages
intended
use
films
is
for
and
viewed
in
to
the
distribution
video
a
replace
of
a
Blu-ray
player
or
optical
drive
games
◆
More
expensive
than
CDs
and
DVDs
high-definition
resolution
Questions
1
State
saves
2
List
the
general
programs
three
name
and
categories
for
data
of
the
type
of
storage
that
4
local
storage.
What
use
permanently.
5
type
in
Explain
one
associated
3
What
is
the
main
use
of
magnetic
of
digital
secondar y
cameras
advantage
with
using
storage
and
of,
is
mobile
and
most
suitable
for
phones?
one
cloud-based
concern
storage.
tape?
25
1.6
System
S yst e m
software
controls
Examples
and
is
hardware
of
utility
the
and
system
sof tware
name
how
given
all
software
to
other
the
software
software
include
that
works.
operating
systems
software.
Memor y
management
W hen
program
a
memor y, a
used
to
split
required
Operating
e
an
most
system
commonly
operating
used
and
system
system. W ithout
an
software
is
operating
or
called
the
blocks
secondar y
would
not
work. Popular
Microsoft
W indows
operating
10, Apple’s
versions
of
LINUX. Popular
Mac
mobile
OS
X
include
Apple
iOS
and
Google
are
to
to
t
into
main
can
into
blocks. e
swapped
storage
large
manageable
between
main
accommodate
be
memor y
the
program
management
each
device
has
a
program
called
a
driver
that
and
the
device
to
communicate
with
the
computer,
operating
the
systems
program
too
vir tual memor y
systems
allows
many
is
system, a
Since
include
data
called
data.
Input/output
computer
or
method
ow
of
information
among
devices
must
be
Android.
managed
Process
coordinated.
management
Process
the
and
management
CPU, checks
on
and
signals
when
File
management
allocates
processes
the
CPU
is
time
for
waiting
processes
to
use
the
to
use
CPU,
available.
Fig 1.23 Common operating system logos: from left to right they are Apple,
Windows, Linux and Android
Files
need
to
be
saved, copied, renamed
and
deleted. A
Booting
le
e
process
of
starting
a
computer
is
known
manager
perform
booting. e
rst
thing
a
computer
does
when
on
the
properly
power
by
button
following
is
to
certain
check
that
it
instructions
is
these
chip
known
as
the
BIOS. It
will
held
then
tasks
les
in
operating
system
to
tell
it
what
to
do
on
system
is
loaded
from
disk
to
look
memor y
operating
system
and
transferring
data
manages
the
organisation
for
or
is
specialised
software
that
tries
to
the
and
maintain
the
system
software. Examples
computer ’s
protecting
software
against
damage
caused
controlling
after
between
tasks
like
primar y
devices
like
output. It
hardware
keyboard
accepting
and
viruses, backing
software
has
up
stopped
les
and
working
recovering
(crashed).
input
secondar y
also
resources
and
sets
such
mouse, the
the
as
rules
1
Explain
2
Name
used, CPU
time
allocation
amount
and
e
disk
space
system
one
applications, games
or
other
how
all
programs
computer
operating
State
the
following
controls
a
the
b
a
name
26
system
software.
operating
system
and
of
the
term
that
matches
process
of
star ting
a
computer
software
work
one
system.
descriptions:
on
method
used
to
split
the
manageable
computer.
of
used.
control
operating
purpose
of
3
Sof tware
the
peripheral
mobile
memor y
by
(RAM).
supports
displaying
of
storage.
Questions
memor y
to
next. e
control
e
needed
sof tware
computer
Hardware
memor y
for
include
random-access
of
a
protect
operating
and
secondar y
Utility software
an
amount
working
Utility
ROM
the
you
the
turn
checks
as
blocks.
a
program
into
the
les
Dat a
Data
It
must
can
be
then
systems
processed
be
for
by
transferred
more
the
to
most
one
processing, for
or
suitable
more
output
means.
for
◆
processing
batch processing
system
is
one
where
data
together
in
a
batch
before
operating
run
(work)
processing
processing
is
most
suitable
for
tasks
where
amount
of
data
is
processed
on
a
desktop
regular
a
batch
job
begins, it
will
continue
until
an
error
process
systems
card
batch
utility
and
does
purchase
all
the
processed
as
examination
as
also
not
but
purchases. e
where
such
data
a
report
receive
one
bill
is
is
batch
systems
water
process
a
bill
card
for
monthly
until
it
bill
and
end
of
include
those
that
◆
in
each
for
separate
that
batch
held
the
same
credit
Computers
processing,
they
until
the
billing
bill
is
cycle.
so
are
that
are
for
program
example, using
program
while
a
graphics
executing
programs
using
two
or
simultaneously
time
when
the
computer
the
online
a
a
the
executing
same
allowing
network
two
time
more
to
using
than
access
or
only
one
the
and
it
is
peripheral
the
or
a
devices
main
can
more
one
user
same
processor
on
le
a
at
the
computer
you
can
o, then
are
to
processing
are
online
processor
interact
example, when
button
you
modem
to
operator
turned
if
real-time
connected
from
Jobs
for
at
online, for
may be left running without human interaction.
not
time:
one
running
and
month’s
online
is
same
than
time.
Online
an
scheduled
more
include:
batches. e
If
be
the
processors
computer
Once the data is submitted for processing, the computer
can
at
still
multi-user:
data
◆
allowing
multi-programming:
electricity, payroll
Advantages
◆
same
is
systems. Credit
through
collected
the
and
billing
created
at
the
occurs.
processing
bills
companies
customer
card
of
controls
publishing
is
programs
Examples
system
multi-processing:
◆
completed, or
at
basis.
more
W hen
mainframe
a
◆
large
the
starts.
program
Batch
on
is
a
collected
program
multi-tasking:
to
A
same
storage.
Other
Batch
the
time.
computer
or
access
1.7
processing
with
they
you
are
connected
to
when
turned
on,
them. Printers
are
ready
print. Most
press
and
turn
receive
printers
the
oine. Y
ou
to, say, the
to
have
machine
can
also
Internet
on.
be
through
network.
busy.
A
real-time
processing
system
signicant
delay, making
processing
system
computers
to
it
processes
always
data
without
up-to-date. Since
a
Disadvantage
◆
ere
is
always
returned
since
a
delay
batch
before
jobs
are
work
is
usually
processed
stored
up
period
of
be
connected
to
one
or
more
process
data, then
it
must
also
be
online.
over
However, note
a
must
and
that
online
does
not
necessarily
imply
time.
that
processing
delay
with
an
is
real-time
online
since
there
system. Examples
may
of
be
some
real-time
Time-shar ing
processing
A
time-sharing
system
allows
many
users
to
share
systems
systems, electronic
on
a
single
computer. Each
user
is
given
a
slice
of
CPU
fast
that
reser vation
time
by
the
each
user
computer. e
seems
to
be
the
computer
sole
user
works
of
the
so
include
aeroplane
landing
control
time
fund
transfer
systems
and
ticket
systems.
computer.
Advantages
One
example
bankcard
of
a
time-sharing
system, which
allows
system
is
hundreds
a
bank’s
of
people
to
◆
No
◆
Information
signicant
is
delay
for
always
response.
up-to-date.
27
1
Fundament als
of
hardware
and
software
also
Disadvantages
for
◆
e
computer
must
be
dedicated
◆
e
computer
must
be
continually
solely
to
the
be
used
easier
transfer
e
the
computer
users
will, at
some
to
transfer
les
between
may
need
to
time
or
at
home
to
some
such
storage, by
as
a
ash
using
a
memor y
their
school
work
network
secondar y
stick
les
can
the
le
take
size, the
Internet. Users
pages
from
is
le
important
up
a
large
amount
of
disk
of
the
longer
it
Internet
takes
will
to
also
send
know
via
that
containing
pictures
can
take
a
long
time
to
via
or
by
storage
popular
le
formats
give
smaller
le
sizes
a
others
because
they
are
a
compressed
le
type
cloud-
(Table
based
compression
single
computers. School
transfer
the
a
another,
than
computer
into
space.
load. Some
students
together
transmission. F ile
larger
web
need
les
online.
storage
Most
group
task.
because
Data
to
1.4).
device
emailing
the
work
Table 1.4 File compression
to
themselves
to
retrieve
when
they
are
at
school.
Type
Uploading
data
involves
transferring
data
from
be
computer
to
another
computer
on
the
network
of
data
to
Compressed
or
downloading
involves
receiving
compressed
data
JPEG
◆
(Joint
or
computer
the
from
another
Internet. Updates
Microsoft
Oce, are
to
computer
software
downloaded
on
the
network
packages, such
from
the
on
as
le
transfer
protocol
(F TP)
(see
transferring
to
reduce
of
a
is
le
for
known
are
the
le
data, it
size. e
storage, or
as
popular
le
for
is
also
sometimes
process
of
sending
via
the
compression. W inZip
programs
for
compressing
the
and
the
and
file
the
file
found
Internet
Network
image
computer
to
Video
digital
Graphic):
format
to
on
audio
file
for
listening
and
digital
of
MPEG
Group):
contain
audio,
(Moving
MP4
files
video,
Pictures
can
images,
also
and
can
data
Questions
State
each
2
the
of
most
the
a
printing
b
a
computer
c
a
printer
State
the
suitable
following
400
is
cheques
that
of
processing
mode
can
suitable
for
employees’ wages
access
in
and
term
the
Internet
turned
for
transferring
one
28
you
are
data
from
using
the
process
combining
each
on.
of
another
the
program
3
Suggest
each
following
descriptions:
a
b
for
examples:
plugged
most
type
on
Internet
computers
Exper ts
text
1
a
find
devices
Versions
◆
W inrar
les. ey
a
music
media
size
Internet,
and
(Por table
MP3:
◆
necessar y
reducing
Exper ts
image
3.2).
Music
Before
common
common
Internet
section
a
computers
PNG
◆
a
using
Photographic
to
Group):
your
format
the
Graphics
Internet, while
le
your
to
the
of
the
the
of
reducing
les
most
for
suitable
following
a
a
picture
b
a
video
of
c
a
recording
of
a
a
the
storage
size
or
of
a
le
compressed
format
les:
family
bir thday
of
a
par ty
song
by
a
and/or
transmission.
school
choir.
for
Application
Y
ou
have
seen
W indows
is
of
the
to
do
or
desktop
as
this
that
sof tware
specic
is
an
essential
we
tasks
use
–
a
regular l y
for
has
example,
term
sof tware
Application
sy stem
computer
publishing. e
applic ation
program.
oper ating
for
software
is
word
an
number
as
work.
been
for
or
such
to
Most
of
years
multiple
processing
can
users
application
such
and
applications
information
created
sof t ware
Some
be
at
that
enables
the
the
same
programs
error
available
(bug)
anywhere
or
time. Popular
(software)
are
free.
online, where
updated
examples
given
in
by
of
Table
1.5.
applic ation
dened
computer
generally
even
accessed
as
any
Customised
program
is
are
1.8
sof tware
to
carr y
out
one
and
custom-wr itten
or
sof tware
more
specic
tasks.
Customised
that
General-purpose
most
popular
been
applications
to
any
used
anybody. e
are
those
that
are
organisation
or
business
and
can
–
for
word
programs
you
use
at
school
the
a
word
for
a
and
programs
software, because
software
for. For
processor
school
specic
tasks
and
for
database
are
examples
of
general-purpose
software
can
be
customised
by
automating
certain
parts
or
the
software
modules
purpose
perform
or
writing
and
adding
programming
processing, databases, spreadsheets,
presentations, drawing
programs. ese
to
be
of
home
modied
software
not
that
by
general-purpose
user. Word-processing, spreadsheet
programs
specic
is
sof tware
the
e
has
software
to
painting
are
the
known
user
example, you
write
a
–
will
as
letter, or
to
what
want
design
to
perform
specic
tasks.
such
In
general-
decides
might
be
to
to
a
use
use
poster
contrast, custom-written
known
written
bespoke
for
militar y, in
and
play.
as
other
use
nancial
used
of
by
air
thousands
reser vation
are
of
not
trained
software
be
ver y
write
of
need
to
be
tailormade
aircraft;
software;
is
(for
in
a
before
to
an
create
can
be
than
a
use
the
of
may
it
the
software;
users
specic
that
ights
airline
design. ese
of
and
these
kinds
engineers)
expertise. Since
take
or
a
banks
eciently.
include
manage
the
in
business
long
time
this
it
can
to
used.
sof tware
Specialised software
rather
to
organisation
and
as
involves
software
eld
software
such
computer-aided
particular
to
it
able
example, accountants
specic
costly
also
accounting
and
also
equipment, or
controllers, who
Specialised
task
organisations
medical
general-purpose, since
software
are
of
trac
for
is
software, is
institutions. It
users
examples
tailormade
specic
hospitals
training, since
Other
in
or
software, which
is
written
range
of
solely
for
a
specic
functions. Examples
include
Fig 1.24 Data in online applications such as Google docs, sheets and slides can
be updated in real time and shared with multiple users
the
will
General-purpose
it
has
been
used
software
by
is
millions
much
of
cheaper
people
over
because
a
software
only
Another
would
on
allow
your
you
example
only
allow
mobile
to
would
you
phone
manipulate
to
be
an
play
for
and
online
that
your
share
card
camera. It
the
photos.
game, which
particular
game.
29
1
Fundament als
of
hardware
and
software
package. Although
Integrated
integrated
Many
computers
are
sold
with
for
a
installed. Integrated
program
application
and
that
(for
database)
includes
software
all
example, word
and
brings
Suite
are
the
examples
the
major
together
Oce
of
is
types
into
and
large
their
software
main
companies
application
software, it
such
programs
as
choosing
a
you
single
are
to
Microsoft
in
sell
software
any
decide
carr y
software.
together
programs
Choosing
of
Adobe
integrated
the
out
a
decide
then
e
as
these
are
sold
as
is
not
true
integrated
software,
also
still
separate
applications.
term
processing, spreadsheet
them
software package. Microsoft
Creative
such
integ rated software
as
already
packages
sof tware
for
whether
a
to
particular
what
choose
important
one
tool
should
it
the
is
no
job. Just
use
a
you
dierent
as
drill
task, so
most
when
be
with
actually
construction,
a
hammer
software
need
appropriate
choosing
in
or
from
to
to
you
need
produce, and
program. is
programs
to
use
for
is
ver y
your
coursework.
Table 1.5 Popular application programs
Type
Word
of
software
Examples
processing
Desktop
of
application
Microsoft Word,
publishing
Microsoft
Adobe
Google
Publisher,
programs
Docs
Google
Purpose
Writing
Slides,
letters,
Producing
repor ts
and
newsletters,
other
leaets
documents
and
posters
PageMaker
Databases
Microsoft
Access
Spreadsheets
Microsoft
Excel,
Searching
Google
Sheets
and
Commonly
crunching’
.
sor ting
used
Also
for
data
nance,
used
for
budgeting
creating
and
models,
so-called ‘number
simulations
and ‘ What
if?’
queries
Graphics
Microsoft
Adobe
Computer-aided
design
Paint,
Adobe
Illustrator,
AutoDesk
Photoshop,
Adobe
AutoCAD,
Painting
DesignCAD
Producing
(CAD)
and
Integrated
Microsoft
Oce,
Adobe
and
Creative
Suite
software
All
major
minimal
PowerPoint,
Prezi
can
plans
for
–
are
be
or
plans
models,
of
programs
closely
related
transferred
often
buildings
or
–
in
or
word
and
the
3D.
in
Used
the
processing,
output
embedded
into
by
design
cars
spreadsheet
from
each
engineers
of
the
other
various
with
errors
Delivering
software
e.g.
application
database
programs
Microsoft
detailed
architects,
the
and
Presentation
drawing
InDesign
normally
slideshows
using
a
large
and
presentations
to
an
audience
–
screen
Questions
1
State
the
most
suitable
term
for
each
of
the
following
2
Name
two
applications
that
can
be
used
online
and
descriptions:
shared
a
software
that
is
written
for
use
in
among
users.
specic
3
What
type
of
application
software
would
organisations
b
software
rather
that
than
a
is
written
range
of
solely
for
a
specic
a
creating
presentations
b
monitoring
task
weather
Meteorological
c
a
program
that
application.
30
patterns
functions
includes
all
the
major
types
of
Oce.
for
the
you
use
for:
User
User
interfaces
are
found
wherever
digital
technolog y
Sof tware
exists. How
you
interact
with
and
use
this
inter faces
technolog y
Software interfaces
is
controlled
by
the
as
the
human–computer
interface
interface
involves
various
ways
of
capturing
data
booted
between
a
user
and
the
interface
device
therefore
can
be
even
up
and
audio–video-based, depending
application, meaning
that
it
can
as
Since
a
user
system, it
interface
interface
helps
or
a
the
be
a
have
◆
be
◆
have
a
◆
have
instructions
that
◆
have
a
layout
an
attractive
simple
user
to
an
online
forms
navigational
to
Alexa
of
interact
are
with
on
four
for
data
systems
their
main
◆
command-line
◆
menu-driven
◆
graphical
the
computer
interfaces
entr y, dialogue
in
some
interfaces
vehicles
and
talking
Echo
speaker
unit.
types
of
software
interface:
interface
interface
to
use
quick
user
interface
(GUI)
design
Command-line
response
inter faces
time
are
easy
to
consistent
if
there
Hardware
are
multiple
cameras
that
of
and
were
a
such
special
discussed
hardware
controller
(Fig
touchpad, joysticks
interface
that
as
device
with
1.25). e
and
hand
carries
out
(Fig
touchscreens, sensors,
keyboards
are
in
the
a
user
layout
grips
the
to
type
in
a
special
language. is
command-line
special
of
for
new
W indows, it
interfaces
computer
is
called
dicult
users. In
W indows
recent
PowerShell
1.26).
input
chapter. An
interface
of
the
together
various
using
makes
use, especially
versions
earlier
you
screens.
inter faces
Hardware interfaces
require
understand
to
user
with
a
language
games
been
both.
commands
example
interact
interface. Software
Command-line interfaces
devices
has
should:
◆
digital
system
hardware
combination
user
operating
on
ere
interface, software
the
the
through
Amazon’s
the
computer
graphical,
such
text-based, or
the
computer
include
system. e
after
or
or
transferring
available
(HCI). A
loaded, allowing
user
are
computer–user interface , also
has
known
1.9
inter faces
is
a
buttons,
form
the
functions.
Fig 1.26 An example of a Windows PowerShell command-line inter face
Menu-dr iven
A
menu
is
what
you
as
easy
an
a
list
want
of
to
inter faces
options
from
which
do. Application
alternative
to
learning
you
can
programs
program
use
choose
menus
commands.
Fig 1.25 Hardware inter faces include games controllers with buttons that
per form various functions
Menu-driven interfaces
were
developed
to
tr y
to
31
1
Fundament als
make
can
the
of
hardware
interface
control
the
and
friend lier
computer
by
software
and
easier
choosing
to
learn. Y
ou
Windows
commandsand
A
available
options
from
a
menu, using
the
keys
on
window
document
keyboard
or
a
mouse. For
example, depending
is
a
set
of
options
may
appear
on
for
you
to
make
another
choice
(Fig
or
until
you
reach
your
nal
screen
message. Most
the
whole
programs
screen
that
holds
its
own
computers
now
use
or
(Fig
can
1.28). A
be
window
resized, moved
can
or
take
shrunk
1.27). is
(minimised). Each
continues
the
the
up
screen
of
onyour
window-based
choice, another
part
a
time
you
open
a
folder, you
see
its
selection.
contents
be
open
you
in
at
want
copy
les
a
new
the
to
window. More
same
move
from
time. is
from
one
one
window
is
than
window
particularly
window
to
one
to
useful
another
or
can
if
to
another.
Fig 1.27 Menus allow you to make a series of choices from a list which
produces another list until your nal selection
Menu-driven
visual. An
interfaces
example
is
an
can
also
be
automated
verbal
rather
answering
than
service,
Fig 1.28 An example of two window-based programs (word processor and
where
for
you
press
another
1
on
the
keypad
department, or
0
for
for
a
department, 2
the
spreadsheet program) that are open at the same time
operator. ese
Icons
interfaces
can
be
easy
to
follow
but
can
become
An
confusing
as
the
number
of
menu
options
increase
on
you
need
to
retrace
your
previous
icon
screen
click
user
a
tiny
(Fig
way. For
computers
are
now
user interface (GUI)
regarded
use. e
for
as
the
main
type
beginners, and
drop’ data
require
a
and
lot
A
GUI
also
of
a
among
interface
GUI
to
simple
number
cut
with
WIMP. Figure
icons
and
an
object
that
is
displayed
1.29). Normally, you
can
use
the
icon
on
the
example, by
icon
of
the
using
the
Microsoft
mouse
Excel
to
spreadsheet
and
will
start
the
program.
graphical
it
is
presently
which
include
can
its
paste
take
slow
is
easiest
ease
or
of
‘drag
to
use
and
processing
longer
functions
1.29
menus
on
or
shows
the
than
steps
an
necessar y
required.
and
Pointers
example
computer
of
a
desktop.
Fig 1.29 Icons allow you to easily recognise programs in a graphical user
inter face (GUI)
32
in
double
applications. However, GUIs
tasks
of
a
comprises Windows, Icons, Menus
called
GUI
the
user
of
with
because
memor y, which
time. Sometimes
because
of
ability
les
of
supplied
installed
features
of
inter faces
program, you
All
picture
options.
some
Graphical
is
and
1.9
Icons
are
designed
users. Instead
you
have
Icons
are
to
do
not
folders, the
of
to
make
having
is
to
things
remember
remember
just
for
recycle
easier
what
the
programs. ere
bin
for
computer
Pop-up menus
User
inter faces
(Fig 1.30) are activated by clicking anywhere
commands, all
on the document screen using the right mouse button.
icons
Some standard commands and options are available on
are
look
icons
(wastebasket), disk
like.
these menus, including the cut, copy and paste commands.
for
drives
and
printers.
Pointers
e
most
common
pointing
device
is
a
mouse. As
the
Menus
mouse
An
advantage
of
using
menus
in
W indows
or
on
is
that, for
most
programs, the
rst
few
menus
in
the
same
order. ey
also
carr y
out
the
pointer
example, the
other
matter
le
things, to
which
menu
is
program
rst
create, save
and
and
you
are
enables
print
a
menu
e
menus
item
menu
(such
pulls
are
as
activated
‘F ile’)
down
just
by
using
you
can
scroll
down
below
through
the
left
the
pull-down
menus
on
or
pop-up
ver y
important
part
to
control
the
of
computer
select
text
in
a
a
GUI, as
and
to
document
spreadsheet, and
to
pointing
include, graphics
devices
pens
button.
for
create
use
Improving
it
choose
or
cells
in
a
drawings
and
shapes. Other
with
tablets, joysticks
touchscreen
and
devices.
inter faces
item, and
companies
spend
a
great
deal
of
time
and
items. More
produce
tr ying
to
improve
the
interface
so
that
the
additional
computer
pull-down
a
the
mouse
menu
various
can
screen.
you, among
eort
complicated
is
items, to
Software
you
the
document.
clicking
the
around
using. For
digital
Pull-down
moves
same
window
functions, no
pointer
are
enables
always
moved, a
a
e
Mac
is
is
easy
to
use. An
important
part
of
this
is
to
menus.
design
so
that
are
the
they
work
used, and
People
the
use
screen
pleasing
be
system
the
exactly
menus
computers
design
and
and
and
the
are
for
application
same
always
many
screen
way
in
hours
colours
for
hardware
the
visually
interfaces
a
time
same
be
place.
visually
colours
to
become
they
day. erefore,
must
impaired
have
programs
each
the
soothing. However, some
impossible
audio
software
might
see, therefore
useful.
Questions
1
For
each
is
hardware
a
of
the
combination
a
display
b
pressing
c
shouting
with
2
Explain
following,
inter face,
of
a
what
on
code
a
on
it
or
a
printer
a
keypad
command
cer tain
whether
inter face,
both:
screen
a
indicate
software
to
a
to
open
device
a
door
which
responds
actions.
would
cause
a
menu
to
confuse
a
user.
3
State
what
a
WIMP
b
GUI.
the
following
terms
mean:
Fig 1.30 A pop-up menu from Microsoft Word
33
1.10
We
need
human
and
computer
life:
from
travelling
system
to
Ty p e s
uses
produce
and
green
pack
data
of
systems
preparing
to
work
machines
or
to
output, such
of
trac
eggs. A
computer
in
school. For
accept
as
lights
or
a
the
network
ever y
example, a
as
system
one
a
of
cars
control
usually
point
arm
four
which
systems
computer
information
system
is
collection
of
data, its
responsible
processing
into
Types
the
overall
management
and
this
applications
and
are
elds
output
earlier
in
knowledge
this
to
decide
appropriate
based
on
their
in
input,
needs.
of
computer
systems
information
systems
can
be
chosen
to
suit
for
users
and
tasks. ey
are
also
classied
by
information,
their
and
and
discussed
apply
another.
dierent
the
were
now
computer-related
Computer
A
points
can
to
transports
to
rst
chapter. Y
ou
processing, storage
red, amber
robot
e
various
instructions
the
moving
from
aspect
maintaining
input
changing
communication
through
almost
meals, to
s yst e m s
distribution
of
processing
speed, storage
and
portability.
this
information.
Mainframe
Computers
manage
rate
and
large
than
communication
amounts
manual
of
devices
information
systems, such
as
can
at
a
therefore
the
faster
ling, sorting
is
term
CPU
capacity
and
originally
or
frame’.
computers
supporting
mailing.
‘main
referred
with
hundreds
or
simultaneously. ose
mainframe
prevent
and
to
are
built
the
mainframe
administrators
will
and
mainframes
full-time
W hen
choosing
a
computer
information
system
application, you
need
to
what
hardware
output
◆
what
is
used, such
as
for
input, storage
used, including
the
custom-written, general-purpose
and
choice
and
of
what
processing
what
human–computer
◆
which
◆
what
34
people
is
takes
are
specialised
place
required.
and
and
direct
they
for
are
their
zEnterprise
between
may
only
to
system
the
storage
such
as
physical
are
therefore
banks, airlines,
departments
expensive
to
peripherals
connect
the
access
secondar y
ver y
users
components
ows
government
is
used
what
work
not
at
they
do
called
desktop system
is
easy
a
to
to
use
buy, and
operations, maintenance
single
and
speeds
access
of
(Fig
to
nd
hard-disk
multiple
3
1.32)
and
data
ts
sizes
sizes
on
are
an
need
and
computer
oce
of
1
main
sizes
TB. Most
(CPUs)
use
is
for
desk.
tasks
increasing
storage
processors
and
personal
maintain. Its
primar y
GHz. eir
work, games
and
computer, a
user. Memor y
contain
school
a
buy, upgrade
uncommon
now
interface
involved
spare
IBM
of
systems
simply
(RAM)
◆
data
or
for
software
◆
the
of
large
consider:
It
is
thousands
as
ver y
CPUs, capable
devices. Users
have
are
containing
a
devices
software
such
with
cabinet
upgrades.
Also
◆
–
sta
Desktop
particular
even
large. Organisations
universities
Fig 1.31 Information systems are now an essential par t of oce work
several
remotely, and
computer. Primar y
extremely
the
Mainframes
breakdowns. Data
communication
to
are
but
of
8
it
GB
computers
working
oce
and
entertainment, Internet
communication
(including
is
email).
1.10
ey
can, however, be
linked
in
a
network
with
more
Embedded
Types
of
computer
systems
system
powerfulcomputers.
Anembeddedsystemis
computersystemthat
specic
functions. ese
embedded
called
an
as
a
part
power
connect
the
to
reliability
and
can
washing
a
dedicated
designed
systems
device. ey
and
may
or
Internet. e
performance
be
found
in
trac
drive
interface, while
of
may
or
not
aim
the
two
therefore
consume
be
is
device
ver y
able
to
little
to
increase
the
device. Embedded
watches, printers,
ATM
and
one
hardware
main
machines
large
embedded
others
are
may
digital
vehicles
lights. Some
for
complete
machines, banking
four-wheel
as
of
embedded
processing
devices
is
a
use
and
installations
devices
simple
have
menu
even
such
no
user
systems
or
touchscreens.
Fig 1.32 A typical personal computer
Questions
1
Mobile
State
the
most
suitable
type
of
computer
for
each
devices
of
Mobile devices
(also
called
handheld
devices)
include
laptops, notebooks, netbooks, tablets, smartphones,
the
following
a
used
b
ver y
by
descriptions
secretaries
large
capacity
for
of
computer
general
computers
oce
with
systems:
work
several
CPUs
e-readers
and
games
consoles. ey
are
similar
to
c
personal
computers
but
are
smaller, lighter
and
consumes
may
batteries
so
that
they
are
not
restricted
to
ver y
little
processing
power
and
contain
or
may
not
be
able
to
connect
to
the
being
Internet.
connected
to
electrical
outlets.
35
1.11
Common
Troubleshooting
computer
basic
hardware
computer
problems
Pr inter
is
pr inting
receiving
power
but
is
not
correctly
problems
1
A
number
of
simple
problems
can
occur
when
Ensure
the
cartridges
a
computer, but
a
few
checks
can
be
identify
the
possible
cause(s). ese
checks
whether
the
problem
can
be
technical
or
if
there
may
be
a
need
to
seek
If
the
laptop
need
Ensure
or
when
that
the
mobile
power
power
connector
device
and
device
is
on
plugged
plugged
into
suppressor, check
outlet
Make
can
as
sure
be
the
is
turned
is
installed.
is
poor, the
ink
or
toner
cartridge
to
be
replaced.
printer
settings
for
ink
cartridge
alignment,
cable
is
the
back
connected
of
the
into
the
to
and
that
done
monitor
power
that
the
turned
the
by
a
power
are
correctly
a
or
Briey
bypass
the
low, check
options
are
the
set.
provided
print
to
set
quality
the
quality
print
being
used
from
the
printer. Draft, Normal
Best
are
examples
of
print
quality
you
may
see
an
inkjet
printer.
or
Some
printers
use
W i-F i, so
check
on
the
display
outlet.
to
see
if
the
printer ’s
W i-Fi
is
connected.
surge
strip
is
connected
If
no
paper
1
Ensure
2
Check
3
Verify
is
seen
when
you
tr y
to
pr int
on.
electrical
testing
or
strip
–
is
the
computer
electrical
used
quality
on
it
outlet
with
is
no
parts
of
the
printer
are
open.
working. is
another
device
that
paper
is
correctly
placed
in
the
printer.
such
that
the
correct
data
cable
is
being
used, and
printer.
the
4
quality
orientation, margins
panel
3
toner
does
5
an
correct
print
the
for
power
to
the
If
and
Ensure
it
that
paper
of
respond
If
or
print
being
2
ink
assistance.
Computer,
1
more
further
4
not
or
rectied
3
immediately
one
can
may
determine
contains
performed
2
to
printer
using
surge
suppressors, power
cable
is
connected
to
the
computer
and
the
strips
printer.
and
extension
cables
in
turn, which
connect
the
4
computer
the
directly
computer
to
turns
the
power
outlet, to
verify
Ensure
that
Several
printers
Tr y
using
another
power
cable
that
is
suitable
device. If
needs
the
correct
may
be
installed, and
the
power
turns
on, then
the
required
printer
in
the
Ensure
(Fig
1.33).
cable
problems
the
printer
driver
is
installed
on
the
computer.
2
Ensure
or
3
that
outlet
Check
and
that
the
paper. Y
ou
the
may
to
be.
is
an
not
remove
may
see
see
printer
could
and
if
paper
plugged
is
turned
stuck
the
need
error
lights
is
printer
paper
printer
Y
ou
printer
the
the
cartridge
36
the
you
print
replacing.
Pr inter
1
the
selected
for
window
the
have
printer.
must
on.
choose
5
you
that
to
is
in
a
the
remove
stuck
indicate
strip
printer. Open
the
under
on
power
on.
component
message
may
into
the
what
that
ink
the
holds
or
cartridge.
monitor
the
toner
or
error
Fig 1.33 Check that the correct printer has been selected
dialogue
1.11
Pr intout
1
Change
2
If
the
is
blank
the
ink
problem
assistance
require
toner
cartridge
persists, seek
since
an
or
Batter y
the
nature
experienced
For
further
of
the
technical
problem
technician
or
a
of
may
the
new
Figure
Monitor
1
hardware
problems
adapter
devices, check
batter y. Move
while
to
view
shows
the
laptop
the
some
the
is
of
amount
arrow
connected
remaining
phases
the
cursor
over
to
charge.
batter y
use.
problems
screen
Check
press
the
the
turned
has
mobile
the
icon
1.34
computer
problems
and
in
batter y
power
printer.
Blank
laptops
charge
Common
monitor
button
on. If
to
the
power
ensure
power
light
that
light
power. Alternatively, if
if
the
is
the
–
it
is
o, then
monitor
on, then
monitor
is
the
monitor
light
is
Fig 1.34 Dierent phases of battery use
blinking
may
be
or
in
in
a
dierent
power
save
colour, then
mode. Press
a
the
key
monitor
on
the
e
keyboard
2
or
Check
the
ensure
that
to
an
the
move
the
monitor
the
monitor
cable
monitor
outlet, power
data
power
strip
cable
connections. Check
or
is
cable
surge
is
to
◆
connected
suppressor. Check
connected
to
the
Ensure
the
computer
electrical
another
need
charging
outlet
is
working
by
mobile
adapter
the
device
◆
the
batter y
detected
the
or
◆
or
replacing
if:
is
or
shuts
o
when
the
unplugged
powers
icon
device
o
soon
indicates
after
that
use
a
batter y
is
not
found.
testing
Tr y
with
may
laptop
power
correctly.
3
batter y
mouse.
another
cord
of
the
same
make
and
model. If
device.
the
batter y
charges
then
the
power
cord
may
need
replacing.
Screen
1
difcult
Monitor
settings
colour, contrast
2
Ensure
are
that
near
to
to
no
the
read
may
or
need
to
be
adjusted
(such
as
brightness).
strong
sources
monitor
–
of
such
magnetism
as
speakers
Questions
and
1
ampliers.
3
Monitors
sources
should
such
as
be
fans
can
kept
and
cause
vibrate. Nearby
away
from
uorescent
the
power
screen
sources
external
lamps
image
should
power
to
check
for
be
appear
turned
2
You
Monitors
facing
see. e
light
and
minutes,
o.
Give
then
one
videos
your
possible
on
your
phone
cause
for
this
found
a
replace
printer
Since
your
car tridge
your
printer
empty
still
enclosed
needs
car tridge
ink,
in
you
its
decided
with
the
one
you
does
not
print
interference.
bright
sources
of
light
such
lights
monitor
can
should
make
be
the
images
turned
away
However,
the
printer
still
on
as
the
windows
45
powers
pack aging.
found.
4
watching YouTube
about
problem.
and
to
been
for
suddenly
to
o
have
phone
radios. ese
to
You
dicult
from
paper.
Explain
why
this
problem
may
occur.
to
strong
sources.
37
End
1
Multiple
1
Which
choice
of
the
temporarily
a
of
chapter
questions
6
questions
following
store
exam-style
enables
instructions
a
computer
and
a
i
b
ii
c
i
d
ii
input
c
memor y
d
peripheral
Which
how
of
all
the
following
other
software
controls
computer
programs
c
operating
system
only
only
and
iii
peripheral
Questions
3
and
Which
the
hardware
a
i
only.
to
5
printer
uses
ink
that
fades
over
time?
only
b
ii
c
iii
d
i,
only
only
ii
and
iii.
software
Each
of
the
system
following
unit
and
has
its
screen
integrated
with
keyboard except:
devices.
are
based
on
the
following
a
personal
computer
b
laptop
c
mobile
d
notebook
devices:
computer
keyboard
phone
keypad
computer.
touchpad.
9
Which
of
the
devices
contains
only
a
block
of
Which
of
the
contain
a
i
b
ii
c
iii
i
digits
and
following
systems
relies
on
precisely
buttons
positioned
that
marks
on
a
form?
symbols?
a
EPOS
b
MICR
c
OCR
d
OMR.
only
only
only
and
ii
only.
10
4
only
iii
and
the
d
printers?
data?
8
3
non-impact
works?
b
iii
are
devices.
application
ii
following
devices
a
i
the
hardware
b
d
of
to
7
2
Which
Which
of
the
devices
is
not
suitable
for
the
Which
of
the
following
holds
the
temporar y
visually
operating
instructions
for
the
computer,
its
programs
impaired?
and
5
a
i
b
ii
d
i
is
ii
the
Light
c
Sound
d
Touch.
Questions
38
c
RAM
d
ROM.
main
method
to
use
these
devices?
The
process
of
star ting
a
computer
is
k nown
as:
Laser
b
iii
CPU
only.
11
ii
ALU
b
only
and
What
a
only
iii
i
data?
only
c
a
the
6
dot
and
7
are
matrix
based
on
the
following
printer
a
memor y
management
b
software
control
c
booting
d
crashing.
types:
12
The
MPEG
le
laser
a
graphics
thermal.
b
music
c
text
d
video.
format
compresses
which
type
of
data?
1
13
Softwarethatis
is
madefor
use
inspecic
organisations
18
called:
Circle
the
most
following
a
customised
b
custom-written
c
integrated
a
data
access
d
appropriate
is
retrieved
storage
the
term
from
devices,
beginning
proceed
required
The
type
of
inter face
that
allows
a
user
to
exam-style
in
each
of
questions
the
of
the
the
sequential/direct
device
data
to
will
be
star t
read
from,
computeror
deviceusing
a
in
a
sequence,
until
it
reaches
the
data.
interact
b
witha
touchscreen
An
example
of
a
direct/sequential
access
storage
is:
device
a
chapter
specialised.
and
14
of
statements:
When
from
End
is
a
hard
disk
drive.
graphical
c
b
hardware
c
menu-driven
d
software.
Direct/Sequential access storage devices access
data immediately without having to read data from
the beginning through to where the data is located.
19
Shor t
answer
Figure
at
15
Explain
the
16
Complete
meaning
the
appropriate
1.35
illustrates
an
access
device.
Data
is
stored
questions
of
the
following
device
from
term ‘IPOS
sentences
the
by
each
position
on
the
device.
cycle’
.
using
the
most
list:
Fig 1.35
a
A
__________
records
voices
for
presentation
a
software.
b
A
__________
controls
c
A
__________
is
used
multimedia
to
type
data
to the right, write the letter found in each position.
projectors.
for
b
a
A
__________
reads
information
from
a
A
c
__________
i
ii
remote
is
used
in
ight
If
the
simulators.
the
iv
graphics
d
tablet
Categorise
(D)
a
each
storage
of
the
device
or
following
(M)
examples
storage
as
either
media:
be
and
from
the
write
rst
the
location
output
in
(C),
each
the
were
if
the
data
from
was
1
to
8,
what
accessed
in
order:
the
is
appropriate
no
order/a
on
the
diagram
is
speed
to
response:
specic
order
to
how
the
data
device.
illustrating
sequential/direct
The
numbered
output
82567.
stored
The
17
accessed
6783
Circle
is
microphone.
is
arrows
positions
There
keyboard
the
following
i
reader
ii
joystick
vi
data
would
control
microchip
iii
v
the
position.
smar t
card.
e
If
follow
document.
d
Starting from the rst position at the left and moving
access
access
serial/random
to
data
the
on
access
or
data.
this
device
would
be
fast/slow.
A
DVD/magnetic
type
a
b
c
of
tape
is
most
suitable
for
this
access.
d
39
A
PT
E
R
C
H
2
I N F O R M AT I O N
2.1
Data
Dat a
is
raw, unprocessed
numbers
26, 29
know
what
mean
just
in
or
the
and
30
three
about
degrees
events
and
even
Information
facts. For
represent
anything
the
is
information
numbers
Celsius, the
–
dates
number
processed
of
of
data. We
represent
such
◆
example, the
as
the
–
do
they
students
daily
could
temperature
interschool
data. e
not
in
sports
three
three
indicate
what
type
of
clothing
to
wear
or
based
how
Data
on
many
the
temperature, how
exam
processing
is
papers
the
the
average
print
for
manipulation
information. So, taking
nding
to
close
of
one
the
of
the
three
the
each
of
◆
questionnaires:
◆
products:
of
how
warm
the
days
to
contents
value
term
keeping
all
the
has
system. We
come
time. Common
systems
W hat
information system
are
examples
collected
across
examples
dictionaries
these
been
is
labels
origin
and
obtain
above,
gives
have
any
manual
telephone
in
to
of
in
order
to
provide
common
useful
is
collected
for
the
culture, leisure, work, research
systems
information
directories.
is
and
the
customer, the
is
information
the
decision
making. ere
information, including, for
◆
measurement:
of
that
data
have
information
formal
and
used
many
of
cost
of
of
distribution
and
the
value
more
valuable
the
information
the
may
be
organisation
willing
to
pay
can
to
is
charge
more
to
the
Internet, two
has
changed. e
elements
been
reduced
cost
of
to
for
get
in
this
distributing
dramatically
for
may
have
value. An
may
include
or
online
pictures
and
newspaper
links
to
stor y
other
stories
on
web
additional
the
graphs
same
topic.
use
information
is
collected, it
is
often
for
it. In
order
directly
for
it
to
to
the
be
person
who
wishes
useful, information
to
must
relevant:
it
must
be
what
the
user
needs
to
know,
planning
sources
be
up-to-date
of
◆
accurate:
◆
timely :
it
must
be
and
word
of
information
problem-solving
output, cash
communication:
be:
life. In
mouth, meetings, announcements, inter views
40
the
as
correct
as
possible
example:
sales, productivity
informal
include
providers. Also, ‘free’ information
receipts
◆
can
displayed
ever yday
mainly
are
ingredients, quantities,
quickly.
rise
chain
and
and
research
dosage.
more
it. Also, customers
◆
organisations, however, it
market
information.
purposes
and
cost
purchaser. e
communicated
Information
and
information
the
Once
(output)
containing
and
an
record-
information
(input), processed
polls
been.
given
of
opinion
are,
value
e
in
keep
exams
to
examples
have
trends
can
W ith
indication
and
class.
data
numbers
reports
tips, research,
diseases
production, the
cool
hurricane-preparedness
newspapers, media
chronic
classes.
numbers
publications:
e
therefore
PROCESSING
◆
before
opportunities
complete:
problem
it
or
should
must
are
a
provided
critical
stage
for
is
reached
lost
represent
solution
be
a
‘whole’ picture
of
a
2.1
◆
in
an
using
appropriate
an
whether
◆
appropriate
by
printed
cost-eective:
more
medium:
than
the
the
should
be
communication
material
value
cost
it
of
or
in
its
◆
medium,
storage
should
information
and
◆
device
information
involved
delivered
indexing
text
as
a
◆
other, less
information
that
can
be
commodity
bought
or
as
abstracting
and
reference
materials
such
as
formal, publications
bulletin
such
boards, which
as
in
subject-
some
cases
may
commodity
replace
An
such
information
ser vices
databases
specialised
Information
systems
and
encyclopaedias
be
collection.
full
retrieval
Dat a
is
an
sold. For
item
of
the
more
traditional
journals.
information
example, with
online
Questions
information
you
may
have
to
pay
a
charge
ever y
time
1
that
you
access
that
Explain
what
is
meant
when
data
is
said
to
be
information.
relevant.
e
major
types
of
information
for
sale
are:
2
Name
two
relevance,
◆
databases, especially
banking
and
other
that
give
demographic, tracking
would
data,
determine
other
if
it
is
than
useful.
What
is
the
term
given
to
an
item
of
information
and
that
buying
that
of
nancial
3
information
characteristics
can
be
bought
or
sold?
trends
41
2.2
A
Va l i d a t i o n
common
into
a
problem
computer
with
system
and
ver if ication
manually
is
that
it
is
entering
ver y
easy
data
to
Sof tware
ere
incorrect
data. Examples
include
users
and
hardware
mistyping
are
two
types
of
or
address
in
a
database
so
that
letters
are
the
wrong
person. However, it
is
also
possible
for
to
misread
a
barcode
and
therefore
not
information
to
might
previously
data. Hardware
may
develop
a
fault
(often
that
corrupts
data. Examples
include
bad
provide
sectors
any
here. Software
corrupting
a
intermittent)
device
or
sent
entered
to
error
a
malfunction, erasing
name
errors
input
on
a
hard
disk, bad
memor y
or
a
power
surge.
theuser.
e
application
when
that
data
may
is
appear
retrieved
to
it
accept
is
data
correctly
but
corrupt.
Errors
Transmission
Errors
occur
in
any
computer
information
Transmission
ere
are
several
approaches
to
dealing
with
errors
(so
errors
do
few
that
errors
that
they
occur
(so
approaches
are
cause, specically
do
not
that
occur)
they
can
and
be
errors
occur
when
data
received
is
not
the
the
problems
errors
system.
same
as
that
transmitted
by
the
sender
(Fig
2.1).
preventing
detecting
when
corrected). Below
a
considered.
Fig 2.1 Illustration of transmission errors
Data
entr y
Sometimes
errors
data
Validation
cannot
be
automatically
scanned
into
Data validation
the
system
the
data
for
storage, so
a
common
way
is
to
input
directly
into
the
computer
system. Data
as
transposition
errors, would
then
an
operator
enters
data
using
a
data
for
keyboard
errors
before
up
digits
and/or
letters. For
accuracy
example, the
may
data
be
entr y
entered
as
23. Other
requirements
07/01/2019
as
July
1
are
2019
errors
not
or
7
occur
clear. Do
Januar y
entr y
errors
can
be
either
you
interpret
2019?
accidental
or
of
upon
errors
occur
unintentionally :
Range
or
faith, but
a
in
command
is
issued
by
most
Deliberate:
user
data
mistake, in
if
errors
are
made
knows
to
get
around
entering
ctitious
solutions
permissions
check
data
ensures
range. For
to
42
method(s)
is
being
of
to
use
will
entered.
that
the
data
example, when
a
month
numbers
include
a
check
data
into
to
this
imposed
by
vigilance
cross-referencing
sources.
of
of
the
data
entered
is
within
of
the
you
enter
year, the
a
a
number
range
of
is
1
to
12.
check
whether
age
of
the
a
data
child
at
obeys
specied
preschool
criteria.
could
be
disgruntled
a
4
problem
the
years
old, but
not
14
years. Reasonableness
company ’s
are
therefore
used
to
detect
doubtful
data.
include
operating
administrator
with
tests
example, the
Data
system, better
reliable
methods
any
checks
the
dierent
deliberately, then
enough
checks. Examples
database. Possible
access
or
conrm
good
about
le
not
is
For
employee
unreasonable
does
error.
probably
validation
be
deliberate.
is
the
are
appropriate
Reasonableness
◆
may
check
acceptable
entered
that
processed. It
data. ere
what
corresponding
Accidental
is
ese
certain
◆
(data
it
when
Range
data
of
number
depend
32
checking
and
validation. e
mixes
computerised
occur
the
when
the
entr y
incomplete)
errors, such
is
type
other
type
check
and
supposedly
is
is
also
known
check. W hen
a
as
a
character
database
is
or
alphanumeric
created, each
eld
will
2.2
accept
into
a
a
specic
eld
correct
will
an
data. W henever
will
example
error
have
of
database
type, for
not, then
data
the
type
to
that
alphabetic
message
be
check
will
be
or
data
it
is
is
of
entered
the
would
check
numeric. If
displayed, and
It
it
is
the
re-entered.
and
the
useful
to
still
not
claim
working. In
been
have
information
‘Unemployment
should
has
be
made
for
this
on
in
a
Validation
consistency
the
‘Are
benets
you
and
verication
check
unemployed?’
benets
if
example, therefore, either
or
cross-
claimed?’ elds, since
unemployment
input
to
this
is
a
deliberate
you
you
an
are
error
attempt
Table 2.1 Examples of valid and invalid data types
Field
Date
name
of
bir th
Percentage
Type
Valid
data
Invalid
Date
19/10/1994
19/19/94,
Numeric
56,
A+,
99
to
claim
benets
of
consistency
while
still
working. Other
examples
data
Pass,
or
checks
are:
23
125,
–15
◆
Single
mothers
with
children
can
claim
for
mark
childcare
children
Notice
that
a
type
check
is
not
a
ver y
good
are
many
entries
you
could
put
in
type
e
data’ column
check
data
length
type
eld
characters
be
but
are
is
is
dened
that
or
Table
clear ly
check
2.1
that
to
store
the
checks
are
would
pass
the
Only
usually
data. Any
alphanumeric
if
a
xed
these
would
performed
is
type
employees
are
paid
overtime. Check
elds
correspond.
on
check
can
be
example, ever y
be
assigned
check
data.
check
of
entered. It
extra
length
only
of
zero.
full-time
Presence
important
maximum
number
the
incorrect.
particular ly
exceed
lost. L ength
alphabetic
in
not
the
the
that
‘ Valid
is
that
validation
◆
check. ere
allowance. Check
on
to
department
used
person
a
each
ensures
on
in
any
a
the
data
eld
in
particular
a
is
entered
in
record
the
actually
database. For
database
department. erefore, a
employee’s
is
that
could
must
presence
ensure
that
a
form.
Table 2.2 Examples of valid eld lengths
Field
name
Student
Maximum
length
ID
Valid
data
Invalid
data
6
826025
82–60–45
2
B+,
A++,
Format
is
Grade
C
check
the
correct
number
A
or
consistency
more
elds
check
check
to
9
compares
make
sure
the
that
contents
they
make
of
two
may
represents
also
called
identies
check
an
inconsistency
errors
and
compares
data. For
discrepancies
new
data
with
example, checking
corresponds
to
the
birth. Consider
the
check, since
age
the
the
calculation
age
from
employee
it
Employment
of
check
four
digits
Status
unemployed?
benefits
of
years
the
example, a
format
number
and
X
national
ID
999-9999-X999, where
represents
an
alphabetic
veries
may
that
example, a
the
data
password
long, therefore
result
in
an
entered
for
a
entering
is
the
credit
three
correct
card
or
may
ve
error.
digit
check
digit
is
an
extra
digit
added
to
the
end
No
claimed?
working
occupation
have
digits
a
code. It
is
used
to
detect
errors
arising
from
Yes
and
also
to
ensure
that
codes
originally
12
produced
Current
format. For
a
transcription
Number
entered
Form
of
Unemployment
been
record:
A
you
has
check
length. For
be
entered
date
is
Check
Are
data
mostly
entered
the
the
sense. It
data. is
previously
that
following
in
that
character.
Length
is
veries
Fail
in
Consistency
check
by
a
computer
are
re-entered
into
another
Foreman
computer
correctly. It
is
calculated
from
the
other
43
2
Information
digits
in
barcode
the
processing
number. Check
digits
are
included
delete
in
or
numbers.
it
les
may
the
computer
display
verication
of
a
its
summar y
validity
Interpretation
Before
they
the
must
responses
be
may
edited
to
ask
of
input
before
of
‘Are
the
you
data
data
coded
questionnaires
and
coded
before
sure
and
is
[y/n]?’
ask
for
stored.
data
can
the
be
analysed,
data
entr y
Fig 2.2 A barcode showing a check digit
process. e
no
doubt
as
person
to
coding
what
these
should
be
responses
should
entered. is
may
have
sound
Ver ication
simple, but
Data verication
as
transcription
medium
or
guarantee
is
errors
device
that
the
to
the
checking
when
data
for
is
mistakes
copied
another. Verication
entered
data
is
from
the
following
case
(Fig
2.3).
one
checks
correct, it
consider
such
only
do
not
checks
Fig 2.3 Coding involves assigning a label to each question
that
you
the
data
should
completed
some
entered
be
aware
matches
source
data. erefore,
if
the
original
form
incorrectly, then
the
entered
data
verication
that
the
checks
despite
being
was
may
Coding
pass
incorrect.
as
1
in
a
you
One
way
to
guarantee
that
the
data
entered
source
data
entr y. Data
checks
some
each
conrm
where
entered
a
the
Visual
they
is
with
correct
has
that
many
can
it
the
also
to
be
pairs
to
a
the
their
two
other
data
be
that
rst. For
enter
password
to
applications
program
do
a
As
example,
passwords
that
such
decide
for
as
label
to
each
response, such
‘no’. Sometimes, people
‘can’t
what
to
remember’ or
do. It
could
will
write
‘unsure’, and
either
be
ignored,
new
code
and
value
could
be
added
to
the
question.
(data)
program
entered, the
of
can
double
the
same. In
be
of
method
of
user
is
not
another
books
are
example, consider
classied
Reference. is
a
database
be
11
to
being
information
where
store
as
the
the
Alternatively, the
a
librar y
where
Fiction, Non-ction
could
be
corresponding
longest
database
stored
eld
as
or
text
length
in
would
classication, ‘Non-ction’.
classications
could
be
coded
like
this:
match
Classication
Code
Fiction
F
Non-fiction
N
Reference
R
re-entered.
is
to
use
entered
is
on-screen
entered, it
not
personnel
redisplayed
to
is
by
it
the
not
in
Coding
space
user
information
required
information
needs
to
and
in. For
know
reduces
speeds
coding
what
the
the
up
to
the
amount
of
storage
process
of
typing
work
correct
properly
codes
the
ever yone
are.
reliable
check
verication
and
re-entered.
ver y
will
or
instructions. For
redisplayed
read
document. Accidental
prevented
is
correctly. If
incorrectly, it
entr y
is
is
prompted
verication
source
of
data
been
data
that
conrmation
44
data
set
has
data
information
against
a
any
method
since
the
values
screen. e
entered
is
users
compares
the
verication
prompts. After
conrm
using
response
must
2
a
checks
Another
the
are
called
against
require
more
list
twice
entr y
application
there
that
procedure
second
that
produces
on
a
applications
twice. e
so
is
is
‘yes’ and
assigning
matches
or
the
for
involves
read
it
Problems
the
shared
carefully
errors
asking
example, if
In
for
you
tr y
two
among
people
with
data
organisations, information
received
to
associated
various
need
to
use
is
constantly
sent
and
departments. Traditionally, if
the
same
le, the
rst
person
2.2
who
it;
found
the
le
to
only
to
the
that
data
that
L et
a
other
locate
the
the
data
One
the
le
18%
at
adjust
the
W ill
in
when
who
over written
which
of
by
both
are
data
teacher
will
erase
the
in
accessing
(Fig
2.4).
in
IT
teacher
Geography
from
to
the
Fig 2.4 What happens if two people want to change data at the same time?
main
accepted?
can
lead
rst
who
appear
subjects!). W hat
records
changes
not
access
received
second
saved
be
manner
the
the
the
course
in
of
les?
Taitt
in
verication
drawer
may
both
mark
received
changes
this
saves
Amerra
a
and
the
mean
may
data
were
96%. e
mark
both
data
teacher
to
persons
access
use
returned
through
least, it
the
made
networks
both
to
rst
search
teachers
records
Data-sharing
accuracy
way
errors
the
that
adjust
69%
and
to
student
to
the
time. At
two
the
(typo
when
database?
good
that
for
also
cabinet!)
until
has
same
wishes
81%
happens
a
original
to
to
person
the
this
record
wishes
ling
waited
le, but
suppose
the
the
drawer. Computers
teacher
from
(in
person
neither
way. Is
us
le
Validation
to
are
will
saves
problems
have
the
changes
of
saved. e
the
marks
changes
made
by
last,
the
Fig 2.5 A well-structured database will prevent simultaneous access to the
rst
teacher. How
can
this
problem
be
avoided?
same database record
Good
one
W hen
the
databases
user
or
an
same
avoid
system
attempt
to
is
record, a
this
problem
access
made
a
by
message
data
a
by
allowing
record
second
may
be
at
a
person
provided
own
only
to
user ’s
access
(Fig
usernames
ere
time.
will
2.5).
sy stems
that
provide
shared
access
to
have
secur it y
users
from
features
in
place. is
not
author ised
computer
to
sy stem
access
vie w
or
should
to
data
which
modify. e
be
provided
passwords
For
example,
access
processing,
for
pr ivileges
to
a
student
cer tain
perhaps
the
login
depending
email
at
the
the
school
sof tware
facilities
process.
on
such
and
as
limited
data
access.
A
c lerk
will
have
access
to
student
pre vents
records,
gaining
and
access
allowed
Internet
must
also
le vel.
be
word
Computer
are
they
users
with
personnel
records,
Internet
access,
email,
are
of
and
pay roll
will
have
programs. e
network
administrator
the
the
highest
le vel
of
access,
inc luding
data
their
records
of
usernames
administration
and
and
passwords
secur it y
and
the
network
sof tware.
Questions
1
Explain
2
Give
3
Copy
the
an
dierence
example
and
Field
of
a
complete
Opening
b
Bulk
c
Standard
d
Centre
the
hours
orders
shipping
number
data
data-related
name
a
between
table
validation
hardware
below
by
and
an
Acceptable
to
verication.
error.
giving
8 am
data
example
of
valid
data
values
for
each
Example
item:
of
valid
data
4 pm
>250
3
to
5
days
999999
where
9
represents
a
digit
45
2.3
Many
are
of
Automated
the
output
devices
Other
is
An
printed
devices
output
is
in
a
example
copy
as
are
that
output
since
it
must
instructions
the
in
only
to
is
a
not
a
Chapter
hard
computer
monitor. is
printed
on
dat a
1
Optical
of
the
recognition
so
on.
document. Figure
copy
and
can
is
that
the
process.
called
paper
or
capture
mark
turnaround
electricity
recognition
are
often
and
used
2.6
document
optical
together
shows
used
an
to
character
in
a
turnaround
example
record
of
the
a
reading
on
an
meter.
soft-
other
material.
forms
how
a
reports, graphs, charts
Data-capture
ese
that
of
machine-readable, meaning
form
is
output
physical
to
discussed
human-readable, meaning
output
met hods
to
are
clear
enter
format
for
be
the
forms
designed
and
data
dates
so
that
their
concise, leaving
onto
could
be
the
no
form. For
specied
as
doubt
as
example,
‘dd/mm/yyyy ’
Fig 2.6 The meter reader has marked the reading as 7618 on this turnaround
so
that
the
format
‘mm/dd/yy ’ is
not
used
in
error.
document
e
responses
from
the
forms
are
called
human-
Another
readable
since
data
entr y
personnel
manually
enter
the
responses
written
capture
liable
on
the
forms. is
method
of
example
to
transcription
and
other
errors
data
is
entered
into
the
computer. One
multiple-choice
school
avoiding
transcription
errors
is
double
(data)
the
data
is
entered
twice
by
two
the
computer
will
only
accept
the
dierent
data
are
if
the
turnaround
document
a
human. It
but
is
has
has
then
newly
two
purposes. ey
verify
that
◆
added
the
has
update
is
some
a
back
into
a
accuracy
already
used
and
been
information
added
computer
information. ese
are
printed
information
sheet
by
the
on
to
to
it
it
and
lls
in
the
answer
boxes
using
a
is
then
returned
to
into
a
special
reader.
by
by
a
transfer
documents
of
ser ve
information
entered
already
entered
with
additional
data.
Fig 2.7 Multiple- choice exam sheet
46
examinations.
on
the
number, subject
multiple-choice
computer. e
to:
completeness
in
candidate
machine-readable
information
more
fed
this
◆
the
printed
document
document
that
computer
as
is
identical.
Turnaround
used
student
takes
the
grid
by
making
marks
in
the
pencil
or
ballpoint
pen. e
two
fed
A
sheets
people
form
versions
such
code
appropriate
and
is
entr y,
test
where
document
method
answer
of
turnaround
when
and
the
a
data
Information
is
of
the
the
examination
council
to
be
2.3
Optical character recog nition (OCR)
is
read
the
student ’s
pre-printed
the
form, whereas
optical
mark
is
used
to
read
the
the
answers
information
can
that
have
be
read
sheet
into
mark
is
printed
without
any
often
used
is
marked, and
need
for
measure
by
companies
and
record
and
scientists
changes
in
such
as
the
temperature, the
speed
at
which
the
ball
is
travelling
in
sports
such
as
cricket
and
baseball,
the
the
total
are
automatically
been
a
computerautomatically. e
capture
logging
conditions
added. All
dat a
recognition
to
(OMR)
of
information
Computers
from
methods
used
Data
to
Automated
amount
of
light
or
oxygen
in
a
room
or
even
the
human
level
of
noise
being
made
by
vehicular
trac
near
a
inter vention.
hospital.
Turnaround
documents
information
into
allow
cheap, fast
input
of
Data logg ing
a
computer
system. Data
can
where
printed
on
turnaround
documents
in
a
analysis
In
some
to
turnaround
industries, turnaround
replaced
by
small
handheld
mobile
devices. ese
display
screen
many
local
readers
day
visited
reader
meter
day
the
are
visits
readings
involves
on
the
a
to
the
be
to
the
of
the
issue
the
to
sign
signature
as
their
the
data
capture
reading
from
a
sensor
is
input
at
regular
of
the
data
can
then
environment
be
processed
(Fig
to
provide
2.9).
equip
she
the
end
a
be
the
meter
the
of
the
onto
with
package, the
captured
of
the
example
drivers
deliver y
proof
to
types
the
of
automatically
delivers
is
meter
customers
or
a
example,
start
bills. Another
that
database
automatic
being
have
computer. As
transferred
issue
courier
stylus
device. is
uploaded
now
computer. At
ser vices
devices. As
uses
the
can
computer
courier
recipient
addresses
into
devices
computers. At
into
are
keyboard. For
customers’ homes, he
readings
the
companies
downloaded
of
computers, including
touchscreen
and
method
documents
documents
pocket-sized
handheld
names
main
these
utility
with
the
and
a
barcodeformat.
inter vals. is
Alternatives
is
alsobe
document
digitally
and
deliver y.
Fig 2.9 This student is checking water quality using a sensor connected to a
data logger. This data can then be processed to provide analysis of chemicals
Fig 2.8 Turnaround documents are being replaced by small handheld
in the water
computers
47
2
Information
processing
Temperature
sensor
Input
Output
connections
connections
INTERFACE
Computer
Light
sensor
Fig 2.10 Components of a data logging system
A
data
via
an
logging
interface
logging
to
software
measurements
will
record
as
graph
a
system
the
or
a
a
computer
(Fig
and
consists
at
of
and
2.10). e
required
data. e
sensors
some
sensors
inter vals
results
can
connected
data
will
the
then
be
no
take
is
small
special
output
software
displayed
a
device
to
read
output
output
often
is
used
as
‘printed ’ on
microlm)
microche)
an
alternative
to
the
printer.
1
rather
or
a
sheet
than
roll
of
of
lm
paper. In
lm
State
to
drawback
microche
print
the
microche
of
(COM)
microlm
is
and
with
computer
that
a
it
takes
special
it.
which
method
also
(computer
addition
condenses
or
of
the
following
soft-copy
output
is
hard- copy
output:
to
large
a
human-readable
b
machine -readable.
output
being
stacks
of
Give
an
example
paper
readable.
48
or
or
(computer
2
faster, this
microlm
Questions
output
e
of
programming. e
microlm
special
viewer
amounts
table.
Microlm
Microlm
into
of
a
document
that
is
machine -
Fi l e
File
organisation
records, elds
and
and
access
relates
to
the
use
of
les.
o r ga n i s a t i o n
◆
add:
◆
update:
put
that
◆
A
eld
contains
a
single
data
item, and
many
the
key
a
record. Each
eld
used
to
eld
identify
has
the
a
name
and
already
one
A
record
is
a
collection
of
of
dierent
data
related
types)
delete:
data
item
for
and
treated
as
A
data
le
is
a
type
of
collection
of
records
holding
has
1
It
2
e
can
the
information
but
about
dierent
three
important
to
a
record
is
from
normally
update
value
is
or
the
used
delete. It
unique
record, the
eld. W ithout
be
permanent
records
of
secondar y
the
or
le
storage
Records
are
the
temporar y.
are
specially
device. is
delete
organised
is
called
on
Master
in
the
(or
located)
using
dierent
Many
businesses
modify
and
special
le
a
is
stores
and
store
given
names
in
main
the
master
master
le.
to
identify
the
record
is
a
eld
in
the
record
to
that
Student
record. For
ID
is
instance, in
normally
used
as
a
the
a
key
eld
to
identify
the
record
you
to
le
delete
or
update
records.
amounts
identify
which
of
is
master
or
matching
in
le
delete
the
(sorted)
operation
transaction
or
cannot
master
there
master
on
the
le
key
functions
the
a
transaction
record. If
the
in
master
le, compare
record
is
a
with
match, you
record. If
both
eld, then
this
correctly, but
le
is
that
if
can
les
record
either
unordered, record
work.
access,
les. ese
les
purpose. A
kept
key
records
les
regular ly
their
update
are
master
up-to-date. It
information, summar y
data
and
key
data.
le
permanent
payroll
organisations
large
permanent
the
transaction
or
ordered
the
and
cannot
primar y
update
le
are
accessed
you
matching
◆
remove
characteristics:
methods.
◆
eld
objects
organisation.
e
a
individuals.
le
elds
or
the
To
3
le
record
matching
want
want
A
a
processing.
key
or
master
of
exists
primar y key
student
same
the
a
whose
◆
into
contents
elds
you
single
the
record.
A
(possibly
record
is
Record
◆
new
2. 4
access
elds
◆
comprise
a
change
and
two
data, such
data
temporar y
contains
employee
as
types
employee
status
data, which
of
is
and
data:
personal
job
updated
data,
title
on
a
regular
basis,
Fig 2.11 Updating a master le with a transaction le
such
as
hours
worked
and
taxes
deducted.
ere
A
transaction le
is
a
temporar y
le
which
is
are
three
possibilities
when
updating
a
master
used
le:
to
update
end
le
of
the
each
updates
transaction
operations:
master
day
the
le
or
le
week, for
master
are
af ter
a
to
time
example). e
le. e
used
certain
records
perform
in
three
(at
the
transaction
the
important
1
Transaction
record
e
record
is
less
than
the
master
le
key.
transaction
Next
key
record
transaction
is
record
added
is
to
the
master
le.
read.
49
2
2
Information
Transaction
record
e
transaction
record
Write
is
equal
deleted
record
record
key
to
the
master
is, they
le
is
is
or
transactions
master
next
record
master
and
read.
greater
Table
some
lists
during
for
to
le
errors
2.3
than
the
on
master
this
new
master
master
to
le.
or
situations
which
of
data
the
or
in
transactions
through
on
file
encounters
file,
then
which
master
you
are
to
to
in
No
data
Ordered
M
Record
A
H
Record
B
Record
B
Record
G
Record
N
Record
H
there
is
A
sequential
in
sorted
le
order
sequential
update
on
searching
for
a
Record
update
delete
or
in
invalid
file,
and
it
is
not
does
not
primar y
transaction
reach
is
on
les
customer
exist
the
key
record.
end
before
of
the
transaction
you
in
are
the
in
If
the
end
file,
adding
file,
like
of
from
need
the
problems.
le
may
to
master
record
which
more
the
key
records
are
stored
invoices
number, and
class
elds. Examples
for
customers
registers
of
sorted
sorted
on
last
new
or
you
the
records
file
to
are
most
file,
or
your
be
add
file,
a
for
a
record
and
you
Tr ying
in
master
another, in
the
records
order
in
are
add
a
record
to
a
cassette
tape
or
watching
a
a
particular
o, you
must
section
start
at
or
continue
the
from
beginning
and
until
you
reach
the
specic
one.
for
a
record
search
for
a
particular
record, all
the
preceding
must
be
read. e
main
drawback
to
inserting,
or
amending
les
is
that
records
the
in
entire
both
le
serial
must
and
be
read
and
the
records
written
to
a
new
le. Since
disk
access
is
slow, computer
are
added
to
is
involved. For
into
be
time
a
read
insertions
wasted
instance, if
1000-record
from
from
the
the
even
old
if
10
le, then
master
transaction
only
a
few
records
1000
le
are
to
records
and
le, 1010
after
will
the
records
are
le
arranged
they
nature,
that
exists
simplest
which
ver y
file
organisation
organisation. e
left
for ward
records
the
its
current
10
is
by
the
have
organisation
sequential
not
find
sequential
access
Searching
be
and
is
corrupt
to
already
tape
either
then
searching
the
in
or
the
sequential
the
one
one
include
listening
you
deleting
master
50
you
you
records
updating
le
if
in
the
T
o
Serial
order
master
then
transaction
master
Ser ial
mainly
or
scan
file
location
stored
used
the
lost
other
be
day,
found
the
found
are
in
been
or
is
les)
the
file
master
you
have
can
useful
Record
where
If
data
also
for
le
Record
movie. To
the
that
les
serial
is
hardware
unordered
order.
can
just
record
made
le
name. Magnetic
If
list. Serial
are
particular
customers
purposes. Recording
le
any
called
for
memor y. A
transactions
restore
(also
invoices
shopping
tape, disk
backup
les
into
processing.
file’ marker
transaction
no
serial
sorted
Error
master
an ‘end
of
been
unsorted
Unordered
errors
not
typical
master
record.
Situation
the
a
which
record.
Table 2.3 Error messages during le processing
If
have
include
updated.
for
Processing
occur
is
key.
more
Read
key
Examples
record
Transaction
No
record
key.
master
Next
3
processing
type
one
were
of
le
after
added. at
written
to
time
insert
T
o
to
the
maximise
new
a
master
new
record
eciency
of
organisation, where
the
the
eld
value
of
the
key
le. It
with
therefore
serial
are
common
long
sequential
arranged
to
a
organisation.
processing, use
records
takes
all
in
order
records.
by
2. 4
the
Summary
of
reading,
writing
and
same
order
improves
File
the
organisation
eciency
of
the
and
access
updating
sor ting
process.
for
sequential
Read
◆
les
access
Records
are
To
read
from
the
beginning
of
the
le
1
the
desired
item
is
amend
If
accessing
a
All
record,
access
time
is
increased
to
entire
records
Write
le
are
or
to
many
be
records
but
decreased
if
quire
data
records
the
record
applied
accessed
to
the
end
However,
middle
records
amended
the
sor ting).
in
the
e
access
Adding
a
sequential
le:
with
a
key
value
less
than
the
record
the
new
to
of
it
the
of
is
the
le
dicult
is
easy
to
(may
add
or
are
read
and
then
written
to
le.
to
be
updated
is
read, any
changes
are
few
3
◆
in
read
2
the
record
found
be
◆
a
until
to
new
it
and
the
updated
record
is
written
to
le.
Finally, all
the
remaining
records
are
written
to
the
re -
new
delete
le.
le.
Deleting
a
record
Sor ting
W ith
◆
Sequential
les
are
often
sor ted
on
the
record
key
is
make
time
Adding
processing
consuming
a
simpler.
for
large
However,
sor ting
can
serial
to
create
les.
end
deletion.
To
delete
les, you
simply
add
the
new
record
of
the
le. However, the
les
means
major
purpose
is
that
to
preser ve
the
record
the
ordering
must
be
of
inserted
the
correct
serial
records
position
and
not
at
the
end
of
be
If
into
the
it
the
le
les. Also, you
in
create
sequential
a
new
algorithm
All
the
cannot
just
insert
all
le
for
records
inserted
e
les
into
the
existing
that
contains
the
adding
a
record
with
a
key
value
are
read
and
then
record
to
be
inserted
is
Finally, the
remaining
le
inserted
–
Updates
a
records
marked
in
a
serial
le:
record
with
a
key
value
of
the
record
(since
the
transaction
is
not
sorted).
le
the
record
to
be
deleted, then
write
that
the
the
new
le.
record
written
to
to
the
be
new
deleted
is
encountered
it
is
le.
Finally, all
the
remaining
records
are
written
to
the
le.
records.
delete
a
record
in
a
sequential
le:
less
than
the
record
All
to
the
new
written
to
the
new
are
written
to
the
records
with
a
key
value
less
than
the
record
to
be
deleted
are
written
to
the
new
le.
le.
W hen
the
record
to
be
deleted
is
encountered
it
is
le.
written
to
the
new
le.
the
Finally, all
the
remaining
records
are
written
to
the
are
normally
the
done
using
updates
are
magnetic
gathered
tape
in
together
Direct
le, and
then
applied
to
the
master
again
accomplished
new
le
which
contains
the
updated
direct
master
le
and
transaction
le
access
le, also
called
a
random
access
le,
access
to
a
particular
record
in
the
le
using
key. is
makes
it
much
easier
to
nd, read, delete,
records.
update
the
organisation
by
a
a
le
le
allows
together. Updating, therefore, is
access
into
A
transaction
creating
le.
record
mode. All
Sorting
the
le.
Updating
a
not
W hen
new
batch
omits
you
3
new
which
is:
written
records
each
to
not
3
records
changes
2
2
le
record
record
to
be
delete
as
1
1
to
le
To
e
a
deleted
is
new
must
way
le.
4
to
only
of
not
with
new
Compare
3
the
les, the
to
2
in
of
record
sequential
is
a
for
to
the
types
be
1
For
both
to
records
and
insert
records. e
le
is
organised
like
a
in
one-dimensional
table
on
disk
where
each
record
is
a
51
2
Information
part
of
index
the
to
processing
table. e
allow
you
record
to
nd
number
the
acts
like
a
table
organised
primar y
records.
key
record. It
Y
ou
can
access
a
record
directly
or
randomly
its
location
using
a
going
you
input
uses
it
to
location
directly
an
ID
the
mathematical
record. For
number, the
produce
on
to
disk
a
value
where
the
points
record
access
les
also
support
to
can
the
be
formula
Many
the
records
to
be
storage
direct
one
records
in
a
direct
access
le
after
are
access
or
descending
order, but
hard
audio
compact
not
sorted
songs
in
are
make
a
stored
must
be
to
disks, direct
access
disk, for
random
is
possible. W ith
example, you
order
or
go
hear. However, not
to
be
can
play
the
the
where
storage
the
location
key
(page
is
stored.
require
a
mix
of
sequential
records. Consider
with
three
a
le
containing
elds: ‘
Account
‘Balance’. Ever y
time
a
and
Number’,
purchase, his
or
her
customer
credit
limit
and
checked;
this
requires
individual
his
or
her
record. Ever y
month, a
statement
produced
for
each
customer;
this
requires
directly
to
the
access
only
must
the
random
access
to
records, but
be
organised
so
that
you
can
go
index
track
want
to
retrieve. is
can
the
le
organisation, as
on
a
to
is
a
special
record
at
the
beginning
and
run
get
to
the
song
you
want
to
of
records
with
two
and
in
the
the
storage
indexed
address
le. A
of
the
partial
the
highest
or
the
lowest
key
in
each
block
of
records
is
useful
when
the
itself
is
organised
sequentially. Ideally, you
want
to
have
the
index
in
main
memor y. en
you
can
tape. Y
ou
the
tape
the
index
quickly
to
obtain
the
storage
address,
for ward
and
you
key
record
containing
search
start
le
the
compared
magnetic
le.
itself
to
sequential
whole
medium
directly
be
the
you
index
you
to
the
value
until
book
to
an
index
for
to
a
index
in
corresponding
have
to
information
of
limit ’ and
to
attributes:
record
of
an
in
An
must
as
disk. e
order.
W ith
allow
index
pointer
the
accounts
sequential
want
the
used
on
another.
must
random
is
stored
by
access
ascending
a
processing
balance
e
where
customer
found.
sequential
read
like
has
applications
wants
allowing
just
table
and
formula
‘Credit
Direct
the
order
example, when
mathematical
that
in
(topic)
number)
and
is
ascending
by
value
calculating
in
then
retrieve
the
required
record
in
a
single
disk
hear.
access.
Summar y
of
direct
access
le
organisation
Searching
is
organisation
is
best
the
les
which
seldom
◆
les
which
require
change
in
frequent
search
◆
processes
◆
storage
record
enquiries
and
require
is
compared
index
key
that
with
the
comes
index
before
keys
the
to
one
nd
you
searching
for. en
a
linear
search
is
performed
updates
there
onward, until
the
search
key
is
matched
or
updates
until
which
key
highest
from
single
record
size
are
◆
a
for:
e
◆
for
fast
access
to
the
record
pointed
to
by
the
next
index
entr y
is
records
reached.
only
of
master
(such
as
le
hard
records
on
direct
access
media
disks)
For
◆
accessing
disk
le
records
sequentially
or
example, suppose
the
items
order
If
processed
directly, they
need
not
be
processed
in
An
in
52
a
sequential
indexed le
le. Y
ou
can
is
used
think
to
of
le
speed
it
as
a
are
in
a
supermarket
where
are
(Fig
stored
on
2.12). Y
ou
the
wish
shelves
to
nd
in
alphabetical
forks. Instead
of
order.
walking
Index
you
directly.
up
and
listing
(index)
which
aisle
down
of
what
each
is
in
aisle, you
each
look
up
aisle. is
at
tells
the
you
organisation
up
the
key
search
one-column
table
to
stop
listing
to
walk
looking
(Fig
down
once
2.13).
you
to
nd
have
the
found
forks. Y
ou
forks
on
know
the
2. 4
In
spite
by
this
respect
of
the
kind
to
a
double
of
le
access
search, the
sequential
le
(index
decrease
is
in
+
data)
access
needed
time
with
Summar y
sequential
and
access
access
le
signicant.
Instead
have
Highest
index
organisation
organisation
◆
Index
of
File
12
Apples
13
Bananas
15
Cherries
an
from
◆
of
entr y
the
L eave
having
for
lowest
spaces
in
an
index
each
or
block
highest
each
entr y
of
for
each
records
record,
starting
record.
block
to
allow
for
easy
key
insertions.
1
15
2
18
3
24
4
30
Table
a
19
Cups
21
Forks
23
Plates
2.4
variety
summarises
of
le
methods
of
access
to
a
record
for
structures.
Table 2.4 Searching for a record can be achieved through
various le organisations
File
structure
Structure
Access
method
Fig 2.12 Index sequential le access
name
details
Serial file
Unordered
Sequential
access
Sequential
access
access
records
Sequential file
Ordered
records
Par tially
Ordered
Sequential
indexed file
records
followed
first
by
record
sequential
desired
in
the
index,
access
group,
access
to
to
then
find
the
record
Fully indexed
Unordered
Sequential
file
records
followed
data
to
direct
access
by
to
direct
the
index,
access
to
the
file
Direct access
Unordered
A calculation provides the address
file
or
(location) of a record, followed by
ordered
Fig 2.13 Supermarket aisle signs are similar to index sequential searches
records
direct access to the record
Questions
1
2
Write
Why
the
are
connection
master
and
between
a
transaction
eld,
les
record
needed
and
in
businesses?
3
What
is
the
normally
le.
most
4
State
a
special
identies
name
a
given
record?
to
the
eld
the
following
of
le
organisation
for
each
of
the
descriptions:
records
in
that
type
arranged
which
they
one
were
after
in
the
order
added
b
records
stored
in
sor ted
c
records
stored
in
random
d
records
stored
with
denote
another,
order
order
director y-type
listings
to
location.
53
2.5
e
a
Information
processing
machine
An
or
example
when
the
of
data
into
processor
of
this
water
is
information
acts
an
processing
on
the
electric
temperature
occurs
input
kettle
reaches
it
when
receives.
which
boiling
senses
point
for
goods
exchange
and
of
ser vices, communication, and
information
with
other
people
the
around
the
world.
and
Table 2.5 Advantages and disadvantages of information
switches
o. A
car
production
line
can
sense
when
processing
a
car
body
is
in
a
certain
position
and
then
act
to
Advantages
weld
together
the
relevant
parts
of
a
car.
◆
processing
is
only
valuable
if
the
information
can
Tasks
can
and
and
retrieved
cannot
Setting
be
up
Before
changed
an
processing
setting
quickly,accurately
and
be
completed
It
◆
eciently
and
because
information
processed
accidentally.
◆
information
data
at
can
be
and
amazing
high
initial
equipment
training.
More
◆
money
speeds.
needed
Computer storage devices
specialised
can store enormous
operate
amounts of data and
information
up
an
information
processing
to
may
be
employ
staff
and
to
design
the
should
consider
the
following
computerisation
really
solve
questions:
the
processing
system, a
Automation
can
system.
be
introduced. That
W ill
a
in
system
◆
◆
need
investment
information for future use.
business
may
be
faster
stored
Disadvantages
Information
is,
Some
◆
tasks
lost
jobs
as
a
may
result
be
of
particular
can
be
completed
with
computerisation,
which
problem?
little
◆
Is
◆
How
it
cost-eective
in
the
long
term?
◆
◆
Is
◆
Can
large
high
is
the
amount
processing
speed
of
data
really
to
be
hand led?
present
sta
manage
the
Data
W ill
the
changes
caused
by
more
and
analyse
and
morale
◆
How
◆
W hat
can
of
the
computerisation
be
quickly.
of
jobs
be
hand led
information
done
to
help
sta
adapt
sectors
of
popular
shared
Face -to-face
◆
of
with
other
between
by
phone
or
information
through
can
be
can
use
such
on
as
the
bills
be
done
for
can
be
research
where
to
aairs
nd
almost
a
and
all
increasingly
paid
either
people
and
◆
maintain
◆
monitor
processing
patient
in
health
records
in
patients’ vital
care
may
hospitals
signs
◆
perform
computer-assisted
◆
research
and
◆
operate
use
which
education
assignments
and
◆
reports
fact, anyone
wealth
news, stock
banking
in
becoming
electronically. In
Internet
current
can
also
Internet. Other
classes
materials, online
54
is
where
submitted
the
may
be
reduced.
be
and
used
to:
clinics
in
hospital, and
at
home
processing
online
interaction
staff
information
processing
home
be
care
Information
business. It
at
must
retrained.
to
processing
Information
or
of
properly?
computerisation?
Examples
members.
staff
morale
sta ?
loss
be
staff
trained
the
lower
Health
can
lower
Some
◆
computers.
the
may
system?
can
◆
can
information
trends
important?
inter vention.
Management
new
◆
the
human
of
information
prices, educational
investments, shopping
implanted
allow
surgical
require
great
heart
enable
train
to
live
instruments
precision, for
tests
conditions
such
as
pacemakers
longer
during
example
operations
laser
eye
that
surger y
surger y
‘telemedicine’ through
conferencing
◆
medical
medical
devices
patients
control
and
◆
diagnose
computers
with
capabilities
surgeons
before
they
perform
surger y.
video
2.5
Information
processing
Banking
Computers
are
used
to
keep
transactions. Customer
ever y
time
a
payment
accounts
or
point
(EF TPOS)
sale
shop. e
to
the
then
to
made
that
of
of
card
sale
is
is
is
useful
inserted
(POS)
directly
the
all
bank
to
be
made
updated
whether
EF T (electronic funds transfer)
bank
point
of
need
transaction
cheque, card
of
track
from
shop. e
for
into
customers
a
reader
terminal. e
the
customer’s
procedure
is
as
by
at
in
the
a
attached
payment
bank
is
account
follows:
Fig 2.14 Using a bank card in a reader attached to a point of sale terminal
1
e
cost
of
up, usually
all
of
on
a
the
items
to
be
computerised
purchased
cash
is
added
register.
Payroll
2
e
customer
presents
his
or
her
debit
or
credit
Input:
to
the
shop
example
card
is
may
details, such
3
e
card
swiped
card
is
inserted
through
number
a
and
so
the
chip
magnetic
expir y
can
strip
date
to
be
read
e
card
reader
a
to
input
number, payment
company
bank’s
5
e
that
computer
customer
6
e
the
bank’s
account
7
If
the
has
sold
using
types
a
enter
key
computer
details
card
a
the
and
is
in
an
valid
goods
modem
four-digit
to
identity
looks
up
accounts
and
the
are
and
in
of
employees’
his
or
her
on
sent
to
telephone
the
the
the
line.
are
be
input
used
to
keypad
and
process.
has
and
or
paid
by
and
the
number
OCR
P rocessing:
rates
if
the
hour, then
timesheets
would
validate
the
number
of
hours
of
hours
overtime, possibly
using
techniques.
Using
spreadsheet
or
a
software
more
application
complex
computer
then
needs
earned
each
employee, any
such
database.
then
rates, bonus
the
customer’s
customer
account
salaries, pay
of
personal
continue
as
employees
by
as
tax, national
amount
earned
by
to
accounting
calculate
the
as
a
software
gross
bonuses, any
insurance, etc. and
each
such
the
amount
deductions
hence
the
net
employee.
enough
Output:
money
database
computer.
amount
identication number (PIN)
presses
a
the
OMR
the
from
or
worked
4
come
assistant.
payment
e
computer
would
need
to
print
pay-slips.
is
Use
an
impact
printer
if
the
pay-slip
is
required
in
approved.
duplicate
8
e
money
is
transferred
electronically
from
printer
customer’s
bank
account
to
the
company ’s
for
the
employee’s
signature, or
a
non-impact
the
other wise. Update
the
employee
database
using
bank
a
database
integrated
with
the
accounting
software.
account.
O utput
Sometimes
the
automatically
read
magnetic
strip
can
the
enter
magnetic
has
card
the
strip
card
been
reader
number
cannot
from
damaged, then
number
using
a
the
the
small
details
clearing
card. If
sales
the
assistant
bank
of
ser vice
accounts
summar y
payments
to
pay
using
to
money
a
banker’s
directly
electronic
automated
into
employees’
commerce. Print
reports.
keypad.
Librar y
Payroll
A
payroll
system
print
to
out
W hile
system
uses
calculate
pay-slips
accounting
an
the
and
purposes.
information
wages
record
of
each
the
processing
employee,
information
for
travelling
regular
activity
adjusting
for
the
online
their
digital
access
to
for
a
librar y
many
to
borrow
students, libraries
collections, ser vices
world. Most
for
their
books
sta
and
university
and
may
have
be
a
been
environments
libraries
students
via
provide
an
55
2
Information
processing
e-information
databases
for
for
article
and
allows
users
e-journals, e-books, and
online, digital
search
portal. is
or
and
e-librar y. In
request
then
a
travel
some
collect
it
if
articles
version
it
is
online
a
the
televisions, video
search
in
cases, users
paper-based
to
to
can
of
built-in
also
◆
the
button. In
All
available.
After
search
logging
in
to
the
online
librar y, the
entering
for
an
article
information
or
the
in
an
online
database
title
e
(tables)
magazines
key
such
of
a
as
a
journal
a
subject, the
or
entered
e-librar y
what
engine
a
management
to
do. is
can
system
control
engine
fast. Remote-control
locks
respond
which
the
from
ow
going
document
content
software
oers
formatted
libraries
also
indicate
if
a
to
or
name
or
a
it
Kindle
features
provide
book
links
copy
is
a
the
book
able
your
for
a
signal
the
key
to
operate
the
locks
on
the
doors.
of
Buildings
with
air
conditioning
have
sensors
which
an
the
temperature
and
humidity
inside
the
system
the
heating
or
air
conditioning
on
needed.
uses
search.
is
options
available
to
to
for
download
it
as
special
online
visually
impaired
images. Some
other
when
turn
have
browser, with
the
o
and
books,
device. Some
page
to
the
dierent
be
in
would
librar y. e
show
may
read
deliver
hard
the
about
conduct
may
you
audio
to
in
to
article.
databases
details
example, if
reading, then
PDF
online
journals
texts. For
e-reader
is
and
e
the
librar y ’s
containing
terms
Output:
online
have
by
or
P rocessing:
view
have
the
buildings
the
systems
stops
detect
les
audio
user
◆
author
the
and
and
from
can
to
recorders
systems.
cars
engine
room, remote-control
example
too
Input:
the
fuel
sitting
control
modern
tells
of
Librar y
the
e-libraries
or
online
and
may
available.
Fig 2.15 Control systems are around us all the time
In
Control
Y
ou
are
surrounded
probably
do
not
by
know
computer
it. Here
control
are
some
systems
◆
in
lights
vehicle
the
not
are
triggered
interacting
road
would
outputs. In
the
examples
trac!
program
sensor
detects
that
know
(Fig
be
with
2.15). A
ver y
by
useful
movement
the
trac
or
sensor
light
safe
if
it
sensors
or
from
embedded
control
did
not
system
digital
sensor
would
environment
the
system
to
the
To
do
which
oncoming
this, there
is
vehicles
has
constantly
to
be
looking
and
the
sensors
output
the
and
device
making
(the
trac
kitchen, microwave
tumble
a
have
digital
example, the
embedded
approaching
vehic le
needs
only
a
vehicle
is
there
or
not. So
an
at
decisions
lights)
dr yers
all
have
the
to
make
them
do
their
job
at
should
how
able
or
hot
to
tell
cold. It
or
how
digital
the
would
cold
it
temperature
system
not
be
that
able
the
to
tell
is.
of
information
is
usually
integrated
into
a
control
system
a
processing
which
has
sensors
to
input
information,
to
unit
the
(computer)
inputs, and
which
output
decides
devices
how
which
to
do
what
what
required. A
control
system
also
needs
an
interface
unit
do.
the
computer
and
the
input
sensors
and
the
machines
systems
the
be
hot
adequate. A
data
about
ovens, washing
control
only
is
is
computer
devices. is
unit
turns
the
signals
from
the
sensors
inside
into
them
press
something
that
the
computer
can
understand, and
of
the
56
lights
an
sensor
processing
output
and
sensors
stop
between
In
the
respond
is
◆
trac
whether
on/o
respond
the
of
of
e
adequately
the
many
systems.
Trac
the
examples
but
to
control
these
systems
signals
from
the
computer
into
something
that
will
2.5
work
the
make
all
output
parts
devices. e
of
the
system
purpose
work
of
with
the
interface
each
is
to
e
has
other.
number
changed
workers
e
processing
unit
in
a
control
system
may
be
which
has
a
program
built
into
it. It
you
not
change
be
like
the
the
computers
program
by
that
loading
a
you
need
disk. e
processing
in
electronic
unit
has
a
circuits. Such
a
new
is
program
in
their
electronics
called
controllers
to
do
the
to
a
designed
make
because
keyboard, a
been
to
tested
do. is
they
mouse
to
make
do
or
a
sure
makes
not
them
need
have
job
much
disk
screen. Once
that
it
elements
are
not
needed. e
that
are
being
the
a
the
Micro
and
as
take
monitor
readings
readings
now
doing
keep
the
activities.
to
at
the
regular
time
inter vals
computer. Sensors
temperature, pressure, liquid
may
be
ow
rate
and
on.
devices,
it
has
P rocessing:
decides
e
computer
whether
action
analyses
needs
to
the
be
readings
and
taken.
should,
will
be
e
computer
sends
output
signals
to
devices
the
manage
the
process
to
increase
pressure
or
screen.
temperature, for
Status
themselves, they
cheaper
system
outputs
controlled, not
than
the
only
which
things
changed. Rather
skills
example
Sensors
send
Output:
these
reduced. e
work
they
storage
behaves
of
an
so
were
tasks
running
measuring
one
also
areas
program
and
embedded controller . Embedded
have
been
such
program
resident
system
usually
in
use, where
Input:
its
needed
will
Industr y
from
and
repetitive
machiner y
usually
people
processing
a
the
computer
of
Information
display
actuator, which
example. Some
is
a
device
that
systems
reacts
to
use
a
an
computer
processor
signal
board
and
operates
a
simple
device
such
as
a
tap, motor
O
I
U
or
switch
to
regulate
liquid
ow.
N
T
P
CPU
P
RAM
U
Most
ON
of
these
systems
use
feedback, where
the
output
U
T
OFF
T
aects
S
the
input.
S
PAUSE
ROM
Automatic
door
Weather
Program
Sensors
to
detect
people
(inside
Sensor
to
between
Some
of
the
control
world’s
most
powerful
computers
are
used
outside)
to
forecast
the
weather, which
of
forecasts. People
improves
the
accuracy
people
who
rely
on
these
forecasts
include
doors
television
Door
forecasting
here
approaching
and
detect
stored
companies, shipping
companies, farmers, the
motor
militar y
and
outdoor
sports
organisations. Computer
Fig 2.16 A typical control system looks like this. Note that it does not have a
systems
are
also
used
to
track
hurricanes
and
tornados,
screen, disk or keyboard. The program is stored in ROM
monitor
Industr y
systems
Sometimes, in
is
controlled
Computer
repetitive
industr y, a
whole
automatically
manufacturing
tasks. In
by
a
manufacturing
computer
systems
electronic
do
circuit
process
global
of
recording
currents
for
are
automatically
put
tedious
circuit
boards
and
then
◆
It
speed
and
in
the
right
automatically
accuracy
at
◆
Computer
is
more
are
greater
than
those
of
which
skilled
place
the
workers
from
the
heat
soldered
by
having
these
advantages:
than
manual
data
collection.
data
can
be
collected
continuously
humans
in
by
soldering
may
situations
get
tired, and
not
safe
for
it
can
also
be
humans.
It
is
extremely
fast. Computers
can
easily
take
machines
workers. e
generated
automatic
several
data
into
of
measurements
in
a
second. is
means
danger
soldering
events
which
could
not
be
measured
by
a
is
person
removed
has
for
on
that
to
Niño. Automatic
forecasting
accurate
thousands
work
El
ocean
production, the
◆
position. e
weather
as
the
and
collected
the
such
monitor
system.
many
whereas
components
warming, and
can
now
be
recorded
for
analysis
later.
systems.
57
2
Information
processing
Table 2.6 Sensors and their applications
Sensor
Quantity
Temperature
Light
pH
sensor
sensor
sensor
Proximity
How
hot/cold
How
light/dark
The
sensor
acidity
Detects
If
the
Light
Detects
an
Detects
when
infrared
Weather
Input:
(PIR)
forecasting
Millions
of
is
it
Monitoring
is
Turning
liquid
close
Button
Passive
Application
is
an
object
collected
from
to
Detecting
button
is
pressed
being
object
a
pressed
passing
warm
object
the
moves
gate
into
an
example
pieces
of
a
Activating
a
(obser vations
satellites, weather
such
weather
radiation)
buoys. All
respective
an
it
is
oven
dark
a
vehicle
ticket
to
a
speed
burglar
these
at
traffic
paid
or
when
its
driver
is
car
lights
park
acceleration
alarm
if
oce’s
of
someone
ships
readings
meteorological
is
wall
balloons, aircraft, radar, weather
data
in
when
pollution
arriving
the
a
on
close
to
cars
Measuring
area
water
how
Obtaining
through
temperature
lights
near
Detecting
temperature, pressure, humidity, infrared
are
is
reversing
being
the
street
Monitoring
object
a
gate
pad
it
a
If
as
pad
of
how
another
Pressure
measured
are
and
sent
objects
enters
a
room
automatic
to
computer
the
systems.
stations, weather
Two-way
Hubble
Space
communications
Tracking
and
data
Telescope
relay
satellite
Two-way
communications
TDRS
to
space
ground
link
Two-way
communications
White
Sands
complex
in
New
Mexico
International
Space
Station
Fig 2.17 Data is collected from satellites orbiting the ear th
P rocessing:
rst
data
task
e
is
to
data
is
stored
perform
(validation)
and
a
to
in
a
quality
reject
large
database. e
control
all
check
invalid
on
the
Output:
and
e
local
forecasts
charts
of
data
is
formatted
to
t
in
with
a
numerical
readings. From
this
computer
model, forecasts
made. e
bulk
of
processing
is
businesses
58
solving
thousands
of
global
information.
stock
control
need
to
hold
stocks
of
goods.
need
to
hold
stocks
of
goods
they
sell, and
‘number-crunching ’
manufacturers
and
as
can
Shops
be
weather
produced
model
Most
of
normally
readings.
Supermarket
e
are
inter-related
equations.
need
to
hold
stocks
of
raw
materials
and
2.5
nished
goods
maintaining
they
stock
make. e
levels
is
task
called
of
recording
stock
and
◆
Goods
control.
to
a
must
not
be
minimum, a
money
invested
in
stock
deteriorating
stock
levels
also
overstocked. By
business
stock
Information
can
and
before
reduce
it
limit
also
can
storage
warehousing, heating, lighting
A
real-time
Input:
to
e
pass
e
barcode
on
scanner
and
computer
the
reads
the
sends
checks
product ’s
disk. e
control
at
the
barcode
up
stock
operator
name
it
a
each
code
code
name
and
the
of
risk
of
sold. Minimum
costs
such
as
security.
terminal
item
past
number
to
a
price
are
only
a
needs
laser
stored
scanner.
in
the
computer. e
and, if
and
price
amount
reduce
and
stocks
system
POS
directly
the
keeping
the
be
processing
it
in
sent
is
valid, looks
data
back
les
to
held
the
on
POS
terminal.
In
this
way
itemised
prices
used
are
usually
a
P rocessing:
As
so
reducing
can
needed
that
a
that
be
can
item
be
is
customer
can
provided
for
be
on
or
an
systems,
shelves
and
customer
keyboard
sold, the
ser vice
the
out
not
on
confusion.
that
can
be
read.
stock
can
can
changed
stock
print
POS
cause
mistakes
for
counting
with
keypad
queues. Few
can
marked
cannot
each
customers. Prices
bill
only
has
barcode
updated
terminal
items, which
terminal
if
POS
receipt. Note
individual
Each
the
be
be
are
much
made
easily. A
customer. No
on
les
in
quicker,
charging
fully
sta
itemised
are
shelves.
Fig 2.18 A point of sale terminal
Output:
A
stock
control
system
must
keep
an
re-order
record
of
all
the
stock
held
and
place
orders
for
and
if
stock
factories
use
runs
low. Large
computerised
are
printed
when
stock
levels
reach
a
point. Customer
receipts
are
printed
using
fresh
thermal
deliveries
Orders
up-to-date
printers.
shops, supermarkets
stock
control
systems.
Questions
Stock
control
is
important
as:
1
◆
Adequate
stocks
must
be
maintained
to
Give
an
example
determine
a
customer
with
goods
with
minimum
will
go
nd
goods
are
regular ly
out
the
processing
required
to
if
a
customer ’s
bill
is
overdue.
delay. If
2
customers
of
supply
of
stock
they
Give
used
three
to
examples
of
data
that
sensors
can
be
measure.
elsewhere.
59
2
End
Multiple
of
choice
chapter
exam-style
questions
7
questions
A
__________
le
__________data
1
The
manipulation
of
data
to
obtain
information
is
in
a
temporar y
the
main
le
which
is
used
to
le.
is
i
transaction,
delete
ii
transaction,
update
called:
a
input
b
output
c
processing
d
storage.
8
iii
master,
delete
iv
master,
update.
To
nd
a
record
repeatedly
2
Information
that
represents
a ‘whole’ picture
of
or
solution
a
accurate
b
complete
c
is
a
sequential
record
until
the
search,
required
read
b
save
c
write
d
update.
timely.
__________
or
more
a
check
compares
the
contents
of
A
fully
indexed
elds
to
make
sure
that
they
make
address
range
c
data
d
format.
errors
following,
except:
the
record
key
and
the
sense.
a
average
b
exact
c
highest
d
lowest
key
key
can
be
caused
by
any
of
value
The
of
a
bad
b
corrupt
sectors
power
key
value
of
doubtful
on
a
hard
key
access
value.
method
that
calculates
the
exact
address
le
of
a
record
is most
suitable
for
which
type
structure?
disk
a
serial
b
sequential
c
fully
d
direct
RAM
surge
program
Which
value
the
(location)
indexed
malfunction.
the
following
checks
is
used
to
detect
Shor t
access.
answer
questions
data?
11
a
contains
the:
type
Hardware
d
of
consistency
b
c
le
two
10
5
a
found.
a
storage
4
using
is:
9
A
le
relevant
d
3
a
a
record
problem
in
__________
A
data
logging
system
is
used
to
record,
at
specic
length
inter vals,
b
range
c
data
d
reasonableness.
the
temperature
of
the
water
in
an
aquarium.
type
a
State
one
capture
b
6
An
area
code
must
contain
three
digits
Explain
checks
are
data
b
format
c
length
d
range.
what
the
temperature
that
can
be
used
to
readings.
logging
of
the
system
water
is
Describe
one
advantage
of
could
too
output
if
high.
monitoring
type
using
60
hardware
suitable, except:
c
a
of
temperature
only. The
the
following
item
the
this
data
logging
system.
the
water
2
12
Aaron
uses
a
login
screen
as
shown
below :
d
The
four
completing
during
the
descriptions
list
of
statements
descriptions
the
End
chapter
below
the
sheet.
with
the
exam-style
show
the
experiment
Match
most
each
dierent
when
of
suitable
questions
the
term
from
below :
Terms:
source
document/turnaround
machine -readable
document/soft
document/
copy/hard
copy
Statements:
i
The
blank
results
ii
a
Give
a
b
two
user
to
types
log
Describe
screen
two
d
Explain
whether
f
example
Explain
After
password,
A
student
measures
iii
require
has
re -entering
used
needs
to
the
screen
using?
on
the
the
entered
password
the
system
by
username
press
e
twice.
twice
one
of
A
The
could
the
is
show
ii
user.
on
a
data
from
No
that
contains
the
type
14
of
Consider
for
instructions
Results
on
what
to
number
temperature
temperature
dierence
1
40
50
the
a
sheet
which
are
PDF
are
le.
used
viewed
to
on
a
and
70
char ts
copies
are
of
printed.
the
sheet
for
the
items
are
two
being
the
printer
printed,
print
possible
following
are
of
would
be
task.
causes
illustration
placed
in
even
icon
if
the
repeatedly.
of
of
this
a
problem.
supermarket,
aisles:
Locator
Item
#
35
25
–
Carrots
27
–
Cucumber
29
–
Lettuce
32
–
Sweet
b
50
65
15
52
68
Yes
errors
were
made
in
the
results
Explain
these
each
a
State
results
the
b
Suppose
path
type
range
43
–
Scrub
47
–
Sponges
taken
to
locate
ii
of
the
following
checks
as
it
sheet
you
soap
buds
the:
were
sponges.
look ing
for
item
#30
(ginger).
relates
State
the
aisle
and
locator
that
you
would
above:
and
the
item
#
that
would
indicate
check
whether
it
is
there
or
not.
check.
ii
Describe
Disinfectant
Liquid
lettuce
choose
data
–
–
errors.
i
the
38
40
sheet.
i
Explain
50
pepper
110
3
Three
ii
print
type
selects
2
c
on
as
sheet
Temperature
i
data
char ts
saved
enter:
End
to
in
an
Star t
b
writes
headings
Experiment
a
and
sheet
to
this
1
and
of
which
pages
Explain
where
following
sheet
student
class.
Explain
teacher
two
continue. What
next
suitable
and
the
the
set
needs
Aisle
experiment
from
the
experiment.
scanned
completed
teacher
i
the
is
a
before
the
monitor.
validation.
entered
his
to
be
the
or
that
entered
Aaron
enters
must
verication
information
he
on
is
Results
iv
password
messages
the
Aaron
buttons
the
of
two
on
screen
would
sheet
produce
security
why
based
that
displayed.
Explain
e
applications
on.
c
an
13
of
The
sheet
from
how
the
student
could
conrm
that
What
does
the
number
of
the
locator
the
represent?
data
from
the
table
is
equivalent
to
the
data
on
c
the
Explain
whether
this
is
an
example
of
direct,
sheet.
sequential
or
index-sequential
le
organisation.
61
A
PT
E
C
H
3
COMPUTER
3.1
Computer
Previous
single
will
chapters
computer
look
at
have
linking
communication
and
its
computers
among
the
fundamentals
peripherals. Now
together
users, whether
to
in
of
a
or
across
the
can
Many
computer
computer
to
is
the
between
users
other
or
may
at
at
a
remote
want
their
transmission
two
need
or
to
more
be
able
of
◆
data
computers.
to
computers, whether
to
site. For
connect
located
in
example, oce
communicate
workplaces
working
want
to
the
access
from
with
data
wherever
world, and
the
essential
for
home
on
they
electronic
systems
a
their
or
mail
interchange
(GPS), online
a
data. Two
congurations
direct
link
between
two
network
using
information
to
computers
one
ser ve
computer
the
connected
needs
to
it
to
of
in
transmit
several
a
data
and
terminals
network.
close
popular
way
of
transmitting
data
is
through
microwaves, which
are
high-frequency
that
the
radio
signals
computers
may
travel
through
atmosphere. ey
are
used
for
be
users
high-volume, long-distance
communication. Microwave
signals, however, only
in
may
o
satellites
travel
to
cover
straight
longer
lines. ey
can
be
distances. Low-
(email), voicemail,
satellites
travel
closer
to
earth, so
weaker
signals
conferencing,
can
data
ways, or
communication
(fax), telecommuting, video
electronic
dierent
workers
computer
Internet. Data
in
broadcast:
orbit
facsimile
in
transmit
point-to-point:
bounced
is
linked
same
A
by
T E C H N O LO G I E S
wor ld.
Data communication
information
WEB
are:
computers
and
be
congurations, to
we
enhance
the
Computers
◆
oce
AND
n e t wo r k s
covered
system
NET WORK S
(EDI), global
ser vices, social
be
processed
while
consuming
less
power. An
positioning
media
and
example
of
a
system
network
that
that
uses
microwaves
is
a
cellular
the
supports
two-way
communication. ese
Internet.
networks
Many
schools, businesses
computers
transmit
such
as
together
data
disk
and
to
and
form
a
other
organisations
network
information
to
drives, CD-ROM
so
share
that
link
they
and
programs
such
as
word
Network
and
databases. ere
cellular)
can
be
transmitted
between
computer
network
are
two
ways
to
upload
computer
the
◆
to
to
another
download
the
means
to
send
this
computer
on
data
the
from
one
your
network
from
Internet.
site
–
such
means
another
to
receive
computer
data
on
to
the
or
your
network
can
be
(LAN). Many
or
dierent
data
communicate
connects
computers
so
that
as
printers
can
be
shared
among
come
in
dierent
sizes. A
few
computers:
Internet
computer
62
data
that
that
computers, printers
◆
sites
congurations
computers. Networks
data
cell
phones.
processors,
peripherals
spreadsheets
interconnected
(or
or
A
printers
use
mobile
can
les, resources
drives, modems
with
or
in
sites
and
linked
small
a
(W
AN). A
network
is
good
Internet.
hard
small
large
over
a
disks
local
–
usually
area
be
geographical
linked
example
of
a
in
a
on
area
wide
wide
on
network
computers, located
large
countries, can
network
the
in
and
spread
dierent
large
area
area
3.1
A
a
Metropolitan
W
AN
area
be
and
like
a
owned
Area
LAN. It
city
and
or
Network
is
large
campus. A
operated
by
(MAN)
enough
MAN
a
single
falls
to
between
extend
might
to
an
the
network. e
resources
and
computer
programs
is
with
now
Computer
ready
other
to
network s
share
les,
computers/users.
therefore
To
organisation
connect
computers
to
a
LAN
using
cables,
you
need:
(forinstance, a
and
other
useful
in
university)
associated
connecting
and
accessed
by
students
organisations. MANs
LANs
to
W
ANs
like
◆
network
◆
a
network
◆
a
hub
◆
a
le
◆
system
the
Internet.
Computers
that
stand-alone
system
device
has
if
it
not
networked
computers. Data
to
is
are
be
to
transferred
be
used
on
that
are
is
using
a
another
known
on
a
all
networks
are
connected
are
wireless networks. A
( WLAN)
is
a
LAN
that
cabling;
W ireless
great
or
remote
computers
to
connect
to
you
Local
have
networks
are
also
benecial
in
for
network
are
a
hub
it
may
be
dicult
or
impossible
to
provide
poor
security
and
a
large
interference
from
light
and
electronic
also
slower
than
LANs
even
when
that
the
cable
to
a
central
device
or
more
hubs
(if
there
of
computers
on
the
network)
are
to
a
le
computer
ser ver. A
le ser ver
containing
large
is
a
high-
capacity
hard
cables.
drives
that
are
available
to
all
network
users. It
is
susceptible
application
programs
and
data
can
be
shared
to
devices. ey
all
are
by
3.1). One
number
connected
where
to
likely
buildings
install
are
is
LAN.
disk
However, they
school, it
connected
(Fig
performance
where
in
allowing
the
older
a
Area
then
W ireless
software.
some
are
laptops
hubs)
Hubs
computer.
is
computer
storage
called
Network
each
ser ver
computers
networks
in
stand-alone
secondar y
with
(or
card
as
If
Not
cabling
are
connected
users
on
the
network. A
le
ser ver
is
not
used
as
a
using
normal
computer
terminal, as
its
job
is
dedicated
only
cabling.
to
To
connect
plug
the
the
a
computer
network
cable
computer. Y
ou
software
which
then
enables
to
a
into
LAN
the
have
the
to
using
cables, you
network
set
up
computer
adapter
the
to
on
system
operate
on
the
also
all
task
use
a
printers
computer
of
managing
printer
on
a
ser ver
is
les. Some
dedicated
network. W here
controls
hierarchical
shared
that
others, the
one
networks
to
managing
powerful
network
is
called
a
network.
Fig 3.1 Layout of a typical computer network
63
3
Computer
networks
Peer-to-peer
and
web
technologies
unconnected
network
parts. Bus
networks, with
W hen
a
network
does
not
have
a
le
ser ver, it
a
peer-to-peer network . In
network, each
computers
peer
–
network
hard
disks
computer
its
also
and
Network
peers
–
acts
on
allows
as
the
users
a
a
of
network
slower
trac
than
star
limited
to
Mb
per
second.
peer-to-peer
ser ver
to
network. A
to
speed
are
is
10
called
the
networks
access
the
other
peer-to-
each
other’s
peripherals.
layout
Fig 3.3 A bus network
Careful
ere
planning
are
computer
three
of
a
main
networks:
computer
types
of
star, bus
network
layout
and
is
essential.
(topolog y)
Unlike
of
end
ring.
to
In
a
star network
(Fig
3.2)
all
the
nodes
are
the
a
central
hub. is
means
that
each
a
bus
the
rst
computer
has
connection
to
the
network
and
that
a
will
not
aect
the
working
of
other
break
in
will
hub
not
breaks
down, then
all
work. However, star
expensive
to
install
than
the
computers
types, are
ring
or
3.4)
is
loop. As
has
no
connected
with
a
the
cable
breaks
it
will
aect
all
the
on
the
network. Ring
networks
are
also
than
star
networks, with
the
speed
of
network
computers. If
on
networks, although
other
a
(Fig
(computer)
a
trac
the
ring network
node
node, forming
network, if
slower
cable
last
its
computers
own
network, a
line. e
connected
bus
to
to
the
limited
to
10
Mb
per
second.
hub
more
thequickest.
Fig 3.4 A ring network
e
Internet
spread
is
a
vast
throughout
collection
the
of
computer
world, which
involves
networks
all
these
Fig 3.2 A star network
dierent
A
bus network
the
in
but
64
network
Figure
if
the
is
the
nodes
3.3. Bus
cable
simplest
type
(computers)
networks
breaks
the
are
are
of
in
a
cheap
network
is
topolog y, where
line, as
and
split
shown
reliable,
into
two
way
as
to
bre
ways
link
linkingcomputers. e
computers
optics
however, are
radio
of
waves.
or
on
a
telephone
linked
by
network
is
most
by
cables
lines. W ireless
infrared
common
such
networks
waves, microwaves
or
3.1
WLANs
light
the
use
high
beams, or
lasers
workstations
workstation
some
sort
and
of
frequency
and
le
to
the
le
or
ser ver
on
a
the
signals, infrared
communicate
ser ver
transceiver
radio
or
antenna
to
they
between
network
send
and
were
wireless
hubs. Each
wireless
data. Data
has
receive
mobile
or
by
is
relayed
physically
transceivers
connected. For
communication
telephone
between
can
also
Computer
longer
take
as
if
distances,
place
technolog y, microwave
network s
through
transmission
satellite.
LAN
HUB
Transceiver
Remote
computer
Transceiver
Fig 3.5 Remote computers can connect to the LAN through the transceivers as if they were physically connected. Transceivers are often built into hubs, laptops and
por table devices
Bluetooth
both
e
and
provide
main
W i-F i
wireless
purpose
of
(short
for
wireless
connectivity
Bluetooth
is
using
to
delity)
radio
replace
connect
waves.
certain
W i-Fi
provides
high-speed
wireless
access
network
or
the
Internet. Bluetooth
allows
of
data
over
short
distances
for
wireless
devices. WLANs
among
provides
easy
between
wireless
devices
from
as
a
with
W i-Fi, such
access
phones, games
consoles
or
MP3
network
is
with
a
a
public
area
as
small
as
a
room
or
as
many
square
miles
that
oers
hotspots
can
Internet
be
in
access
cafés,
and
hotels. W i-Fi
connections
can
be
made
up
to
about
300
feet
away
from
a
hotspot, to
keep
users
dierent
as
wirelessly
while
commuting. Customers
computers,
may
mobile
is
WLAN. W i-F i
connected
manufacturers. Devices
wireless
wired
to
information
a
the
airports
and
if
range.
hotspot
over
exchange
Internet
to
large
a
the
cables,
A
while
to
have
to
pay
for
this
ser vice .
players, can
65
3
Computer
networks
and
web
technologies
Table 3.1 Advantages and disadvantages of networked systems compared with stand- alone systems
Type
of
Advantages
Disadvantages
system
Stand-alone
◆
Ideal
computers
◆
No
◆
Can
◆
No
for
most
network
be
home
card
dedicated
need
licence
for
Security
◆
Access
computers
◆
Share
files
◆
Share
resources
from
to
modems
users
with,
specific
software
or
task,
e.g.
licences
composing
–
only
music
◆
single -user
user
than
Activities
of
network
as
to
any
sites
be
messages
drives,
to,
◆
other
CD-ROM
word-processing,
which
own
on
are
the
stored
same
file. These
software
network
computers
be
drives,
users
available
for
centrally.
file
rather
programs
stand-alone
and
to
spreadsheet
such
users
be
than
are
If
◆
for
each
cheaper
as
risk
by
◆
Direction
the
method
of
used
for
transmitting
communications
channels
disk
or
which
can
be
by
hard
time
hubs
and
data
to
ser vers
a
can
network
transfer
rates
and
connectivity
can
a
stops
stop
computer
(hackers)
for
more
viruses
gaining
network
data
working
ever ybody
(known
on
the
as
a
network
computer
Need
lines
by
external
connection
reduced
users
of
an
unreliable
security. With
of
large
can
users
and
access
manager
be
there
of
to
is
a
greater
unauthorised
to
network
manage
data
the
costly
ow
and
media
can
also
be
classied
or
according
medium
it
only
use
cabling,
ser ver
system. This
channels
is
file
to
par ticularly
others
storage,
and
in
using
Poor
◆
amount
controlled
the
from
per
need
cards,
result
data,
with
transferred
online
‘crash’),
computers
things
can
Possible
or
share
data,
costly. Wireless
may
manager
communication channel
or
Network
Transmission
e
can
consuming
workstation
disk
as
work
their
space
Communication
Data
unreliable
(such
one -off
storage
of
modem. Will
printers
users
having
other
send
such
software)
user
on
from
and
programs
network
of
a
easily
amounts
drive
network
database
◆
Cannot
◆
required
◆
Share
to
network
Networked
◆
users
needed
to
the
direction
in
which
data
can
ow.
data. Characteristics
include
transmission
Simplex
mode, direction
of
data
ow, transmission
medium
and
Data
transmission
in
a
simplex
just
like
trac
receive-only
Transmission
modes
or
rates
determine
the
number
that
in
a
one-way
line. Examples
printers, public
can
be
transmitted
in
one
in
only
one
direction,
street. It
are
is
a
send-only
or
radio, TV, computer
address
systems
or
any
other
one-
transmission.
second. Two
Half
duplex
are:
Data
◆
ow
of
directional
modes
can
modes
to
Transmission
characters
line
speed.
asynchronous:
data
is
transmitted
at
but
inter vals, and
at
a
low
speed
of
one
in
a
half-duplex
line
can
ow
in
both
directions,
irregular
character
at
only
one
way
at
a
time. In
other
words, data
can
either
sent
or
received
at
any
given
time. CB
radio
and
time
walkie-talkies
◆
synchronous: data
is
transmitted
at
high-speed
of
large
duplex
blocks
of
in
a
full-duplex
line
can
be
both
sent
and
data.
received
at
the
same
time, like
street. Most
modem
duplex. is
increases
same
66
half-duplex.
simultaneous
Data
transmission
are
regular
Full
inter vals, with
be
a
pair
of
wires
in
trac
connections
today
eciency, as
both
in
data
directions
a
two-way
transmit
ows
on
full
the
simultaneously.
3.1
To
choose
decide
any
how
given
slow
which
channel
much
use, you
information
time, how
transmission
you
important
rate, as
full-duplex, half-duplex
Transmission
to
well
or
it
want
is
as
should
to
to
simplex
a
fast
you
at
or
want
a
channel.
Fig 3.6 Twisted pair cable is used
Fig 3.7 Ethernet cables are used as
with telephones
network cables
media
Coaxial
Data
can
be
transmitted
through
various
types
(wired)
or
wireless
media. Cabled
media
broadband
to
transmit
data. W ireless
media
transmits
the
air. Cabled
media
include
twisted
can
transmit
data
at
a
rate
thousands
of
characters
per
second. Examples
of
data
broadband
through
channel
uses
of
wires
cable
of
A
cabled
network s
rst
transfer
have
whether
Computer
channels
are
coaxial
cables
and
bre
optic
pair,
cables.
coaxial
and
bre
optic
satellite, microwave
cables;
and
wireless
infrared
media
include
methods.
Coaxial cables
videos
Cabled
and
optic
media
A
per
form
easy
a
pair
or
of
to
handle
ethernet
channel
second
(bps)
transmitting
handle
modem
to
and
do
analogue
pair, coaxial
and
bre
can
to
transmit
9600
data
is
and
pair
data
bps. e
via
cheap, but
data
at
rate
most
telephone
relatively
telephone
a
of
insulated
copper
lines. is
slow. Y
ou
lines
not
the
digital
wires
are
used
pair
(U TP)
(Fig
is
3.6). ese
wires
twisted
interference
are
data
for
to
which
are
network
(Fig
found
this
common
cables
round
from
dierentiate
has
weaker
grey
in
various
the
3.7)
cable.It
larger. ese
usually
cable
insulated
dicult
high-speed
to
install
since
the
cable
rigid.
Fig 3.9 Fibre optic cable is used by
televisions, video and cable T V
large telecommunication companies
in
form
of
Fibre
optic
cable
large
telephone
each
and
3.9)
are
similar
to
those
telecommunications
used
companies.
in
have
adjacent
(Fig
pairs
cables
other
pairs
consist
of
clear
glass
bres
and
data
is
of
through
them
as
pulses
of
light
rather
to
electronic
signals. is
eliminates
the
problem
of
and
interference. It
is
the
standard
for
connecting
devices.
ethernet cable
slightly
are
of
Fig 3.8 Coaxial cable is used for
networks
is
but
capable
need
built
electrical
electrical
of
thickly
televisions,
is
than
eliminate
forms
use
on
popular
transmitted
An
found
300
ese
other
TV. ey
are
F ibre optic cables
twisted
cables
and
somewhat
by
telephone
wire
transmission
transmission.
Unshielded
help
are
cable
this, since
computers. Twisted
data
twisted
is
voiceband
bits
include
cables.
Twisted
cable
3.8)
media
copper
Cabled
(Fig
is
have
from
colour. Like
lengths, but
strength
of
the
of
resembles
cables
them
one
a
the
most
phone
dierent
phone
any
the
cables
cable, an
longer
the
popular
cable
but
colours
moisture
signals
twisted
between
and
over
pair
which
at
vastly
ethernet
broadband
cable, the
interactive
buildings, as
lightning. Fibre
much
longer
cables. ey
greater
for
is
optic
distances
can
speeds. is
ser vices
it
such
also
not
cables
than
it
video
aected
can
by
transmit
coaxial
transfer
makes
as
also
and
information
possible
to
use
conferencing
and
ser vices.
signal.
67
3
Computer
networks
and
web
technologies
Wireless
transmission
Remember
that
satellite
a
ver y
ese
and
short
any
infrared
two
media
over
signals
a
direct
points, such
include
methods. A
wavelength, hence
powerful
distances
wireless
Intranets
can
be
microwave
the
word
projected
line-of-sight
as
microwave,
signal
e
has
‘micro’-wave.
over
path
now
similar
have
their
between
antennae
close
microwave
are
intranet
using
two
to
each
is
microwave
is
located
in
other, it
uses
a
but
set
up
used
to
types
of
used
in
schools
are
line-of-sight
broadcast. Line-of-sight
there
infrared
that
hits
68
to
within
be
the
an
of
and
the
direct
a
outside
the
would
can
communication
walls
sent
and
out
use
saved
as
training. An
business
the
or
business
intranet. A
its
a
browser
web
or
company
looks
to
to
is
not
can
also
directly
intranets
gateway
and
send
access
pages. It
some
so-called
intranet, it
workers
intranet
Internet, but
Internet, via
an
allow
and
may, depending
local
on
an
a
area
on
other
how
networks
(W
ANs). A
do
allow
computers.
functions
rewall
as
is
are
and
used
networks, including
ser ver
acts
they
(LANs)
intranet. Instead, all
proxy
ser ver
deciding
go
out
while
need
what
from, a
slow
a
be
down
are
a
that
just
is
set
like
up,
wide
to
the
stop
Internet,
communication
outside
the
gatekeeper, ltering
les
or
messages
computer
used
organisations
there
to
Intranets
line
transceiver. If
line-of-sight
obstruction
transmissions
receiver.
Internet
is
network. e
Internet
in
should
come
network.
communication
unblocked
information
infrared
o
within
access
and
is
by
many
to:
a
◆
distribute
◆
share
◆
distribute
◆
access
◆
help
◆
facilitate
◆
enable
documents
sent
information
the
software
network.
bounces
the
must
workstation
transmission, the
Scattered
on
and
or
wireless
based
sites
infrared
and
communications
kind
one
other
the
networks
proxy
common
sta
of
of
through
Fig 3.10 Dish antennae point to satellites located in space
each
the
accessing
again. is
able
intranet
to
computers
walks
and
schools
website.
area
person
is
an
for
users
consist
the
network
available
information
Intranets
between
only
company
a
that
private
to
For
means
a
messages
access
scattered
businesses
intranet.
organisation. No
connected
most
led
intranets. Many
space.
be
two
has
up
satellite
can
e
own
set
dish
organisation
that
to
transmission.
other
that
Internet
Intranet
standards
of
the
organisations
antennae. Satellite
to
However, instead
of
extranets
long
An
transmissionis
success
other
and
is
a
broadcast
multiple
ceilings
until
it
of
directions
eventually
databases
with
sta
training
group
work
teleconferencing.
businesses
and
other
in
to,
3.1
Intranets
build
are
and
manage
Also, users
them
popular
of
as
than
they
are
other
intranets
because
they
are
look
less
types
of
familiar
and
expensive
private
with
behave
how
like
data
to
network.
a
to
orders
use
special
the
Internet. is
saves
time
and
way
and
to
(EDI). Electronic
transfer
business
invoices, between
data
network s
interchange
documents, such
is
as
computers.
websites
e
on
interchange
Computer
money
on
aim
of
EDI
is
to
speed
up
communication
sta
between
businesses
and
other
organisations, and
training.
eventually
More
and
more
schools
intranets. Internal
examination
are
school
setting
up
their
information, such
timetables, room
own
often
as
code
changes, sports
to
do
involves
to
stop
away
with
putting
other
the
people
paper
data
transactions. EDI
into
looking
special
at
the
computer
data.
teams
Questions
and
results, can
students. Each
be
readily
shared
department
in
with
the
sta
school
and
can
have
its
1
State
own
intranet
page(s)
along
with
relevant
the
data
a
term
that
students, such
as
revision
guides
and
also
have
the
with
from
computer
opportunity
to
share
a
each
user ’s
of
the
following:
computer
in
the
to
network
data
that
is
received
to
a
user ’s
computer
from
their
another
work
describes
homework
b
tasks. Students
sent
information
another
for
that
is
computer
in
the
network.
others.
2
Give
two
3
Name
examples
two
of
peripheral
using
microwave
devices
that
are
signals.
usually
Extranets
connected
Once
that
intr anets
businesses
wanted
to
and
al low
customers,
is
were
to
would
othe r
othe r s ,
have
lead
d e velope d,
to
bec ame
org anis ations
such
l im ite d
a
it
as
c l os e r
to
a nd
their
relations hip
4
some t imes
sup pl ie rs
access
c lear
a
better
e xc han ge
of
WAN
b
LAN
c
WLAN
d
MAN.
ecienc y. e re f ore,
de veloped.
limited
Extr ane ts
access
to
an
al l ow
inf or ma t ion
e xt r anets
author is ed
in tr an et.
Not
access
to
an
e x tr anet.
al lowed. e y
mus t
h ave
valid
What
par t
of
and
the
an
id e n tit y
extr anet
th e y
that
c an
is
the
name
6
Name
7
What
three
enable
businesses
to
aut h or i sed
an
car
manufacturer, for
extranet
to
allow
all
of
its
es tablishe s
closely
various
tyres, lights, windscreens, seats
showrooms
to
keep
in
ver y
and
close
and
deliveries. An
develop
on)
contact
extranet
State
is
the
term
could
as
to
information
exchange
not
data
programmes. Data
available
and
can
to
be
to
the
develop
and
9
(of
over
exchanged
have
a
of
a
network.
to
an
area
that
oers
Internet
a WLAN?
the
type
of
transmission
for
each
of
the
descriptions:
data
can
ow
b
data
can
ow
data
State
each
car
at
a
in
only
one
in
both
direction
directions,
but
only
one
time
can
the
of
be
type
the
sent
of
and
received
transmission
at
the
media
same
that
time.
describes
following:
a
uses
wires
b
transmits
to
transmit
data
data
through
the
given
a
air.
regarding
be
used
public, as
joint
given
a
What
is
the
name
to
network
that
is
private
to
to
share
not
together.
10
orders
does
whi c h
suppliers
so
that
an d
acces s .
example, might
network
users
c
A
a
is
use r nam e s
work
of
arrangements
direction
Extranets
represent:
ser ver?
following
passwords
terms
outsid ers
8
are
following
were
e ver yone
Onl y
the
a nd
access
al lowed
network.
wit h
le
impro ved
what
a
a
i ntr ane t .
5
customers,
Explain
to
a
business?
well
training
using
electronic
69
3.2
e
We b
Internet
has
technologies
been
networks’, connecting
described
billions
as
of
‘a
network
mobile
a
of
set
standard
computer
devices,
laptops, microcomputers, minicomputers, mainframes
coming
and
supercomputers
in
and
educational
T
oday
they
◆
people
◆
they
can
set
up
advertise
can
can
in
commercial, government
email
reach
websites
what
they
on
do
the
and
enquiries, orders
an
international
Internet
what
and
so
they
main
ser vices
provided
by
of
a
le
of
the
computer
the
is
Electronic mail (email): is
communication
Email
using
means
special
anywhere
between
messages
software
in
the
a
method
computers
that
from
world, via
can
one
be
on
sell
to
Internet ’s
WLANs. e
mail
is
then
a
download
to
to
as
another
dierent
of
email
software
O utlook
and
an
Data
exchange:
or
transfer
Internet
available
on
C
of
equivalent
thousands
for
downloading
to
and
of
popular
users
les
to
onto
F TP
software, such
Excel, although
(send)
use
it
can
as
also
be
websites.
to
the
Internet
can
be
connected
access
the
to
the
Internet
connected, users
Internet, you
are
in
said
to
be
need:
a
modem, router
and/or
switch
which
is
connected
a
telephone
line
include
a
network
interface
card
(NIC)
or
network
adapter,
Gmail.
Sending
data
to
another
receiving
data
from
a
is
usually
already
installed
in
your
computer
computer
◆
(uploading)
the
the
computer
electronic
which
◆
is
to
or
LANs
◆
Microsoft
given
made
computers
ways. Once
online. To
to
mailbox. Examples
les
updates
upload
Computers
network.
such
in
name
Barbados
of
computer
kept
in
that
information
include:
◆
and
B
information, so
understand
computers. Millions
Microsoft W
ord
sent ‘electronically ’
networks
can
Internet. F TP
Connecting
◆
the
server, with
individual
requests
Internet
transmitting
Germany
that:
audience.
the
from
across
used
e
for
in
France. F TP
les
networks.
businesses
◆
linked
A
software
on
as
browser
your
computer
or
mobile
device
(such
computer
a
web
and
email
package)
(downloading).
◆
◆
Instant
messaging: is
feature
allows
users
Internet
a
are
connected
exchange
in
real
brand
the
Internet
text, images, video
time. Dierent
names
Messenger
◆
to
for
and
this
the
is
the
main
Internet. e
which
are
or
the
same
audio
providers
ser vice, for
have
time
messages
their
example
linked
web
and
way
is
of
accessing
based
viewed
A
own
with
the
mouse
on
a
modem
your
Facebook
e
on
by
a
as
information
pages
web
known
of
the
link
words
displayed
in
on
information
are
jump
to
another
location
(links
the
in
the
you
will
web
page
or
are
available
on
virtually
every
topic
File
of
transfer
rules
and
between
70
protocol
(F TP): A
procedures
components
that
of
in
a
ser vice
provider
(ISP).
more
than
a
you
your
is
to
to
convert
addition
the
and
with
to
the
by
Internet.
analogue
and
Digicel
computer
in
provided
access
land line
include
one
router
with
is
a
the
and
Internet.
F low. If
you
modem, then
modem.
is
the
‘trac
cop’ of
a
network. It
directs
data
the
modem
and
sends
it
to
the
dierent
devices
page, or
are
connected
web
to
it. Devices
such
as
computers,
to
consoles, digital
televisions
and
mobile
pages
can
be
connected
through
cables
directly
to
the
imaginable.
protocol
govern
Internet
modem
Caribbean
need
router
router
◆
with
usually
devices
are
subscription
colours), you
web
website. Millions
the
between
laptops, games
another
a
browser. By
dierent
on
an
provides
of
signals
using
that
can
typically
(modulator/demodulator)
purpose
from
underlined
called
ISP
,who
ISPs
A
clicking
company
digital
(www): Popularly
is
to
W hatsApp.
e W
orld Wide W
eb
web. is
at
ser vice, which
who
is
a
transmission
network. Each
or
wirelessly.
set
network
A
has
switch
can
be
simply
expands
connected
to
a
the
number
router. Some
of
devices
routers, such
that
3.2
as
Netgear
models, combine
components
having
–
the
modem, router
separate
devices
with
three
and
switch
cables
◆
networking
–
instead
joining
Broadband:
of
line
them.
uses
not
A
network
interface
card
(NIC)
or
network
(DSL)
a
is
method
ser vice, which
phone
line
necessar y
to
to
hardwarethat
is
usually
already
part
of
a
a
laptop. It
provides
the
computer
with
a
to
a
network. ese
cards
can
or
wireless
connections
to
the
be
used
and
Cable:
the
World
W ide
Web
(www)
is
based
on
pages
of
information
linked
together
and
Internet
browsers
allows
is
a
also
software
to
the
Many
digital
called
web
cable
resources
and
browsers. A
include
application
that
allows
you
and
websites
Microsoft
Internet
on
the
are
Direct TV
carr y
using
is
a
several
data
digital
for
types
of
(broadband
mobile
means
the
to
that
phone
while
customers
cable
modem
a
can
which
connection
system. Cable
connect
sends
to
a
television
ser vice
channels
at
once
sent
and
–
a
–
and
bre
such
single
which
received
can
also
set
access
rather
the
at
cable
results
ver y
Internet
than
ese
associated
phones
with
connect
to
Internet
in
high
a
at
home
on
computer.
ser vices
are
mostly
mobile
the
Internet
since
through
they
your
are
used
provider.
or
connections
are
slower
than
ser vices, including
cable), and
wireless
and
cable. e
amount
of
data
sent
(3G
received
is
restricted
by
your
provider, who
devices.
charge
form
of
connection
is
the
slowest
to
use
your
way
monthly
Internet. Y
ou
need
connect
you
to
cannot
the
use
Internet
the
via
phone
are
rates
for
the
companies
data
and
that
is
used.
universities
to
oer
free
W i-Fi
for
users
who
are
within
the
landline
vicinity, to
telephone
the
2G, 3G and 4G-L
TE:
that
to
a
through
being
However, there
Dial-up: is
connect
land line,
Explorer.
can
◆
a
Edge, Firefox, Google
and
4G)
use
broadband
television
broadband
or
have
ser vice
dierent
dial-up, DSL
to
television
data
However, these
ere
do
Internet. Popular
to
Internet
you
to
◆
Chrome
is
web
a
browsers
it
online
Internet.
television
speeds. Users
access
you
cable
Internet
unlimited
browser
but
the
viewed
can
by
make
millions
as
of
Internet
to
email
optic
e
the
land line
dial-up. It
network.
receives
browsers
to
than
for
to
Web
faster
subscriber
dedicated
◆
wired
digital
computer
connected
connection
a
technologies
adaptor
broadband
or
is
connect
have
connection. However, if
is
uses
Web
avoid
using
up
personal
data
allowances.
dial-up. is
while
online.
e
‘G’ refers
to
systems. Table
the
3.3
generations
compares
the
of
mobile
phone
generations.
Table 3.2 Methods of connecting to the Internet
Dial-up
Requires
the
DSL
High
than
can
is
Similar
more
be
Leased
line
to
an
a
fixed
modem
Digital
the
of
not
does
Uses
Satellite
Connects
per
to
connect
Subscriber
Internet
to
wireless
to
in
an
pairs
a
while
to
Line
using
for
to
provide
that
example
connect
to
by
the
using
connection
phones,
line. The
ordinar y
company
amount
Internet
Internet
mobile
than
month,
change,
the
telephone
use
data. The
cable T V
laptops,
to
together
fee
line
a
to
ordinar y
expensive
amounts
A
a
Asymmetric
connect
grouped
For
and
the
ISP
.
A
point-to-point
connection
is
established
to
connect
to
(ADSL)
the
that
landline.
is
used
with
However,
a
DSL
more
modem
data
can
be
to
connect
received
to
the
from
Internet.
the
Internet
sent.
Cable T V
Wireless
landline
speed
Users
ISDN
a
Internet.
is
amount
even
can
line
Internet.
a
controls,
does
has
It
satellite,
or Wireless
remote
this
a
has
an
pay
line,
faster
rent
charged
a T1
you
telephone
data
can
not
fast
of
1.5
on
a
and
often
per
speeds,
coaxial
Protocol
controls
how
megabits
download
Application
how
data
much
you
digitally
communications
depend
antenna,
upon
transmit
at
use
64
the
line.
kbps.
ISDN
ISDN
is
lines
can
transmission.
dedicated
speed
gaming
depends
but
cable
( WAP)
tablets
but
line
the
to
line
send
is
and
used.
Speed
of
large
a
leased
second.
slower
upload
speeds
and Windows-based
can
receive
be
used
wirelessly
to
software
connect
without
a
devices
physical
like
connection.
71
3
Computer
networks
and
web
technologies
Table 3.3 Comparison of 2G, 3G and 4G-LTE
Generation
Features
2G
Text
Problems
messaging,
messaging,
and
3G
All
the
of
video
and
4G-LTE
All
SIM
2G,
access,
web
browsing,
downloading,
3G
speeds
picture
smar tphone
plus
and
Phone
caller
ID
calls
dropping
transmission
and
slow
data
rates
card
plus
other
of
multimedia
Internet
Example
Major
sharing
limitation
network
of
the
3G
network
is
coverage
technology
significantly
increased
email,
faster
Still
network
problems
with
network
coverage
coverage
A
Web
technology
host
(ser ver)
provides
In
order
to
access
the
computer
ser vices
on
the
ser vices
such
some
terms
web
will
help
technolog y
you
to
become
familiar
W ith
so
together
in
e
set
on
dierent
the
which
sending
as
computer
Internet, there
dierent
networks
has
and
receiving
chunks, or
the
data
(transmission
protocol). TCP/IP
on
networks
rules, sometimes
TCP/IP
to
packets, which
reassembled
into
its
are
known
over
be
a
to
address
(Internet
usually
so
sent
ver y
many. W hen
the
post, you
to
down
are
PO
box
identify
it. is
has
address
four
Protocol
numbers
its
own
unique
is
known
as
address). e
separated
by
IP
an
IP
full
address
stops:
rst
network, with
identify
original
the
It
protocol, for
Internet
data
to
is
into
other
ensures
to
the
you
for
have
to
be
a
that
computer
a
letter
specic
house
number. e
known
little
computers
the
on
when
using
the
two
or
three
the
rest
the
individual
computer.
data
is
is
much
easier
name, such
as
to
IP
address. But
the
IP
address
browse
the
a
in
and
remember
www.cxc.org, than
the
or
type
is
web
scenes. is
as
far
as
the
crucial. Ever y
page, your
way
your
IP
having
to
computer
time
you
address
Internet
is
usage
a
domain
remember
is
concerned,
send
sent
can
an
email,
behind
be
tracked!
be
there
sent
where
and
principles
address
the
when
to
about
number
same
computer
form.
right
address
the
site
on
the
Internet
has
an
address
known
as
URL
(uniform
enter
its
resource
locator). To
access
a
site, you
through
you
address
(URL)
into
the
web
browser. ere
want
space
at
the
top
of
the
screen
(labelled
‘address’)
for
postcode, or
have
a
are
to
to
enter
the
URL. For
example, typing
be
www.nationnews.com
would
give
you
access
to
the
Internet.
Nation
other
72
that
other
together.
protocol/Internet
sent
then
a
important, particularly
go, providing
applied
computer
numbers
you
a
to
example, 194.238.196.100. e
a
it
one
linked
Ever y
is
host
address
Internet
data
Internet
is
data
standard
linked
as
the
control
breaks
Internet. TCP/IP
Getting
or
protocol
many
of
Internet
concepts.
identifying
way
the
email, news
with
is
Internet
as
Internet, the
computers. Each
following
on
concepts
newspaper
Caribbean
for
up-to-date
newspapers.
news
and
links
to
is
3.2
Web
technologies
Table 3.4 Understanding Internet addresses
//
/
A
double
A
slash
slash
(/)
in
(//)
an
in
an
address
address
shows
gives
the
you
path
the
path
(route)
to
to
the
where
computer
resources
(ser ver)
are
on
stored
which
on
the
the
resources
ser ver.
In
other
are
stored
words,
the
exact
location
http
This
tells
you
computer
ftp
File
.com
.com
transfer
.uk
.uk
.edu
.edu
.bb
Barbados’s
.org
.org
in
in
an
an
in
in
an
.gov
in
.net
.html
or
.htm
will
tells
you
see
a
in
a
an
at
the
but
sites
organisation:
countr y
Other
transfer)
is
for
the
set
of
that
allow
rules
you
example,
Kingdom:
(protocols)
used
to
show
web
pages
on
a
of
include
some
.tt
kind:
to
transfer
files
across
the
Internet
www.nationnews.com
for
www.uwi.edu
extensions
organisation
(.bb
the
for
United
example,
countr y
is
ser vers
websites,
non-profit
a
web
university :
example,
– The
University
for Trinidad
for
www.bbc.co.uk
of
the West
and Tobago
example,
and
Indies
.lc
www.rss.org.bb
for
is
St.
the
Lucia
Regional
extension)
government
depar tment
or
organisation:
for
example,
www.bgis.gov.bb
–
the
Barbados
Ser vice
Internet
appear
not
Barbados
indicates
or
are
(hyper text
from
commercial
extension.
Information
often
a
that
indicates
located
network
sites
indicates
address
addresses
that
browsers
the
it
today
Instead, you
is
a
do
just
that
that
not
type
starts
websites, but
across
the
name
ser ver
is
a
transmit
names
sites
the
ser vice
end
of
provider:
an
http://. e
require
save
you
you
to
‘www ’ followed
with
that
address
for
example,
and
indicates
www.sunbeach.net
that
it
is
a
file
which
contains
hyper text:
that
is,
a
web
you
may
‘ftp’. F TP
allow
you
sites
to
the
the
also
on
time, most
type
by
via
http
see
are
‘ http://’.
hypertext
a
link, you
which
may
computer
rest
links
are
be
at
a
on
the
taken
on
the
page. at
from
same
remote
one
is, when
website
computer
or
to
a
you
click
another,
dierent
location.
an
not
transfer
les
Internet.
of
the
web
computer
web pages
are
start
website. To
address. Sometimes
address
e
a
will
Ftp
Http
retrieved
page
Y
ou
of
is
.html
website.
indicates
countr y
address
System
a
been
indicates
address
an
is
protocol.
address
Government
.net
it
have
address
an
Security
.gov
that
that
prexed
ser ver
which
over
by
is
next
uses
the
the
URL. A
software
Internet. Many
www, for
com, www.sunbeach.net. If
in
special
example
you
enter
web
to
web
ser ver
www.caribsurf.
the
web
ser ver
Fig 3.11 The Internet homepage of online Caribbean newspapers
name
for
into
the
the
web
site. is
is
browser, you
like
the
title
will
page
see
in
the
a
homepage
book
from
If
which
other
related
pages
may
be
accessed. Y
ou
will
you
message
if
there
is
no
homepage
not
use
a
engines
is
the
located
le
name
web
server
then
the
name
name
extensions
on
of
comes
the
web
the
le
pages
folder
being
are
where
the
web
is
an
information
search
retrieved. T
ypical
htm
or
retrieval
system
users
to
connect
from
one
website
that
have
html.
Whenever
to
visit
engine. A
nds
their
of
you
of
the
site
you
search engine
websites
own
nd
again, you
want, you
is
a
software
using
keywords. Search
websites, such
as
www.google.com.
favourite
a
site
that
you
can ‘bookmark’
sites. By
opening
think
it, by
your
you
would
adding
list
of
it
to
like
your
favourite
which
sites, you
enables
URL
le
list
e
the
available.
application
After
know
get
can
a
do
to
can
go
straight
to
any
site
you
have
bookmarked
another
without
typing
the
URL
or
using
a
search
engine.
73
3
Computer
Search
is
engines
indexing
known
new
this
networks
as
sites
way
index
is
the
that
updated
allows
web
you
by
on
billions
software
continually
web
to
technologies
words
undertaken
spiders)
or
and
search
pages. Indexing
search
using
of
web
robots
the
web
web
pages.
plain
the
for
pages
as
keywords.
are
pages
using
and
send
the
Internet, your
web
les
on
your
hard
disk
as
you
pages
les
it
speeds
and
les
folder. is
the
les
of
up
already
access
are
stored
in
a
Some
is
known
‘temporar y ’ pages
the
been
more
display
to. is
quickly
called
vlogs
Internet
and
users
(podcasting)
viewers
in
email
m e s s age
you
need
to
ha ve
an
e mail
as
a
and
pages
of
because
from
hard
a
your
own
an d
know
the
email
add ress
intended
re cip ie nt.
An
advantage
of
u sing
is
that
les
contain ing
pictures ,
s ou nd,
v id eo
text
c an
be
attac he d
to
the
m es sage.
A l so,
more
cache
les
is
sites
important,
that
you
computer
disk
than
does
can
in
from
one
email
an
c an
 le
c an
message.
not
need
email
be
to
list
sent
be
to
attac h ed
W hen
be
f or
an
an
and
e mail
is
on l in e. e
t he
or
with
s ent,
t he
mes s age
re cipient
in d iv id u al
se nt
a
to
is
read .
group
one
recipient
st ore d
One
of
e mail
p e ople
podcasts
post
to
‘blogging’ for
vlogs
data)
simultaneousl y.
‘vlogging ’ for
or
of
is
frequent
commentar y, descriptions
audio
w ritten
temporar y
web.
Blogs,
an
of
eac h
than
caching
have
are
up’ the
view
and
as
codes
‘mark
browser
email
them. ese
e
to
cache
you
Internet
formatting
(appear ing
Email
of
stores
the
data
document.
address
W hen
and
the
in
To
Internet
text
amongst
(also
can
can
posts
be
to
of
video
on
the
of
events, graphics, video
personal
posts
of
posted
reply
of
items
websites. is
text
or
entries
any
picture
called
is
or
also
entries
or
‘ vlogs’. Blogs
subject, and
readers/
post.
Fig 3.13 There are dierent web apps for storing email messages
Here
are
some
advantages
of
email:
Fig 3.12 Vlogging is a popular way to share information
◆
Creating
Hyper text
based
by
a
web
create,
codes
format
data
is
create
a
which
and
to
It
to
(HT ML)
web
pages
formatting
instr uct
display
be
Ordinar y
sent
L anguage
used
browser.
of
page. e
pages
Markup
language
consists
74
web
the
displayed
the
is
browser
the
since
how
on
pages
◆
display
is
the
to
web
w ritten
Emails
as
it
◆
takes
several
immediately, and
recipients
text-
language,
information
on
a
for
mail
check
do
typical
ere
paper,
is
not
have
replies
email
received
as
can
soon
be
as
email.
to
be
as
formal
and
structured
letters.
no
or
their
days, but
go
company.
need
to
a
to
ge t
po s t
s tam ps ,
b ox
or
envelop es
the
p os t
or
room
in
a
3.2
Disadvantages
of
email
include
the
compared
following:
A
◆
Not
ever yone
has
access
to
a
computer
or
smartphone
application
to
use
the
email
Emails
◆
Replies
email
Voice
to
are
are
and
over
transmit
such
as
Internet
private
dependent
the
( VoIP)
sound
over
Skype
telephone
that
the
it
as
reading
IP
convert
not
the
of
to
users
the
an
avoid
3.14)
is
an
telephone
example
of
a
ser vice.
wireless
that
instant
can
deliver
messaging
VoIP
, access
and
browsing
email
the
and
be
used
Internet.
letters.
recipient
Internet
voice
others
ordinar y
accessing
the
message.
users
connection. A
some
on
personal
into
protocol
digital
Internet. Software
enable
calls
is
as
(Fig
an
facility.
for
◆
using
technologies
the
device
software
with
Web
to
use
with
major
paying
or
the
used
form
and
applications
Internet
without
advantage
to
make
another
of
international
VoIP
call
is
charges
Fig 3.14 Smar tphones are an example of a wireless device with VoIP capabilities
Email
World
Media
wide
web
streaming
(www)
Mobile
Personal
and
computer
and
phones
tablets
laptop
Social
E-commerce
online
media
and
banking
File
sharing
cloud
and
storage
Fig 3.15 The main services provided by the Internet
75
3
Computer
networks
and
web
technologies
Table 3.5 Advantages and disadvantages of the Internet
Advantages
◆
You
can
you
like
There
◆
–
is
Disadvantages
find
enormous
collaboration
–
of
shown
on
research
–
gathering
–
access
–
to
–
information
of
interactive
Some
web
on
vir tually
any
topic
The
◆
potential,
students
par ticularly :
(and
teachers)
on
dangerous
experiments,
can
be
Many
data,
and
access
can
have
the
weather
web
the
the
can
on
work
commercial
ser vices
be
and
data
multimedia:
that
is,
text,
child
the
net:
or
on
be
the
quality
therefore
may
Also,
be
some
highly
some
connections
and
high
of
information
information
offensive,
material
is
may
such
illegal
available
as
and
not
racist
obscene,
such
pornography
–
many
schools,
organisations
access
is
hackers
possible
Searching
◆
sound
it
is
knows
possible
to
have
It
◆
demand
from
organisations
on
Internet,
equipment,
can
for
the
colleges,
Internet
to
gain
businesses
via
a
access,
and
computer
via
the
other
network.
Internet,
to
is
rather
than
in
an
It
◆
is
for
adver tise,
example,
sell
goods
shopping
to
information
to
difficult
easy
home
for
how
to
narrow
protect
download
possible
held
to
on
a
can
down
be
copyright
copyright
download
computer
difficult
searches
music
on
a
unless
a
material:
the
search
for
without
computer
or
in
example,
paying
viruses
user
that
for
can
it
any
three
of
the
main
ser vices
provided
by
it
network
or
and
the
3
each
Internet.
2
Explain
the
a
modem
b
router
c
switch
d
network
Name
purpose
of
the
following
devices:
a
the
of
type
the
allows
you
inter face
card
(NIC )
or
mostly
network
that
is
most
suitable
for
following:
connected
b
of
to
to
use
a
the
landline
phone
while
Internet
associated
with
mobile
4
What
is
the
dierence
between
a
5
What
is
the
name
text-based
phones.
blog
and
a
vlog?
network
of
a
language
used
to
adaptor.
create
6
What
web
is
conver t
the
the
transmit
76
it
pages
name
for
of
sound
over
the
display
the
of
by
a
Internet
voice
into
Internet?
web
browser?
protocol
digital
used
form
is
harm
Questions
List
the
engine
banking
1
It
network
Internet,
and T V
now
control
accurate
Security
◆
fun
animation
to
games
as
information
exper ts
to
on
such
more
no
be
as
out
is
computer
charges
on
data
provide
of
propaganda.
office
◆
cost
There
◆
web
video,
people
as
finding
online
explore
faster
such
and
to
education
between
the
–
graphics,
◆
the
interest
simulations,
With
on
telephone
projects
◆
information
to
and
End
Multiple
choice
of
chapter
7
questions
Each
exam-style
of
phone
1
Which
of
the
following
devices
provides
access
to
the
following
systems,
3
questions
features
are
typical
of
2G
mobile
except:
the
a
caller
ID
b
Internet
c
multimedia
d
video
Internet?
a
b
c
router
d
switch.
A
network
connect
a
messaging
modem
8
2
access
adapter
that
to
it
is
allows
called
mobile
and
other
devices
A
streaming.
double
slash
it
is
a
(\\)
in
an
Internet
address
a
that
b
the
web
c
the
path
to
where
the
resources
d
the
path
to
where
the
computer
shows:
le
to
page
on
the
computer
a:
are
stored
LAN
b
MAN
c
WAN
d
WLAN.
(ser ver)
is
located.
9
To
send
an
following,
3
Bluetooth
of
a
b
the
allows
for
the
exchange
of
data
across
to
have
each
of
the
except:
a
a
le
to
attach
b
your
c
information
d
the
to
the
email
shor t
email
to
address
type
in
the
email
distances
wired
d
wireless
email
address
of
each
intended
recipient.
devices
devices.
Each
of
email,
term
another
own
distances
c
a
need
following, except:
long
The
you
each
10
4
email,
for
sending
computer
data
on
a
from
your
network
or
computer
the
Internet
the
following
reasons
are
issues
with
using
except:
to
a
emails
are
b
emails
can
not
c
not
d
you
private
is:
be
sent
immediately
create
b
download
c
modify
ever yone
don’t
has
k now
access
if
the
to
a
computer
recipient
has
read
the
email.
d
upload.
Shor t
5
Which
of
the
following
connections
has
the
11
speed
a
to
send
and
receive
large
amounts
of
Eli
creates
to
share
about
his
favourite
football
matches
with
What
viewers
input
on
devices
the
Internet.
would
be
most
suitable
when
satellite
c
wireless
d
leased
b
is
He
to
type
of
creating
needs
to
his
edit
videos?
his
videos
so
that
they
are
about
line.
ve
A
videos
dial-up
he
6
questions
data?
a
b
answer
fastest
network
where
no
one
outside
is
allowed
access
is
called
this
type
telnet
b
extranet
d
Explain
intranet
d
Internet.
the
e
on
Explain
videos
c
of
is
the
general
name
given
application?
process
that
can
be
used
to
place
his
a(n):
videos
a
long. What
an
c
organisation
minutes
What
the
what
on
Internet.
type
the
generation
viewers
mobile
have
of
storage
is
used
to
keep
Eli’s
Internet.
in
of
mobile
order
to
network
watch
Eli’s
should
videos
his
on
their
phones?
77
3
Computer
f
Eli
networks
and
checked
the
watch
it
but
Within
two
as
soon
he
for
to
Eli
his
videos
of
his
laptop.
audio.
lack
of
gained
videos,
the
are
on
no
produces
characteristic
when
is
the
days,
subscribers
technologies
video
there
explanations
g
web
Give
can
c
possible
who
another
with
address to access the games and join the group.
will
400
be
one.
his
Give
that
i
Jarad
is
plays
connected
explaining
a
online
What
What
the
type
accessing
78
the
what
input
playing
b
to
games
he
using
Internet.
likes
device
is
his
He
about
most
required
one
ii
television,
ensure
records
of
television
Internet?
with
most
suitable
points
the
game.
when
he
for
one
that
members
videos
is
on
e
is
As
of
games.
suitable
the
the
State
Jarad
the
is
other
during
type
play
an
names
State
the
of
in
type
check
member
time
online
the
the
that
is
might
used
enters
they
log
game,
top-right
players
of
that
the
on.
the
number
corner,
who
to
same
are
along
joining
output
that
is
to
name
chat
game.
of
with
the
protocol
that
allows
other
players
while
the
displayed
screen.
the
be
registration.
of
each
shown
information
the
each
information
which
games?
the
Explain
describes
subscribers.
then
the
Describe
notied
d
12
Jarad is part of an online group that plays computer
games. They must all register using their email
audio.
around
information
shared
He
two
playing
A
PT
E
C
H
4
I M P L I C AT I O N S
4.1
Computer
Organisations
and
money
systems
and
spend
tr ying
are
to
secure
systems, their
Internet
data
cannot
considerable
make
be
sure
various
their
amounts
that
importance
and
MISUSE
their
of
information
hazards, both
of
securing
network
◆
time
access
natural
◆
internally
not
vulnerability
is
damage
◆
a
weakness
or
aw
in
one
computer
systems, or
lack
of
connectivity
to
weakness
even
the
can
be
used
to
its
data. e
created
which
not
to
kept
access
software
may
be
in
locked
rooms
or
software
(known
awed
and
as
proprietar y
may
as
a
result
data
anti-virus
for
programs
to
scan
email
viruses
former
employees
whose
passwords
and
security
computer
information
systems. is
SECURIT Y
or
◆
more
CYBER
software
produced
software)
the
overstated.
and
passwords
computer
to
hardware
attachments
Computer
AND
vulnerability
against
man-made. e
OF
gain
access
have
not
been
removed
from
the
and
system
damage
system
or
fact
that
the
◆
system
is
exposed
to
the
possibility
of
theft
or
employees
money
is
its
vulnerability
. A
computer
system’s
and
its
hardware, software, data
to
fraudulently
obtain
using
the
company ’s
payments
for
name, for
non-existent
example
by
orders.
communications
users.
Vulnerabilities
classied
External
◆
attempt
vulnerability
receiving
includes
who
damage
as
systems
being
from
and
their
external
data
and
can
be
internal.
sources:
minimal
and
of
or
their
oods
no
data
and
protection
from
other
of
natural
natural
computer
systems
disasters, for
phenomena
example
(hurricanes,
earthquakes, volcanoes)
◆
lack
and
of
protection
spikes
software
◆
terrorist
with
that
and
from
could
stored
activities
computer
electrical
damage
data
that
power
computer
surges
hardware,
Fig 4.1 Power surges could cause damage to computer hardware
les
target
systems, for
buildings
example
or
rooms
bombings,
arson.
Threats
A
security
threat
vulnerability
indicates
Internal
and
a
or
secur ity
attempts
weakness
possible
to
in
danger
take
a
to
advantage
system
one
or
or
its
more
of
a
data. It
computer
sources:
systems, or
◆
errors
◆
no
by
employees
backup
who
procedures
in
over write
place
for
or
erase
data
les
data
security
software
by
refers
extension, a
to
the
resources
network.
protection
against
their
of
Computer
hardware
accidental
or
and
deliberate
79
4
Implications
of
damage, theft
Data
or
security
intentional
misuse
is
or
and
cyber
corruption
the
(in
protection
accidental
Computer
users
can
company ’s
computer
security
the
of
case
data
of
software).
the
greatest
cyber
threat
persons
of
an
so
that
should
have
access
security. Only
to
organisation. Computer
each
programs
user
and
duties. Each
username
has
data
access
they
user, for
the
to
only
need
to
for
with
and/or
focuses
access
computer
a
unauthorised
on
network
stopping
or
other
attempt
via
the
threats
systems
to
access
a
Internet. Cyber
that
in
attempt
the
to
network. It
a
the
network
by
maintaining
logs
on
attacks
are
and
attempted
breaches, monitoring
and
protecting
against
sources
of
attacks
systems
future
ones.
structured
various
performing
example, is
andpassword
the
an
authorised
computer
networks
is
security
protects
system
threat
system, device
against
damage.
represent
A
provided
which
they
access
and
their
with
log
in
a
to
use
networkresources.
Deliberate
Hacking
is
damage
the
networked
or
or
data
damage
can
occur
unauthorised
stand-alone
and
when
computer
use
systems
programs. Deliberate
there
is
a
planned
of
to
steal
damage
attempt
to
bypass
Fig 4.2 Cyber security focuses on stopping threats to systems in a network
all
legitimate
occurs
when
Network
access
restrictions. is
security
access
administrators
logs
to
monitoring
should
obser ve
be
the
is
damage
not
enforced.
maintained
resources
usually
by
being
network
Questions
used
1
at
any
time
by
users
and
the
time
of
their
logging
Name
could
and
logging
out. ese
software
access
restrictions
to
ensure
system
security
is
maintained.
Answer
Accidental
genuine
the
most
from
damage
by
recent
also
to
computer
computer
data
occurs
secondar y
or
as
occurs
users, such
entering
a
storage
data
channels
term
result
as
incorrect
of
devices
information
to
save
is
vir uses
or
via
transferred
time. Information
vital
decisions
that
depend
computer
that
that
based
security
and
on
the
data
terms
security.
describes:
the
protection
of
data
b
the
protection
of
hardware
over writing
resources
c
commands.
against
damage
attempt
to
and
software
damage
take
advantage
of
a
weak ness
in
system.
transferred
3
Internet.
an
against
Select
the
appropriate
beginning
for
each
of
the
statements:
Deliberate/Accidental
via
is
needed
on
the
content
of
a
planned
computer
electronic
often
is
to
b
login
damage
electronic
of
viruses
by
persons
other
occurs
eorts
may
represent
than
the
when
sensitive
information.
all
requirements.
damage
erroneously
occurs
as
transferred
a
from
storage
devices.
Cyber
threat/Security
is
an
unauthorised
intended
deliberate
to
access
a
system
via
the
Internet.
attempts
d
access
bypass
transmissions
attempt
receiver. Such
to
the
c
intercepted
attempt
Deliberate/Accidental
secondar y
communication. However, all
80
questions
the
result
to
sources
vulnerable.
communications
Valuable
be
internal
a
there
can
two
systems
through
a
make
following
threat,
the
following
Data
and
computer
damage
errors
Damage
the
security
State
Accidental
external
make
are
2
necessar y
two
in
Cyber
and
threat/Security
attempted
maintains
breaches.
logs
on
attacks
a
Misuse
Organisations
of
gather
sources, including
information
their
from
a
wide
variety
and
Propaganda
competitors. W hen
people
information
to
organisations, it
use
of
is
usually
inevitably
specic
purpose
such
as
hospitals, clinics
and
and
the
some
Measures
should
therefore
be
in
place
to
ensure
is
not
common. e
than
other
the
25
a
those
misused. However, security
use
for
of
information
which
common. Agencies
companies
names
and
earning
bank
for
to
direct
it
was
for
personal
countries
a
tr ying
you
to
both
material. e
widespread
use
computer
users
has
created
a
readily
you
should
you
have
information
is
may
agent
subscribe
a
mailing
between
level
letter
to
choice
passed
as
to
a
lists
example,
support
to
18
and
sold
by
computer
become
personal
use
mind
propaganda
material. In
may
be
used
to
sway
favour
of
one
opposing
party
group
or
in
an
groups.
your
use
computerised
systems
information, date
who
you
that
are
others
to
believe
or
make
transfers
birth
typically
online
identities
cash
are
of
by
that
by
to
and
used
by
people’s
other
banks
telephone. ey
expensive
using
you
steal
your
are
to
then
purchases
or
information
conducting
the
to
online
transaction.
on.
and
theft
checking
can
bank
be
prevented
and
credit
by :
card
statements
for
sof tware
increasingly
systems, it
in
details
those
make
dependent
becomes
more
purchases
on
◆
information
such
thef t
unusual
organisations
such
discredit
card
facilitate
not
whether
credit
prove
targets
may
Criminals
◆
data
transmitting
to
another
software. Y
ou
a
be
as
from
of
intended
clients. For
persons
salar y
receive
sell
provide
insurance
advertising. If
may
may
of
given
Propr ietar y
their
information
spreading
breaches
Identify
As
for
purposes
originally
potential
addresses
associated
magazine, you
this, but
seeking
above
an
company
by
means
Identity
also
distribute
use
that
attempt
is
harmful
Internet
public
information
other
to
their
agencies.
accessible
are
in
health
of
insurance
systems
resulted
for
benecial
a
computer
voluntarily
has
provide
4.2
information
employees, customers,
e
suppliers
of
using
a
secure
website
when
making
online
important
purchases
to
protect
those
systems
and
the
data
they
contain.
◆
e
data
and
software
developed
and
used
not
making
card
by
the
organisation
is
known
as
must
often
be
used
by
employees
for
go
to
using
a
debit
which
is
connected
to
your
main
source
great
funds
day-to-day
◆
operations. Organisations
purchases
proprietar y data
of
and
online
exclusively
lengths
to
not
using
public
computer
systems
to
enter
personal
protect
information.
the
integrity
and
security
of
this
data.
Financial
Computer
Developments
contributed
processing
to
and
fraud
in
a
fraud. e
which
computerised
growth
the
information. is
Another
use
has
following
information
in
of
led
electronic
computers
to
a
rise
examples
can
systems
be
in
show
misused.
have
to
misuse
computer-based
various
ways
example
individuals
transaction
in
abuse
have
accounts
accounts
to
examples
that
do
of
not
and
unauthorised
changed
the
advantage. ere
people
exist
computer-based
gained
nancial
their
of
in
setting
order
up
to
fraud
access
details
have
websites
accept
is
for
to
of
also
where
those
been
companies
people’s
credit
card
payments.
81
4
Implications
Phishing
Phishing
email
though
bank
and
cyber
Industr ial
attacksinvolve
that
tr y
the
are
from
university
information
password
in
a
an
in
may
order
or
to
as
in
of
websites
you
into
appear
ocial
such
form
use
totrick
information. ey
or
security
attacks
they
personal
or
misuse
messages
personal
a
of
and
entering
to
look
organisation
trick
your
reply
you
credit
to
an
Some
your
as
such
into
card
competitors
examples
include
email
marketing
typing
have
this
number
photographing
out
asking
done
at
send
a
money
later
to
help
date. Y
ou
someone
should
who
ignore
will
these
repay
are
intended
to
steal
money
from
attachments
in
email
that
you
do
not
know
contain
a
virus
or
malware
the
that
and
other
personal
they
has
been
from
searches
computer
systems
so
much
data
or
impossible
computer
is
to
type
access
their
and
for
of
results
attack
processing
legitimate
attack
CXC
is
a
that
or
in
a
network
to
it
to
to
access
it
the
time
devices
tr ying
to
see
of
any
to
websites
or
or
receiving
results
performance, especially
of
a
openles
stored
on
the
inability
any
lots
in
of
an
network
attack
to
the
is
possible
to
gather
a
distance, by
using
equipment
which
can
the
radiation
emitted
by
the
being
displayed
without
the
at
the
time
knowledge
of
can
the
is
the
electronic
more
groups
of
electronic
communications
without
communicating
data
use
the
permission
parties. is
includes
communications, voice, fax, phone
computers
being
can
be
transferred
communication
modied
in
any
channel
to
electronic
such
as
and
intercept
form
telephone
network
waves
and
so
on. In
some
companies, it
or
the
policy
for
all
electronic
communications
to
reach
a
regularly
monitored, including
junk
W hen
email.
inconvenienceto
a
majority
of
of
their
telephone
and
email
employees.
the
person
who
intended
to
individual.
this
threat
is
done
by
of
invasion
to
avoid
unauthorised
of
privacy
persons, however,
becomes
real. It
idea
transmitting
sensitive
a
information
caused
sabotageonly
is
users
electronic
form
unless
there
is
an
encr yption
an
system
or
the
accessed
website
although
usually
organisation
82
viewing
hacking
when
in
the
or
the
information
include:
good
the
data
monitor
email. Some
the
on
and
by
cloud
diculty
is
it
from
available
process
two
messages
◆
achieved
user.
computer
be
◆
that
Electronic eavesdropping
between
resources.
students
same
attack
dicult
their
network
20,000
at
an
makes
with
is
the
databases
computer
obser ved
lines, radio
attempting
be
when
over whelmed
other
portal
of
occurs
are
users
similar
web
online. Signs
decrease
can
passing
contain.
shown
and
be
along
◆
it
insiders
information.
networks
systems, devices
the
break-ins, illegal
attack
(DOS)
or
would
for
computer
denial-of-ser vice
they
attachment
then
A
research,
past
eavesdropping
monitor. e
Denial-of-ser vice
information
from
receive
passwords
the
documents, and
organisational
commercially
may
on. In
to
their
you. Avoid
messages
since
access
over
messages, as
data
senders
advantage
it
It
downloading
an
strateg y, latest
so
through
of
gain
you
Electronic
they
and
to
gaining
information. Now
information
to
tr y
illicitly
plans
email.
messages
their
by
expansion
into
Other
organisations
about
as
espionage
in
place
to
ensure
that
the
data
is
secure.
4.2
Most
companies
(often
by
the
ensure
that
communication
transmitted. If
intercepted
is
the
useless
since
intended
which
even
receiver
the
this
data
is
persistent
their
can
often
by
have
be
not
the
the
decoded
enough
eavesdropper
from
is
software)
information
will
data
is
before
wrong
it
not
is
and
key
the
abide
Many
and
software
accessed
programs
online
by
However, these
or
users
les
are
organisations. ere
programs
and
limitations
music
on
how
erefore, when
to
music
money
a
recording
what
you
can
a
do
are
specifying
use
an
or
the
or
are
can
in
is
by
world.
individuals
for
should
program
and
be
or
used.
listen
restrictions
e
of
or
to
to
occurs
obtain
piracy
the
them
for
when
of
rightful
their
from
of
owners
does
from
illegal
copies
creative
information
someone
permission
results
distribution
prevents
usually
an
use,
software
from
or
getting
eorts.
hackers
on
of
they
see
they
their
target
to
does
this
their
and
are
commit
critical
as
a
gaining
that
of
varies;
of
access
they
system
in
some
against
is
those
sucient
their
are
to
access.
game-playing,
skills
destructive
acts
into’ a
authorised
form
computer
just
more
‘ break
have
inltration
organisations
changing
‘hacking ’. Hacking
not
activities
match
and
as
electronically
behind
adversar y
towards
to
individual
them. Others
as
it.
an
access
referred
tr ying
the
purpose
where
all
permissions
some
which
be
the
licences
music
online
song, there
with
owned
rules
due
involves
les
anywhere
legally
programs
you
of
from
type
rules
Unauthor ised
piracy
music
the
piracy
of
most
inter vening.
and
by
music, and
with
is
Sof tware
music
sharing, selling
read. However,
stop
or
owner. is
persons, it
unreadable. e
decr yption
to
Software
encr ypted
Misuse
for
intentions:
antagonistic
‘electronic
vandalism’ such
data.
Questions
1
Explain
the
dierence
a
computer
b
phishing
fraud
and
between:
and
propaganda
identity
b
hack ing
c
using
For
each
of
the
following
state
the
type
of
and
computer
a
tr ying
indicate
or
to
whether
multiple
it
aects
to
information
monitor
electronic
over whelming
a
a
that
system
it
makes
with
it
so
much
dicult
to
data
and
access.
single
systems:
electronically ‘break
authorised
electronic
devices
software
processing
threat
viewing
communications
theft.
d
2
and
electronic
in’ without
access
83
4.3
W hether
methods
or
to
Dat a
a
threat
should
minimise
be
its
procedure, either
reduces
or
is
protection
deliberate
taken
to
eliminates
a
accidental, all
prevent
eects. A
physical
or
it
from
occurring
countermeasure
or
logical, that
Depending
is
a
be
used
to
software
the
create
techniques
recognises,
on
for
and
to
computer
users
who
data
to
protection
hardware
against
loss
or
damage. It
with
also
data
laws, which
set
down
rules
information
can
are
several
monitoring
devices.
be
kept
by
others
utility
sof tware
that
passes
into
and
out
of
a
network
can
be
is
also
known
as
‘packet sning’,
about
where
what
attack. ere
can
refers
monitored. is
data
an
sur veillance, it
can
All
their
prevent
the
threat.
refers
protect
or
of
sur veillance, including
Monitor ing
Data protection
purpose
about
a
packet
is
the
message
being
checked. Messages
you.
can
a
be
monitored
computer
on
using
the
utility
network
software
which
can
or
by
using
obser ve
all
Sur veillance
packets
Computer sur veillance
technolog y
from
the
to
gather
involves
computer, often
knowledge. Monitoring
with
methods
typical
of
to
method
security
is
to
without
employed
the
to
protect
with
them. Common
physical
security
exits
building
and
is
a
method
physical
and
Monitor ing
Physical
together
personnel
the
is
in
user
threat. is
surroundings, that
computers
the
a
approaches
keystroke
device
a
the
more
to
inc lude:
closed-circuit
TV
hardware
the
network.
all
device
information
sophisticated
itself. e
devices
in
then
be
be
inserted
of
retrieval
into
by
be
the
user
over
retrieved
reproduced. Other
can
the
hardware
requires
are
keyboard. is
made
can
can
‘ bugs’
the
devices, which
disadvantage
and
devices
called
keystrokes
time. e
keyed
hardware
implanted
record
of
information, can
obtain
more
computer
devices
physical
is
that
entr y
into
monitors
the
◆
electronic
◆
computer-controlled
alarm
with
loggers
can
period
and
rooms
or
placement
◆
through
of
the
user ’s
and
authorised
identify
use
from
entrances
identify
used
the
information
passing
place
where
the
computer
is
stored. is
can
be
a
systems
legal
locks
that
check
oence
and
is
a
violation
of
privacy
without
legal
employee
authorisation.
badges
◆
biometric
recognition, such
scans
voice
and
rooms
◆
access
or
to
as
authorise
ngerprints, retina
entr y
to
dierent
buildings
Protection
Data
codes.
should
including
also
the
from
be
risk
of
protected
are
some
negative
consequences
to
optical
loss
◆
lack
◆
potential
privacy
of
diculty
scope
◆
84
of
limited
for
the
such
user
of
security
misuse
monetar y
◆
disasters,
damage, dust
reproof
and
cabinets
and
keep
critical
data
stored
on
media
such
as
sur veillance, including:
◆
of
use
natural
of
safes
computer
from
re, storm
humidity. Organisations
However, there
nature
of
information, possibly
for
in
determining
sur veillance
measures
to
the
source
activities
prevent
in
and
some
computer
possible
organisations
sur veillance.
electrical
hardware
of
gain
disks, tapes
an
and
microlm
hazards. Computer
power
surge
against
outages
systems
protectors
electrical
can
be
to
to
protect
should
protect
surges
and
minimised
against
make
computer
spikes. e
with
the
use
uninterr uptible power supply (UPS) . is
contains
a
electricity
batter y
during
which
a
supplies
power
outage
equipment
so
use
that
data
eect
of
device
with
can
be
4.3
backed
be
up
and
performed
a
normal
(Fig
shutdown
of
the
hardware
can
Today, hundreds
ever y
4.3).
are
those
three
that
attached
those
to
a
small
the
to
of
virus
infect
the
le, the
run
is
les
of
new
viruses
appear
system
that
with
tells
Access. e
macro
as
the
computer
system. By
into
application
is
is
program
les. e
boot
how
is
le
to
infecting
memor y
is
written
virus
the
code
well.
computer
are
virus
when
boot
loaded
the
an
and
or
operating
is
virus:
les. e
loaded
viruses. ese
associated
of
program
virus
whenever
macro
types
program
program
rest
boot
◆
that
main
infect
loaded, the
◆
thousands
protection
day.
ere
◆
or
Dat a
is
load
this
and
is
able
on.
in
a
such
carried
language
as
by
Microsoft
a
database
le
Fig 4.3 Uninterruptible power supply (UPS) provides electricity for a shor t
and
is
executed
when
it
is
opened.
period after power outage so that computer data can be saved and systems
can be safely shut down
A
it
Protection
from
worm
does
is
not
another
require
electronic
a
schools
often
lock
computers
to
the
desks
theft
of
the
system
units
and
is
still
the
capable
theft
of
memor y
drives, CD
and
a
to
virus,
be
DVD
can
be
transmitted
via
email
and
of
copying
themselves
into
memor y. Mass
worms
can
create
infected
email
messages
chips,
and
hard
order
peripherals.
mailing
However, there
in
to
are
prevent
threat. Unlike
program
thef t
transmitted. Worms
Some
host
drives, printers, inks
send
them
to
the
addresses
saved
on
the
infected
and
computer.
other
accessories. Organisations
authorised
computer
persons
and
should
maintain
limit
records
access
and
logs
to
of
usage.
Preventing
V irus
data
Computer
viruses
protection
for
computer
les
and
vir us
makes
is
a
intercept
them
program
do
that
something
infects
viruses
copy
of
the
virus
unexpected
program
is
a
computer
le, and
when
the
le
is
into
Computer
has
by
users
become
email, or
USB
and
memor y, other
unaware
infected. If
given
memor y
the
are
les
to
one
other
stick, then
become
that
of
a
the
users
used
other
program
a
or
les
device
computers
best
a
is
such
are
le
sent
as
a
infected
an
increasing
threat
to
Install
1986, there
was
only
one
computer
known
to
protect
anti-virus
protects
against
viruses
a
computer
the
sof tware.
operating
viruses. It
and
Anti-virus
data
in
and
system
or
against
viruses
then
for
any
system, programs
regular ly
removes
software
storage
Anti-vir us software
can
scans
any
be
a
viruses
set
up
devices, Internet
viruses. Because
and
les
computer
to
that
are
found.
automatically
downloads
new
for
and
viruses
are
systems.
being
In
computer’s
to:
check
virusspreads.
are
infect
a
from
software.
way
emails
V iruses
to
scan
protect
and
infected.
infected
on
attempting
only
also
inserted
◆
loaded
not
but
or
is
into
viruses
computer
e
damaging. A
programs
harmful
application
A
viruses
computer
discovered
on
a
daily
basis, leading
anti-
virus.
virus
software
products
such
as
Avast, AVG
and
85
4
Implications
McAfee
of
misuse
have
downloaded
and
cyber
anti-virus
from
their
security
updates
automatically
websites
to
keep
protection
up-to-date.
◆
Turn
on
program
programs–
have
is
for
built-in
the
virus
protection. Some
example, Microsoft
macro
case, make
virus
sure
applications
protection. W hen
that
it
is
turned
–
this
on
(enabled).
◆
Tr y
to
know
use. In
–
the
hence
the
age
the
origin
of
the
need
for
of
each
program
Internet, this
anti-virus
is
or
ver y
le
you
dicult
software. As
a
Fig 4.4 Files can be restored from backup copies
rule,
Most
beware
of
free
software
and
software
modern
automatically
from
the
Never
open
an
email
attachment
that
contains
executable
le
VBS, even
if
with
how
viruses
an
extension
EXE, COM
many
you
Protecting
know
are
who
sent
the
email. is
spread.
les
contains
Some
and
the
raw
oods
databases
data
for
in
an
therefore
Maintaining
of
several
all
its
aord
generations
critical
les
of
are
backup
preferably
les
in
should
separate
be
are
its
to
lose
the
backups
as
well
in
and
businesses
it
is
or
(copies)
and
other
of
reproof
away
from
even
agents
if
booking
ights
or
lost. ink
they
les
is
to
in
storage
stored
online
as
often
as
in
such
that
as
a
location
to
hurricanes, volcanoes,
would
vicinity, along
remote
destroy
with
any
other
backups
equipment.
remote
data
backup, stores
and
companies
buy
for
easier
access
to
data. However, data
prone
out
of
to
deletion
if
the
online
storage
business.
main
archive
a
preser ves
regular
les
basis. By
space
could
can
that
become
what
not
would
use
a
important.
depend
on
damaged,
released
extracted
on
for
if
example, an
the
recovered)
doctors
prevent
regular
become
data
from
as
on
who
that
you
no
longer
need
putting
hard
them
disk
(or
in
an
archive,
network
drive)
can
the
not
like
up
of
les
damaged
or
they
the
backup
valuable
be
copy, and
often
the
tax
may
for
for
be
reference. For
preser ve
forms
can
archives
future
of
reference
past
only.
and
cyber
secur ity
address
cyber
threats
with
encr yption
this
is
decr yption
are
techniques. ey
encode
data
before
essential.
business
information
arises, usually
organisation
and
les. Archives
access
restored
backups
need
current
for
corrupted, then
contain, can
by
happen
database
could
situations
backing
normal. How
how
your
use
ledgers, receipts
that
it
appears
unintelligible
unless
it
using
a
software
key.
(or
can
made
is.
so
the
decr ypted
86
stored
disasters
is
goes
transmission
does
depends
day, or
safes, or
or
happening, the
continue
also
cyberspace. Users
Companies
patients’ details. To
les, and
other
alternative, called
Network
le
performed
master
the
always
organisations
essential. F iles
travel
a
be
archives
backups
corrupted
If
are
earthquakes
online
be
to
day, ever y
immediate
storage
databases
can
centre.
Backups
For
CD-RW. Backups
as
on
Making
to
lifeblood.
An
computer
les
records.
advised. e
stored
buildings
work
against
or
company
and
data
information.
organisation
cannot
or
backups
backups
archives
of
necessar y.
Another
databases
Companies
backups
is
in
the
performs
tape
each
protect
Often
which
or
deemed
database
software
an
after
A
have
Internet.
magnetic
◆
networks
downloaded
Users
with
users
on
an
a
network
individual
accessing
an
can
each
be
given
password. is
individual’s
a
username
prevents
other
le, changing
program
is
4.3
settings, or
Other
installing, copying
techniques
through
storage
include
networks, email
devices
and
Copyr ight
Copyright
is
deleting
preventing
or
by
software.
virus
sharing
Software
attacks
and
secondar y
the
rights
of
things
as
given
person(s)
text, a
and
software.
e
main
to
the
protection
responsible
for
piece
program. e
costs
the
in
year. A
of
music, a
illegal
software
copyright
law
copying
painting
copying
and
industr y
would
make
or
to
be
caught
look
also
make
it
copying
an
like
copying
of
a
or
oence
copy
◆
run
or
distribute
copyright
two
or
more
software
software
software
computers
agreement
Intellectual
would
and
be
responsible
for
these
enforcing
music, printed
material
for
has
the
are:
(and
its
packaging)
to
tr y
to
make
genuine
product
selling
recordable
CD-ROMs
that
pirated
downloading
software
software
from
the
Internet;
just
software
can
be
downloaded
from
certain
software. It
permission
been
same
allows
Aairs
bought
time
does
not
mean
that
it
is
free
or
legal
for
you
to
◆
on
unless
using
than
the
software
the
it
software
the
on
number
software
more
of
computers
computers
for
in
a
network
which
there
are
licences.
it.
oce
enforcing
against
piracy
criminal
stealing
without
(licence)
Properties
campaigning
laws
are
of
dollars
Because
e
use
to:
that
at
a
and
download
◆
and
of
sites
would
distribution
programs
a
stealing
millions
it
of
software
because
oence
computer
law
◆
a
of
Caribbean, countries
piracy
types
contain
software
thef t
creating
◆
computer
the
and
it
such
the
protection
piracy
name
the
is
unauthorised
copyright
◆
of
the
piracy
programs. In
media.
and
the
or
Dat a
in
law
piracy
a
countr y
on
copyright
(Fig
4.5).
have
of
all
enacted
of
these
laws
computers. People
prison
the
◆
make
found
it
guilty
countries
illegal
receive
example, it
is
to
a
illegal
misuse
large
to
ne
or
any
of
do
a
following:
deliberately
plant
les
copy
computer
◆
hack
into
or
a
altering
use
a
paid
use
to
into
your
the
personal
programs
to
create
this
illegally
with
commit
a
the
damage
(computer
intention
crimes
ctitious
non-existent
employer’s
countries
protect
that
of
piracy)
seeing
information
unauthorised
Some
viruses
data
computer
computer
example
computer
and
◆
◆
which
sentence. For
program
◆
activities, many
(fraud), for
worker
person’s
computer
to
and
bank
carr y
get
money
account
out
work.
also
have
individual
legislation
from
the
that
potential
information. Contents
of
such
seeks
to
misuse
of
legislation
include:
◆
Information
which
it
was
should
be
used
only
for
the
purpose
for
provided.
Fig 4.5 Software piracy is against the law in many countries, but is not
outlawed worldwide
87
4
◆
Implications
e
of
misuse
individual
contents
of
and
has
any
cyber
the
security
right
personal
to
examine
record
◆
the
representing
the
e
information
should
be
reection
must
periodically
of
the
be
to
be
a
All
of
accurate. Information
updated
true
measures
the
not
◆
e
necessar y
information
threats
individual.
should
be
held
for
longer
than
necessar y.
◆
individual.
◆
Information
should
privacy
be
of
in
the
for
against
ensuring
physical
the
and
security
electronic
place.
individual
should
be
protected.
Questions
1
Explain
why
storage
2
is
mak ing
b
archiving.
Indicate
a
Virus
following
methods
of
An
d
le
3
whether
the
following
statements
are
true
for
of
programs
harmful
piracy
individual
him/her.
of
is
a
should
not
be
held
for
longer
than
the
distribution
no
right
personal
to
examine
of
of
the
individual
protection
for
should
each
of
be
protected.
the
to
keep
to
to
critical
disks
protect
data
stored
protected
computer
and
prevent
on
from
media
risk
hardware
of
following
such
against
electrical
spikes
theft
of
the
system
d
to
monitor
suspects,
k nowledge.
often
units
without
as
re
and
peripherals
the
representing
type
surges
and
c
record
the
optical
b
authorised
privacy
descriptions:
computer ’s
programs.
has
any
scan
viruses.
computer
contents
only
The
State
a
protection
Information
necessar y.
e
backups
Software
use
c
the
false:
data
b
of
impor tant:
a
or
88
each
their
Impact
ere
are
systems
life
–
numerous
play
from
an
examples
increasingly
programmable
of
how
televisions
control
information
important
part
and
in
is
your
of
devices
important
discuss, the
remote-
IT
in
to
the
e-commerce
therefore
following
to
4. 4
wo r k p l a c e
be
using
aware
eects
of
the
Internet. It
of, and
be
able
to
computers.
Table 4.1 Eects of IT in the workplace
Social
impact
◆
Less
◆
A
large
◆
It
may
◆
Privacy
Work
social
contact
increase
become
in
among
the
easier
use
to
considerations
employees
of
computer
keep
–
how
in
touch
secure
games
with
is
(time
people
personal
wasting;
(email,
no
social
social
contact;
addictive;
some
are
educational)
media)
data?
patterns
◆
The
Internet
◆
Advantages
◆
Disadvantages
◆
Advantage
Cashless
and WANs
include
to
are
have
flexible
a
lack
company
of
allowed
hours,
social
includes
a
employees
more
contact
no
relaxed
and
need
to
to
work
from
home
atmosphere
possible
provide
and
disruptions
office
space,
no
or
commuting
distractions
heating,
refreshments
and
so
on
society
◆
Workers
◆
Credit
are
◆
Main
◆
Disadvantage
and
automatically
debit
cards
advantage
is
is
no
the
paid
are
by
used
need
to
electronic
more
carr y
possibility
of
for
funds
transfer
(EFT )
into
their
bank
accounts
payments
cash
fraud
or
lost
or
stolen
cards
Employment
◆
Practical
◆
Possible
◆
New
◆
Workers
Health
skilled
jobs
and
jobs
created
need
to
in
be
Attention
needs
◆
Radiation
hazards
◆
RSI
(repetitive
Changes
ICT
the
if
a
decline
more
IT-related
efficient
fields
IT-based
such
as
system
replaces
programmers,
workers
systems
analysts,
to
be
strain
in
paid
from
to
posture
monitors
and
problems
eye
from
sitting
for
long
periods
the
has
brought
workplace. Most
systems, often
oces
are
used
about
will
connected
as
for
managing
the
need
oces
now
connected
therefore
using
cables
technolog y. Applications
such
databases
mobile
by
a
LAN
by
email, and
millions
of
become
have
W
AN
place
and
without
oces.
the
the
sectors
and,
or
as
with
word
people
ever y
Internet
participants
more
in
these
areas, employees
are
required
more
skilled
in
the
use
of
information
to
perform
their
duties. e
skilled
use
hardware
and
software
that
involve
is
necessar y
information
for
most
collection,
processors,
day. Video
to
and
distribution.
are
conferencing
meetings
having
becomes
wireless
telephones
enables
information
their
Loss
via
economic
or
processing
used
many
use
occupations
and
in
widespread
of
networks
computer
Computers
technolog y
W
AN. Most
a
workplace
to
computer
at
strain
injur y)
the
revolution
in
maintenance
retrained
important
changes
robot
safety
◆
e
on
redundancies
to
leave
of
jobs
and
retraining
take
their
Computers
previously
are
now
done
by
being
used
people. For
for
jobs
that
example, as
were
more
89
4
Implications
customers
of
buy
reduced. e
stamps
there
that
and
Work
use
be
of
an
has
cyber
of
security
online, sta
email
may
in
replace
mail, but, on
increase
purchased
that
and
products
deliver y
could
were
misuse
in
the
stores
the
the
may
purchase
other
deliver y
of
However, telecommuting
be
of
job
hand,
lost
in
an
oce
repetitive
jobs, such
calls
to
oce
as
telephone
operators
dangerous
areas
jobs, such
with
oce
jobs
as
extreme
using
ICT
that
can
defusing
bombs
or
heat
be
skills, for
or
ecient
can
hours
automated
or
take
less
some
jobs
now
example
be
require
saved
quickly
are
among
retraining. Some
new
some
people, retraining
workforce. L earning
on-the-job
to
the
is
typing
and
or
edited
ICT
a
more
to
for
future
to
keep
funds
in
important
short
remain
the
in-house
using
IT
and
outsource
and
in
courses
to
the
a
typing
aspects
since
the
money
for
a
or
a
of
be
instead
a
in
the
to
accessed
of
by
the
by
is
it
would
or
world
with
less
the
more
or
part-time
using
with
a
their
advantage
electricity
telecommuters
are
working
compensate
90
to
to
a
decrease
in
have
to
work. is
allows
spend
on
leisure
pursuits.
of
people
use
as
devices
video
and
information
recorders. e
where
people
a
small
as
the
can
is
if
Internet, has
share
no
were
an
of
led
information
longer
they
growth
in
issue, with
living
closely
village.
about
the
eects
on
young
of
spending
a
long
time
using
computers
and
cost
computer
in
traditional
of
their
games. Some
people
argue
that
basis, at
computer
employers
or
must
from
their
of
reducing
or
mobile
and/or
oce
air-conditioning
also
their
face
higher
socialise
playing
employees
for
this
with
games
encourage
youngsters
withdrawn
others, whereas
can
develop
collaboration
and
others
argue
problem-solving
and
less
skills
teamwork.
as
Health
concerns
Millions
people
of
device
and
computers
leisure. As
with
regularly
any
other
for
work,
equipment,
to
is
space,
usage, but
bills
businesses
added
use
move
should
be
used
safely
and
in
a
way
that
clients.
utility
homes. Some
makes
workers, now
home
or
use
method
people, known
remote
and
to
doesn’t
has
such
disagreement
computers
is
led
completing
employees
work. Millions
full-
communicate
has
skills
education
around
and
thought, millions
communicating
together
learn
that
telecommuters, teleworkers
work, on
systems
them.
now
travelling
to
‘global village’. Distance
likely
location
people
people
second
situation
people
of
Telecommuting
can
working
computers, mobile
prolonged
Work
of
many
devices
playing
to
information
telecommunications, including
so, for
marketable. IT
business
saves
ways
that
time
people
jobs
of
use.
ere
help
use
re-typing
remain
computer
take
to
skills
necessar y
use
people
skills
people.
reduce
time
system
Most
other
may
a
cold
personal
that
with
environment
of
working
W ithout
documents
socialising
home
aspects
concerns
widespread
more
◆
enjoyable
the
extensions
the
in
often
the
more
for
who
more
◆
is
in
the
isolating
includes:
e
direct
of
be
productivity.
Social
◆
one
Distractions
products
online.
been
employee, as
can
if
they
may
expense.
harm
evidence
that
not
properly
can
aect
examples
users’ health. is
using
your
of
using
computer
computer
health
this
a
are
is
and
given
for
a
long
equipment
result
in
important, as
in
or
there
time, and
furniture,
injur y. Some
Figure
4.6.
4. 4
◆
Hold
the
mouse
continuously
◆
Use
◆
Arrange
wrist
Make
sure
D uring
regular
hands, wrists
◆
Relax
Back
Back
Fig 4.6 Using a computer for a long time without proper furniture and posture
–
RSI
don’t
that
your
from
is
your
and
enough
hands
neck
be
in
use
the
the
keyboard
the
or
breaks, stretch
can
IT
workplace
mouse
rests.
so
there
rest
and
of
periods.
separate
that
to
arm
desk
and
keyboard
◆
long
and/or
use, tilted
◆
loosely
for
your
Impact
as
a
by
easy
to
screen.
space
in
front
of
the
arms.
and
form
caused
is
move
of
your
exercise.
tension.
problems
problems
posture
when
can
be
using
caused
furniture
by
poor
or
or
incorrect
equipment.
can result in health concerns
What
Repetitive
strain
◆
Aches
are
all
and
pains, swelling
symptoms
of
and
disorders
diculty
aecting
of
and
neck
that
can
be
caused
by
Use
of
computers. e
common
name
repetitive strain injur y (RSI). RSI
and
is
caused
or
using
the
by
mouse, or
back
problems?
long
and
even
poor
a
chair
that
is
adjustable
that
has
a
tilting
in
height, able
to
Make
sure
that
the
chair
backrest.
for
these
can
be
regular
is
at
the
correct
height
for
improper
to
use
the
keyboard
and
screen.
disorders
Sit
in
a
comfortable
position
and
regularly
change
extremely
periods
of
workstation
way
you
sit
(consider
your
posture).
typing
◆
or
stop
and
the
painful
to
ngers, wrists,
lengthy
◆
is
done
swivel
you
use
be
movement
◆
arms
can
injur y
Use
a
desk
large
enough
to
take
all
the
computer
setup.
equipment.
◆
Take
frequent
short
breaks
and
stand
up
or
walk
around.
Eye
Eye
to
problems
strain
using
fonts
Fig 4.7 Repetitive strain injury (RSI) can be caused by long periods of typing
are
too
and
What
the
most
computer
problems
being
is
can
also
close
be
Computer
screens
linked
to, or
colours
common
done
screens
to
too
used
to
for
in
health
long
poor
far
from, the
eye
linked
periods. Eye
lighting, glare
software
stop
problem
can
and
screen. e
aect
the
size
of
eyes.
problems?
should:
and using the mouse
What
◆
can
Take
be
done
regular
are
RSI?
from
breaks
of
the
5–10
computer
minutes
or
the
mouse
keyboard.
immediately
to
the
ever y
left
not
◆
have
change
hour
recommended.
P lace
the
stop
breaks
activity. Short
◆
to
◆
or
right
of
icker
brightness
easily
◆
tilt
◆
be
contrast
settings
that
can
be
changed
and
swivel
positioned
lights
and
or
to
avoid
windows, and
reduction
glare
be
and
tted
reections
with
from
glare-
lters.
91
4
Implications
of
misuse
and
cyber
security
been
Stress
some
trees)
Using
by
computers, or
computers, can
communication
notebook
be
people
always
be
your
work
as
data
and
mobile
cannot
contacted
take
as
Legal,
email, portable
phones, mean
proper
breaks
immediately. is
as
e
they
too
systems
can
ethical
great
will
deal
Environmental
also
concerns
been
(stealing)
had
adoption
of
information
systems
need
to
power
millions
eects. On
of
the
computers
one
consumption
has
while, on
the
is
held
passed
of
to
has
been
of
electricity
reduced
as
and
other
computers
and
have
teleworking
and
How
forms
of
heating
control
systems. Information
from
to
and
from
work
home. is
and
to
be
moral
eects
an
area
information
Act
and
try
tries
to
to
stop
of
information
of
concern
is
held
on
to
users. A
computers.
that
personal
responsibly
. Laws
hacking
this
ef fects
of
ensure
processed
software. All
moral
far
issues, such
should
raises
and
the
some
have
pirating
important
as
the
following:
therefore
can
a
as
the
the
law
go
in
giving
police, access
to
government
ever yone’s
personal
data
or
How
should
emails
in
order
to
ght
crime?
airfar
established
and
new
technologies,
systems
as
closed-circuit
television
(CCTV )
and
mean
microchip
travel
digitally.
energ y
such
less
stored
therefore
hand, the
◆
conditioning
enabled
and
(and
increased
other
carefully
and
moral
personal
Protection
ocers, such
consumption
paper
hand, the
◆
electricity
of
has
ethical
environmental
and
continue
of
Data
information
also
use
communicated
legal, ethical
e
widespread
the
monitored
bestressful.
e
is
on
stressful. Also, modern
technologies, such
computers
thatsome
can
having
saving
smart
cards, be
used
to
monitor
people’s
reduction
activities?
in
trac
pollution. Although
the
age
of
the
truly
◆
paperless
oce
is
some
years
away, there
has
W hat
will
happen
to
people
who
cannot
aord
to
already
buy, or
gain
access
to, a
computer
system?
Table 4.2 IT skills required in the workplace
Category
Office
of
worker
employees
Teachers
Skills
required
◆
Word
processing
◆
Budgeting
◆
Communications
◆
Basic
◆
Word
◆
Database
◆
Preparing
◆
Network
◆
Operating
–
for
and
document
example,
–
via
troubleshooting
processing,
preparing
fax,
of
email,
–
financial
statements
and
invoices
forum/newsgroups
hardware
spreadsheet
management
preparation
and
software
manipulation
creating
and
searching
databases
presentations
use
–
accessing
hardware
–
and
using
computer
school
systems
LAN
and
resources
peripherals
(for
example,
printers,
scanners,
multimedia
projectors)
Engineers
◆
Installation
and
◆
Software
◆
Installing
◆
Manipulating
◆
Using
basic
troubleshooting
programming
hardware
–
and
ability
to
hardware
design,
test
and
and
software
implement
new
software
software
peripherals
communications
the
of
such
as
systems
–
sensors,
controllers
LAN, WAN,
and
graphics
tablets
(design)
Internet
(continued)
92
4. 4
Impact
of
IT
in
the
workplace
Table 4.2 IT skills required in the workplace (continued)
Category
Medical
of
worker
Skills
personnel
required
◆
Word
◆
Exper t
system
supplies
◆
Prepare
budgets,
◆
Manipulate
media
personnel
document
medical
hardware,
processing
examining
bills,
patient
references
insurance
claims
monitoring
and
for
surgical
using
procedures,
financial
imaging
software
systems
–
for
maintain
for
–
inventor y
example,
example,
of
QuickBooks
ultrasound,
MRI
and
CAT
technology
◆
Conducting
◆
Using
music
◆
Using
MIDI
computer
Mass
and
consultation,
medical
scan
Musicians
processing
◆
storing
◆
Word
◆
Database
teleconferencing
notation
(musical
systems
and
software
–
searches
for
instrument
to
add
retrieving
processing
meetings
and
composing
digital
instrument
music
used
for
among
tracks
from
information
music
inter face)
sounds,
preparing
doctors
optical
retrieval
and
–
different
preparing
hardware
special
ar ticles,
in
lyrics
produce
music
and
inter facing
with
effects
storage
news
to
locations
media
scripts
searching
for
past
ar ticles,
news
ar ticles
from
other
countries
Law
enforcement
◆
Communications
◆
Using
hardware
◆
Word
personnel
◆
Database
Movie
◆
Word
◆
Animation
◆
Accounting
industr y
personnel
using
and
processing
processing
–
–
fax,
for
document
accessing
and
some
and
software
and
searches
email,
are
budgeting
film
and
sound
preparation
records
document
movies
forums/newsgroups
kept
software
with
–
the
used
used
on
preparation
made
–
–
for
known
used
use
to
editing
of
before
preparing
to
case
the
final
repor ts,
press
letters
and
so
on
offenders
for
preparing
computer
create
going
cost
and
movie
graphics
income
scripts
and
animation
estimates
for
for
some
scenes
movies
Questions
1
Name
two
replace
2
With
changes
employment
if
computers
workers.
increased
causes
in
each
a
back
b
eye
of
use
the
of
computers,
following
explain
health
what
problems:
problems
problems.
93
4.5
is
topic
Pe r s o n n e l
lists
the
computer-related
Computer
support
jobs
specialist:
to
computer
specic
application.
converts
e
users
programmer:
specications
the
for
personnel
software
will
provides
who
working
into
into
technical
need
translates
algorithms
programmer
application
some
c o m p u t e r- r e l a t e d
f ields
in
elds.
directly
Computer
of
in
assistance
with
a
analyst-prepared
algorithms
applications
write, test
assistance
and
and
programs.
maintain
the
software.
Fig 4.9 Network engineer working with a server
Social
media
using
social
social
specialist:
media
media
to
create
platforms
employers’ social
brand ’s
communicates
such
media
and
as
with
share
the
public
content
using
Twitter. Manages
accounts, working
to
their
build
the
reputation.
Software
developer:
develops
the
applications
that
Fig 4.8 A computer programmer
allow
users
another
Systems
to
analyst:
assess
their
recommends
analyses
systems
suitability
upgrades
for
for
currently
in
or
computer
Systems
systems.
system
needs
Database
administrator
(DBA):
security
the
the
of
integrated
designs, creates
the
database
database. e
are
also
the
integrity
responsibility
of
W
eb
and
area
networks
and
wide
area
and
maintenance
of
the
up
access
passwords
and
and
security
computer
or
to
a
and
the
maintains
organisation’s
network, and
the
system
permissions
on
the
assigns
and
network.
builds
websites, which
code
necessar y
developers
for
involves
an
oversee
writing
ecient
and
and
direct
development
of
the
website
from
idea
stage
to
its
networks, and
network
measures
rewalls. Also
users
website. Web
published
such
ensures
state, ensuring
that
loading
times
are
components.
minimised
Sets
adds
security
programming
nal
schedules
a
maintains
the
local
monitors
security. Determines
developer:
stable
designs, develops
on
and
the
administrator:
tasks
and
DBA.
Network
specic
device.
administrator:
updates
maintains
complete
place
computerisation
existing
to
that
as
user
all
so
that
users
can
access
information
quickly.
IDs,
shared
Questions
resources, such
working
as
printers
and
disks, are
monitored
and
properly.
1
List
three
types
of
computer-related
Network
engineer:
attends
to
any
hardware
faults
in
the
equipment. Installs
new
that
work
in
and
2
malfunctions
administrators
professions.
Explain the dierence between the jobs of a computer
systems
support specialist and a social media specialist.
and
94
ser vices
computers.
Implications
We
life
need
to
systems
prepare
assignments
in
almost
ever y
meals, maintain
and
travel
to
distribution
Computers
manage
of
large
than
and
mailing.
human
or
responsible
overall
communication
for
management
amounts
manual
of
devices
information
systems, such
as
a
what
◆
what
processing
◆
what
human–computer
◆
which
◆
what
the
and
faster
ling, sorting
people
data
e
rst
Y
ou
can
is
four
now
systems
is
choosing
a
computer
information
system
used, including
and
for
this
and
takes
are
situation, you
need
to
what
hardware
output
is
used, such
choice
purpose
of
custom-
software
interface
and
is
used
what
work
they
do
points
apply
were
this
discussed
knowledge
applications
are
as
to
Chapter
decide
appropriate
elds. Some
chapter, such
in
examples
in
1.
which
various
are
illustrated
commerce, education, law
a
and
recreation. Y
ou
should
consider:
rst
◆
the
place
involved
enforcement, medicine
particular
general
4.6
ICT
required.
computer-related
in
W hen
software
written, specialised
can
at
◆
our
school. An
information.
and
rate
and
of
cars, complete
work
information system , however, is
collection, processing
aspect
of
as
input, storage
of
and
recognise
computerised
summarised
devices
the
in
advantages
information
Table
and
disadvantages
systems, which
are
4.3.
Table 4.3 Advantages and disadvantages of computerised information systems
Advantages
◆
Save
◆
Rapidly
◆
Work
◆
Data
Disadvantages
enormous
find,
amounts
calculate
of
and
paper
sor t
and
filing
space
◆
data
time
automatically
easily
◆
impor ted
(brought
in)
from
another
system
or
program
◆
Data
easily
program
◆
Data
◆
When
to
easily
the
more
same
(moved
or
copied)
from
one
system
or
another
entered
computers
network,
at
expor ted
(by
are
than
keyboard
linked
one
or
scanner)
together
person
can
Some
in
a
or
updated
computer
access
the
The
systems
to
be
can
spent
computer(s)
work
due
fault.
If
these
◆
Data
◆
Some
to
an
be
on
may
electrical
is
unless
be
staff
and/or
require
a
lot
of
training
running
ever ything
times
complicated
the
information
failure
or
a
computerised,
backup
power
system
may
not
hardware/software
no
or
work
can
systems
are
be
done
at
available
incorrect
people
may
attempt
information. Therefore,
to
access
security
is
confidential
extremely
impor tant
information
time
Research
Business
Computers
and
in
development
this
industr y
analyse
existing
sales
Commerce
data
Computer
systems
are
used
to
help
make
and
the
Appropriate
more
needs
and
well
ecient, cost-eective
of
their
sales.
responsive
customers. Popular
development
as
and
marketing
of
new
and
areas
products
the
and
monitoring
are
to
the
research
ser vices, as
of
likely
market
for
a
new
product.
organisations
trends
in
computers
and
to
printers
designs
and
programs
hardware
process
and
incudes
images, scanners
graph
advertising
are
used
to
network
plotters
for
and
to
the
input
producing
signs. Specialised
create
personal
detailed
designs,
new
software
designs
for
the
product.
95
4
Implications
Stock
of
misuse
and
cyber
security
price
management
All
D uring
product
development
and
for
the
product
Keeping
raw
an
must
be
monitored
automated
materials
stock
purchased
ver y
control
can
items
an
adequate
supply
ensure
for
bought
and
added
system
that
for
there
cards
are
system
can
also
reorder
materials
before
the
a
customer
database
are
sof tware.
automatically
up
and
any
discounts
debit
cards
can
be
made
due
to
using
loyalt y
credit
or
using
a
reader. e
money
is
automatically
is
through
networked
computers
to
the
manufacturing
provide
stock
by
by
any
early
levels
account. A
bill, listing
each
item
that
notice
has
to
maintained
given. Payment
supermarket ’s
process. e
is
closely.
transferred
always
item
manufacturing,
listed
each
each
been
bought, is
then
printed
and
given
to
the
become
customer.
critically
low.
Marketing
Marketing
and
scanners
included
in
inform
products. ey
the
production
word-processing
and
distr ibution
departments
existing
automate
and
and
also
can
of
use
vivid
of
new
computers
advertising
database
allow
customers
to
material, using
software. Computers
product
pictures
to
be
advertising.
Sales
Y
ou
may
know
used, and
of
goods
small
are
shops
still
where
priced
computers
individually
by
are
not
hand.
Fig 4.10 A barcode reader can be used to check inventory and prices on products
However, when
also
be
prices
change, the
changed. Itemised
price
receipts
for
labels
the
must
products
sold
Each
sometimes
have
to
be
handwritten. Checking
the
and
levels
in
the
shop
before
re-ordering
items
is
checkout
done
counting
the
dierent
items
in
the
may
be
linked
to
a
warehouse
the
main
computer
system
through
a
wide
area
by
network. As
individually
computer
stock
the
items
are
swiped
through
the
barcode
product
readers
at
the
checkouts, the
stock
levels
of
each
lines.
Compare
this
with
system. Goods
do
(F ig4.10). is
that
of
is
sale
swiped
(POS)
is
a
business
not
need
because
through
a
computer
to
that
be
each
uses
computer
individually
item
barcode
a
has
reader
terminal
at
the
a
at
product
line
stock
a
of
are
product
automatically
priced
barcode
computer
the
to
point
sales
selling
checkout. e
automatically
too
re-ordered
system
gures
well
gets
at
can
so
low, the
from
give
that
any
updated. W hen
can
in
see
the
can
be
warehouse. e
managers
they
branch
the
product
the
instant
which
access
items
are
countr y.
Table 4.4 Hardware and software for commercial applications
Industry
Marketing
Example
and
◆
to
distribution
of
application
Automated
inform
direct
Hardware
mailing
customers
of
◆
new
High
and
Software
quality
printers
adver tising
for
flyers
◆
material
◆
instant
Banks
◆
is
Monitoring
of
stock
payment
Electronic
of
money
levels
and
goods
transfers
◆
Point-of-sale
terminals
◆
Use
or
◆
Networked
of
credit
machines
96
debit
◆
cards
automated
(ATMs)
teller
inventor y
ensures
products
Sales
An
control
supply
to
system
retail
agents
efficient
Software
direct
to
for
e -commerce,
customers
◆
Specialised
◆
Banking
ATM
software
software
selling
4.6
computer
use, student
information
Implications
was
kept
on
of
ICT
sheets
Banking
of
Banks
now
depend
on
computer
systems
to
run
paper
or
index
cabinets. W ith
business. Funds
are
instantly
credited
and
debited
using
special
banking
in
folders
kept
in
ling
computerised
database
records, searches
from
are
customers’ accounts
cards, or
their
faster, and
information
is
produced
when
it
is
software.
wanted.
Networked
customers
automated
to
teller
withdraw
machines
cash
and
(ATMs)
check
their
allow
account
Teaching
balance. Credit
and
debit
cards
enable
most
retail
customers
Software
buy
goods
and
ser vices
at
outlets, with
cost
automatically
debited
(deducted)
designed
customers’ accounts. Online
the
need
banking
is
for
process
millions
of
cheques. Customers
online
banking
via
computers
or
of
the
ser vices
oered
their
with
(CAL)
subjects
is
and
teachers
alike. Computer
(CAI)
and
Computer
Aided
software
and
cater
can
for
be
purchased
students
of
any
for
age.
mobile
can
use
them
to
study
topics
at
their
own
online
pace, take
banking
students
Instruction
Students
devices. Some
instruction
can
many
access
for
replacing
L earning
to
specically
from
Aided
the
instruction
the
available
purchase
and
to
practice
tests
and
monitor
their
progress
are:
as
◆
checking
◆
transferring
a
bank
balance
money
they
such
between
accounts
and
to
other
as
move
Moodle®
the
group
customers’ accounts
the
countr y
◆
paying
learning
◆
viewing/printing
bills
online
current
and
previous
from
one
also
members
or
helps
the
topic
helps
are
to
with
located
wor ld. is
people
learn
the
next. Software
group
in
dierent
form
new
work, even
of
areas
if
of
collaborative
information
together.
bank
Using
online
software, instructors
can
also
monitor
statements
online
◆
applying
for
new
quizzes
and
evaluate
the
results, including
how
accounts.
long
the
each
quiz
student
(Fig
spent
completing
each
question
in
4.12).
Fig 4.12 Using Moodle software to evaluate the results of an online quiz
W ith
so
much
information
or
information
even
available
complete
essays
on
the
can
be
Internet,
found
Fig 4.11 Online banking can be done at any time, from anywhere, using a
online
or
purchased
from
others. Assignments
mobile device or computer
obtained
or
by
slightly
these
methods
rearranged
for
and
submitted
grading
is
as
is
illegal. Using
Education
someone
Databases
In
schools, the
student
that
collection
information
database
is
management
and
made
organisation
more
ecient
programs. Before
and
of
by
using
widespread
it
is
else’s
your
work
own
universities
certicates
students
is
ideas
called
expel
awarded
have
or
and
be
others
plagiarism. Some
students
can
making
for
made
schools
plagiarising
‘null
and
believe
and
void ’ if
plagiarised.
97
4
Implications
Hardware
of
misuse
devices
and
used
multimedia-ready
cyber
in
security
classrooms
computers, networks, multimedia
projectors, printers, earphones
independent
along
inc lude
and
microphones
for
up
with
with
a
image
a
rules
for
‘prediction’ for
situation. In
provide
work.
certain
the
scans
of
the
medical
diagnosis
the
processing, to
outcome
eld, the
when
given
a
of
a
expert
set
of
come
current
system
may
symptoms
or
body.
Medicine
Medical
is
area
covers
a
wide
range
of
models
applications. However,
Modern
the
most
important
ones
are
found
in
medical
large
which
includes
access
to
online
medical
online
health
amount
research
information
well
as
involves
systems
storing
data
Most
using
which
details
of
medical
study
patients
information
doctors
program
to
today
keep
use
a
details
the
models
human
and
and
body
as
theirillnesses.
systems
medical
about
illnesses. Patient
information
computer
while
medical
screen
information
name, age
illnesses
doctor
has
entered
print
and
and
a
any
found
the
is
and
if
the
drugs
out
prescription
the
are
are
patients
be
data
the
also
can
collect
a
about
a
person’s
internal
systems.
can
then
be
processed
on
a
special
cause
of
a
medication, the
that
can
database
connected
be
can
to
via
taken
the
an
record
be
usually
‘glues’ the
three-dimensional
locate
to
precisely, for
decide
what
software
whole
collected
slices
to
do
next
produce
or
as
back
model. is
example, a
to
body
a
a
part
series
together
model
of
to
allows
tumour, and
a
of
three-
it.
‘slices’
make
doctors
helps
(Fig4.13).
of
your
your
the
computer
a
sent
program
the
on
illness, and
to
the
is
of
their
having
you. Once
your
customised
model
doctor. e
from
have
to
the
up
using
information
them
and
brought
seeing
given
prescription
doctor’s
two
their
can
to
information
program, apart
prescribed
Sometimes, the
from
you
address, will
of
of
collected
dimensional
the
Medical
scanners
ser vices.
computer
Medical
whole-body
information
e
and
medical
research,
has
can
pharmacist.
electronically
pharmacy ’s
database
extranet.
Fig 4.13 A slice image through the brain can be obtained by magnetic
Other
medical
health
ser vices, such
as
imaging
and
resonance imaging (MRI)
ultrasound
ser vices, can
along
those
with
of
be
connected
medical
to
a
professionals
network
and
pharmacists. Patients’ information, together
results, can
personnel
network
then
across
for
be
shared
the
wor ld
consultations
via
the
can
and
be
Vir tual-reality
with
test
V irtual
network. Medical
articial
given
that
faster
access
to
the
diagnoses.
e
systems
exper t system
intelligence
of
data
aspects
98
that
(known
of
the
is
as
is
one
example
designed
a
to
knowledge
application
of
store
a
base)
area. It
vast
amount
related
draws
on
to
this
and
sounds
images
articial
are
and
world ’ seem
the
part
headset
eyes
and
uses
software
environment
they
special
the
Exper t
reality
simulations
two
of
ts
which
that
the
sounds
more
past
are
senses
data,
However, some
gives
the
the
user’s
ears
immediate
are
users
environment
around
sometimes
from
applications
then
programs
use
the
or
an
feeling
reality. A
face, covering
block
to
user’s
used
create
all
sights
surroundings. Other
used
realistic. A
mostly
to
to
make
sight
with
touch
the
and
virtual
as
‘ virtual
hearing
reality.
another
4.6
sense
for
a
surgeons
more
can
procedures
human
realistic
now
be
without
model
can
experience. As
trained
to
perform
endangering
be
an
life. A
created, and
a
police
example,
new
surgical
virtual-reality
trainee
scene
to
search
marks
perform
the
sensor
operator
illusion
can
of
through
real
to
systems
feedback
to
thing. e
imaging
surgeon
surgical
control
which
connected
the
gives
the
sense
the
safe
to
surgeon
feedback
system, but
master
includes
more
of
to
can
create
be
is
manipulation
suspects
and
is
will
of
the
Dr iver
licensing
help
the
By
a
law, all
driving
can
also
used
in
actual
3D
created
a
issue
crime
image
of
a
brain
tumour
can
be
produced
by
be
drivers
driving
kept
series
of
slice
images
drivers
aected
brain, using
be
used
pilots
all
in
or
Imaging
other
(MRI). V irtual
training
deep-sea
divers)
reality
simulations
and
(for
interactive
can
If
example,
of
games
on
a
in
systems
their
are
help
ght
held
police
in
on
Data
for
public
computerised
on
of
their
millions
and
Assistants
photos
ever y
roads
driver
vehicle
driver
of
must
licence
have
system
registration
and
computerised
records. Apart
ght
of
database
against
driver
could
information
and
ever y
vehicle
database
from
can
be
licensing
accessed
by
crime.
take
minutes
required. By
be
vehicle
found
in
using
information
can
paper-based
systems, computer
on
security
against
forces
around
crime. Millions
computer
database
of
the
particularly
across
a
impressive
number
or
a
records
hours
were
to
nd
computer, the
seconds. Compared
information
with
systems
of
the
world. Each
year
to
process
requests
for
who
want
to
nd
computer
information
information
and
stolen
from
about
vehicles. Searching
new
criminal
computer
in
other
countries
for
units
are
just
in
law
become
United
and
communicating
be
some
of
the
enforcement. is
provided
to
a
systems
also
ocers
have
uses
in
the
region
in
to
most
common
4.14). Computer
uses
games
industr y
in
States
and
software
producers
are
striving
for
new
ideas
for
themes
and
for
their
consumers. Computer
hardware
be
congured
to
suit
game-playing
specications,
information
powerful
graphics
cards, amplied
sound
systems,
seconds. Regional
networks
use
the
made
that
share
monitors
and
powerful
CPUs. Game-
participating
playing
countries
of
(F ig
multi-million-dollar
high-resolution
security
one
with
with
then
is
systems
records, accessing
can
computers
enter tainment
crime
concepts
mobile
and
suspects,
constantly
databases
searches
police
the
statistics, storing
out
technolog y
have
robberies
carr ying
categories.
criminal
of
ocers
when
dierent
systems
Game-playing
used
can
cameras
vehicles
massive
Recreation
throughout
of
Personal
enforcement
records
army
and
databases
vehicles, the
paper-based, it
for
are
is
as
digital
licences
millions
and
these
the
Computer
world
scanners, portable
also
ages.
Law
anyone
Magnetic
the
Resonance
of
crime-
scenes.
licence. A
involving
the
identity
for
surger y. For
can
example, the
scanning
matches
visual,
important
touch. is
an
such
and
documents. Details
from
the
ngerprint
computers
(PDAs), printers
the
instruments.
V ir tual reality
conrm
nd
operation.
give
the
the
feedback
the
and
to
to
ICT
arrested.
handheld
e
and
records
of
surgeon
Hardware
can
the
Implications
consoles
have
also
been
created
as
dedicated
sur veillance
game
systems.
information.
V irtual
A
ngerprint
system
can
provide
fast
access
reality
example, some
databases
of
convicted
criminals’ ngerprints
as
well
collected
from
scenes
of
crime. is
also
be
used
by
game
players. For
allows
programs
include
a
physical
device
that
as
is
marks
can
to
attached
to
the
computer, such
as
a
tennis
racket,
the
99
4
to
Implications
play
Both
a
game
players
real-time
feel
the
of
misuse
with
will
and
able
the
of
cyber
another
be
use
impact
and
to
actual
the
security
user
see
in
the
racket
virtual
ball
the
online
moving
to
on
ball
swing
the
wor ld.
to
in
‘ hit ’ and
monitor.
Fig 4.15 MP3 players are very
Fig 4.16 DJ Controllers are used to add
popular for providing access to your
sound eects to music
downloaded music les while away
from your computer
In
the
movie
industr y, computers
have
been
used
to
Fig 4.14 Vir tual-reality helmets improve the experience in online games
create
also
Multimedia
computers
can
play
music
CDs
special
movies
movies
for
entertainment. Many
Internet
download
music
and
movies
from
the
graphics
for
playing
CDs
and
DVDs
is
of
graphics
included
the
multimedia
latest
designed
computers, usually
operating
for
systems. ere
storing
and
playing
bund led
are
MP3
made
scenes. ere
exclusively
and
animation. is
requires
workstations
with
powerful
special
music
in
order
to
process
the
data
quickly
graphics
of
a
high
quality.
with
players
les
4.15).
1
In
the
music
industr y, DJ
controllers
are
used
Name
dierent
types
of
music. Along
softwareprograms, these
devices
with
include
music
the
strips
and
better
of
using
other
control
songs
laptop
10 0
music
than
of
knobs, backlit
components
the
software
having
touchpad.
to
use
a
(Fig
sound
containing
computer
the
and
explain
how
it
is
used
improve
the
monitoring
of
stock
levels
in
eects
buttons, touch
4.16).ey
device
businesses.
2
with
a
to
to
blend
the
multi-core
Questions
(Fig
are
with
with
produce
most
been
movie
Internet.
processors
Software
have
some
users
use
also
that
in
and
computer
DVD
eects
provide
play
keyboard
list
or
Name
two
ser vices
that
are
oered
in
online
bank ing.
3
Name
two
applications
of
vir tual
reality.
and
End
Multiple
choice
of
chapter
7
questions
The
following
three
1
The
of
a
exposure
theft
or
of
a
computer
damage
is
called
system
to
the
exam-style
main
a
are
carried
threat
c
vulnerability
d
countermeasure.
The
computer-related
messages
mass
professional
using Twitter
emails
to
a
computer
b
social
c
systems
d
web
clients
is
suppor t
media
and
who
Facebook
Place
the
by
a
b
do
c
infect
program
d
infect
system
database
they :
le
not
require
a
host
program
The
use
the
the
stages
systems
is
to
distribute
potentially
called:
a
propaganda
b
cyber
c
computer
d
industrial
security
fraud
specialist
in
espionage.
Preventing
rightful
owners
of
music
from
getting
threat,
d
vulnerability,
attack,
in
the
correct
order
money
due
k nown
as:
vulnerability,
vulnerability,
threat,
countermeasure,
threat,
you
websites
into
or
entering
them
for
their
creative
eor ts
is
to
a
piracy
b
propaganda
c
cyberbullying
d
eavesdropping.
attack,
threat
attack
vulnerability
countermeasure
The
to
of
to
cybersecurity :
countermeasure,
c
k nown
computer
information
les.
a:
elements
countermeasure,
trick
boot
administrator
b
use
or
specialist
following
attack,
The
of
les
sends
10
email
your
messages
personal
to
tr y
best
way
to
protect
a
computer
against
viruses
is
never:
to
information
a
scan
b
open
for
c
turn
d
install
viruses
is
email
attachments
from
unk nown
senders
as:
on
virus
protection
propaganda
b
identity
c
nancial
d
phishing.
abuse
Shor t
answer
Vanessa
laptop
The
use
of
technology
to
obser ve
a
user ’s
software.
without
the
user ’s
k nowledge,
is
is
to
questions
work ing
email
to
k nown
Apar t
from
a
unauthorised
b
industrial
complete
her
a
project
on
her
new
super visor.
keyboard,
list
one
other
input
device
as:
that Vanessa
a
to
actions,
a
often
anti-virus
theft
11
5
that
describe
developer.
represent
a
viruses except
to
posts
and
9
4
used
attack
b
a
be
a(n):
harmful
3
of
can
possibility
8
2
statements
types
4
questions
could
use
to
help
her
complete
the
access
project.
espionage
b
c
computer
Vanessa
tried
occurred
d
denial-of-ser vice
reason
Using
devices
to
monitor
Write
their
permission
is
to
an
explain
a
example
appropriate
Vanessa
document,
tried
to
but
attach
it.
an
error
Give
one
possible
of
a
cause
suitable
of
email
the
error.
address
that
for Vanessa
decided
to
to
upload
use.
the
document.
Explain
cyberbullying
the
b
computer
c
denial-of-ser vice
electronic
term ‘upload’
.
sur veillance
e
d
the
she
called:
d
a
email
time
users’ communications
is
without
each
attack.
c
6
to
sur veillance
State
the
name
of
the
term
that
enables
the
attack
project
to
be
uploaded
Explain
where
via
the
Internet.
eavesdropping.
f
once
it
has
the
been
document
could
be
stored
uploaded.
101
4
Implications
g
of
After
misuse
four
cyber
security
hours, Vanessa
document
two
and
was
possible
not
realised
uploaded.
explanations,
that
the
Explain,
why
this
c
giving
might
Vanessa
any
of
have
of
i
a
realised
programs
whether
that
each
of
she
could
require
the
occurred
to
a
not
d
password.
following
her
access
website
elements
data:
i
the
to
a
she
to
threat
or
should
help
general
her
call
with
name
attack.
a
iii
computer
the
Explain
happens
a
given
to
e
this
an
case
His
notes.
10 2
one
of
a
only
an
of
the
power
are
course
in
hurricane
hardware
device
August,
which
State
that
he
the
privacy.
type
a
special
access
of
to
network
course
the
have
page
course
that
the
be
clicks
on
another
that
provides
stating
by
the
web
page.
caused
this
that
the
a ‘denial-of-ser vice’
able
Explain
ii
He
has
the
has
to
He
has
how
resolve
is
actions,
of
the
and
appropriate
by
that
discuss
for
a
at
in
or
in
his
has
the
whether
or
on
using
him
the
can
explains
school
who
hours
oor
around
body
but
six
the
work ing
authors
term
over
on
ar ticles
ar ticles
the
that
problem.
for
information
the
of
explain
professional
glancing
Cameron’s
aected
of
names
the
relaxing
lots
term.
which
work ing
quoted
Describe
this
occurred.
occasionally
two
by
examples
been
He
while
meant
computer-related
has
laptop.
is
two
negatively
should
email
impacted
attack
assignment.
from
on
have
i
season.
outage.
located
students
Describe
level
online
during
lectures
where
this
be
what
as
Cameron
his
tak ing
Suggest
in
b
is
to
opens
connection
an
been
Describe
types
Cameron
special
receives
has
may
laptop.
professional?
12
Cameron
which
attack.
such
thinks
professional
is
page,
topic
the
Cameron
ii
vulnerable
What
that
attack
Vanessa
a
Describe
threat
an
iii
i
later
cybersecurity
ii
course
of
action.
her
Discuss
the
name
occurred.
h
On
and
television.
be
this
way.
assignment
not
included
ar ticles.
Cameron’s
not
it
assignment.
is
A
PT
E
C
H
5
WORD
5.1
Word
to
Introduction
processing
type
end
of
down
your
the
to
on
a
computer
text, typically
rst
the
line
next
to
the
using
cursor
line. is
wo rd
is
a
processing
simple. Y
ou
start
keyboard. At
will
feature
the
automatically
is
called
move
Before
you
should
know
one
it
means
you
cannot
make
a
line
that
you
make
a
spelling
error
as
you
is
too
to
correct
it
type, you
immediately. Some
word
do
underline
typing
or
grammatical
you
can
mouse
or
you
cursor
can
keys
position
to
delete
the
errors
or
cursor
add
you
the
want
to
entire
your
work
and
to
or
downloaded
a
make
words
at
return
from
look
to
it
do
later
typeface
in
online
good
can
your
–
for
with
not
–
is
need
you
either
can
storage
save
a
document, you
blank
your
le
document, open
with
a
new
name.
launch
a
word-processing
application,
to
type
using
a
blank
document. Y
ou
can
open
an
existing
from
a
le
current
to
a
new
document
document
to
a
new
window
screen
your
having
to
close
any
documents.
a
letters, words,
however
once, because
changes. Documents
typewriter, you
the
paragraphs
change. Also, you
document
or
your
or
rst
begin
switch
Key
phrases, sentences
and
with
your
processors
without
attention, but
created
start
of
not
or
will
to
look
long.
also
have
how
the
word-wrap,
you
If
improve
already
W hen
and
PROCESSING
(Fig
to
can
to
also
much
features
text
type
save
continue
be
emailed
5.1). Making
straightfor ward, too. Unlike
have
dierent
styles
and
sizes
of
document.
Fig 5.2 shows some of the features when working with a document
1
Title
are
bar:
is
presently
document
a
new
at
Ribbon:
used
tabs
the
and
top
1’, for
is
Microsoft
earlier
using
of
document, the
‘Document
2
indicates
is
to
format
with
the
name
of
that
you
of
screen. W hen
in
recent
replaces
contains
your
groups
the
name
shown
It
shows
application
the
you
document
create
will
be
example.
Word. It
versions
which
of
the
the
versions
Menu
menu
document. It
similar
of
has
of
bar
found
on
commands
multiple
commands. Most
of
the
Fig 5.1 Word-processed documents can be emailed
103
5
Word
processing
Standard
versions
3
Quick
used
4
screen:
appear
e
where
as
document ’s
the
to
bars:
and
the
Scroll
toolbar
your
is
shows
the
and
part
to
Redo
of
your
text.
information
word
used
earlier
commonly
and
document
displays
are
from
tab.
Save, Undo
bar
bars
items
Home
screen
page
as
bar
such
count.
scroll
the
upwards, downwards
or
page
on
from
left
right.
Ruler:
As
as
status
screen, such
the
is
type
bar:
the
on
input
you
e
Menu
such
Status
Scroll
7
and
Access Toolbar:
screen
6
now
commands
Input
5
toolbar
e
tabs
you
ruler
of
your
prepare
layout
of
size, paper
displays
a
the
the
document.
document, it
page. is
source
measurements, indents
and
is
important
includes
orientation
the
of
the
to
understand
margins, paper
page.
Margins
It
is
and
usual
the
a
are
is
add
a
of
a
small
the
1
between
inch
from
number
is
or
also
a
importantly, most
right
edge
the
size
type
the
the
of
each
edge
Paper
Y
ou
the
one
of
of
the
the
page
to
the
the
you
can
typing
to
you
prints
cannot
page
the
a
bind
want
on
each
print
normally
right
in
a
margin.
need
when
printers
a
on
edge. L eaving
that
and
text
called
useful
top, bottom, left
by
the
when
page. Y
ou
separately
is
heading
page. More
to
gap
important
together. It
page
gap
page. is
typically
especially
document
to
see
edge
Margins
margin
to
select
margins
or
distance
from
Fig 5.3 Margins can be customised for each document
Sometimes
known
text.
as
portrait
is
known
as
tall
and
landscape
is
wide.
size
can
select
dierent
sizes
of
paper
on
which
to
Fig 5.4 Por trait and
prepare
your
document. e
size
of
paper
aects
landscape orientation
thepage
length
and
width
of
the
workspace.
1
Ty pic alsiz es
are
let te r
s iz e
(8
"
×
11"),
Editing
2
text
1
A4
(210
×
297
mm)
and
legal  s iz e
(8
"
×
14").
2
Once
you
it. is
have
means
entered
that
you
your
can
text
you
correct
can
easily
mistakes
edit
before
Or ientation
presentation
Documents
are
in
one
of
two
orientations, which
known
as
por trait
and
landscape
(Fig
the
nal
of
the
you
may
have
to
select
more
than
one
word, or
5.4).
sentence, paragraph
text
10 4
document. Most
are
time
usually
of
by
using
the
or
page. Y
ou
mouse
or
the
can
cursor
select
a
block
keys. W hen
a
of
5.1
block
of
text
has
font, style, size
be
been
and
highlighted, it
alignment
of
can
the
be
block
edited:
of
text
the
can
changed.
Per forming
are
three
main
ways
of
editing
To
select
a
word, double-click
◆
To
select
a
sentence
adding, deleting
◆
moving, copying
◆
searching
for
and
retyping
and
and
pasting
replacing
To
deleting
and
◆
text
To
add
or
delete
text, place
retyping
the
Shift
cursor
and
and
click
the
left
mouse
basic
at
the
text, start
typing!
e
button
existing
the
right
to
accommodate
the
text
new
the
Delete
or
Backspace
will
delete
all
text
to
the
key
will
delete
right
of
text. To
key. e
the
key
text
to
the
can
create
blank
lines
by
Delete
cursor
left
pressing
It
is
also
and
copying
possible
to
with
First
new
select
the
text
new
part
of
of
while
the
the
your
Insert
to
be
key
type-over
bottom
mode
the
will
you
causes
or
of
the
to
third
at
the
most
cut
the
it
text
such
the
Ctrl
All).
and
paste
operations
work
the
W indows
placed
in
a
applications. Text
temporar y
storage
that
is
place
must ‘cut ’ or
remove
the
text
from
is
and ‘paste’ it
in
its
new
location. T
o
do
this,
text
and
then
click
the
Cut
icon
on
the
Standard
menu
Ctrl +
X
or
on
Home
the
tab
of
the
keyboard). e
ribbon
text
(you
may
disappears
and
to
the
cursor
then
click
clipboard. Click
keys
to
where
the
you
mouse
want
to
pointer
move
the
or
use
text
and
replace
that
the
Paste
icon
or
press
Ctrl + V
. e
text
moves
as
the
new
location.
part
disappear
any
text
‘typed
to
the
over’ as
in
and
be
alternative
toggles
appears
then
right
you
application
is
type-
of
the
insert
status
when
replaced
type. e
between
the
start
bar
the
at
and
the
type-over
Fig 5.5 Using cut and paste
active.
way
to
select
beginning
pressing
and
dragging
of
text
the
is
to
place
required
holding
the
mouse
the
similar
down
text. Select
the
left
across
the
the
mouse
text
process
the
mouse
button
at
then
to
click
where
select
a
word
or
a
it
the
block
the
is
Copy
but
the
clipboard. Move
end
of
select
the
text
icon
word
(or
use
Ctrl
processor
+
C). e
keeps
a
text
copy
in
the
cursor
to
where
the
text
will
be
of
text
paste
it. e
text
appears
in
both
places.
the
is
as
you
are
commands
typing, it
to
move
is
to
easier
to
another
use
part
of
the
to
document. Table
block
copying. First
be
keyboard
to
for
button
Sometimes
way
used
text
selection.
quicker
is
cursor
inserted, and
selected, releasing
perform
(for
down
c lipboard.
your
the
A
is
text, you
the
use
stays
and
document, hold
key.
and
by
end.
the
A
A
A
the
beginning, hold
cursor.
Enter
delete, and
type. An
keyboard
mode. OVR
side
wish
text
replaced
on
left
is
paragraphs, and
text
mode, which
cursor
entire
at
the
text
delete
you
selected
whatever
over
click
at
text.
typing. e
by
or
text, click
key
to
words, sentences
the
in
or
move
moves
Moving
a
delete
also
Y
ou
of
and
press
toolbar, Edit
Backspace
on
move
select
will
block
copy, cut
way
where
text, press
paragraph, triple-click
once. To
T
o
to
it.
desired
called
insert
or
on
text
copied
location
a
select
key
text.
same
To
processing
it.
select
the
text
e
Adding,
word
text:
◆
◆
in
to
operations
◆
word
ere
block
Introduction
5.1
shows
some
of
the
commands
you
operations.
can
use
to
move
the
cursor.
10 5
5
Word
processing
select
If
Save, your
you
select
saves
the
are
working
Save, the
the
word
word
newer
As
from
document
Y
ou
will
a
the
new
then
a
you
saved
processor, without
to
older
File
replace
version
the
is
menu, then
lename
have
asks
previously
version
document. e
Save
in
processor
both
or
old
save
and
in
new
and
you,
version
you
can
a
lename.
warning
older
you
a
document
lost. If
it
for
select
give
new
of
the
location.
versions
saved.
Fonts
Fig 5.6 Using copy and paste
A
Table 5.1 Keyboard commands used to move the cursor
<Ctrl><left
arrow>
<Ctrl><right
<Ctrl><up
Move
arrow>
arrow>
<Ctrl><down
arrow>
<Home>
to
previous
Move
to
next
to
previous
Move
to
next
Move
to
beginning
is
supplied
word
Move
font
a
style
with
a
from. Dierent
word
For
paragraph
of
wide
are
range
fonts
example, plain
Roman
writing. Modern
good
are
fonts
for
of
fonts
useful
such
writing
for
as
word
for
you
to
dierent
Arial
letters
processors
choose
purposes.
and Times
and
are
New
reports.
paragraph
<End>
Move
to
end
<PgUp>
Move
to
previous
of
<PgDn>
Move
to
next
<Ctrl><PgUp>
Move
to
top
of
line
line
screen
screen
left
of
screen
<Ctrl><PgDn>
Move
to
bottom
<Alt><Ctrl><PgUp>
Move
to
beginning
<Alt><Ctrl><PgDn>
Move
to
end
<Ctrl><Home>
Move
to
beginning
of
right
of
text
of
on
of
screen
text
on
screen
screen
document
Fig 5.7 Dierent fonts are useful for dierent purposes
The
Undo
and
Redo
Font
commands
size
Most
If
you
make
a
drastic
change
in
your
document
that
be
did
not
intend
(like
accidentally
deleting
a
whole
fonts
panic!
As
in
most
Windows
scalable, which
means
that
they
can
as
big
or
as
small
as
required. e
size
of
a
font
is
page),
specied
don’t
are
you
applications, you
by
a
number
known
as
the
font size. Sizes
10
have
and
12
are
the
most
common
for
writing
letters
and
Undo
reports. Font
icon
or
using
the
Ctrl
+
Z
keyboard
changes
may
not
be
reversible, but
your
clicked
will
the
often
Undo
warn
you
icon, and
of
you
this
wish
beforehand. If
that
you
fonts
your
icon. Many
Undos
Save
Under
and
vs.
word
action, you
processors
can
click
allow
on
you
to
1/72ths
of
an
inch.
the
do
at
size
72
are
one
inch
tall
and
fonts
at
size
had
half
an
inch
tall.
not
12
Redo
Size
multiple
36
Redos.
save
F ile
Save As. If
10 6
last
in
you
Size
undone
specied
word
are
processor
are
combination.
So
Certain
sizes
on
as
the
you
are
Menu
bar
working
are
in
a
options
new
of
Save
document
and
and
you
Size 72
Fig 5.8 Font sizes
36
5.1
Font
Each
e
e
style
font
six
can
have
common
a
range
styles
of
extra
styles
applied
to
it.
of
the
versions
◆
Normal:
◆
Italic:
no
the
slightly
special
font
to
style
will
be
the
right.
lines
used
is
applied
displayed
as
to
if
the
it
is
Bold:
extra
◆
◆
thick
to
Underline:
a
Superscript:
line
◆
the
and
line
the
printed
Subscript:
and
make
the
printed
text
at
a
draw
the
will
text
at
to
a
is
text
be
is
the
stand
drawn
raised
smaller
will
be
to
to
stops. In
the
Page
top
the
of
text.
the
tab
the
below
Style
the
line
are
a
size.
Italic
Style
superscript
Underline
Bold
Layout
to
see
located
to
any
show
tabs
Word, click
on
the
(Fig
on
your
ruler
at
5.11). In
the
ruler
the
later
to
insert
versions
(like
2007)
you
can
select
tab
from
the
menu
to
reveal
the
tab
box.
position
left
Style
by
location
the
location
by
on
distance
the
arrow
as
you
on
the
ruler
on
the
clicking
the
shown
on
is
margin
alignment
tab
Normal
and
earlier
dialogue
shown
just
V iew, Ruler
Microsof t
tab
A
the
are
processing
drawn
out.
underneath
up
page
of
tabs
word
font.
size.
lowered
smaller
font
where
to
leaning
stops
◆
shows
document. Click
top
are:
ruler
Introduction
the
line. Y
ou
the
in
Figure
ruler. Y
ou
drag
the
can
leftmost
click. en
or
of
the
tab
choose
edge
5.11. e
set
can
tab
the
tab
place
to
location
of
the
the
from
desired
ruler
dierent
by
move
it
tabs
clicking
more
than
to
as
on
one
another
ruler.
style
Style
subscript
style
2
Left
Centre
Decimal
Right
Fig 5.9 Examples of font styles
Alignment
Left
Alignment
describes
the
position
at
which
aligned
text
Centre
appears
on
a
line
on
the
page. Alignment
is
sometimes
10:50
known
of
as
justication. ere
alignment:
shown
in
are
left, right, centre
Figure
four
and
dierent
fully
types
justied, as
Right
aligned
5.10.
Fig 5.11 Four types of tabs
Format
Painter
Sometimes
document
another
button
is
on
the
is
have
would
like
may
called
formatted
the
have
Standard
formatting
same
noticed
one
part
of
formatting
the
the
on
‘paintbrush’
toolbar
Format
button. Format
paragraph
a
and
may
part. Y
ou
button
useful
you
Painter,
Painter
from
.
and
copies
one
place
it
is
a
character
to
ver y
or
another
within
document.
Fig. 5.10 Alignment of text
To
Working
Tabs
enable
centre
Y
ou
or
can
such
with
as
you
full
also
to
align
your
justication, or
automatically
periods
or
copy
paragraph
formatting:
tabs
text
align
insert
dashes, before
to
to
the
a
decimal
specic
the
left, right,
point.
characters,
tabs.
1
Select
2
Click
(drag
the
the
text.
paintbrush
across)
formatting
the
text
button
that
and
you
then
want
to
paint
apply
the
to.
107
5
Word
If
processing
you
double-click
becomes
a
toggle
formatting
to
the
so
Format
that
several
you
Painter
can
paint
button
the
it
new
indented
from
cursor
the
Double-click
within
the
paragraph
where
you
copy
the
Click
the
5
Select
Format
indent
a
Painter
paragraph
reformatted
If
you
have
way, press
will
to
look
or
text
like
activated
Esc
return
to
indentation
the
that
rst
should
today ’s
precisely
ere
of
is
the
no
pressing
e
when
the
Format
you’re
Painter
nished
and
in
can
be
block
before
your
mouse
Pages
them
normal.
word
processors, it
amount
longer
the
of
any
Enter
between
choose
will
another
space
need
key
select
some
is
possible
between
for
the
twice
to
can
also
text. If
spacing
the
select
line
line
lines, also
whole
applied
can
typical
the
the
your
be
line
typed, you
and
in
text. Y
ou
typing
Tab
key.
the
indent
paragraph
icon
:
to
L eft
the
left
margin
or
Right
for
the
right
margin.
number ing
in
in
your
document
order. Note
in
the
should
that
header
or
page
footer
be
numbered
numbering
section
of
to
may
the
keep
also
be
document.
formatting
changed
of
the
this
to
paragraphs.
old
typewriter
separate
can
number
to
called
document
style
paragraphs.
determine
you
all
the
do, the
text
you
text
spacing
spacing
block
you
and
or
line
1
Click
Insert.
2
Click
Page
3
Select
pages
like
this:
the
5
Use
select
the
page
start
Position
on
page
Format
dialogue
numbers
if
the
page
(top
or
bottom)
and
the
(left, right, centre).
button.
box
(F ig
appear, the
numbering
5.12)
to
number
does
not
adjust
from
start
how
which
from
your
they
the
rst
page.
you
you
the
Number.
6
Click
OK
to
return
to
the
page.
been
the
5.2
keyboard
Click
spacing
has
of
4
specic
until
wish. T
able
their
a
spacing
text
part
in
line
type
value. Also, once
a
line spacing,
or
the
control
spacing
space
the
from
from
alignment
Line
pressing
the
paragraph.
Y
ou
W ith
placing
be
added
Paragraph
and
by
button.
Page
6
word
paragraph, select
indented. Click
indentation
the
the
simply
formatting.
for
4
of
margin
want
be
to
left
left
paragraphs.
To
3
to
the
document
shows
shortcuts.
Table 5.2 Types of line spacing
Single
Inser ts
larger
a
line
than
spacing
the
size
a
of
little
a
Ctrl
as
+
1
formats
single
text
spacing
character
1.5
Lines
Inser ts
a
line
equivalent
a-half
spacing
to
times
Ctrl
one -and-
the
size
of
as
a
+
5
formats
text
one -and-a-half
spacing
character
Double
Determines
twice
the
a
size
line
of
a
spacing
Ctrl
character
as
+
2
formats
double
text
spacing
Fig 5.12 The Page Number Format dialogue box
Find
Indenting
An
indented
away
10 8
from
word
the
or
paragraph
margin
(left
or
is
set
at
right). A
a
distance
word
may
be
e
and
Replace
F ind and Replace
Search
and
Replace)
function
will
rst
(often
look
called
(search)
through
5.1
the
document
to
nd
one
or
more
words
that
Introduction
to
word
processing
you
Questions
specify. Once
the
word
is
found, the
computer
can
1
automatically
you
type
replace
in. is
is
Alternatively, you
Replace. is
is
is
safer
it
usually
can
asks
with
use
you
because
to
you
another
the
Replace
another
approve
may
word
not
All
option
each
Explain
a
Open
simply
a
you
b
Save
and
Save
As.
2
What
3
You
do
you
understand
by ‘selecting’ text?
replacement.
want
to
make
have
two
paragraphs
of
text
typed,
which
you
the
to
edit.
How
many
paragraphs
would
you
have
ever ywhere.
start
dialogue
to
between:
New
called
if
If
dierence
and
option.
want
change
the
that
your
box
continue
search
will
the
pop
search
somewhere
up
in
conrming
from
the
start
your
copied
b
cut
and
pasted
c
clicked
Undo
d
clicked
Redo
e
clicked
Copy.
paragraph
2
document,
whether
of
you:
a
the
you
paragraph
1
wish
document.
4
State
the
single,
double
5
Describe
6
Explain
using
keyboard
the
one
the
and
combinations
one -and-a-half
benets
of
advantage
Replace
used
All
using
and
the
one
line
to
create
spacing.
Format
Painter.
disadvantage
of
option.
Fig 5.13 The Find and Replace dialogue box
Practical
Exercise
1:
1
Open
2
Type
exercises
Selecting
a
blank
the
Microsof t
Word
text
Word
following
morning. She
using
was
Script
document.
text:
at
It
the
was
5am
airport
on
Saturday
waiting
to
2
Use
–
Double-click
4
Triple-click
on
the
word
the
the
paste
the
text
text. Click
three
on
the
Copy
Click
at
the
beginning
Shift
key
and
click
Type
of
the
rst
to
select
a
at
the
end
of
the
Hold
down
the
Ctrl
block
of
all
the
text
in
key
the
3:
Find
the
1
Type
2:
Block
the
Travel
operations
(press
(press
and
press
A
(for
All)
Replace
text:
you
click
Online
embed
code
for
V ideo, you
can
paste
in
the
video
you
want
to
add.
can
also
type
a
keyword
to
search
online
for
video
that
best
ts
your
document.
to
Use
the
3
Format
4
Create
Find
and
Replace
function
to
change
all
the
an
of
the
text
to
indent
word
‘video’ to
double
for
the
‘recording ’.
spacing.
rst
line
of
the
paragraph.
Enter)
Enter)
order
document.
following:
Workshop
and
following
occurrences
Exercise
alphabetical
text.
2
select
into
paste
rst
the
6
text
and
sentence, hold
Y
ou
paragraph
the
cut, copy
times.
the
the
move
or
icon,
W hen
5
operations
‘morning ’.
1
and
to
Enter)
Education, Script, Travel, Workshop.
Exercise
on
Enter)
(press
block
options
come
home.
3
(press
Education
5
Insert
page
numbering
centred
at
the
top
of
the
page.
10 9
5.2
Document
o r ga n i s a t i o n
the
Headers
and
body
of
quotation
Suppose
you
want
to
place
a
heading
or
logo
at
the
each
page
of
your
document, or
maybe
a
page
the
bottom
of
all
the
pages
of
the
appears
margin, is
bottom
at
the
known
of
each
as
top
a
page
of
each
page
header. T
ext
is
known
as
but
inside
which
a
the
Microsoft
broken
Word, the
lines. Any
automatically
subsequent
placed
at
text
appear
pages. A
the
providing
header
typed
in
a
a
reference
of
is
each
footnote
or
for
a
endnote
is
up
of
two
parts:
a
reference
number
in
the
text
the
actual
entr y
at
of
chapter
the
bottom
of
the
page
or
at
appears
end
the
or
text. Using
auto-numbered
at
footnotes
or
endnotes
rearrange
your
allows
you
to
delete, insert
and
the
footnotes
or
endnotes
without
having
footer
shown
this
similar
footer
bottom
in
is
text. A
top
to
In
to
the
document. T
ext
the
which
in
number
and
at
text
used
top
made
of
the
footers
within
on
similar, except
(Fig
placed
that
section, will
position
page
the
worr y
are
all
that
it
is
about
after
a
contains
placed
the
numbering. Footnotes
separator
the
line
footnote
together
at
the
at
the
bottom
reference
end
of
are
a
of
usually
the
page
number. Endnotes
section
or
the
entire
document.
5.14).
Section
To
breaks
understand
your
document
sections. A
end
how
of
a
section
specic
formatting
stores
as
the
that
is
margins, headers
with
the
a
break
of
break
with
is
a
a
of
to
that
footers
appears
the
dierent
mark
formatting
and
works, think
inserted
kind
or
as
of
to
as
page
end
double
section
the
of
the
mark
orientation,
sequencing
a
or
show
the
section. is
such
of
chapters
document, and
applied
mark
name
section
book
part
section
numbers. e
a
of
page
dotted
break
in
line
the
Fig 5.14 A header and footer
centre. In
e
Header
ribbon
and
when
Footer
the
toolbar, or
header
or
footer
Design
areas
are
tab
on
the
there
the
tools
bottom
margins
you
need
to
format
the
four
top
a
document. Y
ou
can
use
header
and
footer
throughout
a
Continuous:
document
it
for
part
of
the
document. For
use
a
graphic
in
the
rst-page
Next
the
document ’s
le
name
header, and
in
the
pages. Many
word
processors
starts
Odd:
type
special
information
number
into
codes
such
the
as
which
the
header
will
current
header
will
for
also
or
automatically
date
footer
of
or
a
inserts
the
same
inserts
the
inserts
breaks:
a
break
and
starts
the
next
page
a
section
as
well
as
a
page
break
next
a
section
section
on
break
the
and
next
starts
page
the
new
current
on
an
odd
page
the
Even:
inserts
a
section
break
and
starts
the
new
let
section
you
Word
then
◆
following
on
Page:
section
include
section
Microsoft
example, you
◆
can
of
as
or
and
change
types
such
the
◆
same
processor
and
section
in
word
active,
◆
provide
are
a
on
an
even
page.
insert
page
document.
Fig 5.15 Section break in Microsoft Word
Footnotes
Footnotes
from
1
10
and
and
endnotes
supplying
extra
endnotes
have
many
information
Section
uses, ranging
about
a
topic
within
breaks
dierent
section
therefore
formatting
breaks
in
the
will
allow
begin
following
you
and
to
specify
end. Y
ou
situations:
where
might
the
use
5.2
◆
dierent
are
working
footers
◆
headers
on
dierent
in
a
on
and
needs
various
to
if
have
the
document
dierent
multiple
you
headers
it
and
schemes:
where
into
a
columns. If
column
automatically
pages
numbering
document
footers:
the
if
table
you
of
are
you
Document
have
format, your
put
in
the
text
prepared
word
section
organisation
and
processor
put
will
breaks.
working
contents
needs
Questions
dierent
Roman
◆
numbering
such
as
letters, numbers
and
numerals
dierent
paper
sizes:
if
you
want
a
document
to
1
What
is
a
section
break?
2
You have a document that contains sections breaks.
State whether odd section breaks or even section breaks
contain
portrait
pages
for
text
and
landscape
pages
would have been applied to pages 17, 22 and 35.
for
tables
and
charts
3
◆
dierent
margins:
if
the
rst
page
of
a
letter
Give
be
a
two-inch
margin, and
the
following
pages
need
situations
columns:
you
can
use
your
word
Describe
column
feature
in
the
middle
of
page, and
place
Practical
4:
section
Insert
breaks
exercises
Headers
Navigate
or
of
sections
would
an
example
of
how
a
footnote
is
used
in
a
to
in
and
the
before
and
using
after
What
are
Microsof t
dierent
Footer
versions
of
similarities
and
dierences
between
icons
footnotes?
Word
8
and
the
and
the
footers
Header
document.
a
footers
1
use
processor’s
5
newspaper
Exercise
the
margin
word-processing
◆
where
appropriate.
a
4
dierent
two
needs
Y
ou
should
see
the
added
information
page. Alternatively, switch
( V iew
view
Microsoft
your
newly
added
to
Print
header
and
on
your
Preview
to
footer.
Word).
Exercise
2
Select
Header
of
page.
to
insert
a
header
at
the
top
1
the
5:
Footnotes
and
endnotes
right
Type
the
sentence
‘ is
is
a
footnote, not
a
footer.’
3
Type
‘Practical
4
Move
your
below
the
exercise
using
a
header’.
2
cursor
to
the
bottom
of
the
Navigate
to
Footnote
dotted
lines
to
view
the
be
no
text
in
that
Click
the
Insert
Page
6
Click
the
Date/Time
(this
Click
Close
double
click
on
on
the
the
Number
icon
to
Header
main
option
versions
and
select
may
be
dierent
in
of
Word).
Select
the
Footnote
to
bottom
insert
and
part
option. e
cursor
moves
icon.
the
the
Footer
of
the
of
the
page. Type
‘Example
of
a
date.
footnote.’ Y
ou
7
tab
section.
3
5
References
footer. ere
previous
should
the
page
toolbar
have
just
created
a
footnote.
or
document.
1
1
1
5.3
Ta b l e s
Creating
A
table
is
a
organised
rows
and
these
be
a
convenient
is
columns. e
and
merged
shows
of
way
of
of
height, width
can
also
together)
owners
grouping
constructed
columns
(joined
list
columns
tables
manner. It
rows
and
and
or
the
be
text
cells
and
in
an
grouped
borders
of
changed. Cells
split. e
names
table
and
in
can
below
ages
of
their
pets.
e
table
Owner
Pet
Rashid
Tur tle
2
Jurnee
Dog
4
Jana
Bird
1
feature
allows
Age
you
to
(years)
select
the
number
of
Fig 5.16 Conver ting text to a table
rows
one
and
or
columns
more
rows
needed. In
can
be
an
added
existing
above
or
table,
below
the
Creating
selected
row, while
one
or
more
columns
can
Y
ou
added
to
the
left
or
right
of
the
current
and
columns
can
also
be
can
divide
a
page
deleted, and
cells
table
can
also
be
added
the
table
up, down, to
or
deleted
is
particularly
to
shift
data
left
or
right
of
the
is
the
and
table
table
achieved
then
by
placing
the
right-clicking
cursor
to
show
in
a
the
cell
various
options.
design
on
e
layout
of
a
table
can
be
modied
useful
the
type
of
border, the
style
of
the
lines
thickness
of
the
lines
in
and
around
column
or
cells
can
also
be
your
shaded
out
text
you
want
leaet
to
which
produce
could
a
be
in
two
or
more
columns
saves
in
page.
feature
column
(Fig
column
can
be
created
section
5.18). Word
breaks
will
in
the
middle
placed
in
automatically
a
of
a
column
section
breaks. Note
that
a
put
column
in
break
used
to
stop
text
at
the
end
of
one
column
and
table.
continue
Rows, columns
if
a
and
is
the
or
by
the
changing
the
page. W ith
and
columns.
in
format
e
parallel
current
space
cell. is
several
in
folded. Laying
the
into
in
newspaper, newsletter
the
up
column.
is
Rows
columns
be
it
in
the
nextcolumn.
dierent
colours.
Questions
Y
ou
can
also
functions
although
to
apply
a
this
limited
table
is
not
spreadsheet. W hile
method
of
sometimes
into
a
using
you
this, once
the
paragraphs
or
tables
Tab
need
is
to
have
key
to
replace
replaced
to
align
convert
specic
by
other
1
the
data
Excel
2
columns,
tabbed
option
Explain
and
old
in
Describe
data
one
3
the
adding
State
the
shown
in
dierence
a
(F ig
of
using
between
row
to
a
number
of
rows
Figure
achieves
a
table
in
5.16).
adding
of a table
a
and
columns
word
column
in
5.17.
of
a
table
Type
Name
Example
Fish
Small
Flying
Fruit
Seeds
Cherries
Fig 5.17 Example
1
12
a
table.
Example
tabs, commas,
character
example
processor.
document,
the
some
to Table
separated
single
and
word-processing
Convert Text
data
a
a
intended
the
may
table. e
in
summation
the
table
5.3
Tables
and
columns
Fig. 5.18 The column feature can be used in the middle of your text
Practical
Exercise
6:
A
the
1
Create
Creating
Navigate
Type
using
Microsof t
tables
Word
3
Save
the
document
B
Change
1
Make
sure
2
Move
the
as
‘Competition’.
table
columns
2
exercises
to
the
and
the
text
Insert
ve
in
Table
feature. Insert
the
width
of
the
table
columns
six
no
part
of
the
table
is
selected.
rows.
the
table
as
lines
First
Last
Company
name
name
Mala
Tuim
Gaming
Claver y
Lotte
Team
Alison
Ross
Fees
Mem-
Group
bers
#
in
arrows
$250
5
4
ALL
$300
7
2
Zacton
N-Ta-Tane
$175
3
3
Allen
Master
$300
8
3
3
Click
the
lines
and
pointer
increase
or
the
until
left
or
the
it
and
between
drag
to
allow
table
pointing
parallel
Inc.
mouse
to
one
of
the
vertical
shown.
changes
them
mouse
decrease
to
the
to
double-click
move
width
to
a
to
pair
two
of
.
rows. Alternatively, some
you
shape
right, with
the
of
gridlines
the
columns
applications
adjust
the
width
of
a
Gamers
column.
1
13
5
Word
C
1
processing
Sor t
the
Select
table
the
icon
E
whole
table
and
choose
the
Sort
.
Change
Check
that
option
Header
Row
is
the
table
by
Last
name
in
Change
Double-click
Click
4
By
to
sort
the
Header
header
row
Merging
and
the
rest
of
the
Row
in
the
Sort
Inser t
a
row
and
add
P lace
(titles)
will
not
the
cursor
be
P lace
the
cursor
2
formula
the
2
Tab. A
bottom
table.
In
the
Press
the
rst
Tab
cell
to
go
of
last
new
the
to
To
cell
new
the
row
in
the
will
Group
appear
row, type
Fees
at
Select
the
Design
above
merge
and
select
menu
the
3
Type
sum
4
of
Press
box
the
Tab
Select
the
and
go
is
option
entered
click
to
=SUM(ABOVE)
as
a
cell
Formula
4
Centre
on
from
the
icon. Check
in
the
see
Exercise’.
the
rst
row
with
and
select
the
Insert
rows
above
to
insert
a
new
headings
cells
the
of
of
the
new
Group
box
5
Note
row
cells, right-click
from
into
and
one,
select
the
Table
menu.
for
Gaming
Competition’.
heading.
that
once
a
right-clicking
cell
is
highlighted
it
can
be
split
from
for
in
the
Table
row
choosing
dialogue
Split
box
that
will
allow
you
to
choose
the
resulting
of
columns
and
rows.
7:
Columns
column.
time
and
and
menu. e
the
Exercise
#
the
that
1
Open
2
Type
a
blank
word-processing
document.
change
‘=rand(6,3)’ (without
click
on
the
quotes)
and
press
in
‘ V ideo
provides
a
OK.
the
way
sentence
paragraph
and
paste
Enter
Select
4
Navigate
on
5
in
the
of
the
you
paste
three
it
each
three
the
prove
three
your
ve
point.’ Copy
times. Copy
sentences, press
paragraph
rst
to
help
and
the
Microsoft
e
to
between
3
of
Fig 5.19 Add a formula to a table
table.
Table
=COUNT(ABOVE)
dialogue
the
Formula
OK. Repeat
icon. is
to
all
all
the
powerful
1
14
‘ Table
in
Enter. Alternatively, type
the
to
‘ Totals’.
column.
the
Formula
Field
1.
the
column.
Formula
Members
to
in
‘Registration
number
dialogue
to
cells
Insert
the
cells
appears
=SUM(ABOVE)
3
the
cells
tools
Update
from
#, using
#
by
3
le
headings. Right-click
Merge
column. Press
of
Alison
Group
rows.
a
in
for
the
sorted
highlight
1
for
dialogue
row
D
the
splitting
option. Select
with
number
total
button, select
result. Save
the
box, the
mouse
on
f igures
table.
1
selecting
group
#
Ascending
F
OK
the
Group
clicked.
order.
3
the
2
the
Sort
of
1
right
2
one
more
Enter
the
twice
times, pressing
paragraph.
paragraphs.
Columns
Word, it
is
icon. In
found
in
recent
the
versions
Layout
tab
ribbon.
Columns
Figure
option
5.20.
box
is
displayed
as
shown
5.3
2
From
the
versions
tab
3
on
From
e
text
menu, select
of
the
the
Microsof t
Insert, Break
Word, select
ribbon, select
list, select
moves
and
Tables
or, in
the
columns
recent
Layout
Breaks.
Column
now
and
starts
Break.
from
the
second
column.
Exercise
W ith
sizes
1
a
9:
Unequal
column
for
each
P lace
the
Equal
2
3
Two
left
6
Select
7
e
selected
two
columns. If
the
8
two
paragraphs
e
document
text
reads
Select
Columns
Exercise
e
8:
on
column
the
option
Using
will
the
right
to
break
columns.
1
the
is
cursor
paragraph. e
the
subdivided
set
unequal
on
the
left
the
(in
column
at
Columns
earlier
the
start
option
of
and
versions, untick
column
narrow
setting
and
which
gives
the
makes
right
width.
spacing
between
the
columns
as
left
of
the
OK.
into
information
column
same, except
half
page
only.
that
and
half.
fth
paragraphs. Use
three
the
columns.
breaks
used
at
ll
create
column
be
enough
the
left
and
will
isn’t
remains
fourth
between
P lace
there
down
the
to
columns.
columns, it
continues
9
L eft
more
0.5". Select
for
possible
width).
column
Maintain
is
the
columns
column
column
in
1. Click
More
Choose
the
Fig 5.20 Creating columns
layout, it
column.
cursor
paragraph
select
columns
the
cursor
only
for
subdividing
beginning
should
be
of
at
the
the
text
fourth
leftmost
Fig 5.21 Formatting text with uneven columns
column.
1
15
5. 4
Before
it
is
Reviewing
you
best
print
to
or
share
proofread
errors. Y
ou
may
also
it
yo u r
your
for
want
document
spelling
to
wo r k
make
and
with
others,
grammatical
comments
that
spot
‘their’ instead
useful
later
or
for
others
to
read
when
you
share
features
such
as
Word
Count
word
processor
yourself
your
or
(knowing
others)
are
what
useful
has
been
options
edited
when
cursor
position
spellchecking
from
and
checks
to
the
end
of
the
the
spellchecker
reaches
the
end
of
the
you
want
document, a
dialogue
box
opens, asking
if
reviewing
to
continue
spellchecking
from
the
work.
Just
as
in
paper-based
you
would
cross
out, circle
document, as
or
well
make
as
a
comment
check
for
repeated
processors
can
easily
perform
these
of
the
document. Spellchecks
also
nd
words.
errors,
e
word
Spelling
icon
in
the
P roong
group
provides
functions
options
for
starts
by
beginning
a
of
and
document. W hen
Track Changes
‘the’ instead
the
the
document. Other
‘there’ or
will
Y
our
be
of
‘they ’.
for
handling
errors. Y
ou
can
select
a
range
of
you.
text
that
Proong
Before
you
errors, you
may
will
UK
English
use
containing
e
to
to
want
have
the
or
grammar.
to
your
conrm
proofread
‘s’ and
to
review
recognises
language
then
block
of
click
the
Spelling
icon
to
spellcheck
only
text.
language
begin
you
and
your
the
also
document
the
of
from
conrms
checked
for
for
language
work. For
spelling
‘z’ dierently
option
document
spelling
that
example,
words
US
English.
whether
errors
in
you
wish
spelling
Fig 5.22 Spellcheckers can review an entire document or sections of it
Spellcheck
Here
is
a
options
list
of
the
options
available
in
the
spellcheck
Spellcheck
dialogue
A
spellchecker
any
spelling
spelling
correct
checkers
can
word
will
should
accept
correctly
Spellcheckers
thousands
examine
mistakes. W hen
word
you. Y
ou
the
will
of
your
a
attempt
be
and
one
of
and
mistake
to
is
some
found
most
the
suggestions
suggestions
or
◆
Ignore
Once:
◆
Ignore
quite
All:
retype
◆
words
that
Add
to
are
dictionaries
supplied
with
ignore
ignore
meanings:
word
ever y
Dictionar y :
computer’s
large
their
just
one
this
of
one
the
time
selected
words
to
yourself.
have
box, with
identify
‘guess’ what
make
the
text
◆
Delete:
◆
Change
if
dictionar y
delete
a
word
a
word
it
if
can
it
you
be
type
is
not
in
the
added
occurs
only
once
with
the
All:
change
all
occurrences
of
a
highlighted
word
word
processor. However, there
will
be
some
words
that
are
◆
not
in
the
dictionar y, such
as
people’s
names. Y
ou
AutoCorrect:
correct
usually
add
extra
words
to
the
spellcheck
typed
1
16
the
cannot
wrong
spot
mistakes
word. For
computer
will
automatically
this
word
ever y
time
it
occurs
dictionar y
◆
A
the
can
where
example, it
you
will
have
not
Options:
the
and
gives
dictionar y
words
you
many
choices, such
language, ignoring
with
numbers.
as
changing
uppercase
letters
5. 4
Word
e
status
in
bar
the
lines
of
and
at
the
provides
lower
a
left
of
summar y
of
a
work
word-processing
the
number
document. However, for
summar y, the
Group
your
Count
document
words
Reviewing
Word
icons
Count
shows
characters
the
in
the
a
more
of
detailed
option
in
the
Proong
number
of
pages, words,
document.
Fig 5.23 There are options when correcting an error
Thesaurus
Most
word
check
A
and
processors
features. is
thesaurus
same
grammar
will
meaning
might
suggest
also
a
oer
dierent
suggest
as
(synonyms). For
is
check
word
thesaurus
from
alternative
that
example, if
you
you
‘ large’, ‘ huge’ and
a
or
spellcheck.
words
have
type
grammar
with
typed
‘ big ’ the
the
in
thesaurus
‘ vast ’.
Fig 5.25 The Word Count feature summarises the number of pages, words,
characters, paragraphs and lines in the document
Tracking
changes
in
your
document
eTracking
any
editing
this
feature
feature
that
is
a
you
be
colour
insert
such
you
as
text, it
edit
changes
in
or
the
useful
make
red
with
will
way
to
the
be
the
and
monitor
text
typed
that
retain
document
will
usually
crossed
in
feature
so
to
document. W hen
text, it
Changes
them
a
edit
document
reject
to
delete
also
underlined. e
each
a
used, ever y
highlighted. As
to
you
is
is
you
the
a
change
out. As
colour
used
can
is
to
but
accept
original
will
review
your
text.
Fig 5.24 A thesaurus will suggest alternative words with the same meaning
A
grammar
any
text
checker
you
grammatical
have
will
typed
errors.
examine
and
may
the
structure
highlight
of
some
Fig 5.26 Sometimes it is useful to track any editing in a document
1
17
5
Word
processing
can
update
the
name
of
the
document
to
include, say,
Comments
‘version1’, ‘version2’ and
Adding
comments
is
an
alternative
to
editing
in
document
directly
or
using T
rack
Changes. It
is
where
A
if
you
the
are
content
comment
can
the
text, then
An
alternative
and
delete
comment
selected
reviewing
is
be
not
created
method
comments
and
been
by
and
is
to
(Fig
added
responded
document
being
right-click
has
a
changed
placing
select
use
the
the
to, or
all
in
the
New
use
the
current
the
any
way
.
le
name
until
cursor
Occasionally
near
you
Comment.
tab
more
so
your
to
add
marked
one
be
can
can
be
be
viewed.
as
as
that
you
have
document
share
the
have
it
may
is
multiple
versions
password
selected
who
have
specic
access
the
document. A
the
use
of
document
or
in
digital
other
a
to
restrictions
formatting
be
no
can
the
also
a
same
can
information
as
level
on
of
to
and
include
that
used
ensure
could
it. is
document
need
the
and
the
le
make
e
feature
few
located
or
even
protection
conrm
has
a
not
scan
conrms
be
save
on
in
a
that
make
it, only
text. Most
to
word
changes
realise
location
your
original
storage
with
saves
of
the
a
latest
have
will
an
work
is
update
changes
as
Save
As
major
to
feature
and
can
also
over writing
changes
create
a
to
copy
a
of
be
used
previous
to
document, use
the
avoid
edits. If
you
updated
the
saving
you
a
have
Save
As
document. Y
ou
you
do
example,
also
printing
the
validity
you
your
to
signature
a
document
device, it
the
to
that
processors
automatically
secondar y
that
you
is
modied.
them.
option
1
18
when
it
or
involves
that
document
minutes. So, if
document
made
then
original
AutoSave
ever y
times
to
changes,
document.
be
a
if
includes
Review tab on the ribbon
may
if
that
email, for
Fig 5.27 Comments can be inser ted in a document using the icon in the
ere
are
read-only
be
document
placed
valid
document
document.
signature
is
a
changes
saved
editing, copying
accessed
signature
protect
changes, track
higher
digital
to
persons. Just
password
comments, general
A
can
password-protected
preventing
a
as
nished.
others. If
document
by
the
want
with
nal. A
accessed
not
you
sharing
made, the
than
document, each
comments
be
are
Users
Protecting
date
someone
Review
5.27). Once
to
for
on, or
also
backup
useful
so
a
Fig 5.28 Documents can be protected using dierent options
of
the
5. 4
Reviewing
your
work
Questions
Practical
1
You
have
State
the
typed
most
following
a
document
appropriate
using
feature
a
word
for
each
of
Microsof t
the
will
not detect
used
b
will
leave
1
a
deleted
phrase
the
allows
d
a
you
method
to
to
10:
Spellcheck
leave
check
a
the
document,
but
the
driver’s
sentence
the
is
taking
the
test
for
his
liscence.’
for
a
amount
user ’s
of
a
Perform
a
spellcheck
b
Right-click
on
the
sentence.
attention
text
within
and
select
Synonyms
from
the
a
box
to
nd
alternative
words
for
limit.
‘test ’ and
Explain
‘Eli
text
note
the
in
Type
option
specic
2
Word
whether ‘the’
, ‘their ’ or ‘there’ was
correctly
c
using
descriptions:
Exercise
a
exercises
processor.
dierence
between
a
spellchecker
and
‘driver’.
a
c
Use
the
Word
Count
feature
to
summarise
thesaurus.
the
3
List
three
ways
in
which
a
document
can
words
and
characters
in
the
sentence.
be
d
Use
Track
Changes
to
delete
‘is’ from
the
protected.
sentence
e
Insert
‘Did
a
he
and
replace
comment
pass
the
at
it
with
‘was’.
‘test ’ and
type
the
note
test?’
1
19
5.5
It
is
Combining
useful
to
move
f iles
information
from
and
one
impor ting
part
dat a
of
Impor ting
a
document
other
to
another
documents
documents. If
you
pictures, tables
not
have
images
to
in
the
are
spaces
allow
of
programs
and
some
you
to
just
and
insert
paste
adjust
word
are
the
the
size
the
designed
to
stick
in
of
from
the
the
is
to
How
do
these
other
they
in
will
layouts
it
a
to
1
you
your
from
the
default
to
is
between
opened
cut
the
or
three
sections
documents. One
documents
Select
by
using
necessar y
document
that
an
assignment
of
combining
copy
or
cut
documents. Note
all
copy
the
for
way
that
and
you
in
a
paste
rst
need
documents.
Go
has
from. Select
the
and
text
Cut
you
or
wish
the
the
cut
document
where
may
edits
the
all
be
W ith
edits
documents
combining
two
you
hidden
updated
feature
from
tables
desired
have
that
as
two
Copy
want
to
need
to
be
useful
creates
tracked
that
with
you
view
or
location
documents
the
place
and
a
le
program
the
created
dierent
you
will
probably
carefully
screen
which
and
can
you
as
a
type
you
are
that
using
is
at
will
choose
format. Sometimes
you
to
may
dierent
will
do
by
5.29).
simplest
common
le
type
word-based
is
TEXT
(TXT
programs
a
TEXT
le. ere
font, style
information
it
into
a
save
and
does
Word
this
your
it
le
did
not
Format
into
in
look
or
(RTF)
saves
well
the
as
another
the
the
problem
will
the
is
be
the
able
to
need
a
new
same
you
to
be
in
you
the
new
new
what
that
one
that
document
so
be
such
to
and
not
save
you
import
repeat
all
with
on.
viewed
as
formatting.
it.
overcome
formatting
should
created
document
should
to
words. W hen
Combine
combined, start
have
font, style
have
document, and
select
the
into
the
when
designed
Paste
document
changes. If
another
can
is
do
les,
information. Hence, the
program, it
program
TEXT
formatting.
was
the
with
words. ey
formatting
settings
problem. It
RTF
a
document, and
appearance
Text
only
is
Fig 5.29 You can save a le in dierent formats
12 0
a
OK. L ook
onto
from
by
work, you
containing
combined
method
documents, then
combined
this
click
dierent
save
the
your
text.
feature. is
highlights
or
copied
you
or
at
document. Another
Documents
can
cursor
or
comments
several
the
as
the
Sometimes
nal
one
(Fig
a
or
information, as
to
Click
open
then
comes
extension). All
Rich
text.
3
in
however. ey
the
text.
2
le
information
understood
save
menu
the
les
have
separate
have
and
then
that
be
you
drop-down
open
features
will
W hen
name
sure
information.
Combining
few
make
that
to
le
three
a
need
e
Suppose
you
program
box
save
especially
complex
the
see
word-processing
perform
do
one
give
document
that
by
types
program?
images. A
information
that
File
some
included, you
les
them)
processors
arrange
not
be
enough
ways. Remember
combined
to
where
data
or
word-processed
reports
need
big
information
into
writing
charts
copy
location
interesting
of
leave
(or
limitation
not
or
add
programs
later. Y
ou
programs
at
or
and
you
import
look
the
an
same
5.5
ere
to
are
many
particular
these
you
any
may
also
of
appear
le
programs
import
tr y
other
–
garbled
and
but
them. If
types
you
you
they
when
which
may
will
are
are
well
need
to
be
able
check
incompatible
viewed
(Fig
of
specic
some
to
before
your
the
screen. As
users
an
prefer
applications. To
alternative
to
do
Combining
use
using
Tab
to
impor ting
the
Task
switch
dat a
Bar,
between
this:
1
Hold
down
2
W ith
the
Alt
key.
5.30).
3
the
see
Release
Excel
is
a
Alt
the
the
key
held
name
Alt
of
key
spreadsheet
even
T
o
for
the
insert
an
Excel
program
the
converts
to
the
data
the
Word
data
to
key
until
want.
application.
makes
data
number
ver y
easy
–
challenged.
example, into
exists
in
spreadsheet, select
paste
table
Tab
you
that
presenting
already
and
a
to
that
worksheet, for
spreadsheet, open
text, switch
switch
and
the
application
mathematically
document, once
Fig 5.30 Incompatible le formats can lead to unreadable text
down, press
the
to
crunching, organising
between
+
to
and
text
you
Switching
Alt
les
the
an
Word
Excel
and
copied
a
copy
the
text. Word
format.
applications
Questions
To
integrate
necessar y
to
switch
between
to
data
have
from
all
between
open
dierent
relevant
them. For
Word
and
applications
applications
les
by
is
often
running
example, you
Excel
it
can
and
1
the
two
documents
switch
selecting
Explain
2
Explain
why
dierent
application’s
button
on
the
Task
Bar
at
the
ways
into
a
of
joining
one
user
nal
would
information
in
two
document.
want
to
switch
between
programs.
bottom
121
5.6
L ong
have
Ta b l e
documents
a
found
table
near
Figure
of
the
that
the
contain
beginning
is
not
document
of
the
a
the
of
headings
contents
a
table, but
are
in
page
a
as
number
usually
shown
list
sections
order
should
is
document. As
dierent
headings
with
many
table
actually
describe
document. ese
in
contents
contents. A
5.31, it
headings
that
of
of
in
they
to
Heading
they
2, Title, and
can
be
Subtitle
that
suggest
where
applied.
in
short
the
appear
locate
each
Fig 5.32 Using styles simplies the creation of a table of contents
section.
Generating
Once
the
styles
headings, the
place
the
where
T
able
table
the
of
from
you
contents
the
at
see
contents
applied
contents
the
list
icon
menu
that
will
been
of
near
Contents
generated
then
have
table
cursor
the
to
should
be
of
dierent
levels
contents
Fig 5.31 A table of contents provides an overview of the document’s contents
and how it is organised
of
the
contents
need
to
headings
headings
can
add
or
be
is
of
the
using
specic
one
be
a
font
step. If
you
can
style
select
with
one
compared
to
colour
the
styles
122
for
that
style
main
point
should
and
be
to
is
a
and
colour
heading
is
the
a
simple
black
click. is
has
create
Arial, 12
each
after
processor
headings
selecting
are
numbers
heading
ways
style, size
the
Arial, 14
heading
a
word
easiest
style. A
page
to
create
time-consuming, especially
modify
Fortunately
, every
One
and
in
in
table
to
of
apply
labels
a
in
should
another
black, then
faster
5.32
created.
text
document
font, then
you
contents
selected
and
table
feature.
to
choose
much
if
been
colour, while
and
available, with
has
this
way
a
point
heading. Figure
it
a
the
required
when
the
size
shows
such
and
some
as
of
the
Heading
1,
select
styles
indented
for generating a table of
Typing
document
contents
Fig 5.33 Group of icons
Selecting
the
and
5.34). e
various
required
generated. First,
placed. en
(Fig. 5.33)
(Fig
the
be
beginning
location. If
the
can
list
Fig 5.34 Options for generating a table of contents
a
locate
the
suitable
list
were
in
or
is
selected,
the
list.
5.6
Linking
to
a
to
page
either
list
e
contents
number. e
the
actual
section
page
key
e
the
with
word
cursor
at
a
shows
contents
page
in
while
list
list
where
heading
can
the
tapping
entitled
the
processor
line
in
and
used
is
to
its
located
for
go
to
‘Cohorts’, hold
the
the
page
and
include
the
page
new
numbers
heading
only, or
(Fig
the
contents
entire
5.36).
to
that
the
the
‘Cohorts’ (Fig
to
the
of
page
navigate
example, to
for
locates
heading
be
heading
document. For
heading
that
each
update
Table
Ctrl
5.35).
places
the
document.
Fig 5.36 The page numbers or the entire list in the table of contents can be
updated
Deleting
is
also
e
Fig 5.35 The Ctrl + Click key combination navigates from the contents list to
one
or
achieved
table
updated
is
more
using
updated
page
headings
the
same
with
the
from
the
Update
contents
Table
remaining
list
option.
headings
and
numbers.
the select page
Questions
Updating
If
you
wish
the
to
contents
add
another
list
1
heading
to
the
table
List
of
of
the
main
contents.
Heading
contents, select
the
heading
and
apply
the
return
to
the
contents
list
and
select
one
Update
Table
Practical
Exercise
1
11:
Using
the
Generate
2
Use
dialogue
exercises
Table
of
with
a
in
each
table
box
using
prompts
Microsof t
of
heading
contents
5.31, make
on
a
new
placed
If
a
new
+
at
4
page.
the
start
heading. en
heading
called
to
navigate
press
Enter
to
the
twice
Registrations
and
add
section
is
that
Use
to
the
table
Heading
1
and
added
can
to
a
document,
update
the
table
what
of
are
contents?
Ctrl
Return
the
of
contents
list
and
update
table.
+
Click
heading. Delete
of
5
Click
for
table
2.
methods
Return
the
a
document.
Ctrl
only
a
Word
3
Figure
styles
generate
you
contents
headings
document
the
options. A
the
to
of
two
the
Use
required
appropriate
2
style, then
steps
to
the
to
navigate
this
table
to
the
Cohorts
heading.
of
contents
list
and
update
table.
a
Fees.
123
5.7
Mail
merge
Mail
Why
Mail
merge
is
an
processors. Such
Sometimes
a
business
will
want
to
send
a
to
a
lot
of
people
but
each
letter
has
to
be
in
and
some
way. For
example, if
a
business
send
out
reminders
for
unpaid
bills
then
the
be
identical
except
for
the
customers’ names
and
reduce
the
amounts
and
could
it, and
be
then
done
by
making
customer. e
editing
to
the
do
and
a
–
delete
then
ver y
type
tedious
hundreds
of
in
the
the
and
and
new
to
be
standard
would
address
for
make
and
each
this
other
job, especially
document
with
data
list
of
it
to;
if
details,
4
Company
Clavery
Lotte
Team
is
a
second
the
details
there
be
are
are
are
list
of
of
the
the
is
a
must
details
people
master
are
to
be
people
letter. is
creation
uses
of
complete
5
Username
Password
Clalo
Lotte
Inc.
such
Zacton
N-Ta-Tane
Aliza
Zacto
3
Allen
Master
rosal
allen
3
you
in
into
saves
of
the
a
labels
mail
the
produces
list
by
spaces
lot
and
of
as
Gamers
3
4
5
find
your
login
information
Primary
with
If
you
are
unable
Remember
the
to
log
in,
workshop
please
will
be
respond
visible
Your
password
is:
Dear
marked
in
time. Along
printing
the
as
appropriate
the
with
envelopes
letters
master
letters, the
are
popular
merge.
Tuim
Clavery,
Thank
you

Your
username

Your
password
for
your
response.
is:
is:
Please
find
your
login
information
on
to
this
Lotte
Apr
28
at
6pm
to
letters-
letter
in
for
the
each
list
Ross,
below:
Thank
you

Your
username
for
your

Your
password
If
you
response.
is:
Please
find
your
login
information
below:
rosal
document
merge
message
below:
Clalo
6
is:
allen
fields
have
the
password
reset.
are
unable
to
log
in,
please
respond
to
this
message
to
have
the
ECT
reset.
Fig 5.37 Mail merging lets you make many personalised letters from a list
124
two
choose
Mala,
Dear
Please
these
many
putting
person
response.
to
markers
correct), you
One
your
want
letter, with
Merged
for
the
2
Ross
you
as
Group
Alison
Thank
two
6
4
ALL
2
create
added. W hen
(and
function. is
information

Gaming
one
the
merge
there
easy
would
the
Dear
3
Tuim
repetition. Y
ou
edited.
Secondary
2
letter, saving
needed
information. But
repetitive
letters
the
changes
facilities
name
of
owing.
typing
all
the
addresses
documents
is
word
t ype
and
where
addresses
most
this
letters
write
would
in
were
names
to
feature
automate
slightly
documents:
dierent
programs
standard
job
letter
advanced
Merge?
Remember
the
workshop
will
be
visible
on
Apr
28
at
6pm
ECT
password
5.7
ere
are
create
four
main
mail-merged
steps
that
must
be
followed
Alternatively, select
to
using
letters.
right
1
Create
the
list:
If
the
list
containing
the
names
mail
of
not
of
already
the
people
exist
then
to
it
send
must
the
be
letter
to
Write
the
letter:
e
letter
to
should
be
word
processor. Special
in
the
letter
where
of
codes
must
2:
customers
3
Link
the
now
be
letter
be
Per form
to
the
letter
addresses
which
put
into
mail
performed, one
one
for
so
addresses
the
of
W hen
in
is
in
on
process
documents
the
Mail
the
must
Merge
names
Click
2
Select
3
In
and
mail
produced
the
merge
type
each
is
and
this
method
of
other
personalising
individualised
names
and
W hen
letters
list, this
merges
which
For
mail
is
are
letter.
4
called
are
a
much
produce
To
example, a
club
need
to
renew
or
correspondence
only
for
some
mail
useful
could
than
select
of
the
people
merge. Selective
ever yone
their
simple
in
the
a
mail
in
W hen
In
to
these
of
from
a
by
Par t
1
1:
window
relevant
to
(Fig
your
not
any
set
have
button
a
and
ll
if
letter
in
you
under
address
ever y
want
eld.
to
add,
eld.
entr y, click
at
to
5.39),
New
Entr y. Add
all
time.
nished
entering
all
of
your
data,
save
location
merges,
reminder
letters
Address
putting
7
Click
8
Select
saved
your
so
list
that
List
a
window
, save
name
in
the
in
My
somewhere
you
can
nd
the
it
le
Filename
Data
else
the
for
folder. Y
ou
remember
the
nal
the
eld. is
Sources
but
for
mail
the
merge.
Save.
Edit
Recipients
List. e
contacts
in
the
people
list
will
appear
in
the
Mail
Merge
Recipients
database
could
where
you
can
edit
the
list
if
you
need
then
that
you
can
also
browse
for
a
list
that
already
saved
Word
to
by
to
use
as
selecting
your
Use
data, using
an
Existing
Select
List.
per form
merge
Creating
Navigate
select
tab:
people.
Microsof t
mail
is
List
Customize
have
usually
Recipients
a
Mailings
List.
do
another
Save
list
is
can
mail
is
Using
the
example, title, name
rename
you
to. Note
sent
for
OK.
the
list
a
database.
names
membership
members. Mail-merged
be
identical
to
window
of
that
for
data, one
new
who
labels. In
Address
the
make
data
selective
letters
is
information.
to
more
recipients
organisations
merge
sent
and
New
data
on
delete
6
Selective
the
Labels.
Recipients.
a
New
eld;
click
circulate
of
or
records
selecting
Type
the
Click
5
use
L etters, Envelopes
data
information. Y
ou
containing
list. e
of
Select
the
each
the
up
envelopes
1
the
Businesses, clubs, schools
one
the
the
letters.
person
lled
two
contains
document
be
and
that
le
merge:
each
will
ese
together
knows
addresses
list:
on
to
placed
appear.
and
linked
function
4
should
names
new
appear
document. Choose
documents:
Setting
creating
the
will
are
created
e
the
Word
pane
you
created.
send
in
the
task
if
does
Par t
2
merge. A
wizard
merge
and
types
addresses
the
Mail
the
to
a
letter,
the
Mail
label,
Mailings
Merge
or
tab
or
envelope
(Fig
Start
5.38), then
Mail
Merge
icon.
Fig 5.38 Mail Merge functions are on the Mailings tab
125
5
Word
processing
Fig 5.39 Adding details to the New Address List for the mail merge
Par t
In
2A:
the
Manipulating
Mail
specic
Merge
records
recipient, or
if
by
your
data
Recipients
checking
there
are
a
window, you
the
lot
of
boxes
next
recipients
can
to
select
4
Click
5
Repeat
into
each
you
the
arrow
next
to
the
column
heading
to
select
categor y
in
that
column. If
the
the
main
arrow
next
4:
column
heading
categor y
is
blue, that
already. To
heading
recipients
list, click
check
all
has
4
until
Close.
all
the
elds
are
inserted
document.
selected
names
in
the
merge
Before
previewing
labels, click
the
option
to
to
the
layout
of
the
labels.
a
2
particular
to
Completing
replicate
any
1
click
a
1
particular
steps
then
can
Par t
click
Insert, and
Click
Preview
Results
to
view
your
letters, labels
or
your
envelopes.
click
Clear
heading
have
OK
Par t
of
All. To
the
nished
to
return
2B:
Select
sort
item
to
Data
the
sources
ASCII
◆
Microsoft
Word
◆
Microsoft
Excel
◆
Microsoft
Access
◆
O utlook
Par t
Y
ou
3:
contact
now
your
to
sort
data
Merge
you
can
the
for
all
names,
by. W hen
the
3
Click
Finish
4
Click
Edit
5
In
type
the
to
sure
to
merge
insert
use
To
merge
all
with
Word
b
To
merge
only
c
label
information
names, addresses
elds
and
To
list. To
insert
a
P lace
main
2
or
3
126
In
cursor
at
Insert
Mail
the
Merge
Fields
window, select
the
on
the
where
other
the
merge
then
To
6
Click
7
Microsoft
8
Print
a
documents, click
the
window, click
range
type
document
of
the
that
All.
you
Current
numbers
in
in
Record.
documents, click
record
see
From,
the
From
boxes.
OK.
Word
will
create
a
new
merged
document.
or
you
data
save
the
document
just
as
you
would
any
page.
document.
want
using
the
Word
will
open
one
new
document
that
eld:
the
appropriate
position
in
the
Under
F ield
or, if
using
W izard, select
window, click
the
the
eld
the
Step
More
you
by
Items.
want.
all
your
you
individual
and
SBA
would
letters
circumstances, you
document. It
document
for
the
most
merged
Merge
Document
merge:
envelope
document.
Click
Step
the
to
document
and
contains
1
want
and
Microsoft
recipient
New
a
les
merge
Documents.
W izard.
lists.
the
to
you
other
Be
Merge
records
les
your
Individual
merge, click
the
letter,
Merge.
you
documents
the
&
column
les
Completing
can
uncheck
list, click
want
Mail
◆
text
the
you
selecting
All. To
merge
you
any
is
it
need
more
again
to
document
do
if
you
the
were
not
useful
save
for
that
to
merged.
need
save
need
to
the
the
main
to. However,
document
grading.
save
just
as
5.7
Mail
merge
Questions
1
Identify
2
State
Mail
two
two
benets
of
documents
Merge
the
that
Mail
can
Merge
be
feature.
produced
with
5
State
6
Explain
3
Why
4
Give
one
data
sources.
selective
1
12:
Create
mail
advantage
Practical
Exercise
choices
of
output
for
a
merge
document.
three
ways
of
selecting
records
to
merge
to
a
feature.
new
is
three
the
merge
of
the
using
exercises
Per forming
letter
a
mail
shown
document.
useful?
dierent
types
using
of
les
as
Microsof t
WORKSHOP
merge
and
save
Word
it
as
Dear
«First_Name»,
WORKSHOP
.
2
Create
the
Word
data
source. e
eld
names
for
Thank
the
data
source
should
be:
youfor
information
Company, Username, Password
Include
the
records
below
your
response.Please
nd
your
login
Firstname, Lastname,
and
and
name
below :
Group.
the
data
◆
Your
username
◆
Your
password
is:«username»
le
is:
«password»
INVITEES.
3
4
Merge
to
Retrieve
merge
a
new
the
again
document.
WORKSHOP
to
all
persons
If
le
in
and
the
list
perform
in
the
Group
you
are
message
unable
to
have
to
log
the
in,
please
password
respond
to
this
reset.
2.
Remember
6pm
the
workshop
will
be
visible
on Wed
at
EC T.
INVITEES
Firstname
Lastname
Company
Username
Password
Mala
Tuim
Gaming
Maltu
Tuim
4
Claver y
Lotte
Team
Clalo
Lotte
2
Alison
Zacton
N-Ta-Tane
Aliza
Zacto
3
Ross
Allen
Master
rosal
allen
3
Inc.
ALL
Gamers
Group
127
5
Word
processing
Exercise
1
Use
set
2
13:
the
of
P lace
Creating
same
labels
the
a
data
of
eld
set
as
your
of
in
labels
Exercise
12
to
create
a
choice.
names
on
the
label
as
shown
below:
«First
name»
Group
3
Name
the
«Last
name»
«Group»
document
with
the
merge
elds
as
Labels.
4
Before
the
5
mail
of
Name
the
Use
set
2
14:
the
of
P lace
the
merge, click
layout
Exercise
1
previewing
the
nal
same
the
10
the
and
option
completing
to
replicate
the
labels.
merge
Creating
size
labels
a
data
set
as
as
LabelsM.
of
envelopes
in
envelopes
eld
names
Exercise
(41/8
on
the
×
12
to
create
91/2
envelope
a
inches).
as
shown
below
«First
C/o
name»
«Last
name»
«Company»
Fig 5.40 When creating labels, you need to update the layout before merging
128
Printing
In
order
Print
to
print
processors. is
printer. ere
to
Pr int
at
your
monitor
sends
+
the
various
you
have
option
P)
print
colour
includes
e
black
on
is
in
displays
allows
scroll
order
you
bar
but
that
command
the
File
many
the
and
word
default
that
you
need
document.
take
document
the
features
screen
news
to
same
such
as
if
your
to
to
you
or
do
review
all
the
scroll
slide
printed
in
not
arrows
or
as
the
on
the
printed
footnotes, headers
will
the
only
in
white.
print
Print
page
displayed
and
to
the
and
can
be
black
of
the
see
columns
it. e
through
dierent
you
have
features
a
printer
white, characters
document
is
to
your
numbers, multiple
and
the
good
you
look
breaks. Note, however, that
in
the
on
options
nished
enables
generally
footers, page
print
found
document
document. e
will
result. is
and
document, select
Ctrl
5.8
document
Preview
Preview
look
(or
are
know, once
e
your
commands
the
your
Preview
printed
document
PgUp
and
page.
using
PgDn
keys.
Y
ou
the
or
can
Esc
also
key
print
is
on
the
Pr int
choose
the
to
quit
Print
keyboard
document
if
to
there
Preview
return
are
no
to
by
the
tapping
document
changes.
range
option
document
lets
that
you
are
indicate
to
be
the
pages
printed. Y
ou
of
can
the
choose
to
Fig 5.41 Options when printing a document
print
the
entire
pages. Once
document
you
select
page, one
the
print
page
option
or
you
selected
want, the
Questions
print
command
sends
the
job
to
the
printer.
1
State
two
ways
in
which
you
can
activate
the
print
feature.
Copies
2
is
option
lets
you
indicate
the
number
of
copies
What
is
the
Preview
print, and
whether
multiple
copies
are
to
be
in
order)
or
grouped
(all
page
1, then
and
so
the
Print
and
Print
Name
the
three
ways
of
indicating
which
pages
of
a
all
document
page2
between
commands?
collated
3
(printed
dierence
to
are
to
be
printed.
on).
4
Explain
copies
two
of
a
ways
in
which
you
can
print
several
document.
129
5.9
A
l lable
Fi l l a b l e
electronic
inf or mation
in
sof t
electronic
f or m
is
copy.
It
ver y
c an
forms
use ful
be
f or
g at he r in g
email ed
Table 5.3 Content controls for llable forms
or
Content
completed
data.
It
online
c an
also
w ithou t
be
having
com p l eted
on
to
a
re-enter
the
comp u t er,
control
Description
icon
l ap t op
Users can type multiple paragraphs
Rich
or
mobile
de vice.
F il l ab l e
f or m s
c an
be
u sed
text
f or
Users
online
up
job
quizz es,
sheets,
sur ve y s ,
pay ing
applic ations,
than
in com e
f or
paper-based
online
tax
regis tr ati on,
online
e x am ple. e y
f or m s
b ec aus e
an d
are
the
Plain
s ig n-
online
Check
example,
to
accept
elds
c an
on l y
be
the
required
c an
f or matted
to
d at a.
acce p t
be
Select
box
For
yes/no
respons e s
or
an
op tion
from
of
text
from
list
of
choices
or
type
in
information
text ,
Only
Drop-down
dates,
amount
an X in the box to select the option
Combo
f or matted
limited
Used for options: clicking in the box places
box
bet t er
 eld s
type
text
a
select
from
list
of
choices
list .
list
Date
Browse
to
current
date
inser t
a
dateor
select
today
for
picker
Design
Used
Mode
Used
Command
form
button
be
Creating
a
e
steps
following
form
using
Add
the
to
in
customise
advanced
for
text
forms
as
llable
explain
Submit
or
on
to
processing. These
labelled
Microsoft
the
a
form
submit
buttons
Click
the
may
OK
form
how
to
create
an
electronic
Word.
Fig 5.42 Online llable forms can be completed using a mobile device
ere
are
llable
some
applications
electronic
designing
forms
that
specialise
forms, however
using
Microsoft
we
will
Word
in
creating
focus
and
on
Google
Forms.
content
Developer
it
must
most
c om m on
c on t ro l s
and
their
i c on s
used
to
c re a t e
fi l l a b l e
forms
a re
rst
descr ibed
the
the
the
Developer
added
the
to
the
ribbon. e
it
list
tab
to
is
hidden
of
visible
steps
may
display
by
default,
tabs
dier
the
by
of
Microsoft W
ord
you
are
slightly
based
using. Once
the
in
tab
has
been
added, the
list
of
content
controls
5.3.
will
Fig 5.43 The Developer tab must be added before a llable form can be created
13 0
be
version
Developer
Ta b l e
display
which
on
a re
uses
controls. However, as
customising
The
to
controls
Microsoft W
ord
content
tab
be
available
to
create
your
llable
form
(Fig
5.43).
5.9
Open
a
template
document
Microsof t
to
Word
or
create
design
has
the
many
a
Fillable
electronic
forms
blank
form
online
templates
that
can
Fig 5.45 Content controls are
used to create llable forms in
be
used
to
help
you
design
your
form.
Once
you
are
Microsoft Word
online
in
this
various
However,
feature
allows
categories
you
document
to
can
for
also
create
you
to
search
business,
use
your
a
templates
education
blank
own
for
or
spor ts.
word-processing
form
as
shown
Set
change
proper ties
for
content
in
For
F igure
or
controls
each
content
control, the
properties
icon
can
be
5.44.
used
to
format
example, it
down
is
list, or
used
how
Customise
Clicking
the
customise
For
is
‘Click
here
enter
the
to
the
the
generic
to
enter
the
for
your
for
the
for
you
drop-
to
content
the
text ’, you
last
a
form
allows
label
enter
presented. For
displayed.
icon
labels
be
options
be
of
Mode
here
will
will
labels
generic
‘Click
data
date
Design
the
Protect
the
to
a
the
example, if
control
to
how
controls.
text
can
content
modify
it
name’.
form
Fig 5.44 Sample online form with information added
Once
Add
content
Depending
on
to
the
create
the
content, you
can
create
a
type
the
text
and
controls
in
the
various
cells
the
layout
of
the
form
by
aligning
the
content
boxes, text
controls. A
boxes, date
form
can
pickers
have
and
multiple
drop-down
entire
form
the
on
what
information
is
required
on
the
should
increase
the
font
size
layout
appropriate
font
style, such
as
of
ready
to
for
headings
Times
New
click
the
Restrict
Editing
icon
tab
to
prevent
others
from
modifying
the
form.
Forms
form.
and
a
Google
Form
is
useful
since
it
is
created
use
and
can
be
easily
emailed
or
shared
with
others.
Roman
Responses
or
are
lists,
online
an
designed, you
check
Creating
Y
ou
and
Developer
Google
based
been
labels
the
and
has
to
in
organise
form
table
the
to
your
form
can
also
be
viewed
as
soon
as
the
user
clicks
Arial.
the
a
Content
submit
any
and
spreadsheet. ese
the
online
form, you
will
need
to
know
the
types
check
of
controls. ese
data
in
the
boxes, text
lists, and
can
forms
be
can
downloaded
also
be
to
created
Google
Drive
or
accessed
more
allow
you
to
form. Content
boxes, date
advanced
features
enter
and
such
as
entering
in
a
search
engine.
specic
controls
pickers
by
dierent
www.google.com/forms
content
data
controls
using
For
button
inc lude
drop-down
Y
ou
should
content
name
control
your
for
the
form
rst
and
then
select
the
rst
question.
command
buttons.
131
5
Word
processing
Fig 5.46 Example of a Google Form using a content control for a multiple-
choice question
Note
that
the
Google
Form
Google+, Facebook, and
attachment
is
to
the
user ’s
submitted, individual
responses
can
be
can
also
Twitter, and
email
(Fig
responses
viewed
(F ig
be
shared
sent
as
5.47). As
or
a
via
an
the
summar y
form
of
5.48).
Fig 5.47 Google Form received as an email
Fig 5.48 Responses received via Google Form
132
5.9
Fillable
electronic
forms
Questions
1
Explain
one
advantage
paper-based
forms
and
and
one
online
disadvantage
of
3
Order
i
forms.
ii
2
Explain
the
dierence
between
each
of
the
following
Protect
Add
the
steps
for
creating
a
llable
form:
form.
content
to
create
the
form.
the
iii
Customise
iv
Add
the
labels
of
the
form.
following:
a
rich
text
and
plain
text
content
the
Developer
tab
to
display
the
content
controls
controls.
b
combo
box
and
drop-down
lists.
v
Open
a
design
vi
Practical
Exercise
ese
15:
Word. Y
ou
the
the
depend
can
Developer
use
Developer
on
a
your
tab
Open
2
Click
a
version
browser
to
of
search
Microsoft
for
Type
NEW
SERVICES
en
merge
the
‘Adding
blank
document
to
for
content
controls.
a
table
with
two
two
columns
and
FORM
columns
in
in
the
eight
the
rows.
rst
same
row.
rst
row.
Type
the
information
in
the
left
column
and
document.
and
then
content
Q uick
controls
in
the
right
column
as
Options. Alternatively,
shown
the
proper ties
3
apply
click
a
form.
change
Create
tab’.
blank
File
the
create
2
4
1
or
or
exercises
Adding
steps
Set
template
Access
toolbar
and
select
in
the
table
below. Change
the
font
style
More
to
Arial
and
the
font
size
to
10
or
12
point.
Commands.
3
Click
Customize
NEW
Ribbon.
CUSTOMER
4
L ook
for
the
Developer
Main
check
Tabs
list
box. Click
and
select
16:
Create
a
f illable
text
content
control
CUSTOMER’S
FIRSTNAME
Plain
text
content
control
CUSTOMER’S
LASTNAME
Plain
text
content
control
OK.
form
METHOD
Check
L et ’s
use
based
content
control
type ‘Cash’
Word
Check
1
box
using
then
Microsof t
FORM
Plain
the
PAYMENT
Exercise
SERVICES
NUMBER
on
a
blank
Figure
customers
who
document
5.44. e
are
to
create
online
applying
for
a
a
form
new
form
is
then
for
Check
then
Internet
NEW
ser vice.
SERVICE
REQUIRED
box
content
type ‘Debit
box
control
Card’
content
type ‘Credit
Drop-down
list
control
Card’
content
control
5
SIGNATURE
Plain
DATE
Date
A
drop-down
question. Add
drop-down
6
W ith
the
the
list
the
is
used
text
for
content
content
picker
the
control
content
ser vice
control
box
control
required
for
the
list.
drop-down
Properties
option
list
in
still
the
selected, click
Developer
on
tab.
Fig 5.49 Example used for creating a llable form in Microsoft Word
133
5
Word
processing
A
dialogue
options
to
box
the
will
list
show
(Fig
so
that
you
can
add
the
9
Click
Add
again, to
add
DAT
A
PLAN. Click
OK.
5.50).
10
Click
11
In
the
edit
of
OK
close
Developer
the
the
to
dierent
content
the
drop-list
tab, select
control
controls
dialogue
Design
box.
Mode
options. Replace
as
shown
in
to
each
Figure
5.51.
Fig 5.51 Example in Design Mode to edit the text
12
Click
and
as
on
Select
others
7
Click
on
Add
in
the
dialogue
box
to
in
icon
in
so
labels
Figure
that
of
form
the
you
the
5.52. To
Mode
entire
from
Mode
the
Design
the
Editing
Fig 5.50 Adding options to the drop- down list
Design
shown
click
13
on
customise
can
content
preview
edit
controls
the
form,
again.
and
click
Developer
modifying
the
the
tab
layout
Restrict
to
of
prevent
the
add
form.
INTERNET
. It
Name
and
Value
will
appear
in
areas. Click
the
Display
OK.
14
Test
the
form. Type
number, your
8
Click
Add
CLOUD
again, to
rst
and
last
as
the
name, data
customer
plan
as
ADDITIONAL
STORAGE. Click
Fig 5.52 Editing the text in the form
134
add
120163-03
the
option
the
current
from
OK.
date.
the
drop-down
list
and
select
5.9
Exercise
1
17:
Create
a
Ensure
that
for
exercise.
this
2
Type
3
Select
4
Create
To
have
a
Form
6
Google
a
blank
the
of
a
the
Gmail
the
account
in
a
your
email
option
email
to
the
address
‘Include
to
test
form
completed
in
form
the
electronic
form. Click
email’. Click
(Fig
forms
Send
5.54).
browser.
form.
same
new
or
Add
to
www.google.com/forms
add
right
you
Google
Fillable
form
as
shown
question, click
in
the
Figure
plus
(+)
5.51.
to
the
form.
Fig 5.54 Exercise – Emailing the Google form
Fig 5.53 Exercise – Creating a Google Form
7
5
Click
Settings
in
the
top
corner
to
preview
the
Check
the
the
form
email
and
of
the
submit
Google
form. Complete
it.
form.
135
End
5
Multiple
of
choice
chapter
exam-style
questions
7
questions
A
list
of
shor t
sections
1
Each
of
the
following
are
methods
of
editing
text
in
document,
a
moving
c
Find
d
spelling
and
and
and
Text
that
is
at
and
column
b
mail
c
primar y
d
table
to
just
below
the
line
merge
document
b
indent
of
contents.
Sending
size
is
referred
to
a
document
to
only
some
of
the
people
in
and
is
a
feature
in:
as:
a
selective
Mail
b
Find
Replace
c
moving
d
password
and
and
Merge
copying
subscript
protection.
superscript.
Questions
The
to
feature
nd
one
that
or
automatically
4
page
a:
grammar.
smaller
alignment
d
3
called
Replace
a
c
dierent
their
copying
lowered
a
is
a
alist
printed
the
with
expor ting
8
2
describe
along
except:
impor ting
b
that
document
in
numbers
a
headings
the
a
copy
b
drag
c
Find
d
spelling
Text
and
more
the
endnote
footer
c
footnote
d
header.
that
with
you
specify
another
9
and
10
refer
to
Figure
5.55.
document
word
and
is
called:
drop
top
b
it
the
Replace
and
a
through
words
change
grammar.
whichappears
inside
look
paste
and
and
will
at
margin
the
is
top
of
called
each
page
but
a(n):
Fig 5.55
9
5
The
feature
make
a
to
a
that
highlights
document
is
any
editing
that
Two
content
drop-down
b
command
c
plain
d
rich
spellcheck
c
Track
d
Word
the
form
are:
button
button
and
rich
text
text
text
and
and
command
drop-down
button
list.
Changes
The
content
control
where
users
Count.
document
following
136
in
command
you
amount
a
used
and
comments
b
A
list
called:
10
6
controls
a
can
be
protected
by
each
of
of
data
a
rich
b
plain
c
check
d
drop-down
is
called
text
the
text
features, except:
box
password
b
read-only
c
Mark
d
Save
as
A.
Final
list.
(a):
type
only
a
limited
5
Shor t
11
answer
Oliver
as
a
12
questions
nished
a
repor t
on
his
computer
and
saved
End
of
along with a proposal document, to 15 potential authors.
it
Name
two
input
devices
that
would
be
useful
him
when
work ing
on
the
UniPress
What
does
.docx
in
the
name
of
the
repor t
Mr.
and
what
type
application
was
used
1,
the
Chuchu
Diamond
repor t?
We
Mr.
are
for
proposed
next
copy
of
create
day
the
the
he
wanted
original
updated
to
update
repor t.
it
Describe
but
keep
how
he
St.
Chuchu:
pleased
proposal
The
City
to
Dear
create
Main
2019
Tzay
147
represent,
Rd,
repor t.
July
that
you
completion.
have
chosen
Please
our
contact
publisher
the
editor
and
below
would
who
appreciate
has
Explain
page
e
The
i
how
of
his
repor t
Oliver
Editor's
add
a
graphic
to
the
Explain
why
for
Explain
be
could
to
review
our
your
Email
address
rod@unipress.org
cover
a
a
table
table
of
of
Yours
truly,
Ms
Jara
contents.
contents
would
be
E.
Senior
ii
you
repor t.
needs
useful
if
assigned
could
repor t.
can
been
publication.
a
Rod
d
questions
Catherine needs to send a copy of a letter (Fig 5.56),
Fordox
c
exam-style
Repor t_OT.docx.
for
b
chapter
the
where
placed
in
Griffith
Editor
repor t.
the
the
Ref#:51718
table
of
contents
should
repor t.
Fig 5.56
iii
Write
an
example
contents
of
a
containing
suitable
the
table
following
of
titles:
a
Introduction
Updates
to
Additional
for
the
project
of
of
Mail
new
new
sta
ii
at
Oliver
10
of
i
ii
iii
now
his
wants
to
send
the
updated
repor t
to
iii
colleagues.
Explain
how
that
one
no
List
two
the
repor t
can
make
methods
Describe
to
one
his
can
that
protect
the
changes
he
could
to
repor t
so
b
i
to
of
Use
the
the
for
FName
Address
131
Mr
Birnbaum
Steve
2042
230
Mrs
Bradhurr y
Eleanor
9
727
Mr
ChuChu
Tzay
147
520
Mr
Fosten
Terence
P
.
O.
Box
881
750
Ms
Rhone
Jos
P
.
O.
Box
98
622
Sis
Stens
Cecile
127
Drive
Rogers
Dia
the
Rd
Hill
St
Pacif
for
list
Lane
the
your
Merge
feature
required
for
Mail
in
the
will
letter,
change
identify
in
the
above.
applications
that
can
be
Merge.
feature
the
was
that
sor ted
which
bottom
to
and
list
create
authors
only
was
used
to
create
the
data.
in
of
of
ascending
author ’s
the
rst
application
data. Then
envelopes
assigned
order
name
by
would
be
list?
word-processing
letter
feature
LName
Mail
documents
which
other
two
with
Author#,
Title
the
address
elds
Name
at
Author#
the
ve
shown
If
method.
c
main
document
format
ii
each
two
from
Name
send
colleagues.
disadvantage
use
The following data was saved in a le called ‘Authors’
.
it.
use
the
least
used
Oliver
to
Merge.
Apar t
sta
wishes
letter.
State
Summar y
f
assistant
this
i
sta
Assignment
Location
Her
to
of
use
size
the
4
to
create
Mail
1/8” ×
Merge
9
1/2”
Rod.
Editor
Email
ResponseDate
Raci
rachel@unipress.org
08/31/2019
Gena
geneva@unipress.org
08/15/2019
Rod
rod@unipress.org
08/15/2019
Gena
geneva@unipress.org
08/01/2019
Rod
rod@unipress.org
08/31/2016
Raci
rachel@unipress.org
08/15/2016
137
A
PT
E
C
H
6
WEB
6.1
Introduction
Aweb
pageis
It
contain
may
other
web
a
document
to
you
we b
can
text, images, videos
pages
and
les. Web
view
page
using
are
abrowser.
usually
Now, new
are
a
language
called
HTML
(HyperT
ext
being
universal
language
that
was
website
produce
the
confused
by
language
–
a
web
layout
of
thinking
it
isn’t. It
browser
uses
web
that
pages. Do
HTML
contains
to
is
codes
present
the
a
not
and
can
be
a
web
page. e
browser
then
linked
together
‘tags’ that
and
categories
of
e
◆
and
use
To
of
HTML
share
users
To
link
the
interprets
read
other
a
page
in
two
HTML
documents
can
to
web
helps
documents:
share
browser
◆
format
on
basic
for
was
the
images
these
to
on
tags
the
address
HTML
hyperlink
views
Any
e
the
web
code
either
the
to
Internet, so
for
the
the
can
common
be
used
browsers
to
are
Static
The
website
the
content
same
Edge, Microsoft
use
related
access
a
Google
Firefox, Opera
and
Apple
Internet
a
les, but
Y
ou
open
not
This
brochure
brochure
website
updated
website
a
web
page
by
so
past
Dynamic
Here
a
website
add
called
a
URLin
on
web
page
for
engine
to
nd
a
the
or
This
website
online
A web
Web
application
be
the
early
provide
138
days, web
Explorer, Mozilla
entering
text. Y
ou
web
information
pages
for
6.1.
websites
this
way
is
remains
like
an
generally
online
brochure. Viewers
for
content.
the
that
interactive
Content
visitors
is
can
version
stored
search
of
as
the
it
for
is
web
pages
or
other
and
content.
user
can
login
inser t
and
create
images
and
new
content,
generally
is
what
a
is
viewed
website
that
on
payments
apps
added
from
provide
to
having
to
Twitter
Lite,
a
is
the
website.
integrated
visitors
push
device’s
download
it
to
to
the
notifications
home
from
screen
an
app
receive
website.
and
can
without
store.
page.
let
you
phone
Pinterest
and
weather
apps
are
or
that
push
notifications
to
the
user's
browser.
view
a
unique
are
popular
because
they
cater
to
all
types
audiences
for
bar. For
education, entertainment, sports
can
also
or
web
purposes. Knowing
the
purpose
of
a
example,
therefore
sets
the
tone
for
its
content
and
the
a
website
that
is
formal
or
use
reects
the
seriousness
or
carefree
impression
page.
that
In
in
is
content,
E- commerce
informal
asearch
in Table
them.
theaddress
this
this
ar ticles,
organisation. Creating
web
explained
Chrome,
‘www.oup.com/oxfordcsecforit ’ opens
support
links. Some
in
website
typing
web
an
informational
address
are
website.
view
of
can
multiple
any
material
Safari. Browsers
create
or
navigational
paper-based
search
Editable
Websites
HTML
of
and
of
examples
Microsoft
page
help
that
documents
page. Clicking
downloads
day.
document.
Hyperlinks
related
ones
view.
document.
browser
most
for
web
through
websites
control
Internet
ever y
existing
to
ways:
created
HTML
documents :
you
major
and
Table 6.1 Categories of websites
cannot
produce
modied
standalone
version
the
created
become
programming
called
text
being
developed
general
to
updated
are
Markup
pages
Language), a
websites
written
A
in
DESIGN
design
andhyperlinksto
pages
PA G E
were
intended
education
and
the
to
only
government.
visitors
browse
types
the
of
will
use
to
decide
pages. Table
websites
and
6.2
their
if
they
provides
purpose.
continue
to
examples
of
some
6.1
Introduction
to
web
page
design
Table 6.2 Descriptions of websites and their use
Use
of
website
Enter tainment
Corporate
Explanation
Examples
These websites use videos, graphics and live streaming to market their products, or
YouTube,
for entertainment. Many online games and video sites use Adobe Flash software to
spor ts
display content, so sometimes people call entertainment sites 'flash' websites.
games
Also
called
conduct
and
Shopping
can
These
are
These
such
the
business
provide
news
form
website
customer
e -commerce
and
pay
websites
as
website,
business. The
also
products
Information
a
of
it
with
selling
with
a
around
encyclopaedias,
the
website
information
for
to
marketing
users
about
and
the
not
to
cxc.org,
online
oup.com
company
suppor t.
products.
methods
users
happens
uses
provides
websites
online
provide
as
which
Netflix,
sites,
such
as
a
repositor y
the
training
or
world.
Users
credit
of
historical
Other
general
can
browse
card
or
and
websites
and
select
Amazon,
eBay
PayPal.
current
provide
information,
information
Wikipedia,
in
Fox
education.
News,
MSNBC,
CNN
Notesmaster,
Caribbean360
Community-building
These
or
with
social
networking
websites
others
events
Academic
or
Users
professional
Personal
or
with
share
potential
blogs
Personal
profiles
online
life
or
focus
who
friends,
their
the
and
are
specific
and
interaction
interest.
of
Users
people
share
who
want
personal
to
communicate
details,
pictures
Facebook,
and
Instagram,
acquaintances.
por tfolios
and
created
and
or
career
accomplishments
online
for
LinkedIn,
may
Academia,
ResearchGate
owned
editorials
writer
Flickr,
SoundCloud, Twitter
clients.
interests. These
journals
business. The
social
common
resumes,
websites
diaries,
a
family
employers
and
on
share
by
individuals
websites
that
even
are
reflect
comment
who
weblogs
whatever
on
or
is
politics
share
blogs
going
or
their
–
on
news
personal
Personal
generally
in
or
the
share
forums,
writer ’s
blogs,
video
blogs
(vlogs)
personal
opinions.
Mobile
These
websites
to
normal
the
content
is
are
ideal
version
viewed
of
better
for
a
mobile
website
on
a
devices
when
narrow
and
are
often
connecting
screen
width
offered
with
and
a
as
mobile
uses
less
an
alternative
Any
device. Their
data
to
display
for
the
website
viewing
mobile
created
on
a
device
information.
Directories
These
websites
alphabetically,
are
a
users
type
can
of
online
search
director y.
terms
and
However,
phrases
in
interest
Planning
your
web
rst
task
is
to
decide
the
purpose
of
your
do
you
want
your
or
how
content
it
will
you
be
are
website
going
to
organised, and
enough
to
do?
is
more
Yellow
to
Pages,
Google,
encourage
repeat
Bing
visits. e
use
of
put
how
on
your
the
web
pages
combinations
of
colour, images, sound,
and
tone
of
language
can
capture
or
lose
a
determines
visitor’s
what
searching
website.
video
W hat
of
engines.
pages
one
Y
our
instead
search
attention.
pages,
are
linked.
Organisation
Web
pages
should
be
well
organised, with
information
Content
arranged
It
is
of
is
ver y
important
presented
those
in
who
a
e
main
supply
manner
visit
visitors’ interest
it. e
so
screens
enough
that
that
and
the
message
that
captures
initial
they
want
and
to
your
the
screens
connecting
information
of
attention
should
browse
web
website
pages
maintain
a
attract
the
site.
should
visitor’s
the
and
be
user
in
to
browse
logical
selected
sketch
and
the
how
how
categories
further
the
you
content
through
manner, so
for
that
each
subcategories. is
information
interesting
reading. Y
ou
various
would
on
and
web
want
web
pages
your
in
sequential
sub-topics
should
relate
website
a
helps
to
can
therefore
each
visitors
other
to
view
page.
139
6
Web
page
design
Navigation
Navigational
menus
visitor
the
go
to
or
to
connect
Other
are
website
the
to
an
web
seen
in
a
a
to
the
sub-categor y
of
or
be
pages
of
to
able
in
or
a
are
one
to
move
through
manner
Hyperlinks
web
pop-up
documents. Any
logical
pages
the
a
or
or
are
used
locations
documents.
web
visitor
page, with
before
breadcrumb
and
trail
page
it. An
should
visitor
must
Also, not
so
or
time
aware
view
all
modem
the
be
users
to
have
for
also
number
seeing
the
a
page
aimed
take
the
same
dial-up
view
videos. Websites
devices
the
before
speeds
taken
of
web
page
that
has
pages
of
Internet
customers
at, or
this
of
a
interest.
connection,
may
many
optimised
loading-time
increase
images
for,
issue
into
consideration.
header.
would
each
Y
ou
mobile
‘ breadcrumbs’ which
path
current
or
external
below
the
the
pages
other
page
line
pull-down
interest.
links
show
access
breadcrumb
or
web
single
other
should
pages
navigational
include
to
area
same
Breadcr umbs
taken
can
categories
directly
within
links
hyperlinks
a
main
Economy
Secur ity
have
one
being
example
of
a
is:
A
website
should
condence
as
credit
features
if
have
users
card
or
should
ample
are
security
providing
personal
include
features
sensitive
information. ese
measures
to
to
assure
data, such
prevent
security
hackers
Home > P lants > Potted > F lowers
and
e
the
visitor
can
go
breadcrumb
including
opening
directly
by
c licking
‘Home’, which
screen
or
to
main
any
on
will
web
of
the
take
the
pages
hyperlinks
them
back
page. Another
in
in
to
of
links
websites
websites
that
are
can
related
provide
to
your
are
those
website’s
web
shows
page, also
the
called
address
the
or
URL
of
integrity
of
data,
hardware.
Questions
to
other
Name
the
application
that
is
used
to
view
a
web
page.
content.
State
a
the
to
name
of
produce
the
web
universal
language
that
is
pages.
particular
3
State
the
4
Suggest
names
of
three
common
browsers.
path
locate
5
a
Explain
two
ways
web
the
in
which
a
user
can
open
or
page.
association
between
a
website
and
web
page.
Fig 6.1 The URL of a web page is shown in the address bar
6
7
State
the
login
to
State
the
that
8
is
categor y
edit
used
online
b
viewing
c
socially
State
of
website
where
users
must
content.
general
a
purpose
or
categor y
of
website
for:
purchases
three
planning
14 0
the
useful
used
6.1
and
compromising
it,
the
2
Figure
from
information
1
set
viruses
a
on
a
small
interacting
features
website.
device
with
that
others.
should
be
considered
when
Designing
As
you
will
be
layout
start
your
interested
and
web
page
that
are
links
is
design, you
in
to
the
web
other
need
pages
to
think
and
about
consider
pages. Remember
dierent, but
most
have
that
certain
who
e
left
menu
the
ever y
the
web
to
all
web
pages.ere
right
or
website
templates
formatting
builders
so
and
that
that
users
more
oer
spend
time
free
less
are
focusing
design
time
on
content
features
that
you
more
general
layout
of
a
web
page
is
shown
each
a
of
navigational
the
major
bar
or
sections
of
area
contains
the
most
important
or
images
place
and
here
staying
on
the
should
on
the
web
page. e
attract
web
the
page
or
information
visitor
into
reading
website.
content.
e
A
includes
to
many
with
the
links
6.2
page
page.
paragraphs
online
sidebar
shows
we b
features
e
common
or
that
a
in
Figure
footer
is
important
It
should
and
include
should
include
there, any
Header
Left
should
any
other
information
that
6.2.
how
contact
privacy
notices.
Web
page
be
included
recently
information
the
on
all
content
and
web
pages.
was
placed
copyright, legal
or
Right
Content
sidebar
content
sidebar
Y
ou
should
that
you
page
really
know
you
have
create
a
web
something
page
about. If
created, do
not
based
this
make
it
is
too
on
a
the
topic
rst
web
largeand
Footer
ambitious. Some
Fig 6.2 General layout of a web page
advertising
a
landscaping
e
header
displays
the
name
of
the
name, logo
or
company
name. e
name
placed
at
the
top
left
corner
simple
of
each
web
header
also
provides
a
short
statement
or
explains
the
purpose
of
the
web
page. If
you
a
the
web
page
header
that
takes
is
the
not
user
the
main
back
to
page, clicking
the
as
hairdressing,
production.
main
structure
will
be
sucient
to
develop
your
at
preparing
the
information
for
display
and
the
site. Sketch
a
plan
of
the
website’s
structure
get
an
idea
of
what
you
want
to
share
(Fig
6.3). Y
ou
are
can
on
such
couldinclude
phrase
to
that
music
business
pages
page.
building
e
or
or
web
is
skills
usually
trade
for
website, web
A
page, blog
ideas
on
in
page.
also
the
visit
each
of
syllabus. Each
the
one
stores, blogs, business
recommended
provides
and
website
samples
personal
of
builders
online
websites.
HOMEPAGE
Planting
Flowers
Payment
ideas
Schedule
Potted
and
Plants
delivery
a
Garden
visit
Seeds
Seedlings
Fig 6.3 Plan the structure for
your web pages
141
6
Web
page
design
Backgrounds
and
themes
What’s
W hen
using
you
a
create
a
web
background
or
page, you
theme
to
should
help
capture
images
of
or
a
watermarks
background
used
to
visitor. is
for
give
your
your
to
includes
create
web
web
an
a
use
of
colour,
interesting
pages. A
pages
the
theme
can
professional
be
having
all
navigational
links
the
background
colour, the
font
and
you
tree
shade,
it
that
come
not
but
across
only
a
provides
it
does.
and
with
there’s
maintenance
to
worry
about
similar,
ble
and
often
ample
while
look, for
looking
not
shade
no
example
sale!
the
It’s
attention
for
consider
font
to
grow
in
climates
with
hot,
colour
dry
summers,
and
even
tolerant
of
consistentthroughout.
pollution
and
urban
conditions,
you
can
Text
Many
and
images
website
upload, edit
Images
builders
or
and
remove
videos
can
have
your
be
options
for
you
text, images
embedded
to
and
insert,
Flame
videos.
among
the
fall
text,
of
or
the
text
can
ow
around
the
image
(Fig
6.4). If
red
color
the
simple
web
pages
using
Microsoft
the
document
compatible
web
will
format
and
not
single
create
web
web
page
converted
when
page. Although
could
be
other
you
ear ly
save
versions
any
text
a
the
pages, saving
converts
to
of
for
autumn
Bush
makes
foliage
it
an
really
landscape
draws
plant...
attention
and
when
information
in
rows.
In
summer,
the
web-
document
Microsoft
your
and
ery
seller
Word, any
planted
in
The
best
you
it
text, graphics, tables, hyperlinks
the
Burning
excellent
create
is
as
a
Word
document
formatting
as
a
into
Fig 6.4 Images are useful to suppor t the content on the web page. The
hyperlinks on this page are shown in bold.
HTML
code. Any
compatible
graphic
images
are
also
converted
into
web-
formats.
Y
ou
Hyperlinks
and
bookmarks
should
navigational
hyperlinks
Hyperlinks
and
bookmarks
can
add
and
navigational
functionality
to
your
be
to
a
website
use
page
to
web
page. A
hyperlinks
hyperlink
to
move
or
word
that
automatically
would
can
be
an
for
viewing. Y
ou
click
opens
on
another
le
be
directed
to
another
web
◆
be
directed
to
another
position
a
hyperlink
page, le
or
within
◆
open
a
details
new
as
using
email
given
on
a
of
visitors
Word, and
to
the
an
actual
web
page. Y
ou
send
same
can
so
that
when
the
user
clicks
that
of
text
or
even
an
image, the
user
place
in
the
current
use
as
create
the
particular
is
directed
document, to
to
a
web
or
to
a
given
email
contact
address
(Fig6.5).
document
the
web
can
also
ll
out
a
ScreenTip
describing
page
who
may
want
a
description.
using
contact
website.
Fig 6.5 The underlined text in blue indicates a hyperlink
142
to
interest. Hyperlinks
function
bookmark)
message
the
in
on
specied
those
known
areas
allow
to:
Y
ou
(also
specic
to
contents
or
page
◆
area
of
icon,
your
document
home
table
from
portion
image
select
created
hyperlink
web
to
or
a
web
they
page. V isitors
area
have
structure,
can
organisation
therefore
the
link
to
6.2
Designing
a
web
page
Fig 6.6 A hyperlink can be created to link to dierent documents and locations
Bookmarks
part
of
large
are
a
the
hyper links
web
location
later. is
whole
a
on
with
the
◆
begin
◆
page
not
when
have
you
or
feature
with
can
many
that
document
that
are
name, word
means
bookmark
that
page. ey
documents
typically
Note
are
a
can
the
a
and
spaces
may
than
locate
that
underscore
for
on
ver y
you
to
assign
reference
through
the
to
the
location, the
it.
the
to
useful
want
include
between
dierent
sections. ey
bookmark, it
can
a
looking
searching
easily
naming
letter
any
use
page
or
phrase
you
rather
to
especially
words
or
that
jump
should:
numbers
words. However,
join
words
for
longer
names.
Fig 6.7 Bookmarks are hyperlinks that jump to a dierent par t of the web page
Questions
1
In
the
general
layout
of
a
web
page,
explain
what
is
you would
displayed
in
the
rearrange
the
web
pages
for
a
dierent
header.
perspective.
2
Use
a
Figure
Write
6.3
the
for
the
following
breadcrumbs
navigated
to
that
questions:
show
you
3
Explain
4
Describe
Figure
be
6.3
is
a
book mark
is
similar
to
a
hyperlink.
three
ways
in
which
a
user
can
be
directed
Seedlings.
by
b
how
have
not
organised.
the
only
Create
way
another
that
the
sketch
website
on
click ing
on
a
hyperlink.
can
how
143
6
Web
page
design
Practical
Exercise
1:
1
Open
2
Type
exercises
Adding
a
blank
text
document
as
3
Select
the
4
Select
Insert
choose
5
Type
6
L ocate
To
1
go
the
a
Select
on
Web
Enter. is
the
Menu
creates
or
6
left
pane, select
Existing
File
or
Page.
Browse
the
to
locate
and
select
the
‘Chapter6Ex’
document.
page.
bar
the
7
Click
8
Move
ribbon, then
Ctrl
OK.
the
+
pointer
Click
to
over
open
the
word
‘HERE’.
Press
the ‘Chapter6Ex’ document.
‘ Top’ and
click
paragraph
Add.
and
select
the
last
paragraph.
on
the
Menu
bar
or
ribbon, then
Bookmark.
the
to
the
sixth
Insert
choose
Type
press
document. Save
word
on
On
document.
and
your
name
the
in
Select
5
‘Chapter6Ex’.
rst
Word
Bookmark
the
word
8
Word
in
Microsof t
bookmark
=rand(6,4)
random
7
a
using
name
‘End ’ and
click
Add.
bookmark:
Insert
choose
on
the
Menu
bar
or
ribbon, then
Fig 6.8 Linking to an existing document
Bookmark.
Exercise 3: Using hyperlinks to be directed to a website
2
Select
3
Tr y
the
bookmark
name
and
click
Go
to.
is
locating
the
Top
and
End
exercise
hyperlink
To
1
delete
Select
a
bookmark:
Insert
choose
on
see
the
Menu
bar
or
ribbon, then
this
Select
3
Delete
the
bookmark
the
name
bookmark
Exercise
2:
existing
document
and
click
Type
named
Using
a
blank
the
contains
hyperlinks
to
be
directed
to
access
be
versions
a
website
create
a
should
in
your
have
browser. To
access
to
the
online.
Word
Select
the
word
4
ClickInsert
and
and
a
Another
the
select
Hyperlink
the
format
of
web
paths, so
when
you
type
in
or
that
Enter
or
the
Enter
it
text. For
a
automatically
example, type
Word
Spacebar, the
document. As
website
becomes
link
that
looks
like
www.oup.com/caribbean
HERE.’
create
a
hyperlink
using
specic
text:
‘HERE’.
Menu
recent
option
le
Spacebar
hyperlink
press
bar
and
Open
a
blank
versions
of
Link
is
to
(or
from
document
and
type
the
sentence: ‘ is
Sentence
contains
a
Microsoft
the
right-click
Word
select
link
Word, you
other
press
following
Hyperlink. In
recognise
sentence
1
on
Word
document.
sentence: ‘ is
hyperlink
3
of
‘www.oup.com/caribbean’ in
following
a
in
creates
an
To
144
to
End.
a
click
how
Delete.
you
2
you
Bookmark.
one
Open
to
and
addresses
1
show
happen, you
Internet
Most
2
will
bookmarks.
on
Insert
the
to
a
website.’
tab.
text
2
Select
the
word
3
Select
Insert
‘website’.
and
on
the
Menu
bar
or
ribbon, then
Link).
click
Hyperlink
click
on
the
text
(or
Link). Alternatively, right-
and
click
Hyperlink
(or
Link).
6.2
4
On
5
In
the
the
left
Address
dialogue
6
Click
7
Hover
Ctrl
pane, select
area
box, type
Existing
in
the
File
lower
or Web
part
of
Page.
click
‘www.oup.com’.
+
pointer
Click
to
over
open
the
the
word
link
in
Select
‘website’. Press
your
Insert
Hyperlink
the
OK.
the
3
browser.
on
4
On
5
Select
6
Press
7
e
a
8
(or
the
the
on
Menu
bar
or
and
click
pane, select
bookmark
Hyperlink
‘P lace
named
a
web
ribbon, then
Link). Alternatively
, you
text
left
the
the
Designing
in
can
(or
is
page
click
right-
Link).
Document ’.
Top.
OK.
selected
text
in
the
paragraph
now
looks
like
hyperlink.
Use
the
Ctrl
word. Y
ou
to
the
Exercise
+
will
location
5:
Using
Click
option
notice
at
the
that
top
hyperlinks
on
the
of
to
the
cursor
the
be
hyper linked
has
moved
document.
directed
to
a
new
document
is
exercise
uses
the
Chapter6Ex
document.
Fig 6.9 Linking to a website
1
To
create
a
hyperlink
using
an
L ocate
rst
1
Open
by
or
a
blank
copying
using
options
and
the
in
Word
Insert
Select
the
3
Select
Insert
on
Hyperlink
click
on
On
In
the
the
and
into
add
the
selecting
an
image
the
left
the
(or
image
Menu
and
area
in
click
or
lower
Insert
click
on
of
the
On
the
left
4
For
the
new
hyperlink
Link).
or Web
pane, type
5
can
use
7
Click
6
Click
8
Hover
the
7
Hover
link
and
OK.
Click
to
open
the
link
the
in
a
then
select
the
image. Press
Ctrl
+
browser.
(or
Menu
click
le, type
the
or
ribbon, then
Link). Alternatively, right-
and
new
bar
Hyperlink
Create
the
New
name
(or
Link).
Document.
‘Exercise
5
–
document ’.
current
location
shown
under
Full
such as the desktop or your secondary storage device.
Select
over
and
path or click Change and browse to another location
Page.
‘ www.
Y
ou
the
pane, select
to
6
pointer
paragraph
paragraph.
text
3
and
(or
the
oup.com’.
the
on
one
ribbon
File
Select
the
Hyperlink
Hyperlink
Existing
the
second
in
click
Link). Alternatively, right-
pane, select
address
bar
2
word
document
image.
click
5
tab
one
and
Illustrations.
2
4
document
pasting
the
image:
the
to
a
the
option
to
Edit
the
new
document
later.
OK.
in
new
new
pointer
press
over
Ctrl
document
+
the
text
Click
named
to
you
be
Exercise
created
directed
5
–
the
to
hyperlink
document.
Exercise 4: Using hyperlinks to be directed to a bookmark
is
to
exercise
move
the
Open
the
document
2
L ocate
word
is
Chapter6Ex
to
a
similar
place
to
with
fth
the
at
least
a
six
the
same
bookmark.
document
paragraph
paragraph.
document
within
using
Chapter6Ex
the
in
the
cursor
document. It
1
uses
or
use
paragraphs
and
select
a
of
the
text.
rst
Fig 6.10 Creating a hyperlink to a new document
145
6
Web
page
design
Exercise
email
A
6:
quick
way
is
you
to
create
a
blank
4
email
may
create
typing
and
a
to
hyperlink
the
pressing
address
want
Copy
right
to
by
document
the
hyperlinks
message
message
if
Using
link
use
email
Enter
is
this
to
to
a
blank
address
or
be
the
in
in
new
some
in
text
5
option.
In
a
blank
Word
document, type
Support ’, then
select
Select
Insert
on
the
Menu
bar
the
Hyperlink
click
on
3
On
the
4
Type
the
left
(or
text
or
click
pane, select
Hyperlink
‘Email
address
of
5
Type
‘Exercise
6
Click
7
Hover
+
it
to
7:
or
Copy
a
in
In
2
Select
and
your
Figure
blank
the
named
Select
or
(or
on
on
your
the
Text
2
to
new
to
help
you
hyperlink
display
at
the
the
then
of
the
look
at
the
you
how
to
do
in
you
Edit
the
Even
More
to
line. en
text
to
look
at
open
the
the
steps
this.
top
step
of
hyper link
so
that
it
opens
a
new
4
the
and
change
dialogue
on
the
document
Chapter6NewEx. Y
ou
can
Exercise
5
with
Remove
the
to
help
you
box
second
named
click
press
hyperlink
‘More’ and
can
look
right-click
menu
item
in
Ctrl
with
a
the
hyperlink
right-click
option
to
on
the
Edit,
pop-up
you
‘ less’ and
the
how
menu
is
a
appears
Document
for
on
you
the
in
hyperlink
4
less’.
this.
that
First. Y
ou
to
remind
‘First ’ in
when
with
bookmark
do
named
Exercise
this. L ook
a
steps
to
create
bookmark
in
‘More
create
at
at
the
steps
in
this.
named
specied.
removing
the
look
the
have
left
Even
More. Use
use
tree
of
selected
pane.
Fig 6.10 Removing a hyperlink
14 6
can
move
More’.
message.
message
have
and
and
document, type
steps
that
is
text
hyperlink. e
remind
the
pasted
do
6.11.
can
bookmarks
the
hyper links, rst
word
to
new
to
Link).
‘mailto:’ appears
subject
email
copying
Word
to
over
new
the
the
from
the
Enter
the
address’.
alternatively
(notice
subject
word
1
jump
P lace
a
First. Y
ou
Exercise
will
open
Remove
1
3
pointer
image, and
or
shown
6’ as
Editing,
manage
text
hyperlink
text
automatically).
the
recipient
To
the
press
OK.
Click
Exercise
a
‘Even
the
itforcsec@gmail.com
front
line. Paste
and
to
Link). Alternatively, right-
and
email
lines
cursor
ribbon, then
7
your
the
the
text.
line
click
‘More’, move
‘Email
6
2
of
Exercise
Edit
to
Customer
word
‘Chapter6Ex’ document. Y
ou
the
1
end
create
word
Spacebar. However,
included
second
a
a
email
the
shown
in
Figure
6.11.
Creating
ere
users
are
W hile
pages
also
many
with
a
word
and
online
creating
web
their
processor
connect
recommends
can
them
a
few
via
available
and
create
a
web
basic
builders
and
such
to
assist
set
of
other
web
website
pages.
hyperlinks, the
web
webnode.com, weebly.com
Getting
builders
websites
web
syllabus
wix.com
may
contain
your
also
includes
and
text
builders
email
address
require
registration
of
the
and
password
before
along
with
an
initial
video;
website
website
and
you
can
start
to
create
any
you
could
lter
and
select
have
that
be
have
one
registered, you
you
for
Now
you
that
can
made
some
one
Adding
need
to
select
contain
information, while
graphics
text
and
or
videos. e
pictures
change
your
font
own
for
web
other
sample
you
to
builder
types, font
sizes
graphics, pictures
wish
to
create. For
personal
use
or
your
website
that
will
templates
be
used
to
for
web
you
create
have
the
chosen
options
overall
available
to
background
image. Added
of
Google
your
business, a
available
for
colour
or
features, such
Maps
contact
visitors
If
you
are
not
builder
to
your
preview
content.
using
to
sure
web
template,
browse
and
add
of
to
navigate
form
or
upload
as
the
to
the
location
subscription
to
receive
updated
the
order
or
builders
allow
you
drag-and-drop
add
a
logo, special
personalise
your
Finalising
your
the
page
information.
example, will
business?
selection, the
edit
the
content
you
use
to
add
your
may
web
pages, most
Once
options
background
are
your
for
for
designs
name
of
you
of
suitable
page. However, the
alignment;
integration
website
type
contact
random
web
are
user’s
a
pages. Once
or
that
6.3
page
6.12). Some
sections
contain
preview
or
web
the
(Fig
we b
star ted
Most
for
designs
columns, graphics
designs
as
page
concept
a
web
publishing
should
preview
slogan
or
social
your
rearrange
are
media
web
them
options
icons
to
pages.
your
the
to
of
options. Lastly, there
your
Before
layout
web
web
pages
pages
checklist
to
on
test
the
your
Internet, you
website:
Fig 6.12 Templates help you decide on a suitable design for your web page
147
6
◆
Web
page
Make
design
sure
colours
that
and
website
so
and
all
on
are
the
headings, links, images, font
complement
not
too
dark
the
or
purpose
too
small
of
content
your
easily?
viewing
Is
the
design
suitable
for
this
small
window?
when
Once
you
are
satised
that
all
links
and
web
pages
are
previewed.
functioning, you
◆
Click
you
◆
on
to
the
Check
they
each
hyper link
correct
that
any
web
to
make
sure
that
it
Most
or
sounds
play
as
should.
◆
Check
that
◆
Check
for
email
addresses
are
valid
pages. ese
are
and
pages
web
builders
use
website. However, you
and
orphan
ready
to
publish
your
website.
directs
page.
animations, videos
are
features
as
a
single
can
click
to
continue
to
publish
update
your
content
necessar y.
working.
that
Questions
contain
to
the
no
links
back
to
the
previous
homepage. Sometimes
the
web
only
page
way
to
or
go
1
to
What
do
before
the
previous
does
not
page
always
is
to
use
the
Back
button, but
Check
that
2
work.
the
page
titles
on
each
web
page
and
not
too
wordy
. Page
titles
are
List
some
of
a
they
browser
◆
Since
appear
in
search
engine
results
applications
require
website?
the
features
that
are
available
for
Explain
why
you
should
test
your
website
before
important,
and
it.
in
4
Describe
5
What
three
checks
to
test
a
website.
bookmarks.
you
do
not
know
how
your
visitors
will
website, you
should
also
preview
it
is
the
name
of
the
web
page
that
contains
access
no
your
a
website.
publishing
since
create
are
3
sensible
web-building
can
this
creating
◆
most
you
using
links
back
to
the
previous
web
page
or
to
the
a
homepage?
mobile
device
Practical
Exercise
1
8:
L ocate
to
see
Creating
and
required
Type
the
a
open
in
demonstrates
2
it
looks. Can
exercises
WordPad. Note
not
how
static
using
web
the
how
writing
syllabus
it
following
a
view
the
notes
program
page
Notepad, or
that
you
3
the
alternatively
HTML
but
this
code
as
<head>
A
title
goes
here
<h1>
is
is
a
page.
</body>
</html>
148
Browse
line
page
of
that
be
should
change
viewed
7
as
a
sure
to
can
note
le. en
save
it
on
EXACTLY
minimise
this
the
the
see
the
le. en
le.
your
the
blue
MyPage.html
in
text
in
the
browser.
MyPage.html
window, and
‘text=“ blue” ’ to
green. Save
the
again.
Now
e
will
the
locate
Now, maximise
</h1>
text
to
6
le
web
make
saved
Y
ou
</title>
bgcolor=“white” text=“ blue”>
A
you
MyPage.html. Y
ou
but
5
</head>
<body
desktop
as
double-click
possible.
<html>
<title>
le
window.
exercise
4
accurately
the
where
is
works.
as
Save
maximise
colour
the
browser
of
the
text
changing
the
colour
and
should
refresh
change
the
in
page.
your
browser.
web
8
Tr y
saving
the
browser
html
after
le
each
each
to
orange, red
time, and
change.
and
violet,
refreshing
the
6.3
Creating
a
web
page
Fig 6.12 Creating a static web page
Practical
exercises
using
an
1
online
Exercise
web
9:
Use
a
builder
free
web
Select
for
builder
to
create
web
Select
one
of
the
recommended
free
in
the
syllabus
and
L ook
at
the
and
at
create
least
two
a
on
sketch
levels
of
a
concept
of
a
detail
in
complete
the
Select
one
of
the
recommended
free
website
free
and, if
you
have
not
done
so
already,
registration.
Create
in
and
options. Decide
structure.
then
2
the
website
builders
online
of
website
2
builders
your
homepage
pages
the
1
one
the
a
basic
web
website
page
structure
to
using
structure
one
develop
of
an
the
idea
in
Figure
complete
the
free
online
registration.
6.3.
3
Give
the
4
Select
5
Add
6
Create
website
a
suitable
name.
rectangles
for
your
a
design
appropriate
to
the
business
idea.
web
at
least
two
graphics, pictures
or
videos.
page.
3
Include
pictures
and
text
to
enhance
the
look
a
hyperlink
to
link
same
page
relevant
text
to
of
content:
your
4
web
Ensure
the
page.
that
the
fonts
and
colours
are
suitable
10:
Using
a
web
builder
to
create
a
wish
to
following
create
business
a
website
based
on
one
of
the
ideas:
b
in
another
c
to
an
web
web
hair
email
Preview
the
evaluate
for
displays
8
a
the
page
address.
website
7
◆
in
topic.
Exercise
Y
ou
a
for
O btain
website
user
and
use
friend liness
the
checklist
and
that
the
to
content
eectively.
permission
from
your
instructor
before
salon
publishing
◆
online
◆
gardening.
the
website.
gaming
149
6
End
Multiple
1
2
An
of
choice
example
of
a
chapter
exam-style
questions
questions
browser
is:
7
The
header
of
a
docs
a
summar y
b
forms
b
a
c
sheets
c
major
d
Chrome.
d
copyright,
An
e -commerce
a
website:
a
is
b
receives
standalone
c
stores
resumes
d
stores
ar ticles,
online
web
8
page
payments
and
web
por tfolios
pages
and
for
its
users
other
logo
or
a
web
page
usually
contains:
information
company
sections
of
legal
name
the
or
web
privacy
page
notices.
A bookmark can connect to any of the following, except:
a
HTML
b
an
code
c
another
web
d
another
position
email
message
page,
le
or
within
document
the
web
page.
content.
9
3
Browsers
let
you
__________
HTML
les.
5
an
a
email
edit
b
titles
b
view
c
links
c
create
d
major
d
delete.
The
least
commonly
used
browser
is:
The
on
the
following
ser vices
for
Wix
b
Opera
b
Word
c
Firefox
c
Weebly
d
Navigator.
d
Webnote.
is
a
visitor
called
would
have
taken
to
access
a
web
Shor t
are
answer
there
are
no:
to
all
other
the
web
web
pages
page.
examples
of
free
online
web
websites, except:
questions
Nathan
wants
to
use
a
special
keyboard
to
play
list
music
b
web
c
hyperlink
d
breadcrumb.
at
State
play
b
A
current
page
in
the
name
of
a
special
keyboard
that
can
music.
records
a
video
of
him
playing
music
on
keyboard.
path Home / Water / Bottled /
i
Reusable
the
friend
the
The
weddings.
page
a
Explain
what
type
of
input
and
output
is:
devices
a
Home
b
Water
ii
State
c
Bottled
d
Reusable.
c
Nathan
his
i
should
name
these
decides
of
use
a
for
the
website
recording.
where
users
can
videos.
to
use
a
web
page
to
adver tise
music.
Describe
most
ii
he
the
watch
15 0
means
a:
11
a
page
page
on
creating
a
path
web
sections
Edge
The
web
connecting
a
page
6
orphan
addresses
a
10
4
Usually,
the
categor y
suitable
for
him
of
to
web
page
that
is
design.
Give one free online website that he could use.
6
12
He
wants
Music,
of
him
per
to
with
name
links
his
to
playing. The
hour
and
website Nathan’s Speciality
samples
main
book ing
of
his
content
form,
music
and
provides
along
with
i
videos
the
costs
copyright
Sketch
a
sections
b
Nathan
to
Day
iv
Date
v
layout
with
of
the
designed
make
Type
iii
information.
a
Email
ii
the
state
page,
showing
an
online
13
(Fig
the
form
6.13).
name
of
For
a
for
each
of
chapter
exam-style
questions
address
of
par ty
of
par ty
Submit.
Write
an
example
children’s
clients
suitable
of
the
information.
book ings
following,
web
End
par ty
of
a
book ing
in
the
form
for
a
on Wednesday.
the
content
14
Explain
of
control:
15
his
Nathan
it,
but
this
16
what
music
A
Nathan
to
clicks
there
is
the
on
no
a
needs
web
to
do
to
transfer
videos
page.
video
sound.
on
the
Explain
web
a
page
possible
to
view
cause
of
problem.
few
weeks
website
type
of
Nathan
later,
Nathan
adver tised
computer
and
his
by
sees
his
someone
system
videos
else.
misuse
has
on
another
Describe
what
aected
videos.
Fig 6.13
151
A
PT
E
C
H
7
SPREADSHEET S
7.1
Introduction
Spreadsheets
when
you
results
used
in
in
are
want
a
to
particularly
work
with
nance-related
advanced
statements
features
modelling
that
tasks
such
are
as
useful
spreadsheets
good
choice
numbers
graphs. Spreadsheets
payroll, nancial
to
are
such
and
and
therefore
as
software
the
widely
preparing
invoices. ey
columns
select
display
‘what-if ’ analyses
in
of
of
cells. By
individual
single
cell
clicking
cells
B4
or
has
a
with
range
been
the
of
mouse, you
cells. In
this
can
case,
selected.
budgets,
also
and
have
forecast
business.
Fig 7.2 A spreadsheet is a grid of cells organised in rows and columns
Fig 7.3 Each cell has a unique identier. In this case, cell B4 has been selected
An
extremely
the
ability
an
equation
T
o
spreadsheet
is
a
grid
of
cells
organised
in
rows
enter
(Fig
7.2). Each
column
is
given
a
row
a
number. is
means
that
each
cell
has
reference
identied
by
the
column
B
and
will
152
row
see
example, B4
4. Look
how
the
at
the
species
the
example
in
spreadsheet
is
cell
letter
in
Figure
organised
you
the
wish
formula
cells. A
spreadsheet
to
into
sign. Formulae
another. For
and
a
take
on
cell, you
formula
what
any
is
actions
spreadsheet
need
to
is
type
data.
the
often
calculate
how
one
cell
relates
example, to
add
together
the
values
in
A1
and
A2, and
show
the
result
in
cell
B1, you
row
would
number. For
tells
into
spreadsheets
a
cells
unique
a
formulae
of
letter, and
to
each
that
feature
and
equals
columns
enter
(calculations)
Fig 7.1 Samples of how spreadsheets can be used
A
to
powerful
type
in
cell
beauty
of
a
B1
the
formula
=A1+A2
(Fig
7.4).
column
7.3. Y
ou
into
rows
and
e
entered
only
spreadsheet
once
into
a
is
that
cell. In
a
the
formula
example
needs
just
to
be
given,
7.1
the
formula
cells
the
A1
was
and
entered
A2
formula. In
can
into
easily
fact, the
the
be
cell
B1. e
changed
formula
can
values
without
in
aecting
having
the
result. For
is
changed
to
100
and
the
value
allow
automatically
you
the
value
in
new
result
–
900
–
will
in
cell
A2
to
entering
B1. By
simply
automatically
changing
the
recalculate
perform
the
result,
‘what-if ’ calculations.
a
formula, you
appear
values
in
tell
the
spreadsheet
calculation
to
perform, for
example
adding,
800,
and
subtracting
by
using
in
operators
cell
spreadsheets
cell
multiplying, dividing
the
to
to
automatically
example, if
what
A1
program
spreadsheets
W hen
recalculate
the
Introduction
such
as
plus
(+), minus
(−)
and
so
on.
cells, and
Fig 7.4 A formula is an equation that tells the spreadsheet what actions (calculations) you wish to take on any spreadsheet data. In this example, by entering the
formula =A1+A2 into cell B1, the result (300) will automatically be calculated
Questions
1
List
three
examples
to
explain
how
spreadsheets
are
used.
2
a
add
(the
b
multiply
c
divide
d
subtract
contents
cell
cell
B4
C4
by
by
of )
cells
B4
and
C4
2
3
Copy and ll in the blanks in the following sentences:
a
A
is
allows
into
b
In
a
a
D12
grid
and
application
numbers
of
and
rectangular
spreadsheet,
letter,
c
text,
an
formulae
cell
be
cell
B4
from
cell
C4.
that
entered
4
Identify what each label in Figure 7.5 is showing.
cells.
is
a
the
to
each
each
species
program
given
a
number.
in
D
and
12.
d
To
add
you
e
To
subtract
you
f
together
would
would
type
the
calculations
g
3
If
A
33
cell
popular
was
C4,
the
allow
in
in
A2
into
A1
and
to
A2,
.
the
value
formula
you
in
A1,
.
a
per form
b
modelling.
spreadsheet
the
cells
from
or
entered
write
values
formula
value
type
Spreadsheets
the
the
cell
program
B4
formulae
and
that
3
is
.
was
would
entered
be
into
c
usedto:
Fig 7.5 Diagram with labels for completion
153
7.2
People
Common
generally
use
the
spreadsheet
terms
‘spreadsheet ’ and
‘worksheet ’ interchangeably. However, to
with
Microsoft
and
other
features
publishers
we
be
consistent
shall
Y
ou
can
sure
the
term
sheet
‘worksheet ’ to
where
you
place
mean
your
the
or
le, such
Most
of
of
the
as
the
mean
the
calculations, and
type
of
Excel
type
over
the
data
does
computer
screen
chart
is
devoted
can
to
contain
sheets. We
worksheets
Excel
extend
or
It
has
worksheet
down
worksheet,
and
the
16,384
chart
has
the
lettered
to
A
that
to
the
minimum
of
by
sheets
the
Excel
contents. Note:
the
old
have
to
be
deleted
rst;
it
is
replaced
on
it
to
modify
its
contents
the
one
display
or
shall
refer
last
a
million
numbered
extend
Z,
of
c an
be
amount
of
Delete
key
to
erase
it
and
type
in
new
more
to
references
‘sheets’ to
AA
to
rows
AZ,
A
that
from
across
column.
one
the
information.
references
row
row
are
the
sheet,
and
combination
1.
added. is
to
BZ,
workbook
is
memor y
is
example, the
of
column
A1. Examples
Z25, BC304
and
of
upper-left
letter
other
cell
cell
of
references
a
are
GG100.
the
BA
an
number. For
worksheet
Types
of
data
c an
are
two
types
of
data:
labels
and
values. Labels
unlimited
non-numeric
data
that
a
spreadsheet
will
not
use
restr icted
available
to
calculations, such
as
a
person’s
name
or
an
address.
store
Values
the
current
data
press
in
onl y
new
double-click
are
number
cell’s
not
◆
ere
a
ways. First, make
either:
sheets.
over
worksheet,
columns
continuing
contain
the
◆
and
An
various
application
Cell
represent
in
term
Cell
or
cell
Excel.
workbook, which
worksheets
a
active. en
row-and-column
by
‘spreadsheet ’ to
edit
is
use
◆
the
also
cell
are
numeric
data
which
can
be
calculated.
le.
Cells
Active
e
active
with
is
cell
a
darker
located
in
worksheet
and
cell
in
border
the
by
you
Excel
has
have
document
so
you
window
can
worksheet. Y
ou
using
horizontal
Once
the
the
scroll
arrow
where
can
keys
move
or
with
highlighted
the
cursor
around
the
the
vertical
bars.
entered
several
tell
is
ways
data
to
into
the
complete
a
active
cell
cell,
entr y. ese
Fig 7.6 Labels and values in a spreadsheet
inc lude:
Labels
◆
press
Enter
◆
press
Tab
◆
press
Shift
◆
press
an
In
+
arrow
◆
click
another
◆
click
the
154
a
Tab
button
letter
any
is
data
dened
‘Lastname’. Note
key
cell
cell
Enter
Excel
on
the
formula
bar.
and
cannot
that
as
a
that
be
begins
with
label, for
labels
included
letter
example
are
in
a
or
‘Y
ear’ or
left-aligned
numeric
includes
within
the
calculations.
7.2
e
Values
Merge
and
Center
headings. Select
If
the
rst
thing
you
type
in
a
cell
is
a
it
to
be
a
value. Note
that
values
are
in
cells
and
are
used
in
calculations. For
sum
of
money
a
telephone
would
be
considered
a
would
not
be
considered
a
If
this
you
type
do
treated
not
as
a
of
want
a
is
prevent
the
the
cell
identication
telephone
number
entr y
can
of
used
numeric
the
number
calculation. Examples
2018), an
rarely
cell’s
value, then
apostrophe, or
will
data
be
text
as
must
are
(such
to
begin
for
used
format
A1
through
then
click
text
on
in
the
A1
Merge
will
&
Center
appear
to
be
icon
centred
the
cells, although
it
is
still
located
in
cell
A1
7.8). For
this
feature
to
work
correctly, the
heading
be
in
the
left-most
cell
in
the
blockrange.
calculations.
contents
being
number
(such
in
formatted
from
example
centring
value
must
since
cells, for
for
value. However,
(Fig
number
useful
example,
across
a
several
is
features
right-
(Fig7.7). e
aligned
option
spreadsheet
number, Excel
C1, and
considers
Common
in
a
as
be
with
an
text. is
a
numeric
year
(such
826045)
or
as
a
111-2525).
Fig 7.7 Merge and Center is a useful spreadsheet feature
Default
displays
Default
means
that
automatically, unless
other wise, numeric
side
in
of
the
the
left
you
a
can
enter
default
side
and
so
be
of
always
for
on, by
data
values
directly
31, 2018
format
displayed
(or
text)
specify
in
is
the
right
displayed
cells.
entered
Jan
formatted
is
cell. Non-numeric
Formatting
Dates
data
you
such
in
as
decimal
a
and
into
cell, it
dates
cells. For
will
be
example, if
formatted
31-Jan-18. Values
can
also
placement, commas, dollar
selecting
Cells
from
the
to
Fig 7.8 The text is still located in cell A1
be
signs
Formatmenu.
Cut,
e
copy
Cut, Copy
consistently
Text
Text
alignment
alignment
or
spreadsheet. e
command
justication
Formatting
is
also
toolbar
common
includes
in
a
four
that
a
Align
L eft
◆
Align
Right
space
comments
Center
◆
Merge
e
and
Center.
left, centre
cell. Y
ou
block
of
can
or
change
cells. If
cell, then
right
the
changing
Column
options
alignment
text
the
or
align
on
a
number
alignment
data
single
is
has
as
within
cell
wide
no
or
as
eect.
the
a
the
By
but
a
is
the
on
that
column
has
then
be
that
holds
moved
Excel
and
and
their
are
row
in
width
width
hidden. Rows
clipboard. e
temporarily
columns
a
information
Cut
and
clipboard
places
is
information.
(pasted)
copies
the
resulting
to
entire
values,
formats.
widths
a
operate
applications. e
selected
the
may
cell
contain
commands
Microsoft
formulae
and
default, all
can
Paste
location. Note
cell, including
◆
all
removes
information
another
◆
in
paste
and
information
storage
is
buttons:
and
of
Excel
of
0
heights
up
to
are
8.43
255
12.75
wide,
characters. If
(zero), then
typically
spaces
the
points
column
high
155
7
Spreadsheets
(approximately
right
as
size
409
(zero)
your
text
only
6
be
long
cm), which
font. A
will
and
the
few
a
a
as
next
letters
is
can
need
value
is
the
◆
Drag
high
◆
Double-click
just
be
height
often
heights. If
displayed
rst
row
inches), but
row
will
the
0.4
row. Y
ou
and
too
or
default
the
data
is
inch
(almost
widths
data, then
be
the
hide
cell, your
If
t
points
will
column
a
to
1/6
as
of
to
0
big
for
t
◆
of
also
your
contains
text
the
largest
height. e
◆
From
will
the
row
border
column’s
a
the
a
dierent
border
column
to
is
size.
AutoFit
widened
the
to
entr y.
row ’s
row
right
means
cell
to
is
bottom
adjusted
Format
menu
border
to
the
choose
to
adjust
largest
the
font
row
size.
Row, Height
or
Column, W idth.
visible.
If
ere
are
several
ways
of
changing
the
size
of
the
the
Excel
(Fig
mouse
is
used
to
change
the
column
width
cells
or
in
or
a
Double-click
‘#####’ (Fig7.9).
cell
column
column. AutoFit
change
too
a
row
height, a
screen
tip
appears
that
displays
the
7.10):
current
size.
Formulae
W hen
the
a
cell
Bar. If
formula
and
a
the
To
be
is
functions
created, the
formula
number
automatically
will
and
used
is
in
displayed
a
recalculate
result
formula
the
is
in
displayed
the
Formula
changes, Excel
formula
and
in
a
new
will
result
displayed.
start
a
addresses
formula, enter
of
arithmetic
operation
the
cells
operators
to
use
in
to
an
be
used
(Table
the
equals
sign. en
in
7.1)
the
enter
the
calculation. e
specify
the
arithmetic
calculation.
Table 7.1 Common arithmetic operators used in formulae
Fig 7.9 In this illustration, the text in cell A2 is too long while the value
8500112256 is too big for the cell
Operator
Meaning
Example
+
Add
=A1+A2
−
Subtract
=A1−A2
*
Multiply
=A1*A2
/
Divide
=A1/A2
%
Percentage
There
One
to
the
enter
A
formula
use
the
mouse
Formulae
Paste
A
can
can
be
to
keyed
point
also
be
are
way
the
copied
as
value
ways
follows:
of
cell
to
to
A1,
do
add
you
would
into
cells
by
a
you
using
cell, or
want
the
you
to
Copy
is
dened
as
a
built-in
and
mathematical
Fig 7.10 Adjusting the width of a cell to t its contents
formula
156
included
in
Excel. Functions
are
used
can
include.
buttons.
function
this.
5%
=A5*(1+5%)
directly
to
different
is
for
7.2
common
Four
calculations
common
SUM:
◆
AVERAGE:
automatically
divides
MAX:
by
business
functions
◆
◆
in
adds
the
used
personal
spreadsheet
features
use.
are:
totals
the
number
to
and
Common
a
column
values
of
in
cells
determine
the
the
in
or
row
range
the
and
range
largest
value
in
a
range
◆
MI N:
used
to
determine
the
smallest
value
in
a
range.
AutoFill
W hen
other
e
you
cells, then
AutoFill
including
row
enter
or
such
as
formula
the
that
AutoF ill
command
with
to
instructs
adjacent
text
months
or
and
you
will
Excel
from
to
copy
help
to
one
cells. Y
ou
numbers
actual
need
feature
formulae, functions
column
AutoFill
a
you.
copy
cells,
selected
may
without
also
to
cell,
use
formulae,
numbers. Excel’s
AutoF ill
Fig 7.12 Place your mouse pointer on the Fill Handle at the lower right corner
will
ll
a
block
depending
are
the
on
of
cells
what
is
with
either
located
in
numbers
the
rst
or
text
of the cell and drag down to auto ll the formula to the remainder of thecells
cell. Here
Cell
steps:
ranges
Often
1
Click
2
Move
on
the
cell
with
the
more
the
mouse
to
the
bottom
right
corner
of
pointer
should
change
to
a
thin
in
Excel, you
may
need
to
select
than
one
cell. A
range
is
a
group
of
cells
that
a
rectangle
on
the
screen
(Fig
7.13). In
Excel
crosshair
there
(Fig
working
the
form
cell. e
while
data.
are
several
ways
to
select
a
range
using
the
7.11).
mouse:
3
Click
(Fig
W hen
and
drag
the
mouse
to
ll
the
other
cells
7.12).
working
with
numbers, however, you
◆
Drag
◆
Make
two
cells
of
data
so
that
Excel
knows
much
the
numbers
should
be
rst
cell
of
cells.
a
range
active, hold
down
the
key
and
click
the
last
cell
needed
to
complete
by
the
how
the
adjacent
must
Shift
enter
across
increased
range.
each
◆
Use
Edit/Select
All
or
Ctrl
+
A
if
you
need
to
select
time.
ever ything
◆
Click
entire
◆
Click
an
Excel
the
◆
on
within
row
a
worksheet.
headings
(row
number)
to
select
an
row.
on
entire
also
column
headings
(column
letter)
to
select
column.
has
several
ways
to
select
cell
ranges
using
keyboard:
Shift
+
ar row
key :
selects
the
active
cell
and
moves
Fig 7.11 The Fill Handle is at the lower right corner of the cell
in
the
direction
of
the
arrow
157
7
Spreadsheets
a
name
give
that
ranges
range, you
the
name
Here
are
means
something
meaningful
can
select
it
rules
to
to
you, so
names. Once
by
clicking
you
you
on
should
have
the
named
arrow
next
a
to
box.
a
few
follow
when
◆
Range
names
must
◆
Range
names
cannot
have
cannot
contain
begin
with
the
a
naming
a
range:
letter.
same
name
as
a
cell
address.
◆
Range
rst
names
letters, an
underscore
or
spaces. Use
a
fullstop
to
uppercase
separate
words.
◆
Range
names
as
hyphens, dollar
or
number
Fig 7.14 If you have to use a
adjacent cells, click on the rst
range often, you should use the
cell and drag to highlight the
name box to name the range
other cells
of data
Shift
◆
Ctrl
+
+
Spacebar :
Spacebar:
selects
selects
the
the
Keep
in
is
identication. Use
for
row
or
column.
names
and
scroll
remain
W hen
you
wish
to
select
cells
that
are
not
is
just
as
Press
◆
Click
and
hold
one
or
the
more
column
letter.
Release
the
Ctrl
mind
Y
our
Ctrl
key.
the
required
cells, or
row
number
or
that
are
rows
range
produces
upper-left
address
of
the
to
use
a
range
click
in
the
name
cell
by
a
an
address
so
address
and
colon. In
selected
cells
often, you
box, type
when
allow
e
idea
of
worksheet
158
using
easier
a
is
the
Figure
lower-right
7.14
(A2:A7). If
should
name
meaningful
7.14, and
range
to
in
a
idea
less
of
to
the
than
using
names
that
data
spreadsheet
they
you
remain
scroll
when
on
around
you
columns
you
always
and
or
a
256
characters
range
are
they
names
simple, yet
represent.
can
the
a
be
locked
screen
anddo
sheet. Locked
perform
vertical
(xed
rows
scrolling,
remainstationar y
when
you
scrolling. Locking
to
place
titles
in
both
your
rows
and
spreadsheet
displayed.
in
column
the
the
press
names
work
is
to
with. Just
must
xed
rows
perform
columns
cell
column
and
in
is
a
before
xed
any
columns
you
row
selected, just
or
data
x
cannot
them. If
column, the
as
if
you
of
data
be
as
you
give
these
you
tr y
entire
selected
a
to
row
row
or
heading.
a
hor izontal
set
Select
the
row
directly
beneath
of
a
the
le
the
section
as
want
to
remain
visible
(Fig
Enter
areas
in
range:
name, such
make
editing
you
you
Figure
that
contained
select
which
◆
‘ language’ in
the
related
horizontal
Freezing
have
contain
key.
address, separated
range
or
locked
columns
ranges
selected
includes
cell
cell
that
columns
edited. Y
ou
Naming
signs, ampersands
simple:
Data
◆
such
adjacent, the
perform
◆
should
stationar y
whereas
procedure
cent
characters
locking
‘frozen’)
not
special
signs.
Range
Title
current
current
signs, per
◆
Rows
◆
contain
◆
recognisable
Fig 7.13 To select a range of
cannot
◆
Select
V iew
◆
Select
Freeze
on
the
Menu
Panes.
bar.
7.15).
that
7.2
◆
Select
Freeze
Top
Row
to
lock
the
rst
Common
spreadsheet
features
row
only.
Freezing
◆
a
Select
ver tical
the
section
set
column
that
you
of
immediately
want
◆
Select
V iew
◆
Select
Freeze
Panes.
◆
Select
Freeze
First
Freezing
both
on
data
the
to
to
remain
Menu
the
right
of
the
visible.
bar.
Column.
hor izontal
and
ver tical
and
to
data
Fig 7.15 Select the row below the row you want to freeze
◆
Select
the
section
cell
that
beneath
you
want
◆
Select
V iew
◆
Select
Freeze
Panes.
◆
Select
Freeze
Panes
Removing
on
frozen
the
to
the
remain
Menu
again
right
of
the
visible.
bar.
from
the
list.
headings
◆
Select
V iew
◆
Select
Unfreeze
on
the
Menu
bar.
Panes.
Fig. 7.16 The column headings now stay at the top even when you scroll
through the rest of the data
Questions
1
Explain
the
work book,
2
For
similarity
a
or
dierences
worksheet
each
of
the
function
or
a
and
following,
a
between
a
spreadsheet.
state
whether
it
is
a
formula:
=SUM(B1:G4)
=E3*5%
=MAX(E4:E6)
=(E6-E4)*10
=MIN(C1:C10)
Fig 7.17 Spreadsheet for Question 6
=AVERAGE(B1:C9)
=H2/3
3
Explain
why
it
is
useful
to
name
a
range
of
data.
g
Write the name of the appropriate function for cell E7.
h
State
to
4
the
name
of
the
function
that
should
be
used
calculate:
Answer the following questions based on information
i
for
dance
lessons
a
Identify
as
shown
in
Figure
i
the
name
of
the
feature
used
in
row
Identify
c
State
the
the
d
State
a
e
State
the
i
f
cell
Write
the
active
letter
row
for
number
column
that
justication
dance
of
lessons.
cells
that
does
used
ii
range
limit
ii
the
highest
cost.
Explain
the
why
gure
cells
and
F6
and
F7
describe
are
how
displayed
it
can
be
as
shown
corrected.
cell.
a
A5
the
lowest
1.
in
b
the
7.17.
contains
not
contain
a
a
value.
value.
in:
cell
that
D6.
contain
the
times
for
j
State
can
whether
be
each
of
the
following
instructions
iv
freeze
row
2
v
freeze
row
2
achieved:
i
freeze
row
ii
freeze
column
iii
freeze
row
column
1
1
A
and
and
column
B.
A
159
7.3
As
with
Developing
other
computer
a
simple
applications, the
best
spreadsheet
results
come
◆
Order
means
anything
raised
to
the
power
of
a
2
from
thinking
about
worksheet, ask
the
yourself
task
the
in
hand. When
following
four
planning
a
◆
questions:
number, such
as
Division
Multiplication
the
1
W hat
is
the
goal
of
2
W hat
are
3
W hat
data
4
W hat
calculations
the
desired
is
desired
needed
results
to
are
order
Addition
calculate
needed
the
to
results
produce
is
and
to
be
carried
as
they
up
just
one
quickly
not
to
e
get
will
creator
four
many
of
form
see
created
author
of
questions
will
and
never
one
it
such
times, but
is
some
questions
Another
the
and
important. No
worksheet
the
user
other
it
to
solve
than
will
above, just
only
take
its
a
a
layout
appear
in
the
formula.
is
the
in
be
a
the
last
two
operations
be
time
of
used
still
will
in
order
from
left
to
right
in
the
formula.
a
spreadsheet, formulae
based
on
are
used
mathematical
to
calculate
creating
equations
formulae, you
may
that
you
use:
◆
actual
◆
cell
◆
a
values
(=7*5)
addresses
(=C4+D4+B25)
the
combination
of
the
two
(=C17*8).
To
enter
a
formula:
way.
used
it. So
the
of
calculated
is
consider
using
appearance
are
once.
be
with
out. Again, these
set
structured
that
will
is
creator
would
one
more
and
are
problem
appearance
only
not
creator
little
again. It
the
spreadsheet
worksheet
the
used
result, but
since
a
they
Subtraction
appear
create. W hen
for
as
the
In
spreadsheet
right
next, in
(inputs)?
answers
a
to
calculated
(outputs)?
results?
Sometimes
lef t
are
worksheet?
◆
the
and
2
above
1
Click
2
Press
3
Enter
4
Press
the
the
cell
where
equals
the
you
want
to
insert
the
formula.
sign.
formula.
Enter
the
Functions
spreadsheet
will
probably
be
better.
Functions
e
nal
categor y
of
spreadsheet
is
one
set
up
structure
someone
above
else. More
time
questions, and
the
must
be
taken
spreadsheet
to
will
answer
and
good
documentation. Since
need
other
good
the
have
access
worksheet
times
it
so
until
may
that
it
is
to
this
have
they
spreadsheet, the
to
can
meet
make
with
these
users
and
of
or
many
=
have
many
An
do
formulae
operators
in
a
formula, it
to
follow
the
rules
for
the
order
have
probably
‘BODMAS’
stands
for
in
the
come
across
maths. e
the
rst
a
Brackets
of
part
16 0
of
formula
the
function
arguments
(for
name,
most
an
open
bracket,
functions)
and
a
bracket.
use
is
mostly
a
cell
reference, a
(number). ere
arguments, but
brackets. e
you
number
are
some
still
of
range
of
functions
need
the
arguments
open
will
cells
that
and
var y
in
functions. e
frequently
used
following
examples
illustrate
functions.
mnemonic
letter
take
of
each
precedence
computer
in
is:
word
AVERAGE
(parentheses)
the
or
operators.
operator:
operator. e
syntax
is
over
AVERAGE
must
brackets
calculate
rst.
function
calculates
the
average
any
range
other
sign,
constant
not
e
◆
function
argument
some
Y
ou
a
more
dierent
important
Excel. e
function name (one or more arguments)
closed
you
of
approve
or
If
part
the
nalised.
Ar ithmetic
powerful
people
creator
suggestions
of
equal
closed
will
a
the
one
design
are
for
of
cells.
the
e
syntax
is
=AVERAGE( range
of
cells)
of
a
7.3
As
an
example, if
B5, B6
each
and
day
B7
for
calculate
a
your
you
how
were
much
week, this
average
to
enter
into
cells
money
you
spend
function
can
be
daily
B3, B4,
on
used
lunch
$10. Notice
$10
because
donating
to
that
the
exactly
only
Developing
two
function
students
did
not
a
simple
donated
include
spreadsheet
less
the
than
option
for
$10.
spending.
Fig 7.19 Using the COUNT function to determine how many
collections were made
Fig 7.18 Using the Average function to estimate daily spending
COUNTA
e
and
syntax
is
COUNT
=COUNT
A( range
=COUNT(range
ese
functions
Notice
while
such
that
of
text
COUNT
or
cells)
and
cells)
count
COUNT
A
as
of
the
number
counts
counts
the
cells
in
a
range.
numbers
in
a
range
numbers
non-blank
cells
in
of
but
the
also
other
data
range.
Fig 7.20 Using the COUNTA function to determine how many classmates
Suppose
you
and
some
members
of
your
class
volunteered
volunteered
to
collect
collected
money
into
COUNT
received
which
blank
cells
(Fig
charity
. Y
ou
C1
function
to
to
may
the
count
is
number
contain
enter
C4. en
7.19). ere
counts
or
for
text
the
also
of
you
the
in
contributions
can
number
cells
(Fig
the
of
use
the
contributions
COUNT
A
a
range
that
function
are
not
7.20).
COUNTIF
e
is
syntax
is
function
=COUNTIF( range
counts
the
number
of
of
cells,
cells
criteria)
that
meet
given
criteria.
In
Figure
7.21, the
function
=COUNTIF(B3:B6,“<10”)
Fig 7.21 The COUNTIF function uses given criteria when counting within a
is
used
to
count
how
many
classmates
donated
less
than
range of data
161
7
Spreadsheets
DATE
e
syntax
is
a
MAX
is
=DATE( year, month, day)
function
date. For
12, cell
example, if
A2
contained
produces
combines
contained
the
cell
the
number
5/12/2020
values
A1
in
three
contained
number
2020, then
or
5
Tuesday, May
Saturday, December
cell
containing
date
as
Apart
is
you
from
the
=TODA
Y()
space
or
the
want
text
display
DATE
returns
between
is
the
cell
e
MAX
value
number
A3
produces
sure
in
Using
largest
a
the
is
=MAX( range
function
range
of
student
donation
of
produces
cells)
the
largest
or
maximum
cells.
volunteer
can
be
example
found
by
in
Figure
entering
7.19, the
=MAX(B3:B6)
formatted
12/5/2020
that
to
the
display
the
it.
function, another
the
the
produce
syntax
12, 2020.
5, 2020. Make
function
to
and
to
=DATE(A3,A2,A1)
Alternatively, =DATE(A3,A1,A2)
or
cells
e
current
useful
date. Note
brackets
in
this
function
there
is
no
function.
IF
Fig 7.23 The MAX function nds the largest donation
e
syntax
is
=IF(logical
test,
value
if
true,
value
if
false)
MIN
is
on
of
function
whether
two
a
allows
you
condition
to
is
make
met
or
a
choice
not
and
depending
returns
one
e
syntax
complement
produces
Suppose
you
have
than
$10
decided
that
if
you
spend
an
lunch
determine
or
of
cells)
make
the
on
next
whether
your
own
lunch, then
week. e
you
IF
should
you
should
statement
continue
to
make
is
MAX
smallest
or
function, the
minimum
MIN
value
in
a
function
range
of
cells.
7.24
shows
the
least
amount
of
money
donated.
your
useful
buy
the
the
average
Figure
more
own
=MIN( range
values.
T
o
or
is
to
lunch
lunch.
Fig 7.24 The MIN function nds the smallest donation
PMT
e
syntax
loan
e
to
is
rate,
number
of
payments,
amount)
PMT
function
calculate
number
the
=PMT( interest
of
the
interest
a
nancial
payment
payments
repayments
yearly
is
are
rate
and
made
and
for
a
loan
based
constant
on
the
a
function
a
on
interest
monthly
number
that
of
a
is
used
specic
rate. If
basis, then
payments
the
need
Fig 7.22 illustrates how the IF statement determines the outcome if the average
amount spent on lunch is more than $10
162
to
be
converted
to
frequency
of
payment. To
do
so, the
7.3
interest
of
rate
must
payments
quoted
in
be
should
divided
by
by
12, while
multiplied
by
12
the
if
number
they
Figure
illustrates
a
$5000
loan
with
a
are
rst
rate
of
7.65%
that
must
be
repaid
in
means
that
the
monthly
range
sorted
the
at
12
number
of
interest
repayments
is
rate
years
×
months
=
24
payments
at
function
is
therefore
or
a
payment
of
years. Y
ou
may
$225.34
note
the
top
press
representing
an
the
list
per
month
over
who
is
that
the
outgoing
repaying
A2
to
the
nish
A7
with
and
six
B2
times
to
in
the
person
with
the
fastest
time
of
the
list. e
cell
range
B2:B7
is
named
cell
C2
type
=RANK(B2,racetimes,1)
number
1
in
the
function
indicates
is
in
ascending
result
is
a
payment
the
indicates
that
it
order, while
is
0
or
omitting
descending. e
rank
of
the
rst
athlete, Matt, is
=RANK(B2,racetimes,1)
and
negative
from
the
value
1, which
is
rst
or
rank
1. Copy
the
the
function
person
that
Enter. e
number
shows
value
race
=PMT(B2/12,B3*12,B1)
the
two
by
sports
are
B3*12. e
a
returning
from
group
positions
calculated
that
loan
contested
data
a
nal
spreadsheet
is
and
2
of
as
order, so
racetimes. In
B2/12, and
closely
the
simple
two
is
years. is
a
how
a
yearly
ascending
interest
in
athletes. e
years.
7.25
illustrates
determined
are
B7
Figure
7.26
Developing
to
the
remainder
of
cells
in
C3:C7. Excel
loan.
adjusts
the
cell
references
=RANK(B3,racetimes,1)
that
the
as
Rich
same
=
2
for
nish
time
as
2. Position
so
Ole
Eli, and
3
would
is
is
in
4th
=
2
since
therefore
skipped
be
next
rank
Eli. However, note
=RANK(B4,racetimes,1)
position
rank, and
appropriately. e
because
he
also
of
has
ranked
the
tied
position.
Fig 7.25 The PMT function calculates payments on a loan
RANK
e
syntax
nd, range
In
later
is
of
=RANK( number
numbers ,
versions
of
order
Excel
of
this
whose
rank
you
want
to
rank)
function
has
been
Fig 7.26 In this example the RANK or RANK .EQ function is applied to determine
renamed
e
to
syntax
RANK.EQ.
is
nal results of competitions
=RANK.EQ( number
whose
rank
you
want
SUM
to
nd,
range
of
numbers,
order
of
rank)
e
is
in
a
of
1
function
sorted
(see
produces
list, so
section
duplicate
that
7.5
numbers
the
for
are
the
position
rst
more
given
item
on
the
of
a
number
would
sorting
same
have
or
a
rank
data). Note
rank.
syntax
is
=SUM( range
of
cells)
item
that
If
to
you
wanted
B175
you
to
add
could
together
use
(B1+B2+B3, etc.). is
the
+
the
numbers
operator
would
take
to
you
a
in
add
cells
the
long
B1
cells
time!
163
7
Spreadsheets
It
is
much
quicker, and
function. e
SUM
easier, to
function
use
can
be
the
the
SUM
used
in
four
ways:
adding
values,
for
example
class), and
column2
is
◆
Jazz
not
for
the
sorted, so
adding
cell
◆
adding
ranges
◆
adding
a
references, for
day
searches
of
the
‘false’ is
across
class. e
entered
at
example
day
returned
is
example
values, for
combination
of
list
the
row
of
end
to
classes
of
Saturday. e
the
example
the
function
=SUM(B3,C3,F4)
=VLOOKUP(B8,class,3,FALSE)
of
the
=SUM(1,4,9)
function. e
◆
then
above
would
return
10am
=SUMC3:C10)
as
the
time
to
return
of
the
class. e
column
number
is
changed
options, for
another
set
of
data
based
on
the
class.
=SUM(B3,C4:C10,12)
Fig 7.27 illustrates the calculation of total donations using SUM
Fig 7.28 VLOOKUP is useful when searching for information in large tables
VLOOKUP
e
syntax
is
=VLOOKUP( value
you
want
to
look
up ,
Relative
the
range
column,
of
the
containing
data
where
column
the
the
value
number
additional
is
located
relative
to
the
information
you
in
the
rst
column
need ,
Copying
formulae
list
in
the
rst
column
of
the
range
is
sorted
absolute
addressing
can
be
extremely
useful.
whether
Consider
the
and
rst
or
the
spreadsheet
shown
in
Figure
7.29A,
not
where
a
5%
discount
is
calculated
on
three
data
plans.
sorted)
As
you
out
VLOOKUP
searches
the
rst
column
in
a
table
the
create
for
a
value. If
the
value
is
found, any
other
discount
that
row
can
be
selected. e
V
in
looking
vertically
down
example
for
grades
list
is
is
or
a
list
in
is
a
the
lookup
on
until
a
rst
the
the
7.28
grade
is
is
could
similar
correct
the
be
searching
ID
associated
those
steps.
column
in
a
range
named
class
cells
in
is
cell
and
C3
copied
resulting
when
Excel
using
Excel
(in
want
keep
the
is
to
to
copy
discount
=B3*B1. If
cells
C4
cell
and
is
the
if
each
it
case
each
you
as
the
it
C3
is.
containing
C5, Figure
is
other
using
time)
need
why
to
adjustment
cells
is
addressing. is
to
time, such
explains
result
formulae. is
copied
relative
this
above
help
sheet
(for
the
formula
not
=VLOOKUP(B8,class,2,FALSE)
rst
other
formula
two
found. e
to
plan, you
work
7.29B
column.
noticeboard. e
located. en
until
Figure
the
pinned
vertically
name
function
searches
164
performing
searched
function
e
on
searched
number
row
of
to
formula
shows
An
each
automatically
VLOOKUP
the
represents
on
to
value
e
in
spreadsheet
of
formula
data
a
the
incorrect
the
is
useful
refer
as
cell
to
your
copied
(Figure
to
an
assumption
the
left
exact
discount
cells
and
value
an
of
by
the
but
cell
one
does
location
return
7.29C).
a
example
sometimes
an
of
on
in
error
the
B1.
or
7.3
Developing
a
simple
Fig 7.29 Copying formulae can sometimes give the wrong result
Fig 7.30 Naming a cell is useful for cer tain calculations
Without
W hen
the
as
naming
formula
shown
in
might
containing
use
the
name
name
to
cells
cell
C4
multiply
in
B4
and
box
B1
and
the
the
B5
work
5%
the
C4
you
columns
and/or
not
to
have
function
or
in
(absolute
copied
corner
results
in
use
cell
a
to
also
to
usually
formulae
the
are
with
the
this,
spreadsheet
copied
down
addressing
the
correct
in
and
down
to
one
insert
you
must
row, and
and
a
so
add
a
row, all
row. For
row
a
will
example, in
above
insert
rows
the
new
ever ything
in
word
row
at
it, will
automatically
Figure
7.31, if
‘German’ (fth
the
fth
become
you
wish
row),
row. e
the
move
sixth
fth
row,
on.
to
costs
insert
columns
one
or
more
table. However, you
over, because
you
of
cells
cells,
name
illustrate
absolute
B1
other
you
C5.
rows
in
the
to
referencing),
should
(B1). T
o
left
forget
rows
allows
both. Excel
references
may
start
that
top
and
Manipulating
Sometimes
when
Discount. As
discount
for
cells
discount
C5, the
5%
more
7.30. erefore, you
in
as
or
not
Figure
cell
to
one
spreadsheet
spreadsheets
insert
rows
manages
your
sheet
to
to
or
do
have
a
columns
adjust
any
cell
compensate
for
Fig 7.31 To inser t a row above the word ‘German’ (fth row), you must inser t a
the
change.
new row at the fth row
165
7
Spreadsheets
Inserting
a
row
or
column
oers
four
choices
(Fig
7.32):
Deleting
(Fig
◆
Shift
cells
the
to
will
cells
also
moved
row:
entire
is
to
the
to
column:
located. e
moved
to
appears
the
to
the
is
a
cells
left
one
other
contents
cell
or
being
cells
of
in
row
a
the
that
in
◆
the
moved
side
are
column
where
or
not
Shift
the
will
several
aected.
below
the
above
column
the
cursor
just
the
is
one
the
◆
cell
located.
cell
selected
where
(not
newly
row
also
oers
cells
to
left:
the
column
are
located
also
Shift
to
move
cells
several
Moves
left. e
up:
cells
not
the
to
the
contents
contents
of
aected. e
right
the
Moves
up. e
of
the
of
the
one
choices
or
other
contents
cell
being
several
cells
of
in
the
moved
left.
the
contents
other
cells
in
just
the
one
inserted
selected
◆
(the
row).
cursor
cell)
column
column).
◆
Entire
row:
Deletes
located. e
row
not
cell.
just
Entire
one
column:
is
is
now
deleted
located. e
left
to
and
ll
row
below
Deletes
entire
the
the
a
where
of
one
the
the
a
one
or
row
are
column
to
where
(not
the
Fig 7.32 Inser ting a row or column oers four choices
cursor
deleted
column
column
column
the
just
right
deleted.
Fig 7.33 Deleting a row or column oers four choices
16 6
four
not
aected.
down, not
of
one
or
7.33):
cells
down.
column
(the
row
of
cell, column
several
cells
in
move
Inserts
entire
the
the
contents
appears
right
the
of
the
moved
row
of
of
right.
cells
also
Inserts
row
contents
right
the
contents
aected. e
other
of
the
Moves
will
inserted
Entire
not
down:
contents
newly
◆
are
down. e
Entire
e
Moves
right. e
move
cells
being
◆
the
located
Shift
e
right:
column
cells
◆
cells
a
is
is
is
moved
the
one
up,
cursor
cell)
moved
is
to
the
7.3
Developing
a
simple
spreadsheet
Questions
Use
Figure
7.34
to
answer
the
following
questions.
6
7
Write
complete
a
the
lowest
b
the
average
c
the
number
Write
an
CANCEL
IF
if
other wise
8
If
the
9
Write
of
Identify
1
the
name
box
on
the
Write
3
If
the
formula
that
calculates
would
the
be
entered
in
cell
amount
donated
to
the
the
Classical
class,
write
donated
from
the
If
the
the
formula
for
10%
is
now
entered
CHARIT Y. Write
from
the
Explain
5
Limit
Latin
the
Hiphop
1:
1
Type
2
Merge
to
H1
that
I3
the
in
output
less
the
than
word
30,
space.
copied
would
statement
if
is
to
is
to
display
cell
number
of
J3
cells
the
to
calls
I4
word
output
is
less
to
I6,
then
CANCEL.
the
than
name
the
the
class,
other wise
output
the
number
of
limit
calls.
function
in
cell
J3
is
copied
to
cells
J4
to
J6,
write
the
output
for
that
column.
State
the
location
of
the
data
in
cell
D5
after
each
of
class.
which
for
add
a
column
exercises
Creating
the
the
is
following:
named
amount
a
inser ting
a
column
b
inser ting
a
row
c
deleting
a
column
d
deleting
a
row
at
column
B
donated
at
row
5
to
the
left
of
at
column
G
the
at
row
6.
using
data
in
bottom
containing
Sheet1
left)
A
and
the
columns
(you
nd
rename
it
A
this
as
Highlight
the
headings
in
row
3
and
make
them
bold.
title
to
on
5
B.
the
Save
the
spreadsheet
as
DONATIONS.
tab
MAIN.
B
Donations
Excel
4
Sheet1.
collected ’ across
on
Microsof t
spreadsheet
heading
Double-click
the
a
following
‘Donations
1
cell
blank
cell
I3
calls
column.
Exercise
at
in
formula
in
a
cell
of
class.
steps
Practical
3
the
in
number
oered.
the
the
4
classes
charity
11
amount
IF
following:
F4.
then
from
of
output
class
the
limit
statement
the
cells
calculate
gure.
10
=F3*10%
an
the
for
2
the
to
cost
function
state
Fig 7.34 Spreadsheet showing schedule for summer classes
functions
C
D
E
collected
F
Required
4000
2
3
Item
4
Water
5
Received
Shipping
date
Shipped
Transpor t
12000
02/09/2019
8000
Air
Tin food
4950
03/09/2019
3500
Sea
6
Dry goods
9870
06/09/2019
6500
Sea
7
Medical supplies
1150
10/09/2019
1000
Air
9
Tarpaulins
3500
15/09/2019
2500
Sea
Sheet:
type
More
needed?
MAIN
167
7
Spreadsheets
Exercise
2:
Use
MAIN
the
Using
functions
sheet
to
23
continue
this
A
loan
In
cell
A10, type
2
W iden
3
In
4
Insert
‘ Total
quantity
of
is
A
to
t
the
title
in
collected
7.25%
and
cell
B10, type
=SUM(B4:B8)
row
at
row
6
and
enter
and
the
the
following
pay
to
manage
sta. e
repayment
and
data
press
time
the
interest
is
5
years.
data
in
the
same
MAIN
at
column
for
J.
Enter
J
a
used
A10.
Sheet, starting
cell
was
donations’.
Type
column
$30,000
donations
exercise.
rate
1
of
K
another
1
donation:
5000
tins
of
baby
formula
were
2
donated, but
on
5
6
only
3000
can
be
shipped
via
Air
06/09/2019.
In cell A12, type ‘ Total quantity of items shipped ’.
In
cell
B12, type
=SUM(D4:D9)
and
press
3
Loan Amount
30000
4
Interest
7.25%
5
Years
6
Repayment
5
7
Enter.
8
7
In
cell
A13, type
‘Smallest
quantity ’.
8
In
cell
B13, type
9
In
cell
A14, type
‘Largest
10
In
cell
B14, type
=MAX(B4:B9)
=MIN(B4:B9)
and
press
Enter.
quantity ’.
and
24
In
cell
25
Save
K6, type
the
=PMT(K4/12,K5*12,K3)
spreadsheet
again.
press
Exercise
3:
Using
formulae
Enter.
1
11
In
cell
A15, type
‘ Types
of
items
Type
the
following
DONATIONS
12
In
cell
B15, type
=COUNT
A(A4:A9)
A16, type
‘Number
and
In
A
cell
of
in
a
new
sheet
of
the
items
spreadsheet.
press
Enter.
13
data
donated ’.
shipped
1
by
B
Costs
per
C
D
E
F
day
2
15%
Air’.
3
14
In
cell
B16, type
Job
Service
Cost
Quantity
Total
code
and
press
cost
Enter.
15
In
cell
A17, type
‘Average
16
In
cell
B17, type
=AVERAGE(D4:D9)
quantities
shipped ’.
4
FL
Fuel/gal
3.75
5
LC
Landing
1275
5000
6
2050
5
2250
6
charge
and
6
press
Discount
=COUNTIF(E4:E9,“Air ”)
SF
Storage
Enter.
facilities
17
Use
18
In
the
name
box
to
name
cell
F1
as
QTY.
7
cell
F4, type
PT
Por t fees
=IF(B4<QTY,QTY-B4,“”).
8
19
Use
the
AutoFill
feature
to
copy
the
function
in
Sheet:
cell
20
F4
Insert
to
a
row
donation:
7000
21
Use
cell
22
A
F7
total
this
16 8
at
row
of
via
been
data.
paste
3250
8
and
torches
AutoFill
and
EXPENSES
F5:F9.
8650
shipped
the
now
cells
Air
were
on
feature
it
in
sets
data
for
another
donated, with
10/09/2019.
to
cell
of
enter
copy
the
function
donated. Update
the
Rename
3
In
4
Use
5
supplies
have
spreadsheet
with
cell
Use
Sheet2
E4, type
the
from
in
F8.
medical
2
E4
to
Name
EXPENSES.
=C4*D4.
AutoFill
cell
the
as
feature
cells
Box
to
drag
the
formula
E5:E7.
to
name
cell
F2
as
DISK.
7.3
6
In
of
7
cell
Use
F4
the
Discount
decimal
Update
10
Name
11
Save
a
each
formula
to
calculate
ser vice. Type
AutoFill
cell
Format
9
enter
on
the
from
8
F4
15%
to
feature
cells
cells
in
columns
to
a
(Storage
discount
is
=E4*DISK
drag
the
in
formula
for
Cost, Total
currency
cost
with
the
and
4
two
the
the
F2
by
range
changing
A4:C7
spreadsheet
as
15%
to
5
12%.
In
4:
Reviewing
Use
EXPENSES
cells
E10, E11
press
again.
to
sheet
and
calculate
expensive
to
continue
this
In
cell
E12, enter
the
Total
E13, enter
how
average, cheapest
In
cell
an
many
E14, enter
calculate
amount
how
of
costs
appropriate
function
Save
the
cell
in
data
5:
are
ser vices
had
function
Type
spreadsheet
the
for
following
the
in
a
discounted
cell
in
C2
cell
from
SF
to
LC.
C3.
the
compares
rst
LC
column
in
of
cell
the
C2
and
with
SERVICES
Expenses
sheet
to
nd
LC. en
third
shown
column
in
cell
is
selected
(Landing
C4.
job
code
in
C2
from
LC
to
HE.
that
an
error
#N/A
appears
in
cells
C3
C4. is
is
because
the
code
is
not
found
in
SERVICES
range
of
data.
Save
the
spreadsheet
again.
Exercise
6:
Viewing
your
functions
and
formulae
$2000.
Press
Ctrl
and
`
(located
above
the
Tab
key
on
again.
data
in
keyboard)
formulae
information
Sheet3
of
Adjust
in
the
to
the
cells
display
the
functions
and
spreadsheet.
to
show
the
functions
and
the
clearly.
spreadsheet.
3
A
in
updated
the
the
formulae
DONATIONS
code
to
2
1
close
oered.
appropriate
than
Searching
in
and
Change
your
Exercise
simply
to
1
4
sorted. If
respectively.
ser vices
an
many
more
or
items
and
7
3
TRUE
not
the
appropriate
the
calculate
are
C3. FALSE
that
exercise.
and
2
code)
add
cell
=VLOOKUP(C2,SERVICE,2).
Enter. is
Notice
most
in
indicate
spreadsheet
functions
6
functions
job
is
( Job
could
in
to
simple
C4, type
charge)
In
the
shown
a
=VLOOKUP(C2,SERVICE,3,FALSE)
SERVICE.
the
1
as
ser vice
cell
and
function
column
bracket
range
the
the
were, you
ever y
Exercise
facilities)
to
rst
Change
e
places.
cell
the
they
F5:F7.
the
added
Developing
B
C
Press
Exercise
Job code
3
Service
4
Cost
and
`
to
display
your
results
once
again.
D
1
2
Ctrl
SF
Return
7:
to
1
In
cell
2
Select
Using
the
the
MAIN
G3, type
the
RANK
range
function
sheet
for
this
exercise.
‘Priority ’.
C5:C10
and
name
this
range
as
5
SHIPPING.
Sheet:
MENU
3
2
Double-click
3
In
cell
on
Sheet3
as
MENU.
in
C3, type
ever y
range
en
Enter. is
cell
in
in
the
the
the
compares
rst
in
the
SF
column
EXPENSES
data
cell
G4, type
later
versions
=RANK(C4,SHIPPING,1)
of
Excel
or
type
=RANK.EQ(C4,SHIPPING,1)
=VLOOKUP(C2,SERVICE,2,FALSE)
press
In
in
of
sheet
second
cell
the
to
C2
and
SERVICES
nd
column
is
4
with
SF
.
Copy
the
W hich
5
If
the
the
function
items
rank
format
have
in
the
function
of
the
cell
G4
same
cells
G5:G10.
priority?
produces
dates
to
an
error, then
check
entered.
selected
169
7. 4
Fo r m a t t i n g
a
spreadsheet
In
Formatting
the
Format
desired
Y
ou
can
use
a
variety
of
formatting
features
such
as
changes
and
font
size
to
display
your
data
7.35). e
options
on
the
Home
tab
or
feature
(Fig
7.36)
the
change
the
number
◆
change
the
alignment
◆
format
text
◆
add
◆
shade
cells
with
can
make
the
areas, including
data, customising
fonts,
borders
and
shading. After
making
the
changes, click
OK
to
close
the
dialogue
and
return
to
the
worksheet.
format
of
text
individual
kinds
tabbed
Format
box
dierent
box, you
the
can:
◆
and
of
numbers, aligning
customisation
Cells
dialogue
each
eectively
applying
(Fig
in
bold,
formatting
alignment
Cells
features
of
or
data
characters
borders
colours
or
patterns
Format
Y
ou
can
numbers
use
a
number’s
a
number
dialogue
◆
a
a
Y
ou
the
to
box
so
style
can
of
formatting
(Fig
of
the
Number
7.37)
where
number
tab
features
on
in
you
a
the
can
to
cell
change
containing
Format
Cells
choose:
(currency, percentage, date
on)
(decimals, commas, and
also
icons
variety
view
categor y
and
◆
a
appearance. Right-click
on
perform
the
basic
Number
so
number
section
of
on).
formatting
the
Home
using
tab.
Fig 7.35 Spreadsheets have a variety of formatting features to display your
data eectively
Fig 7.37 You have a choice of formatting features to change a number ’s
appearance
Align
e
the
data
Alignment
position
of
tab
text
(Fig
7.38)
within
a
has
options
cell. is
tab
to
is
change
used
to
determine:
◆
the
horizontal
selected
Fig 7.36 Right- click on a cell to reveal the Format Cells feature
17 0
cells
and
vertical
alignment
of
data
in
7. 4
◆
the
◆
whether
the
orientation
cell
long
of
cell
( Wrap
data
in
entries
selected
should
whether
width
◆
◆
the
to
selected
cell
should
be
wrapped
within
of
shrink
to
t
the
Practical
exercises
Exercise
cells
should
be
merged
to
form
a
1
cells)
the
text
can
also
perform
8:
(left
to
basic
data
right).
using
on
the
formatting
spreadsheet
DONATIONS
created
Apply
a
in
Exercise
Excel
1, and
le
select
which
the
sheet.
the
comma
format
to
numeric
data
in
the
the
icons
the
MAIN
alignment
Excel
Formatting
Open
you
2
Y
ou
using
column
t)
(Merge
direction
spreadsheet
text)
size
(Shrink
whether
single
text
a
cells
Microsof t
◆
Formatting
sheet. Keep
the
decimal
places
to
zero.
toolbar.
3
Highlight
them
4
Change
Arial
5
6
Use
the
row
3.
Select
headings
Wrap
all
the
to
the
of
the
text
a
in
row
3
and
tab
headings
blue
option
headings
make
in
in
row
3
to
colour.
on
the
the
headings
in
worksheet
F3).
drop-down
Border
Home
font
point, with
A3
Click
the
the
14
(cells
7
the
bold.
icon
and
in
arrow
the
select
Font
the
to
the
right
section
O utside
of
of
the
Borders
option.
8
Save
this
spreadsheet
le.
Fig 7.38 The alignment option changes the position of text within a cell
Question
Protection
1
e
Protection
tab
provides
a
privacy
feature
Identify
the
your
worksheet
unauthorised
moving
from
or
or
workbook. By
users
deleting
opening
or
are
adding
prevented
specic
modifying
cells
an
from
of
three
following
features
that
are
found
in
each
of
formats:
password,
a
number
b
alignment
c
font.
changing,
data
entire
a
any
to
in
a
sheet, or
workbook.
Fig 7.39 The Protection tab provides a privacy feature to your worksheet or
workbook
171
7.5
Searching
for
records
Sor ting
Sor ting
Y
ou
can
sorting
sort
rearrange
according
(Fig
to
e
or
or
sort
the
individual
specify. Y
ou
Z)
to
rows
can
can
be
(9
based
columns
by
lists
to
on
in
Excel
cells
sort
descending
or
values
7.40), Microsoft
columns
you
the
1;
in
a
the
A)
order
contents
of
1
by
2
order
(1
to
9;
(Table
one
or
Decide
list
on
by
the
more
the
rows
than
or
one
columns
eld
that
you
want
to
sort.
you
rows,
sort
ascending
to
list
list. W hen
rearranges
using
Z
the
the
of
a
Make
click
that
sure
the
the
Sort
cursor
icon
is
on
located
the
Data
within
the
tab, or
list
and
right-click
A
from
the
7.2).
menu. Notice
more
3
columns.
list
Select
and
Fig 7.40 Data can be
the
range
of
data
will
be
selected.
Select the rst eld you want to sort by from the drop-
down
4
that
and
Add
third
specify
level
elds
Ascending
and
you
repeat
want
or
step
to
Descending
3
sort
for
by
the
(if
order.
second
desired).
sor ted in ascending or
descending order
Filter ing
Table 7.2 Examples of sor t lists
Filtering
of
Order
Alphabetic
Numeric
Date
Ascending
A,
B,
C
1,
2,
3
1/1/2019,
Descending
C,
B,
A
3,
2,
1
1/15/2019,
2/1/2019
2/1/2019,
a
will
be
the
worksheet
list
criteria
1/15/2019,
is
records
only
and
viewed
process
on
the
those
hides
at
any
of
selecting
basis
records
the
of
certain
that
has
of
the
records
criteria. Excel
match
others. e
time. Excel
some
full
the
set
selection
of
data
AutoFilter
can
and
1/1/2019
Advanced
based
Sor ting
1
Click
a
in
list
any
by
cell
one
of
the
column
only
allows
eld
you
want
to
use
lters. AutoF ilter
on
more
a
single
complex
eld
allows
while
selection
selection
Advanced
criteria
Filtering
criteria.
to
AutoFilter
sort
the
list.
Select
2
Click
either
the
Sort
Ascending
icon
or
of
Descending
icon
on
tab
(Fig
7.41). is
can
a
table
be
Excel
go
Data
version
of
or
menu
option, depending
to
a
Data
header
option
row
on
and
the
for
ear ly
Menu
versions
bar, click
found
Filter, and
the
with
Sort
on
select
AutoFilter
from
the
sub-menu. In
your
Excel.
on
the
headers
Click
Data
now
on
one
tab
have
of
a
of
the
ribbon. Notice
drop-down
these
arrows
to
arrow
in
reveal
a
that
their
list
of
all
the
cell.
possible
lters.
◆
Clicking
on
a
◆
Clicking
on
Show
on
Top
value
will
All
lter
will
for
that
display
value.
the
table
Top
Ten
in
its
entirety.
◆
Clicking
box. In
for
or
Fig 7.41 Select a cell in the column and click the Sor t icon
172
Top
the
dialogue
or
Bottom, a
Percent. For
for
the
Ten
Top
12
activates
box, you
Items
may
number
example, you
or
the
the
choose
value, and
could
20
to
lter
either
decide
Bottom
dialogue
to
Items
lter
Percent.
7.5
◆
Using
a
the
Custom
range, such
as
F ilter
greater
allows
than
15
you
and
to
lter
less
for
than
30
from
tab
the
in
sub-menu;
later
click
the
Searching
Filter
icon
in
for
the
records
Data
versions.
(>15and<30).
Advanced
Although
the
simple, you
criteria
itself
can
the
be
and
tell
location
use
the
pasted
in
criteria
are
the
than
To
deactivate
Data
option
the
on
AutoFilter, once
the
Menu
bar
and
again
click
select
AutoFilter
on
the
now
11
of
the
criteria
or
headings
in
selecting
more
criteria
Filter
the
and
copied
shown
range
on
in
in
consists
the
to
same
be
the
records
control
on
to
the
of
whether
the
records. Y
ou
the
the
another
Figure
over
ver y
spreadsheet
select
location
to
in
1
records,
list
should
location. We
7.43
to
illustrate
(Rank, Language,
population)
and
range
of<11
and
row, this
selected
data
then
of
G1:J1
Speakers
and
row
Percentage
G2:J3
and
A1:D21)
place
computer
example
record
click
have
Advanced
the
and
criteria
For
an
can
to
makes
Filter.
the
Speakers
and
wish
in-place
Advanced
Fig 7.42 Drop- down arrows reveal a list of possible lters
may
use
ltered
Notice
AutoF ilter
used. Y
ou
then
will
Filter
has
to
the
be
is
can
be
copied
G6:J6. e
>150. Since
an
AND
Rank
greater
has
to
than
data
these
criteria.
be
less
150. We
with
the
original
(the
choose
the
Data, Advanced
range
Filter
Fig 7.43 Option box for the Advanced Filter showing original data, criteria range, and output area
173
7
Spreadsheets
menu
options, or
Advanced
near
the
Filter
icon
in
later
choose
we
versions.
Data
must
include
If
you
click
in
the
table
rst, the
can
if
now
you
you
enter
click
would
should
selects
be
on
the
correct
the
range
for
the
Copy
to
then
also
range
a
7.44
for
criteria
Another
choose
copied. Figure
the
Advanced
remember
the
third
to
row
Filter
change
to
menu
the
G1:J3
in
options, however,
criteria
this
range
to
example.
computer
Figure
automatically
>
range
the
shows
the
list
you
get
when
you
do
this.
table. Y
ou
(G1:J2). Note:
L ocation
where
shows
7.45
the
the
option,
new
resulting
list
list.
Fig 7.45 Use Advanced lter to nd the languages that either rank in the top 10
OR have more than 150 speakers
Pivot
tables
Fig 7.44 Result of using the Advanced Filter to nd the languages that rank in
As
your
data
increases, it
can
become
more
time
the top 10 with more than 150 speakers
consuming
If
we
moved
create
from
G2
record
174
OR
of
the
criteria. For
to
will
one
G3, we
show
if
criteria
to
example, if
create
OR
EITHER
the
next
line, we
“<11” is
criteria. is
criteria
is
update
formulae. Depending
moved
means
to
results, a
a
true. W hen
we
data
pivot table
without
Even
if
more
is
on
the
of
how
makes
altering
data
ranges
it
data, functions
you
easy
original
added
to
need
the
to
to
and
display
summarise
location
of
your
your
your
spreadsheet, the
data.
7.5
pivot
also
To
table
be
can
be
created
create
a
from
pivot
worksheet, you
as
quickly
a
updated. Pivot
pivot
table
for
records
can
table.
from
should
charts
Searching
a
check
set
of
that
data
your
in
a
data
is
arranged
follows:
◆
Y
ou
◆
Each
should
have
column
of
at
least
data
three
should
columns
have
its
of
data.
unique
eld
heading.
◆
Y
our
and
data
not
have
headings
◆
Check
rows
should
and
that
or
a
be
organised
blank
the
the
row
rst
data
a
between
row
set
in
of
also
tabular
the
format,
column
data.
does
not
have
blank
columns.
Fig 7.47 The pivot table dialogue box is displayed with your range of data selected
◆
Review
the
data
to
accurately. Mixing
ensure
up
that
data
it
has
causes
been
entered
incorrect
results.
are
a
To
create
a
pivot
table, click
on
any
cell
in
your
eld
data, click
Table
the
option
Insert
(Fig
tab
and
then
select
the
to
dragged
either
the
to
the
Rows
Values
area
or
area. If
the
you
also
Columns
drag
area,
set
you
of
usually
can
create
a
one-dimensional
pivot
table.
Pivot
7.46).
Suppose
you
wish
subject
received
eld
the
in
Values
the
a
area. e
elds
new
Row
to
to
nd
out
how
results. Figure
area
while
pivot
their
table
the
sheet, while
the
new
original
on
the
eld
the
pivot
data
students
shows
Grade
shows
areas. is
many
7.48
is
left
table
remains
in
as
is
in
in
each
Subject
the
you
drag
located
its
in
sheet.
Fig 7.46 Make sure the cursor is in the data before selecting the Pivot Table
option on the Inser t tab
e
dialogue
selected
(Fig
table
on
Y
our
pivot
using
the
box
is
displayed
7.47). Y
ou
new
table
sheet
is
data
but
or
in
a
with
by
it
to
on
moving
options. is
dierent
One-dimensional
your
choose
display
created
drag-and-drop
original
can
pivot
range
place
the
same
elds
creates
of
the
a
of
data
pivot
sheet.
data
view
of
the
format.
table
Fig 7.48 Creating a pivot table to show how many students in each subject
By
default, Excel
summarises
your
data
by
either
received results. The pivot table is shown on the left while the elds that
summing
or
counting
the
items. If
so, numeric
values
formed the pivot table are in the lower right pane
175
7
Spreadsheets
Two-dimensional
pivot
two-dimensional
table
drag
A
one-dimensional
pivot
table
shows
a
column
another
of
drag
data. If
another
you
eld
drag
to
a
the
eld
to
the
Columns
Rows
area
area, then
eld
to
table
the
is
created. Make
Values
area
to
sure
complete
to
the
or
pivot
row
pivot
table.
and
a
Fig 7.49 Creating a two- dimensional pivot table to show the number of students who gained grades I to IV in the dierent subjects. The Subject eld is in the Rows
area, the grade eld is in the Columns area, while the grade eld is also dragged to the Values area
Frequency
distr ibution
wish
Sometimes
you
times
a
value
times
a
specic
occurs
dates. Creating
information
you
176
have
a
may
in
a
payment
a
of
to
set
for
count
of
was
frequency
quickly
list
want
data
made
or
number
how
with
of
many
between
distribution
you. For
students
the
two
provides
this
example, suppose
their
ages, and
you
year
to
nd
out
inter vals
the
initial
the
age
to
area. Grouping
frequency
who
many
registered
pivot
eld
how
table
both
the
the
distribution
registered
for
for
that
ages
the
students
exams. Figure
is
created
Rows
in
for
grouped
area
and
inter vals
those
subjects.
in
after
of
the
7.50
you
the
2
in
two-
shows
drag
Values
produces
two
age
the
ranges
7.5
Pivot
Now
table, a
you
pivot
results. To
within
can
create
your
Chart. Y
ou
a
pivot
the
can
OK. Y
our
sheet
summarise
chart
section, locate
same
for
records
char ts
that
click
Searching
as
can
pivot
you
Analyse
new
select
pivot
pivot
to
data
in
a
select
the
option
and
will
a
cell
Table
select
chart
be
pivot
your
any
Pivot
suitable
chart
into
visualise
chart, rst
table. en
now
the
help
your
Tools
Pivot
type
placed
and
on
the
table.
Fig 7.50 shows the initial pivot table created by dragging the age eld to both
the Rows area and the Values area
Fig 7.53 Pivot char t created from the frequency distribution
Modifying
Fig 7.51 Right- click in the Row labels and select Group to enter the interval for
As
you
set
of
add
pivot
or
delete
data, these
updated
by
the
tables
columns
changes
pivot
are
or
rows
not
table. To
in
the
original
automatically
update
a
pivot
table,
the age ranges
right-click
anywhere
in
the
pivot
table
and
select
Refresh.
Sometimes
your
on
pivot
the
shows
the
or
may
not
want
table. Filtering
arrow
include
only
you
next
list
of
leave
grades
I
to
to
the
options
out. In
data
row
to
to
view
can
or
the
done
column
select
F igure
be
all
those
7.54, we
results
by
in
clicking
labels. is
you
will
want
to
to
view
III.
Fig 7.52 The frequency distribution showing the number of students in the two
age ranges who registered for the subjects
177
7
Spreadsheets
Fig 7.56 Select the COUNT aggregate function to replace the SUM function
Fig 7.54 Removing the check mark for the grade IV option so that it will not be
and click OK
shown in the pivot table
Pivot
tables
summarise
your
data
by
either
summing
or
Questions
counting
of
the
calculation
Right-click
of
items. Y
ou
Age
(Fig
in
such
on
this
7.55)
in
average, maximum, or
cell
with
the
example), then
and
(COUNT
the
as
can, however, change
select
this
the
new
example)
aggregate
select
Value
aggregate
and
click
the
type
minimum.
function
Field
1
State
the
most
following
(Sum
a
rearranges
a
pivot
table, select
the
b
selects
c
extracts
makes
up
the
pivot
OK
entire
table, then
(Fig
not
alter
the
original
data
or
range
press
other
of
may
want
to
delete
the
if
that
is
of
data
in
order
records
pivot
sheet
that
that
meets
one
meet
or
cer tain
more
criteria
criteria
it
to
another
summarises
data
in
location
another
on
the
and
sheet
sheet
the
original
without
location.
Delete. It
tables
You
with
the
have
the
following
information
on
where
you
or
lunch
and
how
much
you
spent:
pivot
Amount
Location
easier.
Monday
$15.00
Lunchroom
Tuesday
$25.00
Desk
Wednesday
$10.00
Café
Thursday
$13.00
Lunchroom
Friday
$14.00
Desk
a
Write
was
3
i
Fig 7.55 Right- click on the Sum of Age cell, then select Value Field Settings
result
from
the
above
table
if
the
data
sor ted:
by
Amount
ii
by
Day
iii
by
Location
by
Amount
Write
ii
the
i
the
ltered
178
list
data
Day
table
the
data
ate
charts. Y
ou
describes
7.56).
2
will
a
specied
altering
that
that
function
d
delete
term
Settings
copies
To
suitable
descriptions:
in
result
by
the
Amount
Location
in
ascending
ascending
rst
in
from
in
order
order
ascending
descending
the
following
above
table
criteria:
<15
= “Desk ” or
order
Amount
and
then
order.
<15
if
the
data
was
7.5
Practical
Exercise
1
9:
Enter
exercises
Using
the
starting
Sor t,
Filter
following
at
cell
and
data
A1. Save
using
Pivot
into
the
a
Microsof t
for
records
Excel
Table
c
create
a
table
Subject
worksheet
workbook
Searching
in
students
as
with
the
Grades
in
the
columns. en
obtained
each
grade
rows
show
for
and
how
the
the
many
dierent
subjects.
RESUL
TS.
Exercise 10: Sor ting, f ilter ing and frequency distr ibution
Sheet:
RESUL
TS
1
Student
ID
Subject
Grade
Enter
the
starting
1
following
data
into
a
worksheet
Age
English
II
at
cell
A1. Save
the
workbook
as
14
LANGUAGES.
2
Spanish
III
15
5
French
I
18
6
French
II
18
Sheet:
LANGUAGES
Rank
10
Spanish
IV
16
11
Spanish
III
16
Language
Speakers
Percentage
of
population
12
2
Select
the
English
range
of
II
data
and
3
Sort
the
data
by
Grade
4
Sort
the
data
by
Subject
5
also
by
Grade
Use
the
a
information
b
all
c
students
subjects
d
all
who
II
an
feature
the
with
in
subjects
Create
for
a
under
935
0.141
2
Spanish
390
0.0585
3
English
365
0.0552
4
Hindi
295
0.0446
5
Arabic
280
0.0423
6
Por tuguese
205
0.0308
7
Bengali
200
0.0305
8
Russian
160
0.0242
9
Japanese
125
0.0192
LANG.
order.
ascending
order, and
order.
to
view :
18-year-old
Grade
are
it
ascending
in
Mandarin
16
name
descending
AutoFilter
Grade
6
in
in
1
students
IV
18
years
old
10
Punjabi
95
0.0144
11
German
92
0.0139
with
subject
ending
Advanced
a
all
students
who
b
all
students
with
in
‘ ish’.
F ilter, to
obtained
2
Sort
the
data
by
Language
3
Sort
the
data
by
Percentage
grades
I
to
I
OR
students
Use
the
Pivot
Table
feature
count
the
Use
the
number
of
in
students
who
Advanced
Filter
to
nd
the
languages
that
for
each
Use
an
the
top
10
with
more
than
150
speakers.
Advanced
Filter
to
nd
the
languages
either
rank
in
the
top
10
OR
have
more
subject
than
count
the
have
that
results
b
order.
to:
5
a
in
17.
rank
7
order.
population
older
4
than
ascending
of
II
descending
Grade
in
select:
number
of
students
in
each
150
speakers.
age
6
Create
a
frequency
distribution
of
the
speakers.
group
Show
in
inter vals
of
150.
179
7.6
Char ts
Graphing
(charting)
data
patterns, comparisons
having
strong
easier
rows
and
visual
to
is
and
columns
impact. is
a
ver y
trends
of
useful
in
data, a
often
way
to
show
data. Instead
graph
makes
can
the
make
data
information
more
of
a
much
A
is
understand.
chart
or
a
can
an
can
create
e
major
a
number
of
chart
types
with
types
and
their
purposes
is
to
chart
be
having
in
able
to
the
sheet. W hen
worksheet, but
data
or
formulae
to
analyse
interpret
a
worksheet
this
the
is
be
of
data.
(Fig7.57)
done, the
chart
may
data
set
sheet
entered
chart
has
no
into
the
Excel.
are
shown
sheet. If
a
chart
is
set
up
as
a
chart
sheet, it
must
in
be
Table
no
chart
embedded
individual
chart
chart
a
without
be
separate
cells, and
Y
ou
in
quickly
printed
on
a
page
by
itself. e
chart
may
be
printed
7.3.
alone
or
with
the
worksheet
data.
Table 7.3 Types of char ts
Pie
Shows
par ts
the
of
a
Compares
Column
Similar
the
Line
Shows
Scatter
values
bar
Similar
trends
over
to
at
a
char ts;
difference
values
among
whole
Bar
to
relationship
given
used
between
and
point
to
show
items
change
of
time
line
char t;
shows
the
Fig 7.57 Char ts can be embedded in the worksheet
difference
between
two
sets
of
values
Area
Similar
to
amount
line
of
char t;
change
shows
over
Creating
the
the
of
be
two-
or
three-dimensional;
a
2D
the
chart
will
a
horizontal
(x)
axis
and
a
vertical
(y)
a
3D
chart
displays
three
axes
(x, y
and
chart
is
linked
to
the
worksheet
data
that
from, and
it
is
updated
it
automatically
data
when
chart
is
contained
18 0
a
is
to
what
to
determine
present
data
will
the
be
in
what
type
data. e
put
on
the
can
create
numerous
chart
types, the
most
being
column, bar
and
pie
(Table
7.3).
simplest
way
to
create
a
chart
is
to
rst
select
the
that
will
be
used
on
the
chart. Data
for
the
chart
normally
begin
with
column
headings
followed
by
changes.
pictorial
in
suited
data
the
the
A
important
specic
is
will
worksheet
illustrate
z).
data
created
to
axis,
e
A
is
best
consideration
common
while
be
used
chart
chart. Excel
displays
is
worksheet, it
chart
other
may
char t
time
Since
Charts
a
the
or
Excel
visual
representation
worksheet. e
idea
of
of
data
plotting
numeric
data. Chart
not
necessarily
can
be
created
adjacent
by
data
is
selected
ranges. For
selecting
the
in
ranges
example, a
range
B2:C9
but
chart
(Fig
7.58,
7.6
6
e
7
Vertical
horizontal
8
Horizonal
9
Main
axis
10
Vertical
11
Horizonal
12
L egend
that
plots
the
categories
title
axis
chart
axis
Char ts
title
title
axis
gridlines
axis
gridlines
Fig 7.58 First select the data that will be used on the char t, whether in columns
next to each other (top) or not (bottom)
top). However, to
by
Type, select
the
Ctrl
key
create
the
while
another
range
chart, of
A1:A9, then
selecting
C1:C9
the
press
(Fig
premiums
and
hold
7.58, bottom).
Fig 7.59 Par ts of a char t
Titles
on
and
the
subtitles
chart
W izard
after
icon
on
it
should
is
the
set
not
be
selected:
up. Next, locate
Standard
toolbar
or
enter
the
the
them
Chart
Insert
Modifying
A
or
the
Recommended
Charts
icon
on
there
and
series
chart
and
is
of
dialogue
being
modify
boxes
created, you
your
chart
if
to
create
may
see
a
the
chart. As
sample
chart
completing
probably
it
to
need
prevent
to
it
the
resize
preview
is
in
the
desired
its
Moving
an
using
the
wizard, you
embedded
the
chart
worksheet
and
correctly
. Make
location, decide
sure
the
chart
for
it
to
be
if
it
shows
there
is
enough
meaningful
for
to
move
it
to
its
all
charts
of
data
being
need
plotted
Click
the
end
legend
formatting
Figure
for
7.59
is
a
legend. If
and
the
data
unnecessary
. Also
consistency
explains
the
move
it,
it
and
place
borders
around
it.
is
there
is
dened
and
look
at
and
readability
, if
dierent
parts
the
chart
move
new
a
to
chart
location
a
new
by
in
location
selecting
the
same
it
within
and
then
worksheet.
in
the
background
(white
space)
of
the
chart.
the
chart
now
has
eight
‘hand les’. Make
sure
you
select
of
a
the
whole
chart, not
just
one
of
its
user. For
only
by
such
as
the
title
or
legend.
one
an
Click
the
left
mouse
button
and
drag
the
chart
to
its
axis
new
title, the
can
information
2
set
you
the
components
example, not
data:
the
that
on
worksheet
char ts
worksheet. Y
ou
Notice
data
other
size, delete
possible
dragging
move
data. When
is
the
will
1
chart
like
necessar y.
chart
covering
is
the
It
After
char t
follow
change
the
a
tab
location
in
the
same
worksheet.
change
needed.
Sizing
char ts
chart.
e
chart
may
be
resized
so
that
it
displays
data
better.
1
e
area
comprising
2
e
plot
area
3
e
data
4
An
the
chart
1
points
that
are
plotted
to
form
the
Click
eight
optional
label
for
a
data
e
vertical
axis
that
plots
the
background
of
the
chart. Notice
the
‘handles’ on
the
chart.
point
2
5
on
chart
the
P lace
the
tip
of
the
mouse
pointer
on
one
of
the
values
handles.
181
7
3
Spreadsheets
W hen
click
◆
the
and
pointer
drag
Using
one
the
of
changes
mouse
the
to
to
corner
a
double-sided
resize
the
hand les
arrow,
chart.
resizes
chart
to
Some
the
see
of
menu
the
options
types
of
for
modifying
changes
that
may
the
be
chart.
available
are:
chart
◆
Chart
◆
Source
Type:
modify
the
chart
type
proportionately.
◆
Using
one
of
the
left, right, top
or
bottom
the
chart
vertically
(taller)
or
change
the
location
of
data
that
is
options
that
you
sides
used
resizes
Data:
to
create
the
chart
horizontally
◆
Chart
Options:
modify
the
same
(wider).
had
Deleting
char ts
the
Backspace
chart
key
and
to
press
delete
the
Delete
key
or
Chart
the
it.
char ted
Add
are
linked
to
the
L ocation:
the
and
place
chart
so
the
(add
or
remove
data
on).
chart
on
a
dierent
Data:
add
data
to
a
chart
by
setting
a
new
range
data
◆
Charts
created
worksheet
◆
Changing
you
labels, legend, titles
◆
Select
when
selected
data. W henever
Add
Trendline:
show
the
‘ best-t
line’ for
a
series
of
the
data
data
changes, the
chart
automatically
adjusts
to
reect
◆
those
changes. Using
the
mouse, right-c lick
on
3D
V iew:
modify
orientation
of
a
3D
chart
type.
the
Questions
1
Give
one
reason
why
a
char t
can
be
more
useful
than
4
analysing
data
in
a
Explain
char t
2
Explain
the
dierence
between
an
embedded
a
char t
and
Dene
the
categor y
following
axis,
Practical
Exercise
1
11:
Enter
range
value
char t
axis,
objects:
data
exercises
Creating
the
data
a
char t
L ocate
3
V iew
the
the
between
a
column
(or
bar)
char t.
Explain
whether
a
legend
is
necessar y
for
the
char t
in
using
Microsof t
char t
shown
in
Excel
4
Figure
7.58. Select
Chart
Once
the
the
your
design
options
Chart
W izard
Types
7.57.
series.
on
and
the
Insert
choose
the
chart
of
and
tab.
the
Column
and
the
1
12:
2
Select
in
Chart
New
(Fig
to
various
and
will
axis
can
layout
colour
add
of
title
to Type
Investment. Give
modify
the
axes
of
the
to
Plan
Chart
Investments’.
the
the
text
that
horizonal
axis
Sheet
the
layout
the
Moving
Right-click
Move
Fig 7.60 Selecting the char t type
the
vertical
created, you
chart, including
title ‘Individual
Exercise
been
changing
chart. Edit
the
has
the
chart. Choose
chart.
182
pie
title,
B1:C9.
2
dierence
sheet.
Figure
3
a
char t
5
and
the
sheet.
char t
to
corner
of
a
new
your
sheet.
chart
and
select
7.61).
and
Click
OK
(Fig
7.62).
7.6
3
e
chart
will
be
moved
to
a
new
sheet
named
2
Chart1.
Format
the
values
for
currency
with
no
Char ts
decimal
places.
3
Create
for
a
line
each
chart
Format
5
Name
6
Name
the
vertical
7
Name
the
main
8
Move
9
Change
the
10
Explain
which
11
the
the
Save
chart
chart
the
include
to
of
as
as
a
type
of
axis
axis
title
type
type
the
to
horizontal
the
this
show
total
payments
language.
4
for
to
as
titles.
‘Day ’.
‘Amount ’.
‘Amount
new
spent
on
lunch’.
sheet.
chart
of
axes
to
a
chart
pie
is
chart.
more
appropriate
data.
spreadsheet
again.
Fig 7.61 Selecting the option to move the char t to a new sheet
Exercise
Create
chart
a
Fig 7.62 Completing the process of moving the char t to a new sheet
Exercise
After
wish
13:
Monitor ing
spending
to
Using
use
the
a
set
lunch
money
chart
of
to
data
for
spending
lunch
track
you
over
trend
below, create
a
a
this
trend. Remember
that
cell
1
Type
save
the
the
when
creating
following
sheet
as
Amount
Day
in
a
the
compare
language
set
the
of
data
fees
below. e
charged
for
teaching
languages.
following
A1, and
data
save
it
as
in
a
spreadsheet
Language
starting
Classes.
A
B
Language
Fees
C
2
Chinese
$250.00
3
English
$125.00
5
4
French
$175.00
8
5
German
$275.00
10
6
Latin
$150.00
5
7
Spanish
$200.00
6
Payments
6
of
line
spending.
chart
to
formatting
data
Create
a
bar
or
column
chart
to
show
the
fees
for
is
language
class.
3
Format
4
Name
the
the
horizontal
chart
to
include
5
Name
the
vertical
6
Name
the
main
axis
titles.
spreadsheet, and
Monitoring
on
using
a
charts.
data
spent
learn
1
each
useful, even
the
to
week, you
2
show
chart
foreign
Type
at
Fees
should
various
1
14:
axis
as
‘Language’.
Spending.
lunch
Amount
Monday
15.00
Tuesday
5.00
Wednesday
10.00
Thursday
13.00
Friday
14.00
axis
title
as
as
‘Dollar
‘Fees
for
Amount ’.
Each
Language
Class’.
7
Move
8
Save
the
the
chart
to
a
new
spreadsheet
sheet.
again.
183
7
Spreadsheets
Exercise
of
15:
Compar ing
payments
is
for
exercise
number
of
the
language
expands
payments
number
3
classes
on
the
formula
remaining
Exercise
needed
Copy
for
14
to
each
compare
language
the
4
Create
total
c lass.
a
rows
bar
payments
Remember:
1
Use
2
Create
the
same
a
bar
of
payments
to
select
column
as
in
column
for
each
of
text
the
next
Name
the
horizontal
5
Name
the
vertical
6
Name
the
main
Language
7
Move
8
Save
Exercise
the
to
title
chart
to
a
as
number
the
the
Ctrl
rst
key
while
data.
axis
as
Determining
titles.
‘Number
of
of
Payments
sheet.
total
cost
for
expands
cost
1
Type
2
Use
a
the
of
each
in
Chinese
payment
of
Exercise
language
heading
formula
for
on
each
D2
to
cell
for
determine
D1.
calculate
classes. Y
ou
$1500.00
to
class.
‘ Total’ in
cell
14
should
Chinese.
the
have
the
Ctrl
total
a
total
to
rst
key
column
for
each
select
Format
6
Name
the
horizontal
7
Name
the
vertical
8
Name
the
main
10
chart
to
to
the
show
language
of
text
selecting
5
9
D2
language.
data
the
the
class.
non-contiguous
column
while
cell
each
data,
then
next
hold
column
data.
the
Language
Payments’.
class
exercise
of
‘Language’.
again.
the
the
class. Remember:
‘Comparison
new
16:
cost
of
select
the
Classes’.
spreadsheet
total
axis
as
the
language
hold
include
axis
14.
show
data, select
column
Format
the
chart
then
4
is
the
data
to
language
3
for
Exercise
chart
non-contiguous
selecting
184
data
or
or
from
for
Move
Save
the
the
chart
to
include
axis
axis
title
as
as
as
axis
‘Language’.
‘ Total
‘ Total
to
a
new
spreadsheet
sheet.
again.
Cost ’.
Cost
Class’.
chart
titles.
for
Each
Printing
Microsoft
to
Excel
change
change
footers
the
margins, adjust
and
modify
document
is
page
up
is
set
1
Go
2
Select
to
may
3
provides
a
appearance
other
correctly
File
tab
dierent
Customise
the
should
by
or
print
with
the
Print
area:
Specify
optional
can
headers/
7.63). Before
always
previewing
settings
page. Y
ou
(Fig
7.7
spreadsheet
ensure
the
that
print
a
the
job.
menu.
ways
sheet
of
printed
features
Print. Depending
be
a
orientation, add
printed, you
the
number
of
a
on
to
your
view
the
features
Sheet
tab
on
version
setup
that
Page
of
of
aect
Setup
Excel
your
the
there
page.
overall
(Fig
7.63).
Fig 7.63 The Page tab options on the Page Setup dialogue box is one place you
4
the
block
to
be
printed. If
a
can adjust the appearance of a printed page
block
of
cells
option, the
5
Print
or
selected
print
titles:
the
is
area
Specify
columns
to
before
will
rows
be
you
already
to
be
printed
select
be
displayed.
printed
along
this
along
the
left
the
of
top
each
page.
6
Print:
W ith
options
◆
Gridlines
◆
Black
and
◆
◆
–
and
white
suppress
white
for
quality
fewer
graphics
and
and
–
–
column
Comments
◆
Cell
errors
and
–
up
the
sheet
colour
the
suppress
headings
letters
–
print
grid lines
images
to
black
printing
speed
column
◆
or
convert
faster
Draft
Row
for:
around
include
specify
the
by
printing
grid lines
print
the
cell
the
–
printout
the
border
row
of
numbers
the
printout
Fig 7.64 The Sheet tab gives fur ther options in the Page Setup dialogue box
notes
content
printed
in
cells
Question
containing
errors
Page
–
1
◆
order
specify
the
order
in
which
the
Explain
one
printing
will
Exercise
2
Select
data
and
Monitoring
data
the
a
exercises
Pr inting
the
the
Print
have
3
17:
Open
type
and
one
disadvantage
for
your
data
or
char t.
print.
Practical
1
advantage
pages
in
data
the
in
printer, tr y
and
print
in
worksheet
Exercise
the
Excel
4
spreadsheet. If
printing
the
Microsof t
char ts
Spending
table
the
using
data
you
to
a
do
the
or
5
13.
le.
6
the
data
Print
have
not
PDF
Open
in
the
a
Select
Language
the
data
table
in
the
printer, tr y
and
print
classes
in
Exercise
the
or
type
14.
spreadsheet. If
printing
the
worksheet
data
you
to
a
do
not
PDF
le.
chart.
chart.
185
7.8
Impor ting
f iles
and
linking
dat a
In
Impor ting
les
into
step
data
Y
ou
can
import
les
from
an
outside
source
into
of
data
menu
Text
le
1
le
there
or
or
you
of
is
way
can
of
distinguishing
the
the
the
Text
wizard
delimited
be
a
le
(F ig
or
one
the
wizard
Files
the
of
one
column
if
(Fig
you
7.67), you
want. Y
ou
can
can
format
even
the
choose
to
import
a
particular
column.
column
File, Open
type
to
a
want, Excel
will
take
W izard.
7.65)
xed
of
each
type.
you
Import
select
the
le
character
separating
you
change
required
choose
would
tab)
a
another. W hen
other
through
S tep
the
from
have
option, you
W hen
you
you
in
Excel,
not
providing
3
Excel
will
width.
(such
column
let
If
as
a
from
you
it
is
if
delimited,
space,
the
decide
comma
next.
If
it
is
Fig 7.67 Formatting each column of data
xed
width,
spaces
were
used
to
line
up
the
columns.
Linking
Sometimes
cell
In
to
the
then
in
cell
the
in
on
View
the
you
the
cell
two
the
tab
from
in
another
the
make
switches
data
where
links
to
the
cell
click
Excel
open
a
les
one
want
in
will
the
cells. It
the
is
in
worksheet
link
link
or
Excel
another
is
a
very
go, type
worksheet
is
best
to
simple. Using
Window
workbook
to
simple
equals
and
have
in
a
process.
sign,
press
both
Switch
menu
the
an
le. Linking
Enter.
les
Windows
earlier
versions,
other.
Fig 7.65 Formatting the text to be impor ted
Figure
Figure
look
7.66
like
then
xed
exact
you
choose
between
treat
if
shows
one
had
the
chosen
column
width, you
step
character
consecutive
spot(s)
what
and
would
you
of
the
wizard
delimited. Y
ou
that
indicates
another. If
delimiters
where
2
as
click
you
one. If
in
want
the
the
a
data
would
wish, you
data
area
at
splits
result
7.68
will
the
shows
be
exclamation
separation
your
column
would
part
of
the
displayed. e
mark
cell. Figure
worksheet
name
(!), separates
7.69
shows
the
of
the
the
sheet
nal
where
sheet, then
name
result.
can
were
the
to
be.
Fig 7.68 The sheet where your result will be shown
Fig 7.66 Determining the columns of data
18 6
your
Fig 7.69 The value is now linked from one worksheet to another
from
an
7.8
Impor ting
les
and
linking
dat a
Question
1
The
following
function
was
used
in
a
cell:
=MAX(PRICES!A4:A12)
a
State
the
name
of
the
function.
b
State
the
name
of
the
sheet
c
State
the
range
of
cells.
d
What
is
the
Practical
Exercise
18:
purpose
of
the
exercises
Impor ting
1
L ocate
and
open
2
Type
the
three
columns.
linked
exclamation
using
the
cells.
mark
(!)?
Microsof t
data
Excel
1
Notepad
following
that
or
data. Use
WordPad.
tabs
to
separate
Double-click
on
sheet. Sheet1
becomes
name
the
2
Go
‘ Week
to
Sheet1
1’ and
Sheet2
of
at
bottom
of
highlighted. Type
press
the
the
the
the
Enter
spreadsheet
and
name
it
‘Summar y ’.
Name
Type
Age
Brown
Mixed
12
Sheba
Alsatian
14
Duchess
Great
10
3
Save
4
In
a
the
le
new
as
Dane
3
In
cell
4
Click
press
5
Y
ou
6
In
A1, type
on
the
‘=’
Week
1
sheet, click
on
cell
B1
and
Enter
have
linked
the
cells
containing
Annissa.
Dogs.txt.
spreadsheet, open
the
le
cell
A2
of
the
Summar y
sheet, type
‘Average
of
the
Summar y
sheet, type
‘ Total
Import.
spending ’.
Remember
to
select
the
Files
of
type
option
as
7
Text
In
cell
A3
les.
spending ’.
5
Click
Next.
6
Ensure
7
Click
8
Y
our
that
Next
the
and
Tab
delimiter
then
is
8
In
9
Click
should
be
B2, type
‘=AVERAGE(’
on
the
Week
1
sheet.
F inish.
10
table
cell
selected.
imported
in
a
sheet
Select
the
range
B3:B7,
then
type‘)’
and
press
labelled
Enter.
Y
ou
should
see
the
average
amount
spent.
Dogs.
Exercise
Open
the
at
the
cells
cell
19:
Linking
Monitoring
as
shown
11
Click
12
Select
13
Click
on
the
Week
1
sheet.
cells
or
Spending
enter
the
worksheet
data
A1:
below
and
edit
starting
type
14
B
1
Name:
Annissa
2
Day
Amount
3
Monday
15.00
4
Tuesday
5.00
5
Wednesday
10.00
6
Thursday
13.00
7
Friday
14.00
15
on
on
your
Click
see
the
and
name
Summar y
the
the
Week
1
range
sheet
‘=SUM(Money)’ and
Click
to
A
B3:B7
and
press
sheet
and
as
in
Money.
cell
B3,
Enter.
change
Annissa
name.
on
that
the
the
Summar y
cell
has
sheet
been
and
updated
you
will
with
your
name.
16
Click
on
money
17
Click
the
for
on
averages
Week
one
the
and
of
1
the
sheet
change
the
days.
Summar y
total
and
sheet
to
see
the
updated
spent.
Sheet1
187
7
End
Multiple
1
2
3
of
choice
Spreadsheets
are
chapter
exam-style
questions
questions
most
useful
for
work ing
with:
6
A
pivot
table
that
uses
the
same
a
videos
b
payroll
a
pivot
c
networks
b
frequency
d
brochures.
c
one -dimensional
table
d
two-dimensional
table.
A
values
spreadsheet
is
a
grid
area
is
called
eld
in
the
row
and
a:
char t
distribution
of :
a
cells
b
rows
c
columns
a
bar
d
addresses.
b
column
c
line
d
pie.
7
Which
of
the
following
char ts
shows
the
data
horizontally?
Spreadsheets
allow
you
to
per form
calculations.
4
a
‘how
b
‘what
c
‘when
d
‘why
Which
loan
5
to’
8
if ’
the
following
functions
involves
calculating
payments?
a
moved
b
pasted
c
typed
d
written.
COUNTA
b
PMT
c
RANK
produces
d
VLOOKUP
.
except:
9
Consider
ii
iii
the
relative
following
terms:
addressing
absolute
naming
addressing
a
range
of
i
and
ii
b
i
and
iii
c
ii
d
i,
and
ii
copy
data
Each
of
the
of
Excel
data
in
is
a
AND
b
IF
c
NOT
d
OR.
following
the
into
a Word
the Word
iii
functions
automatically
outcome ‘ True’ or ‘False’ as
10
The
purpose
of
the VLOOKUP
related
iii
and
the
a
a
result,
data.
Which of the terms perform the same tasks?
a
inser t
document.
a
i
188
you
document,
is’
not ’
.
of
When
a
delete
b
nd
c
replace
d
summarise.
records.
function
is
to
7
Shor t
11
answer
Keith
is
End
of
chapter
exam-style
questions
questions
traveling
to
conduct
workshops
across
the
region
and
needs
to
keep
track
of
his
depar ture
and
arrival
dates.
1
A
B
C
D
E
F
G
TR_ID
Countr y
Arrival
Depar ture
Days
Claim
Day o?
2
6985
Guyana
05/09/2019
05/12/2019
3
6987
Trinidad
05/16/2019
05/20/2019
4
7295
Jamaica
05/25/2019
05/31/2019
5
7324
Barbados
06/15/2019
06/28/2019
6
7361
Antigua
07/13/2019
07/16/2019
7
7455
Belize
07/21/2019
07/29/2019
H
I
8
9
150.00
Fig 7.70
a
Cell
H9
has
purpose
b
Write
of
been
formulae
answers
to
named
naming
or
each
a
as
AMT.
range
functions
of
the
of
to
How
many
countries
ii
How
many
days
did
did
he
the
d
questions:
Keith
spend
State
the
calculate
following
i
Explain
data.
visit?
e
in
How
E
ii
Column
F
.
The
i
days
did
he
spend
travelling
in
is
the
longest
time
that
he
spent
ii
K eith
how
$150
overseas.
much
for
each
Using
money
he
day
AMT,
has
he
has
f
determine
In
cell
than
the
vii
ve
cell
Total
claimed
for
on
shown
c
State
seen
the
in
in
output ‘ Yes’ if
days
in
a
number
column
results
the
needs
D5
been
to
should
occurred
used
be
of
updated:
have
been
Explain
and
to
each
data:
06/18/2018.
has
a
he
has
countr y,
spent
more
other wise
of b
wants
times
G.
i
and
spreadsheet.
be
ii
Suggest
g
As
a
what
prevent
06/18/2019
what
type
checks
of
could
it.
ii
that
would
be
the
and
the
an
guide
to
the
spreadsheet
update
advantage
of
using
alternative
give
one
it. The
shown
and
a
when
le
is
he
stored
one
memor y
option
open
for
the
a
this
formulae
complete
and
for
disadvantage
exercise,
data
functions
can
stick.
one
practical
enter
b
access
he
disadvantage
leave
that ‘ Yes’ could
to
that
memor y
le,
of
so
Describe
blank.
the
of
have
Keith
i
G2,
in
error
travels
Antigua.
vi
date
of
for
what happens to the data currently in row 5.
claims
spent
columns
formatting
He needs to insert a row of data at row 5. Explain
overseas?
v
appropriate
spreadsheet
The
instead
many
What
following
Column
total?
iv
most
i
Antigua?
iii
the
of
blank
stick.
storing
this
spreadsheet,
question
in
his
option.
tasks a
and
to
d
use
as
a
spreadsheet.
189
7
Spreadsheets
12
Norla
is
preparing
to
A
submit
travel
information
B
that
C
she
entered
D
1
TRAVEL
for
in
the
spreadsheet
E
July
to
Sept
shown
below.
F
G
2019
2
3
Countr y
Arrival
Depar ture
4
Guyana
07/09/2019
07/12/2019
Days
Claim
3
150.00
450
5
Trinidad
07/18/2019
07/21/2019
3
450
6
Jamaica
07/29/2019
07/31/2019
2
300
7
Barbados
08/17/2019
08/19/2019
2
300
8
Antigua
08/23/2019
08/26/2019
3
450
Fig 7.71
a
State:
i
the
feature
that
ii
the
type
date
to
b
d
Write
the
a
Norla
of
State
an
it/they
ii
19 0
or
of
been
format
applied
that
Depar ture
formula
days
advanced
countries
the
has
and
number
uses
names
i
Arrival
function
average
c
of
to
she
lter
where
List
the
the
advanced
row
1
applied
spent
and
the
ii
the
two
which
that
lter.
would
be
Explain
that
days.
column
output
from
that
what
she
her
spreadsheet
two
her
Describe
who
procedure
does
Describe
recover
iii
to.
countries
i
travelling.
extract
realises
le
is
corrupted.
columns.
produce
to
she
to
been
spends
criterion/criteria
apply
has
Norla
lose
options
she
data
that
should
in
the
she
follow
so
future.
could
tr y
to
data.
one
could
not
computer-related
help
to
retrieve
her
professional
data.
A
PT
E
C
H
8
D ATA B A S E S
8.1
Introduction
to
dat abase
management
Examples
Manual
and
of
how
we
use
these
large
databases
include:
computer ised
◆
booking
◆
using
databases
holidays
an
online
products
◆
for
accessing
from
a
Although
a
large
Ver y
◆
e
more
of
way
and
of
requests
about
have
similar
dierences:
used
numerical
in
millions
information
for
text, whereas
work
of
items.
databases
main
in
range
database, with
want
often
handled
they
a
item
stolen
applications
often
tickets
search
who
or
three
complex
large
more
are
amount
handle
◆
ocers
are
to
computer
spreadsheets
Databases
air line
particular
suspects
features, there
◆
store
police
police
criminal
a
and
applications
spreadsheets
calculations
with
can
more
thousands
of
with
easily.
entries
are
databases.
the
background
is
dierent.
Fig 8.1 Data can be collected on index cards and stored in ling cabinets. In
W hen
you
work
in
a
spreadsheet, you
view
the
this example of a school database there are three ‘tables’ (les) of students,
data
teachers and grades
the
Nowadays, computerised
use, as
that
they
they
help
people
want. ey
databases
to
also
quickly
var y
in
are
nd
size
in
and
the
information
on
what
isrequired. Small
as
those
that
keep
information
be
run
on
a
personal
databases
now
play
about
a
any
program
how
our
society
retrieval
important
works. Industrial, commercial
organisations
use
databases
to
and
to
to
you
see
have
more
to
of
is
the
term
hand les
the
storage, modication
of
data, as
well
as
controlling
who
has
the
maintain
information. Database
programs, such
as
Access, L otus
Approach, FileMaker
available
on
personal
Pro
and
computers
and
their
people
to
create
their
own
databases
at
home,
ser vices.
computerised
information
that
Paradox, are
school
Other
display
–
and
allow
businesses
time
role
Corel
public
dierent
the
only
at
Microsoft
in
or
at
see
music
computer
an
report
entering
database, you
information.
access
home. Larger
a
are
a
database management system (DBMS)
and
collection, can
you
entering. In
databases,
for
such
are
use
A
depending
data
request
widespread
the
you
systems
databases
and
include
database
or
work.
ight
systems
in
public
libraries.
191
8
Dat abases
Table 8.1 Advantages and disadvantages of a computerised database
Advantages
◆
Can
Disadvantages
save
enormous
amounts
of
paper
as
well
as
ling
◆
space
◆
Data
The
computer(s)
can
easily
be
entered
by
keyboard
or
◆
scanners
If
the
then
◆
Speed
–
data
can
be
found,
calculated
and
sor ted
◆
◆
Data
can
◆
Data
needs
easily
presented
dierent
to
in
be
be
changed
entered
many
queries
and
only
dierent
and
updated
once,
ways.
repor ts
can
A
be
yet
get
can
whole
be
◆
range
Data
◆
Passwords
can
be
can
permission
data
with
to
be
elds
created.
restar ted
to
the
required
can
be
ver y
of
The
a
produced
of
Data
◆
A
◆
Databases
can
be
database
computer
a
access
database
even
only
can
after
paper-based
includes
le
can
can
be
par t
the
network,
is
not
working,
used
ver y
impor tant
to
hacking
database
computer
In
Making
into
le
the
can
some
program
can
cases,
backup
some
or
to
the
database
of
the
may
attempt
sometimes
by
data
corrupted
lead
the
copy
people
information,
become
virus. This
a
as
condential
or
le
infected
not
may
database
not
is
by
working
work
at
therefore
to
those
with
◆
There
is
◆
Some
databases
can
◆
Some
databases
require
often
a
limit
to
the
size
of
a
database
le
be
the
system
be
complicated
to
use
changed,
database
would
has
have
to
be
training,
which
can
be
much
time
to
be
spent
on
sta
costly
scratch
impor ted
is
be
essential
◆
◆
is
properly.
entr y
allow
computer
cannot
database
added,
A
from
on
set
use
structure
new
been
checked
or
database
access
illegally
all.
◆
computer,
the
Security
to
The
peripherals
ver y
quickly
◆
and
expensive
and
be
automatically
shared
of
a
expor ted
with
local
or
other
wide
to
other
linked
users
area
to
if
Data
may
be
stored
incorrectly
programs
others
the
network. This
Internet
Questions
1
Give
an
example
of
a ‘paper
b
database’
.
She
she
2
Give
two
examples
of
large
databases
that
might
then
to
help
members
of
the
to
store
week ly
the
from
amount
cake
sales
of
so
money
that
ever y
be
three
used
wants
receives
months
she
can
analyse
her
prots
using
a
public.
graphic.
3
Annissa
is
opening
a
small
cake
business.
Explain
c
whether
a
word
processor,
database
or
a
Annissa
items
would
be
suitable
for
each
of
the
wants
following
She
rst
needs
information
ordered
192
of
and
to
store
her
the
the
names
customers,
occasion.
and
types
keep
used
of
to
ensure
scenarios:
available
a
to
track
of
the
quantities
of
spreadsheet
contact
cakes
in
storage.
she
has
sucient
ingredients
Common
L et
◆
us
rst
e
examine
main
stores
what
purpose
this
data
in
of
a
a
makes
up
a
database
number
of
database.
is
to
store
related
dat abase
management
◆
A
table
◆
A
record
◆
A
eld
consists
of
consists
a
collection
of
a
8.2
features
of
records
number
of
elds
piece
data
data. It
is
the
smallest
of
that
can
be
les , more
stored.
commonly
called
tables.
BOOKSHOP
CUSTOMER
CID
LAST
PRODUCT
FIRST
PR-ID
DESCRIPTION
Rich
P3122
Pocket
Diary
Clips
Database
ORDER
COST
CID
PR-ID
$8.95
1128
P3430
10
QTY
$4.15
1128
P3639
500
$2.75
1128
P3902
50
$3.95
1138
P3745
100
$7.55
1145
P3122
5
1167
P3430
10
Table
1122
John
1124
Aks
Todd
P3429
Jumbo
1128
Tedd
Lou
P3430
Small
1138
Yod
Ed
P3639
Round
1145
King
Bev
P3745
Receipt
1167
Wall
Ann
P3899
Highlighter
$1.75
1170
Cain
Zed
P3902
Black
$1.25
Clips
Labels
Book
Pen
Record
Field
Fig 8.2 Database components
Figure
may
8.2
be
shows
other
relating
to
table
has
database
tables, but
the
Order. Each
a
about
three
are
bookshop. One
table
columns
is
made
with
up
eld
of
of
a
bookshop. ere
shown
the
tables
rows
names
in
of
that
the
is
database
record
e
the
that
called
records. Each
describe
records. Each
of
information
that
is
stored
in
each
the
units
of
8.3, the
Order
table
has
three
columns
names
CID, PR-ID
and
QTY, and
customer
the
with
product
row
ID
with
of
the
1138
ID
elds
Order
(Ed
P3745
Y
od)
of
table
data.
suggests
ordered
(Receipt
100
Book).
power
of
a
database
is
that
information
contained
in
can
be
searched, grouped, sorted
and/or
exported
with
–
eld
fourth
three
eld. In
elds
Figure
in
has
the
e
type
record
therefore
seven
rows
often
in
a
matter
of
seconds. In
Microsoft
Access, you
of
create
a
database
create
the
tables
by
to
giving
enter
it
the
a
suitable
name
data. Table
8.2
before
you
illustrates
ORDER
the
CID
PR-ID
1128
P3430
10
1128
P3639
500
1128
P3902
50
1138
P3745
100
1145
P3122
5
various
components
of
a
database.
QTY
Table 8.2 Database terms and denitions
Object
Components that make up a database (i.e. tables,
forms,
1167
P3430
10
1167
P3639
100
Database
Table
database
A
collection
such
PRODUCT
CUSTOMER
CID
LAST
FIRST
PR-ID
DESCRIPTION
Query
queries,
A
Asks
as
repor ts,
can
of
consist
records
students
specific
or
macros
of
and
multiple
about
a
modules)
tables
specific
topic,
vehicles
questions
about
the
data
in
the
COST
database
1122
John
Rich
P3122
Pocket
Diary
$8.95
1124
Aks
Todd
P3429
Jumbo
Clips
$4.15
1128
Tedd
Lou
P3430
Small
1138
Yod
Ed
P3639
Round
1145
King
Bev
P3745
Receipt
1167
Wall
Ann
P3899
Highlighter
$1.75
1170
Cain
Zed
P3902
Black
$1.25
Clips
Form
A
graphical
for
Labels
Book
Pen
user
inter face
designed
specifically
$2.75
entering,
displaying,
and
searching
data.
$3.95
This
$7.55
Repor t
is
an
alternative
to
entering
spreadsheet-like
view
Summarises
formats
or
quer y
and
data
data
from
in
the
either
table
data
Fig 8.3 The data in the Order table links to data in other tables
193
8
Dat abases
product
Creating
a
three
Before
you
or
create
the
database
and
its
tables, you
choose
an
eld
appropriate
name
for
the
database
its
purpose. en, provide
suitable
names
the
tables
based
on
the
type
of
records
–
programs
than
one
table
CID, PR-ID
a
dash
word
(Fig
8.3)
contains
and
QTY. In
some
or
makes
an
up
underscore
a
eld
is
used
name, such
if
as
names
First_Name. In
for
Order
that
more
describes
countr y. e
must
database
rst
a
table
that
will
others
they
can
be
written
together, as
be
FirstName.
stored
in
them.
Data
For
each
table
following
in
the
database, you
should
consider
types
the
e
components:
data
entered
◆
eld
name, which
◆
eld
type, also
database
identies
called
program
data
what
the
data
stored
type, which
kind
of
data
tells
goes
in
a
as
text, numbers
or
eld
length, which
perform
with
in
the
example
in
(also
eld
eld
is
operations
the
data
can
database
be
can
the
data. Again, using
the
Bookshop
Figure
known
8.3, the
as
eld
character
CID
or
would
be
of
type
alphanumeric), but
determines
the
size
of
each
would
be
a
Number. It
is
therefore
important
eld
work
out
the
data
types
for
each
eld. e
most
table
description
purpose
◆
what
of
dates
common
◆
as
kind
the
to
in
well
what
the
QTY
◆
as
determines
eld
Text
eld, such
type
of
the
to
allow
you
to
describe
data
types
are
shown
in
Table
8.3.
the
Table 8.3 Common data types found in tables
eld
properties, which
include
checks
that
the
data
valid.
Use this type ...
When the eld’s data is ...
Text
Long
(Memo
been
has
renamed
as
and
or
shor t
special
text
–
letters,
numbers
characters
Long Text)
Number
as
a
(also
numeric
known
Numbers,
for
example
12345
field)
Date/Time
Date – day, month and year information
(for example, 26/08/1992) including
time information (for example, 9:32)
Currency
Dollar-and-Amounts
$(Dollar)
Autonumber
A
number
as
Yes/No
as
a
logical
OLE
(also
Boolean
known
or
field)
Object
each
Only
a
or
£
that
record
one
of
checkbox
money
or
increases
is
two
to
of
(Pound)
€
–
(Euro)
automatically
added
values
(for
example,
tick, Yes/No, True/False,
On/Off )
Picture, video clip, sound file or object
from another program ( Windows only)
Lookup Wizard
Fig 8.4 When creating a table, it is impor tant to have the correct eld name,
A drop-down box that offers you a
limited choice of options for a data
type, length and description
entry
Hyperlink
Field
Attachment
e
be
Web
address
that
links
to
a
web
page
name
name
of
each
eld
meaningful. For
which
identies
example, you
should
the
data
not
should
have
An image, spreadsheet file, document,
chart or other type of supported file
that can be attached to a record; similar
a
to attaching a file to an email message
eld
labelled
referring
194
to
a
‘Name’, since
rst
name
or
you
a
would
last
not
name
of
know
if
it
is
someone, a
8.2
Field
all
important
database
tables
eld
attribute
require
you
to
is
eld
set
a
length. Not
maximum
Proper ty type
Description
Field Size
Limits
a Text
many
do. is
is
because, if
you
decide
the
maximum
length
of
a
eld, the
le
be
kept
as
small
as
possible
and
there
is
no
field
or
a
to
a
specific
Number
field
number
to
the
of
range
it
can
of
store
size
Format
can
features
in
numbers
advance
management
eld
characters
length, but
dat abase
Table 8.4 Proper ty types for elds in a database table
length
Another
Common
Controls
the
way
data
appears
in
Datasheet
wasted
view
storage
space. Also, the
kept
a
time
taken
to
process
data
is
Decimal Places
to
minimum.
Input Mask
ink
what
you
would
have
to
do
when
setting
Displays
a
Number
and
Sets
a
length
for
a
surname
eld. A
eld
length
pattern
of
would
be
right
for
those
whose
four
characters, such
as
that
decimal
fields
places
in
only
determines
the
input
of
data,
such
number,
as
the
for
hyphens
example
in
a
224-5860
surname
Caption
contains
of
four
telephone
characters
number
Currency
the
format
eld
set
‘Glen’, but
not
Specifies a label other than the field name that
suitable
appears in the table and on forms and reports
for
‘Ronald ’ (six
eld
lengths
stays
(5
30
–
characters). Some
for
example, 30
characters
characters)
is
long
even
tables
allow
characters. e
when
the
name
xed
Default Value
Displays
eld
a
specified
value
for
a
field
in
new
records
Smith
entered.
Validation
Limits the data entered to meet a certain
Rule
requirement. For example, you can specify that
the CustomerID field cannot be less than 1000
Field
Validation Text
descr iption
Specifies
in
Y
ou
can
enter
an
optional
description
for
each
an
error
the
Description
column
in
the
design
appears
on
the
status
bar
on
entering
brief
or
the
Field
data
a
form. Examples
comments
that
should
of
about
be
a
when
the
description
the
stored
purpose
in
eld
error
of
include
has
a
set
of
properties
the
eld
Required
Specifies
when
it.
that
control
the
However, you
to
set
or
you
can
change
create
display
any
a
table
the
property
in
Design
Design
view
at
properties
available
in
Field
quotation
Design
view
window
(Fig
8.4)
pane
depend
on
selected
types
are
in
listed
the
in
design
Table
grid. Some
of
the
the
can
Usually
e
8.4.
item
which
called
eld
the
must
is
used
to
eld
of
identify
primar y key eld
uniquely
identify
each
the
record
contains
record. is
. is
each
value
in
you
enter,
say,
900
in
the
the
field
data
whether
marks
(“
”)
is
no
data
up
retrieval
for
cannot
into
or
in
a
not
a
that
be
left
empty
record
you
field
field
can
to
in
enter
indicate
the
that
key
fields
of
are
data
in
a
record
field.
automatically
All
indexed
used
to
CID
eld
uniquely
in
the
identify
Customer
not
use
First
or
Last
eld
each
customer.
names, as
more
one
person
may
have
those
names.
property
need
of
database
particular
at
data
key
one
if
Speeds
example, the
be
would
think
Pr imar y
star t
of
than
type
example,
IDs
time
Bookshop
Properties
up
enter
Determines
Y
ou
the
entered
For
.
settings.
the
data
rule.
field
that
Length
table
e
appear
way
view
any
pop
you
primar y
when
the
to
message ‘Customer
Allow Zero
Indexed
properties
if
validation
CustomerID
proper ties
eld
want
is
there
Each
message
the
1000’ will
accessed
you
grid. e
the
description
tex t
eld
violates
in
the
eld
the
record. Using
an
and
is
your
key
the
you
for
a
what
for
nd
database
–
becomes
happen
if
that
a
there
more
number
are
than
unique
(key
clear
you
Smith. Smith
and
have
identication
eld
might
John
may
therefore, to
key
is
wanted
a
of
to
on
search
such
It
as
which
is
a
surname
Smiths
John!
reference
eld)
you
common
lots
one
when
in
better,
an
to
search.
195
8
Dat abases
Other
A
unique
is
keys
candidate key
can
also
unique. However, only
primar y
table
A
contain
composite
two
or
more
cannot
are
one
key. Candidate
may
be
a
key
is
a
primar y
a
primar y
eld
keys
none, one
the
must
are
or
primar y
elds. In
multiple
be
key
be
entirely
several
key
Bookshop
key
in
the
occurrences
of
1128
it
chosen
so
product
is
as
the
optional, so
of
that
if
done
same
that
and
a
customer
more
than
can
one
order
more
customer
can
than
order
one
the
product.
a
them.
made
up
of
database, CID
Order
and
table
1167
as
in
there
that
Fig 8.5 A composite key is a primary key that can comprise multiple elds
column. Also, PR-ID
Order
listed
table
more
composite
either
than
key
cannot
because
be
a
primar y
P3430
and
P3639
once. erefore, F igure
using
two
elds
CID
key
8.5
and
in
are
the
also
shows
a
PR-ID. is
In
a
database
more
a
where
tables, if
foreign key
it
in
is
the
a
the
same
primar y
other
eld
key
is
in
found
one
in
two
or
table, then
it
is
tables.
Questions
1
Put
the
following
smallest:
2
Explain
what
following
last,
3
rst,
State
terms
database,
in
eld,
descriptions
and
whether
PR_ID,
whether
order
record,
can
they
from
largest
to
table.
be
are
used
for
suitable
use
lives
f
centre
with
g
day
h
vehicle
registration
I
receipt
number
J
quantity
of
eld
of
the
following
eld
of
a
primar y
key,
or
foreign
candidate
It
is
impor tant
before
ID
printed
on
a
student ’s
school
b
student
ID
printed
on
a
student ’s
exam
structure
creating
of
a
database
one. The
is
to
contain
information
on
following
members
of
family. ‘Relation’ represents
what
relation
card
this
member
is
to
you,
such
as
sister,
uncle
or
self
product code used to identify the name of product
(meaning
subject
code
printed
next
to
each
subject
on
exam
code
is
Choose
an
adult
on
a
list
of
the
subjects
oered
the
this
or
most
a
child.
suitable
eld
type
for
each
eld
at
(see Table
the
whether
card
a
school
yourself!). ‘Adult ’ states
a
member
student ’s
g
the
star t
repor t
your
f
plan
you
key :
student
e
to
key,
a
d
ordered.
names
table
c
number
CID.
use
key
exam
names:
carefully
composite
mother?
code
the
6
represent
e
8.3,
which
shows
dierent
eld
types).
school
passpor t
driver ’s
ID
to
collect
licence
ID
to
student ’s
collect
exam
student ’s
b
Choose
c
Explain
the
maximum
eld
length
for
each
eld.
card
whether
a
eld
in
the
list
can
be
used
school
a
primar y
key.
If
not,
explain
what
eld
can
be
repor t
created
h
student ’s
receive
ID
and
subject
student ’s
grade
code
for
requested
that
Explain
why
a
primar y
key
(such
as
StudentID)
all
numbers
would
be
given
a
data
type
FirstName
of
text
and
not
number.
Relation
5
Identify
a
suitable
data
type
for
the
following
elds:
Month
a
subject
b
mobile
c
name
d
days
ID
Male?
number
Adult
196
of
school
absent
from
school
primar y
Field
that
LastName
comprises
the
key
eld.
subject.
Field
4
as
to
of
Bir th
type
Field
size
Key
eld?
as
8.2
Practical
Exercise
1
1:
Start
the
exercises
Creating
the
Access
Microsoft
dierent
a
using
Microsof t
Exercise
Access
depending
by
double-clicking
icon. ese
on
your
icons
version
of
may
on
1
Now
2:
Creating
that
to
2
you
to
provide
a
name
for
for
close
database, or
you
can
browse
to
open
database. Select
the
option
to
database
that
this
folder
if
and
database
you
do
type
is
not
the
saved
name
in
specify
created
to
on
the
create
the
a
database
so, then
delete
Access
Bookshop
database
table, labelled
as
le
program
called
you
Table1, may
right-click
on
its
a
are
be
label
it.
provides
table, quer y, form
or
options
report. e
to
create
Bookshop
will
require
three
tables, called
Customer,
an
create
and
Order. Each
table
is
created
in
a
Design
new
features
the
Product
existing
time
you. If
and
database
new
management
table
have
empty
Microsoft
a
requires
is
a
table. Depending
Access.
created
Access
you
database, it
look
using, an
2
dat abase
Access
database
program
Common
view.
Bookshop. Note
your
Documents
another
location.
Fig 8.6 Creating a database called Bookshop
Fig 8.7 Microsoft Access provides options to create a table, query, form or repor t
197
8
Dat abases
3
To
the
create
icons
Table
is
the
or
and
called
rst
table
labels
view
that
its
(called
will
Customer), locate
allow
design. For
you
to
now, the
Create
new
a
table
Table1.
Fig 8.9 Entering the design of the Customer table
6
At
this
value
point, you
uniquely
should
identies
choose
each
one
record
eld
in
a
whose
table.
Fig 8.8 Star t with a blank table in Design view
If
4
Click
then
in
the
press
choose
rst
Field
Enter. In
the
Text
the
description
the
Field
the
as
the
descriptions
area
your
to
and
Type
Enter
‘Customer
following
in
box
Data
type, press
Properties
size. Enter
Name
type
then
ID’. Click
type
eld
4
when
for
the
the
type
below
to
are
name
Field
type
Text
Customer
ID
Customer ’s
Last
First
Text
Customer ’s
First
the
the
calculations
other wise
are
the
chosen. Click
not
Use
the
eld
is
Text, since
performed
Number
data
again
the
on
on
type
CID
this
would
eld
8
eld,
Field
198
the
following
Size:
do
or
as
+
Key
S
to
the
Customer
and
that
no
CID
icon
save
one
exercise, make
number
this, select
Ctrl
create
key, meaning
four-digit
Primar y
table
dialogue
eld
. en
the
and
two
c lick
table.
click
OK
to
eld
box. Y
ou
have
created
your
table.
same
Bookshop
labels
Table
and
Enter
the
that
view
its
will
database. L ocate
the
in
allow
you
to
Create
a
design.
following
descriptions
be
name
or
this
eld
names, types
and
table.
and
Field
enter
primar y
this
to
Name
icons
CID
table. For
like
Name
7
the
the
would
key, Microsoft
Number
Text
that
a
primar y
Description
Last
Note
the
a
you
the
has
icon
Customer
5
if
same. To
Save
close
CID
you
eld
select
Name
Field
dene
save
item
the
the
table.
asks
CID
and
and
not
you
ever y
eld
names, types
do
Access
‘CID’,
column,
and
you
name
Field
type
Description
properties:
PR-ID
Text
Product
ID
Description
Text
Description
Cost
Currency
Unit
4
Validation
Rule:
Validation
Text:
of
product
>999
Customer
IDs
start
at
1000
cost
of
the
product
8.2
9
Make
as
10
PR-ID
primar y
key
and
save
the
table
12
Product.
Use
the
another
be
11
a
used
Enter
blank
to
name
Bookshop
table
create
in
the
following
descriptions
Field
CID
key. Select
same
the
Make
in
this
Field
database
Design
Order
eld
to
create
view. is
will
table.
and
table.
type
and
the
the
Shift
the
Primar y
elds
names, types
Common
PR-ID
CID
key, select
will
Key
have
dat abase
composite
row, then
the
icon
the
the
management
while
PR-ID
in
the
Primar y
primar y
pressing
row. en
Menu
Key
features
click
bar. Both
icon
next
to
them.
13
Save
the
table
as
Order.
Description
CID
Text
Customer
PR-ID
Text
Product
QT Y
number
Quantity
DISCOUNT
Yes/No
10%
ID
ID
from
inventor y
ordered
discount
oered
on
Product
199
8.3
Tables
and
should
be
coordinate
connected
to
Joining
enter
is
joined, so
the
same
means
the
you
in
you
to
related
can
create
dat abase
can
the
saves
in
create
data
you
all
tables
information
allows
from
that
information
tables. Joining
addition, it
queries
multiple
access
elds
you
several
of
in
at
is, a
from
the
many
tables. In
the
smaller, more
the
having
reports, forms
tables
t ables
and
database
ecient
le.
can
be
related
when
you
need
access
to
the
in
one
employees, or
one
record
matching
the
records
is
matches
employees
shown
Department
in
the
many
example, one
many
department. is
in
table
table. For
one
in
are
assigned
Figure
table
Employee
records
department
can
has
to
8.10, where
have
many
table.
tables
In
that
record
other
applications
such
as
Microsoft
Access, the
linking
of
data.
tables
is
is
called
shown
in
a
relationship. A
Figure
8.10
by
a
one-to-one
line
relationship
connecting
the
Relationships
two
e
linking
of
two
tables
can
occur
in
one
of
two
entities
with
relationship. A
with
◆
one-to-one
◆
one-to-many.
of
M
the
or
an
is
type
of
(1:1)
linking
understand
usually
takes
place
when
key
in
one
table
matches
the
one-to-many
innity
table. An
example
of
primar y
one-to-one
key
in
employee
has
a
personnel
linking
record, or
a
the
is
is
created
on
each
employee. In
one
record
in
the
Employee
table
Figure
that
in
many
Bookshop
who
8.10
record
in
the
PersonalRecord
links
with
a
with
a
when
foreign
key
or
primar y
a
key
combined
in
key
one
in
Fig 8.10 Linking common elds between pairs of tables
20 0
has
by
database
Order
ordered
linking
to
both
a
pairs
are
should
‘many ’ end
other
use
example
one
with
tables, how
which
of
that
you
the
do
you
product? is
tables
tables. ere
customer
elds. e
(1:M)
one
texts, you
and
product. Figure
table.
occurs
there
the
is
that
have
a
eld
can
is
related
place
one
or
data
in
more
these
orders
table.
their
is
denoting
shown
one
for
One-to-many
(∞)
is
there
tables, since
other
sign
relationship
personnel
common
is
the
that
achieved
record
of
the
identify
each
‘one’ ends
best.
Customer, Product
second
the
the
Using
primar y
denoting
relationship. Although
conventions
One-to-one
1
ways:
table
links
another
table.
8.11
primar y
shows
key
three
eld
is
tables
again
underlined
in
with
each
8.3
Linking
CID
LAST
FIRST
PR-ID
DESCRIPTION
Rich
P3122
Pocket
Diary
$8.95
Aks
Todd
P3429
Jumbo
Clips
$4.15
Tedd
Lou
P3430
Small
1138
Yod
Ed
P3639
Round
1145
King
Bev
P3745
Receipt
1167
Wall
Ann
P3899
Highlighter
$1.75
1170
Cain
Zed
P3902
Black
$1.25
John
1124
1128
ensures
that
the
multiple
data
in
dat abase
the
t ables
database
PRODUCT
CUSTOMER
1122
tables
Joining
remains
COST
wish
Clips
$2.75
Labels
will
a
as
possible. For
customer
not
allow
who
you
to
has
do
example, if
placed
so
until
you
orders, the
the
orders
for
$3.95
customer
are
deleted. at
way, no
order
can
be
$7.55
placed
Pen
accurate
delete
database
that
Book
to
as
without
having
a
customer’s
data
linked
to
it.
ORDER
CID
PR-ID
1128
P3430
QTY
10
1128
P3639
500
1128
P3902
50
1138
P3745
100
1145
P3122
5
1167
P3430
10
1167
P3639
100
Fig 8.11 Creating a relationship between pairs of tables for the Bookshop
database
Questions
1
Use
Figure
8.11
to
answer
the
following
questions:
DIVISION
a
State
whether
relationship
b
c
State
State
the
the
ordered
d
State
e
2
How
Answer
Spor ts
a
rst
of
key
names
have
in
of
each
the
a
one -to-one
the
of
the
customer
table.
customers
customers
questions
product
with
placed
based
on
Code
Category
U13
Under
13
U20
Under
20
O20
Seniors
relationship.
who
labels.
description
by
tables
one -to-many
primar y
many
the
or
round
the
ordered
pairs
ID
that
was
a
State
b
How
many
the
names
records
of
c
How
many
elds
d
In
the
tables.
1145.
are
in
the
Athlete
table?
orders?
these
two
tables
in
are
in
the
Division
table?
a
each
table,
state
the
most
appropriate
eld
database:
that
e
can
State
be
the
used
name
as
of
a
primar y
the
table
key.
and
the
eld
that
is
a
ATHLE TE
foreign
AthleteID
NameOfAthlete
121
Jade
231
Shade
Boyce
351
Neil
Skeete
Hall
Code
Gender
U13
F
U13
F
U20
M
key.
f
Identify
g
Explain
one
h
or
Figman
McJig
O20
whether
Eli
Jarad
U20
that
the
is
used
tables
to
are
link
the
linked
tables.
as
one -to-
Explain
whether
can
be
the
row
deleted
for
the
from
Under
the
13
Division
table.
M
i
187
eld
one -to-many.
division
142
the
Explain
whether
the
row
of
data
for
athlete
142
M
can
be
deleted
j
Write
the
k
What
division
from
name(s)
is
of
the
Athlete
the
seniors.
Athlete
231
table.
in?
2 01
8
Dat abases
Practical
Exercise
1
3:
Open
in
exercises
Linking
the
tables
Bookshop
exercises
1
and
in
using
the
Bookshop
database
2. L ocate
Microsof t
that
the
database
was
Access
6
toolbar
have
created
Customer
created
Database
Y
ou
7
Repeat
and
the
contains
the
Relationships
icon
relationship
Order
between
between
the
tables.
procedure
relationship
that
a
in
steps
P-ID
in
4
to
the
6
to
create
Product
a
table
.
and
P-ID
in
the
Order
table.
2
Exercise
Show
Table
icon
on
the
toolbar
to
make
4:
Linking
tables
in
other
databases
it
1
Return
to
the
previous
example
on
the
Sports
appear.
database.
3
Double-click
on
the
Customer, Product
and
2
Order
tables. W hen
you
have
nished
adding
Create
the
database
called
Sports, and
then
the
create
the
two
tables.
tables, clickClose.
3
4
Now
click
table
and
on
the
CID
eld
in
the
Link
enter
drag
it
to
the
CID
eld
in
the
Ordertable.
5
An
Edit
Relationships
(Fig8.12). Make
Integrity
press
OK. is
enforce
with
option
rules
and
sure
is
that
remains
the
ticked
means
so
your
valid
pops
Enforce
in
that
Fig 8.12 Enforcing rules on your data
2 02
window
the
data
up
Referential
checkbox
Access
is
the
tables
using
a
common
Customer
will
valid
throughout
its
and
help
to
you
start
use.
the
data
in
each
table.
primar y
key, and
Capturing
Y
ou
the
can
start
table
table. Another
you
database
to
sure
views
view, simply
corner
A
of
form
is
your
record
form
have
there
Access
and
to
in
is
table. It
and
a
ver y
good
means
of
will
to
you
a
give
data
in
to
enter
view
eld
of
as
in
and
(Fig
where
your
form
still
be
your
a
primar y
this
the
eld. To
Design
hand
all
8.13). It
you
table
a
work
the
as
on
if
in
have
elds
a
also
name
same
you
the
one
change
table.
many
in
is
with
the
means
you
can
dierent
changed
when
see
you
top-left
data. is
use
elds
in
screen.
Fig 8.13
If
you
keep
were
in
scrolling
Sometimes
related
you
useful
they
to
Field
Data
on
see
a
may
to
(Fig
Datasheet
that
create
with
are
on
wish
sub-form
along
to
you
data
may
the
all
form
8.14)
their
need
view, you
at
to
record
see
a
eld
the
see
in
the
far
for
would
left
one
one
orders
of
the
costs, quantities
have
and
form. For
one
You can enter data using a datasheet (top) or a form (bottom)
to
orright.
record
the
example,
customer. It
customer
showing
8. 4
dat a
completed
eld
data
entering
window.
the
also
can
a
the
table
both
same
form, it
in
enter
they
the
always
records
can
each
Datasheet
program
delete
table, but
into
button
way
have
allows
selected
is
the
the
you
view
data
representation
information
a
click
datasheet. Y
ou
from
A
that
another
add, update
a
you
once
view, Datasheet
raw
between
the
graphical
the
enter
table. If
key, make
switch
data
design. Design
database
allows
entering
and
data
products
ordered
with
is
a
ordered
and
whether
discount.
options
entr y
should
be
as
simple
and
quick
as
possible.
Fig 8.14 A form showing the customer ’s name along with a sub-form of the
is
is
particularly
hundreds
or
important
thousands
of
if
a
database
records. Data
products ordered, their costs, quantities and whether they are on discount
has
also
needs
to
In
be
accurate. To
help
with
this, you
can
set
the
most
values
options
for
elds. One
entr y
option
is
to
get
data
automatically
entered
into
a
eld. For
into
eld
could
automatically
enter
the
number
each
new
record
need
to
enter
the
same
a
eld
repeated ly. For
example, it
is
much
and
more
accurate
to
choose
a
product
from
a
than
having
to
type
it
in
each
time. A
value
0
list
for
also
example, the
list, rather
Q uantity
will
to
quicker
be
databases, you
entr y
(or
combo
box)
lets
you
do
this
by
choosing
a
value
entered.
from
a
list
(Fig
8.15).
2 03
8
Dat abases
Other
entr y
Instead
check
of
a
of
typing
box
tick
options
where
means
buttons, also
of
data
entr y
inputting
include
Y
es
a
or
tick
No
a
in
means
‘No’. Another
known
reduce
as
check
a
(Fig
eld, you
‘Y
es’ and
option
option
the
box
is
can
the
to
of
have
a
absence
have
buttons. ese
possibility
8.15).
error
radio
methods
when
data.
Questions
1
Explain
Design
2
the
dierence
view
when
State
the
name
of
table
that
allows
State
two
data
between
creating
the
you
a
graphical
to
Datasheet
view
and
table.
quick ly
representation
add
of
a
records.
Fig 8.15 Value lists are a quick and accurate way to enter data. Here a list
3
entr y
options
that
can
be
in
database.
used
to
is shown where only one product can be selected. A check box determines
quick ly
and
accurately
enter
data
a
whether a product is eligible for a 10% discount
Practical
Exercise
1
5:
Open
exercises
Enter ing
the
Exercise
using
Microsof t
Access
data
Bookshop
◆
database
that
was
created
3
and
1.
Double-click
To
switch
Design
on
views
the
Datasheet
◆
Design
:
:
and
the
click
view
view
types
Customer
between
view, simply
◆
data
modify
select
in
◆
2
To
the
to
datasheet
button
allows
allows
table
you
you
descriptions
to
into
in
to
open
and
the
your
To
delete
record
record
replace
select
the
a
it
if
and
with
you
eld
the
have
you
text
Record
(F ig
want
you
record, right-click
Delete
made
an
to
error,
update,
want.
on
the
row
and
8.16).
top-
enter
enter
it.
the
a
raw
elds,
database
table.
4
Click
on
shown
Datasheet
below
CID
into
view
the
and
enter
Customer
Last
First
1122
John
Rich
1124
Aks
Todd
1128
Tedd
Lou
the
table
data
and
save
it.
Fig 8.16 Deleting a record from the Customer table
5
◆
To
add
next
2 04
a
line
new
and
row, press
enter
the
Enter
or
select
information.
the
Click
CID
on
to
the
rst
record
112. Press
validation
rules
Enter
working
again
and
(Fig
and
you
change
should
8.17).
the
see
your
8. 4
Capturing
and
entering
dat a
Fig 8.17 Entering a number that is not valid results in an error message
6
Select
the
Product
table
and
double-click
to
open
it.
7
more
complex
create
Enter
the
following
1
Description
P3122
Pocket
Diar y
P3429
Jumbo
Clips
P3430
Small
Select
9
Enter
the
the
Order
basic
table
$8.95
three
$4.15
2
$2.75
and
Open
double-click
to
open
it.
records:
Product
ID
the
icon
3
QTY
P3430
10
1128
P3639
500
1128
P3902
50
Microsoft
form, and
a
Access
even
basic
does
a
is
provides
a
good
Form
of
database
with
tables. Each
the
table
Customer,
should
have
data.
Customer
the
table. en
Create
tab
and
in
the
then
menu
the
or
Form
option
in
the
creates
a
simple
form
using
all
of
the
Use
the
table.
form
to
enter
the
following
records
in
the
table:
Y
CID
form
ver y
Order
Discount
1128
Create
to
.
Customer
6:
Bookshop
and
ribbon, select
4
Exercise
steps
form:
records
Select
elds
ID
the
Product
Cost
Clips
following
Customer
these
records:
PR-ID
8
a
forms. First, follow
job
of
W izard
creating
for
a
creating
Last
First
1138
Yod
Ed
1145
King
Bev
1167
Wall
Ann
1170
Cain
Zed
2 05
8
Dat abases
Exercise
1
7:
Select
Create
the
the
table
the
table. en
versions
of
, which
More
Select
a
some
using
icon
the
2
form
Product
W izard. In
an
a
or
Forms
elds
quer y
option
needed
from
on
for
the
wizard
activate
the
Access, there
can
the
also
be
drop-down
Form
may
found
view
be
in
ribbon.
the
form
by
on
your
from
the
pane
to
them
Tables/Q ueries
form
(Fig
the
F ields
Selected
would
select
use
Available
the
pane. Y
ou
selecting
menu. To
use
>
elds
arrow
window
Fields
>>
the
if
to
in
window
you
are
you
want
move
the
in
them
left
the
right
selecting
all
8.18).
Fig 8.18 Using the Form Wizard to select elds
3
Click
4
Select
5
Y
ou
Next.
the
may
light
be
6
Click
7
Give
8
Y
ou
9
Enter
you
asked
background
to
if
wish
select
you
and
the
are
click
style
going
to
Exercise
Next.
you
desire. Use
print
your
a
form.
Next.
your
the
Order
1
see
the
name
your
following
Product
and
click
form.
data
Description
Labels
using
the
form:
Round
P3745
Receipt
P3899
Highlighter
$1.75
P3902
Black
$1.25
Pen
Completing
the
data
entr y
Use
the
Form
the
W izard
following
or
data
another
in
the
the
method
Finish.
Customer
Product
ID
ID
QTY
1138
P3745
1145
P3122
5
1167
P3430
10
1167
P3639
100
Discount
100
$3.95
$7.55
with
Order
Cost
P3639
Book
8:
table
enter
form
should
PR-ID
206
layout
Yes
to
to
table:
of
8. 4
Exercise
9:
Creating
1
Select
the
2
Activate
3
Select
the
Q ueries
move
form
Form
elds
a
from
the
pane
to
or
ll
14
Available
the
from
form
the
menu. Use
F irst
F ields
Selected
in
leave
for
quer y
CID, then
the
sub-form
table.
needed
table
a
W izard.
drop-down
the
with
Customer
the
selecting
a
and
Last
window
Fields
>
arrow
eld
in
window
to
names
the
in
Click
the
First:
June
25
for
and
the
entering
quantity
dat a
and
blank.
add
of
a
new
data
for
record. Enter
a
new
the
order:
Jar way
QTY:
the
to
record
1199
PR-ID:
left
icon
CID:
Last:
elds. Enter
discount
following
by
Tables/
the
those
the
Capturing
P3745
25
rightpane.
4
Practice
so
that
adding
the
additional
elds
are
elds
selected
in
from
the
the
tables
following
order:
a
Select
the
PR-ID
b
Select
Order
elds
the
Select
QTY
5
Click
6
If
the
and
(Fig
and
add
the
CID
and
and
add
the
and
add
elds.
Table
Discount
again
the
elds.
Next.
prompted, view
will
Table
Cost
Order
and
8.19a).
Product
Description
c
Table
be
able
to
see
the
the
data
by
form
Customer. Y
ou
and
sub-form
in
the
Fig 8.19a Selecting the Order table
preview
7
Click
8
L eave
pane
the
layout
form
and
11
L ocate
Finish
3
the
of
Add
in
the
to
record
customer
At
leave
3
L ou
as
the
the
name
(Fig
see
to
of
sub-form
as
Next.
Form
sub-form
Click
option
click
Customer
Order
13
and
Type
10
12
8.19b).
Next.
Datasheet
9
(Fig
of
name
the
of
the
main
sub-form
as
8.19c).
the
nal
view
the
form
(Fig
orders
for
8.19d).
the
Tedd.
bottom
of
the
form
you
will
see
Record:
7.
the
the
following
PR-ID
and
order
enter
for
L ou
Tedd. Click
P3745. e
Customer
Fig 8.19b Viewing the data by Customer – you can see the form and
ID, description
and
cost
of
that
product
should
sub-form in the preview pane
2 07
8
Dat abases
Exercise
contains
10:
Create
the
Team
a
form
and
for
the
Division
Spor ts
database
that
tables
TEAM
AthleteID
NameOfAthlete
Code
Gender
121
Jade
U13
F
231
Shade
U13
F
351
Neil
U20
M
142
Figman
O20
M
Boyce
Skeete
Hall
McJig
DIVISION
Code
Category
U13
Under
13
U20
Under
20
O20
Seniors
Fig 8.19c Naming the form and sub-form
1
Create
a
database
2
Create
the
two
appropriate
3
Select
4
Create
a
data
form
Sports.
tables, choosing
suitable
a
called
types
in
primar y
to
enter
each
key
the
the
most
table.
for
data
each
in
the
table.
tables
as
follows:
◆
Main
form:
Division
◆
2 08
and
Categor y
from
the
table
Sub-form:
Gender
Fig 8.19d The nal form showing the orders for customer Lou Ted
Code
AthleteID, NameOfAthlete
from
the
Team
table.
and
Searching
Computers
systems
have
since
important
they
automatically, to
sort
data
known
into
can
make
some
as data
advantages
work
extremely
calculations
useful
over
and
form. All
a
manual
quickly, and
to
retrieve
these
and
functions
are
list
of
can
it
run
quer y
will
you
realise
what
to
want
database
that
search
(conditions)
to
you
is
for
the
reasonably
must
for. Y
ou
nd, but
quer y
(also
a
tell
do
the
this
software
straightfor ward
program
by
search. Y
ou
the
known
question
is
as
using
searched
particular
giving
might
does
precisely
clear
know
not
–
once
a
lter or
ordered
Ann
Y
ou
as
the
to
nd
condition. A
‘List
round
and
may
that
match
you
the
have
needed. Even
if
you
add
condition
created
the
more
a
results
data
that
quer y, you
to
of
the
the
table.
W hat
data
◆
W hat
sort
is
data
in
a
all
the
quer y
is
the
rst
labels.’;
it
names
is
not
of
the
what
you
Q ueries
you
tell
it.
used
several
questions. W hen
a
queries
quer y
is
to
that
question
the
‘run’ it
(elds)
order
do
will
I
do
I
want
need
help
queries, ask
to
yourself:
ask?
displayed?
me
the
most?
To
can
search
a
be
as
simple
or
database, you
into
one
or
more
as
complex
must
elds
rst
for
as
enter
their
you
the
like.
search
tables. en
instruct
(for
dierent
produces
as
the
the
program
conditions
to
that
nd
you
all
have
the
records
set. For
that
example, to
match
the
products
with
orders
that
are
less
than
50, you
you
customers
results
ask
question
your
to
type
<50
in
the
QT Y
eld
of
the
Order
table.
who
example,
L ou).
make
design
database. e
records
the
to
criteria
until
search)
begin
◆
would
ask, such
as
updated
specic
nd
a
be
W hat
match
database
often
◆
you
answer
as
you
criteria
A
records
quer y. Once
8.5
sor ting
processing.
Searching
a
the
the
W hen
Searching
all
dened
and
First
Description
Lou
Small
Bev
Pocket
Ann
Small
Clips
Diar y
QTY
10
5
specic
Clips
10
output
Fig 8.20 Using the Query Wizard to select elds in a query
209
8
Dat abases
Fig 8.21 Creating a query to list the products with orders of less than 50
After
executing
records
e
that
the
were
comparisons
quer y, you
produced
that
you
may
from
can
see
your
make
one
or
more
search.
in
queries
is
inc luded
the
criteria
the
dollar
on
which
database
program
you
are
8.5
lists
some
common
operators
using
nd
one
e
to
word
nd
ones
want
up
210
‘criteria’ in
only
that
to
for
certain
do
not
limit
specic
the
specic
a
database
records
meet
the
results
criteria. If
a
and
of
your
record
records
means
you
ignore
others
criteria
inc lude
or
text
as
any
percentage
the
marks. For
quer y, you
those
result:
below
(the
can
the
illustrates
want
conditions). If
meets
not
($)
also
in
Table
formatting
symbol
8.5
that
such
as
(%). Any
criteria
is
enc losed
in
double
example, suppose
you
wish
used.
to
Searching
does
sign
results. Note
using.
quotation
Table
the
will
search
depend
in
you
set
criteria, it
the
specic
to
Small
how
with
Clips
you
eld
only
that
wish
costs, make
you
to
sure
ID
wish
the
only
in
you
see
can
their
product
those
two
the
wish
elds
to
produces
$2.75. Figure
P3430
where
other
see
P3430. is
costing
place
name
records. e
indicate
you
product
criteria
to
be
nd
row
the
selected
results
as
description
elds
8.22
are
(ticked)
well. If
and
the
selected.
8.5
Searching
and
sor ting
Table 8.5 Operators used in searching databases
Operator
Meaning
=
Equal
Example
to
“P3122” searches
that
>
Greater
<
Less
>=
Greater
than
>
than
Less
than
*
Asterisk,
or
or
equal
equal
to
used
the
>=
to
known
to
as
a
wild-card
represent
one
or
character,
more
can
5
searches
than
or
<=
searches
to
be
searches
the
product
product
cost
ID
number
field
to
find
all
products
with
ID
field
to
find
all
products
that
cpst
more
than
$5.00
< 5 searches the cost field to find all products that cost less than $5.00
than
<=
5
identical
5
the
to
cost
field
to
finds
field
to
find
products
whose
cost
is
greater
$5.00
the
cost
products
that
cost
less
than
or
equal
$5.00
“R*” or
characters
equal
begins
like “R*” will
with
R,
for
find
all
products
example
Receipt
whose
books
first
and
character
Round
or
letter
labels
Fig 8.22 Searching for a description for product P3430
Also
the
notice
elds
table
that
you
then
there
need
the
your
result. To
and
Figures
nd
press
8.23
those
that
and
and
products
you
the
begin
the
may
a
in
key
more
duplicate
on
Description
Pocket
one
from
records
the
in
design, select
table
your
than
in
deleted
quer y
other
‘R’ (F ig
selected. If
found
be
remove
show
cost
with
nd
table
are
should
table
Delete
one
quer y
select
8.24
that
only
tables
delete
table, right-click
table
for
other
quer y. Other wise
is
or
select
Diar y
Receipt
Book
Cost
$8.95
$7.55
Fig 8.23 Query to nd products that cost more than $5.00 and its result
the
the
keyboard.
examples
$5.00
of
(Fig
how
8.23)
to
or
8.24).
21
1
8
Dat abases
Quer ies
Y
ou
can
create
together
nd
the
than
$5
shows
more
more
than
customers
in
on
in
the
names. is
more
who
of
search
more
joins
the
two
queries
by
products
than
Access
criteria
one
row
example,
costing
less
100. Figure8.25
<5
and
but
queries
eld
linking
condition. For
ordered
Microsoft
same
than
complicated
one
quantities
how
placed
using
>100
under
with
are
their
the
eld
AND
operator.
Another
products
quer y
costing
quantities
of
Microsoft
labelled
one
are
the
is
OR
than
Access
as
in
$5
less
more
<5
the
in
the
same
More
$5
>100
‘or ’. It
criteria
result
ordered
products
are
not
the
joins
below
8.26
placed
does
or
row. is
than
OR
who
100. Figure
and
operator. e
or
customers
than
than
can
shows
on
row
two
be
how
two
matter
OR
the
with
in
lines
which
once
they
queries
saved
as
with
L ess
100.
First
Description
Lou
Small
Clips
$2.75
10
Ann
Small
Clips
$2.75
10
Lou
Round
Labels
$3.95
500
Ann
Round
Labels
$3.95
100
Lou
Black
$1.25
50
Pen
Fig 8.24 Query to nd the names of products that begin with ‘R’ and its result
Fig 8.25a Query to nd the customers who ordered products costing less than $5 in quantities of more than 100
212
the
‘criteria’ and
entered
not
nds
Cost
QTY
8.5
Searching
and
sor ting
Fig 8.25b results from query to nd the customers who ordered products costing less than $5 in quantities of more than 100
Fig 8.26 Query to nd the customers who ordered products costing less than $5 OR quantities of more than 100
Notice
since
if
that
elds
elds
in
these
were
from
queries
needed
the
all
from
Customer
three
each
and
tables
were
more
used
AND
table. However,
Product
tables
Order
table
should
not
be
deleted
or
OR
to
quer y. e
join
two
dierence
conditions
between
using
is:
were
◆
needed, the
complicated
since
AND:
Find
only
records
which
match
both
of
the
it
conditions.
is
linking
these
two
tables
in
the
database. For
example,
◆
suppose
the
Bookshop
needed
to
contact
all
OR:
Find
records
that
match
either
or
both
of
the
customers
conditions.
who
ordered
would
be
Product
Black
selected
ID
Pens. e
from
(PR-ID)
the
or
First
and
Customer
Description
Last
eld
names
table, while
for
the
the
Black
Reversing
Sometimes
could
be
selected
from
the
Product
table
and
not
not
match
to
nd
Lou. e
words
used
may
want
to
search
for
records
which
a
particular
criteria. For
example, you
may
table.
want
e
you
the
do
Order
quer ies
Pens
to
AND
link
two
and
OR
simple
are
the
only
conditions
ones
together
that
to
can
make
all
customer
keyword
NOT
orders
is
used
except
to
do
those
this
for
(Fig
customer
8.27a).
be
a
213
8
Dat abases
Fig 8.27a Query to nd all orders NOT placed by Customer Lou
Figure
8.28
is
to
used
shows
order
how
the
the
sort
option
in
Design
view
data.
Fig 8.27b Result of query to nd all orders NOT placed by Customer Lou
Sor ting
Most
databases
displayed
order
◆
in
you
which
a
will
let
specied
must
eld
you
sort
data
order. To
sort
so
a
that
it
is
database
into
an
specify :
in
the
database
you
wish
to
use
to
order
Fig 8.28 Design view showing how the last names of the customers can be
the
records
sor ted in ascending order
◆
whether
or
Sorting
you
records
records
in
order. Being
of
Microsoft
of
sorting
e
can
214
a
to
to
times
sort
a
sorted
A)
three
the
ascending
order
reorders
the
may
quickly
have
one
result
show
name
eld
Z)
Figure
8.29
option
in
shows
how
is
the
view
is
Sort
used
and
to
Filter
sort
menu
the
data.
one
on
or
sort
descending
of
the
your
more
remains
how
in
also
and
or
Datasheet
database
can
ascending
records
to
.
order. Y
ou
in
examples
last
(A
browse, update, export
data. However, the
by
in
database. Depending
Access, you
your
to
particular
using
following
be
(Z
you
and
able
of
records
temporarily
allows
numbers, dates
advantages
the
descending
le. Sorting
print
want
your
version
methods
the
same.
results
ascending
order.
Fig 8.29 Using the Sort and Filter menu option in Datasheet view to sort the data
8.5
Figure
order
All
8.30
the
these
uses
the
Sort
option
Searching
in
the
eld
and
sor ting
names
to
data.
methods
will
give
the
following
Last
First
Description
King
Bev
Pocket
Tedd
Lou
Small
Tedd
Lou
Round
Tedd
Lou
Black
results.
Cost
Diar y
Clips
Labels
Pen
Wall
Ann
Small
Wall
Ann
Round
Yod
Ed
Receipt
QTY
$8.95
Clips
Labels
Book
5
$2.75
10
$3.95
500
$1.25
50
$2.75
10
$3.95
100
$7.55
100
Fig 8.30 Using the sor t option to the right of the eld name to order the data
Questions
1
Select
the
sor ting
i
ii
most
data
suitable
as
A
to
options
that
describe
b
the
the
c
Write
descending
d
How
iii
top
iv
bottom
Use the
You
to
2
to
wish
to
shown
in
Figure
8.31
to
answer
3:
list
the
names
that
would
be
used
in
the
the
eld
would
to
name
the
list
and
criteria
the
the
criteria
change
products
if
that
for
the
the
quer y.
quer y
cost
$3.00
was
or
less?
top.
template
and
eld
changed
bottom
quer y
under
names
of
the
products
that
3
You
wish
to
list
on
discount.
a
Write
one
the
or
names
more
of
tables
the
that
products
would
that
be
are
used
in
cost
the
quer y.
List
the
$3.00.
b
a
List
quer y.
Z:
ascending
questions
2
of
Write
one
or
more
tables
that
would
be
used
eld
names
that
would
be
used
in
the
in
quer y.
the
quer y.
c
Write the eld name and the criteria for the quer y.
Fig 8.31 Query template
215
8
Dat abases
Practical
Exercise
1
Use
11:
the
exercises
Searching
Bookshop
and
using
Microsof t
sor ting
database
e
to
create
queries
f
the
names
b
the
products
c
the
names
discount;
d
all
the
of
products
that
the
sort
customers
the
216
of
by
cost
more
products
the
who
customer’s
that
last
name
ordered
name
cost
than
that
of
Black
g
all
customers
than
$5
in
customers
than
orders
$5
who
ordered
quantities
who
OR
except
of
ordered
quantities
those
products
more
than
products
of
placed
more
by
costing
100
costing
than
100
Customer
L ou
on
product
Pens;
the
less
$3.00
$5.00
are
the
under
the
less
to
list:
a
Access
sort
by
h
the
names
i
the
customers
‘ Y ’.
of
products
whose
that
last
begin
name
with
begins
‘R’
with
Calculated
A
calculated
e
value
more
eld
in
elds
this
is
a
‘ virtual
calculated
from
a
table
or
eld ’ in
eld
is
a
a
quer y
or
function
of
report.
one
or
In
this
syntax
of
a
calculated
eld
is
two
QTY ), and
quer y.
eld
e
case, the
involves
always
the
may
expression
elds
the
from
for
the
contain
$27.50
as
this
calculated
Bookshop
multiplication
8.6
f ields
table
operator. e
one
of
the
eld
(Cost
Total
calculated
and
Cost
eld
same:
results.
New
eld
name:
[Expression]
Mathematical
Calculated
For
example, the
Total
Cost
elds
syntax
with
for
the
numbers
calculated
eld
An
called
is:
aggregate
Access
to
perform
these
Total
Cost:
[Cost]
*
that
quer y
allows
you
specic
functions
is
are
functions
a
special
to
type
group
your
mathematical
shown
in
of
quer y
within
numerical
data
functions. Some
Table
of
8.6.
[QT Y ]
Table 8.6 Aggregate functions
where
Cost
is
the
cost
of
the
item
and
QTY
is
the
Group
quantity
ordered
(Fig
matching
values
in
a
field
are
grouped
together
8.32).
By
Note
Sum
that:
will
give
a
total
groupings
◆
ere
◆
Only
◆
e
must
be
a
colon
after
the
new
eld
in
eld
the
eld
names
names
must
are
be
table, other wise
enclosed
written
the
in
square
exactly
system
may
as
not
brackets.
they
are
will
give
fields
Min
will
Max
calculated
eld
name
(such
as
Total
be
a
meaningful
name
and
can
records
the
in
Group
this
By
field
for
the
field
return
average
each
of
all
records
in
the
specified
grouping
the
single
lowest
value
the
single
highest
from
the
group
of
will
return
the
value
from
all
records
grouping
Cost)
Count
should
the
within
within
e
the
in
records
recognise
them.
◆
all
name.
Avg
the
of
indicated
counts
the
number
of
entries
within
the
designated
contain
field
spaces
and
underscores
or
dashes.
Fig 8.32 Creating a calculated eld for the total cost of a product
217
8
Dat abases
To
use
quer y
an
aggregate
either
view. Add
click
extra
row
the
and
icon
SUM
e
total
criteria
then
nd
the
cost
(Fig
result. Save
of
the
the
the
from
quer y
to
to
the
be
are
a
the
By
for
Design
calculation.
causes
list
an
suitable
can
each
be
customer,
quer y, click
the
Cost
Group
Costs
using
a
viewed.
customer's
as
in
create
added. A
cost
in
rst
or
. is
total
eld
each
used
Group
results
8.33). en
function
cost
be
area
must
wizard
icon
from
the
the
can
Totals
function
adding
Totals
which
the
example, to
after
the
on
in
aggregate
For
activating
elds
Next
selected
by
function, you
By
order
of
on
eld
list
is
the
select
(Fig
8.34).
shown
in
the
Fig 8.34 Clicking on the Totals icon in the query produces an extra line ‘ Total’ in
Orders.
the design grid, where the list of aggregate functions is shown
Y
ou
can
choose
to
sum
the
items, giving
an
overall
Results
total
of
the
‘Sales’ and
items
click
sold
on
the
(Fig
8.34). Save
Datasheet
view
the
quer y
icon
of
using
the
SUM
aggregate
function:
as
to
Last
Total
Cost
King
$44.75
Tedd
icon
Table
again
to
perform
other
functions
shown
$2,065.00
in
Wall
$422.50
Yod
$755.00
8.6.
Calculated
Suppose
product
you
ID
calculated
wish
and
eld
this
Product
the
ampersand
contain
eld
a
Desc
[PR-ID]
(PR-ID
(&)
text
eld
description. e
expression
table
with
produce
called
case, the
the
to
its
Desc:
In
elds
syntax
for
the
the
is:
&
[Description]
involves
and
two
elds
Description)
operator. So, the
‘P3639Round
containing
Labels’ as
one
Desc
of
from
and
eld
the
may
calculated
results.
Instead
of
having
PR-ID
and
Description
run
together
Fig 8.33 The Totals icon is used to create aggregate queries. The icon is found in
the Design view of the query menu
in
the
new
separating
modied
Desc:
the
eld, you
two
may
parts. e
prefer
syntax
to
can
have
a
space
therefore
be
to:
[PR-ID]
‘P3639
218
Desc
Round
&
“ ” &
Labels’.
[Description]
to
produce
8.6
Errors
in
the
you
query
, you
parameter
elds
quer ies
Sometimes, after
run
Calculated
have
see
a
value’. is
incorrectly
and
your
misspelled
eld
created
dialogue
occurs
(Fig
calculated
box
when
database
name
a
asking
you
program
8.35). T
o
you
spell
a
the
and
to ‘Enter
eld
cannot
solve
eld
nd
name
the
problem,
Fig 8.35 A Spelling error in a calculated eld
simply
correct
the
spelling
mistake
in
the
eld
name.
Questions
1
Given
the
eld
Description
produce
a
Join
result
b
Join
is
Join
is
2
What
3
Using
is
similar
Exercise
similar
1
Use
a
the
b
c
nd
how
10%
the
New
pens
of
an
the
much
cost
name
the
elds
so
that
the
cost
error
produce
a
write
quer y?
calculations
Microsof t
discount
of
on
×
create
on
the
each
is
the
queries
deducted
cost
of
product
the
that
product
the
identify
e
calculate
Exercise
13:
5
Open
2
T
o
the
most
the
expensive
total
an
number
least
6
7
product
of
aggregate
Bookshop
a
activating
Add
the
cost
that
of
all
will
deducted
the
if
there
product
where
New
produce:
the
product
that
is
the
least
c
the
product
that
is
the
most
d
the
total
Click
on
number
orders
of
expensive
expensive
products.
the
Datasheet
in
Design
view
icon
view, in
a
to
see
new
the
eld
type
Cost:[Cost]*[QT Y ]
Remove
the
QTY
only
Click
Select
quer y
products.
checkmarks
that
Last
on
the
show
and
in
those
the
the
rows
columns
Total
Datasheet
the
Cost
view
icon
for
of
are
to
Cost
data, so
shown.
see
the
Last
wizard
name
icon
now
has
an
the
Group
each
Change
eld
the
on
extra
in
Group
line
By
the
By
the
Menu
bar. Y
our
‘ Total’ in
option
is
the
now
design
shown
quer y.
in
the
Cost
and
QT Y
database.
calculated
the
Totals
grid, while
under
quer y
query
, create
a
or
using
eld
in
the
to
Expression, and
change
the
Group
query, either
Design
in
the
Total
Cost
column
to
SUM.
view.
9
3
is
product
b
By
by
each
of
1.10.
function
columns
produce
where
results.
Creating
the
on
cost
total
and
8
1
×
the
ordered
Cost
discount
the
Total
if
where
is
on
×
product
a
that
product
the
much
mark-up
cost
results. en
to:
expensive
d
State
=
each
Quantity
how
discount
the
of
Access
1.10
the
nd
=
cost
to:
4
to
total
cost
10%
Cost
$1.25’
.
in
the
calculate
is
4
to
using
database
discount
=
that
f ields
mark-up
Cost
so
elds
Bookshop,
exercises
calculate
nd
called
elds
Jane’
.
Cost
nd
Total
to
c
Lastname
and
cause
Calculated
is
elds
Smith’
.
and
to ‘Black
Bookshop
there
calculated
Lastname
to ‘Smith,
typical
table
12:
and
Description
Practical
a
Lastname,
b
to ‘Jane
similar
the
the
create
Firstname
the
output
Cost,
Firstname,
following:
Firstname
the
result
c
and
the
the
names
Customer
Click
on
the
Datasheet
view
icon
to
see
the
table,
results.
Cost
eld
in
the
Product
table
and
QTY
eld
in
10
the
Order
table
to
the
Save
the
quer y
as
‘ Total
Orders’.
quer y.
219
8.7
A
quer y
Repor t
simply
selects
database. Often
elds
from
records
way
you
to
in
with
a
and
particular
may
records
particular
present
have
data
the
you
your
control
formats
that
in
the
kinds
of
minimum, maximum
in
found
and
or
report
and
the
is
only
the
some
display
an
the
eective
format, because
appearance
report
subtotals
from
display
printed
size
headings. F ields
dierent
are
a
records
to
order. A
data
over
want
can
including
be
of
the
grouped
sum,
average.
Fig 8.36 Example of a tabular repor t
Typically, a
report
◆
which
elds
◆
where
to
◆
the
◆
how
◆
what
statistics
from
the
in
tabular
columnar
are
(set
a
of
the
you
table. e
a
out
as
types
of
items
databases
things:
together
database
to
calculate
of
records,
formats
(Fig
form)
of
8.36)
(Fig
or
8.37).
printed, multiple
the
order
could
in
the
could
into
be
print
record
elds
provided
report
will
displayed
either:
a
is
what
the
be
example, number
page. Each
names
on
the
table)
report. Grouping
names
Most
be
as
table. Options
the
these
elds).
report
in
should
grouped
want
can
each
determine
eld
the
on
be
(for
of
out
(set
specify
elds
repor t
tabular
printed
in
on
a
you
reports
◆
you
records
should
values
◆
W hen
the
records
Standard
let
display
which
records
Standard
to
display
order
average
will
are
the
takes
report
used
are
to
each
by
group
at
will
a
line
the
top
let
printed
the
example,
the
on
one
divide
groups. For
grouped
up
printed
names
be
records
supplier.
separate
Fig 8.37 Example of a columnar repor t
page. Columnar
form. Usually
Columnar
such
22 0
as
reports
each
reports
tickets.
print
form
are
is
each
record
printed
often
used
on
for
a
on
a
separate
dierent
printing
page.
items
Creating
e
fastest
using
a
a
repor t
and
easiest
database
such
way
as
to
create
Microsoft
a
simple
Access
is
report
with
8.7
a
wizard
which
arranging
neatly
To
all
of
automatically
the
formatted
create
a
1
Activate
2
Select
elds
creates
from
a
a
table
report
or
Repor t
formats
by
quer y
into
a
report.
report:
the
the
Report
table
drop-down
or
menu
W izard
quer y
(F ig
on
from
the
the
Access
menu.
Tables/Q ueries
8.38).
Fig 8.39 Decide if you wish to group any elds
8
Decide
the
if
you
records
should
here. Select
to
choose
Click
wish
the
from
Next
to
to
sort
be
Last
any
elds
(Fig
sorted, identify
eld
ascending
to
or
be
a
sorted
8.40). If
sort
by
descending
order
and
click
order.
continue.
Fig 8.38 Select the table or query from the Tables/Queries drop- down menu
3
Select
the
report
by
Fields
window
Fields
window. Use
to
move
button
elds
elds
>>
the
to
4
Click
5
Depending
on
may
Decide
you
them
left
the
at
a
all
not
to
the
like
to
right
to
double
group
arrow
button>
arrow
once.
the
on
this
the
Selected
arrow
tables
options
see
at
in
Available
the
right
or
of
the
to
move
always
the
displayed
elds
number
would
8.39). Click
single
time
have
be
from
pane
the
button
the
may
data. Y
ou
(Fig
should
the
one
Next
if
in
move
database, you
6
that
transferring
next
in
screen.
your
how
to
view
your
option.
your
elds
button
>
to
Fig 8.40 Decide if you wish to sor t any elds
add
9
those
elds
to
be
grouped. Use
the
Priority
If
there
are
values, you
to
change
the
order
of
the
grouped
elds
if
one
eld
is
Click
Next
to
the
report
that
contain
numeric
can
choose
whether
to
apply
certain
functions
such
as
sum, average, max
or
selected.
min
7
in
more
summar y
than
elds
buttons
to
the
report. For
example, you
may
want
to
continue.
sum
the
Click
quantities
Next
to
of
items
ordered
(Fig
8.41).
continue.
221
8
Dat abases
Fig 8.41 Summary options can be added to the repor t
Fig 8.43 You can adjust the repor t if the elds are too wide
10
Select
want
the
and
layout
click
regarding
11
On
and
the
the
nal
select
to
mode. Click
Y
ou
may
print
and
Next
the
if
paper
there
orientation
or
screen, name
open
the
wish
to
it
are
any
the
style
the
typically
Finish
the
other
report
in
button
preview
orientation
you
(Fig
Print
to
options
desire.
8.42)
Preview
create
report
you
the
before
report.
you
it.
Fig 8.44 Order repor t after elds are adjusted
Fig 8.42 Finally, give your repor t a title
12
If
the
look
elds
of
the
mode
and
adjust
the
are
too
report
choose
width
wide
(F ig
you
the
adjust
8.43). Close
Design
of
can
view
or
the
Print
Layout
nal
preview
view
to
elds.
Fig 8.45 Order repor t with summary elds included
222
8.7
Pr inting
Once
your
printed
activate
or
or
the
report
it
print
to
processor. In
are
able
is
exported
the
export
to
a
ready
to
option
format
recent
export
to
your
O utlook. Rich
a
report
to
Word
is
a
as
word
(Fig
report
Microsoft
to
an
text
your
compatible
of
report
or
distributed, it
can
applications. Y
ou
versions
Microsoft
Microsoft
be
print
that
text, HTML
as
to
other
PDF
, rich
exporting
To
repor t
is
formats
email
a
be
can
to
with
a
a
printer
word
Access, you
such
as
common
processing
format
document
a
Select
the
2
Double-click
3
Use
4
Select
5
Y
ou
the
rich
will
6
for
Select
the
such
of
export
useful
to
to
rich
that
open
icon
text
be
the
to
report
V iew
location
via
report
1
Excel,
attachment
export
the
the
option
to
to
to
the
wish
has
to
export.
report.
Print
export
Preview.
the
conrm
report.
the
name
and
report.
open
operation
formats
format:
select
exported
option
view
you
and
prompted
text
Repor t
the
been
exported
destination
le
after
completed. is
is
report.
8.46).
Fig 8.46 Repor ts can be printed or expor ted to other applications
Questions
Consider
1
the
Explain
repor t
whether
type
shown
the
of
in
Figure
repor t
a
the
data
each
b
the
grouping
c
the
sor t
d
the
calculated
eld
e
the
title
repor t
f
how
is
8.44.
formatted
as
tabular
or
columnar.
Identify :
eld
eld
eld
of
many
the
products
Lou Tedd
ordered.
223
8
Dat abases
Consider
2
the
following
a
the
data
type
b
the
grouping
c
the
sor t
of
repor t.
each
Identify :
eld
eld
eld
Payroll
for
d
the
calculated
eld
e
the
title
repor t
f
the
summar y
of
the
function
used
in
the
repor t.
September
Depar tment
Last
Name
First
Name
Days Worked
Fees
Marketing
Summary
Betham
Milo
28
$4,200
Janis
Yannick
31
$3,720
Pimmot
Ross
28
$3,360
Rithmont
Cath
22
$2,640
for ‘Depar tment” (4
detail
records)
Sum
Human
Resources
Summary
Practical
Exercise
1
14:
Create
a
2
for
Jomes
Mike
28
$3,360
Steele
Jonat
29
$3,480
Ummer
Rain
28
$3,360
Human
report
using
Create
the
reports
b
Create
the
report
c
Group
the
elds
d
Sort
e
Use
by
g
V iew
Use
the
shown
block
are
the
using
records)
Sum
$10,203
Grand Total
$24,127
Microsof t
in
in
by
Bookshop
F igure
Figure
First
8.36
and
8.37.
8.43.
and
on
Last.
so
same
the
to
that
the
rst
and
last
row.
name
again
database
produce
the
elds
b
Group
c
Sort
d
Name
the
the
report
data
the
Order
Report.
that
a
you
created
report. (e
3
Create
a
Group
b
Sort
c
Name
NameOfAthlete
Jade
Boyce
231
Shade
351
Neil
142
Figman
Skeete
Hall
McJig
by
and
Categor y.
Gender.
‘Report
by
by
report
on
Athletes
by
Code
the
Sports
database.
Gender.
the
report
is
Gender
using
Categor y.
gender’.
in
data
another
here.)
121
by
report
DIVISION
AthleteID
Categor y, NameOfAthlete
Categor y ’.
report.
Sports
10
the
Use
Gender.
database.
TEAM
224
Access
a
the
layout
report
the
Exercise
detail
Description.
the
Give
(3
repor ts
a
f
Resources
exercises
Creating
names
$13,924
Code
Category
Under
13
20
U13
F
U13
U13
F
U20
Under
U20
M
O20
Seniors
O20
M
‘Report
on
Athletes
by
Impor ting
Y
ou
can
from
For
to
import
another
data
from
application
example, schools
the
national
another
into
could
sports
an
each
database
existing
send
association
for
a
database
the
write
le, or
If
database.
le
it
go
meet. is
data
can
then
be
database
so
that
the
imported
into
age
groups
can
be
organised
categories
of
the
data. It
is
also
without
possible
to
import
on
having
merge
or
more
database
data
the
Here
are
two
to
Name
your
a
import
importing
the
you
to
use
problems
if
to
Access:
One
way
using
one-word
typical
you
word, especially
eld
names, but
it
may
is
best
have
eld
names
with
more
the
words
in
if
there
are
spaces
between
If
to
the
possible, export
the
If
the
tr y
right-
select
Import. ere
are
many
which
application
you
wish
to
use
are
most
from
common
another
methods
Microsoft
of
Access
to
use
underscore
eld
name
or
import
a
spreadsheet
from
export
the
data
a
is
a
text
le.
database
using
database
or
the
copy
containing
a
and
paste
table
or
that
is
to
(_)
or
be
copied
(exported)
to
another
and
the
table
highlight
or
quer y
it. en
in
the
select
all
Database
the
data
them.
8.47)
and
click
on
the
Copy
icon. Open
an
Excel
simply
or
Word
document
and
paste
the
table
or
quer y
in
together.
the
◆
table. en
than
sheet
keep
the
give
(Fig
erefore, it
run.
names. Access
window
one
and
Excel
database. Find
you
long
table.
table, select
data. e
data
Expor ting
data
quer y
allows
the
records, then
(combine)
database
when
elds
a
choose
method. Open
◆
full
in
many
les.
to
hints
to
table
database, an
Impor ting
the
time
too
to
importing
two
import
save
not
sports
to
re-enter
and
will
elds, but
the
options
and
of
8.8
dat a
upcoming
click
association’s
linking
queries. is
lots
ahead
To
sports
some
has
and
small
test
amount
required
location.
of
data.
table
has
importing
lots
the
of
rst
records
10
and
but
last
not
10
too
many
elds,
records, then
Fig 8.47 Selecting all data in a table or query
Questions
1
What
is
the
impor ting
2
What
is
Access
dierence
another
to
between
expor ting
and
data?
method
a Word
of
expor ting
data
from
document?
225
8
Dat abases
Practical
Exercise
1
15:
Open
exercises
Impor ting
Excel
starting
at
and
cell
an
using
Excel
create
the
A1. Save
it
Microsof t
Access
f ile
e
following
as
Y
ou
can
append
worksheet
f
DAT
A.
Select
or, if
A
1
B
StudentID
choose
it
the
you
an
import
existing
worksheet
have
it
a
a
new
table, or
table
from
named
to
the
pop-up
range, select
window
it.
C
Name
g
Click
h
If
Next.
Age
2
1123
Angelo
16
3
2212
Shanico
15
4
3346
Franco
17
5
3358
Vanessa
16
you
get
contains
valid
les
should
be
formatted
a
message
some
eld
assign
Generally, spreadsheet
to
to
data
that
that
names, click
valid
eld
the
rst
cannot
OK
to
names. Y
ou
row
be
let
can
used
the
for
wizard
clean
this
as
up
later.
follows:
i
a
e
top
row
should
contain
only
row
If
the
not
or
b
eld
Either
to
remove
import
or
any
copy
cells
the
that
ones
you
that
do
you
not
the
le
do
j
Click
Open
Next.
k
Select
l
Y
ou
‘In
can
the
and
its
name
of
the
worksheet
and
new
change
while
Select
to
location.
iii
create
existing
a
new
database, or
open
one, depending
the
change
Click
on
where
you
wish
Excel
le. For
called
Data
this
example, create
the
tab
with
for
Excel
or
Enter
Y
ou
the
the
icon
to
Excel
version
the
not
the
name
visible
folder
import
data
type
data
and
the
of
of
in
Microsoft
the
the
where
for
the
226
select
it.
whose
clicking
eld
key
choose
the
and
will
Click
depending
name
you
anywhere
wish
in
that
name
and
which
click
will
be
Next. In
this
StudentID.
name
‘STUDENTS’ for
this
click
Finish.
receive
a
message
importing
the
that
Access
has
le.
le
If
the
it
is
Excel
le
was
not
formatted
properly, and
Access.
you
Import
OK.
on
wish
to
import
window, browse
located. In
this
spreadsheet
le
get
an
error
message, return
to
Excel
and
is
prepare
the
le
If
were
as
in
step
1.
to
exercise,
named
there
blank
lines
in
the
Excel
DAT
A
may
and
a
select
4
browse
of
option.
you
If
type
the
3
d
data
a
n
L ook
your
and
TEST
.
menu, activate
External
eld
by
primar y
nished
c
name
to
m
the
the
Next.
Choose
table
database
On
Next.
an
iv
b
click
importing:
the
example
place
table’ and
column
Access.
Either
a
le.
the
a
it.
to
ii
2
Headings’ is
worksheet.
Remember
the
Contains
wish
i
d
Row
checked, tick
eld
Save
‘First
names.
another
c
box
headings
wish
to
delete
these
‘records’.
le
you
Developing
Before
the
you
most
create
a
ecient
information
so
database
and
that
it
you
need
convenient
can
be
way
to
think
to
store
retrieved
in
the
W hen
about
you
the
it
want. Although
has
been
a
created, it
database
is
much
can
be
easier
modied
to
get
with. Points
to
consider
have
e
names
and
reports. Like
reect
the
of
your
it
put
some
right
e
way
any
which
can
be
other
you
example, names
run
the
names, they
information
elds
–
they
wish
store
the
of
people
title, initials
exibility
normally
should
have
at
and
last
name
–
to
in
using
the
data;
require
at
least
six
appropriate).
queries
the
tables
of
tables
might
information
be
you
are
e
names
of
and
elds
linked. T
ry
might
the
want
you
to
to
require
think
get
out
of
of
and
size. Y
ou
but
are
in
can
elds. ese
length, but
use
advised
A–Z
to
data
your
to
be
following
if
may
about
and
avoid
you
all
sensible
Y
ou
have
that
do
e
size
of
15
0–9
using
wish
names
the
be
is
in
a
the
up
to
more
your
spaces
to
separate
which
are
elds. For
eld
size
of
8
for
a
Text
harder
codes. at
means
more
than
eight
one
and
eld
table
all
e
type
of
data
to
that
sales
contain
text
or
specic
that
you
that
Y
ou
data
have
opposed
to
names. T
ry
might
stores
in
the
will
not
calculations, dates, currency, etc. is
decide
eld
want
to
consider
you
should
re-evaluate
with
to
a
large
the
might
number
same
of
elds
subject. For
contain
elds
with
your
customers
as
well
as
elds
information. Each
table
should
about
only
one
subject.
elds
that
are
intentionally
left
blank
in
many
records
those
records. is
because
they
usually
are
not
means
applicable
that
the
to
elds
in
another
table.
to
Y
ou
have
a
large
number
of
tables, many
of
which
the
same
types
to
elds. For
example, you
have
choose
tables
for
Januar y
sales
and
Februar y
sales,
eight-
to
be
that
to
or
retrieve.
for
local
customers
and
remote
customers, in
accidentally
need
numbers
data
and
you
store
the
same
type
of
information. Tr y
eld.
in
what
as
cause
names
be
used
will
the
information
about
a
single
in
one
table. Y
ou
may
also
need
to
add
an
in
be
eld, for
example
to
identify
the
sales
date.
used
can
help
for
each
use
all
aware
extra
calculations, as
mind
symbols. Use
cannot
entered. Y
ou
numbers
in
can
normal
subject
of
keep
self-explanatory
.
characters
be
to
problems
use, maintain
that
relate
table
consolidating
◆
pitfalls
database.
which
enter
to
signs
about
or
character
is
64
eld
example, you
eld
common
information
separate
a
database
design:
not
contain
◆
the
the
◆
choose
test
problems
database. ese
are
database
belong
underscores
reports
how
◆
characters
and
design
several
design
contain
◆
it
correctly.
example, one
number
if
that
elds, for
and
e
to
so
similarly,
◆
◆
database
give
name, street, town, county, postcode
(if
the
least
building/house
countr y
into
information.
your
addresses
database,
contain.
to
e
maximum
your
tested
Common
should
your
three
of
are:
you
For
structure
database, tables, forms, queries
information
in
the
to
ere
◆
up
should:
operating
◆
set
after
◆
begin
you
8.9
applications
format
◆
you
dat abase
you
Questions
eld. Y
ou
may
primar y
key
elds
as
Why
it
star t
to
2
Give
four
3
Why
should
1
Text
◆
e
elds
design
taken
if
they
of
to
not
forms. If
from, for
ecient
do
involve
the
example, a
design
your
information
paper
online
is
advisable
is
form, it
form
so
create
is
entered
in
the
same
is
that
order
the
paper
design
using
the
a
database
before
you
computer?
as
design
suggestions
that
relate
to
tables.
more
you
enter
sample
data
into
your
the
it
is
initially?
read
4
from
it
being
database
information
to
calculations.
Explain
one
common
design
problem.
form.
227
8
End
Multiple
of
choice
chapter
exam-style
questions
7
questions
Datasheet
your
1
When
a
customer
database
a
table
b
form
is
c
quer y
d
repor t.
makes
updated
by
an
online
using
hotel
book ing,
mak ing
a
payment
a
elds
b
raw
a
online,
the
database
real-time
c
HTML
d
e -commerce.
c
data
d
descriptions.
The
types
correct
database
view
similar
to
a
that
presents
spreadsheet
a
datasheet
b
design
d
data
in
a
format
Cost
of
the
following
in
a
d
description.
databases
and
columns
Price:
[Cost]
b
Price:
[Cost]*.10
c
Price:
[Cost]
d
Price:
Cost*.10
Data
can
×
a
eld
10%
be
×
[10%]
impor ted
to
a
database
using
any
of
the
except:
a
text
b
tab-separated
c
comma-separated
d
Por table
what
k ind
of
data
delimited
text
values
Document
(CSV )
Format
(PDF).
A
primar y
key
eld
that
appears
in
one
table
but
is
is
located
in
a
foreign
b
alternate
c
candidate
d
secondar y
data
types,
b
eld
names,
c
records,
records,
to
the
rows
refer
to
another
is
called
a(n):
key
key
__________.
11
is
BGI
database
form
a
types
do
questions
training
For
all
of
the
following
ways,
i
of
of
the
and
that
branches
to
assign
tasks,
would
be
in
update
the
its
trainers.
describe
most
suitable
use:
A
list
of
employees
workshops
a
add
upcoming
b
modify
Resource
c
merge
d
delete.
ii
with
needs
following
application
recent
except:
company
company
workshops
each
one
names.
can
a
schedule
records
eld
answer
key.
Caribbean. The
records
data
Shor t
key
__________
to
228
Price
in
is:
denes
tables
refer
a
A
item
length
and
6
called
an
database?
name
d
eld
of
type
c
In
a
cost
repor t.
used
5
for
the
is:
a
also
b
of
print
Which
a
syntax
10%
that
10
4
database
calculates
following,
c
into
mode
b
is
__________
in:
batch
The
enter
is
9
3
to
data
named
updated
you
the
which
When
allows
table.
a:
8
2
view
database
are
workshops
Director
Payments
who
along
for
of
travel
calculated
for
have
with
are
sent
each
and
completed
a
to
the
of
Human
business.
hotel
monthly
schedule
accommodation
salar y
payments.
8
iii
Flyers
are
produced
to
adver tise
End
of
chapter
exam-style
questions
new
TABLE:
SCHEDULE
workshops.
TR_ID
iv
Electronic
payments
company ’s
v
A
list
is
online
needed
par ticipants
workshops
or
b
not
Identify
who
in
be
payment
to
store
each
that
can
made
on
along
completed,
would
computer-related
be
responsible
for
Arrival
Depar ture
G10
6985
05/09/2019
05/12/2019
V31
6985
05/09/2019
05/12/2019
V31
6985
05/16/2019
05/20/2019
K21
6985
05/16/2019
05/20/2019
V31
7295
05/25/2019
05/31/2019
G10
7324
06/15/2019
06/28/2019
K21
7361
07/13/2019
07/16/2019
G10
7361
07/13/2019
07/16/2019
V31
7455
07/21/2019
07/29/2019
G10
7455
07/21/2019
07/29/2019
all
with
ongoing
completed.
the
COID
the
screen.
data
countr y
were
via
professional
managing
databases.
c
The
trainers
designed
related
use
for
a
materials
Suggest
the
during
general
pack age
that
whether
it
is
special
program
par ticipants
could
to
the
type
be
of
used
o-the -shelf,
that
access
was
course -
workshops.
application
and
explain
customised
or
Fig 8.50
custom-written.
a
12
State:
A database was used to store requests for training
i
the number of records in the Company table.
and assigning trainers. The three tables in Figures8.48,
ii
the
data
type
of
the TR_ID
eld.
8.49 and 8.50 show a sample of the data.
b
Copy
to
TABLE:
the
draw
the
links
in
Figure
that
8.51
create
and
use
it
relationships
COMPANY
between
CO_ID
diagram
Country
Company
6985
Guyana
Rumaba
56
6987
Trinidad
Mariob
45
7295
Jamaica
Cour tstreet
87
7324
Barbados
Ever yInc
42
7361
Antigua
St.
50
7455
Belize
Maggow
pairs
of
tables.
NumtoTrain
Micks
68
Fig 8.51
Fig 8.48
TABLE: TRAINER
TR_ID
FName
LName
Subject
G10
Georgia
Inns
Management
K21
Keith
Kettis
Housekeeping
V31
Van
Hall
Accounting
Fig 8.49
229
8
Dat abases
c
Consider
created
the
form
using
the
in
gure
8.52,
which
was
d
database.
A
letter
is
sent
scheduled
i
ii
in
Identify
Which
to
companies
Antigua
the
and
workshops
word
that
processing
appropriate
to
send
with
training
Belize.
will
feature
letters
to
be
is
oered.
most
those
companies?
iii
Indicate
other
the
elds
name
would
of
the
be
table
required
and
for
what
the
letters.
e
State
the
elds
following
i
Fig 8.52
What
were
ii
i
Identify
the
names
of
the
two
sections
of
Who
and
criteria
for
each
of
the
questions:
are
the
names
requested
are
the
by
of
the
workshops
that
Maggow?
trainers
scheduled
to
travel
the
before
5/15/2019?
form.
f
ii
State
the
total
number
of
trainers,
Identify
the
calculation
Georgia,
as
shown
in
the
State
the
name
calculates
Georgia
iv
Write
the
23 0
be
formula
the
be
in
the
total
would
calculate
would
the
of
function
number
of
that
par ticipants
training.
(named
number
Belize.
of
feature
that
per forms
the
in
par t e.
form.
g
iii
database
including
DAYS)
days
that
that
will
Georgia
Determine
the
results
of
the
questions
in
par t e.
A
PT
E
C
H
9
PROBLEM
9
.1
Introduction
Software
tell
is
the
(instruct)
therefore
name
the
given
to
hardware
includes
to
computer
how
computer
problem
to
programs
that
that
create
2
Execute
application
problem
rst
software. Each
existed, and
a
program
solution
was
exists
because
needed
the
3
Maintain
should
a
to
develop
problem. An
now, let ’s
an
algorithm
which
results
your
algorithm
is
in
a
a
to
focus
on
the
sequence
of
solution. If
is
vague
and
has
conicting
you
rst
the
algorithm
phase.
problem
following
summarise
precise
a
the
correct
solving
logic, you
Specify
the
the
rst
1
Clearly
2
Propose
is
usually
broken
into
two
phases.
a
or
more
Design
phase, there
dene
the
solutions
the
most
to
are
ve
general
steps:
2
Specify
problem
that
you
want
to
and
evaluate
each
reasonable
algorithm
that
out
your
to
solve
the
a
precise
and
works
must
correctly
as
phase, there
be
sure
output
are
you
Will
this
output
be
output
in
program?
readable
Will
it
and
text, or
form
be
or
is
it
displayed
even
for
on
a
can
copy, printed
input:
If
specify
you
what
or
stored
know
values
what
are
in
a
the
le?
output
needed
for
the
can
be
captured
by
an
from
a
input
device
secondar y
such
storage
or
even
entered
via
voice
recognition.
the
processing:
W hat
processing
should
done
before
you
on
the
input
to
get
the
necessar y
output?
your
can
write
example, what
calculations
are
needed?
Is
the
a
your
are
three
main
grouped
algorithm
as
the
data
is
as
a
batch
or
completed
in
real
captured?
using
programs
also:
steps:
a
Specify
the
storage:
Determine
how
the
data
and
programming
even
such
as
phase
4
language
this
soft
the
Specify
Most
Translate
of
it.
Implementation
1
program?
keyboard, transferred
time
this
this
another
processing
for
In
kind
well
For
program
objectives:
problem.
algorithm. Y
ou
algorithm
and
solution.
is
be
Test
organise
to
one.
3
thought
specify
meant
solve.
device
an
to
is
phase
as
Select
used
numbers, text, numbers
Is
input. Data
4
are
output: W hat
from
graphic?
is, you
3
steps
should
program
answer.
monitor
In
four
the
will
input
Algor ithm
problem, you
your
one
Problem
a
is, what
program’s
expecting
get
analyse
objectives, that
do. e
solve
1
algorithm
5
program.
solve
problem
rst
instructions
not
code.
a
W hen
the
DESIGN
problem.
Solving
Y
ou
program
the
Dening
that
PROGRAM
system
For
and
AND
solving
work. Software
programs
S O LV I N G
BASIC, Pascal, C
or
the
information
or
results
will
be
stored
V isualBasic.
temporarily
or
for
future
use.
231
9
Problem
solving
and
program
design
Example
Input–processing–output
Y
ou
(IPO)
IPO
◆
charts
inputs:
are
the
used
to
identify
information
to
the
the
outputs:
An
IPO
with
steps
desired
the
chart
three
you
temperature
by
temperature
readings. Y
ou
need
to
solve
the
the
average
needed
to
convert
the
component
goal
is
of
not
the
problem
actually
a
chart, but
column
input, output
is
not
given
information
and
minimum
then
calculate
and
output
IPO
chart
is
shown
below.
Processing
Output
max_temp
Calculate
average_temp
a
table
min_temp
(max_temp
represents
usually
and
processing. e
documented
in
+
min_temp)
/
2
three
the
3
storage
Read
chart.
a
a
problem
do
is
the
you
of
goal
nding
or
the
output?
sum
of
number, add
10%
and
output
the
result.
Processing
W hat
result
three
Output
or
goal
a
number
input
is
input
result
which
is
the
sum
of
made
up
of
the
values
=
number
*
(number
*
0.10)
result
1.10
steps
are
needed
to
the
goal(s)
or
output?
e
4
the
regular
price
of
an
item;
calculate
the
of
amount
at
20%
of
the
regular
price
and
convert
also
into
+
the
discount
numbers. W hat
input(s)
number
have?
is
numbers. e
=
OR
Input
the
maximum
Input
Example
output
three
using
1
numbers. W hat
the
average
solution.
number
three
the
temperature:
completed
Input
Example
e
nding
input
Example
are
of
outputs
columns. Each
components:
Y
ou
problem
the:
e
◆
the
(max temp + min temp) ÷ 2
processing:
data
given
char ts
problem
◆
are
2
the
item’s
discounted
price. O utput
the
discount
processing
amount
and
the
discounted
price.
requires:
◆
◆
the
input
adding
of
the
the
three
three
Input
Processing
Output
regular_price
discount
discount
numbers
numbers
together
and
saving
the
=
result
◆
the
Notice
as
a
single
output
that
of
the
number
the
sum
of
processing
0.20
*
regular
discount
the
numbers.
column
=
is
written
is
shown
amount
price
amount
price
regular
discount
price
–
discount
amount
price
in
Questions
English. e
completed
Input
Processing
number1
Add
the
IPO
chart
below.
1
Explain
2
What
the
two
major
phases
in
problem
solving.
Output
three
numbers
Result
of
the
do
the
letters
I,
P
and
O
refer
to
in
an
IPO
addition
char t?
number2
together
3
Explain
4
Show
the
purpose
of
an
IPO
char t.
number3
Y
ou
can
follow
an
IPO
chart
by
reading
each
The
from
left
to
right. For
example, the
input
that
you
input
three
values. In
the
you
add
column
outputs
the
the
values
result
that
of
were
the
input. e
addition.
third
select
order
solution
design
iii
dene
iv
test
v
232
correct
are:
processing
ii
column
steps
column
i
indicates
the
column
algorithm
problem
algorithm
propose
solutions
when
solving
a
problem.
Algorithm
To
help
the
simplication
and
development
of
the
Var iables
programming
problem, algorithms
can
be
created
or
algorithm
required
have
a
to
set
is
a
set
obtain
of
of
the
rules, be
step-by-step
is
explain
solution
explicit
to
a
and
problem. It
have
a
clear
really
used
to
expand
the
variable
that
instructions
must
holds
Both
of
the
chart
or
English-type
using
diagrams
for
the
a
should
keyword
major
ver y
start
undertaking, so
important. It
requirements
the
same
some
is
of
general
algorithm
a
for
title
usually
stored
when
it
is
input.
should
that
a
contain
is
an
area
program
text
or
or
space
might
numerical
in
use
memor y
or
manipulate.
values.
is
for
a
type
that
of
variable
where
algorithm. Examples
the
of
values
constant
do
not
values
owchar ts
and
end
program
algorithm
3.14
for
pi
(π), 0.175
for
value-added
tax
(V
AT )
or
may
to
can
be
satisfy
complex
algorithms. A
all
at
and
solutions. However, there
designing
e
is
completely
be
for
a
year
of
birth.
with
design
possible
algorithm
problems
in
a
always
good
complex
goals
good
not
a
time. Some
require
is
pseudocode. e
END. Developing
the
hence
with
constant
data
constant
2002
algorithm
data
‘processing ’ part
are
statements
or
could
change
IPO
how
stopping
A
point. It
constants
owcharts.
A
An
and
as
Let ’s
pseudocode
9
.2
design
are
good
values
in
a
variable
algorithm
as
names
number
name
text
are
so
to
that
them
Variables
types
of
data
you
and
is
data
are
change
throughout
processed. Examples
and
can
total. Each
assign
refer
typically
can
to
store
values
shown
in
variable
values
them
such
later
of
Table
of
a
to
given
a
numbers
read
given
variable
is
as
the
the
or
values.
type. Some
9.1.
be:
Table 9.1 Basic data types
◆
cor rect:
it
inputs!)
should
and
response
or
accept
output
a
all
inputs
correct
(even
answer
or
invalid
Data
meaningful
type
Integer
Description
Examples
Integer
63,
or ‘whole’
numbers,
message
positive
–12,
0
or
negative
◆
simple:
each
step
of
the
algorithm
should
perform
Real
one
logical
step
in
solving
the
Numbers including
12.63,
0.5,
–8.0
problem
fractional numbers,
◆
clear:
the
algorithm
should
be
easy
to
read
and
positive or negative
understand
Character
◆
precise:
the
algorithm
should
present
the
A
single
such
steps
precisely
low-level
◆
easy
to
easy
and
(program
implement:
to
translate
concisely
code)
the
into
without
a
referring
to
as
should
be
relatively
programming
language
should
the
as
a
alphabet
details
algorithm
character
‘G’
, ‘b’
, ‘*’
solution
String
A
shown
letter
or
on
collection
such
as
a
of
the
punctuation,
a
of
keyboard
characters
word,
phrase
“A+” or “Good
Job!”
or
sentence
◆
ecient:
the
algorithm
enable
program
Boolean
code
the
to
produce
problem
results
size, and
quickly, depending
not
waste
any
Can
contain
two
values
only
one
of
TRUE
or
FALSE; YES
on
memor y
or
NO;
MALE
or
NOT
or
MALE
time.
Now
that
should
terms
you
have
become
apply
to
been
familiar
both
introduced
with
some
pseudocode
to
algorithms, you
terminolog y. ese
and
owcharts.
Y
ou
should
programs
review
so
the
variables
use
meaningful
that
logic
will
be
if
of
you
the
easy
or
someone
data
to
variable
being
names
else
in
your
needs
to
processed, then
remember
and
the
understand.
233
9
Problem
solving
and
program
design
a
Statements
and
number
between
corresponding
A
statement
is
a
description
of
the
processing
that
an
action
or
condition. Instructions
within
are
or
are
called
keywords
Examples
of
carr y
Using
WRITE.
times
the
decisions
to
out
of
an
in
the
program. is
includes
be
made
be
want
executed
a
set
of
conditions
(carried
deciding
out). For
statements
are
returning
the
which
to
statements
example, you
execute
only
if
the
week. Other
subroutines
instructions, such
as
printing
the
saves
writing
conquer’ or
method
goal, and
manageable
the
then
same
of
several
focusing
separating
components
top-down
code
design. e
is
on
the
called
‘divide
individual
in
can
even
be
tested
in
isolation
to
check
are
that
to
then
invoice.
main
into
subroutines
a
of
program. is
program’s
and
allow
day
subroutines
program
statements
Conditional statements
and
keywords
INPU T
, READ, OU TPU T
, DISPLAY, PRINT
Conditional
5
the
headings
statement
and
can
might
include
1
keywords
they
correctly
perform
their
function.
might
certain
met.
Questions
Loops
1
L oops
are
is, they
until
from
to
will
the
a
see
useful
for
repeated ly
end
you
must
have
after
the
block
is
of
is
a
of
have
a
method
the
returned
statements
program. at
of
order
for
the
the
rst
to
State
whether
the
following
statements
are
true
or
false:
program
exit
a
An
algorithm
can
b
An
example
c
Flowchar ts
use
English-type
d
Flowchar ts
use
specic
e
A
of
be
written
pseudocode
as
is
a
pseudocode.
owchar t.
sentences.
checking
task. Once
to
in
a
section
satised. In
completed
terminates, control
parts
execute
condition
loop, you
if
repeating
a
symbols.
loop
owchar t
can
be
developed
into
an
algorithm.
statement
2
Explain
the
purpose
of
3
Explain
the
dierence
using
a
variable.
loop.
between
a
variable
and
a
constant.
Subroutines
4
For
by
big
programs, it
separating
ese
the
sections
‘modules’ or
section
of
a
to
perform
of
the
is
easier
algorithm
are
known
program
a
given
that
set
of
work
into
as
‘procedures’. A
to
on
small
individual
sections
can
be
is
a
repeated ly
instructions
by
it
returns
a
the
b
someone’s
current
c
a
d
is
e
your
mobile
called
other
it
day
234
another
part
of
the
program, such
suitable
data
type
for
each
the
year
height
phone
or
number
night?
on
blood
type.
For
each
of
the
descriptions
in
question
information
as
of
parts
suitable
to
most
named
5
program. Sometimes
the
following:
sections.
‘subroutines’, ‘functions’,
subroutine
State
accepting
variable
name
to
store
the
data.
4,
suggest
a
9
.3
Pseudocode
Pseudocode
is
English-type
to
be
the
easily
same
programming
and
converted
phrases
into
code, but
that
are
uses
clear
programming
Example
to
and
loops
create
the
described
in
instructions
the
for
code. It
uses
Pseudocode_5a:
INPUT
number1
INPUT
number2
INPUT
number3
programming
a
problem. Pseudocode
solution
to
can
also
number1
from
an
IPO
chart
to
specify
what
+
number2
+
number3
be
OUTPUT
developed
Add_three_numbers
previous
Add
a
5
enough
statements, keywords, variables, conditional
statements
section
not
words
data
result
of
number1
+
number2
+
is
number3
input
L et ’s
and
rst
processed
review
into
the
information.
IPO
chart
that
END
nds
the
sum
pseudocode
of
If
three
of
the
three
variables
that
contain
the
three
numbers
numbers.
have
Input
Processing
number1
Add
number2
together
the
the
Output
three
numbers
The
result
of
the
line
the
same
data
statements
as
shown
to
in
type
input
the
(for
the
example, an
values
updated
can
be
pseudocode
integer), then
placed
on
one
below.
addition
number3
Note
that
number3
the
will
variables
store
the
number1, number2
rst, second
and
and
third
Pseudocode_5b:
Add_three_numbers
INPUT
number2,
Add
numbers
number1,
number1
OUTPUT
+
number2
result
of
+
number3
number3
number1
+
number2
+
number3
that
are
input.
END
e
processing
explaining
values
how
that
number2
column
column
the
were
and
data
input
that
is
are
the
short
the
variables
added. e
result
of
the
Now
number1,
third
name
of
the
segment
three_numbers. e
are
an
used
to
input
output
can
be
monitor. e
that
such
as
pseudocode
keywords
indicate
device
of
soft
as
data
a
is
and
to
END
the
or
screen
STOP
the
end
of
the
we
of
the
with
variables, we
calculation
in
a
can
also
variable. L et ’s
result
OU TPU T
using
Pseudocode_5c:
Add_three_numbers
INPUT
number2,
number1,
result
number1
OUTPUT
result
END
pseudocode
of
+
number3
number2
+
number3
the
of
e
new
variable
will
contain
result
on
the
left
side
of
the
statement
a
the
answer
from
the
calculation
of
the
denotes
from
the
right
side
of
the
statement.
statements.
pseudocode
in
Example
5
is
produced
from
can
include
the
left
arrow
(
)
or
the
the
IPO
familiar
variable
Calculations
e
are
result
this
numbers
the
pseudocode
is
Add_
input, usually
keyboard, while
copy
keyword
INPU T
is
place
that
name
addition
output.
e
of
statements
managed. Here, the
into
number3
indicates
involves
equals
sign
(=)
to
indicate
that
the
result
of
a
chart.
calculation
is
stored
in
a
variable.
235
9
Problem
Here
is
solving
yet
and
another
program
set
of
design
pseudocode
for
Example
5
Conditional
using
dierent
keywords
to
READ
in
the
data
Conditional
to
PRINT
the
result. e
keyword
END
can
also
on
its
own
to
denote
the
end
of
the
branching
is
used
when
there
is
a
choice
be
between
used
branching
and
two
options. Two
types
of
conditional
statements.
branching
are
IF–THEN
and
IF–THEN–ELSE
statements.
Pseudocode_5d:
READ
number1,
Add_three_numbers
number2,
number3
IF–THEN
result
PRINT
=
number1
+
number2
+
e
result
END
IF–THEN
more
Sequential
executed
statements
statements, such
one
after
the
as
other
those
from
IF
in
the
Example
rst
5, are
statement
statement
statements
condition
Sequential
statements
number3
or
(the
the
will
only
answer
condition
THEN
(carr y
suggests
to
is
out
be
a
that
one
considered
or
based
on
a
question.
true)
one
or
more
statement)
to
ENDIF
the
last.
Sometimes
L et ’s
look
which
again
nds
the
at
the
IPO
average
chart
from
temperature
Example
from
2,
two
values.
the
end
of
the
the
below
the
of
general
the
Processing
max_temp
Calculate
min_temp
(max_temp
average_temp
+
min_temp)
/
sequential
the
IPO
pseudocode
statements
is
from
produced
L et ’s
the
information
in
e
the
use
6
test
=
(max_temp
+
for
into
the
the
the
variable
minimum
stored
variable
mark
is
calculation
maximum
temperature
( max_temp), then
temperature
is
(min_temp). e
is
placed
input
the
into
the
is
236
then
output.
to
the
to
output
the
total
if
the
total
mark
is
of
use
the
IF–THEN
greater
statement.
that
variable. e
a
then
variable
used
50. We
that
shows
to
do
will
than
50
marks
named
check
not
be
the
if
know
three
are
added
total. e
the
the
total
value
its
value
is
are
and
the
IF–THEN
mark
of
input. erefore, IF
THEN
marks
is
the
the
total
output. e
in
result
of
the
statements
resulting
in
there.
7
sum
of
three
numbers
if
their
total
is
greater
is
Pseudocode_7:
Add_three_numbers
READ
number2,
value
number1,
number3
the
number
=
number1
+
from
total
>
50
variable
stored
stops
50.
THEN
(average_temp). e
below
a
in
greater
Example
IF
the
is
than
total
second
wish
only
case, we
into
marks
Print
for
specic
part
min_temp)/2
average_temp
value
this
three
than
input
is
sequence
min_temp
END
First, the
not
statement
therefore
Find_average_temp
max_temp,
OUTPUT
input
greater
temperature.
average_temp
example. Y
ou
results, but
statement
Pseudocode_6a:
INPUT
an
50. In
each
average
and
is
indicate
statement.
pseudocode
sum
Find
statement. Any
pseudocode
pseudocode
to
using
chart.
Example
the
used
2
than
following
in
is
Output
three
e
ENDIF
IF–THEN
ENDIF
IF–THEN
Input
keyword
average_temp
PRINT
ENDIF
END
total
number2
+
number3
e
condition
greater
than
(or
question)
asked
is:
is
the
total
mark
50?
Consider
student
we
If
it
is, then
the
condition
is
true, the
mark
is
the
is
want
following
younger
to
output
than
50. e
next
statement
in
the
the
13
to
years
nd
old. If
statement
Pseudocode
out
if
a
so, then
“Student
is
not
a
indeed
teenager”. For
greater
than
example
9
.3
this, we
need
to
use
an
IF–THEN
sequence
statement.
indicates
20, 25
the
to
and
total
output
10
as
mark
the
the
is
20
total
three
+
25
mark. at
marks
+
10
=
to
be
is, if
we
used
input, then
55. Since
55
Example
8
is
First, create
greater
be
than
50, it
is
expected
that
the
value
55
output.
Input
age
e
IF–THEN
statement
does
not
consider
if
an
IPO
the
Processing
Output
Check
if
If
true
13
is
not
is
less
statements
than
in
or
the
even
equal
pseudocode
to
50, as
that
there
instruct
are
that
be
output. If
the
total
mark
is
less
than
or
condition
(THEN
will
PRINT
be
total)
false, then
in
the
the
sequence
next
is
equal
pseudocode
reaches
the
END
can
write
the
pseudocode
above
without
printing
INPUT
this
PRINT
, ENDIF
example
and
number2, number3
are
END. e
and
READ, IF
, THEN,
variables
general
format
of
are
number1,
(condition
THEN
is
<
13
output
a
an
IF
statement
is:
student ’s
age
is
not
a
teenager”
variation
year
of
of
the
of
the
birth
pseudocode
and
the
is
current
to
input
year
to
the
calculate
student.
true)
Pseudocode_8b:
is
true,
execute
=
Is_student_a_teenager
2019
T-statement(s)
INPUT
birthyear
age
thisyear
=
-
birthyear
keyword.
IF
Condition is
value
“Student
T-statement(s)
condition
is
Is_student_a_teenager
age
thisyear
IF
in
total
ENDIF
If
written
END
the
IF
is
ENDIF
Another
The
it
sentence.
age
THEN
in
as
skipped, and
IF
keywords
much
statement
anything.
e
output “Student
teenager ”
to
Pseudocode_8a:
the
a
no
the
50, the
<
result
Y
ou
to
then
total
age
mark
chart.
will
is
a
Boolean
either TRUE
or
expression,
which
means
its
age
THEN
FALSE.
<
13
OUTPUT
“Student
is
not
a
teenager”
ENDIF
END
T-statement(s) are
included
only
if
the
one
or
result
more
of
the
statements
condition
that
are
is TRUE.
Note
ENDIF
nish
tells
the
computer
that
the
IF–THEN
statements
here.
where
e
data
If
the
do
condition
not
execute
is
FALSE,
skip T-statement(s) –
that
that
the
thisyear
value
variable
is
=
2019
2019
is
is
not
an
example
modied
in
birthyear, however, changes
of
a
the
constant
algorithm.
when
new
input.
is,
them.
237
9
Problem
solving
Example
and
program
design
condition
9
to
Consider
the
following
example
that
checks
for
another
of
80
or
valid
set
of
or
true. e
statements
algorithm
if
the
is
directed
outcome
of
the
exam
condition
marks
is
is
not
valid
or
false.
over:
IF (the condition is true)
Pseudocode_9a:
INPUT
IF
THEN (carry out one or more statements)
mark
mark
THEN
Exam_results
>=
ELSE (carry out one or more statements)
80
OUTPUT
OUTPUT
ENDIF
“Excellent!”
“Please
see
your
Example
teacher”
10
ENDIF
As
an
example, suppose
you
wish
to
print
‘the
sum
is
END
less
than
50, but
e
pseudocode
will
output
the
following
values
stored
in
the
variable
output
Value
or
of
mark
greater
Example of mark
Statements
86
Excellent!
Please
less
than
80
sum
their
sum
you
have
71
Please
see
the
THEN
use
of
indentation
two
print
INPUT
mark
your
>=
in
Total
number1,
=
+
number3
number3
the
following
number2
this
case, use
“Excellent
“Please
READ
results!”
see
your
teacher”
that
is
true
80
or
both
statements
will
and
the
variable
mark
is
equal
to
80. Nothing
stored
in
the
mark
greater
be
output
contains
variable
is
printed
if
the
If
+
true,
then
Output
Total
if
If
total
>
50
false,
‘ The
then
sum
is
Output
less
than
50’
IF–THEN–ELSE
the
statement. e
modication.
a
if
=
Example
of
Statements
mark
86
80
Excellent
total
a
PRINT
total
PRINT
“The
following
statements
if
the
number3
sum
is
less
than
50”
examples
also
illustrate
the
IF–THEN–
statement.
results!
see
directs
your
the
outcome
of
11
output
Pseudocode_11:
thisyear
INPUT
birthyear
age
thisyear
=
age
<
–
birthyear
13
THEN
OUTPUT
“Millee
is
a
ELSE
OUTPUT
“Millee
is
not
algorithm
the
Is_Millee_a_teen
INPUT
END
more
+
50
ELSE
ENDIF
or
number3
number2
value
statement
statement
>
+
THEN
IF
IF–THEN–ELSE
number2,
number1
value
71
IF–THEN–EL SE
Add_three_numbers
the
teacher
238
print
mark
Please
than
shows
number1,
total
Example
of
the
Pseudocode_10:
80
OUTPUT
than
than
one
either
IF-
ELSE
to
can
Output
number1
number2,
e
e
you
sum.
Read
IF
condition
less
50. is
Exam_results
OUTPUT
suggests
or
than
than
teacher
END
80
less
teacher
ENDIF
Value
greater
is
mark
THEN
less
is
options:
the
Processing
pseudocode
greater
it
numbers
statement:
Pseudocode_9b:
is
if
Input
In
IF
three
output
your
see
or
Check
Notice
of
mark:
comment
80
the
statements
means
for
50’ if
teenager”
a
teenager”
9
.3
Y
ou
could
produce
also
the
choose
to
output
Millee’s
age
to
If
following:
the
for
age
<
13
be
OUTPUT
is”,
age
ELSE
OUTPUT
“Millee
is
a
teen,
her
be
then
also
is
not
a
general
form
ELSE
if
statement
Howe ver,
the
‘P lease
Other wise,
the
output.
statement
the
for
statements
see
your
mark
is
teacher ’
70
satisfactor y
regard less
or
results
of
the
mark,
to
await
the
end
of
term
repor t
is
output.
of
an
IF–THEN–ELSE
statement
is:
the
statements
result
of
statements
(condition
THEN
results!’ and
then
Loops
e
IF
greater,
teen”
ENDIF
The
or
age
another
“Millee
80
output.
greater,
will
THEN
is
‘Excellent
will
IF
mark
Pseudocode
is
a
of
a
loop
are
arranged
variable. Most
as
loops
to
cycle
depend
on
through
the
follows:
true)
T-statement(s)
◆
Input
a
starting
value
to
a
specic
variable
–
this
F-statement(s)
variable
usually
determines
whether
or
not
the
loop
ENDIF
If
condition
execute
If
is
true,
execute
T-statement(s).
Do
not
F-statement(s)
condition
execute
is
false,
execute
F-statement(s).
Do
executes
or
◆
Test
variable
◆
Execute
◆
Update
the
the
body
value
of
of
the
the
a
condition.
loop.
variable.
T-statement(s)
◆
are
Nested
◆
IF–THEN–ELSE
involve
the
use
of
statements, either
combined. Example
12
shows
a
IF–THEN
separately
nested
and
an
when
of
loop
you
times
to
do
statements:
not
repeat
know
the
in
loop
advance
( WHILE
or
loops)
denite:
when
you
times
repeat
know
in
advance
how
many
or
to
the
loop
(FOR
loop).
or
condition
Indenite
IF–THEN–ELSE
types
many
REPEAT
conditions
Nested conditions
two
indenite:
how
an
the
against
not
ere
using
not.
loops
IF–THEN
statement:
WHILE
Star t
Example
loop
value
(then)
(then)
Pseudocode_12:
INPUT
mark
Exam_results
REPEAT
>=
is
true
per form
statements
value
IF
“Excellent
“Please
mark
THEN
(then)
per form
statements
80
OUTPUT
OUTPUT
ELSE
condition
loop
(then)
THEN
if
mark
Star t
IF
check
12
>=
see
if
condition
is
true
results!”
your
teacher”
WHILE
70
OUTPUT
check
loop
“Satisfactory
e
WHILE
loop
repeated ly
long
as
executes
one
or
more
results!”
statements
OUTPUT
“Please
await
the
end
of
as
the
condition
is
true. e
term
condition
in
a
WHILE
loop
is
tested
at
the
beginning
report”
of
the
loop, so
it
is
possible
for
the
statement
not
to
be
ENDIF
END
executed
at
all.
239
9
Problem
solving
and
program
design
d
The
general
form
of
the WHILE
loop
e
loop
Number
WHILE
(condition
is
is
repeated:
is:
is
increased
to
4.
true)
O utput
is
‘the
number
is
4’.
Statement(s)
e
condition
(number
<=
3)
is
checked. at
is
ENDWHILE
(4
The
ENDWHILE
statements
in
keyword
the
indicates
the
end
of
the
e
<=
L eave
that
statements
are
indented
ENDWHILE
next
are
some
loop. W here
be
repeated
loop
can
examples
the
may
still
be
number
be
that
of
known
used
illustrate
times
or
when
that
the
the
loop
is
statement
following
the
loop
is
executed
the
ENDWHILE
statement).
unknown, the
the
condition
output
is:
the
number
is
2
the
number
is
3
the
number
is
4
should
WHILE
for
stopping
of
loop
known.
Example
Example
14
13
In
this
those
Pseudocode_13:
number
WHILE
loop:
WHILE
loop
out
the
false.
statements.
e
Here
the
now
between WHILE
(after
and
is
loop.
e
Note
3)
=
example, the
statements
that
are
is
within
used
the
to
indicate
WHILE
loop,
Numbers_in_a_loop
without
1
These
(number
indentation
<=
using
the
BEGIN
and
ENDWHILE
two
statements
3)
keywords.
are
executed
BEGIN
only
number
=
OUTPUT
“the
number
+
the
loop
1
number
in
is”,
Pseudocode_14:
number
age
ENDWHILE
OUTPUT
=
15
WHILE
“out
of
loop”
(age
age
Output
Note
that
the
number. is
Here
a
is
Number
e
(1
b
how
value
is
also
the
Enter
3)
is
containing
is
the
Number
O utput
is
assigned
called
loop
condition
<=
1
to
the
initialising
a
W hile
variable.
the
(number
value
<=
3)
1
is
enters
the
loop.
checked. at
is
true.
is
is
3)
e
increased
‘the
is
loop
age
is
(age
then
<20)
soon
‘Y
ou
as
to
number
2.
is
is
24 0
is
a
teenager”
the
are
variable
a
age
is
teenager’ will
less
be
than
20,
output.
again
reaches
not
a
by
1
and
checked
passing
the
value
teenager ’ is
through
20
then
in
the
the
the
condition
loop. As
statement
output.
(number
15
<=
3)
is
checked. at
now
tr y
an
example
of
a
loop
where
the
number
is
times
to
repeat
the
loop
is
unknown. First, create
an
chart
that
will
repeated ly
read
each
students’ exam
repeated:
increased
‘the
condition
<=3)
‘Y
ou
before
Example
to
into
number
is
(number
true.
a
variable. It
is
not
known
how
many
exam
3.
are
to
be
entered, but
a
mark
with
the
value
of
3’.
<=
3)
is
checked. at
will
indicate
that
it
is
the
last
mark. Once
all
marks
is
are
(3
1
not
2’.
−1
e
teenager”
true.
is
is
of
increased
age
are
marks
O utput
value
statement
mark
Number
the
the
IPO
c
+
are
a
loop:
condition
<=
age
“You
are
executed:
of
(2
=
20)
“You
variable
L et ’s
e
<
Output
END
Younger_than_20
entered, the
average
mark
is
calculated
and
output.
9
.3
Input
Processing
mark
While
Output
(mark
Add
is
mark
Calculate
not
to
the
equal
total
to
−1)
average
mark
marks
S ometimes
algorithms
statements,
conditional
Example
15
it
can
conditional
example
of
the
WHILE
the
corresponding
pseudocode
is
shown
you
use
of
a
and
sequential
e ven
loops.
WHILE
expanded
As
you
to
loop;
practise
inc lude
more
a
with
and
even
wr iting
programming
some
want
to
test
the
marks. Testing
program
the
by
algorithm
is
Average_of_exam_marks
in
a
later
section,
but
for
now,
consider
0
what
=
0
average
=
rst
OUTPUT
the
fur ther
statement.
would
explained
count
be
pseudocode
entering
Pseudocode_15:
=
statements
of
below:
code,
total
use
using
writing
loop
illustrates
the
average
however,
An
require
Pseudocode
the
output
exam
could
be
if
a
user
−
enters
1
as
the
mark.
0
‘enter
INPUT
mark
WHILE
(mark
a
is
mark’
not
equal
to
total
=
total
+
mark
count
=
count
+
1
◆
e
condition
in
◆
e
condition
is
◆
e
loop
which
‘enter
a
WHILE
now
true
loop
since
is
mark
tested.
=
−
1.
-1)
◆
OUTPUT
the
is
is
bypassed
would
would
be
to
calculate
average
cause
an
=
error
the
average
mark
0/0.
since
0/0
cannot
be
mark’
determined.
INPUT
mark
To
avoid
this
error, after
the
ENDWHILE
statement
ENDWHILE
the
average
=
DISPLAY
average
following
pseudocode
for
IF–THEN–ELSE
total/count
statement
can
be
added:
END
IF
count
THEN
e
logic
◆
of
the
ree
total
◆
pseudocode
variables
are
marks, the
and
the
average
e
user
is
is
as
follows:
initialised
number
of
to
DISPLAY
store
marks
the
enter
the
rst
exam
e
=
DISPLAY
average
Once the mark is not −1, the loop is entered.
b
e
the
is
added
to
the
total/count
total
construct
statements
false. Note
a
mark
entered’
loop
REPEAT
more
rst
marks
entered
mark.
L
‘no
average
REPEAT
to
0
ELSE
mark.
prompted
=
that
loop, so
the
as
long
this
repeated ly
as
the
condition
statement
will
executes
specied
is
tested
always
or
condition
at
be
one
the
end
executed
is
of
at
and
least
once.
O
counted
c
e
as
user
the
is
rst
mark.
prompted
to
again
to
enter
O
The
another
mark
which
is
stored
on
general
form
of
the
REPEAT
statement
is:
input.
REPEAT
P
d
◆
e
Once
a
loop
is
mark
repeated
of
−1
is
at
a
Statement(s)
entered, the
loop
is
UNTIL
(condition
is
true)
exited.
◆
e
average
of
◆
e
average
mark
the
marks
is
is
calculated.
output.
241
9
Problem
solving
Example
and
program
design
therefore
16
is
is
example
uses
the
REPEAT
loop
to
output
output
checked
between
1
and
3, unlike
Example
a
WHILE
is
before
the
condition
statement. W hen
the
checked
and
the
is
true, then
UNTIL
the
next
statement
is
loop.
when
Pseudocode_16:
=
UNTIL
following
executed. is
number
once
13, which
statement
used
the
least
some
condition
numbers
in
at
there
means
may
be
that
no
you
will
attend
classes
school!
Numbers_in_a_loop
1
Example
18
REPEAT
number
=
OUTPUT
“the
UNTIL
number
(number
OUTPUT
“out
=
of
+
Alternatively :
1
number
is”,
number
Pseudocode_18:
3)
INPUT
loop”
day
REPEAT
END
OUTPUT
UNTIL
e
Attend_classes
variable
number
is
rst
initialised
to
1. Here
(it
“do
is
a
not
go
school
to
school”
day)
is
END
how
the
loop
is
executed:
a
Number
with
b
Number
is
O utput
e
2
>
is
‘the
is
not
executed
c
Number
d
O utput
Since
3
value
to
number
condition
3
e
the
increased
1
is
(number
true
so
the
enters
the
loop.
As
2.
becomes
3)
is
checked.
statements
in
the
once
loops
are
again.
is
is
=
‘the
number
3, ‘out
output
to
of
output
example, the
until
the
there
means
may
be
2
the
number
is
3
is
that
is
checked
you
will
is
a
not
school
output
in
the
stay
go
at
to
day ’
least
UNTIL
home
one
day
3.
is
3’.
loop’ is
Example
now
19
output.
age
is
statement
‘it
‘do
school!
Pseudocode_19:
number
statement
condition
condition
statement. is
is:
the
the
true. Again, the
before
when
increased
alternative
school’ is
2’.
>
an
=
Under_20
18
REPEAT
OUTPUT
out
of
“you
are
under
20
years
old”
loop
age
UNTIL
Example
=
age
(age
=
+
1
20)
17
END
Pseudocode_17:
Attend_classes
e
INPUT
statement
will
be
output
even
though
the
value
of
day
age
may
be
20. is
is
because
the
condition
(age
=
20)
REPEAT
OUTPUT
UNTIL
(day
‘attend
=
is
classes’
weekend
checked
Example
Along
In
this
example, the
be
output
statement
‘Attend
it
is
checked
to
determine
is, say, Saturday
or
output.
20
with
Sunday. e
used
the
when
statement
WHILE
loop, the
REPEAT
loop
is
the
number
of
times
to
repeat
the
loop
unknown. L et ’s
look
again
at
Example
15
which
will
is
repeatedly
242
is
whether
is
data
statement
classes’ will
also
before
the
day)
END
the
after
read
students’ exam
marks
into
a
variable.
9
.3
Since
it
is
not
known
how
many
exam
marks
are
to
◆
be
entered, a
value
of
−1
will
indicate
that
it
is
the
A
mark
all
marks
are
entered, the
average
mark
and
example
the
REPEAT
be
entered
to
be
outside
Check
if
count
is
0. is
means
no
marks
output.
of
the
and
corresponding
pseudocode
IF–THEN–ELSE
using
statements
entered
average
to
so
nothing
to
count
and
no
calculate.
is
◆
shown
must
loop.
were
An
−1
is
◆
calculated
of
last
the
mark. Once
Pseudocode
Other wise, the
average
of
the
marks
is
below:
calculated.
◆
Pseudocode_20:
e
average
mark
is
output.
Average_of_exam_marks_
using_REPEAT_loop
total
=
0
count
=
0
average
=
FOR
loop
e
FOR
loop
is
used
only
when
the
start
value
and
0
the
end
value
are
known.
REPEAT
DISPLAY
‘Enter
mark’
The
INPUT
IF
mark
mark
=
FOR
general
<variable>
value>
-1
form
of
=
the
FOR
<star t
loop
is:
value> TO/DOWNTO
<nal
DO
Statements(s)
THEN
DISPLAY
‘end
of
marks’
ENDFOR
ELSE
total
=
total
+
mark
count
=
count
+
1
Note:
◆
The
variable
must
be
in
order
so
that
it
can
be
counted.
UNTIL
IF
mark
count
THEN
=
=
-1
◆
The
variable
begins
◆
The
variable
changes
with
the
<star t
value>.
0
DISPLAY
‘no
marks
by
1
ever y
time
the
entered’
statements
are
executed. TO
counts
up
DOWNTO
ELSE
counts
average
=
total/count
◆
OUTPUT
down.
The
loop
terminates
when
the
variable
reaches
the
average
nal
value.
END
◆
e
logic
of
the
pseudocode
is
as
ree
total
and
L
a
variables
are
marks, the
the
e
average
user
is
denotes
initialised
number
of
to
store
marks
the
help
following
you
end
of
the
FOR
loop.
understand
Example
to
enter
written
the
FOR
in
pseudocode
will
loop.
entered
mark.
prompted
examples
the
21
rst
Pseudocode_21:
exam
the
follows:
e
◆
ENDFOR
School
mark.
Saturday
=
Sunday
3
2
O
b
If
the
mark
is
c
Other wise, the
−1,
the
loop
is
exited.
FOR
rst
mark
is
added
to
=
day
=
Saturday
to
Sunday
DO
the
O
OUTPUT
total
and
counted
as
the
rst
“It
is
weekend”
mark.
ENDFOR
P
d
e
loop
is
repeated
at
a
END
243
9
Problem
e
variable
integer
with
In
and
the
integer
FOR
assigned
is
design
initialised
variable
Sunday
with
is
the
Example
rst
value
of
variable
Saturday
24
initialised
3.
statement, the
the
number
program
Saturday
2, and
the
the
the
solving
day
Pseudocode_24:
Printing_numbers
FOR
to
is
number
=
Output
which
is
OUTPUT
1
“The
“Out
of
2
DO
number
is”,
number
loop”
ENDFOR
2.
END
‘It
is
weekend ’ is
output.
e
day
is
then
given
represented
‘It
is
by
the
the
weekend ’ is
next
value
number
again
which
is
3.
the
values
for
number
is
1
e
number
is
have
the
been
2
start
and
end
of
the
of
loop
FOR
reached, the
statement
‘It
therefore
output
twice, once
for
once
for
between
sum. It
adds
Pseudocode_22:
1
and
uses
a
20
inclusive
REPEAT
countdown
loop. e
OUTPUT
10
DOWNTO
=
0
count
=
countdown
1
END
IF
count
THEN
numbers
10, 9, 8, 7, 6, 5, 4, 3, 2
and
1
are
count
=
UNTIL
count
DISPLAY
END
time
=
OUTPUT
Daylight
daybreak
“it
is
to
not
sunset
DO
night”
ENDFOR
END
a
day
consists
of
daybreak, morning, noon,
afternoon, evening, sunset
night ’ will
through
244
sum
be
the
printed
loop
six
from
and
night, then
times, for
daybreak
to
each
‘ it
time
sunset
is
=
even
sum
output.
count
23
Pseudocode_23:
even
displays
equivalent
Sum_of_even_numbers
1
REPEAT
If
then
25
ENDFOR
FOR
and
Countdown
=
sum
Example
the
is:
Pseudocode_25:
e
all
22
Example
FOR
which
Sunday.
pseudocode
Example
algorithm
Saturday
the
and
another
is
numbers
weekend ’ is
is:
output.
Consider
statement
here
e
Out
Since
output
Sunday,
is
it
not
passes
sum
>
+
1
20
+
count
9
.3
Pseudocode
Questions
1
Correct
one
the
REPEAT
b
FOR
IF
=
total
WHILE
State
and
a
(count
(count<=
count
2
statements
where
each
contains
a
count
=
REPEAT
i
ii
=
of
count
20)
-2) THEN
count
=
25
i
DO
*5
count
display
which
Loop
Write
*
5
the
following
statements
dene WHILE
b
loops:
i
at
condition
is
least
arithmetic
Boolean
State
once
checked
after
ii
statements
are
each
algorithm
that
operator
operator.
whether
the
left
algorithm
contains
any
of
following:
loop
conditional
iii
sequential
iv
output
statement
statement
statement.
statements are performed until condition is TRUE.
You
B
not
always
condition
checked
are
the
before
per formed
statements
are
until
condition
is
sequential
b
a WHILE
Write
5
algorithms:
and
Pseudocode_9.3.3right
WHILE
word
word
<>
=
4
INPUT
Met
=
5
IF
INPUT
Num
THEN
Display
‘OK’
Blu
=
2
Blu
ELSE
Display
‘Oh
Met
=
Blu
-
Met
ENDWHILE
Num,
Met
Num
+
+
Num
Blu,
=
the
from
total
four
class
tests,
mark. Write
the
statements
pseudocode
to
input
value −1
the
an
should
c
a
REPEAT
d
a
FOR
unk nown
stop
loop
loop.
number
reading
of
numbers
average.
‘page’
Blu
word
mark
print
loop
calculate
BEGIN
each
and
using:
a
Pseudocode_9.3.3left
DISPLAY
input
integers. The
following
*
to
calculate
pseudocode
executed
is
statements
Consider
wish
then
FALSE.
3
iv
the
completed
iii
keyword
i
executed
Loop
ii
constant
iii
A
from
a(n):
variable
v
4
b
example
ii
count
completed
iii
an
represents
a
c
following
error:
‘page’
No’
END
245
9
.4
F l owc h a r t s
F lowcharts
depict
the
are
algorithms
input, processing
information. ese
to
that
illustrate
the
pseudocode. Table
and
symbols
ow
of
9.2
use
use
data
as
shows
symbols
output
the
the
the
of
same
to
◆
data
and
of
terms
statements
symbols
◆
in
with
Use
arrow
ow
e
may
main
Decision
their
(or
descriptions.
◆
heads
not
(also
the
ow
of
page
be
symbols
to
ow
lines
where
the
direction
obvious.
used
known
Sequence)
e
on
in
as
a
owchart
Selection)
are
and
the
the
Process
symbols.
sequence
the
is
bottom
generally
of
the
from
the
top
of
page. However, this
Table 9.2 Flowchar t symbols
can
Symbol
Name
Description
Terminator
Used
var y :
ow
star t
to
identify
and
end
sometimes
back
to
a
there
process
or
are
loops
which
need
to
decision.
the
of
a
ere
are
also
ese
rules
some
important
rules
for
the
symbols.
flowchar t
Input
/
Used
to
accept
data
also
generally
apply
to
algorithms
and
or
pseudocode:
Output
to
output
information
◆
Process
Statements
symbol
in
Processes
have
only
one
entr y
point
and
one
exit
point.
this
per form
◆
Lines
◆
Decisions
with
arrow
heads
indicate
the
ow
of
sequence.
calculations
Decision
Also
called
a
Y
es)
statement.
Used
to
question
the
next
to
step
line
than
Connector
A
in
one
link
to
or
but
element
or
included
point, one
TRUE
(or
exit
point
and
one
FALSE
(or
No)
exit
point.
should
also
know
when
and
IF–THEN–ELSE
to
use
the
IF–THEN
e
REPEAT
structures.
option.
decision. at
execute
external
detail
in
entr y
loop
has
a
process
before
the
more
out
an
one
determine
◆
One
only
ask
Y
ou
a
have
conditional
the
not
the
important
visible
◆
e
is, a
REPEAT
process
point
WHILE
to
loop
at
least
loop
will
once. is
always
is
an
remember.
is
generally
the
reverse
of
the
flowchar t
REPEAT
Flow
lines
Lines
with
arrow
the
flow
from
one
the
process. e
symbol
represents
an
action
or
most
symbols, text
is
used
that
it
is
loops
to
the
data, while
the
to
describe
what
they
of
data
from
one
symbol
to
arrows
indicate
rules
for
owcharts
the
Ever y
owchart
must
inc lude:
have
a
symbol, unless
owchart. e
terminals
24 6
or
Start
you
and
are
Start
symbol
drawing
Stop
terminators.
that
illustrate
a
until
you
the
the
condition
the
is
condition
practise
orderly
owchart
confusion
or
practise
and
drawn
true, the
becomes
true.
drawing
ow
of
owcharts
data
in
an
is
not
created
properly
it
can
and
a
symbols
section
are
produce
result
in
drawing
incorrect
statements
that
are
the
owcharts
information. Y
ou
not
symbols
presented
and
in
then
the
draw
examples
should
some
so
rst
of
that
the
you
a
can
Stop
usually
next.
sample
◆
is
the
logical
Some
loop
is
cause
ow
while
loops
important
algorithm. If
happening
WHILE
condition.
since
W ithin
rst, followed
another
It
Each
comes
symbol
REPEAT
to
decision
of
so
data
the
heads
by
determine
loop:
of
called
compare
and
improve
as
you
continue
to
practice.
a
the
e
following
were
written
owcharts
using
represent
pseudocode
in
some
the
of
examples
previous
that
section.
9
.4
Sequence
Similar
to
executed
statements
pseudocode, where
one
af ter
the
other
a
set
from
Start
of
statements
the
rst
are
statement
Input
to
the
last, owcharts
statements
by
using
also
depict
the
sequence
shown
in
F igure
9.2,
symbols. ere
connector
symbols
2,
a
owchar t
has
S tar t
par t
are
of
a
joined
arrow
larger
by
are
also
which
one
small
indicate
(F ig
directional
pointing
to
3
number
circ les
that
it
and
9.1).
2
+
arrows.
Each
the
3
owchar t
statements
symbol
arrow
+
number
called
S equential
another
1
and
Output
is
1,
number
symbols.
number
S top
number
number
of
Add
As
Flowchar ts
has
pointing
result
of
addition
an
away
Stop
from
it
to
another
sy mbol. e
sy mbol
also
contains
Fig 9.2 Flowchar t for nding the sum of three numbers
text
that
explains
the
processing
to
be
carried
out.
e
owchart
Start
symbol
O utput
symbol
shows
to
symbol
is
the
sequence
Input
and
similar
a
to
Stop
that
of
symbols
symbol, Process
symbol. e
of
the
IPO
text
chart
from
the
symbols,
within
and
is
each
an
Statement
example
of
Example
of
two
6
pseudocode.
in
the
previous
temperatures. e
section
nds
owchart
is
the
average
shown
below.
Statement
Notice
need
of
Fig 9.1 Flowchar ts have sequential statements
Consider
a
owchart
created
Example
5
to
what
that
from
that
the
specify
text
the
processing
detail
each
in
the
precise
is
process
calculation. A
carried
calculation
symbol
out
are
or
both
a
does
not
description
series
of
symbols
acceptable.
which
Start
nds
and
the
sum
of
pseudocode
three
are
numbers
also
given
(Fig
here
9.2). e
for
IPO
chart
comparison.
Input
max_temp,
min_temp
Example
IPO
chart
26
to
nd
the
sum
of
three
numbers.
Calculate
average_temp
Input
Processing
number1
Add
the
Output
three
numbers
together
The
result
of
Output
number2
the
addition
average_temp
number3
Stop
Pseudocode_26:
Add_three_numbers
INPUT
number2,
Add
number1,
number1
OUTPUT
+
result
number2
of
+
number3
Fig 9.3 A owchar t for Example 6
number3
number1
+
number2
+
number3
END
of
pseudocode
247
9
Problem
solving
and
Conditional
Conditional
or
program
statements
statements
IF–THEN–ELSE
IF–THEN
e
design
for
owcharts
Start
use
IF–THEN
structures.
owchart
Figure
contains
for
the
9.4. Note
a
mark
mark
>
structure
IF–THEN
structure
is
shown
No
Is
in
Input
question
that
the
where
condition
the
answer
symbol
is
one
=
80?
usually
of
only
Yes
two
options, such
conditional
as
yes
statement
or
can
no, true
or
selectively
false. e
skip
or
Output
include
“Excellent
statements
based
on
the
outcome
of
the
results!”
condition.
Output
“Please
see
your
teacher”
Boolean
Stop
condition
Fig 9.6 A owchar t for Example 9b
T-Statement
the
Start/Stop
initialise
e
the
symbols). A
variable
IF–
THEN
is
Decision
Process
symbol
is
used
to
year
symbol
in
Figure
9.6
shows
Fig 9.4 Flowchar t for the IF–THEN structure
that
Figure
9.5
shows
the
owchart
based
on
Example
the
two
statements
true, other wise
e
algorithm
accepts
a
birth
year, calculates
the
on
the
current
year
and
then
displays
a
below
the
student
is
a
teenager. is
owchart
and
Decision
the
condition
is
they
the
last
are
skipped
output
to
join
the
statement. e
directional
gure
also
two
consecutive
O utput
symbols, but
depending
contains
on
Process, Input/O utput
if
comment
shows
if
output
age
arrow
based
are
8b.
symbols
the
algorithm, both
output
statements
can
be
placed
(also
in
one
to
the
symbol. Notice
Decision
that
symbol
the
are
in
‘Y
es’ and
dierent
‘No’ placed
locations
near
when
Start
compared
This
year
=
must
2019
be
Input
Birth
to
match
used
at
the
the
the
owchart
logic
=
This
year
in
the
appropriate
Figure
9.5. ese
algorithm
point
of
and
the
can
labels
therefore
symbol.
year
IF–THEN–EL SE
Age
of
−
Birth
structure
year
e
owchart
shown
in
for
Figure
the
IF–THEN–ELSE
9.7. Note
that
the
structure
condition
is
symbol
Yes
Age
<
13?
again
contains
result
of
the
a
question. However, depending
question, the
ow
of
data
is
on
directed
the
to
No
dierent
Output
“Student
is
statements.
a
teenager”
Figure
Stop
Fig 9.5 Flowchar t that calculates an age to determine if the student is a teenager
248
9.8
10, which
ree
shows
the
illustrates
numbers
are
owchart
the
based
on
Example
IF–THEN–ELSE
input. ey
are
structure.
added, and
the
9
.4
Flowchar ts
Start
Input
Boolean
True
this
year,
birth
year
False
condition
Calculate
T-Statement
age
F-Statement
Yes
No
age
<
13?
Output
Output
Fig 9.7 Flowchar t for the IF-THEN-ELSE structure
“Not
a
teen”
“Is
a
teen”
Stop
Start
Fig 9.9 A owchar t that displays dierent comments based on an age
Input
number
number
2,
1,
number
3
Example
27
Start
Total
=
number
number
2
+
1
+
number
3
Input
No
mark
Yes
Total
>
50?
No
Print
“The
sum
is
Print
less
than
Total
50”
Stop
Output
Output
No
“Satisfactory
“Excellent
Fig 9.8 Flowchar t for the IF–THEN–ELSE structure that determines whether a
results!”
results!”
number is greater than 50
Output
Output
is
stored
in
a
variable
named
total. If
the
total
see
is
your
the
than
other wise
it
50, then
displays
the
a
owchart
displays
the
end
of
teacher”
term
greater
“Please
“Please
await
result
report”
total,
comment.
Stop
Figure
9.9
expands
the
owchart
of
Figure
9.5
to
Fig 9.10 A owchar t can combine conditional structures that output
statements based on the result of a mark
show
the
whether
IF–THEN–ELSE
a
student
is
a
teen
structure
or
on
determining
not.
Pseudocode_27:
Nested
conditions
Figure
illustrates
INPUT
IF
9.10
a
combination
of
mark
structures
that
output
>=
80
two
THEN
conditional
statements
OUTPUT
in
marks. e
Example
data
does
accompanying
27. is
ow
from
pseudocode
owchart
the
start
shows
to
the
is
how
stop
“Excellent
results!”
based
OUTPUT
on
Exam_results
mark
shown
the
ow
symbol
ELSE
even
IF
mark
THEN
of
OUTPUT
“Please
>=
your
teacher”
70
OUTPUT
“Please
see
“Satisfactory
await
the
end
results!”
of
term
report”
though
the
statements
are
not
from
top
to
bottom. As
ENDIF
you
trace
the
owchart, notice
that
regard less
of
the
END
mark, the
same
nal
statement
will
be
output.
249
9
Problem
solving
and
program
design
Loops
Start
e
do
WHILE
not
know
and
in
REPEAT
advance
loops
how
are
many
used
times
when
to
you
repeat
the
Number
loop. e
starting
repeat
FOR
and
the
loop
ending
is
preferred
values
or
when
the
you
number
do
of
know
times
1
to
loop.
No
Number
Figures
=
the
9.11
and
9.12
compare
the
owcharts
of
<=
3?
the
Stop
Yes
WHILE
and
REPEAT
structures.
Number
Number
=
+
1
False
Output
number
Decision
Statements
Fig 9.13 Using the WHILE loop to output numbers between 1 and 3 based on
a condition
True
Statements
Start
False
Decision
Number
=
1
True
Fig 9.11 Flowchart for the WHILE loop
Fig 9.12 Flowchart for the REPEAT loop
Number
Number
Note
where
loop. e
the
Decision
condition
in
a
symbols
WHILE
are
loc ated
loop
is
in
tested
=
+
1
each
at
Output
number
No
the
beginning
statement
not
of
the
to
be
the
REPEAT
loop
the
statement
will
loop,
so
it
executed
is
tested
is
at
at
possible
all. e
the
end
for
the
condition
of
the
in
loop,
so
Yes
Number
al way s
be
executed
at
least
=
3?
Stop
once.
Fig 9.14 Using the REPEAT loop to output numbers between 1 and 3 based on
Examples
Compare
28
the
and
two
29
a condition
owcharts
in
Figures
9.13
and
9.14.
e
Each
owchart
displays
some
numbers
between
1
are
4
based
on
a
condition
in
each
pseudocode
number
WHILE
=
while
loop
example
1
again
shown
Pseudocode_29:
number
(number
<=
3)
DO
=
number
OUTPUT
“the
END
25 0
“out
1
number
ENDWHILE
OUTPUT
+
loop”
=
for
comparison. e
REPEA
T
FOR
by
either
repeat
the WHILE
loop
or
example
1
is”,
number
number
=
OUTPUT
“the
UNTIL
(number
OUTPUT
of
and
REPEAT
BEGIN
number
the WHILE
loops
loop
can
be
loop.
represented
Pseudocode_28:
for
and
END
“out
number
=
of
+
1
number
3)
loop”
is”,
number
the
REPEA
T
loop.
9
.4
e
owchart
numbers
in
Figure
between
1
9.15
and
6
adds
and
together
then
all
displays
the
the
even
sum.
As
you
continue
remember
◆
Ever y
◆
e
Start
=
It
0
owchart
Process
is
◆
=
1
If
the
there
placed
◆
IS
e
has
a
symbol
a
drawing
start
can
by
a
and
be
calculation
represented
with
COUNT
practice
owcharts
that:
completing
SUM
to
Flowchar ts
end
point.
anything
to
from
describing
rectangle
an
action.
containing
the
text
description.
is
in
a
a
question
or
Decision
connection
of
condition, it
is
most
likely
symbol.
‘what
symbol
follows
next ’ is
COUNT
False
True
an
shown
with
arrows
between
symbols.
even
number?
SUM
=
Questions
SUM
+
COUNT
1
COUNT
=
COUNT
+
1
False
IS
COUNT
>
6
2
Name
and
of
following
the
draw
a
indicates
b
per forms
c
directs
d
asks
e
prints
Draw
a
the
a
the
symbol
that
is
suitable
for
each
statements:
end
of
a
owchar t
calculation
the
ow
of
data
to
another
symbol
question
a
the
result.
owchar t
symbol
including
suitable
text
True
DISPLAY
for
each
of
a
display
b
read
c
add
the
a
the
Fig 9.15 Flowchar t adds all even numbers between 1 and 6
may
e
major
appear
why
reasons
quite
would
are
you
that
a
simple
want
by
to
comparison
use
to
owcharts?
3
d
double
e
ask
Use
if
the
message ‘Call
value
15
to
variable
owcharts, so
statements:
SUM
Stop
Pseudocode
following
a
into
a
a
taxi’
variable age
variable age
and
store
the
result
in
a
old
the
the
value
taxi
has
of
pseudocode
corresponding
a
variable
named cost
arrived.
below
owchar t
to
draw
the
segment:
owchart:
Pseudocode_9.4.3:
◆
is
◆
more
easier
to
read
closely
WHILE
follows
a
standard, using
symbols,
word
INPUT
IF
unlike
◆
lends
<>
‘page’
word
word
=
‘page’
pseudocode
itself
program
more
readily
to
conditional
and
THEN
DISPLAY
‘OK’
ELSE
DISPLAY
‘Oh
control
No’
structures.
ENDWHILE
251
9
.5
In
many
A r i t h m e t i c,
of
the
examples
in
relational
this
chapter
you
and
may
logical
operators
have
Logical
seen
fragments
of
pseudocode
such
as
(age
<
20)
e
(number
<
3). ese
conditions
are
evaluated
in
conditional, WHILE, REPEAT
look
at
and
them
logic
in
unit
more
(ALU)
of
the
CPU. L et
perform
a
basic
result
in
order
to
determine
a
example, WHILE
IF
−1
number
<=
3,
mark
=
that
is
and
IF
either
age
<
TRUE
13
or
must
each
produce
FALSE. at
a
is, when
operators
mathematical
operations
addition, subtraction, multiplication
produce
values
result. For
values
which
is
a
or
are
compared
using
these
TRUE
FALSE.
operators, the
such
result
as
compare
detail.
two
ese
FOR
us
result
Ar ithmetic
and
the
statements
Arithmetic
operators
and
division
is
either
or
to
L et ’s
number.
look
at
the
example
WHILE
number
<=
3
more
closely.
Table 9.3 Arithmetic operators
If
Arithmetic
+
–
Meaning
sign)
(minus
*
/
(plus
operator
addition
sign)
(3+3)
subtraction
(asterisk)
(for ward
(3–1)
multiplication
slash)
division
MOD
integer
whole
(3*3)
(3/3)
produces
DIV
the
ese
will
compare
the
remainder
in
division–produces
number
in
result
the
result
see
these
quantities
operators
condition. e
in
algorithm
only
(5/2
=
equal
(2<=3), which
each
algorithms
on
a
condition
to
the
is
true
or
false
to
3
<= 3
number
contains
The
NOT
set
of
result
Not
whether
there
the
know
how
to
statements. is
may
loop
Table
or
9.4
explain
jumping
the
the
to
another
variable
dierent
age
set
= 20
is
of
determine
therefore
of
is
a
a
the
is
is
2, then
2
is
if
2
is
less
TRUE. e
than
or
outcome
of
TRUE. However, if
value
4, then
the
result
of
the
FALSE.
are
condition
TRUE
Accept, 1
then
it
is
or
or
is
one
of
two
FALSE, Y
es
0. at
FALSE. If
has
means
not
a
or
No, Accept
result
1, then
it
is
options.
is
not
or
TRUE,
0.
result
following
tables
use
examples
to
illustrate
how
the
proceed
include
and
OR
operators
can
be
applied. ese
exiting
tables
a
value
operator
NOT
, AND
next
the
the
2)
other. Y
ou
where
is
to
(4<=3)
Examples
with
relies
to
3
number
e
of
contains
with
condition
operators
two
number
compared
e
Relational
variable
(example)
are
also
called
tr uth tables
statements. In
used
as
the
example
to
Suppose
a
line
of
pseudocode
IF day = Sunday. en
operators.
FALSE)
other
based
statements
contained
on
will
the
be
the
result
statement
(TRUE
or
performed.
Table 9.4 Relational operators
Logic
operator
Meaning
Example
=
equal
age
=
20
>
greater
than
age
>
19
>=
greater
than
age
>=
or
to
equal
less
than
<=
less
than
<>
not
IF
9.5
day
two
Sunday and
condition
can
be
examples
the
written
use
in
for
of
a
the
these
typical
NOT
condition
operator. e
ways:
19
or
16
<
19
<=
age
to
equal
IF
day
is
NOT
Sunday
IF
day
is
NOT
equal
IF
day
<>
Sunday
age
NOT(IF
to
age
<>
day
=
to
Sunday
Sunday)
19
If
the
would
252
=
shows
to
<
equal
Table
result
is
TRUE, then
produce
a
result
of
a
day
other
FALSE.
than
Sunday
9
.5
Table 9.5 Truth table for NOT
Since
there
Arithmetic,
are
two
relational
conditions
and
day
=
NOT
Sunday
(If
day
=
If
Sunday)
day
=
NOT
Sunday
(If
day
=
(term = 3), the
possible
Sunday)
TRUE
FALSE
1
0
FALSE
TRUE
0
1
Now
◆
The
AND
student
a
is
we
the
rst
segment
of
promoted
pseudocode
to
the
next
indicates
class
if
an
that
the
of
we
conditions
2
=
2
=
4
results.
need
column
of
2
to
four
rows:
ll
half
of
the
and
half
with
rows
(that
is
exam
/
2
=
2)
third
term
is
70
or
with
rows
1
and
TRUE
FALSE. So,
a
2
contain
TRUE
and
rows
3
and
4
mark
contain
in
know
becomes
operator
4
Suppose
combinations
that
Use
formula
operators
( mark >= 70),
number
If
logical
FALSE.
greater.
◆
Use
the
second
column
to
alternate
TRUE
and
FALSE.
IF
(mark
>=
70)
AND
(term
=
3)
◆
THEN
Display
Use
ll
e
condition
of
the
both
values
must
be
in
the
If
the
of
the
both
◆
If
value
next
of
one
then
one
the
condition
condition
conditions
any
of
is
the
result
column
and
any
additional
columns
to
is
is
is
TRUE
TRUE, then
and
the
the
result
also
is
NOT
TRUE
Column
value
of
TRUE.
values
results.
true.
Row
◆
third
‘Promoted’
(FALSE)
FALSE.
1
Column
2
Column
Condition1
Condition2
1
TRUE
TRUE
2
TRUE
FALSE
3
FALSE
TRUE
4
FALSE
FALSE
3
Outcome/Result
Table 9.6 Truth table for AND
The
mark
>=
70
Term
=
3
(mark
>=
70)
(mark
AND
(term
>=
AND
=
3)
(term
OR
=
3)
TRUE
TRUE
TRUE
Promoted
TRUE
FALSE
FALSE
Not
OR
works
next
FALSE
TRUE
FALSE
Not
promoted
FALSE
FALSE
FALSE
Not
promoted
IF
example
shows
the
result
class
for
a
◆
truth
table, you
should
list
all
the
for
the
conditions
so
that
contains
the
four
outcome
rows
of
of
each. Notice
combinations
of
in
student
mark
>=
the
top
70)
OR
Display
If
the
you
value
is
is
70
is
or
promoted
greater
or
of
to
10
of
the
the
(rank
class.
<=
10)
‘Promoted’
that
of
one
condition
is
TRUE, then
the
TRUE.
However, if
the
value
of
all
the
conditions
are
can
FALSE
determine
exam
a
segment
possible
◆
combinations
an
that
a
the
given.
creating
if
ranked
result
In
indicates
(mark
THEN
column
dierently. Suppose
promoted
student
rightmost
slightly
pseudocode
the
e
operator
70)
Table
TRUE
then
the
result
is
FALSE
9.6
and
Table 9.7 Truth table for OR
FALSE. To
calculate
needed, you
can
how
many
rows
of
number
number
TRUE
2
use
represents
or
the
the
FALSE, Y
es
formula
two
or
2
or
are
conditions
. e
options
No, 1
of
options
available, such
0, Promoted
or
as
mark
rank
(mark
>=
<=
(rank
70
10
>=
<=
70)
10)
OR
(mark
(rank
>=
<=
70)
OR
10)
TRUE
TRUE
T RUE
Promoted
TRUE
FALSE
T RUE
Promoted
FALSE
TRUE
T RUE
Promoted
FALSE
FALSE
FALSE
Not
Not
promoted.
promoted
253
9
Problem
solving
and
Combinations
program
of
design
Using
operators
the
TRUE
As
you
practise
the
use
of
operators
in
algorithms
or
owcharts, longer
expressions
can
and
FALSE
to
of
nd
A
and
the
B
above, use
result
of
A
OR
as
(NOT
pseudocode
representations
B).
be
expected.
First, create
another
For
example, if
an
exam
mark
in
the
third
term
is
70
the
and
the
class, then
student
the
is
also
student
is
ranked
in
promoted
the
to
top
the
10
next
truth
column
and
given
a
NOT
the
A
and
pattern
B, then
from
add
Table
9.5
to
B:
class
B:
NOT
B
plaque:
mark
IF
use
with
of
A:
and
table
or
nd
greater
the
(mark
(rank
THEN
>=
<=
70)
AND
(term
=
3)
AND
10)
Display
‘Promoted
and
awarded
a
>=
70
rank
<=
10
TRUE
T RUE
FALS E
TRUE
FALSE
TR UE
FALSE
TRUE
FAL S E
FALSE
FALSE
T RUE
plaque’
e
values
for
all
three
conditions
therefore
must
be
Next, using
TRUE
in
order
to
display
‘Promoted
and
awarded
the
values
of
A
and
NOT
B, and
the
a
pattern
for
the
truth
table
for
the
OR
operator
from
plaque’.
Table
Expressions
can
also
be
replaced
with
a
A:
as
A
the
A
or
B, or
basic
AND
a
phrase
expressions
B, A
OR
combinations
of
B
for
can
ease
be
. is
of
mark
>=
B:
NOT
B
A
OR
Display
completion. en
written
also
9.7, gives:
character, such
as
makes
NOT
it
70
rank
<=
10
(NOT
B)
TRUE
TRU E
FALSE
TRUE
Promoted
TRUE
FALSE
T RUE
TRUE
Promoted
FALSE
TRUE
FALSE
FAL S E
A,
easier
to
write
operators.
Not
promoted
Example
30
FALSE
IF
(mark
THEN
>=
70)
Display
OR
(rank
<=
we
still
have
TRUE
TR UE
Promoted
‘Promoted’
e
Here
FALSE
10)
two
only
outcome
that
is
FALSE
for
A
OR
(NOT
conditions:
indicates
Let
A
represent
mark
>=
70
Let
B
represent
rank
<=
10)
greater
that
or
class, then
if
the
a
student ’s
student
the
is
student
exam
ranked
is
not
mark
in
the
is
not
top
70
10
of
or
the
promoted.
Questions
1
Identify
each
of
the
the
area
arithmetic
following
a
An
code
b
The
c
There
were
d
There
must
cashier
or
be
deducted
be
more
15
operator
used
in
statements:
must
two
relational
or
three
$2
for
digits.
the
sale
passengers
more
in
item.
the
passengers
car.
3
on
Write
the
Employees
e
Pension
f
A
The
are
following
a
There
are
b
Citizens
picture
rst
three
must
ID.
statements
one
is
done
using
for
relational
you.
sisters. Answer: sisters = 3
be
at
least
18
in
order
to
obtain
a
65
is
cheque
variable
the
following
operators. The
254
There
d
contains
board.
2
c
>
students
have
from
is
not
LE T
at
age
65
equal
contains
number
statements,
a
(LE T
b
(CHR
c
(LE T
>
16)
OR
d
(LE T
>
16)
AND
e
(CHR
with
most
and
to
the
number
the
<
16)
OR
<
(CHR
(LE T
<
LE T )
<
LE T )
CHR)
8
II.
vacation.
and
answer
either TRUE
LE T )
(CHR
Grade
of
older.
16)
<
at
weeks
cash.
24. Write
as
passes
four
or
CHR
to
the
FALSE:
B)
9
.5
4
Consider
the
following
algorithm:
5
You
are
Arithmetic,
to
create
a
relational
truth
table
for
and
the
logical
operators
following
statement:
password
count
=
=
1
=‘
‘
‘page’
IF
word
WHILE
(word
(count
password)
=
password)
AND
THEN
Display
‘Access’
ELSE
Display
‘Forgot
(count
<=3)
and
password’
<=3)
INPUT
word
count
=
IF
<>
(word
word
a
count
=
+
Identify :
1
password
THEN
Display
‘Access’
ELSE
Display
‘Forgot
i
the
conditions
ii
the
two
outcomes
(results)
from
the
statement
password’
iii
the
for
number
the
of
truth
possible
options/rows
needed
table.
Identify :
b
a
an
arithmetic
b
a
relational
c
a
logical
Draw
the
truth
table.
operator
6
How
many
possible
combinations
of
options
(rows)
operator
will
be
needed
for
a
truth
table
that
has
three
operator.
conditions?
7
Let
A
represent
The
outcomes
and
if
FALSE,
following
go
to
Boolean
a
(NOT
b
NOT
(A
A)
c
NOT
(A
d
A
AND
Saturday
are
OR
OR
and
if TRUE,
town.
do
B
represent
some
Create
I t ’s
raining.
gardening,
truth
tables
for
the
expressions:
B
B)
AND
(NOT
B)
B).
255
9
.6
Desk
for
Te s t i n g
checking
the
correct
manually
checking
e
the
keeping
with
of
the
track
the
your
of
and
steps
Example
explaining
logic
process
processing
executing
one, while
and
is
algorithms
of
in
the
12
reviewing
by
an
output. Y
ou
the
algorithm
do
this
algorithm
results. We
going
by
one
started
through
Start
the
replacing
READ
verify
your
a
SOLD
a
point
INV
=
4
-
SOLD
VAL
then
=
5
*
INV
algorithm
trace
table
is
an
will
important
help
you
to
part
test
is
you
at
trace
of
a
sequence
you
have
a
of
steps
‘freeze’ the
which
seek
algorithm
‘snapshot ’ of
the
state
at
of
to
from
any
all
that
table
1
as
you
one
of
is
to
state
in
a
to
a
of
the
ver y
check
your
useful
tool, which
row
algorithm
of
the
algorithm
variable
FOR
-
loop
DO
SOLD
4. Y
ou
Example
tells
can
you
that
therefore
‘SOLD’ with
the
ll
SOLD
in
numbers
the
must
go
column
1, 2, 3
and
4.
the
next
step
is
to
perform
the
two
calculations
within
allows
loop.
the
at
that
with
table
and
shows
each
step. e
algorithm
for
as
much
you
the
column
trace
state
shows
table
SOLD
is
1, INV
=
4
−
1
=
3.
detail
of
Write
the
number
where
SOLD
3
in
the
table
under
INV, in
the
row
the
=
1.
allows
e
errors.
number
3
can
calculation, giving
now
be
V
AL
=
used
5
*
3
in
−
the
second
1.
31
Complete
the
trace
given
the
number
that
4
point.
wish. Each
step
value
you
the
1
VAL
to
labelled
W hen
see
=
and
the
to
with
END
e
e
algorithm
output.
problem. If
variables
the
algorithms.
algorithm
solve
in
loop
Now, the
An
QNTY
4
FOR
Print
testing. Using
each
4:
by
desk
each
by
number
table
4
for
is
the
the
following
input
value
Remember
the
rules
(Brackets
Order
in
mathematics: BODMAS
algorithm,
–
–
Division
–
Multiplication
–
Addition
for
–
Subtraction). ey
tell
you
in
which
order
to
do
the
QNTY.
arithmetic
erefore
READ
operations. Computers
V
AL
=
(5*3)
−
1
=
15
follow
−
1
=
the
same
rules.
14
QNTY
FOR
SOLD
=
1
to
INV
=
QNTY
-
SOLD
QNTY
VAL
=
5
DO
Write
*
INV
-
14
in
the
row
where
INV
=
3.
SOLD
QNTY
SOLD
INV
VAL
4
1
3
14
4
2
4
3
4
4
END
PRINT
QNTY
VAL
SOLD
INV
VAL
4
4
4
W hen
2
in
SOLD
the
table
is
in
2, INV
the
=
row
4
−
2
where
=
2. Write
SOLD
=
the
number
2.
4
Now
256
INV
=
2, so
V
AL
=
5
*
2
−
2
=
(5*2)
−
2
=
8
9
.6
Write
8
in
the
row
where
INV
=
2.
W hen
0
QNTY
SOLD
INV
VAL
4
1
3
14
4
2
2
8
4
3
4
4
in
the
Now
1
in
SOLD
the
Now
table
INV
=
is
in
3, INV
the
1, so
=
row
V
AL
4
−
3
where
=
5
*
1
=
1. Write
SOLD
−
3
=
(5
=
*
the
number
3.
1)
−
3
=
2
in
the
row
where
INV
=
−4
=
in
is
in
4, INV
the
0, so
the
=
row
V
AL
row
4
−
4
where
=
5
*
where
0
=
0. Write
SOLD
−
4
=
INV
=
0.
=
(5
*
algorithms
the
number
4.
0)
−
QNTY
SOLD
INV
VAL
4
1
3
14
4
2
2
8
4
3
1
2
4
4
0
−4
4
=
−4
2
e
Write
table
INV
Write
W hen
SOLD
Testing
maximum
value
in
the
loop
has
been
reached, so
1.
you
QNTY
SOLD
INV
VAL
4
1
3
14
is
move
to
print
algorithm
4
2
2
8
4
3
1
2
4
4
So
when
table
when
V
AL
on
to
next
V
AL. e
is
line
ver y
in
last
the
value
algorithm, which
of
V
AL
in
the
−4.
you
shows
freeze
the
QNTY
=
the
=
the
algorithm, the
values
at
that
4, you
have
last
time. For
SOLD
=
row
this
of
the
example,
4, INV
=
0
and
−4.
Questions
1
The
marks
25,
30,
12,
10,
−1
are
to
be
entered
using
2
the
following
algorithm. Trace
the
values
of
Trace
the
marks
count
and
average
as
the
Pseudocode_9.6.1:
marks
are
variable
mark
and
the
output
when
the
total,
65,
71
and
82
are
entered:
entered.
Calculate_average
Pseudocode_9.6.2:
Exam_results
START
START
total
=
0
count
=
0
average
=
OUTPUT
INPUT
IF
mark
THEN
0
“enter
a
mark”
ELSE
INPUT
mark
WHILE
(mark
is
not
equal
to
mark
>=
“Excellent
OUTPUT
“see
IF
mark
THEN
-1)
total
=
total
+
mark
results!”
count
=
count
+
1
ENDIF
“enter
a
mark”
OUTPUT
OUTPUT
INPUT
mark
80
OUTPUT
>=
results!”
teacher”
70
OUTPUT
“await
your
end
“Satisfactory
of
term
report”
ENDIF
END
ENDWHILE
average
=
total/count
DISPLAY
average
END
257
9
End
Multiple
1
The
choice
two
main
__________
a
of
exam-style
questions
6
questions
phases
and
algorithm,
chapter
of
problem
solving
c
denition,
execution
d
denition,
implementation.
Column
Accept
1
IF
refer
letter
THEN
to
the
diagram
Columns
1,
a
read,
b
output,
c
write,
d
input,
2
2
is
Column
A,
grade
grade
and
store
c
NOT
d
AND.
B
or
C
3
and
store
Column
Print
is
= ‘F’
an
5
b
star t
c
WHILE
d
conditional
symbol
loop
statement.
A(n)
__________
a
FOR
b
IF
c
REPEAT
d
WHILE.
9
output.
The
process
example
of
a
__________
statement.
of
and
a
compiling
output
debugging
b
looping
c
pseudocode
c
sequential
d
desk
d
conditional.
terms ‘letter ’ and ‘grade’ in
column
1
are:
‘Freezing’ an
‘snapshot ’ of
the
constants
is
keywords
a
program
c
variables
b
trace
d
subroutines.
c
owchar t
d
truth
loop
decision.
a
DO
b
REPEAT
c
WHILE
d
UNTIL.
executes
a
process
statement
achieved
algorithm
b
a
have
star t
and
end
is
an
algorithm
k nown
for
the
correct
as:
check ing.
a
__________
must
reviewing
b
The
loop
read
logical
The
a:
table
a
before
258
have
truth
values.
input
and
owchar ts
a
= ‘P ’
10
4
is:
grade
write
and
process
2
operator
3
represent:
and
process
All
processing
3
relational
below.
8
ELSE
2
>
a
implementation
Column
letter
b
of
comprise
7
4
/
execution
algorithm,
to
example
a
__________.
b
Questions 2
An
by
table
table.
state
using
at
of
a:
any
all
point
the
to
view
variables
at
a
that
point
9
Shor t
answer
v
questions
Create
End
an
countr y ’s
11
You
were
asked
to
write
a
shor t
program
that
information
about
companies
in
six
the
number
of
employees
requiring
The
is
one
trainer
for
ever y
40
IPO
employees.
trainer
is
needed
if
there
are
at
char t
of
the
employees
over
the
least
15
should
sample
of
the
data
to
Suggest
be
entered
is
shown
Country
Company
6985
Guyana
Rumaba
6987
Trinidad
Mariob
45
7295
Jamaica
Cour tstreet
87
7324
Barbados
Ever yInc
42
7361
Antigua
St.
50
7455
Belize
Maggow
On
entering
a
NumtoTrain
the
countr y ’s
number
of
Micks
code,
will
calculate
and
sent
comments
to
by
ten
the
appropriate
used
to
application
draw
the
IPO
that
char t.
and
the
best
method
to
send
the
char t
personnel.
one
describe
The
for
following
writing
Initialise
Prompt
in
disadvantage
par t
pseudocode
the
of
the
method
you
ii.
was
written
in
preparation
program:
variables
to
enter
data
in
each
variable
Calculate
the
number
of
trainers
Calculate
the
number
of
extra
68
name,
employees
the
Explain
56
to
be
print
the
trainers
required
company
trained,
number
total
number
of
trainers
needed
the
a
program
an
be
Describe
Iii
Output
and
for
below :
12
a
drawn
requirement.
to
CO_ID
be
personnel
or
ii
A
one
day.
should
more
entering
data.
However,
i
another
for
questions
training.
end
There
char t
exam-style
countries
programming
and
chapter
will
b
accept
IPO
of
Draw
a
owchar t
to
represent
the
ve
lines
of
of
pseudocode.
trainers
assigned.
b
i
Identify
the
variables
Write
to
ii
State
the
data
type
for
each
of
the
in
par t
line
Write
Determine
following
the
output
statements
for
if
each
of
DIV
30
numberofempl
MOD
30
is
conditional
purpose
of
the
two
the
line
4.
The
program
maximum
would
statements
be
Identify
statement
number
of
extra
that
would
trainers
required
for
of
should
six
most
three
be
able
countries.
to
enter
Explain
data
which
for
a
loop
suitable.
examples
of
data
that
could
be
used
in
to
par t
detail
56:
e
the
fur ther
the
numberofempl
numberofempl
Explain
add
i.
d
iv
to
1.
a
calculate
iii
pseudocode
variables
c
listed
additional
required.
test
the
algorithm
for
correctness.
iii.
259
A
PT
E
C
H
1
0
PROGRAM
10.1
Chapter
by
Programming
9
introduced
the
writing
algorithms
and
languages
concept
of
drawing
problem-solving
owcharts. It
Choosing
the
the
implementation
phase
that
an
be
converted
into
actual
programming
called
source code. In
this
problem
chapter, we
examples
of
programming
languages
to
process
of
writing
short
using
how
up
with
a
phase, there
are
Translate
language
V isual
your
such
four
main
Basic
correct
and
algorithm
as
for
almost
into
a
L ocate
Applications
are
solution
to
that
a
computer
can
actually
instructs
the
a
problem
since
it
cannot
solution
to
a
problem
itself.
is
what
a
to
set
do
of
instructions
and
how
to
do
that
it. ese
usually
converted
into
a
sequence
of
or
( VBA). If
algorithm, the
this
C++, or
you
have
translation
a
code
in
called
machine
order
to
code
processing
carr y
out
which
unit
the
is
(CPU)
stored
in
interprets
instructions
of
the
program.
should
select
the
type
of
programming
language
line-by-line.
and
syntax
correct
any
errors
in
the
code
such
is
suitable
errors, which
are
the
errors
incorrect
use
of
the
logic
syntax
errors
those
made
or
made
by
using
the
task. ere
are
many
languages
that
can
be
used
to
write
or
create
other
kinds
of
software. ese
programming
violation
by
your
as:
languages
language
for
resulting
programs
from
◆
solve
central
programming
◆
language
program
memor y. e
programming
that
2
a
codes
First, you
be
the
steps:
BASIC, Pascal, C
precise
writing
phase
numeric
1
to
computer
instructions
this
a
programmer
computer
tells
In
of
programs.
A
Implementation
art
introduce
come
the
the
share
computer
some
is
language
interpret. A
statements
language
algorithm
a
must
programming
is
Programming
during
I M P L E M E N TAT I O N
of
syntax
programmer, such
wrong
signs
or
are
grouped
into
two
categories:
rules
◆
low-level
◆
high-level
as
arithmetic
languages
languages.
operators.
Low-level
3
Execute
the
program
code. is
includes
using
ese
data
to
ensure
that
the
program
is
expected, and
can
produce
error
languages
are
machine-dependent. at
is, the
working
code
as
languages
test
messages
written
can
only
be
understood
by
the
particular
as
computer
or
processor
that
was
used
to
write
the
code.
needed.
4
Maintain
the
program
writing
as
the
well
program. is
throughout
comments
as
on
comments
includes
the
how
coding
to
within
use
the
documenting
process
the
by
program,
program
on
Machine
the
binar y
10110000
code. An
the
digits
instruction
0
and
might
1
be
to
make
written
01100001.
Advantage:
code
runs
ver y
fast
and
eciently
works.
because
26 0
uses
how
◆
it
language
it
is
directly
executed
by
the
CPU.
up
as
10.1
◆
Disadvantage:
the
programmer
confused
the
massive
the
with
program. It
is
also
may
amount
the
become
of
0s
and
1s
in
language
commands
as
programmers
has
machine
to
use
of
carr y
out
the
instructions
in
the
machine-dependent.
the
same
language
abbreviated
mnemonics, instead
can
languages
CPU.
◆
Assembly
computer
Programming
structure
but
and
program
◆
allows
words, called
binar y. So
instead
of
Advantage:
can
use
English-type
code, making
Disadvantage:
machine
it
programs
easier
have
words
to
to
to
write
create.
be
converted
to
language.
writing
Table 10.1 Examples of high-level programming languages
code
as
10110000
01100001, the
equivalent
assembly
Pascal
language
code
may
be
‘add
A, B’, generally
meaning
Named
‘add
the
contents
of
A
and
the
contents
of
A
language
for
◆
Advantage:
can
be
easily
converted
to
machine
a
program
called
an
the
17th
centur y
mathematician
Blaise
Pascal.
that
teaching
uses
structured
purposes.
Pascal
is
programming,
an
easy
to
mostly
learn
used
language
that
code
is
by
after
B’.
an
alternative
to
BASIC.
assembler.
VBA
◆
Disadvantage:
still
dicult
to
understand
compared
Visual Basic for Applications, is a programming language
to
the
high-level
languages. Still
machinedeveloped by Microsoft and derived from BASIC. Programming
dependent.
in VBA uses a graphical user interface using drag-and-drop
techniques on a form (window). Controls, such as text boxes
High-level
High-level
languages
languages
languages
in
that
and buttons, are used to design the layout on the form to work
are
they
dierent
are
not
from
low-level
with Microsoft applications such as Word, Excel and Access.
machine-dependent.
e
erefore, programs
written
on
one
computer
other
sections
program, running
generally
be
used
on
another
similar
in
use
keywords
similar
to
chapter
focus
on
writing
the
or
executing
the
code, debugging
computer. ey
techniques, testing
also
this
can
English
and
are
the
program
with
data
and
easier
documentation.
to
write.
Question
ese
languages
are
designed
to
be
easier
for
you
to
1
understand. ey
are
converted
to
machine
Explain
and
like
translating
from
one
language
to
the
dierence
between
low-level
languages
code, rather
another, so
high-level
languages.
that
261
10.2
Although
slightly
part
e
Wr i t i n g
dierent
dierent
writing
2020
the
programming
a
language
Examples
for
code
and
data
becomes
has
not
is
not
too
programs
illustrative
languages
types, for
easy
with
specied
language, but
that
of
program
programming
code
syllabus
a
it
is
a
best
shown
in
the
most
to
practice.
state
choose
to
four
statements
could
recommended
complicated
are
◆
have
learn.
to
establish
the
include
program
headers
the
name
program
was
◆
declarations
◆
Program
◆
languages
of
author
of
or
and
the
program:
comments
a
date
that
to
the
written
of
variables
statements
constructing
purposes.
the
start
expressions
and
(blocks
types
of
code), which
arithmetic, relational
(AND, OR, NOT )
and
using
include:
Boolean
appropriate
operators
Once
the
programming
language
has
been
selected,
◆
you
can
start
designed
need
to
writing
your
use
a
the
program. Once
algorithm
text
editor
and
to
tested
type
it
the
you
on
implementing
provide
an
your
programming
have
dierent
editor
that
code. Most
constructs
such
and
can
be
used
to
programming
constructs
(looping)
formatting
semantics
which
you
ver y
precise
way
in
in
a
program
must
be
which
be
understood. It
is
a
set
of
written
rules
in
various
elements
that
make
up
in
for
a
syntax
allows
the
a
correctly
structured
three
each
although
it
does
not
code
to
programmer
will
be
statement
that
symbols
For
end
is
and
the
of
have
from
a
meaning
Pascal, a
guarantee
the
meaning
language
that
make
in
other
that
the
simple
example
dierent
of
a
program
statement
up
(;)
are
elements;
is
with
the
the
words,
language.
represents
it
the
may
and
programming
VBA
in
Microsof t
show
the
program
header,
output
the
line
‘Hello
to
all
structure:
262
if
required,
e ver yone’ on
screen. ere
is
also
a
comment
pur pose
of
the
program. Y
ou
should
within
are
the
no
program
var iable
when
the
indicating
inc lude
you
dec larations
line
of
of
code;
how
since
and
the
each
syntax
you
just
code
do
not
become
is
need
familiar
w r itten.
compiler
has
to
write
in
this
S ome
slight
understand
with
the
code
may
variations
your
rst
the
determined
overall
by
the
Example
programs
Output
PRINT
share
a
pattern
also
var y
their
1
Programming
REM
structure
structured
in
e ver y
requirements.
a
language:
sentence
BASIC
Optional
purpose
Nearly
languages:
Excel. ese
constructed
semantics.
Program
program
the
languages
meaning. Statements
various
of
associated
semicolon
statement, while
another
a
useful!
punctuation
example, in
manner.
is
example,
Semantics
user-friend ly
to
code. ere
statement
a
programming
comments
‘ legal’ –
in
combining
the
create
output
is
Pascal
computer
language. e
conditions
order
and
the
terminating
the
programs
to
and
program
following
BASIC,
statements
(IF), iteration
must
written
the
conditional
languages
e
is
as
type
follow.
Syntax
pseudocode
program. Most
Sample
syntax
remaining
paper, you
◆
programs
the
have
similar
overall
Hello
to
ever yone
Output
comment
of
the
on
the
program
statement
10.2
Programming
language:
a
program
Pascal
Minimum
Program
Writing
sentence;
Keyword
age
to
obtain
licence:
Program
18
followed
of
by
program
name
then
Cost
a
of
drivers
permit:
250.95
semicolon(;)
Class
{ To
output
a
sentence}
Comment
of
the
on
the
of
licence:
B
program
Example
Begin
vehicle
purpose
Keyword
to
2
indicate
Programming
statement(s)
will
language:
BASIC
follow
below
Writeln(‘Hello
to
ever yone’);
Output
End.
Keyword
for
program
Visual
‘ To
Basic
output
for
a
Applications
Sub
example2
Dim
age
Dim
cost
Dim
grade
age
=
As
Integer
of
As
Double
code
Comment
the
Private
end
(VBA)
sentence
REM
statement
on
purpose
of
cost
As
String
18
=
250.95
program
Keywords
for
star t
of
class
=
‘B’
PRINT
“Minimum
PRINT
age
PRINT
“Cost
PRINT
“Class
code
age
to
obtain
licence:
“
CommandButton1_Click()
MsgBox “Hello
to
ever yone”
Keyword
to
statement
send
to
the
the
of
drivers
permit:
“,
cost
screen
End
Sub
Keyword
for
program
end
code
Programming
Program
In
order
to
compiler
that
will
declare
use
a
needs
be
or
variable
to
know
stored
state
in
the
within
in
a
program, the
advance
it. For
this
variables
the
type
reason, you
you
are
using
of
language:
start
of
the
program. Variable
licence:
“,
grade
Pascal
example2;
age:
data
integer;
cost:
real;
the
class:
ver y
vehicle
var
must
at
of
of
declaration
char;
means
Begin
giving
a
new
name
and
a
data
type
for
the
variable, for
age
example, age:
:=
cost
Y
ou
should
use
meaningful
variable
names
in
:=
that
if
you
or
someone
else
250.95;
your
grade
programs, so
18;
integer.
needs
to
:=
‘B’;
review
Write(‘Minimum
the
programming
code
later, the
variables
will
be
licence:
to
remember
and
understand. In
the
following
age
to
obtain
easy
‘);
example
Writeln(‘age’);
programs, three
variables
named
age, cost
and
class
are
Writeln(‘Cost
declared. Each
variable
is
then
used
in
the
programs
of
drivers
permit:
’,
as
cost);
part
of
a
sure
you
statement
to
be
displayed
on
the
screen. Make
Writeln(‘Class
note
the
variable
names
to
understand
of
vehicle
licence:’,
their
grade);
purpose.
End.
In
each
example
following
the
statements
are
to
display
the
output:
263
10
Program
implement ation
Programming
language:
VBA
Conditional
e
cell
locations
A2, B2
and
C2
in
the
spreadsheet
in
Example
Figure
10.1
are
referred
to
in
the VBA
statements
programming
3
code.
Programming
form
IF
=
BASIC
3
form
ELSE
language:
=
3
PRINT
THEN
PRINT
“Not
“Promoted
promoted
to
to
Form
Form
3”
3”
Fig 10.1 VBA Example 1
Programming
Private
Sub
Dim
age
As
Dim
cost
Dim
class
age
Var
Integer
As
grade
form
String
If
Range(“B2”).Value
=
Conditional;
form:
Range(“A2”).Value
=
Pascal
integer;
Begin
Double
As
=
cost
Program
CommandButton1_Click()
language:
Range(“C2”).Value
:=
3;
(form
=
3)
then
writeln(‘Promoted
else
writeln(‘Not
to
Form
promoted
to
3’)
Form
3’);
MsgBox
“
&
“
Minimum
vbNewLine
age
to
obtain
licence:
End.
&
MsgBox
Range(“A2”).Value
MsgBox
“Cost
Programming
of
drivers
permit:
“
language:
VBA
&
Private
Sub
CommandButton1_Click()
Range(“B2”).Value
Dim
MsgBox
&
“Class
of
vehicle
licence:
form
form
Range(“C2”).Value
=
Integer,
examples
languages
have
However, for
illustrate
slightly
the
most
form
that
dierent
dierent
programming
String
=
3
Then
syntax
part, variable
and
data
declaration
the
program
requirements
=
“Promoted
types.
result
=
“Not
do
the
variable
promoted
to
Form
3”
If
=
result
declarations.
End
Program
3”
become
MsgBox
Program
Form
is
Range(“C4”).Value
complex, so
to
Else
End
straightfor ward. As
more
As
Sub
result
ese
result
Range(“C3”).Value
If
End
As
“
Range(“C4”).Value
Sub
statements
statements
are
the
instructions
the
program. e
which
will
carr y
Looping
out
the
requirements
of
following
e
examples
such
and
a
then
264
as
illustrate
the
use
of
conditional
IF–
THEN–ELSE. A
value
is
assigned
determines
to
which
it. A
variable
form
is
should
examples
illustrate
the
use
of
looping
be
constructs
such
In
the
as
WHILE
and
FOR.
dened
conditional statement
message
following
statements
displayed.
each
‘IT
for
of
following
CXC’ 10
times.
examples, the
code
will
output
10.2
WHILE
loop
Example
FOR
4
Programming
line
=
WHILE
line
FOR
<
line
10
+
program
5
Programming
0
line
=
BASIC
a
loop
Example
language:
Writing
DO
language:
I
=
PRINT
1
“IT
BASIC
to
10
for
DO
CXC”
1
ENDFOR
PRINT
“IT
for
CXC”
Programming
ENDWHILE
Program
Programming
language:
Pascal
forloop;
Pascal
Var
Program
language:
line:
integer;
whileloop;
Begin
Var
line:
integer;
for
Begin
line
:=
While
0;
(line
line
:=
writeln(‘IT
<
10)
1
to
for
10
do
CXC’);
Do
End.
Begin
line
:=
line
Writeln(‘IT
+
1;
for
CXC’);
Programming
Private
language:
Sub
VBA
CommandButton1_Click
end;
Dim
i
As
For
i
=
Integer
End.
Programming
language:
1
To
MsgBox
Private
Sub
Dim
row
As
row
=
CommandButton1_Click()
Integer,
line
As
Next
Do
“IT
for
CXC”
i
String
End
line
10
VBA
Sub
1
=
“IT
While
for
row
CXC”
<=
10
Questions
MsgBox
“IT
Cells(row,
row
Loop
End
=
row
for
CXC”
2).Value
+
=
line
1
Explain
the
semantics
1
dierence
in
does
it
a
between
syntax
and
program.
2
What
mean
3
Why
should
your
programs?
to
declare
a
variable?
Sub
you
use
meaningful
variable
names
in
265
10.3
Running
Usually, you
can
even
view
output
ready
your
will
type
to
see
from
your
program
Next, it
source
called
program
your
to
be
an
so
several
steps
editor
it
for
this
the
is
you
have
into
machine
can
carr y
are
typed
source
code.
do
A
compiler
time
stage, you
called
CPU
you
alone
correctness. To
translated
that
before
instructions, let
run. After
tested
be
code
program
program. At
program
must
object
through
program
using
needs
code
go
your
a
so, the
can
be
an
is
will
the
then
source
output,
code
to
object
may
source
Converting
a
program
from
source
code
to
object
performed
by
a
‘translator’ program. Sometimes
listing
is
shown, which
is
a
printout
or
its
logic
issued
the
own
(F ig
errors
are
(A).
are
cause
(B).
executed
onl y
needs
Once
unit
to
then
the
the
star t
Error
it
and
compiler
executing
incorrect
Other wise,
be
that
program
another
time
one
performed,
produces
each
to
10.3).
detected,
control
program
at
program
the
is
compiled
t y pe
of
object
r un,
once.
but
If
the
there
any
modications
to
the
source
code,
then
it
a
must
program
be
instr uctions
code
are
is
code
on
unexpected l y,
the
will
program
errors
the
stops
be
is
no
instr uct
or
program
code
and
If
all
‘stand-alone’ object
and
summar y
program.
a
(r un)
syntax
compiled
error
From
for
error
out
instructions.
translates
produces
executed
checks
language
the
and
be
recompiled.
COBOL
is
a
language
which
is
soft
compiled.
copy
of
while
the
source
working
program
with
and
instructions
coding
the
as
a
reference
program.
1
Program
2
A
List
of
syntax
or
Compiler
ese
from
are
programs
one
language
that
to
translate
another
–
a
specic
from
a
program
source
code
logic
errors
high-level
3
language
to
compilers
a
low-level
and
language. Interpreters,
assemblers
are
all
Object
code
translators.
4
Execute
the
5
An
interpreter
translates
the
source
program
line-
B
Working
program
object
code
obtain
by-line, and
aborted
the
if
an
error
(stopped)
interpreter
translated
is
(Fig
detected
10.2). If
instructs
the
instruction. is
then
no
errors
control
cycle
translation
unit
will
be
are
to
repeated
instruction
in
the
program. is
is
an
easy
Fig 10.3 Illustration of the process of a compiler
for
way
of
executing
written
machine
(running)
programs
code. BASIC
is
a
language
the
computer
is
compiling
or
interpreting
not
your
in
errors
but
Often, when
inecient
errors
the
Programming
every
Run-time
results
is
detected
execute
to
which
source
code, an
error, whether
minor
or
major, will
is
cause
it
to
either
output
wrong
results
or
not
reach
the
interpreted.
stage
of
which
output
will
at
cause
all. ere
your
are
program
dierent
to
types
of
errors
crash.
Source
Interpreter
code
Results
Syntax
Syntax
errors
errors
language
occur
rules
or
a
variable
or
a
sentence
language. Examples
of
when
of
mistake
structure
syntax
errors
keyword. Syntax
is
made
of
the
the
programming
include
errors
in
stop
misspelling
the
program
Errors
instructions
code. T
ools
Fig 10.2 Illustration of the process of an interpreter
26 6
errors
quite
or
source
used
with
easily.
code
the
being
converted
program
usually
to
machine
detect
syntax
10.3
Examples
of
syntax
errors
Executing
If
if
(age
42)
then
Incorrect
you
have
“OK”
since
an
as
<
or
>
errors, you
program
Spelling
X
=
1
to
5
Do
keyword
error
◆
nal
the
linking:
errors
as
occur
in
the
using
when
a
programmer
sequence
the
in
an
of
wrong
the
program
mathematical
expression
and
see
the
terms
commonly
used
with
copying
in
a
program
order
to
put
from
the
hard
disk
program
in
state
various
pieces
of
code
and
data
to
or
incorrect
compiler
object
generate
program
will
be
will
able
to
syntax
errors
with
or
it
use
of
from
be
loaded
program
is
run
it
produces
that
of
a
logic
your
on
of
source
<
10)
does
code
that
can
be
done
at
load
time
and
also
at
run
time.
compiles, you
may
either
see
your
screen, or
you
may
see
another
type
of
error.
Runtime
errors
Runtime
errors
not
occur
as
the
program
compiles
or
messages, but
the
wrong
errors
are
usually
due
to
unexpected
events
results.
as
division
by
zero
or
lack
of
memor y
for
the
error
code
will
output
‘A
page’ when
x
<
10:
be
ver y
THEN
PRINT
(“A
programmer
to
manipulate
dicult
most
of
to
the
trace
the
as
data. Runtime
the
program
errors
may
can
produce
time.
page”)
Example
However, the
object
code
results
(x
memor y. Linking
program
the
computer
segment
executable
is,
such
Example
in
time, at
‘runs’. ese
the
single
looping
logic errors
warning
a
formula, wrong
compile;
convert
code. Compilation
any
usually
form
sentences,
results
structures. e
intended
the
of
a
runtime
error
statement
FOR
to
it
makes
Once
operator
IF
execute
are:
combining
compile
is
now
memor y
ready-to-run
can
when
code
errors
mistakes
to
two
loading:
main
together
the
can
execution
program
a
such
object
BEGIN
End
L ogic
to
in
to
Logic
program
is
◆
For
your
operator
missing
Bgin
program
program
translated
results. e
such
a
syntax
without
print
the
Running
average
=
1
to
5
DO
be:
Results
IF
(x
>
10)
However, the
code
means
than
10
THEN
error
the
and
of
PRINT
putting
output
not
when
will
it
(“A
the
be
wrong
printed
becomes
=
results/(average
–
1)
page”)
symbol
when
greater
x
than
is
in
the
less
10.
e
the
program
computer
becomes
e
will
to
produce
an
‘freeze’ when
error
the
message
value
of
or
cause
average
1.
statement
will
be:
results
=
results/(1
–
1)
Debugging
… which
Debugging
the
source
occurred
often
the
is
code
process
program
through
or
does
of
nding
the
errors
(detection), understanding
(diagnosis)
found
program
the
the
not
and
correcting
error
messages
operating
behave
as
why
system, or
expected.
division
by
zero!
they
them. Errors
generated
is
in
are
by
because
Questions
1
What
of
the
2
is
the
the
name
source
Explain
the
given
to
the
printout
or
soft
copy
program?
purpose
of
a
translator
and
give
three
examples.
3
Explain
why
debugging
is
necessar y.
267
10. 4
Testing
Te s t i n g
and
debugging
development
program
and
put
begins
and
into
are
cycle, and
early. Testing
when
are
you
until
use. It
debugging
necessar y
they
continues
daily
and
is
start
the
used
stages
best
you
the
to
incorporated
to
plan
program
to
in
techniques
ensure
completed
that
variety
application
(program)
is
complete
of
and
it
was
meant
to
attempts
debugging
when
you
ensure
◆
runs
◆
and
the
carries
nd
and
problems
xes
debug
the
your
in
your
box
crashing
user
a
for
helps
user
the
unexpected
may
or
be
reasonable
messages
a
range
to
user
program
values. It
is
is
important
branch, loop
actually
tested
and
by
using
a
cases.
testing
a
(Fig
module
provides
problems. Typically,
program, you
need
or
to
‘ black
executed
loops
no
of
not. Black
end
out
of
term
being
code;
it:
without
that
◆
isolates
test
that
to
test
of
10.5)
is
used
to
check
that
the
is
as
expected
given
certain
inputs.
do.
e
Testing
the
range
conditional
does
output
what
of
a
ever y
a
Black
computer
consider
that
statement
the
is
must
ensure
of
generating
unable
action
or
messages
resolve
produces
error
1
input
2
process
3
display
not
used
information
the
test
box
the
the
to
about
module
testing
values
because
the
examined. e
the
actual
black
whether
are
actually
attempts
all
code
box
test
statements
necessar y
or
to:
program
data
values
returned
from
the
program.
scenarios
continue
or
to
error
box’ is
is
or
system
restart
errors
the
program
if
Input
occur.
data
Output
results
Program
Errors
can
occur
at
any
stage
of
a
software
application.
Fig 10.5 Black box testing checks the output from the values input
ey
may
using
as
a
the
result
happen
frequently
application, for
of
problems
if
you
make
example, but
such
as
a
power
errors
they
also
while
occur
failure.
W hite
examine
one
Testing
cannot
prove
that
your
program
is
fully
of
can
certainly
nd
defects
(bugs)
in
the
is
no
way
to
be
sure
that
there
are
the
the
cases
inner
most
(F ig
10.6)
structure
important
of
test
are
the
designed
program
to
and
methods. e
are
the
accuracy
of
the
module
from
test
input, through
program, but
ever y
there
test
correct.
checks
It
box
absolutely
possible
path
through
the
test
object, to
the
no
output.
errors
in
earlier
the
a
the
logic
defect
program
is
of
the
program
found, the
code. erefore, the
easier
it
is
to
x
it. Testing
involves:
1
creating
a
set
2
running
the
3
checking
of
test
cases
program
that
the
with
each
performance
test
of
case
the
software
is
as
Fig 10.6 White box testing examines the inner structure of the module
expected.
Since
Test
A
test
cases
case
compares
when
26 8
a
choose
documents
the
the
predicted
program
testing
is
values
results
that
with
executed. W hen
are
the
input
actual
choosing
and
results
test
cases
a
range
conditions
of
which
produce
ever y
of
(Table
test
value
values
to
impractical, you
check
10.2). Y
ou
data, if
errors.
is
specic
should
any, would
be
also
should
error
be
aware
expected
to
10. 4
Table 10.2 Testing strings and numbers – examples of values
to test
Testing
has
program
string
often
subroutines
String
consisting
String
with
Special
be
solely
leading
characters
or
of
white
trailing
such
as
-,
space
white
#, “
, ‘
,
&
these
space
and
tests
Although
typed
on
to
this
with
be
often
which
determine
quality
tested
varies
sections
before
includes
they
the
debugging
of
testing
from
of
the
system
the
their
interact. e
quality
techniques
of
other
results
of
application.
to
system, some
<
common
‘Foreign’ characters
and
planned. Some
have
completion, and
Strings
Empty
to
Testing
international
attributes
include:
keyboards
◆
Reliability : is
is
the
probability
that
the
inputs
to
Numbers
and
No
number
Zero
(that
is,
leave
input
blank),
if
a
0
◆
Small
and
large
positive
Small
and
large
negative
Positive
numbers
Negative
out
numbers
Numbers
with
Combinations
of
out
leading
of
numbers
of
zeros
letters
and
such
◆
range
as
the
in
the
correct
screen
program
username
(Fig
that
and
gives
in
user
password
software
access
entered
in
based
the
on
in
10.7).
◆
A
under
software
will
not
to
the
and
a
by
cause
it
to
crash
for
does
clear
expand
user
Portability : is
be
operating
to
result
program
or
in
messages
the
for
run
robust
if
an
irreversible
at
it
the
is
to
debug,
appropriate
eects.
should
output
form
must
allow
should
and
be
be
exible
also
easy
provided
be
to
in
a
understand.
ease
one
on
easy
side
system
results
can
is
designed
adapted
stable
how
well-structured
form
system
the
software
error
the
not
undesirable
interpret, and
that
is
means
user. e
and
conditions.
application.
without
the
certain
system
operation
Usability : e
input
log-
time
its
locations
a
the
Maintainability : is
modify
0034
numbers
◆
Consider
Stability :
damage
range
required
of
specied
error
numbers
required
use
possible
with
type
of
dierent
which
a
software
computer
computers
can
and
systems.
Questions
1
Explain
the
a
testing
b
black
dierence
and
between:
debugging
Fig 10.7 Testing a username and password access screen
Examples
of
usernames
and
passwords
as
test
cases
can
2
Give
two
testing
include
combinations
of
values
as
shown
a
white
examples
of
box
what
testing.
should
be
done
when
program.
List
three
attributes
Username:
Password:
1
Admin
newday2019
2
01boss
Admin
which
3
00112233
newday2019
answer. Write
4
New
Empty
completed
4
day2019
and
below:
3
Test#
box
You
to
have
test
written
will
the
of
rigorous
add
a
a
good
program
that
has
testing.
program
these
to
numbers
examples
of
input
and
values
two
integers
output
that
the
could
be
used
program.
269
10.5
Program
Documentation
design
is
an
document ation
important
process. Several
types
part
are
of
the
produced
the
software
during
the
sections
will
help
you
understand
more
about
programming.
process.
Example
with
Documenting
programming
the
6
shows
the
keywords
or
listed
programming
symbols
used
for
languages
adding
code
comments.
Documenting
or
comments
Comments
are
useful
then
tr ying
to
to
it
write
a
the
Many
students
nished
later, you
and
may
what
that
some
write
their
working. If
doesn’t
your
may
be
leave
why
you
REM
Apr
28,
supposed
REM
*******************
REM
This
others
or
used
to
single
since
REM
it.
the
a
BASIC
time
Ali
James
2020
program
will
output
a
sentence
*******************
program
comments
used
language:
by
and
after
the
REM
some
were
Programming
or
and
reviewing
comments
the
spend
code
6
Written
SBA
you
Example
doing.
code, especially
will
you
is
phases
debugged
help
variables
resemble
be
sections
your
remember
dierent
code
for
therefore
of
short
programming
to
code
moderator
not
method, used
code
a
your
later, you
purpose
or
typing
your
needs
your
month
remember
teacher
what
alongside
achieve. Comments
your
means
program
you
understand
is
the
review
code
describing
placed
if
updated. If
your
for
Programming
language:
Pascal
certain
another
set
requirements. en
{Written
by
Ali
{Apr
2020
James
}
of
28,
}
you
{*******************
may
resort
to
typing
in
comments
that
are
similar
{This
the
code. is
is
not
a
good
program
in
will
output
a
method.
single
Comments
}
to
programming
code
should
include
the
sentence
}
{*******************
}
following:
◆
An
over view
rephrasing
◆
e
◆
e
or
If
of
step
the
date
that
the
reviewed. is
you
process
the
have
of
for
program
nally
of
was
found
the
than
Visual
program
and
created
good
or
modied
guideline
of
how
updated.
a
Basic
you
to
did
while
27 0
did
and
explain
Adding
seem
that
not
solution
include
that
a
tedious
writing
any
section
comments
like
work, you
your
to
your
should
comments
of
(VBA)
Written
by
the
to
a
part
of
document
that
‘
Apr
2020
‘
*******************
‘
This
28,
program
will
output
a
single
would
code
you
help
that
may
add
*******************
what
User
process. However, if
nd
James
the
code.
may
Ali
sentence
programming
code, you
Applications
‘
‘
code
for
even
programs.
was
a
tasks, rather
code.
some
provides
program
and
your
authors
information
recently
◆
the
each
name(s)
contact
of
them
explaining
User
documentation
documentation
program
do
what
does
it
is
and
is
concerned
how
supposed
the
to
end
do. It
with
user
is
what
makes
usually
the
the
the
program
rst
10.5
contact
of
how
they
to
have
input
printer, save
the
the
data, how
les
program
with
and
and
so
how
system. It
to
format
on), how
to
to
interpret
may
give
output
access
any
details
(use
the
features
system
of
messages.
◆
facilities
can
reader
familiar
is
its
concepts
an
optional
explains
User
documentation
should
be
structured
in
such
that
it
is
not
necessar y
to
read
it
all
before
and
use
the
application. It
is
usually
integrated
with
how
to
the
manual
system
assumes
and
that
the
understands
terminolog y
system
administrator’s
react
to
situations
guide
which
which
arise
the
system
is
in
use. It
also
carries
out
system
starting
housekeeping
to
used. is
document ation
a
while
way
be
Program
as
part
tasks
such
as
making
a
system
of
backup.
online
share
help, with
information
system
user
lots
more
on
of
blogs
how
to
online
chatrooms
troubleshoot
eciently. Five
documentation
and
common
and
use
components
to
the
of
are:
Questions
1
Give
two
when
◆
a
system
over view
which
explains
what
the
◆
an
and
cannot
installation
install
the
Explain
why
document, which
explains
system
and
tailor
it
for
write
your
how
to
when
congurations. e
recover
things
illustrations
◆
an
a
from
go
reference
system
to
errors
wrong. It
and
introductor y
terms, how
◆
is
impor tant
should
you
include
State
the
comments
as
you
keyword
manual
with
manual, which
available
each
include
4
a
Pascal
b
VBA.
Describe
the
explains, in
the
to
the
simple
system
describes
user
or
in
of
symbol
the
dierence
documentation
which
started
in
used
following
to
identify
a
programs:
suggests
problems
examples
get
facilities
basic
should
code.
particular
document
and
programming
how
comment
hardware
documentation
application.
do
3
to
why
an
system
2
can
reasons
designing
detail
and
all
how
5
Explain
two
a
program
b
user
and
between
user
components
program
documentation.
of
the
following:
documentation
documentation.
the
these
271
10
End
Multiple
of
choice
chapter
exam-style
questions
questions
7
1
The
par t
of
the
programming
instructions
a
computer
code
of
the
in
that
order
program
to
is
carr y
out
errors
a
test
in
b
CPU
c
ALU
d
ROM.
Errors
resulting
from
rules
a
data
b
logic
c
syntax
b
syntax
c
wrong
d
d
error
results
are
incorrect
use
of
messages.
Debugging
is
test
b
messages
c
source
code
d
object
code.
process
of
nding
errors
in
the:
data
programming
called:
A
test
case
documents
to
the
compare
values
them
that
with
are
the
actual
__________
work ing
a
as
data
ensures
that
the
program
a
program
is
__________.
a
input,
compiled
b
input,
executed
c
output,
compiled
d
output,
executed.
is
expected.
correct
b
output
c
sample
d
source.
10
An
example
graphical
of
user
a
VBA
b
BASIC
c
COBOL
a
programming
inter face
language
that
uses
Adding
comments
a
when
b
while
c
after
d
when
a
user
to
has
writing
a
program
tested
the
is
best
achieved:
it
program
a
the
program
is
written
is:
11
The
it
is
keyword
maintained
REM
a
error
b
comment
c
data
d
loop.
in
in
BASIC
the
future.
refers
to
a(n):
message
PROLOG.
variable
such
as
a
that
stores
word,
a
string
b
integer
c
number
d
character.
a
phrase
collection
or
of
sentence
type
characters
is
a(n):
12
Testing
a
program
involves
each
of
the
following,
except:
6
Which
of
the
following
are
true
for
a
star t
b
end
value
c
both
star t
and
end
values
are
d
both
star t
and
end
values
must
value
must
must
be
be
a
creating
b
xing
a
c
running
d
check ing
set
errors
the
of
in
test
the
cases
program
program
with
each
test
case
FOR
statements?
272
results
runtime.
Using
A
the
a
when
5
produce:
errors
__________
d
can
the:
9
4
program
CU
language
3
a
data
the
8
2
Logic
interprets
k nown
k nown
optional
be
k nown.
the
per formance
of
the
software.
10
Shor t
13
answer
Consider
the
following
using
While
total
=
0
count
=
0
average
=
samples
of
average
of
exam
marks
loop
‘Enter
mark
WHILE
(mark
a
mark’
Pseudocode_B:
using
Repeat
total
=
0
count
=
0
average
=
questions
is
not
equal
to
–1)
INPUT
total
+
mark
IF
count
=
count
+
1
THEN
‘Enter
a
mark’
ELSE
OUTPUT
INPUT
mark
0
UNTIL
DISPLAY
‘No
marks
entered’
ELSE
average
=
total/count
DISPLAY
average
‘Enter
of
exam
marks
mark’
mark
mark
ENDWHILE
=
average
loop
0
DISPLAY
=
THEN
exam-style
REPEAT
total
count
chapter
pseudocode:
0
INPUT
IF
of
questions
Pseudocode_A:
OUTPUT
End
=
–1
DISPLAY
‘End
of
marks’
total
=
total
+
mark
count
=
count
+
1
mark
=
=
–1
IF
count
0
THEN
DISPLAY
‘No
average
=
marks
entered’
ELSE
END
OUTPUT
total/count
average
END
a
For
one
with
b
or
both
samples,
documentation
language
assigned
Enter
following
the
program.
were
nal
For
able
to
results
each
by
i
23,
15,
18,
A+,
23,
15,
18,
–10,
iii
–1,
23,
15,
iv
23,
15,
18,
your
all
of
if
–10,
suitable
Algorithm: Training
code
Declare
programming
data
to
test
explain
the
data
the
whether
and
state
you
the
Declare
countr y,
Prompt
to
Accept
Accept
14
14,
–1,
A+
Prompt
18,
–10,
14,
A+
Accept
14,
–1,
Consider
accept
the Training
information
requiring
algorithm
about
the
opposite
number
of
that
will
employees
code,
name,
company
and
employees
to
be
trained
are
company
a
trainers,
extras
as
as
literals/string
code
enter
countr y
countr y
to
enter
company
company
to
enter
numberofempl
numberofempl
number
of
trainers
Calculate
number
of
additional
extras
>=
/
=
numberofempl
trainers
/
(extras)
30
from
30)
15
number
Then
of
enter
(numberofempl
training.
countr y ’s
numberofempl,
Calculate
If
A
to
Prompt
A+
Accept
12
code,
code
Prompt
any.
–1,
variables
number
teacher.
sample
errors,
ii
a
sample,
enter
or
write
using
entered
trainers
=
trainers
+
1
when
Output
the
number
of
trainers
needed
prompted.
End
There
is
one
trainer
for
ever y
40
another
trainer
is
algorithm
employees.
a
However,
of
needed
if
there
are
Convert the following algorithm into code for a
at
programming language approved by your teacher.
least
15
or
more
employees
over
the
requirement.
b
The
program
trainers
will
assigned.
calculate
and
print
the
number
Inser t
lines
to
appropriately
document
the
program.
of
c
Update
for
six
the
program
to
accept
the
information
countries.
273
A
PT
E
C
H
1
1
PROGRAMMING
11.1
e
Introduction
programming
language
to
computer
schools. is
is
Pascal
is
used
programming
to
teach
in
Pascal
promotes
a
and
logical
approach
to
rst
program
you
start
Ez y
Pascal, the
Pascal
editor
will
systematic,
appear
well-organised
your
many
W hen
because
PA S C A L
Pa s c a l
Wr iting
introductor y
WITH
(Fig
11.1). e
upper
green
area
is
to
show
the
learning
result
of
your
programs, while
the
lower
blue
area
is
programming.
used
is
chapter
shows
implementing
the
Chapter
this
you
will
10. If
need
a
programming
or
programming
written
Y
our
the
and
number
digit
not
able
your
basics
on
to
as
a
building
a
for
baking
bench. Pascal
as
English
code.
language,
started. ink
recipe
program
in
programming
get
the
of
introduced
rst
language, just
or
text
is
of
wrong
few
phone
call
knowledge
is
aspects
typing
is
is
of
a
a
cake
one
one
spoken
language.
mobile
your
practical
language
instructions
and
the
programs
for
has
a
when
that
message. en
made, or
how
keypad
it
is
you
message
you
you
use
click
dialling
a
type
send
sent, without
done. However, if
are
to
you
the
type
number, you
a
will
Fig 11.1 Ez y Pascal opening screen
be
to
contact
the
correct
person.
In
Similarly, a
computer
uses
an
application
your
shown
a
compiler
to
produce
a
result
by
translating
in
a
program
you
write
into
a
computer
can
instructions, the
interpret. If
compiler
you
cannot
type
the
produce
below. In
in
place
it
produces
syntax
errors
or
any
in
place
Pascal
runtime
errors.
this
are
a
number
chapter, Ez y
online
for
‘Ez y
of
is
274
Software.
rst
line, be
sure
to
type
your
‘type
your
name
here’
and
today ’s
‘today ’s
date
here’
My
your
ºrst
name
here}
simple
program
written
Pascal}
compilers
used. Y
ou
Free
available. In
To
should
Download ’ from
search
type
Program
output
today’s
one
line}
date
here}
Sentence;
Begin
Writeln(‘Hello
Dolphin
End.
Bay
program
compiler
Pascal
Pascal
Pascal
the
type
type
{Title:
{Date:
ere
of
of
{Purpose:
a
Pascal
results.
in
Finding
short
wrong
{Name:
Instead
the
form
date
the
editor, type
the
name
instructions
Pascal
called
to
everyone’);
11.1
e
is
word
the
Program
rst
line
program. In
of
this
tells
code
the
that
Pascal
compiler
contains
example, the
name
the
of
that
name
the
of
a
this
name
the
program
memor y
is
be
two
will
main
section
of
a
program
starts
at
the
nishes
at
‘End ’. W ithin
this
specic
instructions
the
compiler
that
need
to
be
solve
our
executed
included
to
the
words, then
words. So, for
name
name
of
remove
‘Sentence’ as
the
the
program
will
will
spaces
example, ‘One
‘OneSentence’. Pascal
the
Sentence’
add
the
extension
.pas
to
the
program. Y
ou
will
see
the
of
the
program
above
the
Ez yPascal
menu
by
(Fig
are
more
the
Pascal
section,
name
the
program. If
the
become
type
to
word
default
‘Begin’ and
the
or
between
Sentence.
e
of
stick). en
Introduction
11.3).
programming
problem.
Fig 11.3 Your program is given a name and shown at the top of the
Ez y Pascal screen
Compiling
e
Pascal
program
the
compiler
from
into
machine
unit
can
rst
or
checks
click
the
screen
be
your
errors
were
(also
location
you
that
to
icon
on
of
the
the
in
central
ensure
the
that
the
will
the
an
bottom
no
of
you
compiler
typing
be
a
of
message
the
or
typed
output
bottom
error
will
editor
processing
Run, Compile
menu. If
compiler
error
Pascal
correctly. e
successful’ at
at
the
typed
the
made. Select
11.4). Other wise
displayed
convert
program
correctly, the
(Fig
possible
so
program
‘Compile
to
statements
the
Compile
ever ything
message
the
needs
language
execute
syntax
program
the
will
screen)
and
highlighted
a
on
a
Fig 11.2 Typing Pascal code into the editor
line
Notice
and
the
are
always
rst
four
ignored
start
by
your
lines
the
of
code. ese
Pascal
programs
are
compiler. Y
ou
with
the
of
code.
comments
should
following
comments:
◆
your
◆
the
◆
a
◆
the
name
title
brief
of
the
program
description
of
the
purpose
of
the
program
Fig 11.4 Compiling the program shows a message at the bottom of the screen
date
the
program
was
created.
that there were no syntax errors
Saving
Y
ou
the
should
program
save
program, click
save
your
ever y
In
program
you
File, Save. Browse
program
(such
as
the
to
type. To
where
save
you
Documents
folder
or
11.5, the
immediately
the
want
Figure
to
where
at
the
the
end
below
error
of
is
the
compiler
the
has
highlighted
error. e
located:
the
orange
semicolon
the
arrow
was
line
shows
omitted
line.
275
11
Programming
with
Pascal
Running
Once
(run)
you
the
the
have
click
the
program
no
program
output. From
or
program
as
the
Run
compilation
to
see
Run
if
in
produces
menu, select
icon. e
shown
it
errors, you
program
Figure
can
the
the
will
correct
Run
compiling
multiple
may
not
and
removing
corrections, and
know
which
errors. erefore, it
more
errors, if
errors
correction
is
best
to
caused
make
you
11.6.
make
appear, then
the
you
additional
corrections
in
this
order:
1
Identify
2
Save
3
Compile
Y
ou
and
the
should
there
are
message
each
error
individually.
program.
the
program
continue
no
is
correct
errors
to
and
again.
Fig 11.6 The output of the program named Sentence
compile
the
the
program
‘Compilation
until
successful’
shown.
Questions
1
State
which
Pascal
276
of
the
program:
a
Add
numbers
b
10Lines
c
For
d
ThreeChoices
e
maxValues
Loop
following
are
valid
names
for
a
2
List
three
program.
steps
to
follow
when
option
execute
Fig 11.5 The compiler has highlighted the line immediately below the error
W hen
execute
compiling
a
in
a
St r u c t u re
Congratulations!
rst
Pascal
Now
that
program, you
you
have
should
completed
compile
and
your
execute
it
to
see
of
a
your
Pascal
of
a
Pa s c a l
results. Table
11.2
program
11.1
shows
the
basic
structure
program.
Table 11.1 Structure of Pascal program
Program
Program
Example(s)
Explanation
Program
All
header
name;
Sample;
For Ez y Pascal
Pascal
word,
programs
Program,
is
must
have
a Program
heading. The
first
compulsor y.
Or
Program
Sample
(input,
output);
For some other compilers
Declarations
Const
Const
pi
=
3.14;
Const
when
Var
Var
Mark,
Test:
Count:
Grade:
Title
Procedures
Begin
and
integer;
Var
real;
is
must
char;
as
= ‘Hello’;
is
shor t
you
shor t
first
for
create
for
variable.
declare
integer, Test
include
constant. You assign
as
integer,
a
value
to
a
constant
it.
Before
it. These
real
real,
and
you
can
examples
Grade
character
as
and
use
a variable,
declare
Mark
character. Variable
literal
you
and
Count
types
(string).
functions
Begin
Denotes
Read(Mark);
These
Writeln(‘ Thank You’);
input,
the
star t
of
one
or
more
programming
statements
Statements
If
(Mark
Else
>
30) Then
Grade
Grade
:= ‘P ’
include:
output,
:= ‘F’;
conditional
(IF–THEN–ELSE)
assignment.
For
count
:=
1
to
5
Do
For
Begin
loop
Begin
Test
:=
Mark
*
Writeln(‘ The
count;
test
output
is ‘
,
test);
a
compound
statement)
compound
statements
have
End;
Mark
>
30
two
or
more
consecutive
statements
End;
While
(of
Do
(of
While
a
compound
statement)
loop
Begin
Writeln(‘ This
is
Writeln(‘More
a
sample
while
statements
can
loop’);
go
Can
include
compound
statements
enclosed
compound
statements
that
in
Begin
and
End
here’)
End;
Repeat
Repeat
Writeln(‘this
is
Writeln(‘More
Until
End.
End.
Mark
>
a
sample
Repeat
statements
can
loop’);
go
here’)
loop
Can
include
and
End
may
not
need
Begin
30;
End.
(with
a
full
stop)
indicates
the
ver y
last
line
or
end
of
the
program.
277
11
Programming
with
Pascal
Punctuation
no
e
semicolon
is
used
to
separate
declarations
Else
most
statements. Many
Pascal
programs
are
written
Writeln(‘This
a
structure, such
However, since
declarations
program
to
and
will
Program
the
as
those
semicolon
compile
Sentence;
everyone’);
previous
separates
statements, the
also
in
and
the
following
Pascal
If
a
a
semicolon
syntax
e
Writeln(‘Hello
End.
last
‘End.’
keywords ‘Begin’ and ‘End’ act
as
the
individual
error
line
e
brackets
is
placed
for
of
full
Comments
e
within
Newline);
examples.
run:
Begin
is
to
line’,
follow
semicolon
End
and
the
ever y
stop
in
{
}
with
the
End, this
IF–THEN–ELSE
Pascal
program’s
denotes
can
the
however
end
be
would
code
of
cause
statement.
the
written
must
be
program.
after
this
last
for
statement.
multiple
but
statements, so
usually
after
End
there
to
is
show
no
the
semicolon
end
of
the
after
begin
statements.
Statements
ere
are
some
occasions
when
no
semicolon
is
Statements
after
If
End, as
in
(line
Then
the
following
Pascal
give
instructions
to
the
computer. A
simple
example:
statement
is
statement
comprises
are
>80)
Begin
in
used
{perform
the
following
two
within
statement
a
single
instruction
two
‘Begin’ and
is
useful
if
or
while
more
a
compound
statements
‘End ’ keywords. A
you
need
to
that
compound
perform
some
statements}
instructions
Writeln(‘This
is
over
the
on
Newline
:=
Newline
–
in
sequence
or
repetitively
before
moving
line’);
to
the
next
set
of
statements. Various
types
of
line;
statements
are
explained
in
Table
11.2.
Table 11.2 Types of statements
Statement
Example
Explanation
Input
Read;
The
cursor
stays
Readln;
The
cursor
moves
statement
Read and Readln reads data from keyboard, and
waits for the Enter key on the keyboard to be pressed
Assignment
Places
data
statement
in
a
next
to
to
the
the
text
next
entered
line
after
the
text
is
entered
Mark
:=
30;
:=
variable
is called the assignment operator
The variable is on the left of the assignment operator
The value is on the right of the assignment operator
The semicolon (;) ends the statement
Here, Mark is assigned the value 30
Output
Shows
statement
the
output
on
the
monitor
screen
Write;
The
cursor
remains
Writeln;
The
cursor
goes
Write(Mark);
Outputs
30
Outputs
30
Writeln(Mark);
|
Write(‘Score
of ’
,Mark);
Writeln(‘Score of ’
,Mark);
(|
statement
Begin
Mark
of
30
Outputs
Score
of
30
Mark
1
Writeln(Mark);
End;
278
(|
5;
Two
End;
(of
or
a
is
a
same
star t
of
place
the
cursor)
statement)
consecutive
compound
statements
statement)
on
next
|
compound
more
(of
the
the
cursor)
Score
Begin
:5
the
at
the
Outputs
|
Compound
is
to
the
line
screen
11.2
Structure
of
a
Pascal
program
Questions
1
Explain
the
a
a
b
write
c
:=
dierence
compound
and
and
a
between:
statement
and
a
single
writeln
=
b
2
Consider
Fragment
these
two
fragments
of
Pascal
Determine
line
statement
were
i
line
:=
85
ii
line
:=
(line
>
55
Fragment
Initialise
line
if
the
values
for
the
variable
to:
1
into
a
Pascal
program.
code:
to
any
value
and
Newline
to
85.
1
and
run
the
program.
80)
i
Then Writeln(‘Extra
Initialise
:=
Newline
the
value
for
the
variable
line
to
line’);
85
Newline
output
Conver t
Compile
If
the
initialised
–
and
run
the
program
again.
Note
the
line;
results.
Writeln(‘Same
line
’
,Newline);
ii
Fragment
If
(line
Then
>
2
55
80)
and
the
run
value
the
for
the
program
variable
again.
line
Note
to
the
results.
Begin
c
Writeln(‘Extra
Newline
Change
:=
line’);
Newline
Repeat
of
–
both
par t
b
for
Fragment
2.
Compare
the
results
programs.
line;
End
Else Writeln(‘Same
line
’
,Newline);
279
11.3
Fo r m a t t i n g
Sometimes
you
to
the
output
expected. ere
look
at
your
of
are
code
a
Pascal
times
again
the
to
output
program
is
just
however, when
see
what
is
of
you
Pa s c a l
what
programs
e
result
missing, has
Enter
errors, or
sample
maintain
run
look
not
set
programs
program
and
is
in
the
the
in
logical
illustrate
Example
1
you
typed
result
given
your
of
it
steps. e
various
into
indentation
it. If
like
out
the
following
results. Type
Pascal
code, then
to
compile
output
two
should
Suppose
numbers
in
you
or
were
to
output
text. Update
Example
2)
to
statements
your
include
program
input
and
that
once
output
combine
again
(as
statements.
below.
Example
Example
integers
|
the
editor. Tr y
correctly, your
is:
need
2
1
Program
Program
var
Bigger;
num1,
Var
num1,
Bigger;
num2:
num2:
integer;
Begin
integer;
Write(‘Enter
Begin
Write(‘Enter
two
integers
two
integers
‘);
Readln(num1,num2);
‘);
Writeln(‘You
End.
’,
entered
‘,num1,’
and
num2’);
End.
e
result
is:
W hen
Enter
two
integers
press
e
vertical
Notice
bar
where
it
‘|’ in
is
the
output
represents
the
cursor.
then
now, you
program
the
did
program
cannot
not
enter
have
code
run
this
program, type
the
number
3, then
the
Spacebar, then
press
the
Enter
type
the
key. e
second
program
number
ends
56,
there.
located.
e
For
you
|
to
any
any
data, since
input
change
the
is:
the
statements. Modify
output
result
statement
as
Enter
You
two
integers:
entered
3
and
3
56
56
follows:
Dividing
Write(‘Enter
two
integers
two
numbers
‘);
Adding, subtracting
and
numbers
program
in
a
Pascal
multiplying
integers
involves
and
real
assignment
to
statements. However, division
numbers
Writeln(‘Enter
two
integers
cursor
28 0
and
now?
run
the
program
integers
or
real
slightly
dierent
numbers. Tr y
‘);
and
Compile
are
is
again. W here
is
the
running
the
following
two
programs:
if
the
compiling
11.3
Example
is
3
It
Program
Var
Formatting
time, your
may
look
answer
is
the
not
output
quite
of
what
Pascal
you
programs
expected.
like:
Int_division;
int1,
int2,
result
:
1.00000000000000000E+0001
integer;
by
Begin
int1
:=
10;
int2
:=
2;
result
:=
2.00000000000000000E+0000
equals
5.00000000000000000E+0000
int1
Writeln(int1,
‘equals
divided
div
‘
Y
ou
int2;
divided
by
‘,int2,
‘,result);
need
more
to
apply
the
user-friendly
modied
from
the
formatting
feature
output. Example
version
in
5
Example
to
has
4
produce
now
by
been
formatting
End.
the
Your
result
should
be
similar
to
output
of
divided
by
2
equals
5
5
Program
Var
Example
numbers.
this:
Example
10
the
Real_division_2;
realA,
realB,
result
:
real;
4
Begin
Program
Var
realA
:=
10;
realB
:=
2;
Real_division;
realA,
realB,
result
:
real;
result
:=
realA
div
realB;
Begin
Write(realA:2:2,
‘
divided
realA:=10;
by
‘,realB:2:2,
‘
equals
realB:=2;
‘,Result:2:2);
result
:=
realA
div
realB;
End.
Writeln(realA,
‘,realB,‘
‘
divided
equals
by
‘,result);
e
result
now
looks
like:
End.
10.00
divided
by
2.00
equals
5.00
Questions
Conver t
each
of
the
following
sets
of
pseudocode
to
a
2
Pascal
program.
Be
sure
to:
number
◆
include
comments
in
the
WHILE
◆
declare
all
=
1
program
(number
<=
3)
DO
variables
BEGIN
◆
include
appropriate
indentation.
1
number
=
Output
“the
number
+
1
number
is”,
number
ENDWHILE
Algorithm
Calculate_age
OUTPUT
INPUT
thisyear
INPUT
birthyear
age
thisyear
=
–
age
<
=
integer
13
OUTPUT
“Millee
is
a
age
=
13
OUTPUT
“Millee
is
to
19
DO
teen”
Output
ELSE
loop”
3
FOR
THEN
of
birthyear
age
IF
“out
not
a
“You
are
a
teenager”
teen”
ENDFOR
ENDIF
281
11
Programming
with
Pascal
4
Pseudocode:
total
=
0
count
=
0
average
=
average_of_exam_marks
0
REPEAT
DISPLAY
INPUT
IF
‘Enter
mark
mark
THEN
mark’
=
-1
DISPLAY
‘End
of
marks’
ELSE
UNTIL
total
=
total
+
mark
count
=
count
+
1
mark
=
-1
IF
count
=
0
THEN
DISPLAY
‘No
average
=
marks
entered’
ELSE
OUTPUT
END
282
total/count
average
A
PT
E
C
H
1
2
PROGRAMMING
12.1
V isual
Introduction
Basic
Microsoft ’s
for
Applications
programming
customised
to
Visual
( VBA)
is
programming
code
in
Basic
part
language. Y
ou
WITH
for
write
in
Word
to
complement
their
and
output
earlier
FOR
A P P L I C AT I O N S
your
versions
of
results. To
Excel
add
(such
as
the
Developer
tab
2007):
Access, Excel
1
and
B ASIC
Applications
code
of
can
VISUAL
built-in
Click
on
the
Oce
button
(top-left
corner
of
the
functions.
screen)
Each
application
also
has
the
built-in
V isual
Basic
2
Editor. If
you
use
any
of
these
applications
for
Select
Excel
Option
School-Based
Assessment
(SBA), then
you
will
to
submit
additional
les
for
the
Select
since
it
is
included
in
the
will
be
used
examples
in
ere
two
place
the
are
a
or
ways
write
following
editor
using
in
to
1
Add
2
P lace
3
Change
the
box.
the
Popular
tab
on
the
left
and
check
the
Developer
tab
in
the
Ribbon
option
12.1).
programming
VBA
steps
Excel
on
code
the
VBA
within
summarise
Excel, and
code. Either
spreadsheet
one
how
the
access
editor.
way
to
to
to
access
write
the
programs
code:
the
a
write
Button
Microsoft
VBA
illustrate
the
chapter.
Command
code
e
this
to
of
le. Microsoft
(Fig
Excel
corner
programming
Show
component
lower-right
not
3
need
Options, in
your
Developer
Command
the
name
tab
if
it
Button
of
the
is
not
visible.
on
the
spreadsheet.
Command
Button
to
an
Fig 12.1 Adding the Developer tab in Microsoft Excel 2007
appropriate
4
Type
the
name.
VBA
code
into
the
editor
and
set
up
the
To
add
the
Developer
tab
in
later
versions
of
Excel,
spreadsheet.
such
Test
your
program
by
clicking
on
the
can
also
bring
up
the
(2013
VBA
editor
Alt
+
Right-click
Under
side
the
Developer
tab
you
on
Ribbon
the
(Fig
ribbon, and
then
click
12.2).
have
added
the
Developer
tab
in
of
editor
becomes
available
to
the
the
dialogue
Ribbon, on
the
box, select
Main
check
(Fig
right
tabs
(if
Tick
the
Developer
box
12.3).
an
Click
application, the
Customize
necessar y).
3
Once
anywhere
the
F11
2
Adding
2016):
by
Customize
pressing
and
Command
1
Button. Y
ou
as
write
OK.
your
283
12
Programming
with
Visual
Basic
for
Applications
Fig 12.2 Right- click on the ribbon and select Customize the Ribbon
Fig 12.4 Locating the Command Button on the Developer tab
Fig 12.5 Inser ting a Command Button on the worksheet
If
you
wish
to
move
the
Command
Button
to
another
location:
Fig 12.3 Check the option to Add the Developer tab
1
The
Command
Command Button
is
similar
to
the
Once
a
form
the
and
or
Close
buttons
dialogue
V isual
Basic
box. It
that
is
you
used
Design
would
to
the
Mode
place
a
use
execute
to
code
in
As
you
the
Button
on
your
1
following
Click
the
click
on
the
shows
circles
at
the
edges, you
can
it
or
cut
and
paste
it
in
another
location.
create
number
more
for
the
Command
Command
to
Buttons
Button
on
the
sheet,
increases
CommandButton2
from
and
worksheet, use
so
the
it, then
close
editor.
Command
select
Button.
button
CommandButton1
To
to
Submit, OK,
drag
Cancel
on
Command
Button
2
e
Click
on.
steps.
Developer
tab, then
click
the
Insert
Using
the
VBA
editor
button.
Once
2
In
the
ActiveX
Controls
group, click
the
your
Command
worksheet, you
Button
3
Click
icon
on
rectangle
the
will
(Fig
has
been
placed
on
the
can
now
add
your
VBA
code:
12.4).
worksheet
that
worksheet
284
(Fig
Button
Command
be
12.5).
or
the
drag
to
create
Command
1
the
Button
on
your
Right-click
that
be
the
on
the
Design
selected.
CommandButton1
Mode
icon
on
the
icon. Note
ribbon
should
12.1
2
Click
(Fig
V iew
Code. e
V isual
Basic
editor
appears
3
P lace
12.6).
Introduction
your
cursor
to
Visual
between
the
CommandButton1_Click()
lines. Y
our
these
4
As
two
your
MsgBox
Edit
In
rst
VBA
visible. If
select
Private
and
always
example, type
is
my
Command
Command
is
should
for
End
be
Applications
Sub
Sub
typed
between
lines.
“This
the
the
code
Basic
editor
Button
it
is
first
code
shown
message
in
below:
VBA!”
Button
window
make
(Fig
sure
not, then
Properties
the
12.7), to
the
click
rename
Properties
V iew
in
the
the
window
menu
and
window.
Fig 12.6 Getting ready to add code to your Command Button
Fig 12.7 The Visual Basic editor where programs are typed and edited
285
12
Programming
Y
ou
can
use
following
with
the
Visual
Basic
Properties
changes
to
for
Applications
window
to
make
the
Saving
no
Click
the
caption
program
CommandButton1:
Y
our
1
the
option
to
change
the
name
need
to
Click
is
to
part
save
Click
the
Font
option
to
to
save
the
type
and
size
of
this
to
by
Calibri
14
clicking
point
the
box
and
your
bold. Y
ou
with
three
can
the
font
dots
to
the
you
create
another
set
of
code
in
the
same
Command
Command
Button. A
sheet
can
therefore
Buttons
Button
each
for
a
dierent
not
will
also
be
numbered
so
that
you
so
among
that
menu
◆
you
Select
they
your
need
File
to
do
as
a
Macro-Enabled
dialogue
box, use
the
this.
them. Alternatively
, you
relate
to
the
purpose
of
program
produce
the
output
text
can
their
also
location
will
display
error
messages
as
expected. e
VBA
editor
to
indicate
that
an
error
occurs
after
of
shows
the
the
line
and
error. Figure
column
12.9
number
shows
that
the
rename
is
found
on
line
2, column
7. e
error
in
this
tasks.
is
double
First
As
errors
the
point. It
the
code
Testing
Save
can
error
them
workbook
the
task. Each
of
dierentiate
will
have
that
Command
le. However, you
is
sheet, add
highlights
many
there
name.
and
another
so
right
Sometimes
As
another
worksheet
access
Correcting
of
as
Excel
the
drop-down
font
it
your
Here.
Workbook. In
2
of
from
need
CommandButton1
code
that
a
single
quote
was
used
instead
of
a
quote.
program
to
close
and
click
the
V isual
Close
Basic
and
editor:
Return
to
Microsoft
Excel
◆
Alternatively, you
clicking
in
Once
1
can
Excel
switch
icon
to
under
the
the
Excel
F ile
sheet
menu
by
option
editor.
you
Make
on
2
the
the
are
sure
in
the
spreadsheet:
Design
Mode
is
deselected
by
clicking
it.
en
click
the
Command
Button
on
the
sheet.
Fig 12.9 The VBA editor highlights the text to indicate that an error occurs after
Y
ou
should
see
results
on
the
screen. Figure
12.8
shows
that point
the
message
that
should
be
displayed.
Questions
1
What
2
Give
must
two
What
is
the
Command
4
What
must
running
5
Fig 12.8 Clicking the Command Button shows the result
28 6
How
are
done
examples
Command
3
be
to
of
access
names
the VBA
that
can
editor?
be
used
for
Buttons.
name
of
Button
be
done
the VBA
Excel
the
icon
to
controls
is
group
where
the
Command
Button
code?
sheets
the
found?
with VBA
code
saved?
before
Wr i t i n g
Congratulations!
rst
VBA
your
code,
worksheet
data
from
section
your
will
variables,
Now
let ’s
and
SBA.
Excel
provide
some
that
all
and
code
you
how
have
it
S ince
sheet
conditional
Remember
that
show
to
you
create
examples
loop
is
w ritten
can
be
may
with
using
code,
this
statements,
control
w ritten
be
VBA
of
your
used
str uctures.
between
you
may
names
indents
of
the
of
lines
the
12.2
the
of
and
shows
editor
to
start
parts
sometimes
dark
some
of
blue
for
adjusts
capital
even
the
12.2
VBA
with
code, and
various
comments
Table
that
variables
some
some
for
notice
of
in
changes
syntax
examples
of
the
such
keywords
VBA
the
letters,
in
as
colour
green
your
code.
statements.
the
Table 12.2 Useful VBA statements
Private
S ub
S ub
lines
CommandButton1_Click()
that
are
found
in
the
code
and
the
window
End
editor.
Private
Sub
CommandButton1_Click()
Must be the rst line of code when using a Command Button
‘This
Declar ing var iables and data types
A
VBA
variable
contain
with
e
a
no
or
are
data
types
shown
in
be
less
special
number. Each
main
SBA
must
spaces
than
variable
that
Table
255
characters
you
must
may
characters,
and
have
want
not
a
data
to
use
Remember
a
to
comment
use
Range(“cell
begin
type.
for
is
your
12.1.
This
statement
comments
data
info
Places
=
from
your
code
address”).Value
accesses
data
Range(“C4”).Value
Places
in
the
in
=
variable
a
cell
info
named info
into
cell
C4
Range(“B3”).Value
data
from
cell
B3
into
a
variable
named info
Table 12.1 VBA data types
Worksheets(1).Rows(1).Select
Numeric
data
types
Non-numeric
data
types
Selects
Integer
String
row
1
in
the
current
worksheet
(characters)
Worksheets(1).Columns(3).Select
Double
(for
real
numbers)
Date
Selects
Currency
Boolean
(true
or
column
3
or
Column
C
false)
Worksheets(1).Cells(1,1).Select
Selects
e
syntax
Dim
to
declare
variableName
a
as
variable
that
the
following
three
A1
Selection.Copy
DataType.
Then
Note
cell
is:
copies
the
data
in
cell
A1
lines:
Worksheets(1).Cells(2,1).Select
Selects
cell
B1
Dim
mark
As
Integer
Dim
cost
As
Double
ActiveSheet.Paste
Dim
exam
As
Date
Pastes
End
can
also
Dim
be
written
mark
exam
As
As
on
one
line
Integer,
as:
Must
cost
As
data
in
cell
B1
Sub
be
the
last
line
of
code
Double,
Displaying
Date
e
MsgBox
display
information
and
messages
InputBox
or
are
two
information
via
keywords
a
that
dialogue
box.
Statements
Remember
to
include
comments
in
your
code. ese
the
start
of
MsgBox
are
denoted
e
by
following
with
data
on
a
single
quote
statements
your
are
at
quite
spreadsheet. As
useful
you
a
statement.
when
write
working
your
code,
“text
message’
MsgBox
data
in
message”
a
displays
dialogue
box.
Range(“B3”).Value
stored
in
cell
B3
‘text
in
displays
a
the
dialogue
box.
287
12
Programming
Unlike
with
MsgBox, the
variable
to
which
two
statements
e
variable
it
Visual
Basic
InputBox
can
below
return
that
use
for
Applications
keyword
requires
message
a
the
results. Consider
the
InputBox
the
the
cell
is
displayed
(Fig
must
be
declared
as
an
Integer
data
=
InputBox(“Enter
Required ”)
shows
a
a
Y
ear”, “Information
prompt
in
a
dialogue
box
First
line
click
for
a
the
user
to
button, and
input
then
text
to
outputs
an
the
box
to
the
screen
(F ig
50
or
less
is
found
in
12.12).
1
empty
area
contents
Sub
of
or
CommandButton1_Click()
code
of
Two
score
variables
As
are
Integer,
result
As
String
declared
the
score
text
of
that
Dim
waits
value
type.
Private
year
a
keyword.
Example
year
if
12.10).
value
If
if
=
in
Range(“C3”).Value
cell
C3
score
score
is
is
placed
>
greater
50
in
variable score
Then
than
50
result
message
is
=
placed
“Good!”
in
variable
namedresult
Range(“C4”).Value
message
End
Last
is
pasted
in
cell
=
result
C4
Sub
line
of
code
Fig 12.10 The InputBox displays a prompt in a dialogue box and waits for the
user to input text or click a button
Note
the
slight
variation
in
the
following
Inputbox
statement:
year
=
InputBox(“Enter
Required ”, 2019)
the
input
shows
a
Y
ear”, “Information
the
default
number
2019
in
Fig 12.12 Example of the IF-THEN statement
area.
IF–THEN–EL SE
In
Example
based
on
the
Example
line
Dim
of
dierent
value
found
message
in
cell
J8
is
placed
(Fig
Remember
to
save
your
workbook
as
a
Macro-Enabled
Sub
eligible
two
is
As
Integer,
If
e
following
THEN
and
statements
examples
If
cell
=
J8
is
Range(“J8”).Value
placed
illustrate
IF–THEN–ELSE
the
use
of
the
IF–
eligible
the
result
Then
statements.
value
place
in eligible
in
=
>=
eligible
is
5
Then
>=
5,
“Yes!”
message ‘Yes’ in
variable result
Else:
IF–THEN
Other wise
In
Example
1, the
code
places
a
message
in
a
cell
result
based
on
the
value
found
in
cell
C3. Notice
that
288
=
“Sorry!”
no
Place
12.13).
result
Workbook.
Conditional
J15,
CommandButton1_Click()
variables
eligible
Value
cell
code
Fig 12.11 A default value can be par t of the dialogue box
Declare
in
2
Private
First
2, a
another
message
in
variable result
As
String
12.2
End
End
If
of
Place
the
IF–THEN–ELSE
the
integer
Range(“J15”).Value
message
in
cell
Last
=
result
Star t
Sub
line
of
G10
and
place
in
VBA
saleamt
of
Case
Case
saleamt
statement
J15
Case
End
from
in
statements
Select
Place
value
Writing
If
Is
value
is
>=
>=
3000
3000
code
disc
=
Assign
Case
If
to
Is
value
is
disc
is
2000
2000
to
Is
value
discount
0.1
10%
Case
the
>=
>=
=
Assign
If
0.15
15%
the
>=
discount
1000
>=13000
disc
=
Assign
5%
0.05
to
the
discount
Fig 12.13 Example of the IF–THEN–ELSE statement
Case
Else
Other wise
Nested
e
IF–THEN–EL SE
code
in
Example
(CASE)
3
determines
whether
disc
the
No
discount
on
the
0%, 5%, 10%
or
amount
of
15%. e
sales
entered
discount
in
cell
amount
is
G10
in
G12
cell
and
(Fig
the
amount
12.14). e
due
Case
is
calculated
placed
statement
is
and
used
in
End
can
become
ELSE
confusing
statements. e
with
syntax
too
for
many
the
Select
of
case
Range(“G12”).Value
since
discount
Case
statement
is:
Case
amount
due
(1
and
place
-
in
disc)*saleamt
cell
G15
Sub
Condition
when
Condition
=
value_1
when
Condition
=
value_2
when
Condition
=
value_3
Else
Code
cases
End
the
value_3
Code
Case
=
G12
value_2
Code
Case
disc
value_1
Code
Case
cell
Range(“G15”).Value
End
Case
in
=
IF–
THEN–
Calculate
Select
statement
placed
Place
it
0
is
End
cell
=
discount
are
to
execute
when
all
the
other
False
Select
Example
3
Fig 12.14 Example of using a Case statement
Private
Sub
CommandButton1_Click()
Loops
Dim
saleamt,
Declare
two
saleamt
Round
disc
As
Y
ou
variables
can
use
dimensional
=
(Range
Double
(“G10”)
.Value
a
single
range
loop
of
to
cycle
cells. is
through
means
one
a
one-
row
or
one
column.
289
12
Programming
Example
list
of
4
is
items
with
used
after
Visual
to
a
Basic
for
calculate
10%
Applications
the
discount
updated
is
cost
of
applied. e
a
Cells(cost,
2).Value
code
*
3).Value
=
Cells(cost,
0.9
Calculate 90% of the value and place it in the next column
works
as
follows:
cost
◆
e
While
loop
starts
from
row
2, column
2
(cell
Go
◆
Checks
if
it
is
a
blank
cell, which
is
denoted
by
=
cost
+
1
B2).
to
the
next
row
“”
Loop
(contains
‘Shirt ’ for
the
rst
cycle).
Return
◆
It
takes
the
value
in
row
2
column
2
(cell
End
is
the
is
then
cost
is
the
◆
in
Cycles
by
same
the
to
Returns
as
items
which
is
calculating
it
from
the
next
row
in
to
the
top
10%
of
the
blouse, and
90%
of
cost. e
in
column
loop
the
Do While
the
the
item
Sub
cost.
and
cost
is
3.
(or
column
B)
row.
to
check
cost
goes
2
of
updated
column
variable
empty
. T
akes
the
calculates
but
the
is
and
row
one
to
item
same
the
adding
the
the
subtracting
placed
◆
of
to
B2), which
for
if
row
through
the
the
cell
for
3, column
loop
2
again.
Fig 12.15 Example of loop before the Command Button is clicked
Example
4
Private
Dim
cost
Declare
cost
Star t
Do
Sub
at
As
variable
=
Double
cost
2
the
first
While
The While
CommandButton1_Click()
item
in
the
list
(Shir t)
Cells(cost,
cell
is
not
2)
<>
“”
empty
Fig 12.16 Example of loop after the Command Button is clicked
Questions
1
Create
a
Command
Button
that
will
display
your
4
name
in
a
dialogue
box
when
Use
is
2
the
Case
statement
to
output
whether
secondar y
or
ter tiar y
level
a
student
clicked.
Create a Command Button that, when clicked, will display
at
age
primar y,
based
on
the
entered.
a message if the data stored in cell D5 is equal to 10.
5
3
Modify
◆
if
the
there
code
are
in
Example
more
than
4
2
as
follows:
passes
at
Grade
a
II,
' Well
15%
if
there
output
◆
add
are
number
Plaque’
.
29 0
fewer
"Good
the
is
cost
of
a
list
of
than
3
passes
at
Grade
of
greater
passes
than
6,
for
all
then
grades.
III,
If
ve
drinks
after
applied.
Conver t
each
code.
Be
of
the
sure
following
sets
of
to:
then

◆
include
comments

◆
declare
all

◆
place

◆
include
in
the
program
work"
number
is
tax
updated
done'
VBA
◆
the
then
6
output
Calculate
variables
the
output ‘Prize
and
the
data
in
separate
appropriate
cells
indentation.
pseudocode
to
12.2
a
7
Pseudocode:
Consider
the
in
VBA
code:
calculate_age
Private
Input
following VBA
Writing
Sub
CommandButton1_
thisyear
Click()
Input
birthyear
age
thisyear
IF
=
age
THEN
ELSE
<
–
Dim
amount
As
Double
Dim
interest
As
Dim
years
Integer
Dim
payment
birthyear
Double
13
output
“Millee
output
is
“Millee
is
a
As
teen”
not
a
As
Double
teen”
amount
=
(Range(“C2”).Value)
ENDIF
interest
=
Range(“C3”).Value
b
Pseudocode:
output
number
=
WHILE
(number
years
numbers
1
<=
3)
DO
=
Range(“C4”).Value
payment
=
years
12,
*
PMT(interest
Range(“C5”).Value
BEGIN
number
Output
=
number
“the
+
number
End
1
is”,
/
12,
-amount)
=
payment
Sub
number
a
List
the
names
b
List
the
cells
of
the
variables
in
the
code.
ENDWHILE
Output
“out
of
that
are
used
to
store
data
in
a
loop”
spreadsheet.
c
Pseudocode:
a
determine
whether
State
c
used
teenager
age
=
FOR
integer
age
Output
=
You
d
13
“You
to
19
are
a
the
in
DO
the
teenager”
at
grid
write
ENDFOR
this
now
repay
name
of
the
Excel
function
that
is
code.
wish
8.5%
the
of
to
borrow
per
cells
data
annum
and
in
the
use
$50,000.00
for
the
7
years.
code
appropriate
in
and
Copy
C
to
cells.
d
Pseudocode:
total
=
0
count
=
0
average
=
average
of
exam
marks
A
B
C
D
1
2
0
3
OUTPUT
‘Enter
a
mark’
4
INPUT
mark
WHILE
(mark
5
is
not
equal
to
total
=
total
+
mark
count
=
count
+
1
‘Enter
a
mark’
OUTPUT
INPUT
-1)
mark
ENDWHILE
IF
count
THEN
=
0
DISPLAY
‘No
marks
entered’
ELSE
Average
=
total/count
DISPLAY
average
END
291
Appendix
Appendix
1
Group
or
individual
SBA
Information Technolog y School-Based
If
Assessment
you
for
e
Information
Assessment
requir ing
Technolog y
(SBA)
the
use
(I T )
compr ises
of
an
database,
integrated
spreadsheet
project
and
sof tware.
It
also
invol ves
the
web
page
using
free
online
web
page
how
your
word-processing
sof tware.
It
is
you
intend
for
design
will
be
expor ted
you
have
expected
meet
as
among
most
or
al l
of
the
SBA
should
skills
project
also
invol ve
and
the
abilit y
to
w r ite
a
shor t
language
to
use
is
expected
to
be
designed
and
administered
by
the
IT
to
by
so
2
of
SBA, but
the
the
fth
SBA
allow. Interim
year
can
is
be
deadlines
spent
the
within
should
make
ideas
idea
to
components. Data
from
one
all
be
used
to
complete
set
if
is
completed
is
or
for
each
more
others. e
determined
by
may
var y
each
year. e
SBA
is
group
way
on
the
using
guidelines
provided
of
of
teacher
the
should
project.
applic ation
It
areas
provide
will
be
you
based
suggested
the
in
which
project
marked
the
with
the
sy llabus. e
project
of
the
and
be
per formed
in
the
by
c an
do,
through
become
how
tasks
descr iption
of
expected
teacher
you
for
copy
292
to
see
each
idea
of
expected
also
It
is
scheme
read
the
to
the
results
provide
exactl y
how
to
the
the
wel l.
SBA
stored
on
times
are
your
ve
your
so
useful
to
set
up
an
online
the
group
can
collaborate
progress
on
through
the
the
SBA. It
SBA
is
also
individually
a
so
are
familiar
with
the
project.
member
can
make
suggestions
and
each
other
about
suitable
methods
to
or
complete
a
task
and
to
troubleshoot
areas.
your
data
description
of
the
project
to
decide
where
the
of
data
needed, such
birth, items
and
as
so
names,
on. Start
to
out
the
most
suitable
layout
for
the
data. en
or
in
data
using
in
the
the
most
application
suitable
indicated
application
in
the
based
project
on
the
a
folder
multiple
for
your
folders
SBA
for
les. Y
ou
each
may
component
want
so
to
that
your
to
you
be
also
keep
be
an
memor y
so
that
through
a
good
electronic
stic k.
Make
sure
to
description
will
awarded
read
organised.
have
label
of
includes
SBAs
named
each
and
most
your
recent
document
your
name
to
may
document
D2
teacher
one.
with
for
will
want
the
know
D1
with
or
that
review, and
appropriately
quickly. Y
ou
submission, then
you
ever y
names. Remember
many
document
feedback
name
that
members’ last
are
cr iter ia
is
you
var ious
you
will
would
and
project
tasks
teacher. Y
our
marking
that
the
description.
expected
the
when
marks
It
instr uctions
you
and
has
applic ation.
complete
impor tant
as
se veral
what
applic ations,
provide
task.
mark
to
the
may
c an
your
are
with
leader, as
Projects
compr ise
recommended
descr iption
familiar
you
using
the
group
the
work
Read
be
of
members
start. Gather
create
to
be
itself
the
Ty pes
should
will
the
Create
in
arrange
syllabus.
the
one
under
group, then
components
order
in
on
on
the
type
Y
our
a
ever yone
also
members
each
from
problem
work
teacher
to
who
that
would
addresses, dates
and
SBA
schedules
to
SBA
entire
be
the
Use
can
sure
work
Prepar ing
four
the
will
teacher.
working
earlier
be
tasks. Y
ou
teac her.
mainly
started
through
assigned
determine
that
approach
Term
the
using
learn
school
working
been
and
share
at
SBA
complete
some
program
determined
to
some
that
programming
e
plan
these
good
a
a
that
to
problem-sol ving
of
make
sof tware
forum
applic ations. e
aspect
own, then
of
description. It
data
your
own.
well
or
on
word-
to
a
working
responsible
S chool-Based
If
processing
are
guidelines
to
second
which
your
so
short
your
group
teacher
having
help
start
for
a
you
the
Draft
draft
1
so
each
to
get
name
of
your
that
submission
or
is
both
the
Appendix
Keep
to
backup
copies
of
yourself. Keeping
have
to
start
anything
your
your
backups
project
happens
work
to
will
again
your
at
all
times
mean
from
that
the
or
email
you
do
beginning
it
not
if
Have
to
a
make
may
It
is
best
teacher
with
to
in
meet
order
time. Failure
that
fail
you
the
to
forfeit
your
the
for
teacher
interim
the
SBA
complete
25%
subject. If
a
of
to
your
section
be
set
by
completed
submit
nal
the
mark
means
processing, web
page
is
SBA
for
as
be
sketch
cannot
of
progress. Once
design, problem
solving
–
should
still
of
page
the
incomplete
sections
contents
documents
if
merge
to
other
–
this
people
your
nal
in
times
errors
to
English
document
and
few
correct
possible, people
of
a
SBA, you
documents
and
their
teachers,
the
should
give
or
workplace.
include
created
your
by
design
web
page
can
be
created
using
a
word
processor
a
free
online
web
page
software. Remember
that
it
may
limited
a
help
layout
you
you
or
have
if
you
do
something
entered
data
not
have
web
a
to
to
indicate
in
a
your
continue
to
keep
your
teacher
progress. L et
your
teacher
page
one
the
layout
of
your
data
and
web
page. If
a
word
processor
is
being
and
so
an
where
you
or
the
group
or
in
a
at
the
that
end
separate
of
the
the
design
of
the
word-processed
document.
web
page
builder
is
used, then
paste
hyperlink
accuracy
need
to
the
online
web
page
on
the
last
feedback
on. Make
may
created
online
of
of
your
the
word-processed
document. However,
any
screenshots
in
case
the
web
page
has
not
been
eort
published
show
recommended
informed
include
calculations, tables, queries
is
suitable
provide
the
it
is
document
page
to
the
your
submit
the
your
about
of
mail
of
documents
or
If
format
of
the
part
all
worthmarks.
teacher
le, a
is
formatting. Ask
used, then
Y
our
it
review
merging.
possibly
is
still
table
member
(database, spreadsheet,
incomplete, you
marking
the
primar y, secondar y
or
your
group
perform
submission
Y
our
programming)
a
example, and
e
on
SBA
and
for
your
Web
word
any
critique
deadlines
and
to
regenerate
les!
or
suggestions. If
want
tweak
Working
friend
assistance
so
that
the
moderator
can
still
review
the
or
design.
what
stage
you
have
reached.
It
Tr y
to
meet
draft
submission
deadlines
–
is
important
number
your
submission
ready
your
teacher. e
for
sending
or
that
you
place
your
candidate
have
delivering
near
the
top
of
the
web
page
as
a
form
of
to
identication.
preliminar y
provided
is
before
any
mark
along
feedback
should
be
with
is
used
for
an
to
that
that
you
have
your
the
is
to
to
for
may
not
provide
details
of
the
part
adjust
of
your
review. Ask
need
been
you
submission. is
important
tr y
resubmitting
tasks
marks
intention
may
marks
the
your
based
be
process
on
Spreadsheet
or
and
work
teacher
with
a
awarded.
preliminar y
assistance
awarded
with
about
needed
this
is
start
to
data
used
complete
the
to
case
for
planning
Consider
any
the
Usually, the
the
in
your
tasks
your
your
in
spreadsheet
the
SBA
other
will
applications. If
assignment, then
spreadsheet
be
model
is
an
early
necessar y.
following:
mark
◆
W hat
is
the
best
way
to
organise
the
data
using
one
scheme.
or
Word
Y
our
be
more
◆
W hat
◆
How
◆
W hat
spreadsheets?
suitable
row
and
column
titles
are
needed?
processing
word-processing
developed
with
the
task
and
overall
web
page
theme
of
design
the
marking
to
incorporate
criteria.
the
requirements
project
based
data
items
are
required
in
each
sheet?
should
functions
and
formulae
should
be
used
for
in
the
mind. Tr y
many
on
the
◆
calculations?
W hich
values
addresses
in
can
be
referenced
functions
and
by
using
absolute
formulae?
293
Appendix
◆
For
any
criteria
advanced
should
resulting
data
lter
be
be
or
pivot
used, and
table
where
tasks, what
should
the
to
the
placement
report
should
be
How
should
features
textual
such
merging
as
data
be
formatted
bold, italic, use
of
(for
How
numerical
borders
and
Problem
data
be
formatted
collaborative
or
currency
and
number
type
of
chart(s)
should
be
used, what
placed
to
create
them, and
where
should
of
(on
the
other
same
sheet
as
the
data
or
as
solution
that
and
part
of
of
for
your
database, then
of
the
need
required
the
to
SBA
this
requires
data
will
be
that
you
used
in
rst
your
and/or
the
a
report.
design
has
its
advantages
SBA. However, if
helps
this
you
to
seek
the
in
are
advice
component. Tr y
through
you
discussions
and/or
SBA
this
working
of
others
to
approach
with
your
teacher
to
your
group
understands
the
of
the
problem. Create
your
import
to
the
demonstrate
sizes, or
to
not
to
be
review. Y
our
accurate
group
perfect
but
at
least
have
can
guide
teacher
solution
based
on
would
have
submitted.
solution
with
the
what
one
you
you
assignment. Alternatively, you
to
appropriate
may
more
your
data
from
the
database. However, you
your
ability
to
eld
construct
names, suitable
modify
the
design
of
your
language
selected
by
spreadsheet
your
teacher
your
test
data
the
–
test
your
solution
thoroughly
and
record
will
data
and
output
in
the
form
of
screenshots.
tables
types
any
errors
arising
from
your
tests
until
the
working
and
solution
eld
the
teacher
towards
Fix
using
program
requirements
Implement
be
the
a
management
sections
may
for
sheet)?
assignment
a
and
certainly
algorithm. It
create
required
they
scope
separate
the
calculations
approach
managing
ensure
If
titles,
data
the
Database
all
places)?
necessar y
be
includes
the
of
whilst
is
seen. at
of
(for
alone, it
W hat
and
solving
component
example, accounting
◆
orientation
cells)?
should
decimal
clear ly
and
example,
A
◆
headings
placed?
subtitles, elds
◆
of
and
suitable
output
is
reached.
imported
tables.
Final
Primar y
keys
appropriate
your
for
design
emphasise
benet
of
necessar y
elds
database
ultimately
e
are
of
in
all
should
the
then
entr y
design
anyone
who
should
tables. Ever y
creation
data
good
and
form
of
assigned
table
part
of
created
a
form, queries
forms
and
features
will
a
be
make
clarity
use
of
it
for
relationship,
and
sub-forms
and
to
for
reports.
should
the
(your
Note
submissions
that
teacher
PDF
in
the
SBA
marker). Consider
of
elds, the
the
form
type
and
size
of
the
SBA
of
the
a
group
quer y
appropriate
required
ever y
for
quer y
labels
and
the
database
should
be
should
saved
produce
using
submitting
folder
save
folders
your
with
leader. Inside
–
Word
solving
according
les
to
in
the
SBA.
your
this
some
your
name
folder
or
create
the
name
four
processing, Spreadsheet, Database,
and
program
design. Save
the
les
into
folders.
W
ord
If
you
have
requirement, then
layout
important
columns
of
since
may
the
you
should
database
should
display
information
some
not
processing:
secondar y
an
a
be
eld
in
a
headings
displayed
document
le), web
(even
page
mail
if
and
merge
have
it
is
nal
a
the
as
a
primar y
spreadsheet
merged
and
or
letters
in
folder.
result. Attention
◆
294
in
to
to
data
name.
queries, reports
the
them
need
submitted
colour, layout
this
to
may
be
displayed.
result, and
Like
IT
must
teacher
◆
Ever y
place
Create
an
work
copy. Y
ou
for
the
being
soft
your
requirements
Problem
font
of
format, or
subfolders
or
all
report
or
is
narrowed
properly. Adjustments
Spreadsheet:
S preadsheet
used
for
folder
as
the
All
spreadsheet
folder. If
mail
well.
it
is
les
the
merge, then
in
same
copy
the
le
the
that
le
was
in
this
Appendix
◆
Database:
it
is
the
then
◆
same
copy
P roblem
a
should
in
the
can
of
in
and
your
was
this
database
used
for
folder
program
dierent
les
as
included
in
one
with
the
the
in
this
le. Again, if
mail
can
could
folder, as
of
the
be
SBA
are
por tal
provided.
for
have
shown
information
document.
submitted
as
a
le.
a
specic
their
on
a
the
The
sheet
information
essential
since
supplied
it
is
used
here
to
This
can
be
identify
your
f or
a Word
provides
the
problem
that
You
Algorithm
are
document
will
Source
A
code
be
statement
was
expected
pseudocode
for
of
of
It
no
is
where
hard
students
drive
grading
been
also
used
to
can
be
a
any
email
created
will
moderation.
their
with
store
safekeeping
track
to
create
created
folders
for
to
print
folders
can
and
chosen
be
to
advisable
student. ese
for
need
re view. en
or
uploaded
until
A
progress
eac h
component
d ur ing
the
comp leti on
of
that
chosen
to
the
that
for
include
par t
of
the
programming
written
language
in
each
submissions
from
of
code
or
may
type
that
wish
list, so
the
chosen
for
over view
by
to
that
counts
code
for
student
should
contain
the
the
requirements
of
the
SBA. Y
ou
coding
flowchar ts
segment
folder
the
written
copy
is
are
theirSBA.
e
denition
can
SBAs
is
submissions
Problem
each
have
spreadsheet
Cover
for
stick
submissions
samples
there
address
submissions
of
the
submission.
email
name
the
for
memor y
their
S ince
moderation,
documents
Y
ou
word-processed
code
merge,
well.
design:
below. However, most
program
separate
that
le
solving
list
be
e
le
the
number
contain
you
your
of
the
out
do
each
not
requirement, similar
omit
students!
anything. Ever y
e
following
requirements
for
the
list
to
the
mark
provides
an
SBA.
the
teacher
Trace
using
table
test
data
Supply
the
output
to
test
data
that
determine
produced
whether
the
the
Requirements
◆
Word-processing
have
been
per formed
screenshots
of
the
program
showing
SBA
Documents
which
require
with
table
formatting
of
data
of
text
with
working
subscript,
contents
execution
the
correctly
task(s)
Submit
Program
for
tasks
entr y
and
superscript,
tables,
results
fonts
and
different
page
layout
line
spacing,
produced
◆
Y
our
teacher
should
inform
you
of
the
process
Any
two
files,
submitting
your
IT
SBA. Y
ou
may
be
required
to
SBA, in
attaching
teacher
it
for
which
to
the
your
case
you
email
can
zip
the
message. Be
submission
of
your
to
meet
folder
guided
before
by
mail
your
SBA.
Any
is
ver y
important
your
Web
page
design
◆
processing
marks
to
for
submission. Time
received
SBAs
before
must
be
allocated
uploading
the
for
nal
A
two
of :
merge
logo
table
of
and/or
depicting
contents,
fillable
the
concept
of
project
Defined
areas
navigational
◆
At
◆
on
the
links
minimum,
the
CXC.
two
page
and
for
content
hyperlinks
of
following:
link
to
web
Appendix
tables
teacher’s
◆
deadline(s)
and/or
forms
the
Again, it
inser ting/impor ting
columns
email
◆
your
of :
for
a
location
within
the
page
2
◆
link
to
an
◆
link
to
another
email
address
Teacher guidelines for the School-Based Assessment
(which
Teachers
are
encouraged
to
use
the
following
make
sure
that
all
the
requirements
for
the
or
may
page
not
exist)
guidelines
◆
to
may
web
link
to
user-created
files
students’
295
Appendix
A
◆
Spreadsheet/s
maximum
(e.g.
create
modify
No
◆
the
more
of
the
data,
◆
block
◆
adding
◆
changing
tasks
spreadsheet;
use
Creation
of
on
of
(e.g.
Also
sor ting
functions
and
and
data)
no
tr y
of
◆
THREE
◆
T WO
eld
to
as
cut, copy
and
paste
records
denitions.
award
more
formatting
bold, underline
more
and
than
6
marks
features
italics;
single
such
for
as
and/or
layout
justication;
double
than T WO
superscript
and/or
subscript;
font
and
font
char ts
tables
or
queries
bullets
and
table,
(using
and
numbering.
files
criteria
from
Appendix
one
such
deleting
document
size;
Databases
or
not
spacing;
types
operations
than THREE
formulae
◆
major
spreadsheet)
requirements
of
two
more
than
3
one
Guidelines for problem solving and prog ram
design
table)
◆
ONE
calculation
◆
ONE
form,
within
queries
e
showing
a
main
general-prociency
individual
sub-form
(e.g.
to
search
for
or
previous
ONE
◆
to
to
the
next
problem
with
grouping
involving T WO
of
an
project
worth
90
marks. Students
should
follow
the
steps
below
in
developing
the
or
record)
repor t,
sor ting
move
consists
a
therefore
record,
SBA
and
and
their
solving
and
program
design
section
of
project.
or THREE
Teachers
are
advised
to
use
the
Assessment
Criteria
tables
A
◆
Algorithm
statement
problem
development
(e.g.
calculate
the
company ’s
IPO,
◆
that
defines
you
may
average
want
salar y
to
of
a
employees)
flowchar t
found
in
marks
for
mark
CSEC
each
the
syllabus
project. e
alongside
as
a
guide
for
allocating
student ’s
CSEC
copy
criteria
project
when
online
portal
containing
should
be
submitting
the
student ’s
uploaded
the
with
sample
and/or
projects
pseudocode
the
the
of
to
the
provided
by
the
Caribbean
solution
®
Examination
Program
◆
Trace
◆
Program
code
implementation
If
◆
listing
compiled
necessar y,
you
used
produce
from
as
showing
free
the
the
provided
of
In
mark
devising
test
the
data
trace
output
a
Dene
that
table
are
certain
tasks
conrming
instead
list
of
of
that
that
the
manually
skills
therefore
mark
should
be
1
printout
that
should
scheme, remember
cannot
Specify
tr ying
candidate
used
correcting
cannot
not
be
be
Find
words!
veried
included
that
verify, such
by
in
Here
is
problem
objectives
to
a
the
sample
3
allocating
marks
in
your
candidate’s
SBA
use
◆
Find
296
of
a
spellchecker
and
Replace
using
user:
steps:
state
what
the
type
you
of
are
person
program.
output:
from
Explain
and
this
this
variable
Specify
the
desired
is, you
Again, write
W hat
kind
program?
names
and
a
of
Y
ou
brief
output
can
are
write
description
of
input:
can
Since
specify
meaningful
of
each
you
what
know
the
variable
what
input
names
the
should
and
a
be.
brief
one.
for:
4
◆
six
one.
output
scheme.
and
desired
description
Avoid
requires
accomplish
be
expecting
each
Replace
mark
problem
meaningful
moderator, and
your
the
will
Specify
you
there
as
and
the
Dening
2
you
).
to
scheme
your
(CXC
your
errors
who
SBA
Council
table
Specify
the
the
input
necessar y
desired
go
processing:
through
output?
in
W hat
order
for
processing
it
to
should
provide
the
Appendix
Design
the
your
program
code
is
{Prompt
is
second
stage
consists
of
two
Design
begin
details
to
using
write
IPO
your
charts
algorithm
or
owcharts:
using
en
for
above
will
be
used
as
a
guide
a
when
the
you
start
Do
you
a
structured
design
walkthrough:
Y
ou
should
go
to
and
be
check
see
if
anything
has
been
omitted
corrected. Y
ou
the
logic
of
your
can
also
use
a
trace
and
document
is
where
starts. It
consists
1
the
to
Select
the
that
actually
prompts
the
user
your
code, it
conditional
is
best
to
statements
include
and
the
of
actual
three
appropriate
you
will
be
writing
main
of
the
the
the
order
1
by
your
to
the
language:
For
syntax:
the
programming
be
included
anywhere
in
the
code
to
logic
of
some
sections.
test
a
program
there
are
three
things
you
desk-checking:
making
sure
Manually
its
logic
go
through
the
works.
Debug
the
program:
Use
a
compiler
or
interpreter
language
detect
Y
ou
can
start
writing
the
any
programming
errors. en
locate
and
or
algorithm. Most
a
particular
syntax
these
errors.
program
Test
the
program
with
real-world
data:
After
you
programming
make
have
can
teacher.
owchart
languages
code. However,
your
3
the
the
do:
correct
Follow
of
program
Per form
to
chosen
purpose
program
steps:
programming
using
the
program
2
from
write
before
explain
program
2
code
algorithm.
must
stage
SBA
a
table
In
is
on
or
Test
Code
typed
through
clarify
needs
to
be
program.
comments
the
can
as
writing
loops
2
number}
such
number.
comments
your
a
comment
pseudocode.
en, as
is
for
example, a
steps:
line
1
doing. For
which
you
sure
that
the
program
is
correct, you
must
test
must
the
program
by
providing
it
with
input
and
seeing
follow.
what
3
Put
comments
in
programming
is
is
when
your
code
you
code:
the
write
First, write
purpose
of
comments
your
to
the
output
is.
in
program.
explain
what
Make
your
sure
that
program
you
to
take
include
screenshots
with
your
of
the
output
of
submissions.
297
A n s we r s
Topic
1
data, manipulate/process
data, produce
storing
the
3
hardware
IPOS
data
a
central
control
c
arithmetic
input
while
an
7
an
1
2
accept
device
gets
output
of
unit.
data
device
out
operating
logic
into
gets
the
a
computer
processed
2
computer.
system
a
software
communication
3
technolog y.
1.2
input
device
b
touchpad
c
biometrics
d
scanner
e
direct
f
optical
g
turnaround
a
manual
b
remote
or
1
touchscreen
2
data
entr y
mark
(DDE)
device
recognition
virtual
1
(OMR)
3
entr y
1
2
3
devices, printing
devices
and
audio
2
b
printer
3
c
impact
d
thermal
e
3D
f
earbuds.
b
online
c
online.
a
import
b
le
a
JPEG
b
MPEG
3
c
MP3.
4
dot-matrix
printer
1
to
complete
as
possible
processing
instructions
as
b
specialised
c
integrated
Google
a
random-access
b
read-only
c
hybrid
presentation
memor y
memor y
(RAM)
1
(ROM)
hardware
b
hardware
c
both.
1.5
memor y
3
as
4
ash
5
Advantages:
users
at
can
any
time
or
(hard
drive), optical
disks,
drives
multiple
the
users
data
can
time
data
they
of
1
to
from
have
access
make
on
anywhere
Internet
being
hardware
softwareworks
298
computer
mainframes
c
anembeddedsystemor
embedded
device.
businesses
amounts
primar y
3
access.
batter y
could
cartridge
be
may
printer, the
properly
dead
after
serial
b
sequential
c
direct
d
index
and
how
all
other
balance
or
on
the
due
amount
of
date
or
modify
data
is
greater
ow
than
0
rate,
light.
3.1
upload
b
download.
paging
not
be
the
cartridge
or
the
ink
correct
may
may
not
be
applicable or
appropriate
or
network
local
area
network
c
wireless
local
area
network
d
metropolitan
area
network.
5
peer-to-peer
6
star, bus
7
hotspot
8
computers
and
network
ring
a
simplex
b
half-duplex
c
full
a
cable
b
wireless.
duplex.
intranet
be
dr y
Topic
in
3.2
electronic
for
the
or
user.
2
a
cost-
information
as
(email), uploading
web, le
data, internet
transfer
analogue
between
the
sends
data
verication:
sectors
a
10am
b
300
c
3, 4
d
100233.
on
(or
any
any
5
a
to
detect
hard
disk
time
number
days
when
or
bad
between
greater
errors
occur.
3
memor y
8am
than
and
4pm)
4
the
provides
a
broadband
2G, 3G
of
250
posts
video
a
chat, browsing
newsgroups.
digital
and
signals
the
to
Internet
dierent
it
of
devices
that
can
a
with
a
dedicated
network.
or
4G-L
TE
of
text
or
picture
entries;
vlog:
entries
5
Hypertext
6
Voice
over
Markup
IP
be
router
computer
to
or
modem
to
number
to
the
b
blog:
the
connected
expands
connection
errors.
and
telephone
from
data,
relay
protocol
converts
devices
a
d
prevent
networks
ser vices
b
c
to
cellular)
and
b
commodity
(or
communication
area
10
one
systems, mobile
personal
wide
1
validation:
or
update
access
a
the
or
and
containing
a
2.2
bad
store
les
sequential.
connected
data
or
printers
2.1
data
a
elds
le
4
commodity.
1
elds
and
data
3
9
prolonged
cartridge.
information
Topic
sheet,
microlm.
key
a
and
accessed, deleted,
of
records
the
1.11
accurate, timely, complete, appropriate
3
the
records
help
of
related
temperature, pressure, liquid
interface.
b
is
of
2
pointers
e
corrupted.
control
user
and
1.10
data
collection
records
proximity
sub-menus
2
updates;
1.6
to
a
2.5
eective
same
their
once
risk
to
Topic
1
2
Topic
and
personal
Topic
cards
access
Concerns:
stolen
at
is
collection
downloading
storage
memor y
a
if
storage
media
document
options
a
the
le
is
le
or
graphical
the
data
1
2
b
e
or
2.4
A
Topic
or
software.
windows, icons, menus
for
backup
software, PowerPoint
a
installed
ash
Slides, Microsoft
use.
2
bit
magnetic
or
1.9
e
choice
computer
Slides
custom-written
many
document, multiple
sheet, handheld
software
software.
quickly
memor y.
2
software
Docs, Sheets
a
Topic
turnaround
large
PNG
custom-written
Topic
1.4
secondar y
2
compression.
or
copy
copy.
elds
download
a
too
soft
or
or
1.8
a
hard
b
record
real-time
printer
printer
1
1
or
2.3
a
Topic
batch
1
pixel
Topic
1
lotter y
1.7
b
1
or
Topic
2
control.
a
Topic
systems:
memor y.
Google
devices
2
LINUX, UNIX,
operating
365
1.3
display
mobile
a
Topic
Topic
systems:
OS;
iOS, Android
booting
document.
data
operating
a
Topic
a
questions
b
Topic
1
and
computer
Apple
3
unit
topic
W indows, Mac
results
unit
b
Topic
or
results
processing
information
6
and
storage
cycle
b
An
of
2
and
and
5
end
1.1
input, output, processing
2
4
to
Language
( VoIP)
(HTML)
posts
Answers
Topic
1
4.1
public
external:
natural
natural
disasters:
phenomena
volcanoes), power
activities
that
computer
internal:
no
3
other
on
target
and
spikes
buildings
or
or
rooms
protection
of
hardware
programs
from
with
or
backup
and/or
procedures,
1
a
data
computer
c
security
a
Deliberate
b
Accidental
c
Cyber
threat
d
Cyber
security.
data
not
1
a
be
security
2
threat.
fraud
is
is
distribute
messages
that
to
the
nancial
use
of
the
use
of
trick
a
unauthorised
industrial
c
electronic
d
denial-of-ser vice
b
even
lost.
Saves
into
and
needed
thef t
to
other
is
2
3
steal
personal
access, single
(DOS)
2
3
become
a
les
regular
that
are
no
2
text
existing
another
text
–
over
a
for
cabinets
power
c
lock
to
3
the
persons
computer
supply
desks
and
(UPS)
or
limit
maintain
document;
access
+
by
using
required
the
1, CTRL
apply
it
word
replace
Pages
the
the
+
2, CTRL
formatting
saves
to
time
replace
parts
of
+
4
from
one
set
to
17
4
shows
part
22
of
35
will
breaks
your
A
4.4
manually
or
poor
the
or
of
creation
incorrect
furniture
using
poor
too
jobs, retraining
or
of
posture
dierent
5
jobs
it. Disadvantage:
words
you
you
the
the
will
use
can
document
next
want
a
In
when
using
screens
be
in
to
end
use
an
of
odd
even
used
is
dierent
lighting, glare
from)
the
or
long
being
too
periods,
close
to
give
be
appears
more
database, network
2
Computer
assistance
media
and
support
directly
specialists
systems
specialists
to
at
footer
page
is
in
computer
users;
with
or
mail
signature.
Combine
into
one
Heading
of
Documents
document
1
or
2, place
contents
contents
is
to
be
list.
only
or
the
entire
list
heading
to
be
sent
having
to
to
many
retype
allows
you
merge, saving
at
the
you
breaks
have
people;
letters
to
choose
unnecessar y
and
a
for
of
text
bottom
the
same
be
a
of
footnotes
a
text
repeated
and
is
A
column
current
rows;
useful
source, select
or
the
select
creates
Print
entire
4
collated
page
and
multiple
a
page
in
the
are
Topic
all
a
is
added
column;
a
row.
3
and
to
or
row
the
is
left
added
data
and
email
box
(eld
message
next
or
to
the
heading
at
records.
size, paper
hard
copy
Preview
would
2
(prints
the
(prints
and
so
all
source
of
shows
look
if
it
your
on
page
copies
of
layout
screen
were
how
the
printed.
or
document
or
document,
selected
in
order)
page
pages
or
1, then
all
of
on)
5.9
Paper-based
forms:
Advantages: don’t
complete, can
may
both
while
varies
organising
or
the
categor y
document, single
grouped
page
write
enter
the
Online
a
soft
be
like
need
data
to
aligning
right
above
of
or
access
text.
the
below
2
a
Internet
distributed
a
in
access
a
to
face-to-face
class. Disadvantages:
incorrect
information, need
analyse
users
to
re-
it.
forms:
Advantages:
from
in
for
the
errors.
5.8
3
page. Dierences:
reference
retype
typing
document, printer
environment
footers
to
orientation
set
bottom
have
introduce
data
top)
while
break.
orientation
about
not
document
landscape
the
do
saves
copy, data
paper, can
can
the
Rich
be
be
distributed
downloaded
specic
elds. Disadvantage:
2
4
as
envelopes
to
Print
5.3
table
3
save
password;
digital
table
merge
2
page.
another
social
not
margins, paper
formatting
section
margins
information
can
A
provide
communicate
to
the
1
administrators
or
numbers
analysed, captures
Topic
4.5
1
the
new
1
(or
screen.
using
letters
by
data
blank
the
1
Similarities:
a
a
a
words.
replace
section
if
portrait
have
footnote
for
time
record, select
you
that
to
Y
ou
6
document
page
footnote
found
equipment
computer
far
new
for
a
spelt
5.7
5
document.
automation
paste
page
the
personalises
Topic
and
page
if
use
apply
generate
the
include
possibly
of
pages.
sur veillance.
to
1
5
searching
other
characters
which
Section
or
document;
nal;
are
dictionar y ;
alternative
information
where
and
update
Topic
the
text.
another
mark
the
usage
2
duplicate
5.2
of
records
placed
the
elsewhere.
a
words
lename.
usually
the
lename
create
that
given
printing.
to
and
uninterruptible
Topic
an
to
or
headings
cursor
specic
may
true.
b
with
drag
Advantage:
true
a
you
as
a
5.6
Select
the
a
the
cut, and
2
e
skills
resaves
allows
the
1
New
or
combine
e
d
reproof
to
2
applied
a
2
d
quickly
2
copy
Selective
1
of
games
document;
document
to
5.5
1
letters, labels
to
1
Topic
bank
document.
your
of
editing;
3
false
Topic
restrict
ensure
suggest
mark
2
false
computers
blank
saved
copy
3
5
longer
a
questions
funds,
saves
CTRL
or
interactive
a
will
read-only ;
account.
viewing/printing
and
create
will
according
2
c
d
3
can
topic
Count.
spellcheck
c
b
logs
or
Word
A
b
Topic
and
cards
automatically
of
Changes
thesaurus
basis.
b
Comment
3
false
authorised
a
As
to
contain
updates
Track
c
a
a
to
is
business’s
retrieves
Highlight
4
attack, multiple.
damaged, corrupted
spellcheck
b
correctly
(POS)
automatically
balance, transferring
time, or
mouse
eavesdropping, multiple
on
the
gives
Save
entering
systems
and
email
espionage, multiple
and
content
end
5.4
a
Topic
rst
for
can
terminals
simulations
Save
systems
4.3
Files
share
point-of-sale
money
online
document
identity
information
b
a
to
at
credit/debit
that
bank
Open
b
6
1
specialists
5.1
a
accounts;
websites
computerised
card
access
computer
users
information;
of
so
bills
training
information.
is
use
unauthorised
details.
Topic
inventor y ;
checking
Topic
modication
credit
used
computer
swiped
paying
3
Phishing
the
2
to
creates
personal
1
statements
Computer
to
readers
transferred
security
propaganda
b
Topic
focus
computer
2
Barcode
4.2
and
media
specialists
resolving
4.6
update
1
Topic
social
and
others.
linked
systems
b
support
d
software, no
ex-employee
computer
with
Topic
error, no
or
troubleshooting
problems;
terrorist
systems.
anti-virus
2
and
(hurricanes, earthquakes,
surges
employee
removed
oods
to
not
type
of
ever yone
and
data
is
for
online
to
form.
text:
users
can
paragraphs. P lain
amount
of
type
text:
multiple
users
type
limited
text.
columns
the
299
Answers
b
to
Combo
type
in
select
3
end
of
box:
topic
select
questions
from
list
of
choices
information. Drop-down
from
list
of
list:
4
or
only
choices.
a
column
Topic
b
cell
1
c
row.
iv, v, ii, vi, iii, i
Topic
Topic
1
6.1
1
web
2
HTML
7.2
A
spreadsheet
of
browser
multiple
is
also
a
workbook
that
consists
2
7.5
a
sorting
b
AutoFilter
c
Advanced
d
pivot
a
Filter
table.
i
worksheets.
Day
3
Google
(Hypertext
Chrome, Microsof t
Internet
Apple
4
type
Markup
Explorer, Mozilla
2
Language)
Formulae:
3
URL
(web
address)
or
use
a
search
4
A
website
6
dynamic
consists
of
one
or
more
web
Location
Wednesday
$10.00
Bench
ursday
$13.00
Café
Friday
$14.00
to
save
Desk
Monday
$15.00
Lunchroom
Tuesday
$25.00
Desk
=(E6-E4)*1, =E3*5%, =H2/3
time
having
to
select
the
cells
repeatedly
engine
5
Amount
=SUM(B1:G4), =MAX(E4:E6),
=MIN(C1:C10), =AVERAGE(B1:C9).
Edge, Microsoft
Firefox, Opera or
Safari
the
Functions:
pages.
a
Merge
b
C5
c
D, E
d
1
and
Center
ii
website
or
F
Day
7
a
shopping
or
b
mobile
c
community
e-commerce
or
Amount
Friday
8
e
building
or
social
content, organisation, number
security
networking.
of
web
i
features
Topic
1
C3:C6
g
SUM
logo
2
3
or
the
website, web
company
a
Homepage
b
Sensible
A
Y
ou
are
>
is
part
a
of
either
>
Garden
hyper link
the
>
j
Seed lings
i
yes
ii
yes
iii
yes
arrangement.
web
directed
e
the
F lowers
that
jumps
to
a
page.
to
another
web
page
or
iv
yes
v
yes
data
in
width
the
of
column
the
is
too
narrow
for
location
within
the
current
web
page, or
Lunchroom
$13.00
Café
Tuesday
$25.00
Desk
Wednesday
$10.00
Bench
Day
cell
b
a
$15.00
ursday
iii
MAX
iii
name,
name
suggested
bookmark
page, blog
Monday
MIN
ii
of
dierent
4
i
6.2
name
Amount
a
$10.00
Bench
ursday
$13.00
Café
Tuesday
$25.00
Desk
Friday
$14.00
Desk
Monday
$15.00
Lunchroom
i
to
document.
Topic
1
Topic
email
2
web
address
page
sizes
and
your
own
to
edit
text
the
contact
3
to
all
too
check
audio
that
all
Topic
1
the
sure
3
30 0
the
or
it
is
displaying
and
ability
colour
of
name
or
add
4
F6*CHARITY
option
5
right-click
upload
Entire
a
Maps
business;
to
add
a
6
well, e.g. that
correctly, text
background
is
in
colours
and
email
are
video
are
playing
addresses
link
to
the
check
are
that
valid;
make
homepage
or
that
page
appropriate
page
$13.00
Café
Friday
$14.00
Desk
ii
on
Day
cell
or
E2, select
Select
Insert
column
E
and
and
click
select
Amount
Location
Wednesday
$10.00
Bench
Café
$25.00
Desk
a
=MIN(D3:D6)
Friday
$14.00
Desk
b
=AVG(E3:E6)
c
=COUNT
A(A3:A6)
C
D
the
or
same
range
–
in
use
=COUNT(D3:D6)
the
to
same
range
in
–
use
A, B
or
Topic
1
Count
columns
7.6
chart
2
An
cells
9
=IF(G4<E4,A4,G4)
10
25, 81, 61, Latin
11
a
E5
b
D6
c
D5
d
D5
can
that
I6
as
is
the
title:
top
the
of
Topic
c
column/row
1
d
=A1+A2
e
=A1-A2
f
WHAT–IF
, forecasting
g
Microsoft
a
=B4+C4
b
=B4*2
super/subscript;
c
=C4/3
border
d
=C4-B4
a
plot
Currency, percentage, comma, increase/
decrease
b
Excel
c
wrap
decimal
text, merge
include
and
centre
cells,
horizontal/vertical
in
alignment
the
cell
style, size, bold, italics, underline,
pattern
colour
cell;
A
column
chart
indent;
colour
text;
visual
impact
than
the
5
A
your
on
sheet
data
which
on
the
dates
the
data
the
same
contains
but
the
is
exists
shown
axis:
a
chart
on
and
a
the
the
x-axis;
salespersons. Value
charted
include
range
at
identies
horizontal
being
examples
series:
(or
bar)
two
shows
of
on
the
numbers
data
and
selected
or
the
chart
more
is
useful
similar
percentage
of
for
items. A
the
pie
wedges
in
chart.
legend
one
located
chart.
comparing
orientation, increase/decrease
font
4
places
is
chart
heading
y-axis;
the
to
charted
years. Data
7.4
a
identies
vertical
column/row
chart
chart. Categor y
being
axis:
b
greater
worksheet.
Chart
examples
spreadsheet
a
data. A
attached
separate
3
data
a
make
embedded
page
8
and
A
numbers.
G.
=IF(G3<30,“CANCEL
”,“”)
I3
COUNT
A
columns
7
payroll
ursday
corner
=E4*D4
column
for
7.1
statements, invoices or
left-hand
I8
$13.00
are
sure
check
top
cell
Bench
Tuesday
the
check
the
$10.00
ursday
animations,
correctly ;
Location
Wednesday
Insert
for
hyperlink;
or
in
active
=F4*10%
types,
page, etc.
working
is
the
=D4*E4
to
Google
box
shows
3
font
video;
your
subscription
that
change
or
integrate
location
budgets, nancial
2
to
bright
each
orphan
image;
position
pages
titles
5
to
graphics
not
alignment;
background
form
make
correct
4
the
2
password
graphics, pictures
background
navigate
and
designs, options
Amount
7.3
that
6.3
1
Location
Wednesday
Day
open
Desk
right
f
h
$14.00
left
ii
pages or
Location
2
set
of
is
not
data
necessar y
being
since
plotted.
there
is
only
to
Answers
Topic
1
7.7
b
Advantage:
charts
the
that
you
or
have
a
hard
or
uses
paper, which
may
Topic
soft
to
be
use
no
view
copy
your
them
them
in
data
away
to
case
costs
the
need
money
you
damage
data
to
or
and
if
you
after wards
print
or
from
lose
so
the
printing
2
contributes
are
then
Customer:
not
there
c
L ou
d
Pocket
and
e
4
a
Athlete
b
Fees
Payroll
c
2
f
SUM
d
Athlete
and
Division
table:
AthleteID, Division
Athlete
table:
Code
f
Code
PRICES
h
It
A4:A12
d
e
to
separate
from
the
division
cannot
linked
used
be
to
i
Y
es, this
has
deleted
this
many
since
athlete
athletes.
there
categor y. e
removed/deleted
cell.
1
are
athletes
athletes
must
deleted
from
8.1
1
telephone
2
an
book, dictionar y
electronic
librar y, travel
or
recipe
agency
book.
or
k
Under
database
b
a
spreadsheet
into
c
a
word
view
1
processor.
8.2
2
last
and
would
rst
be
FirstName
to
or
ID
5
a
text
b
is
should
to
but
use
for
h;
foreign
are
a
ProductID
key :
mainly
for
key :
based
on
a
of
you
check
box
and
value
Topic
1
2
and
3
in
elds
a
ascending
or
Product
b
Description
c
Cost
<
d
Cost
<=
and
a
Product
b
Description
c
Discount
and
=
top
e
Y/N
3
f
g
h
text
i
text
incorrectly
&
“ ” &
“
&
“
spelling
a
NewCost:[Cost]*1.10
1
to
12);
Male?:
(Boolean);
you
are
Since
in
the
may
an
you
Y/N
of
the
or
birth:
of
1
as
character
Boolean
(Y
says
may
have
with
to
let
more
the
the
than
same
one
rst
database
Order
(1:M)
Order
(1:M);
make
Product
and
the
creates
application
in
a
an
in
copy
existing
included
all
the
required.
lengths;
can
to
break
down
appropriate
be
linked;
elds;
give
the
tables
sure
the
design
stores
and
retrieves
correctly.
that
contain
should
many
unrelated
contain
duplicate
data;
data;
tables
elds
of
blank
that
elds
contain
data.
9.1
2
I
3
IPO
=
phase
input, P
charts
input
=
identify
into
the
true
b
false
c
false
d
true
2
name
A
stores
3
e
values
values
do
in
a
not
string
d
COUNT
.
d
Boolean
e
string
a
year
b
height
c
mobile_num
Cost,
d
day
numbers
e
blood_type
5
8.7
formatted
like
a
table
with
columns.
First, Last
Q uantity
(Cost
is
and
and
and
TOT
AL
currency);
Discount
b
First
and
c
First
(sorted
d
TOT
AL
e
Order
f
3
Description
TOT
AL
Last
are
the
in
text;
are
can
Y
es/No
also
or
grouping
automatically
Cost
are
COST
COST
is
–
needed
to
convert
outputs.
with
descending
Februar y
the
program
to
work
or
or
(or
can
for
a
change
while
the
constant.
text
text.
night)
be
Boolean.
elds.
Topic
1
a
the
order
9.3
REPEAT
count
b
COST
Report
for
variable
real
it
data
change
c
since
data
desired
phase
output
with.
[QTY ]*[Cost]
MAX
and
the
=
true
variable
c
rows
implementation
9.2
a
integer
Tabular;
and
processing, O
iii, v, i, ii, iv
e
[cost]
4
grouping);
and
from
opened
names.
a
8.3
Customer
tables
b
a
key.
how
MIN
name, it
create
be
have
is
eld
SUM
person
data
method.
addresses
a
a
of
can
paste
you
that
b
Topic
1
and
algorithm
number,
months
adult)
best
primar y
of
Y/N, size
Adult:
family
be
Month
$ ” &
eld
Deduction:[Cost]*.10
text, 15;
cost:
cost
c
number.
sure
1
, ” &[F irstname]
b
4
and
adequate
Tables
Topic
[Lastname]
date
numbers
To
Topic
text
text, 15;
bottom
4
Total
AutoNumber
copy
Discount
a
the
Have
data
8.6
2
(using
to
‘Y ’
number
(Boolean)
a
which
another
copy
make
that
Order
d
2
3
list
Cost
and
[description]
FirstName:
types
table.
1
Topic
and
a
8.9
To
the
c
and
names, data
calculation
eld.
is
eld.
application. Importing
meaningful
table. Design
database
saving
from
the
think
data
3
text
LastName
raw
3
c
a
eld
your
ordering
a
[Lastname]&
a, b
enter
Fees
8.5
b
or
to
database
enter
into
text
Topic
your
to
[Firstname]
c
you
4
form
PR-
f
performed. Unless
text
refer
more
d
used
Use
the
can
use
candidate
allows
it
LastName,
to
eld
allows
3
CID.
e;
are
created
be
as
better
view
descriptions
2
1
Relation:
1
names
each
is
information
a
j
6
it
key
is
and
types
calculations
primar y
then
key :
data
it
such
a, b, c
composite
Numeric
where
but
names
key :
to
lastname, rstname. ID
CustomerID
primar y
g;
4
and
refer
appropriate
‘identication’;
meaningful
3
could
more
data
names
Datasheet
and
database, table, record, eld
13
8.4
a
1
1
2
Topic
a
Topic
McJig
online
store
3
Figman
elds;
database.
Topic
j
text
the
table.
Topic
of
be
2
be
questions
September
application
another
rst.
can
topic
8.8
Exporting
current
one
of
table:
Topic
e
for
are
currency
e
c
is
or
4
b
mark
numeric
Ann
Diar y
end
Department, LastName, F irstName
DaysWorked
Code
worksheet
a
LastName
1:M;
the
3
d
g
of
Order:
c
MAX
exclamation
PR_ID;
Department
a
name
Product:
b
it.
7.8
the
CID;
CID+PR-ID
others or
copy. Disadvantages:
environmental
going
can
print
distribute
data
to
the
should
you
computer
that
1
so
Y
ou
to
FOR
count
c
IF
=
(count
(count
=
total
THEN
=
count
-
2)
UNTIL
25
=
count
=
1
*
count
display
to
20)
DO
5
*
5
count
3 01
Answers
2
to
end
a
L oop
A:
b
L oop
B:
of
topic
questions
Topic
REPEAT
1
3
9.4
3
WHILE.
i
Num
ii
Blu
and
Met
b
b
iii
BEGIN, INPU T
, DISPLAY, END
iv
+
v
no
i
and
4
c
operator
ow
line
5
d
yes
yes.
+
b
=, <, <=
AND
a
Decision
i
(word
iii
no
v
<>
WHILE, IF
, THEN, ELSE,
arithmetic
a
Call
a
(word <> password)
AND
(count <= 3)
T RUE
Access
T RUE
FALSE
Forgot
password
FALSE
T RUE
Forgot
password
FALSE
FALSE
Forgot
password
of
conditions
3
=
6
2
7
See
2
=
2
×
2
×
2
=
8
conditions
yes
ii
Read
AGE
below
yes
iii
no
iv
yes.
Topic
c
a
input
hours, total
b
input
cost, amount, cash
output
=
hours
*
=
10, O utput
amount
–
OLD
=
cost,
cash
Cost
=
Cost
×
9.6
1
Age + 15
total
d
5
count <= 3
taxi
operator
b
4
3)
T RUE
number
i
<=
password ’
Output
e
constant
2
no
‘Forgot
password
BEGIN
iv
password), (count
4
word =
word
DISPLAY, ENDWHILE
b
<>
‘Access’ and
b
Right:
iii
true
a
ii
iii
ii
false
e
no
iv
i
false
d
c
no
ii
false
c
Process
–
Boolean
false
Stop
a
L eft:
a
a
b
2
Mark
Total
Count
Average
25
25
1
25.00
30
55
2
27.50
12
67
3
22.33
10
77
4
19.25
a
INPUT
mark1,
mark2,
mark3,
mark4
−1
total
=
mark1
mark3
+
mark
+
mark2
+
2
Has
4
arrived?
OUTPUT
mark
=
65
await
b
mark =
71
Satisfactor y
report;
results!;
await
end
of
82
Excellent
results!;
see
your
teacher;
0
3
total
=
WHILE
(number
await
end
of
term
report
0
Input
<=
4)
3
Start
word
DO
BEGIN
INPUT
mark
Total
=
Total
+
Sum
Count
0
2
2
3
2
4
6
5
6
6
mark
word
ENDWHILE
=
OK
“page”?
OUTPUT
term
report;
mark =
=
of
total;
term
mark
end
taxi
e
Total
END
Topic
10.1
c
1
mark
=
Oh
Total
L ow-level
languages
are
machine-dependent
0
=
Stop
No
and
not
easy
to
understand
by
humans. High-
0
level
languages
must
be
converted
to
machine
REPEAT
language
UNTIL
INPUT
mark
Total
=
(number
OUTPUT
Total
=
+
Topic
mark
1
4)
END
d
2
FOR
Count
=
1
a
to
INPUT
mark
Total
=
4
are
easier
to
understand
by
humans.
9.5
=
Topic
b
Total
and
1
c
+
d
>=
a
sisters
b
age
c
passes
=7
d
weeks
<=
e
pension
f
cheque
10.2
Syntax
is
a
set
programming
=
meaning
3
of
rules
when
writing
language. Semantics
associated
with
the
is
a
the
words, symbols
DO
Total
+
<=
and
18
2
punctuation
Variable
that
declaration
make
means
up
the
giving
language.
a
new
name
mark
and
4
a
data
type
for
the
variable.
ENDFOR
OUTPUT
7
302
(Topic
9.5)
T
>=
3
65
so
that
they
are
easy
to
remember
and
Total
=
TRUE, F
=
<>
understand
cash
FALSE
A
B
NOT A
NOT B
A
T
T
F
F
T
AND
B
A
T
OR
B
(NOT A)
T
OR
(garden)
(town)
B
NOT (A
F
OR
(town)
B)
NOT (A
F
AND
(town)
B)
A
F
AND
T
F
F
T
F
T
F
F
(town)
T
(garden)
T
F
T
T
F
F
T
T
(garden)
F
(town)
T
(garden)
F
(town)
F
F
T
T
F
F
T
(garden)
T
T
(garden)
F
(town)
(garden)
(NOT B)
(town)
(garden)
Answers
Topic
10.3
Topic
11.1
program
listing
1
a
end
of
topic
questions
2
{Name,
1
to
date
and
purpose
of
invalid
program}
2
A
translator
converts
program
code
to
machine
b
invalid
c
invalid
Program
code. Examples
are
compilers, interpreters
and
Var
assemblers.
d
Q2;
number,
count:
integer;
valid
Begin
3
Debugging
nds
errors
in
program
code
and
e
valid
{initialise
corrects
them.
2
identify
and
correct
each
error
the
variable
individually ;
number}
save
the
program;
compile
the
program
again
number
Topic
:=
1;
10.4
While
1
a
Testing
tries
to
nd
problems
in
your
code.
Topic
(number
<=
3)
Do
11.2
Begin
Debugging
isolates
and
xes
the
problems.
1
a
A
compound
statement:
comprises
two
or
{Increment
b
Black
box
testing
is
used
to
check
that
the
more
statements
within
Begin
and
count
correct
output
of
a
module
is
produced
keywords. A
simple
statement
comprises
the
input. W hite
box
testing
checks
single
:=
count
accuracy
of
processing
from
input,
b
write
by
1}
1;
the
number}
instruction.
Writeln(‘You
the
+
a
{Output
from
number
End
places
the
cursor
immediately
have
entered’,
after
number);
through
ever y
possible
path
through
to
the
the
text
that
is
written
on
the
screen. writeln
End;
output.
prints
the
text
on
the
screen
then
places
the
Writeln(‘out
2
Input
values, recording
expected
and
actual
cursor
at
the
beginning
of
the
next
of
loop’);
line.
End.
output. Ever y
must
be
conditional
tested
at
least
branch
once, and
and
loop
follow
c
as
:=
an
is
used
in
operator
an
to
assignment
check
statement. =
is
equality.
3
many
paths
within
each
module
and
function
2
{Name,
a
date
and
purpose
of
Output with
as
program}
possible.
line
3
reliable, stable, easy
to
maintain, easy
to
Examples
of
values:
4, 5;
2, 2;
−2, 4;
85
Program
portable
4
=
use or
0, 2.5.
Fragment
Fragment
Var
1
2
Begin
For
Extra
Topic
line
Extra
Q3;
age:
integer;
age
:=
13
to
19
Do
line
Writeln(‘You
10.5
are
a
Same
1
to
allow
others
to
maintain
the
application
teenager’);
if
line
the
original
allow
programmer
others
to
see
is
internal
not
available;
and
user
5
End.
to
details
b
of
Output with
4
the
application
line
2
if
the
program
updated, to
or
needs
to
be
understand
supposed
to
debugged
what
the
=
{Name,
55
code
date
and
purpose
of
program}
or
is
Fragment
Fragment
1
2
Program
doing
Var
do
Q4;
total,
count,
mark:
integer;
3
a
curly
brackets
b
single
Same
{}
line
Same
line
average
30
quote ’
:
real;
85
Begin
4
System
documentation
is
written
by
c and d
technical
persons
for
technical
persons
and
are
practical
answers
concerned
with
how
the
program
program
does
program
do
is
concerned
and
how
the
with
end
what
it
is
user
supposed
as
to
obser ve
in
parts
a
the
and
same
{Initialise
total
:=
0;
variables}
count
:=
0;
b
to
Fragment
2
the
makes
mark
the
Topic
what
output
works. User
e
documentation
work
is
:=
0;
{Prompt
to
enter
a
mark}
11.3
Write(‘enter
do.
mark’);
1
5
a
over view
of
the
process
and
tasks, name(s)
Readln(mark);
{Name,
date
and
purpose
of
While
of
the
authors
of
the
program, date
that
(mark
<>
-1)
Do
program}
Begin
program
was
created
or
modied
or
Program
Calculate_age;
{Add
the
mark
and
increment
reviewed
Var
b
overall
system
specication
thisyear,
birthyear,
age
:
integer;
how
the
requirements
are
the
count}
showing
broken
total
:=
total
+
mark;
count
:=
count
+
1;
into
Begin
a
set
of
interacting
describing
how
acceptance
which
each
test
must
be
programs;
plan
test
program
unit
describing
satised
plans
before
is
the
the
tested;
tests
Writeln(‘enter
{Prompt
Write
enter
two
this
dates}
year:’);
Read(mark);
End;
{If
system
Readln(
is
to
(‘Enter
thisyear
count
were
description
explaining
system
can
and
cannot
do;
a
then
no
marks
birthyear:’);
count
=
0
what
Then
Readln(birthyear);
the
0
entered}
If
functional
=
);
accepted
Write(‘Enter
c
mark’);
writeln(‘no
marks
installation
entered’)
document
explaining
how
to
install
the
{Calculate
the
age}
{Else
application
and
gicing
suggestions
how
age
:=
thisyear
calculate
Else
to
recover
when
from
things
go
errors
and
wrong;
basic
problems
to
get
explaining
started
manual
with
describing
in
simple
the
average}
birthyear;
begin
average:=
total/count;
introductor y
If
manual
the
–
terms
system;
system
age
<
13
Writeln(‘The
how
average
is’,
average);
Then
Writeln(‘A
Else
Writeln
teen’)
reference
End;
(‘Not
a
End.
facilities
teen’);
available
facilities
to
the
can
be
user
and
used.
how
these
End.
3 03
Answers
Topic
to
end
of
topic
questions
12.1
b
4
Private
1
add
the
Developer
Sub
CommandButton1_
tab
Click()
2
submit, OK, Cancel
or
Dim
3
activeX
4
make
Controls
’Name,
age
As
Integer,
message
As
clicking
as
a
it
by
Mode
is
deselected
of
Private
remove
macro-enabled
the
Sub
CommandButton1_
by
=
Range("G10").Value
Click()
highlighting.
'Place
age
Select
Case
in
cell
G10
Dim
number,
count
As
Integer
workbook
Case
Topic
purpose
group
Design
age
5
and
program
String
sure
date
Close
Is
>=
age
number
18
Do
=
While
1
number
<=
3
12.2
message
=
"Tertiary"
Case
>=
number
=
InputBox(“Enter
1
Private
Sub
CommandButton1_
Click()
Dim
message
'Type
a
As
String
message
in
cell
Range(“J5”).Value
'Click
command
output
message
End
button
=
Case
>=
Is
message
J5
MsgBox
Is
message
Case
End
an
11
=
"Primary"
=
"Nursery"
'
Private
Sub
number
&
=
=
message
in
the
“You
+
by
1
1
count
have
entered
“
number
MsgBox
Output
count
Loop
message
2
‘Increment
MsgBox
Select
“Information
0)
‘Output
Range("G12").Value
Sub
integer”,
Required”,
count
Else
message
to
16
"Secondary"
G12
End
“out
of
loop”
Sub
CommandButton1_
End
Sub
Click()
c
Dim
info
As
Integer,
message
5
As
String
info
=
'Type
If
Range(“D5”).Value
number
info
message
=
=
in
10
cell
D5
Then
“Correct
names
A2
A6
to
cost
B2
B6
to
of
drinks
in
Private
Cells
of
drings
in
Dim
cells
=
Dim
“Sorry!”
Sub
cost
As
=
As
age
MsgBox
CommandButton1_
Next
cost
If
age
For
Click()
message
Sub
CommandButton1_
Click()
'Type
Private
number!”
Else:
End
'Type
End
Integer
Integer
=
13
“You
To
are
19
a
teenager”
age
Sub
2
d
Range(“J15”).Value
Do
=
'Click
command
output
message
button
cost
eligible
=
>
4
“Well
<>
eligible
<
=
cost
+
=
*
1.15
Dim
1
Total
Integer,
Loop
mark
End
String
Sub
=
3
“Good
a
Private
Then
=
0
Count
=
0
Average
Sub
CommandButton1_
thisyear,
As
total
As
Count
As
Double,
Message
As
=
Integer,
=
0
0
birthyear,
While
message
this
“Enter
year
thisyear
String
mark
<>
-1
age
=
InputBox(“Enter
mark”,
Integer
MsgBox
Click()
As
As
CommandButton1_
mark
Dim
Integer,
Integer,
Total
Do
Sub
As
As
Average
Click()
work”
Dim
Private
CommandButton3_
Then
mark
result
Sub
Click()
done!”
6
If
3).Value
Cells(cost,2).Value
Sub
result
2)
Private
Cells(cost,
to
3
If
Cells(cost,
“”
message
End
While
and
=
two
a
“Information
Required”,
If
Then
0)
dates,
birth
mark
=
-1
Message
=
“End
day”
of
marks”
InputBox(“Enter
Else
total
=
Range(“J8”).
Value
+
Range(“J10”).
this
year”,
“Information
Total
Required”,
=
Total
Count
Value
+
Range(“J12”).Value
birthyear
=
add
numbers
in
cells
J8,
your
birth
=
mark
Count
+
1
InputBox(“Enter
End
'
+
2018)
If
year”,
Loop
J10,
“Information
J12
Required”,
0)
If
If
total
>
6
‘Calculate
Then
the
Count
Message
message
=
“Prize
and
age
=
thisyear
=
0
Then
age
-
=
“
No
marks
=
Total
entered”
birthyear
Else
If
Plaque”
age
<
13
Then
Average
MsgBox
Else:
“A
/
Range(“C4”).Value
message
=
MsgBox
If
Range(“J15”).Value
=
message
'Put
End
Sub
answer
in
=
cell
J15
End
If
End
Sub
“Not
a
Average
teen”
7
End
If
End
Sub
a
amount, interest, years, payment
b
C2, C3, C4, C5
c
PMT
d
Cell
C2
contains
8.5%, C4
50,000, C3
contains
7, C4
contains
contains
=PMT(C3/12,C4*12,-C2).
304
Average
Else
“Sorry!”
MsgBox
End
Count
teen!”
Index
A
C
adding
text
105
algorithms
231, 233
algorithm
phase
basic
types
data
conditional
and
subroutines
testing
alignment
phase
231
keywords
and
256–7
constants
233
software
software
customised
and
software
popular
7, 29
software
packages
specialised
29
operators
156, 252
66
17
problems
backups
bistable
bits
37
systems
devices
10
20
Blu-ray
Bluetooth
bookmarks
broadband
browsers
bugs
140
67, 71
71, 72
networks
20
22, 25
64
95–6
congurations
computer
networks
computer
security
79–80
computer
systems
34–5
computer
vulnerability
features
of
a
charts
182
troubleshooting
charts
storage
cables
columns
181
problems
181–2
conditional
23–4
67
cabled
interfaces
31
channels
conditional
66
data
ow
transmission
modes
Communications
66–7
67
list
234, 264,
structure
68
list
Technolog y
fraud
linking
81–3
computer
programs
to
updating
7
design
control
233–4
cyber
a
page
the
text
copyright
(IPO)
contents
123
headings
122
contents
systems
copying
246–51
the
122–3
selecting
computer
248
structure
122
generating
7
list
123
56–7
105–6
87–8
security
79–80, 86–7
232
252–4
D
problem
denition
problem
solving
231
damage
231
data
documentation
programming
languages
programming
with
270–1
260–1
Pascal
274–82
with
Applications
pseudocode
a
V isual
( VBA)
Basic
283–91
235–44
program
testing
algorithms
testing
and
256–7
debugging
a
80
8, 15, 19, 40–1
data
logging
data
processing
data
security
80
data
transfer
28
data
validation
data
verication
data-capture
266–7
techniques
268–9
writing
236–8
statements
248–9
contents
66
transmission
running
236
statements
IF-THEN-ELSE
media
for
36–7
statements
IF-THEN
67
transmission
charts
62
hardware
288–9
media
wireless
15
238–9
95
of
basic
IF-THEN-ELSE
112–15
79
screen
congurations
branching
IF-THEN
62
62–6
computer
deleting
charts
stand-alone
broadcast
point-to-point
programming
142–3
84
business
bytes
(BDs)
65
breadcrumbs
182
and
66
180–1
program
74
Disks
6
disadvantages
charts
operators
20
blogging
bus
27
problems
biometric
data
input-processing-output
10, 13
processing
batter y
(CPUs)
and
networked
creating
owcharts
readers
units
charted
algorithm
55, 97
barcode
batch
91
86
banking
180–4
(CT )
B
back
charts
direction
29
transmission
devices
30
154
processing
communication
30
software
asynchronous
references
commerce
30
programs
86
arithmetic
cell
command-line
software
application
software
157–8
central
coaxial
29
of
154
cloud-based
custom-written
general-purpose
integrated
cell
ranges
sizing
85–6
22, 25
cell
moving
253
6
advantages
systems
changing
107, 155, 170–1
application
archives
234
67, 71
154
active
234
234
operator
anti-virus
audio
cells
233
algorithms
variables
AND
231
234
statements
media
CD-ROMs
statements
implementation
loops
computers
cabled
direction
how
data
of
is
importing
47–8
computer–user
262–5
interfaces
31–3
problems
data
42–4
44
forms
data
46–7
ow
66–7
represented
data
interpretation
program
27–8
20–1
120–1
of
coded
associated
data
with
44
shared
44–5
305
Index
proprietar y
data
spreadsheets
storage
data
81
property
154–5
21–5
queries
protection
84
viruses
copyright
and
network
and
85–6
piracy
cyber
protection
from
nature
protection
from
theft
spreadsheets
86–7
databases
86
84–5
85
and
disadvantages
192
calculated
elds
217–19
217
with
numbers
218–19
keys
and
foreign
196
tables
entering
data
types
problems
a
report
creating
a
table
entr y
203–4
types
194
terms
systems
and
from
name
eld
options
importing
move
line
save
desktop
34–5
direct
82
direct
data
display
le
organisation
entr y
(DDE)
devices
225
and
paper
a
tables
15
database
225, 226
database
functions
in
tables
eld
217–18
searching
211
report
and
118
and
195–6
223
drives
DVDs
transfer)
sale
embedded
systems
(EPOS)
13
57
35
86–7
110
entr y
software
99–100
concerns
errors
and
transmission
eye
55
82–3
92
42, 50, 219
ethernet
104
a
42
errors
266–7, 286
hardware
errors
cables
errors
42
42
67
69
problems
91
F
116–19
document
bre
118
110–11
index
16
le
sequential
processing
record
99
serial
26
22, 25
access
67
49
organisation
le
organisation
52–3
44
databases
cables
51–2
28, 62
6, 21, 24
optic
organisation
direct
103
entr y
le
122–3
printers
licensing
drivers
of
97–8
104
downloading
driver
funds
controllers
extranets
contents
data
instruction
point
110
129
typefaces
and
embedded
data
106
107
electronic
110
124–8
106
eavesdropping
endnotes
105–6
108
commands
tabs
(electronic
errors
endnotes
text
electronic
columns
footers
breaks
dot-matrix
as
redo
environmental
120
104
size
of
copying
programming
and
printing
double
key
les
merge
section
200–2
used
screen
106
formatting
entertainment
comments
footnotes
table
databases
computer
to
97
encr yption
103
protecting
203–4
a
a
15
proofreading
194
to
of
orientation
database
195
mathematical
operators
devices
used
108
with
teaching
EF T
documents
and
education
9
cursor
and
working
116
access
the
vs. save
undo
attacks
systems
commands
paragraph
105
107–8
108
spacing
moving
86–7
dictionar y
Painter
keyboard
records
retyping
107
indenting
267, 268–9
margins
219
a
multiple
printing
specic
denial-of-ser vice
mail
193
primar y
213–14
and
106–7
Format
214–15, 216
headers
length, description
joining
for
text
104–5
105
fonts
220
112–15
queries
eld
text
adding, deleting
209–10, 216
combining
193
properties
30 6
sorting
adding
191
denitions
editing
200–1
queries
debugging
creating
management
exporting
227
220–4
data
elds
in
194–9
data
eld
reversing
features
design
creating
in
found
194
(DBMS)
70, 74–5
eld
10–12
data
common
database
one
51–2
and
203–8
common
database
than
e-mail
alignment
formats
digitisers
candidate, composite
errors
report
deleting
with
elds
capturing
more
relationships
decr yption
elds
numbers
E
210–11
calculated
calculated
a
193
searching
84
86, 97, 99, 191, 193, 227
advantages
in
text
searching
171
sur veillance
databases
and
using
records
security
les
elds
195
212–13
87–8
protecting
for
table
209
queries
computer
types
database
errors
matching
and
sequential
organisation
le
ser vers
les
7
50
49–50
63
50–1
le
Index
combining
les
120
le
compression
le
types
switching
les
forms
add
form
a
the
labels
template
or
131
protect
the
content
ash
form
a
design
graphics
cards
23
statements
symbols
248–9
hard
disks
hard
drives
hardware
246
health
110
home
Painter
formatting
107–8
the
programs
hubs
output
of
Pascal
Google
155–6, 170–1
Forms
in
full-duplex
functions
130–5
131–2
arithmetic
formulae
data
ow
160
AVERAGE
operators
156
COUNT
161
58–9
57–8
40, 95
95
97–8
99
and
98–9
recreation
and
moral
eects
93
entertainment
99–100
Information
eects
of
skills
Technolog y
IT
in
the
required
printers
devices
(IT )
7
workplace
in
89
the
92–3
16
6, 8
advantages
and
disadvantages
12–14
140, 142-3
biometric
I
systems
data
entr y
10
(DDE)
devices
10–12
32–3
identity
manual
theft
81
impact
index
statements
printers
devices
devices
8–9
9
236–8
remote-control
devices
9–10
statements
touch-sensitive
devices
9
16
charts
120–1
52–3
organisation
Internet
les
57
52
interfaces
33
70
2G, 3G
indexed
31–3
improving
le
(IPO)
232
interfaces
108
sequential
industr y
input
pointing
input-processing-output
indenting
161
control
disadvantages
enforcement
medicine
input
65
importing
66
160–1
and
COUNTIF
95–6
inkjet
238–9
156–9, 160
COUNT
A
90–2
73
IF-THEN-ELSE
formulae
and
workplace
63
IF-THEN
152, 156–9
common
used
form
systems
97
IT
concerns
pages
hyperlinks
icons
llable
arithmetic
84
stock
forecasting
business
direct
130
a
31
hardware
280–2
spreadsheets
creating
with
96
110, 141
hotspots
103, 108
formatting
formulae
interfaces
monitoring
headers
applications
information
54
legal, ethical
6, 26, 42
devices
an
banking
law
21, 24
hardware
247
66
21–2
commercial
249–51
statements
up
processing
advantages
ow
56–7
54
education
data
54
55–6
information
13
80, 83
half-duplex
110, 141
Format
32
54
disadvantages
55
weather
H
106–7
footnotes
33
41
81–3
57
system
tablets
hacking
and
supermarket
131
108–9
32
commodity
processing
care
setting
(GUIs)
33
windows
for
131–2
a
55
payrolls
interfaces
as
information
systems
libraries
32–3
menus
32
footers
user
20
90
Forms
icons
the
131
conditions
sequence
forms
create
233, 246
owchart
(GB)
village
Google
22–3, 24
conditional
fonts
the
81
memor y
owcharts
folders
of
to
controls
replace
nested
gigabytes
global
properties
abuse
memor y
ash
control
industr y
pointers
change
and
banking
164
G
graphical
form
nancial
130
131
document
or
display
131
blank
set
163–4
82
40–1
advantages
VLOOKUP
to
controls
controls
customise
tab
of
information
163
health
content
open
SUM
the
misuse
162–3
RANK
create
espionage
information
162
PMT
Developer
content
nd
to
162
MIN
121
industrial
information
131
the
the
86
130–5
content
form
databases
162
162
MAX
and
between
applications
add
IF
120–1
protecting
llable
DATE
28
and
advantages
blogs, vlogs
4G-L
TE
and
and
71, 72
disadvantages
podcasts
76
74
3 07
Index
broadband
cable
71
medicine
71
expert
connecting
to
creating
web
dial-up
71
the
caches
Internet
protocols
browsers
Internet
medical
understanding
addresses
72
main
(MB)
72–4
73
menus
job
losses
89–90
joysticks
keyboards
8, 12
keyboard
move
keypads
commands
the
cursor
used
kilobytes
devices
phones
2G, 3G
music
(kB)
20
memor y)
19
and
text
interfaces
ink
12, 14
musical
35, 36
laser
law
printers
driver
licensing
71, 72
printers
line
spacing
network
hubs
16
storage
logic
errors
digital
interface
21–3
logic
operators
congurations
252
289–90
magnetic
mail
tape
merge
selective
using
a
mail
manual
merge
margins
master
125
Word
to
125–6
devices
and
les
49
phishing
network
layouts
cyber
86–7
64–5
printers
operator
security
piracy
pivot
16
Pascal
rst
processing
operating
system
booting
attacks
tables
software
operators
distribution
96
control
26
82
distribution
pivot
tables
combinations
operators
of
used
databases
operators
in
211
searching
254
portrait
printers
tables
175
pivot
tables
176
74
devices
9
orientation
16–17
177–8
pivot
33
pointing
176
177
17
pointers
252–5
34–5
15
podcasting
26
64
174–5
charts
plotters
control
277
274–5
94–5
two-dimensional
pixels
26
hardware
8–9
27–8
program
6
computers
modifying
7, 26
278–9
program
networks
devices
frequency
252–3
a
your
Pascal
276
275
83, 87–8
pivot
online
perform
104
marketing
personnel
O
34
input
personal
and
66
and
in
one-dimensional
merge
Microsoft
mail
disadvantages
stand-alone
program
program
of
274
280–2
278
the
peer-to-peer
21, 24
124–5, 127–8
mainframes
and
network
NOT
64
compiler
output
55
peripheral
networked
non-impact
M
networks
6, 62
the
275–6
280–1
140
payrolls
systems
234, 239–44, 250–1, 264–5,
paths
program
Pascal
the
writing
62–3
108
numbers
punctuation
structure
63
advantages
of
239, 249
239–44, 250–1
networks
267
a
running
peer-to-peer
108
local
loops
99
the
two
formatting
conditions
loops
databases
formatting
compiling
nding
14
108
274
dividing
83
84
104
statements
nested
99
55–6
line
308
sizes
Pascal
N
16
enforcement
libraries
104
16–17
90
sning
saving
orientation
devices
numbering
paragraph
L
landscape
15
P
paper
instrument
(MIDI)
17
devices
printing
packet
4G-L
TE
6, 15–18
devices
31–2
character
105–6
piracy
104
outsourcing
8–9, 12
moving
234
(OMR)
253
devices
audio
9
mobile
mouse
8
keywords
output
page
mobile
to
106
orientation
48
microphones
(OCR)
22
recognition
operator
display
(magnetic
microlm
K
mark
OR
22–3
(read-only
recognition)
13
19
33, 103
MICR
disks
optical
19
menu-driven
J
optical
(random-access
ROM
68–9
98
19
sticks
memor y)
recognition
11, 14
memor y
RAM
Internet
systems
20
memor y
memor y
character
11–12, 13, 47
6, 19
hybrid
71, 72
optical
98–9
information
megabytes
74
addresses
intranets
70–1
74
memor y
Internet
web
Internet
pages
98
systems
104
Index
troubleshooting
printer
problems
36–7
printing
SBA
129
copies
Print
print
range
working
185
SBA
documentation
documenting
code
documentation
the
language
SBA
phase
language
260
116–17
81
pseudocode
235–6
conditional
236–9
statements
236
the
data
(random-access
real-time
records
processing
recreation
a
relational
research
retraining
injur y
a
64
smart
memor y)
19
program
code
to
object
errors
errors
S
96
vs. save
266–7
106
software
81
pivot
in
tables
relative
247
156–9
into
Excel
186–7
Excel
rows
186–7
and
columns
174–8
185
236
sorting
le
sorting
50–1
eld
title
66
star
a
7, 29–30
programs
7
software
interfaces
software
piracy
software
260
96
79, 81
31
83
7, 26
by
more
by
one
list
eld
172
154–5
computers
63
64
234, 236–9, 247–9, 264
statements
in
Pascal
statements
in
V isual
Applications
devices
advantages
and
and
278–9
Basic
( VBA)
management
storage
one
158–9
data
networks
stock
than
155
statements
85–6
list
172
stand-alone
applications
addressing
171–2
a
of
values
90
software
absolute
locking
types
15
software
171
and
164–5
6–7, 26, 42
code
functions
les
protection
software
source
dates
160–4
les
printing
ow
proprietar y
system
as
and
10–11, 14
computer
and
manipulating
23
application
170–1
and
154
sorting
commercial
267
values
165–6
data
concerns
software
formatting
80
smartboards
155
170
features
linking
accidental
141
cards
heights
172–4
formatting
labels
80
statements
anti-virus
266
programming
runtime
266
267
81–3
sequential
data
records
functions
140
cards
social
source
code
sidebars
row
paste
numbers
formulae
statements
and
simplex
37
and
importing
and
organisation
SIM
105
debugging
save
95
70
running
sales
91
89–90
text
(read-only
from
(RSI)
serial
ltering
format
262
sequential
9–10
development
networks
routers
252
295–6
12, 58
sequence
devices
strain
semantics
sensors
106
operators
and
retyping
50–1, 52–3
99–100
remote-control
repetitive
websites
record
SBA
296
110–11
security
damage
49
for
command
ROM
27–8
and
155–6
fraud
deliberate
widths
cut, copy
79–80
proprietar y
key
searching
ring
19
49–50
primar y
redo
memor y)
295
73–4
breaks
172–3
155–6
142
engines
160
180–4
column
15
problems
formulae
157
154, 157–8
charts
297
scheme
155
AutoFilter
297
173–4
170–1
arithmetic
AutoFill
296
program
for
computer
RAM
solving
Filter
data
alignment
cells
problem
mark
security
R
293–4
the
requirements
section
align
296
teachers
search
239–44
problem
for
ScreenTip
branching
teacher
design
program
monitor
conditions
Advanced
292–3
guidelines
screens
292
297
the
the
SBA
116–19
propaganda
sequential
test
260–1
your
152–3, 154, 160,
167–9, 179
SBA
document
the
design
programming
implementation
nested
and
dene
260
294–5
data
for
program
code
270–1
languages
proofreading
with
guidelines
and
programming
your
116–17
spreadsheets
individual
program
programming
proong
270
270
choosing
or
preparing
129
spreadsheets
user
129
spellcheckers
292
submissions
group
Preview
9, 13
guidelines
nal
129
program
scanners
for
287
96
media
6, 21
disadvantages
24–5
cloud-based
local
storage
storage
23–4
21–3
30 9
Index
stress
92
stylus
uploading
9
USBs
subroutines
234
user
supermarket
stock
sur veillance
84
monitoring
devices
58–9
hardware
system
utility
check
transmission
66
data
type
format
errors
266–7
software
7, 26
107
terabytes
visual
92
(TB)
20
testing
algorithms
testing
programs
theft
256–7
268–9, 286
43
printers
printers
27
touch
pads
touch
screens
Changes
transaction
les
transmission
modes
troubleshooting
not
monitor
when
device
power
is
37
36–7
information
Command
using
84–5
Button
your
the
286
VBA
286
editor
284–6
power
supply
systems
13
67
and
pages
73, 74, 138, 141
and
themes
142
139, 141, 147
designing
a
economy
140
footers
57–8
141
web
page
63
68
replace
108–9
103–4
of
108
89
of
IT
in
the
92
in
the
92–3
and
retraining
concerns
89–90
90
92
worms
85
writing
a
154, 160
program
conditional
262
statements
264
264–5
program
statements
program
structure
sample
89
90–2
required
jobs
workplace
concerns
concerns
skills
loss
103
numbering
looping
141–6
139–40
104–8
features
social
forecasting
content
(UPS)
key
text
worksheets
weather
106
nd
IT
pages
117
workplace
W
80, 83
Count
processing
health
74
147–8
32
environmental
program
pages
19
eects
287
their
32
workplace
program
backgrounds
uninterruptible
287–8
web
transmission
word
and
( W indows, Icons, Menus
stress
web
command
types
your
web
wireless
page
the
voiceband
U
undo
data
your
networks
word
138
147–9
websites
wireless
Word
and
11–12, 46
47
access
286
of
page
Pointers)
editing
voice-recognition
103
unauthorised
288–9
289–90
testing
vlogs
documents
283–4
284, 285–6
statements
errors
statements
mobile
36
problems
alternatives
typefaces
loops
37
or
problems
turnaround
the
saving
respond
on
Button
tab
285–6
66
problems
turned
printer
edit
67
36
computer, laptop
WIMP
and
websites
web
65
windows
Developer
variables
displaying
49
media
85–6
Applications
287–91
116, 117
transmission
does
9
planning
W i-Fi
viruses
72–4
139
nalising
283
declaring
devices
26
for
the
correcting
9, 13
use
99
conditional
9
touch-sensitive
batter y
Basic
of
a
description
44
142
concepts
73, 138
categories
80, 85
Command
time-sharing
Track
reality
adding
16–17
42
images
9
websites
check
141
141
and
webcams
44
virtual
( VBA)
(3D)
43
139
technolog y
creating
checks
preventing
16
three-dimensional
text
web
233
memor y
V isual
140
140
sidebars
42
virtual
viruses
85
thermal
bookmarks
structure
security
42–3
check
verication
90
43
43
reasonableness
telecommuting
310
check
check
variables
planning
check
check
presence
112–15
teleworking
and
organisation
43–4
check
length
T
tabs
147
141
hyperlinks
42
digit
consistency
range
tables
headers
7, 26, 84
141
started
navigation
validation
with
262
syntax
31–3
software
V
84
synchronous
layout
getting
interfaces
utility
84
software
general
142-3
with
monitoring
syntax
control
28, 62
22–3
program
264
262
262–4
Information
T
echnology
THIRD
EDITION
Oxford Information Technology for CSEC® ,
textbook,
has
Caribbean
As
well
the
as
been
updated to
Secondar y
Examination
comprehensive
School-Based
application
of
knowledge
and
meet
skills
solving,
for
the
this
it
a
market
leading
requirements
Cer ticate
coverage,
Assessment. With
problem
the
the
(CSEC®)
provides
focus
course
examination
on
the
the
latest
syllabus.
essential
suppor t
development
provides
and
of
students
for
and
with
the
beyond.
Oxford Information Technology for CSEC®:
Explains
the
key
concepts
Contains
practice
exam-style
Contains
relevant
coverage
in
School-Based
students
Online
and
questions
of
Assessment
the
most
(SBA)
and
recent
developments
provides
guidelines
for
teachers
suppor t
packed
with
extra
practice
material,
along
with
9780198437208
answers
Is
in
Is
clear
Has
full
colour
and
fresh
easy
and
Fur ther
with
to
many
illustrations
to
help
understand
up-to-date
learning
useful
with
content
online
with
suppor t
Caribbean
examples
at:
www.oxfordsecondar y.com/9780198437161
FO
R
N
S
How
to
get
in
Y
T
H
E
9780198437215
E
LL
W
B
A
S
U
touch:
IS B N
1
web
www.oxfordsecondary.co.uk
email
schools.enquiries.uk@oup.com
tel
+44
(0)1536
452620
fax
+44
(0)1865
313472
9
9 7 8 -0 -1 9 -8 4 3 7 1 6 -1
780198
437161
Download
Study collections