Information Technology for CSEC® Examinations 3rd Edition Howard Campbell and Alan Wood Contributors: Keith Burkette (Trinidad and Tobago), Desrie Elwin (Dominica), Andrew Samuels (Jamaica), Nnaemeke Vesprey (Grenada), Camille Bruno-Audain (St Kitts and Nevis), Jesse James (St Vincent) CSEC® is a registered trade mark of the Caribbean Examination Council (CXC). INFORMATION TECHNOLOGY for CSEC® EXAMINATIONS THIRD EDITION is an independent publication and has not been authorized, sponsored, or otherwise approved by CXC. 9781380023322_text.indd 1 31/10/2019 11:16 Macmillan Education 4 Crinan Street London N1 9XW A division of Springer Nature Limited Companies and representatives throughout the world ISBN 978-1-380-02334-6 Text © Howard Campbell and Alan Wood 2020 Design and illustration © Macmillan Education Limited 2020 The authors have asserted their right to be identified as the authors of this work in accordance with the Copyright, Designs and Patents Act 1988. First published 2010 Second edition published 2014 This edition published 2020 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publishers. Designed by Macmillan Education Page make-up by Blue Dog Design Studio Illustrated by Blue Dog Design Studio, Richard Jones c/o Beehive Illustration, TechType and Tek-Art Cover design by Macmillan Education Picture research by Susannah Jayes The publishers would like to thank Keith Burkette (Trinidad and Tobago), Desrie Elwin (Dominica), Andrew Samuels (Jamaica), Nnaemeke Vesprey (Grenada), Camille Bruno-Audain (St Kitts and Nevis) and Jesse James (St Vincent) for their invaluable help in reviewing this manuscript. These materials may contain links for third party websites. We have no control over, and are not responsible for, the contents of such third party websites. Please use care when accessing them. The authors and publishers would like to thank the following for permission to reproduce their photographs: Alamy Stock Photo/ Art Directors & Trip p83(a), Alamy Stock Photo/Danita Delimont p48, Alamy Stock Photo/Hennell p12, Alamy Stock Photo/HG Delaney p24(c), Alamy Stock Photo/Indigo Photo Agency p24(b), Alamy Stock Photo/Jaroszpilewski p10(b), Alamy Stock Photo/Christopher King p38, Alamy Stock Photo/Oleksiy Maksymenko p39(a), Alamy Stock Photo/NUAGE p83(b), Alamy Stock Photo/Pashkov Andrey p13(cr), Alamy Stock Photo/Pixelfritter p108(c), Alamy Stock Photo/Niels Poulsen p25(cr), Alamy Stock Photo/Guy Primo p102(cr), Alamy/txoko pp252, 283, Alamy Stock Photo/Jerome Wilson p25(cl); Bluetooth SIG p78(tm); Cultura/Andrew Brookes pp128, 161, 182, 221; Getty Images pp13(b), 108(cl), Getty Images/Keith Brofsky p114(b), Getty Images/Fuse p117, Getty Images/Henrik5000 pp90, 91, Getty Images/ Hoxton/Ryan Lees p21(bl), Getty Images/iStockphoto/3DSculptor p85, Getty Images/iStockphoto/daboost p7(a), Getty Images/ iStockphoto/g-stockstudio p110, Getty Images/iStockphoto/GetUp_ Studio p7(b), Getty Images/iStockphoto/MileA p86(a), Getty Images/ iStockphoto/Scanrail p7(tm), Getty Images/istockphoto/sunstock p10(c), Getty Images/iStockphoto/zentilia p39(b), Getty Images/ KTS Design/Science Photo Library pp2, 46, 71, 98, Getty Images/ Kuzma p21(br), Getty Images/loveguli p114(a), Getty Images/Perry Mastrovito p84(tl), Getty Images/Maxiphoto p8(b), Getty Images/ Ryan McVay p24(d), Getty Images/mikroman6 p102(cl), Getty Images/ monkeybusinessimages p121, Getty Images/Alain Nogues/Sygma p291(bl, br), Getty Images/onurdongel p34, Getty Images/pagadesign p28, Getty Images/PeopleImages pp119, 124(c), Getty Images/ PhotoDisc pp76, 123(cl), 124(tl), 262, 284, Getty Images/pictafolio p94, Getty Images/pixelmaniak p24(a), Getty Images/Punchstock p13(a), Getty Images/Joe Raedle p32, Getty Images/Scanrail p6, Getty Images/sergeyryzhov p26(a), Getty Images/Strauss/Curtis p88, Getty Images/Tetra Images p86(b), Getty Images/Thinkstock p123(tr), Getty Images/thrshr p26(b), Getty Images/UniversalImagesGroup p5, Getty Images/VukasS p63, Getty Images/Wavebreakmedia Ltd p23; iStockphoto/Andresr p74, iStockphoto/Scanrail p37; National Oceanic and Atmospheric Administration (NOAA) p253; Pan Macmillan p162; Shutterstock/DeSerg p87, Shutterstock/Brian A Jackson p114(c), Shutterstock/Odua Images p41, Shutterstock/ rivermo74 p8(a), Shutterstock/tuthelens p122(cl), Shutterstock/zentilia p84(tr); Springer Nature Limited/Natalie Dawkins pp120, 122(tcl); Wi-Fi®, Wi-Fi Alliance®, and the Wi-Fi CERTIFIED logo are registered trademarks of Wi-Fi Alliance®. Wi-Fi CERTIFIED™ is a trademark of WiFi Alliance® p78(cr). Printed and bound in Spain 2024 2023 2022 2021 2020 9 8 7 6 5 4 3 2 1 9781380023322_text.indd 2 31/10/2019 11:16 Contents About this book Introduction v vii Countermeasures to mitigate the effects of identified threats 113 Assess the effects of automation on job security Theory 1 2 3 Computer fundamentals 2 The concept of information technology 3 Major types of computer systems 4 Assess the impact of information and communications technology on selected fields The major hardware components of a computer system 10 Productivity Tools The interrelationship of the major hardware components of a computer system 17 5 Evaluating the relative merits of cloud storage and local storage 120 Mastering word processing 128 19 Creating documents using content from a variety of sources 129 Selecting appropriate input and output devices 20 Using appropriate document-formatting features 133 The role of the different types of software 29 Different types of user interface 33 Using appropriate editing features to structure and organise a document 140 Evaluating the suitability of a computer system 37 Troubleshooting basic hardware problems 40 Using review features to enhance document readiness 146 Information processing 46 Information and data 47 Evaluating the reliability of information obtained from online sources 54 File organisation 61 Choosing an appropriate file access method 66 Computer networks and web technologies 71 Introduction to computer networks 72 Appropriately using features that allow protection of a document 150 6 Distinguish between different types of network: LANs, 73 MANs and WANs The functions of the basic components of a network Key web technology concepts 90 Social and economic impact of Information and Communication Technology 98 Introduction to the concepts of computer security, cybersecurity and computer misuse 99 Assess the potential impact of computer misuse on the main entities impacted Generating a table of contents for a document 151 Using mail merge features in a range of situations 152 Creating a fillable electronic form for online use 154 Mastering web page design 161 Planning a website structure and organisation of pages 162 Designing and creating simple pages 165 Inserting hyperlink into a web page 172 Testing and evaluating a website for accuracy, user- friendliness and effective display 176 82 The importance of mobile communications technology 88 4 117 Describe the roles of various personnel in computerrelated professions 119 7 Mastering spreadsheets 182 The purpose of spreadsheets 183 Using appropriate terminology associated with 103 spreadsheets 184 Using basic predefined functions 186 Creating advanced arithmetic formulae 193 Replicating (copying) formulae to other cells 194 Manipulating rows and columns: insert, delete and modify 199 iii 9781380023322_text.indd 3 31/10/2019 11:16 8 Manipulating data in a spreadsheet 200 Performing charting operations 210 Manipulating one or more worksheets 215 Mastering databases 221 The concept of a database 222 Terminology commonly associated with a database 223 Creating a database 225 Manipulating data in a database 236 Programming 9 Problem-solving and program design 252 Outline steps in problem-solving 253 Using divide-and-conquer approach to decompose large everyday problems into smaller tasks 255 Defining a problem by decomposing it into its significant components 257 Distinguishing between variables and constants 265 The concept of an algorithm 267 Representing algorithms in the form of pseudocode and flowcharts 268 Testing algorithms for correctness 276 10 Program implementation 283 Distinguishing between low-level and high-level languages 284 The sequence of steps in implementing a program 285 Performing checks and tests on programs to verify correctness 291 Declaring variables and constants using basic data types 295 Translating algorithmic statements into high-level language syntax 296 Documenting programs effectively 322 11 The School-Based Assessment 327 Appendix A Specimen Paper 01 340 Appendix B Specimen Paper 02 346 Glossary 353 Index 358 iv 9781380023322_text.indd 4 31/10/2019 11:16 About this Book Unique, practical application-based approach The 3rd edition takes a unique approach Caribbean Travel Services (CTS) operates scheduled bus services which provides realand vehicle rentals in several towns across several countries in the life context for the Caribbean. In each town CTS has an office, a garage and a depot from which its vehicles operate. concepts and skills taught: At the heart of this approach are two companies: the fictional company, Caribbean Travel Services (CTS), and a second company created by the students themselves at the start of the course. Through examples and activities throughout the course, these companies are used to first show, and then to actively apply, the ways that a typical organisation uses Information Technology to help it with all aspects of the company’s operations. You can find out more about these in the introduction, which is an essential first lesson for this course. Welcome to Caribbean Travel Services. ACTIVITY 1.2 Selecting the correct type of computer Use the company you created in earlier activities or use St Luago Fashion. • As you read through the following section, consider whether the type of computer being described might be utilised in your company. • Justify your reasoning. • Record your findings in your notebook. The 3rd edition aligns directly to the 2017 CSEC® Information Technology syllabus: • Chapters are grouped into three main parts to mirror the three examination profiles: Theory (Chapters 1–4), Productivity Tools (Chapters 5–8) and Programming (Chapters 9–10). • Each Chapter corresponds to a section of the syllabus. • Learning objectives from the syllabus are listed at the beginning of every chapter and then clearly sign-posted within the chapter via the handy ‘objective’ icon heading – so you’ll always know where in the syllabus you’ve got to. Key web technology concepts Re-vamped Productivity and Programming sections Application and programming skills are taught and practised in a way that instills broadly transferable skills, ensuring students aren’t limited to using specific programs and languages. • In the Productivity Tools section, examples are demonstrated in Microsoft Office screenshots. v 9781380023322_text.indd 5 31/10/2019 11:16 Computer fundamentals About this book Major hardware components IPOS cycle storage Types of software periperal devices cloud storage input devices local storage ouut devices • In application software system software secondary storage Types of user interface operating systems system utilities Programming languages are demonstrated: Pascal, command line with which most teachers interface are familiar, and Python, an menu-driven interface industry-leading language graphical that will equipuser students with interface (GUI) the foundation needed to pursue programming careers in the 21st century. the software hardware section, interfaces two interfaces Pascal program PROGRAM service; VAR kms : REAL; BEGIN WRITELN ('A simple program to see if a vehicle service is required'); WRITELN ('Please give the kms covered since last service '); READ (kms); WRITELN (kms); IF (kms >=100000) THEN BEGIN WRITELN ('YES Service required'); END; WRITELN ('Press Enter to finish.'); READLN; END. Python program kmsCovered = 0 print ('A simple program to see if a vehicle service has to be performed.') kmsCovered = input('Please give the kms the vehicle has covered since last service ') if int(kmsCovered) >= 100000: print('YES vehicle need a service') Key features in every chapter Information processing Evaluating online data Choosing a file access method File organisation verification & validation file access methods how data is stored how files are stored methods of verification serial file access methods of validation sequential file access random file access direct file access ITQ 1.1 Name the THREE fields of study that have been merged to form the field of IT. Mobile devices ▶ Mobile devices are computing devices that are small enough to hold and operate in one’s hand and are easily portable. • Concept maps bring together all the different concepts in the chapter and show how they fit together – a great teaching tool for starting a new topic, or a handy revision aid later on. • The activities are central to the learning experience of this book. They encourage students to apply what they have learnt to their own situation, and to practise the skills needed to complete the SBA project. Some activities can be completed individually, but many involve working with classmates in a collaborative way. Look out for these icons to see which are which. • In-text questions (ITQs) check students’ understanding as they work through the text. If students can’t answer the ITQ, they should go back and reread the section. Answers are provided at the end of each chapter. • Key terms from the syllabus are flagged in the left-hand margin and defined clearly in the text on first use. These important terms are also listed in the glossary at the end of the book. • Smartphone users can use ‘Scan-Me codes’ to access online resources. A list of these URLs is also provided in the teacher’s resources if teachers want to show them on a computer. End of chapter resources At the end of each chapter you will find: • a summary of key content for that chapter to help you check your understanding • revision notes that include suggested answers to the ITQs • examination-style questions (multiple choice and structured) to check your learning and help practise your exam skills. vi 9781380023322_text.indd 6 31/10/2019 11:16 Introduction In the following pages we are going to cover all you need to know to achieve a great grade in your CSEC Information Technology examination. This introduction is an important place to start as it explains the book’s content and, most importantly of all, introduces you to a case study that you will be using throughout the course to help you understand and apply the information in the book. This is central to all the activities throughout the book, so pay attention! On completion of this course of study in IT, as well as getting a great examination result, you will have developed an understanding of important IT concepts and practical, hands-on IT skills. These are listed in the table below. Important IT knowledge Essential IT skills • Develop an understanding of the • Maintain safe and secure computing fundamental hardware and software environments components and the interrelationships • Develop computer-generated documents among them using a range of tools • Develop expertise in evaluating computer • Apply a structured approach to solving systems problems • Develop an understanding of basic • Translate algorithms into high-level information-processing principles and basic programs networking concepts, including mobile networks and Internet and web technology concepts The School Based Assessment (SBA) part of your examination requires you to apply the knowledge, skills and aptitudes you have learnt in a practical way. If you complete all the activities in this book, you will have all the skills you will need for a great SBA. We recommend that you start a notebook to record everything in one place. vii 9781380023322_text.indd 7 31/10/2019 11:16 Introduction What is Information Technology? Information Technology is the use of technology to process data into useful information. You will already be familiar with some of the technologies because you will have used or seen computers, smartphones, laptops, tablets and games consoles in action. ACTIVITY Introductory activity • Write down all the computers, smartphones, laptops, tablets and games consoles you have used or seen in the last week. Include devices that you have seen on TV or in films. • For each device in your list, record what it was being used for. • Review your list with the other members of the group to create a combined list. • Share this list with the class by displaying it on the class noticeboard. An example of Information Technology in action that you will be familiar with is in your school. Students’ attendance, and examination and test scores, will be stored on a computer and processed so that questions such as ‘Which students passed the test?’ and ‘What is the attendance record of a particular student?’ can be answered quickly and easily. The answers are incorporated in the student’s term report to be viewed by parents or guardians. This is what Information Technology is all about: technology that manages information to make solving problems, answering questions and displaying results quicker and easier. Information technology in the real world In this book we will be looking at how to use Information Technology to help Caribbean citizens operate more effectively. Whether the task is to process the payroll in a factory, advertise new products on the World Wide Web (WWW, a huge number of documents that can be accessed using the Internet) write letters to customers or keep supplier records up to date, Information Technology can help. Introducing our study example Throughout this book we are going to use an example Caribbean company to show you how a typical organisation uses Information Technology to help with all aspects of its operations. Whenever you learn about a new topic in the book, you will be shown how it can be applied in the real world, using this company as an example. Welcome to Caribbean Travel Services. Caribbean Travel Services (CTS) operates scheduled bus services and vehicle rentals in several towns across several countries in the Caribbean. In each town CTS has an office, a garage and a depot from which its vehicles operate. viii 9781380023322_text.indd 8 31/10/2019 11:16 1 • Computer Fundamentals Introduction Creating your own study example As well as seeing how the principles from the book can be applied to Caribbean Travel Services, you will be asked to apply them yourself, to your company. You are now going to get into groups and create that company. ACTIVITY Create a Caribbean company Working with a small group of classmates (groups of four to six), invent a Caribbean company and establish: • a name for the company • the main product area of the company. If you are short of ideas, think of a clothing retailer. Your company might specialise in selling shoes, outdoor clothing, wedding clothing or children’s clothing. Don’t forget, you’ll be using this company and working with your group all the way through the two years of your course, so make sure you are all happy with it. The syllabus in context Each of the chapters in this book relates to a section of the CXC syllabus. These sections cover really important aspects of Information Technology that will be relevant to almost any company, including the one you have created. Below is a summary of what each chapter is about. We are going to use these chapters to guide us through the development of your company and learn new skills on the way. Chapter 1 Computer fundamentals An understanding of the major types of computer systems and how they work will enable you to choose the correct technologies for your company. You will also need to consider what extra peripheral devices are required: a barcode reader or 3-D printer perhaps. What programs will you need to install on the company computers? You will certainly need a system to operate your computers, a word processor for documents, a spreadsheet to manage the finances and a database for storing all your records. You will also need to know how to fix any problems that may occur. We will cover all this in Chapter 1. Chapter 2 Information-processing Data and information are of central importance to almost all organisations. Your company will soon fail if you don’t know who your employees are, how they can be contacted or whether they have been paid or not. You will need to understand where any data comes from and how it will arrive. Will it be taken over the telephone (oral), written on a printed form, produced by another computer (a barcode for example), or directly captured by a sensor or measuring device (perhaps an anemometer, which is used to measure wind speed)? It is important to consider how reliable all this data and information is and how it can be checked to make sure it is correct. Finally you will need to know how the data will be stored and used inside the company’s Information Technology computer systems. As you work through Chapter 2 you will consider all this in relation to your company. ix 9781380023322_text.indd 9 31/10/2019 11:16 Introduction Chapter 3 Computer networks and web technologies An organisation of any size will have many computing devices. Company administration in head office will have computers that need to be connected to each other as well as to the sales offices. Travelling representatives, using mobile devices such as smartphones and laptops, also need to be connected to head office. As your company grows you need to understand the basics of computer networks and the different options (wired and wireless) for networking devices together. The Internet and World Wide Web are likely to be important to your new company so you will need to understand key web technology concepts, such as “hyperlink” and “web server”. We will lead you through the basics of computer networks in Chapter 3. Chapter 4 Social and economic impact of Information and Communication Technology As the world, and your company, become more connected, it becomes more important to understand the need for computer security and cybersecurity. Unfortunately, successful companies like yours can become the target of criminals. You need to consider the vulnerabilities, threats and potential attacks but most importantly the countermeasures that you can employ to eliminate or minimise these risks. You are not alone as there is a range of computer-related professionals you can call on to help you develop, maintain and secure your computer systems. In Chapter 4 we will introduce many of these professions and explain how they can help your company. Chapter 5 Mastering word processing A word processing program is a tool with which you can manipulate text. All companies rely heavily on documentation: letters to clients, brochures, reports, memos and user manuals to name a few. All your company documents need to be well presented and will probably include formatted text, images, tables and bullet points, and may include headers, footers, a table of contents and forms. Of course, all your documents need to be free of spelling and grammar errors and may need to be reviewed by others within the company. Finally we will show you how to do a bulk mail to your customers. Chapter 5 is a practical chapter, giving you a range of skills to create great-looking documents. Chapter 6 Mastering web page design Companies like yours need a presence on the WWW to advertise and attract customers. In order to do this you will need to understand the main concepts of web page design and develop the practical skills to create, evaluate and test a website. We cover this in Chapter 6. Chapter 7 Mastering spreadsheets A spreadsheet program is an automatic calculation tool. The finance department in your company will almost certainly be using a spreadsheet program to manage the finances. We will introduce you to the basic concepts of spreadsheets. You will gain the practical skills to sort, filter and even create charts from the data in a spreadsheet. In Chapter 7 you will gain the skills necessary to keep your company on a strong financial footing. x 9781380023322_text.indd 10 31/10/2019 11:16 Introduction Chapter 8 Mastering databases A database management system is a powerful tool for manipulating records of data. All organisations need to keep records and your company will be no exception. Staff records, stock records, sales or rental records and supplier records are just a few of the types of records your company may need to keep. A well-designed database management system can store all your records in a set of related tables and provide the tools to search, sort and view the data in meaningful ways. You will need to summarise the data in the database and generate professional-looking reports. Chapter 8 will give you the understanding to design and create a great database system. Chapter 9 Problem-solving and program design As your company grows, problems may arise for which general-purpose programs such as word processing, spreadsheets or database programs don’t offer a good solution. You will need to create your own special-purpose program. We will help you define the problem by decomposing it into its significant components, which can be easily solved. You will then propose and evaluate possible solutions before selecting the best. From this you will need to develop an algorithm, test it and validate the solution. In other words you will need to split the problem into small, easy-to-deal-with parts and then write the instructions to solve each part of the problem before testing and checking the whole solution. Don’t worry, in Chapter 9 we will lead you through this process step by step. Chapter 10 Program implementation Following on from Chapter 9 you need to take your program design and use it to develop a computer program that will run on the company’s computers. In order to do this you will need to understand the sequence of steps that must be followed to implement and run a program. We will lead you through translating your algorithm into a working computer program written in a high-level language. You will also need to test your new program and create a user manual document for it. Chapter 10 covers all the essentials for program implementation. ACTIVITY Creating departments for your company Working with your small group of classmates, build on the Caribbean company you established in the earlier activity. You already have a name and the main activity; now identify some of the departments your company might have and how they will support the company. These are some ideas to get you started: • The advertising department is responsible for activities such as the company website, bulk emails to customers and production of brochures. • The human resources department manages all aspects of employee wellbeing including recruitment, training, benefits and holiday entitlements. • The finance department manages the income and expenditure of the company. • The operations department is responsible for the day-to-day running of the business. Now your company is set up, we think you are ready to start. xi 9781380023322_text.indd 11 31/10/2019 11:16 12 1 • Computer Fundamentals Computer fundamentals To use Information Technology effectively and to choose the right technologies to meet your needs, you will need to understand what the major types of computer systems are and how they work. You will need to think about what peripheral devices are required, what software programs you will need, the type of system to operate your computer, a word processor for documents, a spreadsheet for accounting, a database for record keeping and perhaps a web browser and some games. Computer systems are the foundation on which Information Technology is based. A complete computer system is made up of many different components, including hardware and software, which work together. This chapter will help you understand the basics of hardware and software and how they relate to one another. On completion of this chapter, you should be able to evaluate various aspects of a computer system, the hardware, the system software and the applications software. You will then be able to select a suitable system to meet your needs. By the end of this chapter you should be able to: ✔✔ Explain the concept of Information Technology. ✔✔ Distinguish among the major types of computer systems in terms of processing speed, storage and portability. ✔✔ Explain the functions of the major hardware components of a computer system. ✔✔ Explain how the major hardware components of a computer system interrelate. ✔✔ Evaluate the relative merits of local storage and cloud storage. ✔✔ Select appropriate input/output devices to meet the needs of specified applications. ✔✔ Explain the role of the different types of software in computer operations. ✔✔ Discuss the relative merits of the various types of user interfaces. ✔✔ Evaluate the suitability of a given computer system for a specific purpose. ✔✔ Troubleshoot basic computer hardware problems. Computer fundamentals Types of computer system Major hardware components supercomputers IPOS cycle mainframes primary storage Types of software system software secondary storage peripheral devices mobile devices cloud storage input devices embedded devices local storage output devices desktop systems Central Processing Unit (CPU) Types of user interface application software hardware interfaces software interfaces operating systems command line interface system utilities menu-driven interface graphical user interface (GUI) 2 9781380023322_text.indd 2 31/10/2019 11:16 1 • Computer fundamentals The concept of Information Technology Information Technology (IT) ▶ ITQ 1.1 Name the THREE fields of study that have been merged to form the field of IT. Information Technology is made up of the technologies that are used to capture input data; it processes that data into useful information, displays the output information and stores it for future use. Information Technology (IT) can be described as ‘the use of computers, storage, communication and other physical devices to create, process and exchange all forms of electronic data’. IT merges the fields of Computer Science, Information and Communications Technology (ICT) and Office Automation. Information is the foundation of all Information Technology activities. IT involves the collection, processing, storage, retrieval and dissemination of information. Nowadays IT impacts many areas of life, including work and social activities. Let’s put this into context using Caribbean Travel Services (CTS), the example from the introduction (if you haven’t read this yet, go back and look at it now – it will be difficult to continue with the chapter otherwise). • information • problem solving processing • algorithms • productivity • program Computer Office tools design Science Automation • program • impact on job implementation skills and Information and careers Communications Technology • cyber • computer • computer security fundamentals • computer networks misuse • web technologies Figure 1.1 Information Technology merges Computer Science, Office Automation and ICT Information Technology (IT) merges the study of… • Computer Science – we have already established that Caribbean Travel Services is going to rely heavily on computer systems to operate efficiently • Information and Communications Technology (ICT) – CTS will certainly need to have great communications within the head office and to the remote offices, maintenance garages and vehicle depots • and Office Automation – CTS will need to automate many repetitive office operations such as payroll and recording bus journey data to maximise efficiency. 3 9781380023322_text.indd 3 31/10/2019 11:16 Theory ACTIVITY 1.1 Information Technology in a Caribbean company In small groups use the company you created in the introduction. If you haven’t read the introduction yet, go back and do so now – you will need to have created your company in order to carry out many of the activities in this book. Alternatively, you can use our pre-made company, St Luago Fashion, a retailer specialising in wedding fashions. Discuss how Information Technology applies to your company. You may wish to use the following key terms to stimulate your discussions: • Information and Communications Technology • office automation • the collection, processing, storage, retrieval and dissemination of information. Record your main findings in your notebook. Major types of computer systems Computer system ▶ We need to understand the different types of computer systems that are available to individuals and organisations, both big and small, so that we can choose the best type of computer system to use. Computer systems are tools and we want to select the best tool to get the job done. A computer system is a complete computer installation including hardware, software, users, procedures and data. But a computer system is just a tool, a tool to help us achieve our aims quickly, accurately and efficiently. DVD drive CD-ROM drive flat screen monitor power supply ITQ 1.2 State ONE important difference between a computer and a computer system. wireless mouse motherboard hard disk drive wireless keyboard USB ports Figure 1.2 A desktop computer system Computer ▶ ITQ 1.3 Watch this video about computers. What are the two types of personal computer? In its simplest form a computer is an electronic device capable of executing a set of instructions or a ‘program’. An electronic calculator is a simple computer, a tool that helps us solve mathematical problems quickly, accurately and efficiently. Computer systems may be classified into five major types: supercomputers, mainframes, desktop systems, mobile devices and embedded devices. We will now look at each type in detail. 4 9781380023322_text.indd 4 31/10/2019 11:16 1 • Computer fundamentals ACTIVITY 1.2 Selecting the correct type of computer Use the company you created in earlier activities or use St Luago Fashion. • As you read through the following section, consider whether the type of computer being described might be utilised in your company. • Justify your reasoning. • Record your findings in your notebook. Supercomputers ▶ ITQ 1.4 The tera prefix means add how many zeros to the number? Supercomputers Supercomputers are designed to carry out single, extremely complex computing tasks such as climate research, cryptanalysis (code breaking), physical simulations, oil and gas exploration and weather forecasting. They use the maximum computing power to solve a single large problem in the shortest amount of time. Speed is measured in FLOPS (floating point operations per second) but this is really only useful when comparing supercomputers. The top 10 supercomputers in 2019 had speeds ranging from 14,000 to 143,500 teraFLOPS. That is 143,500,000,000,000,000 instructions per second – and that is fast. You are very lucky if you ever get to see a supercomputer. They are extremely expensive systems that require secure and climate-controlled purpose-built buildings. As a consequence, supercomputers are usually found only in research environments and in very large specialist organisations. Supercomputers are critical for the Caribbean because the predictions of severe weather events made by the Caribbean Hurricane Network are only possible with the climate modelling performed on supercomputers. Figure 1.3 Supercomputer in a purposebuilt facility ITQ 1.5 Supercomputers are used in climate research and weather forecasting. Suggest reasons why the Caribbean national weather services rely on the US National Weather Service for long-range forecasts. ACTIVITY 1.3 Exploring supercomputers Conduct independent research online or from written sources to find out the role that supercomputers play in one or both of the following areas: • exploration for oil and gas • climate change modelling. a) Write brief notes documenting your findings. b) Create an information poster to share with the rest of the class. 5 9781380023322_text.indd 5 31/10/2019 11:16 Theory Mainframes Mainframe ▶ CPU ▶ Backing storage ▶ A mainframe is a large-scale, powerful computer with a large storage capacity and a fast Central Processing Unit (CPU). The CPU is the ‘brains’ of the computer, where the program instructions (calculations) are processed or carried out. It is also called the processor or microprocessor. Backing storage is the computer’s secondary storage: the hard disk drives and optical drives. Mainframe computers are usually computer systems used by large enterprises. Mainframes are designed, manufactured and supported by a few vendors, primarily IBM, Unisys and Fujitsu. They are known for their reliability and rarely require downtime for upgrades or repairs. If the system is brought down by a fault, it must be repaired quickly so normal service can resume. You will find mainframe computers supporting the operation of many large organisations. For example, a mainframe will be at the heart of an airline’s booking system. This will allow seats on any particular flight to be reserved, cancelled or changed by a customer. Contact details, payment record, meal preference option and other such information will also be associated with each booking. Figure 1.4 A mainframe computer system ITQ 1.6 What are the main differences between a supercomputer and a mainframe computer? Mainframes are used primarily for transaction processing, for example: • processing transactions related to logistics (parcel pickup and delivery, tracking, billing and maintaining customer records) • national and international payments and transactions (credit card transaction processing). It is highly likely that your next e-commerce transaction, such as an online purchase or topping up the credit on your smartphone, will be processed by a mainframe. Desktop systems Desktop system ▶ General-purpose computer ▶ A desktop system (or ‘desktop computer’) is a computer system small enough to fit on a desk, but also powerful enough for common business tasks and inexpensive enough for home ownership. A desktop computer system is an example of a general-purpose computer system, which is one that is suitable for undertaking a wide range of common computing tasks. Desktop systems are usually installed in homes, offices, computer labs in schools and Internet cafes. These systems, also called ‘desktops’, are commonly used in small and medium-sized organisations. They are typically offered for sale at a range 6 9781380023322_text.indd 6 31/10/2019 11:16 1 • Computer fundamentals ITQ 1.7 Watch this video that describes the basic parts of a desktop computer. Name the four essential parts of a desktop computer. of prices reflecting the processing speed, memory and storage capacity installed on them. Desktop systems come in different sizes and shapes that make them more or less easy to place on or under a desk. Figure 1.5 (a) An all-in-one desktop computer Figure 1.5 (b) A typical desktop computer system Size/shape Description Advantages Slim/small Miniature systems usually the size of a shoe box Easily accommodated on a busy desk All-in-one systems System units integrated into the visual display Everything in one unit so is easy to position on a desk Towers Vertical-style, usually floor-mounted, system units Large and can be placed tidily under the desk with a separate visual display Desktop Horizontal-style, usually desk-mounted, system units with a separate visual display Placed on the desk with the monitor on top to save space Table 1.1 Desktop systems and their advantages Mobile devices Mobile devices ▶ ITQ 1.8 Put the following into ascending physical size order: • laptop • smartphone • netbook • tablet. Mobile devices are computing devices that are small enough to hold and operate in one’s hand and are easily portable. This grouping is dynamic and ever expanding, thanks to the consumer’s desire to be able to work on the move. Each year new types of device enter the category. For example, years ago laptops and netbooks were very common. However, in 2010 the first-generation iPad was unveiled, a tablet computer designed and marketed by Apple Inc. Nowadays, the tablet computer category is quite extensive and includes a wide range of device sizes. In more recent times, mobile devices such as smartphones have become commonplace and the latest smartphones have folding screens. Although these devices are small in size they include powerful processors and a lot of memory and storage capacity. The higher-specification smartphones are as powerful as lower-specification desktops. Some categories of mobile device include: • laptops and notebooks • ultra-portables, for example netbooks and Chromebooks Figure 1.6 (a) tablet computer, (b) smartphone (a) (b) 7 9781380023322_text.indd 7 31/10/2019 11:16 Theory • tablets and eReaders, for example Apple iPad and Amazon Kindle • smartphones and phablets (phone tablets), for example Samsung Note • games consoles, for example Nintendo Switch. ACTIVITY 1.4 Recording mobile devices Recall all the examples of mobile devices that you have seen in the last week. • In your notebook, name each mobile device. • For each record, write down what you think the device was being used for. • Create a table with column headings ‘Device’ and ‘Used For’ to record your results and share with the rest of the class on the class noticeboard. Embedded devices Special-purpose computer ▶ Embedded device ▶ (a) (b) Figure 1.7 Embedded systems: (a) automobile system (b) electronic security system A special-purpose computer is a computer system which performs a small range of tasks and contains features uniquely designed for use in a particular industry or application. An embedded device is a special-purpose computer that carries out a specific (and dedicated) function within a larger electrical or mechanical system or a combination of both. Common examples of embedded devices include DVD players and video game consoles. Embedded systems include all the elements of a computer system – a processor, memory and storage – but on a very small and simple level. Common embedded systems include: electronic calculator, handheld games controller, home assistants, touchscreen controller and GPS satellite navigation systems. Embedded systems help control thousands of devices in common use today. Approximately 98 percent of all microprocessors are manufactured as components of embedded systems. Table 1.2 shows common devices and the functions of their embedded systems. Device/system Embedded system Smart microwave oven Wi-Fi connection module allowing the oven to be controlled from a smartphone or home assistant. Moisture sensor controller to prevent the food drying out. Automated teller machines Anti-skimming defence systems to prevent the fraudulent copying of data from a customer’s automated teller machine (ATM) card. Cash dispenser controlling the sensors and activators that count, check and dispense cash. Automobiles Sensor controller that controls rain-sensing wipers, tyre-pressure monitors, and airbag deployment (in the event of a collision). Data-acquisition module: control system for automatic parking. Electronic security systems Motion sensor controller to manage glass-break sensors and vibration sensors. GPS transmitter/receiver: auto-dialler (to dial the saved number for the monitoring and control centre in the event of an issue). Home automation Wireless local area network (LAN) controller: turn lights on/off based on remote signals sent over a network or based on data downloaded from the Internet. Motion sensor controller that activates a video recording device the moment a person enters a room. Table 1.2 Everyday devices and examples of the embedded systems they contain 8 9781380023322_text.indd 8 31/10/2019 11:16 1 • Computer fundamentals ITQ 1.9 Smart air-conditioning systems and ATMs are electromechanical systems typically found in everyday use. a) Name ONE other electromechanical system that may be found in both a school cafeteria and a school’s administrative office. b) State the functions of TWO embedded devices that EACH of these systems might contain. With the five main types of computer system in mind (supercomputers, mainframes, desktops, mobile devices and embedded devices), it is time to consider what types of systems Caribbean Travel Services will need. • Supercomputers are too expensive, too powerful and require purpose-built buildings. • Mainframes are too expensive at the moment but may be needed as the company continues to expand. • At head office CTS will need a powerful desktop computer to run the main administration functions of the company. • The finance department will need a desktop for their tasks involving: payroll, customer accounts, supplier accounts, tax processing and individual vehicle accounts. • The human resources department will need a desktop for their tasks involving: employee records and maintaining the company’s health and safety procedures. • Each of the remote offices, maintenance garages and vehicle depots will need desktops or laptops for their tasks involving: service schedules and recording journey data. • Company representatives such as bus supervisors need mobile devices because the supervisors will be travelling on the buses, checking punctuality against the timetable and recording passenger numbers and user satisfaction; these devices could be laptops, smartphones or tablets. • Embedded devices are used at the garages and depots for security and safety with CCTV (closed-circuit television) cameras, containing embedded systems connecting to the company’s network. ACTIVITY 1.5 Select a computer system for your company Use the company you created in earlier activities or use St Luago Fashion. • Review the activities your company will perform. • Identify the best type of computer system to fulfil these activities. • Record your results in the form of a summary document for the Board of Directors of your company. • Share your report on the classroom noticeboard. 9 9781380023322_text.indd 9 31/10/2019 11:16 Theory The major hardware components of a computer system Hardware ▶ We need to understand the major hardware components that make up a computer system so that we can select compatible components. We need to appreciate the purpose and limitations of particular components so we can easily resolve faults and hardware failures when they occur. Remember – computer systems are tools and we want to use the best tool to get the job done. A computer system includes hardware, software, users, procedures and data. In this section we focus on the hardware. The term hardware component (or simply ‘hardware’) refers to the physical parts of the computer system. Hardware is comprised of core components (such as the processor, memory and storage) and peripherals (such as input/output devices). All computer systems need hardware to carry out the following four main processes: • accepting input • processing that input • producing output information • storing data and/or information for later retrieval and use. The hardware that carries out each of the main processes is given in Table 1.3. The main hardware components and their descriptions and functions are shown in Table 1.4. Process Description Hardware component Input The act of accepting data from the outside world Input devices, examples are keyboard and sensors Processing The act of transforming data into Microprocessor information that will be useful to the user Output The act of presenting information to the user Storage The act of holding data, program Storage devices, examples are hard instructions and information for later use disk drive and USB flash drive Output devices, examples are visual display unit and speakers Table 1.3 Processes carried out by a computer system Figure 1.8 Hardware components: (a) input (b) processing (c) output and (d) storage (a) (b) main keyboard function keys cursor keys numeric keypad (c) (d) 10 9781380023322_text.indd 10 31/10/2019 11:16 1 • Computer fundamentals Component Description Function(s) Central Processing Unit (CPU) or processor The processor is the brains of the computer and comprises a control unit (CU) and an arithmetic logic unit (ALU). Technically, a CPU may contain one or more microprocessors (also called cores) on the same chip. For example, a quad-core processor is a chip with four independent cores that read and execute instructions. 1 Fetches program instructions stored in memory. 2 Executes instructions by performing • arithmetic operations (for example, add, subtract) and • logic operations (for example, carry out a particular action if a condition is met). Primary storage (also Memory is usually slotted into the main board known as ‘memory’) (motherboard) of a computer. Variants include Read Only Memory (ROM) and Random Access Memory (RAM). While both store data, ROM stores data (encoded during its manufacture) permanently whereas RAM stores data temporarily, only while the computer system is switched on. ROM Stores start-up instructions for a computer; these instructions are used to start up (boot) the computer when the power button is switched on. RAM 1 Stores program instructions that are awaiting execution. 2 Stores data ready to be processed by the CPU. 3 Stores data that is being transferred in/out of input and output devices (I/O devices). Secondary storage Secondary storage connects to a computer’s motherboard internally or externally. It is used to store software and user files (text, audio, images, video, etc.). 1 Stores data and programs. 2 Holds files permanently (from when they are saved until they are erased or re-written). Input/output devices Input/output devices accept input from the user and give output to the user of a computer system. Input: 1 Accepts digital data via devices such as keyboards and barcode readers. 2 Accepts analogue data from devices such as microphones and sensors. Output: 1 Presents visual output to a user via devices such as monitors and printers. 2 Presents audible output to a user via devices such as headsets and speakers. Table 1.4 Major components of computer systems: descriptions and functions ACTIVITY 1.6 Look at one of the school computers and identify the main components. Complete the following table: Process Hardware components Input • Mouse • • • Processing Microprocessor Output • Speakers • • • Storage • CD/DVD-RW drive • • • 11 9781380023322_text.indd 11 31/10/2019 11:16 Theory Figure 1.9 shows a Raspberry Pi computer and the main components inside the computer box, which you can’t usually see. The Raspberry Pi is a basic, inexpensive, educational computer that is delivered as shown so you can see the various components. (a) USB ports (b) CPU (d) Network connection (e) Audio output (c) HDMI port Figure 1.9 A Raspberry Pi computer showing (a) 4 USB ports for keyboard and mouse, (b) central processing unit, (c) HDMI port for connecting a monitor, (d) network port, (e) audio output for connecting a speaker Port ▶ ITQ 1.10 Name any TWO devices that may connect to a computer system using a USB cable. A port is a physical docking point by which an external device can be connected to a computer or other electronic device. An external device may be connected to a port using a cable. A USB (Universal Serial Bus) port is a common type of port; a USB cable is one of the more widely used cables. It may be used to connect a wide range of input, output and storage devices to a computer. PROCESSOR CONTROL UNIT ARITHMETIC LOGIC UNIT (ALU) instructions data information ITQ 1.11 What is the main difference between primary and secondary storage? INPUT DEVICES MEMORY data information OUTPUT DEVICES instructions data information STORAGE DEVICES Figure 1.10 Diagram showing the interrelationship of major hardware components of a computer system and how data/information passes through the system 12 9781380023322_text.indd 12 31/10/2019 11:16 1 • Computer fundamentals Secondary storage devices Whether as an individual user, a business, or an enterprise spanning the globe, computer users all have a need to store their files. Consider the following scenarios: • A student needs to transfer a file from one device to another without using any network services. • A business lost its computer system in a fire but was able to resume operating normally because it had the data stored elsewhere. • A large commercial bank requires a solution that allows it to keep digital copies of all transactions, offline (not connected to the computer system), for at least seven years. Secondary storage device ▶ All the scenarios listed use external secondary storage devices. A secondary storage device retains data permanently, even when the device is disconnected or the computer system is turned off. The options we will explore are hard disk drives, magnetic tape, flash memory (USB drives and memory cards) and optical discs (CD, DVD and Blu-Ray). The data storage needs of individuals and organisations can be met by a range of local devices. These devices are usually pre-installed in computer systems (as an internal drive); however, a user may choose to add devices via available ports such as USB or Firewire (as an external drive). A backup is simply a copy of important files that can be used if the original files are lost. A good backup system means that an organisation can quickly resume operation after a disaster like a fire destroys its computer systems. Users may choose from a range of storage technologies such as magnetic, optical and compact flash memory. These are discussed on the following pages. Figure 1.11 External hard disk drives usually have large storage capacities and often come equipped with software that can automate backup procedures Storage devices that use magnetic technology Figure 1.12 (a) Internal view of a hard disk drive showing the read/write heads attached to a moveable arm, (b) Magnetic tape cassette (a) (b) 13 9781380023322_text.indd 13 31/10/2019 11:17 Theory Device Description Usage Hard disk drive • A system of ceramic disks coated with a magnetic Used for a range of data storage solutions when attached to laptops, desktops and other computing devices. Widely used because of their speed in reading and writing. Uses include: • storage of operating systems, applications and user data • storage of media files (photographic images, music and video). material that can store data permanently. • A set of read/write heads attached to a moveable arm is used to transfer data to/from the disk. • Available in wide range of capacities, data transfer speeds, and as internal and externally connected devices. Magnetic tape • A long and narrow strip of plastic with a thin coating of magnetic material, rolled onto a reel and usually encased in a plastic housing. • Provided as a single-reel removable tape storage solution and read from/written to using a tape drive equipped with a read/record head. • Latest generation of tape technology offers tens of terabytes (TB) of capacity. Used for a range of computer data storage solutions where cost per gigabyte (GB) is more important than speed and requires that: • the data can be stored for long periods of time • the device and the media are separate so the media can be stored in a safe place. Magnetic tape is ideal for: • backup and recovery: organisations maintain backup copies of their files in a secure storage space (usually waterproof and fireproof) to ensure that their operations can resume after a disaster has occurred. In the event of data loss that could be due to a mistake or malicious intent, the data may be restored from the backup. Table 1.5 Storage devices that use magnetic technology ITQ 1.12 What magnetic storage device would be suitable if speed was considered more important than cost? ACTIVITY 1.7 Collecting storage media • Collect old storage media, for example: floppy diskette, music/data cassette tape and CD. • Create labels for the items you have collected. • Assemble the items in a display for the rest of the class. Storage devices that use flash memory Flash memory ▶ ITQ 1.13 What flash memory device is most suitable for digital cameras? Flash memory is a small electronic device that maintains stored data without any external power source. Flash memory is used in storage devices such as memory sticks (also known USB drives), solid state disk (SSD) drives and memory cards. It is called flash memory because sections of the memory can be erased and written in a flash. In recent years, flash memory devices have become very popular for storing data. They are removeable and they store data even when the power is removed. Their high capacity, reasonable data transfer rate, low cost, durability and extremely high portability are reasons for their popularity. 14 9781380023322_text.indd 14 31/10/2019 11:17 1 • Computer fundamentals Device Description Usage Memory card • Small, postage stamp-sized device that is inserted into Provides adequate speed data access required by: • digital cameras • smartphones • tablets • vehicle recorders and spy cameras • action cameras (such as the GoPro range) • Available as internal and external drives for day-to- Used as internal storage drive of choice in devices such as: • ultra-portable laptops • small form factor desktop computers Provides the external data storage required by professionals such as: • graphic artists • film editors • photographers • Available in a wide range of capacities suitable for • File storage for individuals in their personal and memory card slots that are built into a wide range of devices; data is read from and written to the cards • Available in different physical sizes; the larger one is known as an ‘SD card’ (secure digital card) but smaller miniSD and microSD cards are available • Capacities range from tens of GB to hundreds of GB Solid state drive (SSD) day storage needs • Available in a range of size formats that makes them suitable for use in many different types of mobile devices • Capacities range from tens of GB to tens of TB USB flash drive many different application areas • Capacities range from tens of GB to hundreds of GB professional lives • File sharing during face-to-face meetings • Distribution of educational, technical and promotional materials • File storage required by home entertainment systems Table 1.6 Storage devices that use flash memory Storage devices that use optical technology The first commercial compact disc (CD) was produced on August 17, 1982. For the next 20+ years, the CD was a popular choice for storage. For example, the Windows 95 operating system was distributed on a single CD. CD drives utilise a fine laser light to read a disc because the light either reflects from the mirrored surface of the disc or does not. When writing a disc, the laser light is used to burn the surface of the disc, or not burn, depending whether a 0 or 1 is being written. Media/Device Description CD-ROM/RW • Digital optical disc storage format invented and (ROM: read only) developed in 1982. (RW: read and write) • Has capacity of approximately 700 megabytes (CDs). • Read using a CD drive. • Different types of CDs include CD-R (a recordable disc that is sold blank and may have data written to it once) and a CD-RW (a re-writable disc that is sold blank and may have data written, erased and re-written many times). DVD-ROM/RW • Digital optical disc storage format invented and developed in 1995. • Has capacity of 4.7GB. • Read using a DVD drive, which may be a standalone device or integrated in other systems such as desktop computers, entertainment systems and automobiles. • Different types of DVD include DVD-R and DVD-RW. Blu-Ray Disc • Digital optical disc storage format invented and developed in 2006. • Has capacity of 25GB (single-layer); 50GB (dual-layer). • Read using a Blu-Ray drive. Usage • Backup • Data storage • Distribution of ‘off-the-shelf’ products such as games, software and music. Can store any kind of digital data. Widely used for: • users’ data files • video programs for playback on a DVD drive • sale of ‘off-the-shelf’ products such as computer games and software. Can store any kind of digital video. Widely used for: • high-definition (HD) resolution video • ultra-high-definition resolution video (4K video). Table 1.7 Secondary storage devices that store data using optical technology 15 9781380023322_text.indd 15 31/10/2019 11:17 Theory ITQ 1.14 Name the optical disc MOST suitable for storing two 60-minute videos of 600MB each originally recorded using a smartphone. Note: Most optical drives on sale are combo drives. This means they work with CDs, DVDs and Blu-Ray discs. While DVDs and CDs are no longer widely used for the commercial distribution of software, they are still used extensively in some Caribbean countries for informal commercial activities. ACTIVITY 1.8 Selecting a storage device Milanne is shopping for a storage device capable of holding her collection of photos (40.5GB), music (7,332MB) and videos (0.5TB). She is cost-conscious, and has identified three possible devices: an external solid state drive (250GB, US$120), an external hard disk drive (2TB, US$80) and a USB flash drive (32GB, US$15). Milanne requires your help to determine which device is best for her needs. • Assuming an additional 10% of storage, what is the total capacity (in gigabytes and terabytes) that Milanne needs? • Conduct research to determine what the comparative price per megabyte for each device is. • Suggest, with reasons, which device Milanne should purchase. • Compute how much free space she is likely to have (in gigabytes) remaining after storing all her files. • Sketch a pie chart showing the free space and the space used for photos, music and videos. Units of storage Bit ▶ Byte ▶ ITQ 1.15 How many bytes of data are required to store the word ‘TECHNOLOGY’? ITQ 1.16 Determine the unit of storage that is approximately equal to each of the following: a) 1,000,000 megabytes b) one-thousandth of a terabyte. Data is stored and transferred from one hardware component to another as digital data using the values ‘0’ and ‘1’. Each of these values is known as a binary digit (or a ‘bit’). A bit is a binary digit, taking a value of either 0 or 1. Data transfer and storage take place in groups of bits referred to as bytes. A byte is a collection of eight bits that is referenced as a single unit. One byte of data is required to store a single character such as A, x or $. With large volumes of data being created, transmitted and stored by users, there is a need for storage, units that are multiples of the byte. Table 1.8, showing the more common units of storage, is provided for easy reference. Name Symbol Number of bytes In base 2 Approximate Exact Bit b N/A N/A N/A Byte B 2 N/A 1 Kilobyte KB 210 1 thousand 1,024 Megabyte MB 2 20 1 million 1,048,576 Gigabyte GB 230 1 billion 1,073,741,824 Terabyte TB 2 1 trillion 1,099,511,627,776 Petabyte PB 250 1 quadrillion 1,125,899,906,842,624 0 40 Table 1.8 Common units of storage 16 9781380023322_text.indd 16 31/10/2019 11:17 1 • Computer fundamentals The terabyte (TB) is already widely used as a unit of storage for non-enterprise users (students, home users and small business operators). Most new desktop computers sell with at least 1TB of storage. For enterprise users there are high-capacity, highperformance storage devices but these are very expensive. ACTIVITY 1.9 Converting storage units Copy and complete the following table that shows the equivalence among various quantities. Bytes Kilobytes Megabytes 10 0.01 3000 Gigabytes 0.000003 8000 The interrelationship of the major hardware components of a computer system We need to understand the interrelationship of the major hardware components because this is when the magic happens. Think of all the parts of a bicycle. They don’t make much sense or anything useful until you put them all together, hopefully in the right order. It’s the same with computer components; we need to understand how all the components come together. Having discussed the hardware that makes up a computer, it’s time to see how these major hardware components come together to make a functioning computer. The Input, Process, Output, Storage cycle At the heart of every functioning computer system is the idea of: input some data process that data into useful information output the resulting information in a way useful to humans store the information for future use. The IPOS cycle ▶ The IPOS cycle is the Input, Process, Output, Store cycle. Figure 1.13 The IPOS cycle showing how data is input, processed, output and stored output input processing storage 17 9781380023322_text.indd 17 31/10/2019 11:17 Theory Caribbean Travel Services uses the IPOS cycle in producing payroll. 1 Take some input data Each employee’s ID number and the number of hours they have worked in the last week will need to be entered into a computer. This is the input data and it will probably be entered using a keyboard as an input device. 2 Process that data into useful The computer needs to execute a sequence of instructions to take the input information data and calculate the pay earned and the tax payable by each employee. 3 Output the resulting information in a way useful to humans The output of the resulting useful information – the payslip and tax notification – will be printed out in a human-readable form. 4 Store the information for future use The results of the processing will also need to be stored on the computer’s storage system for future reuse. At the end of the year CTS will have to produce annual pay totals and annual tax returns. ACTIVITY 1.10 The Input, Process, Output, Storage for your company Use the company you created in earlier activities or use St Luago Fashion. • Review one of the activities your company will perform. • Create a poster to show the IPOS cycle for this activity. Data ▶ Information ▶ Processing ▶ Program ▶ ITQ 1.17 Write down the calculation needed to work out how old you are in years. Some definitions will help here. Data is raw, unprocessed facts. This may be facts about persons, places, things or events that have been collected through observation or measurement. Information is useful, meaningful knowledge created from raw data. Data that has been processed, related to other data, organised or put into context so that it is meaningful to the user/recipient may be regarded as information. Data and information can occur in many forms but words, numbers, graphics and sound are common. Processing is performing a series of instructions in order to convert data into useful information. In Information Technology the series of instructions is called a ‘program’. A program is a sequence of instructions that a computer can interpret or execute. An application is just a program that interacts with the user. All the programs you use are applications. A further detailed example will help you understand the IPOS cycle. You can use an example IPOS cycle to solve the problem: What is your age this year (in round numbers)? The answer is simple: the current year minus the year you were born. Input: Processing: Output: Store: get the current year and the year of birth, the input data. age = current year − year of birth. display age, output the meaningful information. write age to a file for future use. Chapters 9 and 10 look at program design and implementation in much more detail. 18 9781380023322_text.indd 18 31/10/2019 11:17 1 • Computer fundamentals Evaluating the relative merits of cloud storage and local storage Cloud storage ▶ Local storage ▶ ITQ 1.18 Give ONE difference between cloud storage and local storage. Earlier in this section we covered local storage, including hard disk drives, flash drives and DVD-RW drives, in some detail. It is now time to consider cloud and local storage. Cloud storage is a model in which data is stored on remote servers and can be accessed only via the Internet or cloud. Cloud storage is still hardware, usually hard disk drives. The difference between local storage and cloud storage is that local storage is physically connected to your computer system. Local storage is any physical storage device directly connected, internally or externally, to the computer system hardware. Cloud storage can be anywhere in the world and is indirectly connected to the computer hardware via a computer network, usually the Internet. Cloud storage services allow users to edit, save, synchronise, collaborate and share data via an Internet connection. Some popular applications such as Dropbox, Google Apps and Office 365 make extensive use of cloud storage. Cloud storage is deemed to be quite secure, provided users set up their accounts correctly and take the necessary precautions with their access credentials (username, password, and any other tokens/pass codes that may be provided). ITQ 1.19 Watch this video that introduces the cloud. Give one benefit of using the cloud. Figure 1.14 Devices linking to files stored in the cloud Evaluation criteria for choosing storage solutions Computer users have a wide range of options when considering their storage needs. The storage needs of individuals usually differ from those of businesses. In this section, we will evaluate the relative merits of cloud and local storage. Some of the local storage devices and cloud storage services that are popular are listed in Table 1.9. Local storage devices Cloud storage services • Flash memory (USB drives, memory cards • Dropbox • Google Drive • iCloud • Microsoft OneDrive and solid state drives) • Hard disk drives (internal and external) • Optical disks (CD, DVD and Blu-Ray) Table 1.9 Popular local storage devices and cloud storage services 19 9781380023322_text.indd 19 31/10/2019 11:17 Theory Accessibility Capacity • For local storage the user needs physical access to the computer to which the storage is attached. • Cloud storage can be accessed from any Internet-based computer device. • Local storage capacity is determined by the decision made at the time of purchase, additional storage can always be added if needed. • Cloud storage capacity is much more flexible as users rent as much as they need. Security (a) Security of the hardware (b) Security of your data Cost There are two aspects to security: • Security is your responsibility with local storage – you need to ensure that some form of backup is in place if a storage device should fail. • Security is the responsibility of the cloud storage supplier. For many small organisations this is the main advantage of cloud storage. • Local storage can be made very secure against an unauthorised person maliciously accessing your data. • Cloud storage data is encrypted before being sent over the Internet. However, there is a greater chance of unauthorised access when using cloud storage. • Local storage has an initial purchase cost but there are no ongoing charges. • Cloud storage suppliers usually charge a monthly fee per 100GB of storage. Table 1.10 Evaluation criteria for choosing storage solutions ITQ 1.20 Give ONE disadvantage of using a local data storage solution. ACTIVITY 1.11 Selecting and using secondary storage Outline in your notebook the advantages of using: • cloud storage compared to local storage • local storage compared to cloud storage. Discuss your findings with the class. Selecting appropriate input and output devices Input devices Input ▶ Input device ▶ Peripheral ▶ Earlier in this chapter you learnt that computer systems must accept input. A computer system depends on input devices to collect data from sources external to the computer and output devices to display the information after processing. Before we explain the uses of various input devices we need to define key terms: Input is data entered into the computer via some form of input device such as keyboard, mouse, microphone or scanner. An input device is any specialised hardware peripheral component that allows the entry of data and instructions into a computer. A peripheral is any hardware device connected to and controlled by the central processing unit. Table 1.11 presents a list of the devices that we will explore on the pages that follow. 20 9781380023322_text.indd 20 31/10/2019 11:17 1 • Computer fundamentals Devices that sense light Devices that sense sound Devices that sense pressure and touch • barcode reader • biometric systems (for example, automated • sound capture devices • graphic pads and tablets • keyboard • mouse • pointing devices (joystick and touchpad) • sensor (pressure) • touchscreens (including points of sale and ATMs) MIDI Musical Instrument Digital Interface ATM Automatic Teller Machine fingerprint identification system) • character readers (OCR and MICR) • digital cameras and webcams • document scanner • light pen • optical mark reader (OMR) • remote controls • sensor (light) OCR Optical Character Recognition MICR Magnetic Ink Character Recognition OMR Optical Mark Recognition • microphone (sound capture) • MIDI • voice response unit Table 1.11 List of input devices that ‘see’, ‘hear’ or sense pressure We will now explore a range of input devices, their functions and their applications in everyday life. Having read this section and completed the activities, you should be able to select the most appropriate device to meet your needs. Input devices that sense light Like some living organisms, computer systems are equipped with devices that allow them to sense input using ‘eyes’. In this regard, we may consider these devices as receiving inputs using the sense of sight. Figure 1.15 Barcode being used for parcel delivery Figure 1.16 Light pen and CRT monitor 21 9781380023322_text.indd 21 31/10/2019 11:17 Theory Device Function Suitable for Barcode reader Automated data capture by reading and recognising black and white lines of varying widths. • airline industry to identify and track passengers and baggage • healthcare industry to identify and track patients, drugs and equipment • package delivery (by global carriers such as DHL, FedEx and UPS) Camera (including digital camera and webcam) Captures digital images and video. • photography and videography • video messaging (for example, using apps such as FaceTime, WhatsApp, Skype) Document scanner (most often integrated with OCR) Captures digital images input as text, diagrams and pictures. Optical character recognition (OCR) Automated data capture by reading and recognising shape of each character. • book scanning • document management and classification • eBook creation from printed book • form processing (automate data entry from hand-filled applications, surveys, forms and other paper documents) A camera that takes an image of the fingerprint. The captured image is compared to a known image of authorised users and the results used to grant/deny access. • access control (on mobile devices such as Senses the position of marks made on a hard copy and converts them into meaningful data. • leisure (selection of numbers on a lottery form) • education (selecting an answer to a multiple Light pen Used like a pen to draw. Light pens work with the light from old-style cathode ray tube (CRT) monitors. • capturing handwriting directly • high-precision data input by artists and graphic Light sensor Measures physical characteristics such as movement or light. • greenhouse farming • automated manufacturing • intrusion detection systems (security systems) Fingerprint reader (as an example of a biometric system) laptops, smartphones and point-of-sale systems) • access control (to secure areas in industrial facilities) • border control screening (at ports of entry such as airports) Optical mark reader (OMR) choice question) designers Table 1.12 Input devices that sense light: functions and applications ITQ 1.21 Suggest ONE way in which a Language Arts teacher could use a scanner in each of the following contexts: a) to prepare for a lesson b) after a lesson. Input devices that work with sound Computer systems are usually equipped with a microphone as well as ports (such as the USB port) that allow sound and musical devices to be attached. These (microphone and musical devices) allow the computer system to sense input using ‘ears’. In this regard, we may consider these devices as receiving inputs using the sense of hearing. 22 9781380023322_text.indd 22 31/10/2019 11:17 1 • Computer fundamentals Device Function Uses Microphone Accepts and converts the mechanical energy of sound waves into an electric signal which can be converted to a digital signal suitable for computers. • virtual assistant device control • assistive technology (for example, text-to-speech Musical instrument digital interface Used for recording and playing back music on digital synthesisers, supported by sound cards installed in computer systems. software) • speech recognition • recording and playing music created by musical instruments and synthesisers connected to a computer Table 1.13 Input devices that work with sound: functions and applications Input devices that work with the sense of touch Computer systems may be equipped with devices that respond to the sense of touch including clicks on a joystick or mouse, key presses on a keyboard, pressing on a touchscreen, and writing/drawing on a graphic pad or tablet. Figure 1.17 Stylus and graphics pad Device Function Uses Graphic pad and tablet Uses a special pen (called a stylus) to provide a more natural way of writing and drawing Joystick Moves a pointer on a screen according to the movement of the lever by the user • architecture and industrial design • digital media creation (including design and illustration) • signature capture • assistive technology: pointing device for people who may find it easier to Keyboard Facilitates entry of letters, numbers or symbols (characters), or simultaneous key presses to produce actions or execute computer commands Mouse Moves a cursor on the screen in a graphic interface environment, and manipulates screen objects/elements (by hovering, clicking, scrolling and dragging) Touch sensor Measures physical characteristics such as pressure Touchscreen control than alternatives • computer video games • computer systems control (simultaneous key presses can produce actions or execute computer commands) • office applications that require the text entry of letters, numbers or symbols • computer navigation and control • computer gaming • office applications that require selection and moving block functions • greenhouse farming • package logistics • automated manufacturing • security systems Computer-pointing technology based upon • ATMs the sense of touch • self-service kiosks (in airports, photo labs, phone credit vending machines) • tablets (such as the Apple iPad and Samsung Galaxy) Table 1.14 Input devices that use a sense of touch: functions and applications 23 9781380023322_text.indd 23 31/10/2019 11:17 Theory (a) (c) (d) Figure 1.18 From left to right, (a) a mini travel mouse with retractable USB cord, (b) a wireless mouse on a graphics pad, (c) a cordless optical mouse, and (d) a joystick (b) ITQ 1.22 Why might you choose a joystick instead of a mouse? ACTIVITY 1.12 Finding input devices • For the next week record all the different types of input devices you come across. This can include devices you see on TV, in films or in books and magazines. • Share your results with the class, and add to your list any devices others spotted but you didn’t. That concludes input devices so now it is time to consider output devices. Output devices Information produced by a computer must be presented in a useful form to be of value to the user. We will discuss two types of output, categorised as: • visual devices in the form of monitors, printers (including 3D printers), plotters and microfilm • audio devices in the form of speakers, headphones and earphones. Output ▶ Output device ▶ Hard copy ▶ Soft copy ▶ Output is the displaying, playing, printing or storing of the information a computer generates as a result of its processing. An output device is any device that displays, plays or prints the results of processing operations or status messages related to that processing. Computer output may be printed on paper/plastic, displayed on a monitor/screen, stored on a secondary storage medium, or presented as audible or video output. Hard copy is permanent printed output from the computer. Soft copy is a temporary form of output, as produced by a visual display unit or audio output device. 24 9781380023322_text.indd 24 31/10/2019 11:17 1 • Computer fundamentals Output devices that produce printed output While all printers produce hard copy, they differ in the mechanisms used to produce it. All printers create output in monochrome, colour, or, in the case of a 3D printer, solid object. Different types of printer include dot matrix, inkjet, laser, 3D and thermal printers, and plotters. When comparing printers and plotters it is useful to consider: resolution, print speed, memory capacity and paper tray capacity. ITQ 1.23 Feature Description Does a printer produce soft copy or hard copy? Resolution The sharpness of printed images and text depends on the printer’s resolution. Printer resolution is measured by the number of dots printed per inch (DPI). Print speed Measured in pages per minute (ppm), lines per minute (lpm) or characters per second (cps). Memory The amount of primary storage the device has in order to process print jobs or to queue jobs as they are sent from the computing device. Paper tray capacity Sheet-feed printers are equipped with at least one tray that may hold tens to hundreds of sheets of paper. Some printers let you add paper trays to extend the number of pages that you can print without stopping to add more paper. Table 1.15 Description of printer features (including plotters but excluding 3D printers) Figure 1.19 Inkjet printer Figure 1.20 Laser printer ITQ 1.24 Suggest the most appropriate printer to keep costs down in a busy office. In order to select the ‘right’ printers to meet the needs of an organisation we should understand how printers produce their output as well as the key features and/or limitations of each printer. Device Mechanism and function Suitable for Dot matrix printer Suitable for use when: Printer that uses a set of small pin head hammers and a ribbon to form images from • a document needs to be printed on thicker paper or card that would jam dots in a laser or inkjet printer Inkjet printer Printer that uses nozzle-like print head to spray ink onto medium (paper, plastic transparencies or vinyl) to form output Laser printer Suitable for printing a wide range of items such as: Creates output in monochrome (black and white) or colour hard copy using a • documents that must be colour fast (ink will not smudge) such as legal technology similar to photocopy machines. documents Prints high-resolution pages with high print • large-volume office documents: black-and-white laser printing is low cost speed (> 30 pages per minute) per page; colour printing carries a higher cost per page Suitable for use when: • requires colour printout where few pages are needed because cost per page is high Table 1.16 Dot matrix, inkjet and laser printers: mechanisms, features, limitations and applications 25 9781380023322_text.indd 25 31/10/2019 11:17 Theory Device Mechanism and function 3D printer • Printer that uses an additive (see below) manufacturing Suitable for Suitable for use for: process to create three-dimensional objects using a wide • physical objects (of almost any shape or geometry) range of materials such as plastic and nylon. • architectural models such as: • ‘Additive’ refers to the successive addition of thin layers of • biomedical devices materials to create an object. • components (for aircrafts and other high-performance vehicles) Thermal (direct) • Printer prints the image by burning dots onto coated Suitable for use for: paper as the paper passes over the heated print head. • small, low-cost, single-use printouts such as: • No printer ribbons or ink are used; special rolls of thermal • fast-food receipts (heat-sensitive) paper are required. • transaction receipts produced by ATMs and point-ofsale terminals Plotter • Uses a set of different coloured pens. One pen is selected in Suitable for printing large-format graphical output, for turn and is moved over the paper to draw the picture. example: • Some plotters work by holding the pen still and moving the • architectural drawings paper. • meeting and event signage • Some plotters spray ink onto the paper instead of using a • wallpaper murals pen. • Can plot on large-format paper. Table 1.17 Three-dimensional printers (3D), thermal printers and plotters: mechanisms, features, limitations and uses . Figure 1.21 (a) A large-scale industrial inkjet printer; (b) Plans for a new building being output on a plotter (a) (b) 26 9781380023322_text.indd 26 31/10/2019 11:17 1 • Computer fundamentals ITQ 1.25 Suggest TWO types of commercial business that would use laser printers for producing multi-copy output. Microfilm (on a roll) and microfiche (on flat sheets) printers are now very rare; they can be used to print microfilm or microfiche. ACTIVITY 1.13 Shopping for printers This activity is suitable for small groups of four. You are part of a four-member team that has agreed to pool resources to establish a printing station at your school. Your Principal has endorsed the idea and has committed to provide a loan of US$1,000 to be used for the purchase of two printers and consumables (ink/toner/ribbon). a) b) c) The group should collectively decide what types of printer should be purchased. Why did you choose these types? Each member should research one of the types of printer. Review the specifications of each printer and complete the following table: Type Manufacturer and model Price Price of replacement toner/ink/ribbon Price per page Item 1 Item 2 d) e) As a group, review the findings from each group member and make a decision as to which printers will be purchased. Prepare an evaluation report that will be delivered to the Principal, asking for approval to purchase the printers and consumables identified. The report should clearly state: (i) reasons for choosing the two types of printer (ii) reasons for choosing the make (manufacturer) and models chosen (iii) the total price of the printers and the consumables. Output devices that display temporary output on a screen Visual display unit ▶ A visual display unit (VDU) is the main output hardware component of a computer system that handles the display of soft copy information that the user sees. This information may be program output, error messages, data that is being entered at the keyboard, or input from some other input device. Other common names for the VDU are monitor, cathode ray tube (CRT) and screen. When selecting a VDU, the user should consider three factors: type, size and resolution. Sizes range from 5 inches to 52 inches; however, common sizes for computers and laptops will range between 10 and 22 inches. The resolution of a VDU is the quality of the image displayed. Resolution is measured in pixels. A pixel is a single picture element dot, many of which make up an image. The higher the resolution, the better the quality of the image produced. High-resolution monitors are useful for very detailed graphic work. 27 9781380023322_text.indd 27 31/10/2019 11:17 Theory In general, VDUs are used as: • the primary display device attached to desktop computers, workstations, servers and gaming systems • digital signage in airports, cinemas, fast-food restaurants, retail shops, places of worship and public spaces • display devices in monitoring and control systems in industries such as public utilities and law enforcement. Output devices that produce audible output Speakers, headphone, earphones ▶ Speakers, headphones and earphones are all hardware devices that enable the user to hear sounds as they are generated (soft copy). Figure 1.22 Headphones for audio output They all feature a loudspeaker that generates sounds which are temporary and, as such, cannot be kept for later use. Audible output is usually required in situations when: • audio is the primary output method, for example virtual assistants • the user has a visual impairment and relies on sound as the key component of the user interface • the user is playing audio/video, for example during computer gaming, playing music and movies, and videoconferencing • audio is the most appropriate method of providing output, for example when sounding emergency alerts or system notifications. Speakers provide output at different power levels (measured in watts). They connect to the audio output or USB port on desktop systems. On laptops, tablets and smartphones there is usually a small built-in speaker as well as audio and USB ports. Caribbean Travel Services requires a range of input and output devices. For the office: For the maintenance garage: For the bus depot: • Keyboard • Mouse • Inkjet printer for colour pages • High-capacity, networked, monochrome laser printer for printing of bulk mail • Thermal wax printer to print waterproof labels • Barcode reader for checking parts from suppliers • Digital camera to photograph damaged vehicles • Sensors detecting bus movement around the depot • Large display monitors for public display of bus information • Touchscreens in information kiosks for passenger information • Printer to print passenger tickets and receipts 28 9781380023322_text.indd 28 31/10/2019 11:17 1 • Computer fundamentals ACTIVITY 1.14 Identifying appropriate input and output devices Use the company you created in earlier activities or use St Luago Fashion. • Review the activities your company will perform. • Identify the input and output devices your company will need. • Record your results in a simple list. The role of the different types of software Software ▶ We have considered the hardware that makes up a computer system. Now we need to understand the different types of software. Software is the program (set of instructions) that is executed by the hardware. Think of a kitchen full of cooking utensils (hardware) and ingredients (input data). What is missing is the recipes, the instructions, that when executed using the hardware turn the input ingredients into the finished dish (the output). The recipes are the software of cooking. Now we can see why we need to understand the different types of software. It is the hardware and software working together that makes the computer system such a powerful tool. There are two basic types of software: system software such as the operating system (OS), and application programs such as a word-processing program. Both types of software are needed in a computer system. Software System Translators Utilities Application Operating systems General purpose Special purpose Figure 1.23 The general classification of software System software System software ▶ System software is the category of software used to operate and maintain a computer system including the operating system, utility programs and program language translators. Operating systems Operating system ▶ An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. When the computer is first turned on the operating system is loaded. Home and business desktop computer systems commonly use the Windows 10 operating system from Microsoft (MS) but older computers may use Windows 8.1 or even Windows 7. Even mainframes and supercomputers require an OS in order to operate. Operating systems have six primary functions, as shown in Figure 1.24. 29 9781380023322_text.indd 29 31/10/2019 11:17 Theory User interface Establish basic elements for communicating with the user. Security management Process management Mantain a secure Manage processor computing resources. environment. Operating System Memory management Manage memory. Resource management Manage storage devices, input and output devices. Figure 1.24 The roles of the operating system ITQ 1.26 Operating systems are available for different types of computer systems. Name two operating systems for a desktop computer and two operating systems for a smart mobile phone. System utility ▶ File management Manage files and folders. A good operating system is one that you do not notice. For example, when you plug in a new printer a good operating system prepares it for use so users can just issue a print command. Attach an external hard disk drive to provide extra storage and the OS makes it available for storing files. Insert a music CD into the CD/DVD drive and the OS will ask if you want to listen to the songs. Popular operating systems include the Windows, Chrome, Linux and Mac operating systems for desktop and laptops and the Android and Apple iOS families (formerly iPhone OS) for smartphones. System utilities A system utility is a specialised program that assists in maintaining and improving the efficiency of a computer system. Utility program Utility function Backup Creates a spare copy of data and program files to protect them in case of accidental loss/deletion/damage or file corruption. Disk defragmenter Organises files on the disk drive so that the computer can access files faster. Disk error checker Examines files, folders and the platter surfaces of the specified hard disk drive and repairs any faults found. Disk cleanup Clears a disk of unnecessary files. Antivirus Checks for and removes viruses infecting the system and also prevents viral infections. Table 1.18 Common utility programs and their functions Application software Application software ▶ Application software is the category of software that performs end user tasks. It performs the useful tasks that organisations and home users rely on, such as: • writing a letter using a word processor • creating and sending an email • managing records in a database • performing automatic calculations in a spreadsheet • creating a web page for publication on the World Wide Web 30 9781380023322_text.indd 30 31/10/2019 11:17 1 • Computer fundamentals ITQ 1.27 Give two examples of generalpurpose software. General-purpose application ▶ Integrated package ▶ Special-purpose application ▶ • adding a filter to a photo • making a video call • listening to music. Application software may be regarded as general-purpose or special-purpose (specialised applications) depending on how broadly or narrowly focused its intended tasks are. A general-purpose application is software that is used to perform a wide range of related tasks. For example, a word processor, as a general-purpose application software tool, may be used to produce hundreds of different types of documents, such as announcements, reports, birthday cards, credit notes, letters and notices. Sometimes several related application programs are combined into a single package. Office productivity programs such as Microsoft Office and LibreOffice contain word processor, spreadsheet and database programs. Integrated package software contains several related programs in one package. A special-purpose application is software that is used to perform narrowly focused tasks. A payroll package has one specific task and has built-in tools for keeping records of persons to be paid and wage rates, and for storing payment and tax data. Specialpurpose applications have built-in tools, and templates for forms and reports that help to automate tasks or otherwise aid the user. Software category Sub-category Examples Nature of tasks that a user may carry out General-purpose Word processor Google Docs LibreOffice Writer Microsoft Word Pages Create and edit text and graphics in letters and web pages Spreadsheet Microsoft Excel Numbers LibreOffice Calc Perform calculations, analyse information, manage lists and create charts Database FileMaker LibreOffice Base Microsoft Access Create and link tables to contain records and programs to manage those records Web page design Adobe Dreamweaver Google Web Designer Create websites Web browser Microsoft Edge Mozilla Firefox Google Chrome Safari Request, retrieve and display web pages Photo-editing Adobe Photoshop Apple Photos Microsoft Photo Enhance photographs Media player QuickTime by Apple Microsoft Groove View videos and listen to music Special-purpose Table 1.19 General-purpose and special-purpose software: examples and their roles in computer operation 31 9781380023322_text.indd 31 31/10/2019 11:17 Theory At Caribbean Travel Services a variety of applications will be needed. General-purpose • Word processing for general documentation, letters and reports. applications • Spreadsheets for financial tasks such as vehicle maintenance accounts. • Database software for record keeping including: journey records, vehicle records and employee records. ITQ 1.28 Give TWO examples of specialpurpose software. Special-purpose • Web page creation tool for creating Caribbean Travel Services’ website. applications • Photo-editing software for producing advertising media. • Barcode software for processing barcodes in the garage. ACTIVITY 1.15 Identifying appropriate software Use the company you created in earlier activities or use St Luago Fashion. • Review the activities your company will perform. • Identify the general-purpose application programs your company will need. • Record your results in a simple list. • Identify any special-purpose application programs your company will need. • Record your results in a simple list. Sources of software Individuals and organisations wanting to obtain and use software can do so in a number of ways. These include: 1 Off-the-shelf: purchasing packaged software from a computer store or purchasing online. 2 Customised: using features in the software to personalise or modify the software that already exists. For example, creating a set of template documents that include the company name, logo and colours in a word processing program. 3 Custom-written: developing their own software programs from scratch. 4 SaaS: using ‘software as a service’ as provided by online companies, for example, Google Docs and Word Online. ITQ 1.29 Tanice has a specific task requiring a highly rated software package. She has only 20 days to finish the task. a) Which method should Tanice use to obtain the software required? b) Justify your response. Figure 1.25 Selecting packaged software, also called ‘shrink-wrapped software’ because it sometimes comes in a pre-sealed, cellophaneclad package 32 9781380023322_text.indd 32 31/10/2019 11:17 1 • Computer fundamentals Source Features Advantages (in comparison to other sources) Off-the-shelf Developed by a software company and marketed and distributed by them through traditional retail stores (brick-and-mortar) and online channels. • Higher availability: Available for immediate purchase and installation Configured to a user’s liking through the selection of options or preferences, or the installation of components (add-ins) or modules. • Better fit to user needs: Software is tailored to suit the needs of the Created by one or more programmers on behalf of an organisation to meet that organisation’s unique requirements. • Higher efficiency: The software will utilise resources efficiently as the Customised Custom-written as needed. • More product support options: Technical support usually available via multiple channels such as an online knowledge base, a user community and telephone customer service. user. For example, moving tools that are regularly used onto a toolbar. • More flexibility: New features are easily added by installing readily available add-ins and plug-ins. code is optimised for a specific environment. • Better fit to user needs: The software is produced to match requirements specified by the user. SaaS Method of software delivery whereby • More accessible: Web-based use allows subscribers to access the applications are hosted remotely by a vendor software easily from any location with Internet capabilities. or service provider and are made available • Lower cost of ownership for short-term tasks: Especially advantageous to customers over a network (such as the for small businesses as it provides access to expensive, high-powered Internet). software that might otherwise have been unobtainable through The customer pays a licence fee on a conventional purchasing methods. subscription basis. • Many large software companies now deliver software via this service, including Microsoft Office 365 Online and Adobe. Table 1.20 Outline of the features and comparative advantages of four sources of software Different types of user interface User interface ▶ Hardware interface ▶ Software interface ▶ A user interface is the combination of hardware and software that allows users and computers to communicate with each other effectively. Humans interact with computers in many ways, and the design of the places at which humans and computers interact (the interface) is crucial for effective use of computer systems. Examples include: playing a game using a game controller, withdrawing cash at an ATM, writing a letter using a keyboard and monitor, or updating social media on a smartphone touchscreen. The user interface is made up of a hardware interface and a software interface. A hardware interface is those physical hardware components (input and output devices) that allow the user to manipulate the computer. A software interface is the programs that are used to communicate with the computer via the hardware. Hardware interfaces Earlier in this chapter we covered input and output devices. Some of these will be connected to any computer system: keyboard, mouse, monitor and printer is a common minimum configuration. Increasingly, users are choosing to interact with their computing devices using their voice or even hand gestures. This type of interface is increasingly popular and is used to power virtual assistants such as: 33 9781380023322_text.indd 33 31/10/2019 11:17 Theory • Siri, the iPhone’s virtual assistant, released in 2011 • Amazon Alexa, a virtual assistant developed by Amazon, first used in the Amazon Echo and the Amazon Echo Dot smart speakers released in 2014 • Cortana, a virtual assistant created for a range of Microsoft and other products, released in 2015. Figure 1.26 A virtual assistant smart speaker Table 1.21 explores the features of some of the more common hardware and the benefits of each. Type Features Benefits Touch user interface • Relies on the sense of touch (haptics). • Includes multi-touch touchscreen gestures such as • Easy: Intuitive to use with no special ICT skills such as pinching action. • Interaction is by your finger touching the screen; the touching is detected and translated by the device into instructions. Tapping, swiping and pinching actions are also received and interpreted as instructions. • Smartphones, automated teller machines and self-service kiosks utilise touch interfaces. Speech and sound interface • Interaction is by speech using normal everyday language in • Easy to use: The user does not need to be trained in order to interact with the computer. • Usually found on smartphones, car entertainment, climate and navigation systems, and virtual assistants (such as Amazon Echo, Google Home). Specialised keyboards typing required; user can usually see all of the options available so there is no need to remember commands or search through menus. • Enjoyable: Users will spend hours swiping! • Interaction is via special keys fitted with one or more features such as raised dots, colour coding, icons or descriptive text. • Usually attached to systems utilised by persons with disabilities. how to use the interface; offers more flexibility than the other interfaces. • Support for persons unable to use alternatives: users who are not able to type or who have visual impairments are able to operate this interface. • Flexible: They allow a computer system to be quickly adapted to a user’s needs. • Support for users with visual impairments: users feel the pattern of the dots on each key, e.g. a Braille keyboard. Table 1.21 Features and benefits of different types of hardware user interfaces 34 9781380023322_text.indd 34 31/10/2019 11:17 1 • Computer fundamentals ITQ 1.30 Cortana is a virtual digital assistant. Name TWO other similar services that have a voice user interface. Caribbean Travel Services uses touchscreens on its smartphones and tablets. It also has some specialist touchscreens in the garages that enable the mechanics to simply check off service tasks as they are completed on a vehicle. CTS also uses a large-key keyboard in the garage because mechanics sometimes wear gloves, and the Chief Executive has a speech-activated virtual assistant in their office. Software interfaces Earlier in this chapter we stated that one of the functions of the operating system was to enable communication between the user and the computer system. In the early days computers interacted with the user through a text-based command line interface: the user typed in a command and the computer responded with a line of text. Command line interface Command line interface ▶ ITQ 1.31 Though the average computer user may never have a need for a command line, it’s still an essential tool for a few technical professionals. Name ANY TWO computer professionals who use this interface on a regular basis. A command line interface is when interaction with a computer is by means of individual lines of text. For example, in the MS-DOS operating system the command ‘DIR’ means ‘Display a list of files and subdirectories in a directory’. DIR 21/03/2020 24/03/2020 27/03/2020 31/03/2020 08:30 13:27 19:02 18:45 16,400 18,029 15,842 9,623 Chapter1 Chapter2 Chapter3 Chapter4 Figure 1.27 Directory listing using the DIR command in MS-DOS (Microsoft Disk Operating System) Command line interfaces are still in use but are restricted to specialist roles such as system administrators, program developers, database administrators, network managers and home enthusiasts. ACTIVITY 1.16 Using the DIR command in MS-DOS Starting a command prompt program will depend on your computer system: Look to see if there is an icon for a command program on the desktop. If not try Start button and look for Command Prompt Otherwise your teacher will tell you how to start the command program. Type DIR followed by ‘Enter’ Next type HELP Help gives you all the different commands available in the command prompt. 35 9781380023322_text.indd 35 31/10/2019 11:17 Theory Another type of software interface is menu-driven. Menu-driven interface Menu-driven interface ▶ A menu-driven interface is when interaction with a computer is by the user selecting one option from a list of presented options. These are usually found on simple computer systems. A menu is a list of options from which the user has to select one. The user is then presented with another menu depending on their first selection. For example, at an ATM machine when you have inserted your card and entered your personal identification number (PIN) you are presented with a menu of options (see Figure 1.28(a)). If you select Withdraw Cash you are presented with another menu (see Figure 1.28(b)). St Luago Bank ATM St Luago Bank ATM Display balance $20 Withdraw cash $40 Payments & Transfers $100 Deposits $200 Cancel Cancel (a) (b) Figure 1.28 (a) Selecting an option on an ATM (b) Selecting the cash amount on an ATM The menu-driven interface is ideally suited for applications used for ‘walk-up-anduse systems’, such as: • ATMs • kiosks that vend/sell mobile phone top-up (credit) • self-service food and beverage kiosks in casual dining establishments such as Big Banana (Antigua), Bickles (St Vincent), BK, Chefette (Barbados), KFC, Mothers (Jamaica) and Pizza Boys (Trinidad). ITQ 1.32 Suggest ONE industry that uses menu-driven interfaces extensively as a part of its point-of-sale systems. Touchscreen software interfaces are similar to menu-driven and are often found in fast-food outlets. When you order your meal the operator simply touches your selection on their terminal. Some of the larger fast-food outlets even have selfservice touch-interface machines for quicker service. Graphical user interface (GUI) Graphical user interface ▶ By far the most common software interface that we are all familiar with is the Graphical User Interface. A Graphical user interface (GUI) is when interaction with a computer is by using a pointing device. In a simple form, a GUI displays elements such as Windows, Icons, Menus and Pointers (WIMP) on the screen and the user points and clicks with a mouse or types on a keyboard to operate the computer. A more complex GUI will include onscreen controls such as radio buttons (select one only), check boxes (select many) and command buttons (perform an action). The pointing device may be a trackball, joystick or touchscreen instead of a mouse and actions may include drag and drop, click and drag to select as well as simple click. 36 9781380023322_text.indd 36 31/10/2019 11:17 1 • Computer fundamentals The onscreen aspects of a GUI are often referred to using the acronym WIMP. The GUI interface is ideally suited for applications in which users interact with a range of elements on a screen in various ways. These include: • desktops/home screens (on smartphones, tablets, laptops and desktop computer systems) provided by operating systems such as those in the Android, iOS, Mac OS, Linux and Windows families • information/entertainment systems in motor vehicles used to set temperatures, make phone calls and set up playlists. Figure 1.29 A graphical user interface on a laptop, tablet, smartphone and smart watch Evaluating the suitability of a computer system Earlier we outlined the various types of computers: supercomputer, mainframe, desktop, mobile and embedded. We saw that for most organisations desktop and mobile devices were most appropriate. If you go into your local computer store you will see a wide selection of desktops, laptops and smartphones. You need to understand the system specification to select the best system for your needs. ACTIVITY 1.17 Checking the specification of computer systems Visit a computer store: • Check the specifications of several laptop and desktop computers. • Record your findings in your notebook. • Discuss your findings with a partner. The system’s specifications include its processing speed, memory, secondary storage, types of software and input/output devices. 37 9781380023322_text.indd 37 31/10/2019 11:17 Theory Processing speed Processing speed, at a basic level, is how quickly a microprocessor operates. The specification of a computer will certainly include the CPU speed measured in hertz and expressed as megahertz (a million hertz) or gigahertz (a billion hertz). Unfortunately the situation is not as simple as comparing CPU speeds. Microprocessor manufacturers produce a range of products in different price ranges and for different purposes. For example, the Intel ninth-generation range includes processors with different numbers of processing units (called processor cores) on a single chip and different amounts of very fast memory (called L3 cache memory). Users can purchase the computer most suitable for their needs, depending on whether they need fast speeds, or more memory. To illustrate, the detailed specifications for the Intel range are shown in Table 1.22. Processor Price (US$) Number of cores CPU speed L3 cache i9-9900K 529 8 3.6Ghz 16MB i7-9700K 399 8 3.7Ghz 12MB i5-9600K 299 6 3.7Ghz 9MB i3-9350KF 173 4 4.0Ghz 8MB Table 1.22 Desktop computer system specifications. Clearly the overall processing power of an i9 processor with eight cores is greater than that of an i3 with only four cores, even though their CPU speeds are similar. Memory Main memory ▶ Main memory is the functional unit of a computer that stores data and instructions being used by the CPU. Main memory is also known as primary storage or just as ‘memory’. In addition to main memory, modern microprocessors have a small amount of extremely fast memory built into the processor. This ‘L3 cache memory’ significantly improves the microprocessor performance and helps to explain why an i9 processor with 16MB of L3 cache vastly outperforms an i3 processor with only 8MB of L3 cache. It is often possible to improve performance by adding more main memory to a computer system by inserting extra memory modules into expansion slots on the computer’s main motherboard. ITQ 1.33 Suggest ONE way to improve the performance of a computer system. Figure 1.30 Additional main memory can be inserted in a free slot on a computer motherboard to improve performance 38 9781380023322_text.indd 38 31/10/2019 11:17 1 • Computer fundamentals Secondary storage (capacity and speed) ITQ 1.34 a) Suggest ONE advantage of using a solid state disk instead of a hard disk drive. b) Suggest ONE advantage of using a hard disk drive instead of a solid state disk. The secondary storage being considered here is the internal storage of the computer system that stores data even when the computer is turned off. It is common for new computers to be delivered with a single, large-capacity hard disk drive installed. There are two main types of disk drive: • solid state drive (SSD): very fast and robust but expensive per gigabyte • hard disk drive (HDD): slower and less robust but much cheaper per gigabyte. A higher-specification desktop computer might include two internal disk drives. The first disk drive, a fast SSD, is used to store the operating system, system utilities and all the application programs. The second disk drive, an HDD, will be used to store all the user’s data. Types of software We have seen that all computers need an operating system to manage the user interface, processes, security, memory, files and hardware resources. System utilities are also needed as these assist in maintaining and improving the efficiency of a computer system. In addition, application programs are the software that perform end user tasks, for example word processing, database, video editing and spreadsheets. The application programs installed will depend on the intended use of the computer system. For the software to run smoothly a computer system needs to have sufficient performance. Performance can be measured in terms of processing speed, amount of internal memory and the amount of secondary storage. Some application programs, video editing for example, require a highperformance computer system to run efficiently. Input and output devices Input and output devices were covered in some detail earlier in this chapter. One point to note when choosing between different monitors is that the quoted size of a screen is measured as the diagonal distance of the viewable area. Types of visual display units include LEDs (light emitting diodes) and older-style CRTs (cathode ray tubes) and LCDs (liquid crystal displays). (a) (b) Figure 1.31 (a) An old-style CRT monitor and a modern LCD monitor; (b) measuring the size of a laptop screen. The size is measured as the diagonal distance of the viewable area. Some VDUs are now available in wide-screen versions Having looked at processing speed, memory, secondary storage, types of software and input/output devices we know what to consider when choosing a computer. 39 9781380023322_text.indd 39 31/10/2019 11:17 Theory Suggested specifications for different uses ITQ 1.35 Suggest the main reason that someone might choose an i5 processor instead of an i9 processor Basic budget computers are suitable for applications such as web browsing, email and word processing. A suggested specification would be an Intel i3 processor, 4GB of RAM and 500GB hard disk drive. Home and student-level computers will perform all the above but may also be used for tasks such as streaming video, preparing presentations, photo-editing and spreadsheets. A suggested specification would an Intel i3 or i5 processor, 4–8GB of RAM and 1TB hard disk drive. Business-level computers will perform all of the above but may also be used for tasks such as large database applications and video-editing. A suggested specification would be an Intel i7 or i9 processor, 8–16GB of RAM and one 1TB hard disk drive plus a 256GB solid state disk drive. Gaming-level computers are very powerful systems that could perform all of the above but have been specifically designed to run electronic games. A suggested specification would be an Intel i9 processor, 32GB of RAM and 3TB hard disk drive plus a 512GB solid state disk drive. A gaming-level machine may also feature upgraded video and sound hardware. Troubleshooting basic hardware problems From time to time, one or more of your hardware devices may malfunction or fail. Table 1.23 contains possible solutions for seven common problems that affect general-purpose computer systems. Issue Possible causes System unit does • Power cable may be loose or not boot disconnected • Power outlet may be faulty • Hardware malfunction or failure Possible solution(s) 1 First check the cable. Unplug it from the computer and the outlet. Re-plug in both sides (computer then outlet) and try booting computer again. 2 Check the wall outlet. Plug something else into the outlet and see if it works. If you are using a surge protector, try a different outlet. 3 Turn the system off, wait 30 seconds and then try again. Listen for beeps and look for onscreen error messages. 4 If the system still does not boot, report it to the computer technician, ensuring that you provide as much information as possible. No picture on display • Monitor may be in sleep/hibernate 1 Check if the monitor power button is in the ‘ON’ position. 2 Check the monitor controls, brightness and contrast to ensure they are not at the lowest levels. 3 Check the signal cable; ensure that it is firmly connected to the VGA/HDMI port on the system unit. 4 Check the power cable; ensure it is firmly connected to the monitor and the power outlet. Printer not printing • Power cable may be loose • Interface cable may be loose or 1 Check if the power cable is seated properly at (i) the interface with the device and (ii) the power outlet. 2 Make sure USB receiver or cable is plugged in correctly. 3 Plug USB receiver or cable into another port. 4 Check for error messages – paper out, paper jam or toner out – and refer to manual to rectify. 5 Check all doors are firmly closed. mode • Improperly adjusted monitor controls • Loose interface cable • No power disconnected • Printer may be out of paper or jammed • Printer may be out of toner/ink • Door to paper/toner compartment may be open 40 9781380023322_text.indd 40 31/10/2019 11:17 1 • Computer fundamentals Issue Possible causes Possible solution(s) Wireless keyboard/mouse not responding • USB receiver loose • Battery contacts may be dirty • Battery may be dead 1 Check to ensure USB receiver is plugged in correctly. 2 Plug USB receiver into another port. 3 Remove the batteries, clean battery contacts with an eraser, replace the batteries with a fresh set. Wireless connection not working • Wireless radio is off • Wireless network adapter not ‘Network cable unplugged’ errors • Network adapter may be 1 Check if the wireless radio is on: look for a hardware switch or special function key on your device that can turn the wireless radio on or off. If you’re using a USB wireless network adapter, make sure it’s plugged in plugged in correctly. • No Wi-Fi device (such as a router) 2 Try to get closer to the router/access point; eliminate interference. is in range • Incorrect wireless password entered 3 Restart or reset the wireless router or access point and/or your device. 4 Enter password again carefully, making sure that ‘Caps Lock’ is not turned in device on. malfunctioning • Network device driver missing, corrupted or out of date • Network cable loose or faulty 1 Turn the computer off and then restart to ensure any temporary memory corruption issues are cleared. 2 Check both ends of the network cable connected to the adapter to ensure they are firmly connected to the network port and that no part of the cable is frayed or broken. Table 1.23 Troubleshooting computer systems Insert image 049.5/> Figure 1.32 Troubleshooting a failed computer system ACTIVITY 1.18 Troubleshooting basic computer hardware problems Here is an opportunity for you to develop the expertise required to effectively troubleshoot some common basic computer hardware problems. For each problem, you should: • read the issue stated in column 1 of the troubleshooting Table 1.23 (this is the undesirable situation observed by the user that will help to identify that a problem exists); • examine the possible causes listed in column 2; then • carry out (or simulate) each ‘fix’ suggested in column 3 (possible solutions). 41 9781380023322_text.indd 41 31/10/2019 11:17 Theory Summary • Information Technology is the technologies that are • The Input, Process, Output, Store (IPOS) cycle summarises used to capture input data, process that data into useful information, display the output information and store it for future use. • Cloud storage has some advantages over local storage; this • There are five major types of computers: supercomputers, • Software is a key component of Information Technology mainframes, desktops, mobile devices and embedded devices; these are distinguished from each other by comparing their processing speed, storage and portability. • A computer may be either general-purpose or specialpurpose; all computers comprise four major components: processor, memory, secondary storage and input/output devices. • Main memory stores data being processed by the CPU and data being transferred in and out of the computer via input/output (I/O) devices. • Secondary storage holds data, program instructions and information that are not currently being processed by the CPU. • Secondary storage media can be compared with respect to portability, speed, capacity and cost. • Capacity of storage devices is measured using units such as megabyte, gigabyte and terabyte. the operation of a computer system. includes lower cost and greater flexibility as regards capacity. systems; the two main categories of software are system software and application software. • Application software may be bought off-the-shelf and may be customised; it may also be custom-written. • Users interact with computer systems via a user interface; types of user interface include command-driven, graphical (GUI), menu-driven, touch and voice. • Information (data, information or status messages) produced by a computer must be presented to the user: output is conveyed to the user via images or sound. • Output devices are visual display units, printers, plotters, headphones and speakers. • Specified applications require that the appropriate input and output devices are selected to meet the needs of the user. • Computer system hardware sometimes problems that need troubleshooting. encounters Answers to ITQs 1.1 The three fields that have combined to form Information Technology are: Computer Science, Information and Communications Technology (ICT) and Office Automation. 1.2 A computer system includes hardware, software, users, procedures and data. A simple computer is a single hardware device with no software. 1.3 The two main types of personal computers are desktop and laptop. 1.4 Tera is approximately 1,000,000,000,000 or 12 zeros. In IT the exact figure is 240 or 1,099,511,627,776. 1.5 Supercomputers are extremely expensive to buy and run. As a consequence very few organisations have supercomputers. National weather services within the Caribbean do not have cost-effective access to the computing power and data-collection capabilities required for accurate long-range weather forecasting. 1.6 Mainframes are found in many large commercial organisations running transaction-based processing such as banking where thousands of different transactions are performed per second. Supercomputers are more likely to be found in research establishments, where they are used for one task such as modelling the weather. Supercomputers have higher performance than mainframes but mainframes are considerably cheaper to purchase and operate. 1.7 The four essential parts of a desktop computer are: base unit or case, monitor, keyboard and mouse. 1.8 Measured by physical size, large to small, the order of devices is: laptop, netbook, tablet, smartphone. 1.9 Electromechanical systems in a cafeteria or school kitchen include: commercial cookers, dishwashers, freezers and ovens. Devices in a school’s administrative office include photocopier, public address system and telephone system. Devices in a motor vehicle include airbag protection, central locking, collision avoidance, cruise control, self-parking. 42 9781380023322_text.indd 42 31/10/2019 11:17 1 • Computer fundamentals 1.10 A large number of devices connect using the USB port. Common devices include printer, mouse, keyboard, digital camera and scanner. 1.11 With primary storage data is lost when the power is turned off. With secondary storage the data is NOT lost when the power is turned off. 1.12 A hard disk drive (HDD) is much faster than magnetic tape but magnetic tape is very economical. 1.13 Digital cameras have a slot which accepts a memory card. 1.14 A DVD has a capacity of 4.7GB and will easily store two 60-minute videos of 600MB. 1.15 TECHNOLOGY is 10 letters so will occupy 10 bytes, one byte for each character in the word. 1.16 1,000,000 megabytes is 1 petabyte, one-thousandth of a terabyte is 1 gigabyte. 1.17 To calculate your age in years the calculation would be: your age = this year – year you were born. 1.18 Local storage is attached directly to the physical computer; cloud storage is connected via a network. Local storage is usually purchased; cloud storage is usually rented. 1.19 The advantages of using cloud storage are that it keeps your files safe or allows access from any Internetconnected device. 1.20 The main disadvantage of using local storage are the danger of loss or failure of the device. 1.21 A Language Arts teacher could use a scanner to scan images for inclusion in a print-based activity; scan pictures for projection using a multimedia system; scan a map, reduce it, print note-sized versions of it and paste these in students’ books for easy reference during a class. After the class they may scan handwritten student work for discussion or scan student work and keep in an electronic portfolio. 1.22 Some users with poor hand control may prefer the larger format of a joystick. A joystick is more realistic in many computer games and is often attached to games consoles. 1.23 A printer produces hard copy, usually printed on paper. 1.24 A dot matrix printer has the lowest cost per page but is very slow; a monochrome laser printer has higher cost per page but is still economical to run. 1.25 Almost all commercial businesses now need brochures, leaflets, flyers and business cards. Examples are transport companies, hotels, shops and travel agents. 1.26 Operating systems for a desktop computer include: the Windows family (10, 8.1, 7, Vista), Linux family (Ubuntu, Redhat, Mint) and macOS. Operating systems for a smart mobile phone include Android and iOS. 1.27 General-purpose software includes: word processing, spreadsheets, database software, presentation software. 1.28 Special-purpose software includes: web page design software, web browsers, photo-editing and media player software. 1.29 When choosing software it may be possible to download a trial version of the program. Trial periods vary but 30 days is common. 1.30 Alexa (by Amazon), Bixby (by Samsung) and Google Assistant (by Google) are all examples of digital assistants. 1.31 Professionals who may use a command line interface include: computer programmers, database administrators, network managers and systems administrators. 1.32 Wi-Fi hotspots are often found in: fine-dining restaurants, quick-service/fast-food restaurants and bars. 1.33 Adding more main memory is a good way to improve a computer’s performance. Replacing the hard disk drive with a solid state disk will also improve performance. 1.34 Solid state disks are higher performance and are more robust. Hard disk drives are cheaper per GB and are available in high capacities. 1.35 When choosing a processor, cost is the main reason for choosing a lower-powered processor. 43 9781380023322_text.indd 43 31/10/2019 11:17 1 • The computer system Theory Examination-style questions: Multiple Choice Instructions: Each item in this test has four suggested responses labelled (A), (B), (C) or (D). Read each question carefully then select the most suitable response. 1) 2) Which of the following is in the correct order of computer processing speed, from most powerful to least powerful? A) desktop, supercomputer, smartphone, mainframe B) supercomputer, mainframe, desktop, smartphone C) smartphone, mainframe, desktop, embedded system D) supercomputer, desktop, mainframe, smartphone Which of the following is 1,024 bytes? A) terabyte B) gigabyte C) megabyte D) kilobyte 3) Which of the following produces soft copy? I printer II monitor III speakers IV plotter A) I and IV B) II, III and IV C) II and III D) III 4) Which of the following is NOT an optical storage device? A) DVD B) Blu-ray C) Flash memory D) CD 5) In a computer system, the _________ holds data when the power is on whereas _________ holds data when the power is off. A) processors and storage B) memory and processor C) storage and CPU D) memory and storage 6) Which of the following is NOT a type of special-purpose application software used with general-purpose computers? A) media player B) statistical software C) web browser D) word processor 7) Which of the following types of interface is MOST LIKELY to be used in a bank ATM? A) command-driven B) graphical user C) menu-driven D) voice-controlled 8) Cloud storage has some advantages as compared to local storage. Which of the following statements are NOT true? A) Cloud storage is generally less expensive than local storage. B) Cloud storage offers users more flexibility options in choosing capacity. C) Documents stored in the cloud are always accessible from a local device. D) Cloud storage offers more data security than data stored on desktop computers. 9) Which of the following pairs of devices are MOST LIKELY to be used by immigration personnel at ports of entry to capture biometric data? A) digital camera and fingerprint reader B) document scanner and barcode reader C) light pen and graphic pad D) web camera and fingerprint reader 10) Your computer monitor’s power switch is in the ‘ON’ position; however, the display is blank. Which of the following is NOT a likely cause of this problem? A) The interface cable may be loose. B) The network adapter is malfunctioning. C) Monitor may be in sleep/hibernate mode. D) The monitor controls are improperly adjusted. 44 9781380023322_text.indd 44 31/10/2019 11:17 1 • Computer fundamentals Examination-style questions: Structured 1) Meghan Brown is an entrepreneur; she is getting ready to open her new computer store. She plans to sell computer hardware and software to individuals and small business operators. Her business plan will include the items she will sell. a) Meghan intends to sell desktop systems and laptops. i) State the category of computer systems to which laptops belong. [1] ii) Name TWO OTHER types of devices that belong to the category named in part i) [2] b) State ANY FOUR of the major components that desktop systems and laptops should have. c) Meghan is a graphic designer and intends to stock input, output and storage devices that will be needed by graphic artists and people involved in desktop publishing. Name devices that she should stock that can perform the tasks stated: i) Provide an external storage solution using technology OTHER than optical storage technology. [1] ii) Print large-format output on paper, vinyl and other types of material. [1] iii) Create digital images from hard-copy photographs and advertisements. [1] iv) Facilitate the sketching and colouring of illustrations. [1] d) Meghan will sell all computer systems with an operating system, system utilities, general purpose application programs and special purpose application programs pre-installed. Explain, using an example, the role of each of these software components, why they are needed and how they might be obtained? [10] e) A prospective customer has suggested that Meghan might give advice on the four types of user interface. Briefly describe the four types of user interface. [4] [4] Total 25 marks 45 9781380023322_text.indd 45 31/10/2019 11:17 1 • Computer Fundamentals 2 Information processing Data is the primary input to an information processing system. Information processing systems produce meaningful information that is relied upon for decision making. The quality of the information produced will depend on the quality of the source data. We must ensure that our data comes from a reliable source and we must use validation and verification checks to ensure that it is input correctly. In this chapter, we will explore data, data sources, data processing, data storage and methods of evaluating information obtained from a variety sources, including online sources. On completion of this chapter, you should have developed an understanding of basic information processing principles. By the end of this chapter you should be able to: ✔✔ Distinguish between data and information. ✔✔ Evaluate the reliability of information obtained from online sources. ✔✔ Differentiate between validation and verification of data. ✔✔ Identify appropriate validation and verification checks given a particular scenario. ✔✔ Select appropriate forms of file organisation for particular applications. Information processing Information & data Evaluating online data sources of data verification & validation types of document methods of verification serial file access methods of validation sequential file access Choosing a file access method File organisation file access methods how data is stored how files are stored random file access direct file access 46 9781380023322_text.indd 46 31/10/2019 11:17 2 • Information processing Information and data Data is raw, unprocessed facts. This may be facts about persons, places, things or events that have been collected through observation or measurement (Table 2.1). Example Data items How the data was obtained 1 1500, 1502, 1552, 1506, 1508, 1554 Data collected at the Piarco International Airport through observation one weekday morning. 2 197, 140, 110, 122, 167 Data collected at a church through counting. 3 744, 724, 717, 700, 696 Candidate numbers extracted from the CXC Statistical Bulletin 2012. 4 91.05, 91.09, 91.07, 91.12, Data extracted from a spreadsheet containing 91.10, 91.13 foreign currency exchange rates (JM$:US$). Table 2.1 Examples of data Information is meaningful knowledge derived from raw data (Table 2.2). Data that has been processed, organised or put into context so that it is meaningful to the user may be regarded as information (Table 2.3). Example Information What information is presented The process used to obtain information from the data 1 1552, 1500, First six daily Caribbean 1502, 1554, Airlines flights from Port of 1506, 1508 Spain to Tobago. 2 147 The average weekly attendance Computing a mathematical at the 10am worship service at average of all the data items. a specific church during March 2020. 3 24 The difference between the number of candidates presented by the two centres with the highest number of candidates in the June 2008 CSEC exams. 4 y = 0.0238x A linear growth rate equation + 91.014 that relates to the set of exchange rates. Sorting flight numbers in ascending order of the departure time of the flight. Subtracting the second-highest number of candidates in the list from the highest number of candidates. Trend analysis. Table 2.2 Examples of information 47 9781380023322_text.indd 47 31/10/2019 11:17 Theory Data Information • Raw facts • No context • Plain numbers, text, images, • Processed data • Data with context • Value added to data through sound clips and codes • analysis (comparisons) • organisation (sorting, ranking) • computations (counting, totals, averages) Table 2.3 Data versus information ITQ 2.1 Samantha weighs 58 kilograms. State THREE examples of data about yourself. Figure 2.1 Counting the number of persons entering a church Sources of data ‘Sources of data’ has two different, but related, meanings in Information Technology and we need to be clear about the difference. The first meaning of ‘the source of data’ is: the thing that has been measured. Examples of data from measurements are shown in Table 2.4. Example Value Wind speed 22 knots Temperature 28º Humidity 74% Rainfall 2.2cm Table 2.4 Data automatically recorded from sensors on a weather station It is highly likely that the measurement was automatically recorded by a sensor linked to an embedded device and directly stored on an electronic storage media. The source of this data is the thing that was being measured. 48 9781380023322_text.indd 48 31/10/2019 11:17 2 • Information processing Examples of data from measurements at Caribbean Travel Services are when the speed of the vehicle on a journey is automatically recorded and the number of passengers entering a vehicle is detected by a pressure sensor and automatically recorded. The second meaning of ‘the source of data’ is: the person or organisation that provided the data from observation. Examples of data from observation are given in Table 2.5. ITQ 2.2 a) Which is more reliable? 1) An automatic timing system records your friend’s 100m sprint time at 15.6 seconds. 2) Your friend reports that he ran the 100m in a time of 15.2 seconds. b) Justify your choice. Example Value Data on vehicles passing a road junction in an hour collected by traffic department staff 57 Data collected by immigration officers Traveller’s name, destination, flight number and length of stay Data collected by a police officer at a road accident Time, date, location, weather conditions, cars involved, driver details and witness details Table 2.5 Examples of data collected by observation Observations are usually recorded by a human onto a paper form for later input into a computer system or directly input into the computer system by the observer. The source of this data is the person who did the observing. Examples of data from observation at Caribbean Travel Services are the number of seats in bus registration number 2150 HB, and the number of parking bays at the Littletown depot. When the observation was made it was recorded in a document of some form. The data is then read from the document and entered into a computer system. Consider this further example: The Caribbean Post newspaper reported that Caribbean Travel Services’ newest addition to its luxury fleet of vehicles is a 35-seat, easy-rider coach. The source of this data is the Caribbean Post newspaper. ITQ 2.3 What is the difference between an observation and a measurement? Data is generated continually but not always recorded. Nature is a big producer of data. It produces data such as temperature, wind speed, amount of rainfall and humidity. Human activities also create data. In cities around the Caribbean and elsewhere, the number of vehicles passing through an intersection per hour is an example of data, even if this number is zero. As persons travel – by air, rail, the ocean and road – data is generated in numerous ways. One such way is through the records that are kept as travellers cross the border from one country into another. Figure 2.2 is an example of a departure card completed by a passenger leaving St Luago by air. This is an example of a source document. This data will be manually entered into an information processing system by an immigration officer at the airport. 49 9781380023322_text.indd 49 31/10/2019 11:17 Theory Types of document Source document ▶ A source document is a document that contains data for input into an information processing system. Please retain Departure Record for presentation upon departure Departure DEPARTURE RECORD (B) 1. Flight / Vessel Name 2. Port of Final Destination 3. Last Name ITQ 2.4 List the data that might be collected from a passenger on a flight departure card. 4. First Name 5. Middle Name 6. Date of Birth D D 9. Nationality 7. Sex M F M M Y 8. Passport # Y 10. Country of Birth Signature B CUL DIP Date E H NE PR RR RRV S T UL UN V Figure 2.2 A departure record card ACTIVITY 2.1 Exploring data • List in your notebook three documents that are examples of a source of data. For example, a bus ticket or product label, a credit card, a bank cheque or a utility bill. • Compare your list with the class, and amend your list to include the additional sources of data that your classmates may have shared. Depending on the source of the data, the data values obtained will exist in different types, such as text and images. Data may exist as one of the primary data types listed in Table 2.6. Type Example Text • data obtained through conducting surveys using questionnaires and similar instruments ITQ 2.5 State TWO forms in which data collected using a paper-based survey may exist. • data such as ‘name’ and ‘time in’ recorded by a visitor to a place, such as a school Images Animation sequences • picture of a vehicle’s licence plate as captured by a traffic camera • picture submitted as part of an application for a passport • a virtual egg timer displayed on screen indicating an action is in progress Audio Graphic objects Video • text ‘flying’ onto a slide during a presentation • notes produced by a musical instrument • voice interview recorded using a mobile phone • drawings • illustrations • YouTube video • Snapchat video Table 2.6 Primary media data types. 50 9781380023322_text.indd 50 31/10/2019 11:17 2 • Information processing ACTIVITY 2.2 Exploring forms of data In small groups, for each source of data listed in the previous activity: • Identify the key data in each document. • State the type(s) that the data item usually is. • Share your findings with the rest of your group. Document types used to collect, store and share data Document ▶ Human-readable document ▶ Machine-readable document ▶ Figure 2.3 A QR code that will take the user to www.macmillan-caribbean.com A document is printed or written, is usually paper-based, and is used to collect, store and share data. Documents may be generated by hand or by a machine such as a computer printer. Some documents may be read and processed by humans whereas others are read and processed by machines. A human-readable document is a document that may be read by a human but may not be in a form that a computer can automatically accept as input. An example is a handwritten list of vehicle parts. A machine-readable document is a document that can be read directly and understood by computer systems. Examples are documents that include barcodes and QR (scan) codes. QR codes are like barcodes but are made up of small black and white squares instead of lines (see Figure 2.3). Some documents can be both human-readable and machine-readable, for example a product label that contains text about the item and a barcode to identify the item. ACTIVITY 2.3 Exploring document types Examine the product label in Figure 2.4 closely and answer the questions in your notebook. Figure 2.4 A product label • State what type(s) of document the product label is. • For each type suggested, identify at least one form of data that will help to justify your suggestions. • Suggest what data item is most likely to be encoded in the barcode. 51 9781380023322_text.indd 51 31/10/2019 11:17 Theory Turnaround document ▶ Type Turnaround document A turnaround document is a printed document that has been output from a computer system and that contains machine-readable objects that will allow the same document to subsequently provide input to a computer system. A turnaround document helps an organisation to increase efficiency by reducing the time it takes for data entry and helping to minimise and eliminate data entry errors. Remember that hard copy is permanent printed output from the computer. Features Examples Hard copy document • parking tickets issued by automated parking kiosks • utility bills with detachable remittance/payment slips • boarding passes used for boarding aircraft and other • output by a computer system • received by end user • input back into the computer transport Machine-readable Hard copy document that has typewritten text, text written using special symbols, or codes (such as barcodes, QR codes) that can be automatically recognised by data capture devices Human-readable Hard copy document that has text and/or images that can be read and understood by a human • handwritten letters • shopping lists • books • product labels • utility bills • web page content Table 2.7 Comparison of document types (a) (a) (b) Figure 2.5 Source documents: (a) a handwritten list is a human-readable document, (b) a boarding pass containing human-readable text and a machine-readable barcode is an example of a turnaround document ITQ 2.6 • State ONE difference and ONE similarity between a machinereadable document and a human-readable document. It will come as no surprise that a company like Caribbean Travel Services uses a wide variety of documents. • An example of a human-only readable document is the mechanics’ parts list, handwritten as the mechanics examine a vehicle that is in for a service. • In the customer relations department, staff process applications for annual bus passes, which result in turnaround documents being produced. The customer receives this document, which contains the customer ID, the customer’s name, their photograph and a unique barcode. The barcode is scanned on every journey. This document is human-readable and machine-readable. • Head office produces documents including timetables, brochures, supply orders, business cards, invoices and application forms, to name a few. 52 9781380023322_text.indd 52 31/10/2019 11:17 2 • Information processing ACTIVITY 2.4 Creating a document scrap book of source documents • Collect examples of these documents: bank statement, business letter, delivery note, invoice, order form, point-of-sale transaction receipt and product label. Be sure to remove any personal data. • Paste each document in your scrap book. • Label each document as either human-readable, machine-readable or both. ITQ 2.7 Is a departure record an example of a human-readable or a machine-readable document or both? Figure 2.6 Example of a car park ticket issued by a kiosk Now try to apply what you have learnt to your own company. ACTIVITY 2.5 Creating documents for your company Use the company you created in earlier activities or use St Luago Fashion. • Discuss examples of the documents your company will need. You could start with: product labels, product specification, advertising brochure, stock check forms, staff application forms. • Identify each document as either human-readable, machine-readable or both. • Suggest any specialist input and output devices you will need to deal with these documents. 53 9781380023322_text.indd 53 31/10/2019 11:17 Theory Evaluating the reliability of information obtained from online sources ITQ 2.8 Which is likely to be more reliable: information taken from a respected newspaper or from someone’s blog? Reliability ▶ ITQ 2.9 Watch this video for an introduction to assessing the reliability of online information. How can you overcome bias? Earlier we discussed sources of data and information. One such place is ‘online’. By online, we mean Internet-based sources accessed primarily via the World Wide Web. These online sources may include databases, magazines, newspapers and news websites such as the BBC, CNN or Al Jazeera. Respected and reviewed journals, forums, blogs and social media sites are also online sources. Some other terms for online sources are electronic sources, web sources and Internet sources. The quality of data and information available from online sources will vary from one source to another. This is because the different authors will have differing motives for publishing the data and information. Additionally, each author may have taken differing levels of care to ensure that the information being presented is accurate and unbiased. While there are different ways to judge the overall quality of information, one generally accepted measure is its reliability. Reliability is the degree or extent to which the content of the information can be depended on to be accurate. Reliability has four characteristics: Characteristic Meaning Authenticity the information is real or true Lack of bias the information has been judged fairly and is not influenced by personal opinions Currency the information has the quality of belonging to the present time and is not out of date Relevance the information is connected or appropriate to its use Table 2.8 Characteristics that contribute to the reliability of information ITQ 2.10 Which reliability characteristic matches each situation? (a) Three independent eyewitnesses saw the accident. (b) Yesterday the eyewitness posted an account of the accident on his blog within five minutes of it happening. (c) Despite eyewitnesses being present, the suspect claimed he didn’t do it and that he was ‘an honest person’. (d) A passer-by was on their way to the shops. Persons who retrieve data and information from any source, but particularly online sources, should carefully evaluate the information to determine whether it is reliable. To do this, the user can test the information for authenticity, bias, currency and relevance. You should use only highly reliable information. In order to test the overall quality of the information, you will need to test the quality of each characteristic by conducting a ‘four-way test’: 1 Is the same data or information available from multiple independent sources? 2 Is the information presented in an impartial manner? 3 Is the information up to date? 4 Is the information appropriate for the intended purpose? If the answer to all four questions is yes then the information may be deemed to have excellent overall quality and may be used with caution. If the information scores three out of four, the quality is suspect and the information should be used with extreme caution. A score of one or two out of four is a definite red flag and the data should not be used. 54 9781380023322_text.indd 54 31/10/2019 11:17 2 • Information processing ACTIVITY 2.6 Exploring the reliability of online information Imagine you are preparing a short presentation on a topic of your choice. • Source two articles, ideally online, but newspaper and magazine articles can be used. • Apply the four-way reliability test. • What is the score you obtained? • Write a paragraph to explain which of the articles you would use (if any) and why. Now try to apply what you have learnt to your own company. ACTIVITY 2.7 Check the reliability of sources of information Use the company you created in earlier activities or use St Luago Fashion. Your company will have to rely on information from many sources. • Potential suppliers will provide product descriptions. Within the group discuss how you might judge the reliability of this information. • When your company is looking for new premises, an estate agent shows you the details of a property that has been on the market for two years. Discuss the problems with the reliability of the information in this document using the four reliability tests. Differentiate between verification and validation Verification ▶ Typographical error ▶ Transposition error ▶ In many situations data is collected on forms, which means that the data is in a human-readable format. In order to be processed by a computer, data needs to be input into the computer system. This may be done manually by a data entry clerk typing the data on a keyboard or by use of a data capture device such as a scanner or optical character recognition (OCR) device. Because humans are prone to making mistakes, measures must be put in place to identify and correct errors that may have been introduced during the data entry processes. A variety of verification and validation checks are used to identify and correct a number of errors that may occur. Verification is a process during which data that has already been input or captured is checked to ensure that it matches the data on the source document. Good verification significantly reduces the number of typographical and transposition errors that occur during data entry. A typographical error is a typing error that affects the text, such as missing or additional characters. Examples are: Guyyana and Britsh Virgins Islanbs. A transposition error is one caused by switching the position of two adjacent characters in a number or text string. Examples are typing $5,450 instead of $5,540 or Gyuana instead of Guyana. Figure 2.7 and Table 2.9 provide examples of the types of errors that may be classified as typographical and transposition errors. 55 9781380023322_text.indd 55 31/10/2019 11:17 Theory In othre news, toady the local boys' circket team takes on their local rvials for the inter-schol championship cup. The macth will start at 4pm on the recreaton ground. Figure 2.7 Typographical and transposition errors ITQ 2.11 State whether each of the following is a typographical or transposition error: (a) 1659 instead of 1569 (b) 4300.00 instead of $300.00 (c) 2345 instead of 2435 (d) Cookies 7 cream instead of Cookies & cream (e) Guyaana instead of Guyana. Data collection Description What was written/typed Correct data Typographical errors Missing character A290312 A2930312 Missing text [Nothing] SLG Incomplete text SL SLG Incorrect text SLU SLG LU840 LU804 A2933012 A2930312 1909 1099 31-21-2012 31-12-2012 Transposition errors Swapping the position of two adjacent characters Table 2.9 Examples of typographical and transposition errors Validation ▶ Validation is a checking process in a program which is aimed at finding out if the data is genuine. Validation ensures that data entered into a database form, web form or computer program conforms to a set of validation rules and may include a presence check to check whether the data is present, or a range check, for example to ensure that the data is between 1 and 100. Any data that is invalid is rejected by the validation process and must be corrected before the data is accepted. Validation checks include: • range check • reasonableness check • data type check • consistency check • presence check • format check • length check. ITQ 2.12 Scan to learn about validation rules in Excel. What does range check validation prevent? The main difference between verification and validation is that verification checks the data being input to the system while validation authenticates the data once it is in the system. Verification is carried out by humans; validation is carried out by the computer. 56 9781380023322_text.indd 56 31/10/2019 11:17 2 • Information processing Methods of verification: double entry and proofreading The two main methods of verification for detecting typographical and transposition errors are double entry and proofreading. Double entry is a data verification method that requires that the data is entered twice; this should be done by two different data entry clerks and both entries are checked against each other to ensure that they are identical. If the two copies are the same we can be sure the data has been input without any errors. Some online forms utilise double entry to verify data items such as passwords and email addresses, although this is not as reliable as when two independent persons enter data. Proofreading is a manual method of verification during which a data entry clerk visually checks the source document against data that has already been input by another data entry clerk. Proofreading is less reliable than double entry verification but it is significantly quicker. Double entry ▶ Proofreading ▶ ITQ 2.13 Suggest why proofreading is a quicker method of verification than double entry verification. Verification is a manual process carried out by humans. All data entry at Caribbean Travel Services is verified by double entry verification. Figure 2.8 (a) shows a picture of a departure record, a paper-based document completed by passengers departing the island of St Luago, which could be used during proofreading verification. (a) Please retain Departure Record for presentation upon departure Departure (b) DEPARTURE RECORD (B) 1. Flight / Vessel Name 2. Port of Final Destination 3. Last Name 4. First Name 5. Middle Name 6. Date of Birth D D 9. Nationality 7. Sex M F M M Y Y 10. Country of Birth Signature B CUL DIP 8. Passport Date E H NE PR RR RRV S T UL UN V Figure 2.8 (a) Source document (b) A data entry screen used for capturing passenger departure information 57 9781380023322_text.indd 57 31/10/2019 11:17 Theory ACTIVITY 2.9 Proofreading Best done in small groups so that members of the group can compare results. Paragraph 1 “The delivery ceremny of 3 new luxury busses, which were recentllly purchased by the Caribbean Travel Services Company, will be held on Wednsday, June 27th at Caribbean Trvl Services’s head office at 10:30am. Members of the public are invited to join the drivers, conductors and general staff at 17 Main Street, Quenestown for the ceremony. The short ceremony will followwed by live entertainment and members of the public will have the opportunitty to experience the luxury of these vehicles with short tours round the city centre. We look forward to greeting you for this special occasion.” Paragraph 2 “The delivery ceremony of 3 new luxury buses, which were recently purchased by the Caribbean Travel Company Services, will be held on Wednesday, June 27th at Caribbean Travel’s head office at 10:30am. Members of the public are invited to join the drivers, conductors and general staff at 17 Main Street, Queenstown for the ceremony. The short ceremony will be followed by live entertainment and members of the public will have the opportunity to experience the luxury of these new vehicles with short tours round the city centre. We look forward to greeting you for this special occasion.” Consider the two paragraphs displayed above. Paragraph 2 is the corrected version of paragraph 1. • Read paragraph 1 and correct the errors as you find them. • Determine the type(s) of errors that were found. Comment on whether they are all of the same type and why this is so. • Using a ruler or sheet of paper as a guide, read both paragraphs line by line. Make a note of differences between the paragraphs. Did you identify any additional errors? If yes, comment on why these were not found when you read the paragraph the first time. • What insights have you gathered about proofreading as a method of verification? ITQ 2.14 Missing data is one example of an error that should be detected by verification. Give TWO other examples of the kinds of errors that may be present on a document such as a completed job application form. Now try to apply what you have learnt to your own company. ACTIVITY 2.9 Checking data is input to your company computer system correctly Use the company you created in earlier activities or use St Luago Fashion. • In the group decide what steps your company will take to ensure that data is input correctly. • Record your findings in your notebook. 58 9781380023322_text.indd 58 31/10/2019 11:17 2 • Information processing Methods of validation We have seen that validation is a process that ensures that data entered into a computer system conforms to a set of validation rules. Validation checks include: • range check: is the data value within the expected range? (Example: number of passenger seats in a vehicle must be in the range 4–68.) • reasonableness check: is the data reasonable within the context? (Example: it is unreasonable for an employee without a driving licence to be allocated the role of driver.) • data type check: is the data of the intended data type? (Examples: ‘colour’ must be text; ‘length’ must be a number.) • consistency check: does the data relate correctly to other data? (Example: if type is minibus then number of seats must be less than 20.) • presence check: is data present? (Example: all fields that are marked ‘required’ must have data entered.) • format check: does the data conform to the format required? (Example: date must be in the format dd/mm/yyyy.) • length check: is the data of the correct length? (Example: year of birth must be four digits, e.g. 2004.) Table 2.10 provides an outline of each of the validation checks and examples of the types of errors the particular validation process might pick up. Method Ensures that … By … For example Range check the data entered falls within the expected range checking that an input value is within a predetermined range of values A month must be in the range 1–12, an examination score must be in the range 0–100. Reasonableness check the input conforms to specified criteria comparing the input value with expected reasonable values or testing it based on set rules A field that requires ‘number of CSEC passes’ may flag an entry of ‘55’ because the rule may say that a reasonable range is 0–5. Data type check comparing an input value with the type of data data entered in a particular field is correct permissible for the specified data type for the data type defined for that field Consistency check the data does not contradict other data in the set Presence check data has been entered in enforcing a rule that the field cannot be left the field blank/empty Date of birth must be present on an application to join the under-15s team. Format check data is supplied in the format expected checking the character type (numeric, alphabetic, symbol) entered at each position in a field An ID number may be in the form A99– 9999 where the ‘A’ represents a character between ‘A’ and ‘Z’ and the ‘9’ represents any value 0 to 9. Length check the data isn’t too short or too long counting the number of characters entered and An eight-character ID number will be comparing it with what is expected checked to ensure that only eight characters are accepted. detecting whether the current value is in contradiction with other data or a reference data item (i.e. the standard data expected) An integer-type field will typically expect a whole number, so a value such as ‘1.2’ will result in an error since the ‘.’ is not expected. If the ‘date of final exam’ field is empty, then there should not be any data in the ‘year of graduation’ field. Table 2.10 Validation methods 59 9781380023322_text.indd 59 31/10/2019 11:17 Theory ITQ 2.15 A student is required to complete a form by writing his full name, class, email address and student ID number. In addition to a presence check, state one other validation check that should be carried out on each data field to ensure that good quality data is collected. (a) (b) Figure 2.9 Software programs such as Microsoft Excel can (a) automatically apply validation rules and (b) give the user a friendly message indicating the error and asking them to try again ACTIVITY 2.10 Developing a data validation plan • Select three documents from your scrapbook. • On each document, select three different data fields. • For each field, suggest all the appropriate validation methods that could be used to validate the data being collected in that field. • Present your results in a tabular form. • Share your findings with the class by displaying your table on the class noticeboard. Now try to apply what you have learnt to your own company. ACTIVITY 2.11 Developing a validation plan for your company Use the company you created in earlier activities or use St Luago Fashion. Potential new staff are required to fill in an online application form. In the group decide what questions will appear on the form and the validation checks that might be applied. Use the following suggestions for required information to get started: • First name • Position applied for • Last name • Driving licence • Date of birth • Required salary 60 9781380023322_text.indd 60 31/10/2019 11:17 2 • Information processing File organisation File ▶ When data has been input, verified and validated it usually ends up stored in a file. A file is a container in a computer system for storing data, information or programs. Files usually exist permanently on a secondary storage media. Disk drives (HDD and SSD), USB pen drives and DVDs are all types of secondary storage media. File access methods The term ‘file access methods’ can have two meanings in Information Technology: 1 How data is stored in the file. 2 How files are stored on the storage media. We need to be clear about the similarities and differences. The important words are: • serial • sequential • random and direct. ITQ 2.16 What is the primary use of a computer file? ITQ 2.17 What is the main difference between serial and sequential access? Consider these simple examples relating to how we can read text: ‘Serial access’ means to start at the beginning and read to the end in one go. Serial access – reading in the order in which the words were written – is great for a short magazine article but not so good for a long book. To read Chapter 3 the day after reading Chapters 1 and 2, you have to read Chapters 1 and 2 again just to get to Chapter 3. ‘Sequential access’ requires the material to be ordered in some way. If the book’s publisher sequenced the chapters in order then we could access Chapter 3, or any chapter we want, more quickly than for serial access, as described above. A simple method to find the chapter we want is to open the book halfway through and see what chapter we are in. Now we can decide if the chapter we want is in the first half of the book or the second half. Repeat this procedure in half of the book, then quarter of the book, and continue until you find the chapter you are looking for. You use this same technique, technically called a ‘binary chop’, when searching for a word in the dictionary or looking up someone’s telephone number in a directory. In both these examples the data is ordered in alphabetical sequence (order). ACTIVITY 2.12 Dictionary search Find the word ‘technology’ using the binary chop method in a dictionary. • How many pages in the dictionary did you have to look at? • How many pages are there in the dictionary? Race against a partner to find the word ‘information’. 61 9781380023322_text.indd 61 31/10/2019 11:17 Theory Random and direct are the final methods of access. In the reading example above, random and direct access allows us to jump straight to the required chapter. If the publisher of the book has provided a table of contents, we can quickly jump to the right page by looking up the chapter in the table of contents. Figure 2.10 A table of contents helps the reader to quickly find a particular chapter (A special case of random and direct access that is useful to computer programmers is if every chapter is exactly 10 pages long. In this case the table of contents is not needed. For Chapter 5, we can calculate: 5 (chapters) × 10 (pages) to work out that Chapter 5 starts on page 40 and ends on page 50. This allows for very quick access to any chapter in the book.) Technology such as an eBook reader works by utilising direct access. ACTIVITY 2.13 Serial, sequential, random and direct access 1 With the permission of the librarian, one member chooses one book at random and remembers the title. 2 Reveal the name of the book to the rest of the group, who must find the book without using the catalogue (serial access). 3 One member chooses one book at random and remembers the Dewey Decimal number. 4 Reveal the Dewey Decimal number of the book to the rest of the group, who must find the book without using the catalogue (sequential access). 5 Each group member can now select a book by name and find it using the library catalogue (direct access). Discuss your findings within your group. Now we need to apply these ideas to Information Technology. 62 9781380023322_text.indd 62 31/10/2019 11:17 2 • Information processing How data is stored in the file Serial file access ▶ Sequential file access ▶ ITQ 2.18 Why is an index required when using direct access? First we will look at the ideas of serial, sequential, direct and random access as they apply to how data is stored in the file. Serial file access is where the data is stored in the file in the order in which the data was written to the file. For example, when you save and close a text document you have been working on, the words are stored in the file in the order they appear on the page. When you open the file again the words are read back into memory in the same order. This is just what you would expect. Serial files are easy and efficient to use when the whole contents of the file can easily be held in the computer’s main memory (RAM). A range of applications such as word processing, spreadsheet, photoediting, music player and desktop publishing applications uses serial file access because of its simplicity. In sequential file access, data is stored in an ordered way or in sequence. An example of sequential access in a file is storing a telephone directory. The data is stored in the file in ‘family name’ order and is read out of the file in ‘family name’ order. If the telephone directory is so large that it will not all fit into main memory (highly unlikely on modern computers), then sequential file access is better than serial access. For example, if we aren’t sure that the Miller family has a telephone number, we can open the file and start to read the records. We either find the record for the Miller family or we reach the record for the Morgan family, which alphabetically comes after ‘Miller’. If we reach the Morgan family, we know the Miller family doesn’t have a phone number listed in the directory. When compared to a serial file this system is more efficient because in serial files every record in the file would have to be read because the Miller family record might be the last record in the file. ITQ 2.19 How is the data in a filing cabinet organised for quick access to a particular file? Figure 2.11 A telephone directory As we will see in the next section, random access and direct access don’t usually refer to how data is stored in a file. Having looked at how data is stored in a file, we look in the next section at how files are stored on storage media. 63 9781380023322_text.indd 63 31/10/2019 11:17 Theory How files are stored on storage media Now we will look at the ideas of serial, sequential, direct and random access as they apply to how data is stored on storage media. To understand how files are stored on storage media consider a simple example of how books are stored in a library. Serial file access to files stored on a storage medium ITQ 2.20 Why are backup files usually stored on serial media like magnetic tapes? Backup ▶ System backup ▶ Archiving ▶ Files are stored on a storage medium in a serial way when they are stored in the order in which they were written. Consider books in a library: serial file access would be putting books on the shelves in the order in which they arrive in the library. Finding a particular book involves looking along all the shelves until the required book is found. Serial file access is simple but very inefficient. Serial access is usually only used on secondary storage devices when there are a small number of files that are not accessed very often. System backup and archiving are examples of programs that deal with a small number of files that are not accessed very often and so serial access may be appropriate. Backup is the copying of files to a separate, removable storage device so that they can be restored to the original location if the original data is ever lost or destroyed. A system backup is a copy of all the files on a computer system that can be used to restore the whole computer after a case of hardware failure or data loss. Archiving is storing files that are accessed only infrequently, and modified even less frequently, on another storage device. Archive storage media like magnetic tape is usually less expensive than other types of storage but it is much slower when looking for a particular file. The security of data is important at Caribbean Travel Services, so regular backups of important files are made to high-capacity magnetic tape media at the end of every day. At the end of every year CTS archives the ‘Journeys’ database table in preparation for the start of the new year. This archive is placed in a waterproof, fireproof cabinet for safekeeping. Sequential file access to files stored on a storage medium ITQ 2.21 Scan to watch an explanation of sequential and direct access. Which is faster, sequential or direct access? Consider again books in a library; in a sequential system books are stored on the shelves in order of their Dewey Decimal number. To find a book with a particular Dewey Decimal number, you can guess where the book might be on the shelves, go to that location and then decide if the book is to the left or the right and make another guess. You use the same ‘binary chop’ technique when searching for a word in the dictionary or looking up someone’s telephone number in a directory. In both these examples the data is ordered in alphabetical sequence. Conducting a search using the ‘binary chop’ method (see Figure 2.12): the numbers represent the page numbers in a 15-page book. To find page 13 you only have to look at 4 pages. Open the book halfway through, page 8 – the page we are looking for, 13, is in the last half, so ignore the first half of the book. Open the remainder halfway through, page 12 – the page we are looking for, 13, is in the last half, so ignore the first half. Open the remainder halfway through, page 14 – the page we are looking for, 13, is in the first half, so ignore the last half. Open the remainder halfway through, page 13 – success, having only looked at 4 pages: 8, 12, 14 and 13. 64 9781380023322_text.indd 64 31/10/2019 11:18 2 • Information processing 8 4 12 2 1 6 3 5 10 7 9 14 11 13 15 Figure 2.12 Conducting a search using the ‘binary chop’ method. To find page 13 you only have to look at three pages – 8, 12, 14 – before finding page 13 Files are stored on storage media in a sequential way when they are stored in some sort of sequence. Magnetic tapes can store files sequentially. However, this type of storage method is largely historic, rather like the old music cassette tapes that stored songs sequentially and you had to fast-forward to where you thought the particular song might be. These old cassette devices have been replaced by MP3 players that use direct access to go straight to the required song. Historically, sequential file storage on magnetic tapes was used for payroll applications. ACTIVITY 2.14 Exploring access methods A telephone directory is sorted by family name: • How does storing the information in this way help when trying to find a particular family’s telephone number? • Does storing the information in this way help if we have only the family’s address? • Discuss your results with the class. Random file access to files stored on a storage medium Random access and direct access are often used interchangeably. One common way to distinguish between them is the following: • Random access: the organisation of data in main memory (random access memory or RAM). • Direct access: the organisation of files on a disk drive. Random access ▶ In random access, data can be quickly accessed wherever it occurs in main memory. Think about a table of values held in main memory. Given the column and row it is very quick and easy to access the particular cell value. Direct file access to files stored on a storage medium Direct access storage media ▶ Direct access storage media is secondary storage where each file has a specific location or unique address in the storage, allowing it to be accessed quickly. 65 9781380023322_text.indd 65 31/10/2019 11:18 Theory Consider books in our library again; in direct access finding a book involves accessing the library catalogue, which tells you exactly where a particular book is shelved so you can go directly to the book. Direct access storage media like flash drives, solid state disk drives and hard disk drives manage the files and the index so an application program can simply request access to a particular file. That is like you simply asking the library staff for a particular book: they find it for you and bring it to your desk. To clarify these ideas here is a complete example. , The finance department at Caribbean Travel Services maintains many spreadsheet files held on a hard disk drive. When the spreadsheet application opens the file, the operating system asks the hard disk for the file. The hard disk drive’s electronics looks up the name of the requested file in its index to find its address and then accesses the file directly (direct access). Data is stored in the file serially so the application reads each value in turn and puts it into a table in memory (serial access). Now that all the data is in main memory it can be quickly accessed and updated by the spreadsheet program using random access. When closed, the spreadsheet program writes the values in the table back into the file in serial order, ready for the next time the file is needed. ACTIVITY 2.15 Race against a classmate Suitable for pair working. • Find a dictionary (an example of a sequential book). • Find a novel (an example of a serial book). • See who can find the word ‘random’ in their book the quickest. • Suggest reasons for your result. Choosing an appropriate file access method Real-time system ▶ Over the years, operating systems and the electronics built into storage devices have improved to the point where they are largely smart enough to make decisions about how files will be stored. Software developers of programs such as archiving, payroll and online banking ensure that they select and use the most appropriate file access methods. Table 2.11 examines three application areas: archiving, payroll processing and real-time systems (for example, online banking and airline ticketing). The table states the most appropriate file organisation method for each application area and suggests reasons why this is so. A real-time system is a computer system where response time is critical. Example: computer systems controlling self-driving cars have to be real-time systems. 66 9781380023322_text.indd 66 31/10/2019 11:18 2 • Information processing Application area Suggested file organisation method Reason for selecting method Archiving and backups serial A full system backup of a computer system’s hard disk drive involves writing the entire contents of the disk drive to a different storage device. If it is ever needed, the backup copy is written back onto the hard disk in the same order in which it was written to the backup. Payroll processing sequential Historic payroll systems had at least one sequential master file and one or more sequential transaction files. Information in the files was stored in order of employee ID. The files were processed in order, one record after the other, starting with the first record in the master file. Real-time systems random and direct A real-time system has to be highly efficient and will therefore use random access for data that is in main memory and direct access to files stored on secondary storage. ITQ 2.22 A 10 × 10 table is held in memory. If row 1, column 1 is memory location 1, then what memory location is row 5, column 3? Table 2.11 Appropriate file organisation for selected applications ACTIVITY 2.16 Selecting appropriate file organisation methods for particular applications Copy the following table into your notebook. Application area Suggested file organisation method Reason for selecting method A shopping list serial reminder application sequential A banking application The vast amount of data received from the scientific space satellite is stored day-by-day on magnetic tape. Magnetic tapes are an economical way to store vast amounts of data. random and direct • Complete the table with the name of the application area (in column 1), the proposed organisational method (in column 2) and a reason for the selection (in column 3). Now try to apply what you have learnt to your own company. ACTIVITY 2.17 Selecting appropriate file access methods for your company Use the company you created in earlier activities or use St Luago Fashion. An older member of the Board of Governors wants the company to use sequential access on a hard disk drive to store company files. Create a short summary document to explain to the Board why this is not a good idea. 67 9781380023322_text.indd 67 31/10/2019 11:18 Theory Summary • Data is raw, unprocessed facts. This may be facts about • Range check, presence check and format check are three persons, places, things or events that have been collected through observation or measurement. examples of validation used to check that the data entered is correct. • Information is useful, meaningful knowledge derived from • Serial access is when access is in the order in which the data raw data. • Data can be from direct measurement or from observation by an indirect source. • Document was written. • Sequential access is used when data is stored in an ordered way or in sequence. types include: human-readable, machinereadable or both. • Random access is how the microprocessor accesses data in • A turnaround document is an output document that is • Files stored on a hard disk drive are accessed by direct subsequently used as input to another computer system. • Information always needs to be checked to ensure that it is authentic, unbiased, current and relevant. main memory. access using an index. • Archiving often uses serial access files on magnetic tape. • Double entry and proofreading verification are ways to check that data has been input correctly. Answers to ITQs 2.1 Facts are raw data about a person, event or thing, so you may have included height, weight, eye colour, hair colour or foot/shoe size as data about a person. 2.2 The automatic measurement is likely to be more reliable than your friend’s reporting of their time. Their report may be biased as they want a fast time. 2.3 Measurements are usually taken automatically using sensors; observations are usually recorded on a form before being input into a computer system. 2.4 The information on a flight departure card may include: passenger name, nationality, passport number, destination, departure port, ticket reference and journey reference. 2.5 Paper-based forms may include surveys on: traffic control, satisfaction feedback, voting intentions, social media usage or TV-watching habits. 2.6 Machine-readable documents can be automatically read by an input device. Human-readable documents may not be able to be read automatically by an input device. Both a machine-readable document and a humanreadable document may be read by a human. 2.7 A departure card is both machine-readable and humanreadable. 2.8 Information taken from a peer-reviewed journal is more reliable than an individual’s blog because it has been checked by knowledgeable experts. 2.9 To avoid bias web pages always focus on the facts and check multiple websites. 2.10 The information is a Reliable. The fact that there was more than one independent report improves the reliability. b Timely. Because the information is only days old. c Biased. Because the suspect is likely to be biased. d Not relevant. Because the passer-by is not relevant to the incident. 2.11 The errors are: a Transposition error 1659 instead of 1569 b Typographical error 4300.00 instead of $300.00 c Transposition error 2345 instead of 2435 d Typographical error Cookies 7 cream instead of Cookies & cream e Typographical error Guyaana instead of Guyana. 2.12 Range check validation prevents users entering values that are outside a predefined range. 2.13 Proofreading is quicker than double entry verification because it involves typing in the data only once. Double entry requires the data to be typed twice, which takes longer. 2.14 Common errors on written and typed documents are transposition and typographical errors. 2.15 Validation checks on data may include: a full name: type check, must be a character string b form: range check, the form must be 1–60 c email address: format check, emails must be of the form …@... d student ID: type check, must be a number. 68 9781380023322_text.indd 68 31/10/2019 11:18 • The computer 2 •1Information processing system 2.16 A computer file is used to store data, information or programs. 2.17 The difference between sequential and serial access is that sequential access requires the records to be sorted in some way. Serial files do not need to be sorted. 2.18 Direct access needs an index so the location of a file can be looked up to allow quick access. 2.20 Direct access is faster than sequential access. 2.21 Magnetic tapes are very economical removable storage media. 2.22 To calculate the location of the item in row 5 column 3: 4 rows of 10 to get to row 5 is 40, plus column 3: 4*10+3= 43. The location is the 43rd in the table. 2.19 Data in a filing cabinet is usually organised alphabetically. Examination-style questions: Multiple Choice Instructions: Each item in this test has four suggested responses labelled (A), (B), (C) or (D). Read each question carefully then select the most suitable response. 1) 2) 3) 4) Which of the following statements are TRUE about information? I It takes the form of numbers only. II It may be presented as symbols, pictures or sounds. III When in the form of words or numbers, it must be presented so that it is meaningful. IV It may be produced by counting, sorting and carrying out mathematical computations on numeric values. A) I and IV ONLY B) II, III and IV ONLY C) II and III ONLY D) II and IV ONLY Which of the following statements DOES NOT represent information? A) The number is 650. B) The average number of meals sold last week was 73. C) The last flights leaving today are 1552, 1500 and 1502. D) The first flight that departed Port of Spain yesterday was 1552. Which of the following statements is UNTRUE about an attendance register used by a homeroom teacher to record daily attendance of students? A) It is human-readable. B) It is a source document. C) It is a turnaround document. D) It contains both data and information. An automated parking attendant at a parking lot issues a printed ticket to motorists when they park. Which of the following statements about the ticket are most likely true? I It is hard copy. II It is soft copy. III It is human-readable. IV It is machine-readable. A) I and III ONLY B) II and III ONLY C) II and IV ONLY D) I, III and IV ONLY 5) A website with a ‘last updated’ date more than a year ago may be an unreliable source of information because of its A) authenticity B) currency C) level of bias D) relevance 6) Which of the following statements are TRUE about data verification? I It is performed by a human. II It is performed by a computer system. III It may be implemented using proofreading. IV It includes methods such as range check and data type check. A) I and III ONLY B) II and III ONLY C) II, III and IV ONLY D) II and IV ONLY 7) Which statement is UNTRUE about length checks? A) It is a data validation method. B) It can be applied to numeric fields only. C) It is carried out by the computer system. D) It can be applied to text and numeric fields. 8) Which of the following is NOT a validation check? A) range check B) consistency check C) random check D) format check 9) Writing ‘757’ instead of ‘775’ is an example of a _______________ error. A) data type B) proofreading C) transposition D) typographical 10) Accessing records in a file in the same order in which they were written is an example of what type of file organisation? A) direct B) random C) sequential D) serial 69 9781380023322_text.indd 69 31/10/2019 11:18 Theory Examination-style questions: Structured 1) The LLF Law Firm purchases office supplies from OSD Office Supplies Depot. The illustration below shows the process and information flow involved in the requisition, ordering and delivery process. PROCESS 1 Form U Admin assistant LLF Law Firm prepares office supplies requisition (form U) by hand PROCESS 1 Form U Form U Admin assistant checks computerised version to ensure it matches what she wrote on the original document Purchasing officer at LLF Law Firm keys data from Form U into computer system Document W Document Y Updated invoice sent along with office supplies via delivery van to LLF Law Firm a) b) c) Document X Printed invoice sent by bearer along with cheque to OSD Invoice with barcode generated by computer and automatically emailed to Purchasing officer Client service rep at OSD Office Supplies retrieves email attachment (Document V) and uses data to generate an invoice (Document W) using his specialised invoicing software Document V Purchasing officer generates purchase order (Document V) using the computer system and sends as an email attachment Using the letters U to Y, state which document(s) is/are i) hard copy ii) soft copy iii) human-readable iv) machine-readable v) turnaround document [5] State ONE item of data that is likely to be found on i) U but not V ii) W but not V iii) Y but not W [3] The admin assistant at LLF visited the web page of OSD in order to find out the correct product names, specifications and item numbers. The web page was last updated one year ago. Explain why the information retrieved may be unreliable. [3] d) In order to ensure the correctness of the purchase order, the ordering process included two important processes – Process 1 and Process 2. i) Name these two processes. [1] ii) State the name of THREE methods of checking the input data that are likely to be used during Process 1. [3] iii) Use an example to explain how ONE of the above methods work. [2] e) Both LLF and OSD used computer-based application software to generate the purchase order and invoice respectively. The data files used by these software systems are stored on internal hard drives installed on the companies’ desktop computer systems. i) Name the method of file organisation MOST LIKELY used by the application software systems. ii) Justify the reason for your selection in part (e) i). [1] [2] Total 20 marks 70 9781380023322_text.indd 70 31/10/2019 11:18 3 By the end of this chapter you should be able to: Computer networks and web technologies Computer networks and web technologies are now key components in Information Technology. Knowledge of these areas will help you to understand, and better utilise, the capabilities and facilities offered by computer networks and the Internet. This chapter will increase your awareness and understanding of basic networking concepts. The components of networks are described including router, switch, hotspot and transmission media. The terminology associated with the Internet and its interrelationship with the World Wide Web are also explored. ✔✔ Distinguish among types of networks based on key characteristics. ✔✔ Explain the functions of basic networking components. ✔✔ Assess the importance of mobile communication technologies. ✔✔ Explain the interrelationships among key web technology concepts. Computer networks and web technologies Introduction to computer networks Types of networks LANs, MAMs and WANs Mobile networks as common carriers From 2G to 5G Wireless network technologies Basic components of a network Transmission Connection devices media Physical wired transmission media Wireless transmission media Mobile communications Network cards and adapters Mobile networks in education, commerce and journalism Web technologies HTML URLs Interacting with websites Email Networks and privacy 71 9781380023322_text.indd 71 31/10/2019 11:18 1 • Computer Fundamentals Theory Introduction to computer networks Computer network ▶ Mobile network ▶ ITQ 3.1 Why might someone on the move want to join a computer network? A computer network is a group of computing devices that are connected together so that they can share data and resources. A mobile network is a network of communication and computing devices where the last link is over a mobile phone network. Originally developed for mobile phone systems, mobile networks now carry data as well as voice communication. Persons on the move with smartphones can now join a computer network. Computer networks are needed because organisations want to communicate with others and share data files and other resources. Computer networks at CTS are integral to how the company functions. Some of the newer buses are fitted with Wi-Fi, accessed using a mobile network, allowing passengers to access the Internet when travelling on the bus. Employees of CTS want to be able to communicate with each other using email. All the computers in CTS head office need to access the company printer and so need to be connected together. All these tasks are achieved by networking computers together. ACTIVITY 3.1 Uses of a network in your company Use the company you created in the Introduction or use St Luago Fashion. • Discuss how the employees and management in your company will need to communicate and share data and resources. • Select three employees and create a short report outlining the tasks these employees will be able to achieve using the company network. • Display your report on the classroom noticeboard for the rest of the class. Wi-Fi ▶ ITQ 3.2 a) What is the main difference between a wired and a wireless network? b) Give ONE advantage of using a wireless network. Most modern computing devices have networking facilities built in. Desktop computers and laptops will usually have a network port into which a physical network cable can be plugged and a wireless network adapter allowing the computer to join a Wi-Fi network without a physical cable. Smartphones are able to connect to a mobile network and they also include a wireless Wi-Fi network adapter. Wi-Fi is a standard for wireless communication between computing devices. In a wired network computing devices communicate using physical wires. In a wireless network computing devices communicate using electromagnetic (radio) waves of different frequencies. Types of wireless communication are Bluetooth, Wi-Fi and mobile 2G (second generation), 3G, 4G – but more about them later. Most networks are a combination of wired and wireless. Networks range from a few computers connected together in an office to billions of computers connected together to create the Internet. 72 9781380023322_text.indd 72 31/10/2019 11:18 3 • Computer networks and web technologies ACTIVITY 3.2 Advantages and disadvantages of mobile networks 1 2 3 List the names of mobile network providers in your territory. Discuss the advantages and disadvantages of a mobile network when compared with a traditional wire-based telephone system. You may start by considering coverage, cost and availability of alternatives. Elect one member of the group to present a summary of your findings to the rest of the class. Distinguish between different types of network: LANs, MANs and WANs A computer network may be classified based on its geographic span. Computer networks are designed to meet the data communication needs of individuals and organisations. A small network may connect computers in multiple rooms in a building; large networks may connect computers in different countries. The three types of network based on geographic span are discussed below. Local area networks Local area network ▶ Local area networks are everywhere! A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, laboratory or office building. Chances are there is a government office or a private organisation nearby that has a LAN in operation. The computer lab at your school may well have a local area network in operation. As a matter of fact, there may be more than one LAN in operation at your school. hub Figure 3.1 A four-computer local area network using a hub The network within the head office of Caribbean Travel Services is a local area network allowing staff to share a single Internet connection, printers and files. 73 9781380023322_text.indd 73 31/10/2019 11:18 Theory Metropolitan area networks Metropolitan area network ▶ ITQ 3.3 a) What does the L in LAN stand for? b) What does the M in MAN stand for? A metropolitan area network (MAN) is a computer network in a geographic area or region larger than that covered by a LAN. A number of Caribbean governments have already started to set up metropolitan area networks. These networks give employees around a town or city access to a range of government information and services. Private sector businesses have also set up MANs in cities and towns across the Caribbean. A local supermarket chain will have branches throughout the city. Each branch will have one or more local area networks but they will all be networked to the head office in the city centre, creating a metropolitan area network. At Caribbean Travel Services the maintenance garage, the bus depot and the head office are located in the towns from which the company operates. Each has a LAN within the building but the sites are connected together to form a MAN. Wide area networks Wide area network ▶ A wide area network (WAN) is a computer network in which the computers connected may be far apart, even in different countries. WANs provide national, regional and international organisations with the connectivity needed to sustain their operations. Large financial institutions, utility companies and telecommunications service providers are some of the types of organisations that set up and operate WANs. You are able to use your bank card to access funds at an automated teller machine anywhere in your country (and even regionally and internationally). This is due to the fact that your bank operates a WAN either singly or in collaboration with other institutions. ITQ 3.4 a) What type of network does your local dental practice use? b) What type of network does your international airline use? c) What type of network does your district government use? Figure 3.2 Wide area networks are used to provide ATM services such as balance enquiries and cash withdrawal locally and internationally 74 9781380023322_text.indd 74 31/10/2019 11:18 3 • Computer networks 1 • Computer and web fundamentals technologies As Caribbean Travel Services expanded, it set up operations offices, maintenance offices and bus depots in different towns and it hopes to expand into different territories. The networks in each town need to be connected to head office so a WAN is needed. ACTIVITY 3.3 Choosing the best geographic network for your company Use the company you created in the Introduction or use St Luago Fashion. • Discuss what sort of network might be most suitable in the early years of your company’s development. • Will the network requirements change as you open a second and third location? • Be prepared to answer your teacher’s questions about your results. In addition to LANs, MANs and WANs, mobile networks introduce a new dimension to networking. A computer network using a mobile network effectively extends the physical distribution of a network to anywhere that receives a mobile phone signal such as onto buses. ria f Pa lf o Gu Figure 3.3 Map of Trinidad showing routes with Wi-Fi enabled buses. Source: http://ttwifii.gov 75 9781380023322_text.indd 75 31/10/2019 11:18 Theory Mobile networks as radio-based common carriers Common carrier ▶ ITQ 3.5 Where are the THREE nearest mobile phone masts to your school? Recall that a mobile network is a network of communication and computing devices where the last link is over a mobile phone network. Mobile network services are operated by a few large companies in each country, for example Digicel and FLOW. Many computer networks rely on mobile networks to provided additional flexible connectivity. A common carrier is a company that offers communication services to the general public. Mobile networks started life as networks for cellular phones. They are called cell phones because of the way in which mobile networks work. A mobile phone mast has a radio transmitter and receiver at the top. The signals from the mast reach out in a circle – or cell. Any mobile phone within that cell can communicate with the mast. In a city there are many hundreds of masts spread throughout the city area so that their cells overlap. All the masts are networked together so a mobile phone in one cell can communicate with a mobile phone in the same cell or another cell. From its early days this system has expanded and now covers the majority of urban areas around the globe. One particularly clever aspect of a mobile network is that if you leave one cell and enter another, your communication device automatically disconnects from one mast and reconnects to the new mast without any interruption to service. Mobile networks continue to expandin coverage, speed and capacity. Figure 3.4 A mobile network mast Mobile wireless standards: from 2G to 5G First there was mobile technology, then second-generation mobile technology (2G). As of 2019, 3G and 4G are in widespread use around the Caribbean and the world. The change from 2G to 3G was a major breakthrough in communications. 3G receives a signal from the nearest mobile phone tower and is used for phone calls, messaging and data. It is generally accepted that 4G works the same as 3G but with a faster Internet connection. 4G claims to be around five times faster than existing 3G services. 76 9781380023322_text.indd 76 31/10/2019 11:18 3 • Computer networks and web technologies ITQ 3.6 State ONE similarity and ONE difference between a computer network and a mobile network. Technology generation Expected download speed 1G up to 2.4 kbps (kilobits per second) 2G up to 64 kbps 3G up to 5 mbps (megabits per second) 4G up to 25 mbps Table 3.1 Comparing potential speed of different generations of mobile networks By the time you are reading this book 5G will already be widely available. Mobile network operator (Common carrier) Data (voice/video/text) sent as mirowave signal from mobile device registered on common carrier’s network Microwave signal received from customer and relayed to destination using the infrastructure operated by the common carrier Customer 1 at location A Microwave signal from original customer relayed to its destination Customer 2 at location B Figure 3.5 Interrelationship of network components on a mobile network Now try to apply what you have learnt to your own company. ACTIVITY 3.4 Mobile networks for a growing company Use the company you created in earlier activities or use St Luago Fashion. • Review the activities your company will perform. • Identify activities that involve employees travelling. • Find out what generation of mobile network is available in your location: 3G, 4G or 5G. • Discuss if the employees will need to use mobile networks to connect to the company network. • Record your results in a list to share with the class. 77 9781380023322_text.indd 77 31/10/2019 11:18 Theory Wireless network technologies Bluetooth ▶ Protocol ▶ Mobile networks aren’t the only wireless radio-based communication technologies used in Information Technology. Both Bluetooth and Wi-Fi are widely used. Bluetooth is a wireless protocol for exchanging data over short distances from one device to another. A protocol is a set of rules or an agreed way to exchange or transmit data between devices. Look for the Bluetooth symbol. Bluetooth has a limited range (approximately 10 metres) and does not penetrate walls easily so there will be little interference from other devices in adjoining rooms. Communication between computers, graphic pads, digital cameras, mobile phones, wireless headphones and wireless speakers is often by Bluetooth. In Caribbean Travel Services’ garage workshop they often listen to music streamed from a computer onto a Bluetooth speaker. ITQ 3.7 Name ONE difference between Bluetooth and Wi-Fi. Wi-Fi® is a wireless technology protocol used to connect hardware such as computers, peripherals, tablets and smartphones to local area networks without cables. Wi-Fi devices are based on the IEEE 802.11 standard, introduced in September 1998. Wi-Fi Alliance® was established in 1999 to drive global Wi-Fi adoption and evolution. This group developed programs that certify devices work well together, regardless of vendor. The term “Wi-Fi” and its logo were introduced by Wi-Fi Alliance to give consumers a way to distinguish Wi-Fi devices from other wireless products. Most wireless networks today operate on the 802.11 standard and more than half all Internet traffic traverses Wi-Fi networks, making Wi-Fi one of the greatest technological advances in history. Figure 3.6 Wi-Fi Alliance’s Wi-Fi CERTIFIED logo, which is available for use only on certified products ACTIVITY 3.5 School’s Bluetooth and Wi-Fi devices • Check your school networks. • List any devices that can communicate using Bluetooth. • List any devices that can communicate using Wi-Fi. • Share and compare your list with the class. Hotspot ▶ Wi-Fi can be useful when you are on the move. A hotspot is a physical location where persons may obtain Internet access, typically using Wi-Fi technology. Public hotspots may be created by a business for use by customers in places such as coffee shops, restaurants, shopping malls and hotels. 78 9781380023322_text.indd 78 31/10/2019 11:18 3 • Computer networks 1 • Computer and web fundamentals technologies ITQ 3.8 Venues that have broadband Internet access often create public wireless access. a) What is the technical term for this public wireless access? b) Name THREE types of venue that often provide public wireless access. Figure 3.7 Customers in a coffee shop accessing Wi-Fi via a hotspot Caribbean Travel Services has a Wi-Fi hotspot in the conference room at head office so visitors can check their emails while waiting for meetings to start. Now try to apply what you have learnt to your own company. ACTIVITY 3.6 Locating a hotspot for your company Use the company you created in the Introduction or use St Luago Fashion. • Discuss whether your company needs to provide an Internet hotspot. • List the potential locations for the hotspot. • Identify the advantages of locating a hotspot in each of the locations identified. Levels of privacy provided by an intranet, an extranet and the Internet Intranets Intranet ▶ ITQ 3.9 Suggest TWO reasons why an organisation may choose to set up an intranet. An intranet is a private computer network where only authorised persons within an organisation can access resources. Intranets are designed to meet the needs of a single organisation that needs to keep its data private and secure. It usually utilises familiar facilities such as web pages and web browsers. Hospitals utilise this type of network to keep the many departments connected so that up-to-date information is readily accessible when needed by authorised persons. An intranet provides secure access to patient records, employee records and other important information within the confines of the hospital. 79 9781380023322_text.indd 79 31/10/2019 11:18 Theory Caribbean Travel Services needs an intranet because some of the data it handles, such as bus maintenance records and employee records, is confidential but needs to be accessed by employees at the different sites. Extranets Extranet ▶ An extranet is a private computer network where authorised persons within an organisation and selected partners outside the organisation can access specific resources. External partners access the organisation’s resources using the Internet so an extranet is more at risk and less secure than an intranet. It is customary for two or more corporations to collaborate using an extranet. For example, Amadeus, a global travel services provider, will allow airlines, for example Caribbean Airlines and LIAT, to access its network. Similarly, Caribbean Airlines and LIAT each operate extranets. They offer access to authorised external partners such as the Immigration Departments of various countries, travel agents and customers like you and me. Caribbean Travel Services wants external partners to be able to access certain information stored on its systems. Travel and tour companies often want to charter its coaches and need to check which coaches are available on the required dates. An extranet allows them to access this information directly when they supply a correct username and password. This is far more efficient than having to phone the office to check availability. ITQ 3.10 List THREE types of business enterprise that could benefit from setting up an extranet. Firefox Mozilla Firefox Start Page Add-ons Manager https://slb.slbnetbank.com/Login.asp Google Sign in to Online Banking User ID: Password: Sign In > SLB If you are experiencing problems with St. Luago Bank Internet Bank website please email us at: support@slbbank.com St. Luago © copyright 2020 St. Luago Bank Figure 3.8 The extranet operated by St Luago National Bank allows customers around-the-clock access to banking services 80 9781380023322_text.indd 80 31/10/2019 11:18 3 • Computer networks 1 • Computer and web fundamentals technologies The Internet Internet ▶ ITQ 3.11 What does the P in ISP stand for? Encryption ▶ The Internet is a public, globally accessible, wide area network providing information and communication facilities. With its global reach, the Internet serves the data communication needs of businesses worldwide and billions of individuals. Within countries, the Internet is accessible via Internet service providers (ISPs). An ISP is a company that provides individuals and other organisations with access to the Internet and other related services. An ISP will usually have a direct connection to at least one fast access connection to the country’s main Internet infrastructure, the Internet backbone. Within the Caribbean, Cable & Wireless, Digicel and FLOW are well-known Internet service providers. Information travelling over the Internet is not secure and can easily be seen. If you need to send confidential information over the Internet it should be encrypted first. Encryption is the process of converting data/information to a code to prevent unauthorised persons from accessing it. ACTIVITY 3.7 Exploring local Internet service providers This activity is suitable for groups of two or three persons; however, larger groups may do the activity as long as each person conducts research into a different ISP company. • Conduct research into the cost and terms of use of your chosen ISP. • Share and discuss your results with the rest of the group. • Recommend, with your justification, the best option for Internet access for typical home use. • Present the group’s recommendation to the rest of the class. While all three types of network – intranet, extranet and Internet – have similarities, they also have features that set them apart. The Internet provides the infrastructure that supports business-to-business e-commerce, email systems, telecommunications, the World Wide Web and a host of other services. Table 3.2 compares the Internet, intranets and extranets using three characteristics: level of privacy, ownership and information sharing. ITQ 3.12 Watch this video on how to connect to the Internet. What device do you need if you want to connect devices without using cables? Characteristic Internet Intranet Extranet Level of privacy Public: Anyone can access Private: Only authorised employees can access Private: Only authorised persons can access Ownership Not owned by anyone Owned by a particular May be owned by one organisation or more collaborating organisations Information sharing Information can be shared with everyone across the world Information can be Information can be shared securely within shared between employees and external an organisation colleagues Table 3.2 Comparing intranets, extranets and the Internet 81 9781380023322_text.indd 81 31/10/2019 11:18 Theory Now try to apply what you have learnt to your own company. ACTIVITY 3.8 Intranet, extranet or Internet for your company? Use the company you created in the Introduction or use St Luago Fashion. • Identify the sorts of data that your company might need to share. To start you might consider: employee records, product design details, product specification, advertising brochures, price lists and store locations. • Discuss whether your company needs to provide an intranet or an extranet or can simply rely on the Internet to securely supply this information. • Write a short summary report of your findings for the Board of Directors. • Display the report on the classroom noticeboard. The functions of the basic components of a network Wired network ▶ Wireless network ▶ ITQ 3.13 Give ONE advantage and ONE disadvantage of a wired network when compared to a wireless network. Networks are all around. As an Information Technology professional you will need to understand the various elements of a network and how they work together. Earlier we established that two connection methods are available: wired and wireless. A wired network uses a wired medium such as twisted pair cable, optical fibre cable or coaxial cable to transfer data between connected devices. A wireless network uses radio waves instead of physical cables as the transmission medium. Most networks use a combination of wired and wireless technologies. A wired transmission medium carries data directly from one point to another whereas a wireless medium broadcasts the data, which is carried to all devices within its range. A range of hardware devices and transmission media is used in the creation and operation of a computer network. These are listed in Table 3.3. Method of connectivity Networking devices Transmission media Wired • hub • switch • router • network interface card/adapter • wireless access point • wireless adapter • cables • coaxial • twisted pair • fibre optic • Bluetooth • microwave • radio • satellite • Wi-Fi Wireless Table 3.3 Networking devices and transmission media 82 9781380023322_text.indd 82 31/10/2019 11:18 3 • Computer networks 1 • Computer and web fundamentals technologies Network designers make decisions as to which type of transmission media to use based on a number of factors. These include: • the physical environment, for example location of the rooms in relation to each other, their size, and the material used to construct the walls • the volume of data that will be transmitted and received by the various devices • the flexibility and convenience required by users’ devices, for example fixed desktop computers or mobile devices. Networks are created by combining computing devices (desktop computers, laptops, tablets and smartphones) and peripherals (printers, scanners, network-attached storage) to a central connection point known as a hub. We need to understand all the components used in a network: • Transmission media are the cables that connect everything together. • Hubs, routers and switches make sure that data gets directed to the right computer. • Network interface cards and network adapters ensure that computers can receive the data. We cover these in the next sections. Transmission media Transmission media ▶ The transmission media are the mechanisms by which computing devices are connected together. Transmission media can be physical hardware (cables) or wireless media (infrared, Wi-Fi, Bluetooth, microwaves, satellites and mobile networks). Physical wired network transmission media Twisted pair ▶ Twisted pair cable consists of eight copper wires, twisted in pairs to reduce interference and enclosed in a plastic covering. (a) (b) ITQ 3.14 How many individual wires will you find in a networking twisted pair? ITQ 3.15 Are the school’s computers connected to a network via twisted pair cable? Figure 3.9 Twisted pair cable is often used in computer networks: (a) cable, (b) cable with connector 83 9781380023322_text.indd 83 31/10/2019 11:18 Theory Coaxial cable ▶ Fibre optic cable ▶ Coaxial cable consists of a single copper core surrounded by a metal shield to reduce interference and all enclosed in a plastic covering. Coaxial cable was used during the 1980s to early 1990s but is hardly ever used in modern networks. Fibre optic cable consists of flexible fibres with a glass core; they carry information using light. Figure 3.10 Coaxial cable Figure 3.11 High-performance fibre optic cable Fibre optic cables are high-performance and very-high-capacity communication media and so are used extensively for a country’s Internet backbone connecting the country’s main cities and towns. The backbone network is miles and miles of cable that is run either underground or overhead and that connects major conurbations together. Larger organisations are increasingly using fibre optic cable in their own networks where high-performance networking is required. Physical transmission media are common but we also need to consider nonphysical transmission. We have already considered mobile networks, Bluetooth and Wi-Fi wireless; now we will consider infrared, microwaves and satellites as transmission media. Wireless network transmission media Infrared ▶ Microwaves ▶ ITQ 3.16 Give one similarity and one difference between infrared and microwave as transmission media. Satellite ▶ Infrared is part of the electromagnetic radiation spectrum at wavelengths that fall between visible light and radio waves at frequencies 300GHz up to 430THz. In terms of Information Technology, infrared communication works in the same way as Wi-Fi but at a different frequency. An example of infrared transmission is communication between a desktop and netbook computer where the distance is small and there is a clear line of sight between the two devices. The requirement for a clear line of sight between devices has limited the popularity of infrared communication. Microwaves are part of the electromagnetic radiation spectrum at frequencies 300MHz to 300GHz. Like infrared, microwave communication works in the same way as Wi-Fi. The range of microwave transmission is many kilometres but there has to be clear line of sight between the two antennae. Microwave communications can be used to connect remote locations to a network providing there is a clear line of sight: for example, a hilltop weather station may be networked to the valley-bottom laboratory using microwaves. A satellite is a communication device orbiting in space that relays and amplifies radio telecommunication signals to and from remote locations. 84 9781380023322_text.indd 84 31/10/2019 11:18 3 • Computer networks 1 • Computer and web fundamentals technologies Communication satellites can be included in a computer network when a remote computer system needs to join a network and no other solutions are possible because of distance or location. Many airplane flights offer Wi-Fi connection to their passengers; this can be achieved only through use of satellite communication. Other transmission media such as fibre optic cable offer much better value. Figure 3.12 Satellite communication can be used to include computers at very remote locations in a network Connection devices: hubs, routers, switches and modems Hub ▶ In a really simple network connecting a few computers, the computers will all be directly connected together via a hub. A hub is a multiport device that connects many computing devices together. hub Figure 3.13 A network hub with ports for connecting multiple devices A simple hub works by repeating data received from one of its ports to all other ports. Every computer linked to the hub ‘hears’ everything any of the other computers ‘says’ but ignores anything not meant for them. This is like a roundtable meeting. Participants sit round a table listening to others and asking questions but responding only when remarks or questions are addressed to them. 85 9781380023322_text.indd 85 31/10/2019 11:18 Theory Router ▶ ITQ 3.17 State the difference between a hub and a router. A large organisation will typically have hundreds of computers connected to its networks and will need to include devices that direct data traffic to its correct destination. A computer network can be compared to a road system. The roads are the cables and the roundabouts are the hubs, routers and switches. When traffic reaches a roundabout it needs to be sent in the correct direction to reach its destination. Routers and switches send data on a network in the right direction. A router is an intelligent network device that connects two networks together. The term ‘Internet router’ refers to the device that home users and small offices use to connect their LAN to the Internet. It is usually a combined hub and router in one device. Acting as a hub it allows all your computing devices to be attached to each other, wired or wirelessly. The router is also connected to the Internet, usually via a telephone line, and it joins your local network to the Internet. (a) (b) Figure 3.14 (a) Front view of a Wi-Fi router (b) rear view of a wireless router showing connection ports ACTIVITY 3.9 Exploring a home router: hub and router Look at a home router, or pictures of home routers. • Identify: • where the twisted pair cables will be connected (the router acting as a hub) • the antenna which allows wireless devices to join the network (the router acting as a hub) • where the telephone line connects to the router (the router joining two networks together). • Sketch a router and label each of the above items in your notebook. • Identify where you have seen a home router and identify similarities to and differences from the one sketched. • Share your findings with a partner. Switch ▶ A switch is an intelligent device that routes incoming data directly to the specific output port that will take the data towards its intended destination. ITQ 3.18 Scan to watch an overview of the Internet. Then answer this question: What is the role of switches and routers on the Internet? 86 9781380023322_text.indd 86 31/10/2019 11:18 3 • Computer networks 1 • Computer and web fundamentals technologies Modem ▶ Switches and routers are similar devices but operate on a different technical level. For example, switches use MAC (Media Access Control) addresses while routers use IP (Internet Protocol) addresses. Modem is an abbreviation for modulator-demodulator, a device that converts signals from analogue to digital and vice versa. A modem allows computers to exchange information through telephone lines. Modems are now much less common because they offer only slow Internet connection and connect only a single computer to the Internet. Modems are being replaced by more up-to-date technologies. Network interface cards and network adapters Network interface card ▶ Any device that wants to connect to a network needs a network interface card or a network adapter. A network interface card (NIC) is a computer hardware component installed in a device into which a network cable may be plugged. As the name suggests, a wireless network interface card communicates wirelessly and has an antenna instead of a port that accepts a cable. Figure 3.15 A network interface card fits inside the computing device Network adapter ▶ A network adapter is a converter that adapts/extends a USB port in order for it to function like a NIC or a wireless NIC. A network adapter is needed if the computing device does not have a built-in networking component. ACTIVITY 3.10 Constructing a wired LAN • Using readily available materials (for example, string for cables, matchbox for a hub) construct a model of a basic computer network connected using a hub. • Display your model in the classroom. 87 9781380023322_text.indd 87 31/10/2019 11:18 Theory The importance of mobile communications technology ITQ 3.19 Suggest two industries in the Caribbean that are currently experiencing benefits as a result of access to modern mobile networks. As mobile networks are rolled out with 4G and 5G performance reaching more locations, an increasing number of organisations are taking advantage of these networks. In this section we are going to look at how the powerful combination of smartphones and mobile networks is impacting on education, commerce and journalism. Mobile networks in education In education, public school students are increasingly able to access services via mobile networks. Mobile networks are well suited to the education sector, providing access to streaming content from services like TeacherTube, YouTube and Khan Academy, and providing syllabi as enhanced eBooks from the Caribbean Examinations Council. While supply of the services mentioned is much better and cheaper via cabled solutions, mobile networks allow these services to be accessed where there is no cabled Internet infrastructure. This is the situation in some remote rural areas in many Caribbean countries. ITQ 3.20 eBooks are increasingly being used to support the teaching/learning process in Caribbean schools. Suggest two video-streaming services that are of value to students. Figure 3.16 Homework study projects and independent research are greatly enhanced with access to mobile networks Mobile networks used with mobile devices such as smartphones, laptops and tablets are playing an increasing role in education. They enable learning away from the traditional classroom environment where teacher and students are in the same room. Using mobile networks teachers and students don’t need to be in the same room; they don’t even need to be in the same country. When learning moves away from the classroom and onto a network, eBooks replace physical books, e-assessment replaces paper-based testing, videoconferencing replaces face-to-face tutor communication, and collaborative working online with shared documents replaces collaborative group working in the classroom. Activity monitoring is automatically performed by the system. CXC’s new interactive learning site ‘CXC Learning Hub’ is an example of how education is responding to the opportunities digital technology brings with it. 88 9781380023322_text.indd 88 31/10/2019 11:18 3 • Computer networks 1 • Computer and web fundamentals technologies ITQ 3.21 Give TWO advantages for a student studying remotely using a smartphone connected to the Internet over a mobile network. The main advantages to the student of this way of working are that they don’t have to attend a physical location, they can work from anywhere with a mobile phone signal, and they can do most of the work at a time that suits them. For teachers an advantage of this way of working is that many administrative tasks can be automated. Monitoring activities, conducting tests, which are automatically marked, and updating course resources are all easily automated. Mobile networks in commerce E-commerce or electronic commerce has been about for many years and involves trading products and services via the Internet and other computer networks. Examples include banking, retail, insurance and advertising. M-commerce has developed from e-commerce and involves using computing devices connected to the Internet via mobile networks to carry out e-commerce. The advantage of m-commerce is improved portability and flexibility. Typical commercial applications that use mobile networks include: • Mobile banking. Checking your bank balance, paying directly using a smartphone, managing your accounts and executing money transfers are examples of mobile banking. • Mobile buying and selling. Shopping can now be done on the move using your ITQ 3.22 Name one business in your country that conducts business primarily via a mobile app. mobile. You can make purchases on the seller’s website or in their dedicated app. • Mobile tickets, boarding passes and vouchers. Printed tickets are replaced with an electronic version containing a machine-readable barcode or QR code, which is scanned at the venue directly from a smartphone. At Caribbean Travel Services regular travellers carry their bus passes as QR codes on their smartphones. The QR code is scanned as they enter the bus to register their journey. ITQ 3.23 Give two ways in which a holiday maker might use commerce using a smartphone. Mobile networks in journalism Journalism is one of the first professions to reap the benefits of the new mobile network technology as it has developed with mobile devices such as smartphones, laptops and tablets. Journalists may be reporting on breaking or in-depth stories for newspapers, magazines, websites, TV or radio, or creating blogs and podcasts. Working to tight deadlines, a journalist would traditionally investigate the story and then return to the office to create the report. The use of mobile networks and smartphones allows a journalist to file a report on the go when a big story breaks. Camera applications allow the capture of video and still photographs, word processing apps allow words to be added to the story, and audio-recording apps allow for the capture of interviews for radio stations and podcasts. This content is then transmitted back to the editor in the office using mobile network communication. ACTIVITY 3.11 Work for a newspaper for a day In a group of three: • Take the role of either: a. Journalist b. Photographer c. Editor. • List what computing devices you will need. • List what information you need to share and with whom. • Compare your list with the other members of the group. 89 9781380023322_text.indd 89 31/10/2019 11:18 Theory Key web technology concepts World Wide Web ▶ Web browser ▶ ITQ 3.24 State the difference between a web page and a web browser. The World Wide Web (WWW), commonly referred to as the ‘web’, is a graphical, easy-to-use system of inter-linked files on the Internet. Another way of thinking about the WWW is as a collection of billions of documents, accessed through the Internet, using a web-browsing application. A web browser is a program that allows users to view and explore information on the World Wide Web. Web browsers such as Internet Explorer, Edge, Mozilla Firefox, Google Chrome and Apple’s Safari are available. You need a web browser application program to view web pages on the WWW. Figure 3.17 A web page being viewed in a web browser. Each of the items in the central boxes is a hyperlink to other pages on the Macmillan Caribbean website Now try to apply what you have learnt to your own company. 90 9781380023322_text.indd 90 31/10/2019 11:18 3 • Computer networks 1 • Computer and web fundamentals technologies ACTIVITY 3.12 Recommending a web browser Use the company you created in earlier activities or use St Luago Fashion. Each person should choose one of these web browsers: • Microsoft Internet Explorer • Microsoft Edge • Mozilla Firefox • Apple’s Safari • Google Chrome • Use the browser, conduct research and evaluate the browser for its suitability for your company. • Debate your findings with the rest of the group. • As a group vote on the best browser. • Create a document to summarise your discussion and place it on the classroom noticeboard. Hypertext Mark-up Language (HTML) Hypertext Mark-up Language ▶ ITQ 3.25 Check the school computers and any smartphones you have access to. List the names of all the web browser application programs. Hyperlink ▶ Hypertext Mark-up Language is a mark-up language used to structure text and multimedia documents. Mark-up consists of assigning different tags to elements of a text to indicate their relation to the rest of the text or to state how they should be displayed. HTML is used extensively on the World Wide Web. HTML is used to tell a web browser what to display: this may be text or images and possibly sounds, videos and interactive content. It also contains information to tell the web browser how to display the content. For example, ‘this sentence should be in large, bright red text and positioned in the centre of the page’. HTML also includes information about hyperlinks. A hyperlink is a piece of text or part of a web page or an image that when selected and clicked with the mouse displays another web page document (or resource). Hyperlinks are what make the WWW so easy to use. ACTIVITY 3.13 Using hyperlinks • Using a computer or smartphone, open a web browser application program. • Identify a hyperlink: by convention text hyperlinks are underlined and are often in a different colour. • Select the hyperlink with a mouse click or by touching it on a smartphone touch screen. Uniform Resource Locator (URL) Uniform Resource Locators ▶ To make the WWW really easy to use every resource on the web has a Uniform Reference Locator, or URL for short. Each page on the World Wide Web has a unique address; these addresses are called Uniform Resource Locators (URLs). ITQ 3.26 Scan to watch an explanation of URLs. What does the domain name usually tell you? Figure 3.18 The address bar of a web browser where a URL is displayed 91 9781380023322_text.indd 91 31/10/2019 11:18 Theory ITQ 3.27 What does the L in URL stand for? ITQ 3.28 In the URL https://www.cxc.org/examinations/ csec/manuals/ what is the correct term for the cxc.org part of the URL? When a URL is entered in a web browser, the home page of the website is automatically downloaded (if no file is specified in the URL). For example, http:// www.macmillan-Caribbean.com/ takes you to the Macmillan Caribbean home page or to the different sections of the website. The URL can also include information about how the resource should be accessed. Here is an example URL: http://www.macmillan-Caribbean.com/Products/CAPE-Maths-Unit-1.html. Table 3.4 explains what each part of the URL is for. URL part Function http:// HTTP is a special language (protocol) that tells the web browser that this resource can be accessed using the Hypertext Transfer Protocol www The ‘www’ tells the browser that this is a web page macmillan-Caribbean. com This is the domain name and tells the web browser to contact the Macmillan Caribbean web server to obtain this resource. A domain name is a label that identifies a network /Products/ This describes the directory structure (where the document is stored) CAPE-Maths-Unit-1 This is the document’s name .html .html is the file type and indicates that the document was created using the Hypertext Mark-up Language Table 3.4 The various parts of a Uniform Resource Locator ACTIVITY 3.14 Examining URLs Consider these two URLs: https://cxc-store.com/csec-information-technology-syllabus-2010-2019-ebook.html http://www.macmillan-Caribbean.com/Products/CAPE-Maths-Unit-1.html • Create the following table in your notebook: URL #1 URL #2 Protocol Domain name Folder Filename File type (of web page) • Look at the URL and complete the URL #1 and URL #2 columns of the table. • Examine both URLs carefully, noting similarities and differences. Are your findings in keeping with your expectations? Justify your response. 92 9781380023322_text.indd 92 31/10/2019 11:18 3 • Computer networks 1 • Computer and web fundamentals technologies Interacting with websites Web server ▶ Hypertext Transfer Protocol ▶ Users interact with websites in a number of ways and it is useful to understand the main concepts and terms used for such interaction. A web server is a computer that delivers (serves up) web pages. When a request is made to access a website, the request is sent to the web server. The server then fetches the page and sends it to your browser. Web servers usually run on powerful computers dedicated to the task. When you type in a web address or click on a hyperlink, routers and switches direct your request to the correct web server. Web browsers and web servers use their own special language, Hypertext Transfer (or Transport) Protocol (HTTP), to communicate with each other. HTTP comes in two variations: HTTP and HTTPS. The ‘S’ in the second variation stands for secure and is used for applications like passwords and online banking. Hypertext Transfer Protocol is a protocol used to request and transmit files, especially web pages and web page components, over the Internet or other computer network. Caribbean Travel Services has an extensive website with information including: bus routes, timetables, fares, coach rentals, discount offers and current status information. Navigation around the website is made easy using hyperlinks; for example, clicking on a bus route number takes you to the timetable page for that route. Now try to apply what you have learnt to your own company. ACTIVITY 3.15 Information for your company’s website Use the company you created in the Introduction or use St Luago Fashion. • Discuss whether your company needs to provide a website. • List the contents you will need to include on your website in your notebook. File Transfer Protocol ▶ ITQ 3.29 State ONE difference between HTTP and FTP. Upload ▶ Sometimes a website will allow you to download a particular file, for example a brochure, a new application program or game. In these cases the File Transfer Protocol (FTP) is used. File Transfer Protocol (FTP) is the special language two computers use when copying or moving files between them. Caribbean Travel Services also supports downloads using FTP. It may be useful for regular users of a particular bus route to download and print a copy of that bus’s timetable so that they can carry it with them. When files are transferred to another computer they are sent or ‘uploaded’ by one computer and received or ‘downloaded’ by the other computer. Upload is a process of reading data from a user’s computer storage and sending it to another computer via communication channels. 93 9781380023322_text.indd 93 31/10/2019 11:18 Theory Download ▶ Download is a process whereby programs or data are transferred via communications channels from a computer and stored on media located at the user’s computer. In simple terms you upload files TO another computer and download FROM the other computer. Email Electronic mail ▶ The last key concept we will look at is email or electronic mail. Email replaces the traditional letter that is written on paper, addressed and delivered by the postal service. Electronic mail is mail or messages transmitted electronically by computers via a communications channel. It is usual for such messages to be held in a central store for retrieval at the user’s convenience. Figure 3.19 An email being created and sent from a tablet and smartphone ITQ 3.30 Give ONE circumstance where regular postal mail is better than email. Email applications allow users to send an electronic message over a network, usually the Internet, to anyone with an email address and access to a computer system connected to the network. An email address is always in the form username@ domain_name, for example info@macmillan-Caribbean.com. Common desktop email application programs include: Outlook and Outlook Express, Thunderbird and Apple Mail. Many users have free web-based email accounts like Gmail, Hotmail and Yahoo Mail provided by Google, Microsoft and Yahoo respectively. An email message is usually text-based but may include images, sounds and video clips as attachments. Unlike regular surface mail (‘snail mail’), we cannot send physical objects using email. All email applications have similar functionality including the ability to read and store received messages, and create and send new messages. Messages can be sent to one or more recipients. Facilities to maintain an address book or contacts list are also usually provided. This makes it quicker and easier to send email to the correct recipients. The delivery of email usually takes a matter of seconds, and in the situation where delivery fails, the sender is advised accordingly. Email messages, address books and contacts are all stored in cloud storage. This means you can access your email services on any device that is connected to the Internet. 94 9781380023322_text.indd 94 31/10/2019 11:18 3 • Computer networks and web technologies Summary • A computer network is a communication, data-exchange • Hubs and hotspots connect computers together while and resource-sharing system created by linking two or more computing devices. • A protocol is a set of rules that governs communications • Local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN) cover different geographical areas. • A mobile network is used to carry voice calls and data traffic. Many computer networks rely on mobile networks to provided additional connectivity. • Wi-Fi and Bluetooth are examples of wireless network technologies. routers and switches direct data to the correct address. between computers on a network. • A range of hardware devices including network cards, switches and routers, and various transmission media such as twisted pair, fibre optic and radio waves, are used in the creation and operation of computer networks. • Mobile networks are suitable for various applications in important sectors such as commerce, education, healthcare, journalism, national security, tourism and transportation. • Wired and wireless networks are two classifications of • The World Wide Web is a huge collection of documents network transmission media; the classifications are based on whether wires/cables or radio signals are used as the connectivity medium. called web pages, which are grouped into websites and stored on web servers. • A computer network may be classified based on its level of privacy, that is, who has authorised access; the classifications include intranet, extranet and the Internet. • Twisted pair, coaxial cable and fibre optic are all types of wired network transmission media. • Web pages are requested, downloaded and displayed on a user’s computer by a web browser. • The operation of the World Wide Web is largely governed by the Hypertext Mark-up Language (HTML) and Hypertext Transfer Protocol (HTTP). Answers to ITQs 3.1 There are lots of reasons for connecting to a network while on the move: to check the weather, send email, check flight information, access work documents in the cloud, or join a video conference. 3.2 The main difference between a wired and wireless network is that a wired network requires a physical connection between devices and a wireless network does not. Wireless networks have the advantage that you can easily move your device around an office or home. 3.3 LAN is local area network, MAN is metropolitan area network and WAN is wide area network. 3.4 A local dental practice will use a LAN. An international airline will use a WAN. A district government will use a MAN. 3.5 There may be several mobile phone masts in your local area. Check your answer with other members of the class. 3.6 Both a computer network and mobile networks connect communication devices together but a computer network can be wired or wireless while on a mobile network the last leg of transmission is mobile wireless. 3.7 Bluetooth is short range, usually within a room; Wi-Fi may range over a small building. 3.8 A public wireless access point is known as a hotspot. Hotspots might be found in coffee shops, hotels, government offices and libraries. 3.9 An intranet allows organisations to share information and resources while keeping the data and information secure. 3.10 An extranet will benefit organisations that want to share information with partners securely, for example: travel agents, airlines, shops and suppliers, banks and credit card companies. 3.11 ISP stands for Internet Service Provider, a company that connects a user to the Internet usually using a telephone line. 3.12 To connect to a network without using cables you will need a wireless router and each device will require a wireless network card or adaptor. 3.13 A disadvantage of a wired network is that it requires cables to be laid between computers and the network hub. However, they are more secure than wireless networks. 3.14 Twisted pair cables contain eight wires made up of four pairs of twisted wires. 3.15 Computers in a school’s local area network will almost certainly be connected using twisted pair cables. This is a low-cost, high-performance solution. 95 9781380023322_text.indd 95 31/10/2019 11:18 1 • The computer system Theory 3.16 Infrared and microwave are both wireless but infrared is short range (a few metres) and microwave is longer range (a few kilometres). 3.23 A holiday maker may use their mobile device (smartphone) to check flights, book a hotel, order sunscreen or email to order a taxi. 3.17 A hub joins computers together while a router joins networks together. 3.24 A web page is an HTML document file accessible on the WWW. A web browser is an application program needed to view web pages. 3.18 To connect to a network without using cables you will need a wireless router and each device will require a wireless network card or adaptor. 3.19 Many industries in the Caribbean use modern mobile networks including: law enforcement agencies, law offices, manufacturing companies, medical practices, research facilities and telecommunications service providers. 3.20 Video-streaming services that might be of interest to students include: Teacher Tube, YouTube and Khan Academy. 3.21 The advantage of a student studying remotely is that they don’t need to attend class and they can work at a time to suit them. 3.25 Common web browsers include: Microsoft Edge, Internet Explorer, Firefox, Safari, Chrome and the Android browser. 3.26 Routers and switches direct message packets to their correct destinations. 3.27 URL stands for Uniform Resource Locator. Every document or resource on the Internet has a unique URL. 3.28 cxc.org is an example of a domain name. 3.29 HTTP (Hypertext Transfer Protocol) is the protocol for transferring web pages. FTP (File Transfer Protocol) is the protocol for transferring files. 3.30 Regular mail is the only way to send physical objects. 3.22 Many businesses in your country may conduct business primarily via a mobile app. Check your answer with other members of the class. Examination-style questions: Multiple Choice Instructions: Each item in this test has four suggested responses labelled (A), (B), (C) or (D). Read each question carefully, then select the most suitable response. 1) Which of the following statements is NOT TRUE about computer networks? A) All activities are governed by protocols. B) A LAN may include wired media only. C) A WAN may include both wired and wireless media. D) Data downloads are received from a remote computer only. 3) The portion of Yellow Diamond’s private network accessible by customers and contract drivers is an example of what type of network: A) extranet B) intranet C) LAN D) Internet 4) Based on its geographic span and the information provided, Yellow Diamond is operating what type of network? A) LAN B) MAN C) VPN D) WAN Questions 2–4 are based on the following narrative: 2) The Yellow Diamond Transport Service operates a nationwide school bus service. Its six regional offices are all connected via a private network which is based on Internet protocols. Customers and contract drivers are able to access parts of Yellow Diamond’s network. Yellow Diamond’s private network, accessible ONLY from inside the organisation, is an example of what type of network: A) extranet B) intranet C) LAN D) Internet Questions 5–7 are based on the following narrative: 5) Caribbean Network Solutions is a company that specialises in network design and installation. The company has been contracted by your school to install a wired LAN in the school’s library. Which device should ideally be used as the central communication point for the network? A) hub B) network controller card C) router D) modem 96 9781380023322_text.indd 96 31/10/2019 11:18 3 • Computer networks 1 • The and computer web technologies system 6) Which of the following types of cable would it be economical to use to connect the computers to the device named in Question 5? A) coaxial B) fibre optic C) twisted pair D) none of the above 9) 7) One of the desktop computers does not have a port in which to plug the cable referred to in Question 6. Which of the following components should be added to the computer to facilitate this connectivity? A) hub B) network interface card C) router D) wireless access point 10) Which of the following are TRUE about web technologies? I A website must be written using ONLY HTML II A web page is accessible only on the Internet III A website may consist of a single web page only IV A home page is the default initial page on a website. 8) Which of the following technologies are utilised by mobile networks as the carrier of its signals? A) bluetooth B) radio C) satellite D) Wi-Fi ________ are special-purpose application software that run on an Internet-connected computer and use the _______ to connect with ________. A) web browsers, HTML, web servers B) web browsers, HTTP, web servers C) web servers, FTP, web browsers D) web servers, HTTP, web browsers A) B) C) D) I, II and III only I, II and IV only II, III and IV only III and IV only Examination-style questions: Structured 1) A group of doctors are planning to set up a medical centre. They are hoping to integrate the use of computer networks and web technologies into all their operations. a) All the doctors agree that they should install a computer network. One doctor has suggested that they install a LAN and another doctor disagrees, suggesting that an intranet should be installed. i) Define what a computer network is. [1] ii) Explain the relationship between an intranet and a LAN. [2] iii) Suggest with reasons whether the doctors should set up a computer network that is both a LAN and an intranet. [3] b) All the doctors who will be using the network are expert users of web technologies such as web pages, websites and web servers. They want to set up the network in such a way that their patients can have access to their medical records from the comfort of their homes. i) Name the type of network that will facilitate patient access to the medical centre’s private network. [1] ii) Outline how the web technologies named could be used to facilitate the access described. [3] iii) Explain the possible role of the Internet in facilitating the operation of the network named in part i). [2] c) The medical centre will have reliable and fast access to the Internet. Discuss the advantages and disadvantages of using cloud storage compared with local storage to store the practices files. d) The company hired to design the network has indicated that the medical centre will need to install routers and these should be connected by fibre optic cable. The company also suggested that the doctors should consider creating a hotspot in the patient’s waiting room. i) Explain the role of a router in the operation of a network. ii) Suggest TWO advantages of using fibre optic cable as compared to other wired transmission media. iii) Explain what a hotspot is and name ANY TWO computer network components that are necessary for the setup of a hotspot. [5] [2] [2] [4] Total 25 marks 97 9781380023322_text.indd 97 31/10/2019 11:18 4 Social and economic impact of information and communication technology As computer systems increasingly automate tasks and connect through networks such as the Internet, they also become more at risk from computer users who may have bad intentions. To protect our computer systems and ourselves we need to understand the threats that are out there and introduce computer security and cybersecurity to minimise the risks. Threats might involve a person accessing your data without your permission, cyberbullying on social media, theft of large amounts of data stored on an organisation’s computers, or publication of obscene materials for blackmail purposes. When computer systems are attacked and data is lost or misused this can have serious results for an individual or an organisation. On completion of this chapter you will understand the effects that technology may have on society, for example the types of jobs that are created and the jobs that may be lost. This chapter will also consider the impact that IT can have on various organisations and on the wider community. By the end of this chapter you should be able to: ✔✔ Outline the concepts of computer security, cybersecurity and computer misuse. ✔✔ Assess the potential impact of computer misuse on the main entities impacted. ✔✔ Describe suitable countermeasures to mitigate the effects of identified threats. ✔✔ Assess the effect of automation on job security. ✔✔ Describe the roles of personnel in computer-related professions. ✔✔ Assess the impact of Information Technology on selected fields. Social and economic impact of information and communication technology Computer security and cybersecurity Elements of computer security Computer misuse by individuals, organisations, and governments Automation and job security 98 9781380023322_text.indd 98 Computerrelated professions Potential impacts of computer misuse Impact of ICT Education Impact on organisations Impact on governments Impact on individuals Copyright infringement and software piracy Electronic eavesdropping Cyberbullying Medicine Countermeasures to identified threats Physical security measures Business Propaganda Identity theft Data theft Obscene materials DDOS attack Phishing attacks Malware Violation of privacy Law enforcement Recreation Software measures Personal security practices 31/10/2019 11:18 4 • Social and economic impact of ICT Introduction to the concepts of computer security, cybersecurity and computer misuse Computer security and cybersecurity Computer security ▶ Computer misuse ▶ Cyberspace ▶ Computer security is all the activities related to identifying, assessing and managing vulnerabilities, threats and attacks on a computer system. Computer users, both authorised (lawfully) and unauthorised, sometimes misuse computer systems in a way that constitutes a risk to the computer system itself or to the data and programs stored on the system’s storage devices. Computer misuse is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorisation. As soon as a computer is connected to the Internet it has access to cyberspace. Cyberspace generally refers to any data or resources that can be accessed via a network or the space where the Internet operates. The Internet gives users access to large parts of cyberspace; web pages that contain text, images, videos and interactive content are all part of cyberspace. Files stored on remote computers that can be accessed using the File Transfer Protocol are also part of cyberspace. Cyberspace is also information and resources that you may be able to access on intranets or extranets. ACTIVITY 4.1 Exploring cyberspace • List all activities conducted by members in the past week that involved cyberspace. • Think again: have you used an ATM, streamed video or shopped in a supermarket? • For these activities explain how cyberspace is involved. Elect a spokesperson for your group to share your combined findings with the rest of the class. Cybercrime ▶ Cybersecurity ▶ ITQ 4.1 What is cybercrime? With all this information and resources at our fingertips the opportunities for misuse, intentional or not, are vast. If our computer systems are networked, they have access to cyberspace and we need cybersecurity as well as local computer security. Cybercrime is any crime perpetrated using computers and networks. An example of cybercrime is music piracy. Pirates steal recordings of music from musicians, who are the rightful owners, and sell copies illegally over the Internet by FTP download. Cybersecurity is all the activities related to identifying, assessing and managing the vulnerabilities, threats and attacks originating from cyberspace. An example of cybersecurity is a spam filter in an email application program. Spam filters identify emails that are trying to scam legitimate users and automatically delete them. 99 9781380023322_text.indd 99 31/10/2019 11:18 Theory ACTIVITY 4.2 Cybercrime laws in the Caribbean • Download the Cybercrimes Acts for both Jamaica and Trinidad and Tobago or ask your teacher for a copy. • Read Part 1, which contains the definition of the various terms. Write the definitions for data, damage and electronic communication system in your notebook. • In your group discuss the definitions in both laws, focusing on their similarities and differences. • Be prepared to take part in a class debate. Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorised access. Based on what we have learnt so far, we can conclude that: • an individual who accesses a computer system without authorisation may have committed a crime • the ‘misuse’ could be an illegal activity, an unethical activity, or merely one that causes embarrassment • the misuse may be localised to a private computer system or computer network or may extend to a public network nationally or globally. Internet-based computing environment (cyberspace) Local computing environment sers ed u oris Denial of service attacks Data t by thef uth una Equipment damage Internet by fire etc. Phishing attempts Malw are via Viruses, Trojans, worms Internet-based threats infect ed US B flas h driv e Local threats Figure 4.1 Security threats are all around; the risk increases if you connect to the Internet 100 9781380023322_text.indd 100 31/10/2019 11:18 4 • Social and economic impact of ICT Cybersecurity and computer security are closely related. Computer security is inward-looking, with the focus on safeguarding local computer installations under our control. Cybersecurity looks outwards to focus on providing safeguards when our computer systems connect to external networks such as the Internet. A combination of good computer security and good cybersecurity procedures working together is needed to protect a computer system. ITQ 4.2 Suggest ONE similarity and ONE difference between cybersecurity and computer security. Elements of computer security Firewall ▶ Computer security has four main elements: vulnerability, threat, attack and countermeasure. Each of these is described below, but first a definition. A firewall monitors a network, blocking dangerous content such as viruses. Firewalls can be either a physical device attached to the network or software running on the connected computer. (a) Internet your organisation’s PCs Corporate network firewall Figure 4.2 (a) A firewall helps to protect a network from threats originating from outside. (b) Windows Defender Firewall is implemented as a software-only file security mechanism and is a component of the operating system (b) 101 9781380023322_text.indd 101 31/10/2019 11:18 Theory Element Meaning Vulnerability Exposure to the possibility Computer systems that are connected to the Internet are vulnerable because a large of being attacked or number of remote computers, and so a large harmed. number of potential criminals, have network access to the system. Threat A resentful ex-employee may state his A statement of an intention to inflict harm or intention to gain unauthorised access to an organisation’s computer system to delete damage. critical files or steal confidential information unless some ransom is paid. Attack Actual action that causes harm or damage. The resentful ex-employee may encrypt company files and demand a ransom for the recovery of the files. Countermeasure An action taken to counteract a threat. Set the firewall to allow access from current employees’ devices only. ITQ 4.3 What sort of countermeasures might you put in place to prevent physical access to a computer room? Example Table 4.1 Elements of computer security Figure 4.3 Physical security countermeasures: first door of the ‘man trap’ leading to the data centre floor. This door requires keycard access and must be closed before the next door can be opened Figure 4.4 Physical security countermeasures: a security cable attached to the security slot on a laptop. Computer misuse by individuals, organisations and governments Computer misuse is considered to include: • acts which are likely to cause unauthorised modification, removal or copying of the contents of any computer system • directly or indirectly obtaining computer service without proper authorisation (e.g. music download from an illegal site) • accessing programs or data on a computer with the intent to commit a crime • unauthorised access to a computer system. 102 9781380023322_text.indd 102 31/10/2019 11:18 4 • Social and economic impact of ICT Computer misuse by an individual ranges from sending a personal email from a work computer during periods of work to gaining unauthorised access to the company’s online banking service and moving funds from a company account into a personal account. Caribbean Travel Services has established clear guidelines on the use of company computers. Employees are allowed to send personal emails and to browse the Internet during their breaks but not during periods of work. The viewing of any inappropriate material such as obscene pictures is strictly banned, with immediate dismissal for non-compliance with company rules. ITQ 4.4 State at least TWO ways an individual can misuse a computer system. ACTIVITY 4.3 Use the company you created in earlier activities or use St Luago Fashion. • Discuss the procedures you might need to regulate employees’ use of company computers. • Create a summary document entitled ‘Acceptable Use of Computer Systems at <your company name>’. • Share your document by displaying it on the class noticeboard. ITQ 4.5 State at least TWO ways a government can misuse a computer system. Computer misuse by an organisation can range from software piracy, where software is used without paying the appropriate fees, to industrial espionage, which is the unauthorised accessing of a competitor’s computer system to copy confidential data. Governments also sometimes misuse computer systems and data by intercepting private emails, by altering election results or by spreading ‘fake news’. Assess the potential impact of computer misuse on the main entities impacted Some common ways in which computer systems and data may be misused are given in Table 4.2. Individual • cyberbullying • financial abuse (credit card Organisation • copyright infringement • data theft fraud and identity theft) • denial-of-service attacks • online publication of obscene • financial abuse materials • industrial espionage • phishing attacks • software and music piracy • violation of privacy • transmission of malware Government • electronic eavesdropping • espionage • manipulation of data • propaganda Table 4.2 Common ways in which computer systems and data may be misused 103 9781380023322_text.indd 103 31/10/2019 11:18 Theory Computer misuse that impacts individuals In this section, we will outline five acts of computer misuse that primarily impact individuals: cyberbullying, identity theft, online publication of obscene materials, phishing attacks and violation of privacy. Cyberbullying Cyberbullying ▶ Figure 4.5 Cyberbullying on a smartphone Cyberbullying is a form of bullying or harassment using computer-based communications. Cyberbullying can occur through SMS (Short Messaging Service (text)) or social networking apps, or online on social media and gaming platforms where persons can view, participate in or share content. Cyberbullying includes sending, posting or sharing negative, harmful, false or mean content about someone else, usually causing embarrassment or humiliation. Cyberbullying can be: • hard to notice – because teachers, parents and other adults may not overhear or see cyberbullying taking place Yuh nuh have nuh fren and nobody nuh like yuh Waah gwaan ugly pickney Wi nuh like Teachas Pet ITQ 4.6 Suggest THREE possible ways cyberbullying could be carried out. bawly bawly yuh cry too much yuh neva look good yet, yuh cant dress at all Message • persistent – digital devices offer the ability to immediately and continuously communicate 24 hours a day, so it can be difficult for persons experiencing cyberbullying to find relief • permanent – most information communicated electronically is permanent and public if not reported and removed. If you suspect that you are being bullied, or that someone else is being bullied, tell someone. A teacher, guidance counsellor or parent should be notified; don’t suffer in silence. ACTIVITY 4.4 Preventing cyberbullying Cyberbullying is a real problem in some schools. In small groups: • Discuss why it is important to identify cyberbullying. • Define, in your own words, harassment, discrimination and threat of violence. • List the ways in which a person may be harassed online. Identity theft Identity theft ▶ Identity theft is the deliberate use of someone else’s identity, usually to gain a financial advantage. All individuals are vulnerable to having their identity stolen because data about them is held on multiple government and company computers. With enough identifying information about an individual, a criminal can steal an individual’s identity in order to conduct a wide range of crimes. For example: 104 9781380023322_text.indd 104 31/10/2019 11:18 4 • Social and economic impact of ICT • false applications for loans and credit cards • fraudulent withdrawals from bank accounts • fraudulent use of online accounts • fraudulently obtaining other goods or services. An unfortunate incident happened at Caribbean Travel Services. An employee had their identity stolen and the criminals telephoned the CTS payroll section requesting a large loan using the stolen personal information. Fortunately the processes at CTS require all such requests to be accompanied by a physical signature. The fraud was discovered only when the payroll section called the employee into the office to sign the agreement. ACTIVITY 4.5 Exploring identity theft In a small group discuss how you might feel if someone stole your identity and was pretending to be you: sending email, posting on social media, ordering items to be delivered to your home. • Create a short sketch to demonstrate how you might feel. • Share your sketch with the rest of the class. Online publication of obscene materials Obscene material ▶ ITQ 4.7 Suggest TWO ways in which a victim may be negatively impacted by the effects of the online publication of obscene materials. Obscene material is material of a sexual nature or material that offends against society’s morality. Obscene material is offensive to look at and someone who accidentally views this material may feel invasion of privacy because this is on their computer, in their home. This can lead to emotional distress. The publication of obscene material may impact the person targeted, the perpetrator (criminal) and, in some cases, the online outlet through which the materials were published. In some cases the perpetrator, if caught, may lose their job and be sent to prison and the affected person may have to relocate to a new town to try to lessen the psychological effects. Phishing attacks Phishing ▶ Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details by sending emails pretending to be from a legitimate organisation. Users are tricked into responding to the email because it looks believable, promises them some benefit or warns of some penalty. Users are asked to click on a link; the link then takes the user to a fake website which tricks them into entering personal information. Phishing emails can be detected because: 1 they are unsolicited (e.g. the sender has no permission to send it to you) 2 they often contain spelling or grammar errors 3 they urge you to act immediately 4 an email program may warn you that the email is potentially a scam. 105 9781380023322_text.indd 105 31/10/2019 11:18 Theory Figure 4.6 Example of a phishing email, Godaddy Webmail Godaddy Webmail To: Recipients Reply-To: no-reply@godaddy.com Today at 10:24 AM Important notice Dear Customer We received an instruction to empty all your Inbox and sent folders. We will Delete and Close Your Account Within 48 hours, If you think it is an error, take action immediately to stop this process CANCEL & STOP NOW Thank you for being a Web-Based Email customer. We’re available 24-7 to help you with any questions regarding your email. Sincerely, The Web-Based Email team Figure 4.7 Example of a phishing email, Barrister Darlington Adams This message has been identified as junk. Not junk Show images From: BARRISTER DARLINGTON ADAMS <bdadams06@gmail.com> Sent: Sunday, April 28, 2019 1:04:22 AM To: John.Doe@gmail.com Subject: YOUR COMPENSATION OF USD$1.5 MILLION REPLY URGENTLY. Dear Friend, This will be a surprised mail to you; i have tried as much as possible to get you on phone, to inform you that i have finally claimed the fund both of us suffered so much. ITQ 4.8 Watch the video about spam and phishing. What is phishing? I succeeded to have it with the help of another partner, who made a tremendous financial commitment to see it through, i bargained with him, before we proceeding on seeing it through I am compensating you, with the sum of us$1.5 million due to your name was legally used for the claim and remittance of this fund and all the sufferings we've been through to make it a reality. I have directed my secretary to assist in sending the share of the fund to you, i am currently in Asia continent now, on business investments with the new partner that assisted me, and i will not be able to respond to emails. So do contact me when my secretary has concluded on sending your share to you. Please do contact him on this email addresses: His name is Mr. John Huru Email : huru_jo06@yahoo.com Regard BARRISTER DARLINGTON ADAMS ITQ 4.9 Phishing emails can be identified by careful users. Suggest three features of a phishing email that may cause the recipient to become suspicious. Communications claiming to be from financial institutions, service providers (such as online payment processors and hosting providers), social websites, package delivery companies or IT administrators are often used to lure potential victims into a phishing scam. The effects on the individual of falling for a phishing scam are the same as suffering identity theft. In addition, phishing emails may be the first step in establishing a fraudulent relationship for the purposes of grooming or financial fraud. In both these cases the initial phishing email is followed by more emails, text messages and telephone calls. 106 9781380023322_text.indd 106 31/10/2019 11:18 4 • Social and economic impact of ICT At Caribbean Travel Services all staff who deal with incoming email are trained to spot phishing email. The email is then referred to management so that all relevant staff can be warned. Violation of privacy Privacy ▶ Privacy is the right of persons to choose freely under what circumstances and to what extent they will reveal information about themselves. Privacy relates to an individual’s ability to control their personal information. Governments and organisations that store our personal data must keep it private. Personal data includes name, address, date of birth, bank information, telephone numbers, driving licence number and family information such as mother’s maiden name (which is often used as a security question for checking a person’s identity). Any act that violates any of these rights is deemed a violation of privacy including: • storage of inaccurate personal data • sharing of data (for free or for a fee) without the owner’s consent • using data for purposes other than that for which it was collected. Many websites include a privacy policy and in addition some territories have passed data protection legislation. Privacy policies outline how the data that websites collect will be used and what rights the user is giving up when they accept the website’s terms of service. ACTIVITY 4.6 Exploring individual privacy Alexia uploaded a picture of herself to a website in order add to filters to it. She was asked to provide her email address so that the completed picture could be sent to her by email. She did not provide the website with any authorisation to use the personal data provided. • State two items of personal data that were provided to the website. • Suggest two ways in which her privacy may be violated. • Compare your results with the rest of the class. Cookies ▶ The impact of privacy violations on an individual may be at minimum severe embarrassment, and at worst, identity theft. A cookie is a piece of data sent from a website and stored on the user’s computer by the user’s web browser while the user is browsing. This screenshot shows a request to install cookies on a computer system. We use cookies to provide you with a better browsing experience. By continuing to browse, you are agreeing to our Cookie Policy. Figure 4.8 Pay close attention to the opt-in options. In this example by simply continuing you are agreeing to this company’s Cookie Policy 107 9781380023322_text.indd 107 31/10/2019 11:18 Theory Computer misuse that impacts organisations ITQ 4.10 Suggest how an extreme case of violation of privacy could lead to identity theft. In this section, we will outline five acts of computer misuse that primarily impact organisations: copyright infringement, software/music piracy, data theft, denial-ofservice attack and malware. Copyright infringement and software piracy Copyright ▶ Copyright is a legal right that gives the creator of an original work exclusive rights over its use and distribution. Copyright is a form of intellectual property applicable to certain forms of creative work such as books, illustrations, maps, poetry and plays. These rights include reproduction, control over derivative works (works based on the original work), distribution and public performance. Figure 4.9 The copyright symbol indicates that the piece of work is under copyright and permission of the copyright holder must be sought before use Copyright infringement occurs when an entity that is not a rights holder reproduces, creates a derivative work, distributes, performs or otherwise benefits from the copyrighted work without obtaining the requisite permissions (and paying any associated rights fees). Copyright can be infringed by individuals and organisations alike. For example, the installation and use of proprietary software, such as Microsoft Windows and Office 365, without the requisite licence is a form of copyright infringement, whether the software is used on a personal tablet or on 100 corporate laptops. The easy availability of material on the WWW has made copyright infringement a serious problem. ACTIVITY 4.7 Exploring plagiarism This activity is for larger groups. Plagiarism is copying someone else’s work and pretending it is your own. With all the information available on the WWW some foolish students are tempted to copy other persons’ work and claim that it is their own. You are going to prepare for a debate titled ‘It is legitimate to base your homework on a piece of copyrighted work.’ • Split into two subgroups. • Decide which group will be for and which group will be against the motion. • Prepare your arguments for the debate. • Be prepared to take part in a class debate on the motion. 108 9781380023322_text.indd 108 31/10/2019 11:18 4 • Social and economic impact of ICT Software piracy ▶ One effect of copyright infringement is the loss of revenues to the rights holder. Organisations that get caught using unauthorised copyrighted software risk potential negative publicity and significant fines for copyright infringement. Software and music piracy are specialised cases of copyright infringement. Software piracy is the unauthorised reproduction, distribution or use of software products. Software publishers spend years developing software for the public to use; a significant portion of every dollar spent in purchasing original software is funnelled back into research and development so that better, more advanced software products can be produced. In some countries or regions pirated software can be bought illegally in street markets. Caribbean Travel Services has procedures in place to ensure that all software has the appropriate licences. Audits of the software installed on company computers are regularly carried out to identify possible unlicensed software. ACTIVITY 4.8 Use the company you created in earlier activities or use St Luago Fashion. The Board of Directors wants to know how you are going to ensure that all software is correctly licensed. • Create a three-minute presentation to give to the Board. • Be prepared to give your presentation to the rest of the class. Software piracy negatively impacts the legal owners that produce the software because it reduces their revenues. It also harms national and regional economies. A lower number of legitimate software sales results in lost tax revenue. Software piracy greatly hinders the development of national software industries, an increasingly lucrative industry that many Caribbean governments have set their sights on. Data theft Data theft ▶ Dark Net ▶ Data theft is the unauthorised copying or removal of data from the legitimate owner’s computer system. The Dark Net is the term given to the parts of the Internet that are kept hidden from the general public and cannot be accessed by standard search engines such as Google and Bing. Suspect activities such as computer hacking and fraud take place on Dark Net websites. Criminals target computers that store personal or commercial data because this data, especially in large volumes, has significant economic value in the criminal underworld. In many cases, data stolen during these breaches is offered for sale in places such as the Dark Net. A data theft that accesses full names and national registration numbers enables identity theft. 109 9781380023322_text.indd 109 31/10/2019 11:18 Theory Figure 4.10 A hacker tries to break into a computer system ACTIVITY 4.9 The Dark Net Data stolen during data breaches is often sold in places such as the Dark Net, which serves as a marketplace for stolen data. In a small group discuss the Dark Net and how might it support an identity theft attack. Data theft may be instigated internally, by an employee, or externally, by hackers exploiting poor security or lost/stolen storage devices or media. The effects on an organisation of data theft include reputational loss and loss of customers, possibly leading to reduction in profits, and in extreme cases the organisation may be forced to cease operating. Denial-of-service attack Denial-of-service attack ▶ Distributed denial-of-service attack ▶ A denial-of-service attack (DOS attack) is a cyber-attack where the intent is to prevent a service being delivered by the target system. The attack could be by an individual hacker exploiting a vulnerability in the target system to gain unauthorised access and so crash the system from within. When the attack is directed from the outside in, it may be a distributed denial-ofservice attack. A distributed denial-of-service attack (DDOS attack) is a cyber-attack during which the target system is flooded with requests that overload the targeted system. A DDOS attack is often staged by activists and blackmailers. It can be as simple as sending thousands or millions of emails to the same address at the same time to swamp an organisation’s email service, causing it to fail. It may have the shortterm impact of making the resource or service unavailable for anywhere from a few minutes to a few hours. In the short term, the organisation could lose business as a result of the temporary outage. Over the long term, customers may decide to switch to an alternative provider as they fear future security issues or simply can’t afford to have a service unavailable. 110 9781380023322_text.indd 110 31/10/2019 11:18 4 • Social and economic impact of ICT Malware Malware ▶ ITQ 4.11 Suggest TWO ways malware may gain entry to a computer system. Malware, malicious software, is software designed to disrupt, damage or gain unauthorised access to a computer system. Viruses, worms, trojans, ransomware and spyware are all types of malware, as shown in Table 4.3. The writers of malware programs use a variety of means to spread malware and infect devices and networks. Malicious programs can be delivered: 1 physically to a system through a USB drive or other external storage device 2 via the Internet – when a user downloads a legitimate program, the malicious program automatically downloads to the user’s system without their approval or knowledge; this situation is usually initiated when a user visits a malicious website 3 via phishing attacks which use emails disguised as legitimate messages but which contain malicious links that when clicked automatically download malware programs. Name Description Ransomware A type of malware designed to infect a user’s system and encrypt the data; cybercriminals then demand a ransom payment from the victim in exchange for promising to decrypt the system’s data. Often the promise is not fulfilled. Spyware A type of malware designed to collect information and data on users and observe their activity without their knowledge. Trojans A type of malware included with a legitimate program and activated following installation, Trojans execute (run) malicious functions such as stealing usernames and passwords. Viruses A type of malware that resides in a host program and executes itself when the program runs. It spreads by replicating itself and infecting other programs or files; it can corrupt or delete data on a computer system. Worms A type of malware that can self-replicate without a host program; worms typically spread without any human interaction or directives from the malware authors. ITQ 4.12 Watch this video about protecting your computer. What is malware? Table 4.3 Types of malware: what they are and what they do Infected computer Computer 1 Computer 2 V V V V Computer 3 Computer 4 Infected storage media V V V Hub V Figure 4.11 How a virus spreads from an external storage device to infect computers on a network 111 9781380023322_text.indd 111 31/10/2019 11:18 Theory The effect on an organisation of being infected by any type of malware can be catastrophic. Because computer systems are networked, malware often spreads and infects all the computers connected to the network. In the worst case the malware can encrypt or delete critical data files on every computer system. ACTIVITY 4.10 Viruses, worms, spyware and Trojans Many types of malware affect personal and organisational computer systems. Some threats, like ransomware, target large organisations that rely on their data to provide core services to their clients. In groups of three or four: • Name the types of malware that affect individuals and organisations alike. • Each member of the group should take one malware type and conduct research to determine how this malware is spread. • Report your findings back to the group or the class. Caribbean Travel Services regularly employs a computer security consultant to review the vulnerabilities and threats to its computer systems. Suitable countermeasures are then put in place to prevent attacks. Computer misuse that involves governments In this section, we will outline two acts of computer misuse that primarily involve governments: electronic eavesdropping and propaganda. Electronic eavesdropping Electronic eavesdropping ▶ Electronic eavesdropping is the act of electronically intercepting communications without the knowledge or consent of at least one of the participants. Electronic eavesdropping (or electronic surveillance as it is more formally known) is used by law enforcement and criminal elements. Today, the available eavesdropping tools include: • intercepting emails • activating a laptop webcam to watch you remotely • Internet-enabled home security systems that can be hacked so criminals can view your home • voice-controlled TVs that can be hacked to listen into your conversations. Governments do carry out electronic eavesdropping activities in valid ways when trying to keep their citizens safe; for example, email interception can prevent terrorist atrocities or disrupt criminal activities. However, when a government uses its digital eavesdropping resources against another government this can cause serious trouble. For example, if confidential government emails are intercepted by foreign governments the impact can be serious and cause a diplomatic incident. 112 9781380023322_text.indd 112 31/10/2019 11:18 4 • Social and economic impact of ICT Propaganda Propaganda ▶ ITQ 4.13 State TWO positive implications of the legal use of electronic eavesdropping. Propaganda is communication of information that is of a biased or misleading nature and that is aimed at influencing the recipient. Propaganda can be used by many different organisations, including activist groups, companies, the media and government bodies, for various purposes. The content is usually repeated and dispersed over a wide variety of media. Online platforms such as Facebook, Twitter and YouTube give individuals worldwide reach for their opinions with very little regulation. Facebook publicly acknowledged that its platform had been exploited by governments seeking to manipulate public opinion in other countries. Both the United States of America and France claim that their presidential elections were influenced by external governments using social media. ACTIVITY 4.11 In addition to threats that arise from the outside, there are a few threats that arise from inside organisations. These threats may result in data loss, theft or breach of the data’s integrity, through accidental or deliberate acts. • Working in groups of four, conduct research to identify potential threats from inside an organisation including: • Fraud • Why might an employee try to defraud the organisation? • How might they commit the fraud? • Revenge • Who might want revenge? • What form might their revenge take? • Hardware malfunction or failure • What sort of failures: disk drive failure, power outage? • Could this be deliberate damage? • Environmental factors • How might fire and flood damage occur? • Discuss the findings as a group. • Share the insights gained with the class using a presentation on PowerPoint, LibreOffice Impress or a similar tool. Countermeasures to mitigate the effects of identified threats Earlier in this chapter, the concept of security was identified as a process of mitigating or eliminating risk by implementing countermeasures. We will explore three areas of countermeasures: • physical measures • software measures • personal security practices. 113 9781380023322_text.indd 113 31/10/2019 11:18 Theory When combined, these measures can provide effective computer security and cybersecurity to computer systems. Physical security measures Physical security measure ▶ A physical security measure is any mechanism that reduces the risks of unauthorised access to a computer system’s hardware. These can be: 1 controlling access to locations containing computer hardware 2 restricting the movement of computer hardware and storage media 3 reducing the chances of damage to hardware and storage media from environmental damage and deliberate damage. Physical security countermeasure How it should be used Secure location Suitable locations are places/spaces that are not well trafficked such as a room on the top floor of a building or at the end of a passage. Security personnel Well-trained security personnel (security guards), operating at access points to process visitors and grant access to authorised persons only. Electronic access systems Include biometric systems, key cards, magnetic swipe cards, numeric keypads and proximity cards at key access points which automatically record details of authorised access or unauthorised attempts. Equipment locks Secure locking mechanisms fitted on computer system cases, peripheral devices, communication equipment enclosures, and storage cabinets. Fireproof and waterproof storage Purpose-built cabinets or safe boxes that can withstand fire and flood events are used to store removable storage media (disks, tapes, flash memory cards, optical media (CDs and DVDs)) when not in use. Table 4.4 Physical measures that can mitigate computer security risk (a) (b) (c) Figure 4.12 Electronic access systems: (a) numeric keypad, (b) proximity card being read by a card reader (c) proximity card 114 9781380023322_text.indd 114 31/10/2019 11:18 4 • Social and economic impact of ICT ITQ 4.14 The offices, garages and depots of Caribbean Travel Services all have appropriate physical security. Head office is particularly well secured, with barred windows in the main computer room, which is situated well away from the public area and requires an access card to gain entry. All CTS computer systems are fitted with locks to secure them to office furniture or directly to building walls. Both the garages and depots are covered by security CCTV (closed-circuit television) cameras integrated into the site’s Local Area Networks.. Suggest THREE physical countermeasures that an e-commerce business may employ to prevent unauthorised persons accessing their computer systems. ACTIVITY 4.12 Use the company you created in earlier activities or use St Luago Fashion. In the early days of your company, keeping cost down is going to be important. • Discuss what physical security measures might be applicable to protect the company’s computer systems. • Order these starting with the most cost effective. • Create a list to share with the class. Software measures Software countermeasures ▶ Software countermeasures are a combination of specialised system software and application software used to protect computer systems. Software countermeasure How it should be used Backup and recovery policy and operational plan • Make a safety copy of important files (a backup) regularly to a removable storage device and keep at Effective identity checking systems (including biometrics) a remote location in a secure fireproof/waterproof cabinet. • Recover data from the copy in case of an event that causes data damage or loss. • Grant access to restricted areas or resources based on the presentation of a password or access code. • Grant access to restricted areas or resources based on unique biological features such as fingerprint, retina or voice. Encryption (using a code so the data • Encrypt sensitive data before transmitting it over public networks or storing on removable media. cannot be understood) • Use higher levels of encryption for more sensitive data such as access codes and credit card numbers. Firewall (blocks dangerous content on a network) Malware detection and removal • Restrict network traffic entering, or leaving, a system, usually blocking all traffic except email and access to the WWW. • Use a firewall as a barrier between a public network and the organisation’s private network. • Set anti-virus tools to automatically scan for malware all removable devices attached to a computer system and all network traffic including incoming email and FTP-downloaded files. • Keep up to date and regularly run an anti-virus program to perform an in-depth scan of all files on the computer system. Operating system updates • Immediately quarantine and/or remove identified threats. • Set the operating system to automatically download and install updates. • In mission-critical systems, updates may have to be installed manually because they may affect system performance (mission-critical systems are systems that are essential to the operation or survival of an organisation). Table 4.5 Software measures that can mitigate or eliminate computer security or cybersecurity risks 115 9781380023322_text.indd 115 31/10/2019 11:18 Theory ACTIVITY 4.13 Investigate how one of the following individuals protects the files on their computer systems to maintain their integrity and keep them secure: • a classmate • a staff member in the school’s bursary • a teacher • a staff member in the school’s student records office. 1 Describe the measures used by the individual selected. 2 Collaborate on the preparation of a report to summarise your findings. 3 Share the insights gained with the class using a presentation on PowerPoint, LibreOffice Impress or a similar tool. Personal security practices Personal security practices ▶ Personal security practices are countermeasures used by individuals to implement computer security and cybersecurity. Education is the key to good personal security practice. Both employers and employees should be trained in the following practices that help to mitigate computer security risk. Practice How it should be used Limit use of open Wi-Fi networks • Exercise extreme caution when using an open Wi-Fi connection. • Never use an open Wi-Fi connection for confidential work such as online banking. • Create secure (but memorable) passwords. The passphrase I@mAB!gB0y has good strength: it Follow password best practices includes lowercase, uppercase and special characters, and a digit. This is much stronger than a password such as Benji261185 (which includes a name and a date of birth). • Commit your passwords to memory or simply write them down and store them in a secure location (such as a locked cabinet, a password app that requires a fingerprint to open or an electronic encrypted password-protected file). • Never share your password/access cards/access codes/credentials/username with anyone. Defend against identity theft • Reduce the sharing of personal identifying information including dates, places and names. • Birth dates; full names of family members, close friends and associates; and information that may identify places frequented (such as homes, social spaces and businesses) should be shared sparingly. Always be aware of phishing emails • Remain alert whenever you receive an unsolicited email. • Check URLs and hyperlinks before clicking; ensure that each is from a trusted source and is legitimate, especially those contained in unsolicited emails. Keep track of your mobile devices and removable storage devices • Know where each device is at all times and ensure that those in storage require a password/PIN to gain access when powered up. Access sensitive files only on a secure • Don’t access sensitive files or carry out banking transactions on free public Wi-Fi in the shopping network mall or park because these are not secure. Make regular backups of your own files • Make a safety copy of your files to a secondary storage device and keep that safe. • Work files should be backed up by the company and so shouldn’t be copied by employees as this presents a security risk. Table 4.6 Personal security practices that can mitigate computer security risk. 116 9781380023322_text.indd 116 31/10/2019 11:18 4 • Social and economic impact of ICT Figure 4.13 The Backup and Restore tool is one of the Windows operating system accessories. Staff at Caribbean Travel Services all undertake personal security practice training and are encouraged to study further. CTS pays for employees who undertake additional computer security training. Assess the effects of automation on job security We have seen that computers systems are now used in a vast range of application areas. This has changed how we prepare for jobs, apply for jobs and perform these jobs. In this section we will explore a wide range of skilled and unskilled jobs and how they have been affected by the introduction of IT systems. Figure 4.14 14 Hospital receptionists have to become skilled in computerised record-keeping 117 9781380023322_text.indd 117 31/10/2019 11:19 Theory The introduction of computers has led to a change in the way persons work. Being able to use a computer system has become an indispensable skill. Unskilled and low-skilled workers are retraining and becoming more productive by using IT systems. • In offices, typists have had to retrain to become skilled word processing clerks. ITQ 4.15 Watch a video about creating a safe workspace. How can using a computer at work impact on someone’s health? • In education, teachers and lecturers need skills similar to those of modern office personnel to access student records, produce test papers and maintain electronic mark books. • Medical personnel need to access patient records, produce documents, plot charts and graphs of patients’ progress and operate computerised life-support systems. • Musicians now use computers as a creative tool to create, mix and distribute their music. • Mass media personnel also use computers in a creative way. Newspaper publishers must be skilled in desktop publishing to lay out their magazines and papers. Photo-editing skills are needed to enhance pictures ready for publication. In the visual mass media such as television, the skills to create animations, charts and graphs must be mastered. • Law enforcement officers require computer literacy skills including word processing to fill in crime reports, database skills to access criminal records, and specialist skills to operate a variety of software such as fingerprint-matching and photo-fit picture software. • In the movie industry, staff must be able to exploit the power of computers, particularly when editing the movie and in the production of special effects, animation and computer modelling. ACTIVITY 4.14 The changing face of jobs Identify up to five employed persons who use computers. • Interview one or more of these persons about their experience before and after they started to use computers. • Record the results in your notebook. • Note any change in the job or in productivity that was noticed with the introduction of computers to the job. ITQ 4.16 Describe ONE positive and ONE negative impact that Information Technology has had on a medical professional. In some cases, the introduction of computer technology has resulted in job losses as the business becomes more efficient. The nature of the remaining jobs changes in a positive way as they become more varied, interesting and challenging, and require higher levels of skill. Consequently, there is a need for retraining and continuing education. 118 9781380023322_text.indd 118 31/10/2019 11:19 4 • Social and economic impact of ICT Describe the roles of various personnel in computer-related professions Computers systems require a large number of skilled professionals to: develop software, maintain websites, manage databases, run social media, and keep computers and networks running smoothly. Some organisations base their business on their computer systems; for example, banks, online retailers and insurance companies. These organisations have large dedicated IT departments employing hundreds of staff. Job title Role Role Network engineer Responsible for the design and implementation of computer network LANs, MANs and WANs. Computer programmer Writes programs based on specifications, prepares documentation and maintains existing software. Computer support specialist Assists users who are having problems with their computer systems. Known as a help desk this service is often available as telephone support. Systems analyst Oversees activities related to the design and development of new information systems. Database administrator Responsible for designing and maintaining the organisation’s database system. Network administrator Responsible for day-to-day smooth running of an organisation’s networks. Software developer Works with the system analyst and develops the program specifications that the programmers will work from. Web developer Takes a web design from a client and turns it into an operational website. Social media specialist Responsible for planning and implementing a company’s social media strategy and output which may include Facebook, Twitter, Instagram, WhatsApp and many more. System administrator Responsible for the day-to-day running and management of the computer systems. Installs and updates software and ensures the system is secure. Table 4.7 Staff in a typical IT department ITQ 4.17 List the roles of any FOUR employees in the IT department of a large organisation. Figure 4.15 A network engineer creating a local area network . Caribbean Travel Services is a growing company and has a small IT department of permanent staff including a systems analyst, database engineer and network engineer. For other IT task such as web development, social media activity and programming, CTS employs freelance consultants when required. 119 9781380023322_text.indd 119 31/10/2019 11:19 Theory Assess the impact of information and communications technology on selected fields Computers and their impact on education Figure 4.16 A school computer lab in Trinidad Schools and universities of all types now have computers. In schools, office administrators maintain all the school records – student attendance registers, course details and test results – on the computer system. They also keep the staff records, calculate salaries and maintain an inventory of the equipment owned by the school. However, it is in the classroom that computers are having the largest impact. The multimedia facilities of a modern computer make it an ideal teaching aid. When computers are used in this way it is known as computer-aided instruction (CAI) or computer-aided learning (CAL). Interactive computer-based training packages allow students to work at their own pace and at a time that is convenient to them. Modern training packages regularly test the student and progress through the course at different speeds depending on how well the student is scoring in the tests. If students live in remote areas, distance learning may be appropriate. In distance learning the tutor and the students are in different locations and make use of learning management systems. Students use CAI packages and communicate with their tutors via the Internet. Students use email to submit assignments and receive feedback. Students sometimes want to undertake individual projects, in which case the Internet and electronic encyclopaedias are excellent research tools for finding information on all sorts of topics. Remember though to be careful with information found online – use trustworthy websites and use the methods listed in Chapter 2 to verify the information. ACTIVITY 4.15 Computers for learning Use an Internet-based video viewing tool such as YouTube, educational television programmes, or video clips that your teacher has provided (teachers: the free Child Exploitation and Online Protection (CEOP) videos are good for this). In small groups: • Discuss each video or programme, focusing on how it taught you something new. • Present what you have learnt as a one-page poster. • Recommend one video to the rest of the class. 120 9781380023322_text.indd 120 31/10/2019 11:19 4 • Social and economic impact of ICT ITQ 4.18 List THREE ways in which computers are now used in classrooms at your school in the teaching/learning process. Computer applications found in the classroom will certainly include word processing to create documents for projects and school-based assessments. Spreadsheets might be used by teachers to automatically calculate students’ average marks and sort them into rank order. Presentation packages allow university lecturers to prepare slides on a topic, which can be displayed from a laptop computer onto a large screen using a projector, allowing a large number of students to attend lectures. A desktop-publishing application would be used to create a school’s newsletter or posters advertising the drama department’s latest show. Computers are certainly widely used in all aspects of education. Computers and their impact on medicine Modern health services in the Caribbean rely heavily on computer systems for their day-to-day operation. A busy doctor may be asked to review many chest X-rays for diseases such as tuberculosis or pneumonia during a shift. Computer expert systems can help reduce this load by analysing the X-rays and identifying those with abnormalities that need further investigation. These systems support doctors because they may spot a problem that a busy doctor has missed. A CT scan, also known as computed tomography, produces a set of 2-dimensional images. Powerful computers systems take these and create a 3-dimensional model that is used by the specialist doctors to diagnose problems. In some cases it may be useful to print a physical model on a 3D printer. Figure 4.17 A computer controlled scanner maps a patient’s brain function In hospital wards patients may be connected to computer systems that continually monitor their condition. A patient’s heart rate, oxygen level, blood pressure and temperature are typically monitored by these systems, which alert staff if certain values are exceeded. In a doctor’s practice, uses of computer systems include: • managing patient files ITQ 4.19 Suggest THREE ways in which a nurse in a busy hospital may use a computer system. • financial accounting of profit and loss statements • billing and managing insurance forms • managing employee records • accessing the Internet and extranets for immediate access to drugs databases and to check disease symptoms. 121 9781380023322_text.indd 121 31/10/2019 11:19 Theory Computers and their impact on business Figure 4.18 Electronic equipment at the checkout in a supermarket Figure 4.19 Magnetic strip point-of-sale equipment ITQ 4.20 (a) What does EPOS stand for? (b) Where might an EPOS be found? ITQ 4.21 List the advantages that working from home may have for telecommuting workers. Business is usually concerned with buying and selling or financial dealings. Supermarkets, importers/exporters and banks are commercial businesses. Industry is usually concerned with producing items. Many businesses and industries rely heavily on computer systems. Supermarkets have specialised EPOS (electronic point-of-sale) hardware and software. EPOS is a combination of hardware and software used in retail outlets to improve service to customers and to control stock. An EPOS terminal in a supermarket consists of the cash register, magnetic stripe reader for credit card payments, barcode reader, mini touchscreen monitor, mini thermal printer, weighing scales with weight sensors and keyboard. All the EPOS terminals in the store are connected to the supermarket’s mainframe computer system. The software is based on a database that stores the description of all items available in the shop, their barcode number, their price, the number left in stock and other associated information. This database is continually and automatically updated as items are sold and as new items arrive from suppliers. When new stock deliveries are made they are recorded on the database system – the computer system. Having access to up-to-date stock information about how well different products are selling allows wellplanned stock reordering. Summary information about daily sales is collected from all the branches in the supermarket chain and fed to the head office so that strategic long-term decisions can be made by the executives of the organisation. Computerisation has revolutionised the way supermarkets and other commercial businesses operate at all levels, from the workforce to the top management. In other business the need to cut down on office space has led to the widespread use of freelance workers and teleworkers who work from home. Companies allow certain groups of employees to work from home under an arrangement called telecommuting. These employees stay at home but work over the telephone lines. They use their computer, the Internet service and special system software to establish a secure connection between the company’s computer system and their own. By doing this, they have access to the full range of software and data on the computer system at work, enabling them to work just as productively from home. 122 9781380023322_text.indd 122 31/10/2019 11:19 4 • Social and economic impact of ICT Computers and their impact on law enforcement Figure 4.20 Police officer accessing data on a computer system Figure 4.21 Fingerprint matching in progress Police forces make extensive use of IT systems. Police officers and detectives need to maintain or have access to many up-to-date databases. Traffic police need immediate access to vehicle and driver details when they are carrying out a check, e.g. whether a particular vehicle is registered and the appropriate tax has been paid, whether the vehicle has been reported stolen, whether it has valid insurance, whether the driver holds the correct licence or what is the driver’s home address and phone number. A traffic officer needs this information when on patrol, so they will have a portable computing device connected to the police network over a mobile network. Detectives investigating crimes such as theft of property need access to a fingerprint database to allow matching of prints taken from a crime scene against those of known criminals. Modern DNA analysis means that if a sample of DNA from the crime scene is matched with an entry in a DNA database, further investigation into a suspect will be needed. Analysis of a reported crimes database may find similarities and relationships between different crimes indicating that they were committed by the same criminal. A database of stolen goods may allow a detective to return recovered items to their rightful owners. Internationally, law enforcement databases, such those maintained by Interpol, may allow stolen art works or stolen passports to be identified. This data sharing works both ways, with local law enforcement sharing their information with other selected partners using an extranet. Increasingly, facial recognition is being used in busy public environments such as airports. Many countries are now installing cameras and facial recognition systems at borders, allowing persons’ identity to be automatically checked against their passport photograph. This reduces the need for border control staff and improves passengers’ experience as they pass through the control much quicker. The Internet, the WWW and various social media sites such as Facebook, Twitter and Instagram are extensively used by law enforcement agencies. Monitoring social media may identify a range of illegal activities including: drug dealing, child grooming, financial fraud, phishing scams, cyberbullying, publication of obscene material, copyright infringement and music piracy. ACTIVITY 4.16 Law enforcement Law enforcement agencies are tracking criminals. • Give examples from cyberspace where law enforcement agencies are monitoring activities. • List information a policeman might check about a vehicle you are travelling in. • Combine your answers with those from the rest of the group. • List your combined answers to share on the class notice board. 123 9781380023322_text.indd 123 31/10/2019 11:19 Theory Computers and their impact on recreation Figure 4.22 Enjoying computer games Computers appear in a great variety of recreation and entertainment situations. In the home, computer games are often more enjoyable with a plug-in steering wheel, joystick or laser gun to reproduce arcade game effects. Internet games such as ‘Words with Friends’ can be played with opponents on other computers connected to the Internet. Specialist gaming hardware is used in game stations such as PlayStation, Xbox and Wii. In modern recording studios, musicians work with computers to create complex electronic music. Music is captured through connection of musical instruments to the computer system using the Musical Instrument Digital Interface (MIDI). This is then manipulated using specialpurpose synthesiser programs. In large entertainment venues sound and light shows are often computer controlled. In smaller venues disc jockeys (DJs) no longer play vinyl records on a record player. A laptop connected to the sound system allows the DJ to line up and mix tracks using special-purpose DJ software. Adding a large-screen display or projector and specialist karaoke software allows karaoke evenings to be easily run. Figure 4.23 A DJ’s equipment: music decks and controls, recording and sound equipment On the tennis court, the computer acts as a line judge. When the ball bounces close to the line markings, it can be called ‘in’ or ‘out’ by the computer system. The computer also keeps track of the scores in the match. In the Olympic swimming pool, where a fraction of a second can be the difference between gold and silver medals, pressure pads connected to a computer detect exactly when each swimmer touches home. It is now common to book airline seats and hotels over the Internet. Some persons organise their entire holiday using the Internet. They find and book the cheapest flight and hotel on the WWW, they arrange a taxi to pick them up at the airport by email, and they buy necessary items for their holiday from online retailers before they leave. 124 9781380023322_text.indd 124 31/10/2019 11:19 • The computer 4 • Social and1economic impactsystem of ICT Summary • A computer security risk is any event, action or situation that could compromise data stored on a computer system. • Computer security is all the activities related to identifying, assessing and mitigating computer security risks. • Copyright infringement, data theft, denial-of-service attacks, financial abuse, industrial espionage, software and music piracy, and transmission of malware can negatively impact organisations. • Cybersecurity is all the activities related to identifying, • Physical security measures include intrusion detection and assessing and managing the vulnerabilities, threats and attacks originating from cyberspace. • Software countermeasures to computer threats include • Computer misuse relates to a range of illegal activities during which a computer is accessed, its facilities modified without proper authorisation, its services obtained, or its services used to commit a criminal act. • Computer security has four main elements: vulnerability, threat, attack and countermeasure. • A countermeasure is an action taken to counteract a threat; for a particular countermeasure to work, it must effectively minimise or eliminate one or more vulnerabilities. • Cyberbullying, financial abuse, online publication of obscene materials and phishing attacks are types of computer misuse which may negatively affect individuals. • Privacy relates to an individual’s ability to restrict or eliminate the collection, use and sale of confidential personally identifiable information. Any act that violates any of these rights is deemed a violation of privacy. biometric access controls. anti-virus programs, firewalls, security updates and encryption of data. • Firewalls can be either a hardware device connected to a network or software running on the network-connected computer. • Personal security practices include strong passwords, care on public networks, awareness of phishing techniques and managing personal information to minimise the risk of identity theft. • Information Technology has had both a positive and negative impact on jobs – it has caused the creation of new jobs and the loss of lower-paid unskilled jobs. • Among the new generation of IT professionals there are network engineers, system analysts, software developers, web developers and social media specialists. Answers to ITQs 4.1 Cybercrime is crime perpetrated using computers and networks. 4.2 A similarity between computer security and cybersecurity is that both focus on assessing and minimising risks. The difference is that computer security focus is on a local computer installation controlled by an individual or entity whereas cybersecurity focus is on network-connected computers. 4.3 Countermeasures to prevent physical access to a computer system might include positioning of the computer installation, guards at access point, locks on doors, biometric security, entry cards and fittings to secure computers to desks. 4.4 Individual misuse of a computer may include unauthorised modification, removal or copying of data; obtaining unauthorised computer service; intent to commit a crime using a computer. 4.5 Governments may misuse computers by intercepting diplomatic communications, fraudulently modifying election results, spreading propaganda or deleting inconvenient data. 4.6 Cyberbullying might include online name-calling; a text, tweet or response to a status update on a social media platform that is harsh, mean or cruel; impersonating a victim online; posting personal information, photos or videos designed to hurt or embarrass another person. 4.7 A victim of viewing obscene material may feel an invasion of privacy and emotional distress. 4.8 A phishing email pretends to be from a bank or other trusted source and tries to trick you into handing over your personal information. 4.9 Phishing emails may be identified by aspects such as: the email is from an entity that the recipient has no business with; the email is not personally addressed to the recipient; the domain name forming a part of the sender’s email address does not match the name of the sending entity; there are spelling, grammar or style/ formatting errors in the message. 4.10 If a hacker can steal sufficient personal information they may be able to trick entities, such as banks, into believing that they are that person. 4.11 Malware viruses may infect a computer: when an infected removable media is connected to the computer, when someone downloads a file containing a virus or when someone visits an illegal website that downloads a virus. 125 9781380023322_text.indd 125 31/10/2019 11:19 Theory 4.12 Malware is software designed to damage your computer or gain unauthorised access. 4.13 Positive implications of eavesdropping by law enforcement may be to monitor terrorist communications leading to arrests. Criminals may be deterred from criminal activity because they know their communication is being monitored. 4.14 E-commerce businesses can physically secure their computer systems by installing them in secure buildings, employing guards at access points, putting locks on doors, and using biometric security and entry cards. 4.15 Extended use of computers can cause health problems that include: backache, wrist strains, eye strain and poor posture. 4.16 Nurses and doctors have been impacted in many ways by computers; automatic monitoring of patients, immediate access to patient records and access to a large database of available drugs are just a few of the advantages. Disadvantages include the need to take time to retrain and problems when the technology is unavailable or not working. 4.17 The roles in a large IT department will include: network engineer, computer programmer, computer support specialist, systems analyst, database administrator, network administrator, software developer, web developer, social media specialist. 4.18 Teachers may use computers in the classroom to: give presentations on a projector, use computer-aided learning programs, perform automated testing, play interactive learning games or conduct Internet research activities. 4.19 A nurse in a hospital may use computers to monitor patients automatically, access medical records, research drugs and check hospital policies. 4.20 EPOS means electronic point-of-sale and these systems are often found at supermarket checkouts. 4.21 There are many advantages to using IT to work from home including no travel time, flexible work hours, quiet and comfortable environment, and savings on expensive office space. Examination-style questions: Multiple Choice Instructions: Each item in this test has four suggested responses labelled (A), (B), (C) or (D). Read each question carefully then select the most suitable response. 1) 2) 3) 4) Which of these is NOT an element of computer risk assessment? A) vulnerability B) threat C) decision D) attack What best describes a malicious program on a computer system? A) a general-purpose program B) a system program C) a virus program D) a utility program Music piracy is an example of computer misuse. To which category of computer misuse does music piracy belong? A) identity theft B) phishing attack C) data theft D) copyright infringement What is the main purpose of propaganda on social media? A) propagate good personal security B) profile a user with intention to steal their identity C) influence persons to adopt an idea D) bully or embarrass a person 5) Which of the following programs is least likely to be used by a policeman? A) word processing software B) database management software C) computer-aided design software D) biometric software 6) Which of the following personnel is best trained to replace toner cartridge in a printer? A) computer operator B) system analyst C) software engineer D) IT manager 7) Photo-editing software, desktop publishing, email and word processing software are most likely to be used by: A) law enforcement officers B) musicians C) mass media personnel D) medical personnel 8) Having gained several years’ experience a computer technician would be well placed to advance their career by becoming a: A) data entry clerk B) systems programmer C) librarian D) computer engineer 126 9781380023322_text.indd 126 31/10/2019 11:19 4 • Social and economic impact of ICT 9) An EPOS system is most likely to be found in a: A) supermarket B) scientific laboratory C) bank D) industrial factory 10) The records of Caribbean criminals are most likely to be stored in: A) a spreadsheet on a personal computer B) a file on a supercomputer C) a database on a mainframe computer D) custom-written software on a smartphone Examination-style questions: Structured 1) A private secondary school has just installed a computer network that serves the administrative offices and classrooms. All student records are kept on a computerised database stored on network attached storage (NAS). Each classroom has a desktop computer system equipped with webcams that are used for videoconferencing with various persons worldwide. Students may also use the computer system for research and for preparation of their school-based assessment (SBA). a) The computer network and the computer systems in the classrooms are open to the possibility of harm and different things could happen that may cause harm. i) Name the elements of computer security that are referred to by the underlined sections of text. ii) For EACH element named, state TWO examples that illustrate the elements named. [1] [4] b) The building housing computer network equipment (server, storage device and switches) was destroyed by fire; however, the school was able to gain full access to an up-to-date database the following day. i) Name the physical measure that the school would have taken in order for it to have access to its data after the fire. [1] ii) Outline the steps that the school would have been required to take before the fire and after the fire in order to implement the measure named in (b) (i). [2] c) The network was reportedly affected by malware. i) Briefly explain what malware is. ii) Name TWO types of malware. iii) Outline TWO scenarios that could cause the computer systems in the administrative office and classrooms to become infected by malware. iv) Suggest potential impacts of malware infection on individuals within the school and on the school itself if the scenarios outlined in (c) (iii) were to happen. v) State THREE measures the network administrator could take to minimise the harmful effects of the attack outlined in (c) (iii). [1] [2] [4] [2] [3] Total 25 marks 127 9781380023322_text.indd 127 31/10/2019 11:19 55 Theory 5 • xxx Mastering word processing Word processing is one of the main applications used on personal computers worldwide. A word processor is a useful tool for manipulating text. In this chapter, we will help you to master the practical skills of word processing and use the many features to create great-looking documents. By completing practical activities for Caribbean Travel Services you will learn how to format text, insert tables and pictures, use columns, review documents, produce a table of contents and create bulk mail. You will need to spend time practising these skills at the computer. Microsoft Word is used for all examples in this chapter. All word processing programs, including Microsoft Word and LibreOffice Writer, have similar features and the explanations given in this chapter aim to give you the broader skills to master any word processing program. We would encourage you to experiment with and explore different word processors to widen your understanding of the concepts given in this chapter. By the end of this chapter ✔✔ Create documents using content from a variety of sources. you should be able to: ✔✔ Use appropriate document and text-formatting features. ✔✔ Apply appropriate editing features to structure and organise a document. By the end of this chapter ✔✔ Use review features to enhance document readiness for publication. you should be able to: ✔✔ Appropriately use features that allow protection of a document. ✔✔ Generate a table of contents for a document. ✔✔ Use mail merge features to create bulk mail. ✔✔ Create a fillable electronic form for online use. Mastering word processing Creating documents Formatting documents Importing text Formatting text and headings Text, images and other objects Formatting pages Structuring and organising documents Drag and drop Polishing documents Protecting documents Other useful tools Spelling and grammar checking Backups and passwords Creating a table of contents Search and replace The thesaurus Using tables and columns Using mail merge The Track Changes tool Creating electronic forms 128 9781380023322_text.indd 128 31/10/2019 11:19 5 • Mastering word processing LibreOffice Writer is a word processing program that is free to download, install and use from libreoffice.org. Google Docs and Word online are both free-to-use, Internet-based word processors. To help you find your way about the programs in this (productivity tools) section, we have a new colour-coded feature—the ‘Try’ feature—that you will see on the pages that follow, for example: Try: File > Save This shows the path for the Microsoft Office application; similar words are used in all word processing applications. In this chapter you will learn the required skills of word processing by working carefully through many Caribbean Travel Services worked examples, as well as producing documents for your own company. Creating documents using content from a variety of sources Watch this video about how to get started with a wordprocessing program. It is not difficult to see why word processing packages have become so common. In the past hand-written or typed documents were the only options. Now most printed documents are produced using a word processor. Some advantages of using a word processor (as compared to traditional methods such as typewriting) include the ability to: • incorporate text from a range of sources • include text, images and other objects in a document • easily format the text to make it clear and easy to read • quickly find words in a document and change them if required • insert tables into a document (displaying information in a tabular format) • use multiple columns of text • correct grammar errors and check for possible spelling mistakes automatically • produce tables of contents automatically • mass produce a single document for multiple recipients. ITQ 5.1 Suggest what a file named HCcv might contain. Whenever you create a piece of work you will want to save it in a file for future use. It is good practice to clearly identify your files and give them a meaningful name. This way everyone can see who the file belongs to and what the file contains. For example, HCnameinfo indicates that this file belongs to Howard Campbell and contains some sort of name information. Creating a document Get started with a simple document for Caribbean Travel Services. We need to start by opening the word processing program. 129 9781380023322_text.indd 129 31/10/2019 11:19 Theory Productivity Tools Opening a word processing program As an administrator at Caribbean Travel Services, you have been asked to create a document to track the details of Bus 301. 1 To begin, look to see if there is an icon for a word processing program on the desktop. If not, Try: Start button and look for Microsoft Office > Microsoft Word Otherwise your teacher will tell you how to start the word processing program. 2 Type ‘Bus 301’ on the page that appears. 3 To save document look for a ‘Save’ option. Try: File > Save 4 You need to give the file a name: ‘your initials Bus301’, e.g. XXBus301. Almost all programs can be closed by clicking the ‘X’ in the top-right corner of the window. Now try to apply what you have learnt to your own company. ACTIVITY 5.1 Creating a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Create a simple document related to your company. 2 Add the details of an item your company deals with to the document, e.g. Wedding dress model 35. 3 Save the document with a meaningful name including your initials and close, e.g. XXwedding35. Editing text in a word processing program You now need to add details to your document about Bus 301. 1 Open your word processing program. 2 To open a document look for an ‘Open’ option. Try: File > Open ITQ 5.2 Why do we sometimes not have to give a filename when saving a document? 3 Browse to the folder containing the file and choose your file XXBus301. 4 The document is opened and you see the information for Bus 301. 5 Continue your document and on a new line add more information about Bus 301, e.g.: Colour – red Number of seats – 15 Seatbelts fitted – Yes Manufacturer – Toyota Model – Hiace. Save your file like you did before. Note that this time we do not need to give the file a name, it already has a name. We are simply updating the contents of the file. To save the document look for a ‘Save’ option. Try: File > Save 6 Click the ‘X’ in the top-right corner of the window to close the program. 130 9781380023322_text.indd 130 31/10/2019 11:19 • Computer 5 •1Mastering word Fundamentals processing Now try to apply what you have learnt to your own company. ACTIVITY 5.2 Editing text in a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity: XXwedding35. 2 Add information to the document, e.g.: Dress 35 Colour – white Size – 12 Open back – Yes Designer – Limor Rosen Model – 35 3 Save the document and close. Importing text It can become tiresome to type text into your document. Many large documents are created by teams of writers: for example, a dictionary may be created by a team of 26 members, each member being responsible for one letter of the alphabet. To create the final dictionary we need to combine all 26 individual documents into one book. Importing text into a document Caribbean Travel Services has several documents containing information about each of its vehicles. The Customer Service team has mentioned that they also need information about Bus 403. They have asked if you can combine the details of Bus 301 and Bus 403 into one document. 1 Open your word processing program. 2 Type into the new document the title: Caribbean Travel Services Vehicle Information Below this we want to put the information about Bus 301. 3 Position the cursor below the title. (The cursor is a blinking underscore or vertical bar that indicates where the next item will be inserted.) 4 Look for a ‘Text from file’ option. Try: Insert > Text from file 5 Select your file that contains the information about Bus 301: XXBus301. 6 Select ‘Insert’ or double-click on the selected file. The information from this file is inserted into the current document. 7 At the bottom of the document add information about Bus 403. Bus 403 Colour – blue Number of seats – 31 Seatbelts fitted – Yes Manufacturer – Alexander Dennis Model – Enviro200 8.9M 8 You can now go on and add details of more vehicles to the document. 9 Save this new document. Give this file a meaningful name: ‘your initials vehicleinfo’, e.g. XXvehicleinfo. 10 Click the ‘X’ in the top-right corner of the window to close the program. 131 9781380023322_text.indd 131 31/10/2019 11:19 Theory Productivity Tools Now try to apply what you have learnt to your own company. ACTIVITY 5.3 Importing text into a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open your word processor to a new document. 2 Add the name of your company as the first line. 3 Import the text from the file you created in the earlier activity, e.g. XXwedding35 Save the document, giving it a meaningful name like XXdresses, and close. ITQ 5.3 Suggest when it might be appropriate to import text into a document. Typewritten text, images and other objects Up to now our documents haven’t been particularly exciting. We are going to change that now by adding images to the document. These make your document more visually interesting to the reader. Pictures should be used with care because they can distract the reader from the main message of the document. Used well, an image can improve the visual impact of the page and make the document easier to understand. Adding images ITQ 5.4 When is it appropriate to include a picture in a document? Adding pictures to your document is easy. Look for an ‘Insert’ option or an ‘Insert picture’ option. Try: Insert > Picture/Image Figure 5.1 Inserting an image 132 9781380023322_text.indd 132 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing Inserting images To help with visual referencing of each Caribbean Travel Services vehicle, you have decided to include an image of each bus with its details. 1 Open the document XXvehicleinfo you created earlier. 2 Move the cursor down the document to the bottom of the information about Bus 301. 3 To insert a picture look for an ‘Insert’ option or an ‘Insert picture’ option. Try: Insert > Picture/Image 4 Your teacher will supply you with an image for Bus 301. Select the file that contains this picture. 5 Save your file like you did before. Note that this time we do not need to give the file a name; it already has a name. Now try to apply what you have learnt to your own company. ACTIVITY 5.4 Inserting images in a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXdresses. 2 Add a suitable image to the document. 3 Save the document and close. Using appropriate documentformatting features Word wrap ▶ Font style ▶ All modern word processing programs have a large number of text-formatting features. Before starting the activity there are some terms you need to be clear about: Word wrap refers to the idea that word processors automatically move text onto a new line when the current line is full of characters and the cursor reaches the right margin. The user only has to press the ‘Enter’ key at the end of a paragraph. Word wrap ensures that the text is automatically adjusted when text is added, deleted or formatted. This means that the text is always aligned within the margins of the page. Font style is the way the characters look, e.g. A, A, A. A modern word processing program will have many fonts to choose from. Formatting text Font type, font size, underline, bold, italics, superscript, subscript and highlighting can all be used to make text stand out. The basic tools are similar in all word processors. Try the ‘Home’ tab at the top or look for the formatting tools. 133 9781380023322_text.indd 133 31/10/2019 11:19 Theory Productivity Tools ITQ 5.5 The letters ‘B’, ‘U’ and ‘I’ commonly stand for which THREE fontformatting tools? Figure 5.2 Text-formatting tools Using formatting features To make your document easier for the Customer Services team to read, you have decided to add some formatting. 1 Open your word processing program. 2 To open a document look for an ‘Open’ option. Try: File > Open 3 Find and choose your file XXvehicleinfo. It should look something like this. Caribbean Travel Services Vehicle Information Bus 301 Figure 5.3 CTS vehicle information document Colour :- red Number of seats :- 15 Seatbelts fitted :- Yes Manufacturer :- Toyota Model :- Hiace Bus 403 4 Select the text ‘Caribbean Travel Services Vehicle Information’. Colour :- blue 5 AllNumber word of processors seats :- 31 have a font-formatting section. With the text selected, try the tools and Seatbelts fitted :- they Yes have on the text. Here are some formatting effects that you might achieve. note the effect Manufacturer :- Alexander Dennis Modelstyle :- Enviro 2008.9M Font Caribbean Travel Services Vehicle Information Font size Caribbean Travel Services Vehicle Information Font colour Caribbean Travel Services Vehicle Information Bold Caribbean Travel Services Vehicle Information Italics Caribbean Travel Services Vehicle Information Underline Caribbean Travel Services Vehicle Information Strikethrough Caribbean Travel Services Vehicle Information Superscript and subscript Caribbean Travel ServicesTM Vehicle Information Highlight Caribbean Travel Services Vehicle Information 6 Save your file like you did before. 134 9781380023322_text.indd 134 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing Now try to apply what you have learnt to your own company. ACTIVITY 5.5 Formatting text in a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g.XXdresses. 2 Add suitable text formatting to the document. 3 Save the document and close. Formatting headings Some important formatting tools in word processing are the heading tools. These tools have two purposes: 1 they make the formatting of headings in a document consistent; and 2 they are used to create a table of contents. It is good practice to use headings in your documents. To find the heading tools look for Heading 1, Heading 2, etc. Try: Home tab Figure 5.4 Creating headings Using heading features ITQ 5.6 Why should you use the built-in heading styles for headings in your document? 1 Open your document XXvehicleinfo. 2 Select the text ‘Caribbean Travel Services Vehicle Information’. 3 With the text selected click on Heading 1. The text formatting automatically changes. 4 Now select the text ‘Bus 301’ and click Heading 2. 5 Make the text ‘Bus 403’ a Heading 2 as well. 6 Save your file like you did before. 7 Click the ‘X’ in the top-right corner of the window to close the program. You will see the full benefit of using headings later when creating a table of contents. Now try to apply what you have learnt to your own company. ACTIVITY 5.6 Formatting text in a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXdresses. 2 Add appropriate headings to the document. 3 Save the document and close. 135 9781380023322_text.indd 135 31/10/2019 11:19 Theory Productivity Tools Formatting position of text Full justification ▶ Tab stops ▶ Another set of formatting tools allows us to position content in the document. In the next activity we will cover tab stops, bullets and numbering, line spacing and justification (left, right, centred, full), which can all be used to position text on the page. Full justification extends each line so that it reaches both margins and is often used to improve the presentation of the text in books and newspapers. Tab stops (tabulation stops) allow the layout of words in a document to be controlled so that the words line up vertically. Figure 5.5 Using font-formatting tools Take a few moments to study the tools. Similar tools appear in all word processing programs. Using text-positioning tools and list tools 1 Open the document XXvehicleinfo you created earlier. 2 Move the cursor to a new line after the title. 3 Press the TAB key on the keyboard to move to the next tab stop and type ‘Luxury’, press the TAB key and type ‘Coach’, TAB key and type ‘Travel’. You should have Use the same technique to create Luxury Luxury Coach Style Minibus Comfort Car Coach Travel 4 Select all the lines of text about the red bus. With these lines selected try: a. the bullet point tool b. the numbered list tool. Travel Colour red Number of seats 15 Seatbelts fitted Yes Manufacturer Toyota Model Hiace Choose a style that you prefer and apply it to your document. 5 With the same lines selected use the line spacing tool to apply 1.5 spacing. 6 With the same line selected try: a. the centre tool b. the justify right tool c. the left align tool. 136 9781380023322_text.indd 136 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing Choose a style that you prefer and apply it to your document. 7 Save your file like you did before. 8 Click the ‘X’ in the top-right corner of the window to close the program. Now try to apply what you have learnt to your own company. ACTIVITY 5.7 Text-positioning and list tools in a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXdresses. 2 Add text separated using the tab key to your document. 3 Use the font formatting to try bullets and numbering, line spacing and justification (left, right, centre, full) in the document. 4 Save the document and close. ITQ 5.7 What is the difference between fully justified text and centrejustified text? Header ▶ Footer ▶ Endnote ▶ Footnote ▶ Formatting the page The next set of tools deals with formatting the page. In the next activity we will cover page size, margins, page and section breaks, page numbers, headers, footers, footnotes and endnotes. A header is content that appears at the top of every page. A footer is content that appears at the bottom of every page. An endnote is a note at the end of the document, often used for references. A footnote is a portion of text in the footer area of a page, often used to clarify or comment on the text on the current page. Page-management tools ITQ 5.8 State the main difference between a footer and a footnote. All word processors have page-management tools. Page sizes in the Caribbean include: A4 size 210 × 297 millimetres or 8.27 × 11.69 inches Figure 5.6 Common paper sizes ITQ 5.9 Watch the video about headers and footers in word processing. What two items might appear in a header or footer? a legal size 216 × 356 millimetres or 8.5 × 14 inches letter size 215.9 × 297.4 millimetres or 8.5 × 11 inches b c To change page details such as page size and margins look for ‘Page Layout’ or ‘Format Page’. Try: Layout > Size Layout > Margins 137 9781380023322_text.indd 137 31/10/2019 11:19 Theory Productivity Tools Figure 5.7 Using the page size and margin tools ITQ 5.10 Name TWO common paper sizes in the Caribbean for word processing document preparation. For adding headers, footers, footnotes and endnotes look for `Headers’ and `Footers’. Try: Insert > Header and Footer...... References > Footnotes and Endnotes Figure 5.8 Using the header, footer, footnote and endnote tools For page and section breaks look for ‘Page Break’ or ‘Manual Breaks’. Page breaks and section breaks simply allow you to force the start of a new page or section. Try: Insert > Page Break Using page-management features You have been asked to format your document to align it to Caribbean Travel Services design specifications. 1 Open the document XXvehicleinfo you created earlier. 2 To change the page size look for ‘Size’. Try: Layout > Size All the main page sizes are available; A4, letter and legal are three common sizes of paper in the Caribbean. Set the paper size to the one you use. 3 To change the margins look for ‘Margins’. Try: Layout > Margins Margins are the white space around the borders of the page. You can make the margins smaller to get more content onto the page. Set the margins in your document to be narrower. 4 To insert a page break look for ‘Page Break’. Try: Insert > Page Break 138 9781380023322_text.indd 138 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing Page breaks and section breaks simply allow you to force the start of a new page or section. This might be useful if you want to start each topic in a report on a new page. Use the Page Break tool to force each vehicle’s information to start on a new page. 5 To add content to the header or footer look for ‘Header’ or ‘Footer’. Try: Insert > Header Headers and footers put content at the top and bottom of every page so are useful for items such as the document title in the header and author’s name in the footer. 1 Use the Header tool to add ‘Caribbean Travel Services’ to the header and put your name in the footer. 2 The Page Numbering tool is included in the header or footer; this tool numbers pages automatically. 6 To add page numbers, look for ‘Page Numbers’. Try: Insert > Page Number Add page numbering at the bottom of the pages in your document. 7 To add a footnote or endnote look for ‘Footnote’ or ‘Endnote’. Try: References > Insert Footnote Footnotes and endnotes allow you to add notes either at the bottom of the current page or at the end of the document. Before you add a footnote or endnote you must position the cursor where you want the note marker to appear. 8 Position the cursor after the ‘15’, the number of seats. 9 Use the footnote tool to add a footnote that says ‘12 seats if luggage carried’. 10 Position the cursor after ‘Toyota’. 11 Use the endnote tool to add an endnote that says ‘Reference: Toyota Hiace Manual’. 12 Save your file like you did before. 13 Click the ‘X’ in the top-right corner of the window to close the program. Now try to apply what you have learnt to your own company. ACTIVITY 5.8 Page-formatting tools in a document for your company Use the company you created in earlier activities or use St Luago Fashion. • Open the document you created in the earlier activity, e.g. XXdresses. • Change the page size and margins and add a page break. • Add page numbers, header, footer, footnote and endnote to your document. • Save the document and close. 139 9781380023322_text.indd 139 31/10/2019 11:19 Theory Productivity Tools Using appropriate editing features to structure and organise a document Useful tools that are available in all office application programs are the block operations: cut, copy and paste. Drag-and-drop editing (block operations) Clipboard ▶ One advantage of word processing is the ability to move sections of text (a block) from one part of the document to another. For example, we may wish to rearrange the order of vehicles in the Caribbean Travel Services vehicle information document. The main block operations are cut, copy and paste. Word processing packages use the clipboard to manage the cut, copy and paste operations. The clipboard is a temporary area of memory where applications can store items for future use. Cut and copy have a similar function, which is to place the selected content onto the clipboard. The difference is that the cut operation takes the content out of the original position in the document and the copy operation leaves the content in the original position. Paste copies the contents of the clipboard into the document at the current cursor position. All word processors have Cut, Copy and Paste tools. To use the Cut, Copy and Paste tools look for ‘Cut’, ‘Copy’ and ‘Paste’. Try: Home > Cut ITQ 5.11 Which THREE features are commonly used in block editing in a word processing program? Figure 5.9 Block editing tools: cut Figure 5.10 Block editing tools: copy Figure 5.11 Block editing tools: paste Using ‘cut, copy and paste’ and ‘drag-and-drop’ (block operations) A new bus has been added to the fleet of vehicles at Caribbean Travel Services and the Customer Services team has asked you to update your document with the new information. 1 Open the document XXvehicleinfo you created earlier. 2 Select all the information for Bus 403 and use the Copy tool to place that information on the clipboard. 3 Place the cursor marker below the information for Bus 403 and use the Paste tool. A copy of Bus 403’s information should appear. 4 Edit this with the following information: • 403 changes to 404. • The colour of the new bus is green. • It has been reduced to a 29-seater to allow room for luggage. 140 9781380023322_text.indd 140 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing 5 6 7 8 This is the newest vehicle in the fleet so we want it to be the first vehicle in the document. Select all the information for Bus 404 and use the Cut tool. Move the cursor to the first page just below the section Luxury Coach Travel Style Minibus Travel Comfort Car Travel and use the Paste tool. Bus 404’s information should appear. Insert a page break so that Bus 404 starts on a new page. When we want to move some text, an alternative to cut and paste is drag-and-drop editing. Drag-and-drop can be useful for moving a small amount of content a small distance in the document. Select the text ‘Colour – red’ in Bus 301. Bus 301 Colour :- red Number of seats :- 15 Seatbelts fitted :- Yes Manufacturer :- Toyota Model :- Hiace 9 Simply left-click and hold onto this text and drag it to after the ‘Model – Hiace’ text. 10 Move the text ‘Colour – red’ back to where it belongs. 11 Save your file as you did before. 12 Click the ‘X’ in the top-right corner of the window to close the program. ITQ 5.12 Under what circumstances might drag-and-drop be used instead of cut and paste? Now try to apply what you have learnt to your own company. ACTIVITY 5.9 Using block tools in a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXdresses. 2 Copy the product information for an item and paste it below. 3 Change the product information to reflect a new product. Reorder the products in the document using cut and paste. 4 Save the document and close. A related, and very useful, feature that will help you complete your School Based Assessment is screenshot or print screen. Print screen takes an exact copy of what is on your screen and places it on to the clipboard. Look for a ‘PrtSc’ key on the keyboard. Usually the ‘Shift’ + ‘PrtSc’ must be pressed together to copy the screen. In your document use the paste option as usual to include the image in the document. You will see lots of examples of screenshots throughout this book. 141 9781380023322_text.indd 141 31/10/2019 11:19 Theory Productivity Tools Search and replace function As documents become longer it is useful to be able to find particular words quickly. Word processing programs can automatically locate words in a document. It is also possible to find and replace all occurrences of a sequence of characters with another. An example of this might be to replace all occurrences of 2019 with 2020 as a document is updated for a new year. To use the Find tool look for ‘Find’ or ‘Find & Replace’. Try: Home > Find Home > Replace ITQ 5.13 Figure 5.12 Find and Replace tool Suggest the best way to quickly find a combination of words in a large document. Using find and replace tools Some information for Bus 403 needs to be edited. 1 Open the document XXvehicleinfo you created earlier. You want to be able to find and edit the information quickly using the Find tool. 2 To use the Find tool, look for ‘Find’. Try: Home > Find 3 Type ‘403’ in the pop-up Navigation dialog box. The page on which the first occurrence of the required text appears will be displayed. The number of times the text appears in the document will also be shown along with navigation tools that allow you to move to the next or previous occurrences of the text. Keep the document open for the next part of the activity. The chief executive wants you to replace all occurrences of ‘Bus’ in Caribbean Travel Services’ documentation to ‘Luxury Bus’ to better reflect the service offered. We could use the Find tool to search for every occurrence of the text ‘Bus’ and add the word ‘Luxury’, but why not let the computer perform the task automatically? 4 To use the replace tool look for ‘Replace’. Try: Home > Replace 5 Type ‘Bus’ in the pop-up dialog box ‘Find what’ section and ‘Luxury Bus’ in the ‘Replace with’ section. 6 Click on ‘Replace All’. 7 Save your file like you did before. 8 Click the ‘X’ in the top-right corner of the window to close the program. 142 9781380023322_text.indd 142 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing Now try to apply what you have learnt to your own company. ACTIVITY 5.21 Find and replace tools in a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXdresses. 2 Use the Find tool to navigate to a particular item. 3 Use the Replace tool to replace a description of an item with an improved description. 4 Save the document and close. Using tables and table formatting Tables can be useful for displaying data. A table consists of rows and columns. Text is written in the cells and these cells may be resized, merged and coloured, or may even have borders. To insert a table look for ‘Table’. Try: Insert > Table Figure 5.13 Inserting tables Inserting a table into a document You have been asked to add a table to your document that outlines driver, route and operational details for each bus. 1 Open the document XXvehicleinfo you created in the earlier activity. 2 Move to the last page of the document. 3 To insert a table look for ‘Table’. Try: Insert > Table 4 Choose to insert a 3 × 5 table and add the information below. Caribbean Travel Services Luxury Bus Driver Route 301 Shana Goldstone Georgetown 404 Tyrone Edgar Kingston 403 Nyoka Small Negril Different word processing programs have different ways to enhance your table. You should be able to merge or split cells. 143 9781380023322_text.indd 143 31/10/2019 11:19 Theory Productivity Tools 5 To merge or split cells in a table look for ‘Merge’ or ‘Split’. Click on the table and find Table Tools > Layout > Merge Cells or Split Cells 6 Use the Merge Cells tool, the Split Cells tool, the Font Size tool and the Centre Justification tool so that your table looks like this: Caribbean Travel Services Luxury Bus Driver Route 301 Shana Goldstone Georgetown 404 Tyrone Edgar Kingston 403 Nyoka Small Negril Mandeville 7 To add new columns or rows to a table, click on the table and Try: Table Tools > Layout > Insert Above 8 Look for ‘Insert Above’, ‘Insert Below’, ‘Insert Left’ or ‘Insert Right’. 9 Use these tools to extend your table as shown below: Caribbean Travel Services Luxury Bus Driver Route 301 Shana Goldstone Georgetown Days Mandeville Mon–Fri 404 Tyrone Edgar Kingston Every day 403 Nyoka Small Negril Mon–Fri 408 John Allison Bridgetown Sat–Thur There are many more tools for shading cells, adding borders to cells, adjusting cell margins, changing cell size and changing the direction of the text in the cells. 10 Click on the table and you will find these in Table Tools > Layout > …, Table Tools > Design > … or Table > Table Properties > … 11 Apply your own changes to your table. Here is an example. Caribbean Travel Services Luxury Bus Driver Route 301 Shana Goldstone Georgetown 302 Tyrone Edgar Kingston Every day 403 Nyoka Small Negril Mon-Fri 408 John Allison Bridgetown Sat-Thur Days Mandeville Mon-Fri Figure 5.14 An example of advanced table formatting 12 Save your file like you did before. 13 Click the ‘X’ in the top-right corner of the window to close the program. 144 9781380023322_text.indd 144 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing Now try to apply what you have learnt to your own company. ACTIVITY 5.11 Inserting and formatting tables in a document for your company. Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXdresses. 2 Create a table to contain information relevant to your company. 3 Improve the look of the table using the table formatting tools. 4 Save the document and close. Using columns Word processors allow you to divide your document into columns. This can enhance your document, improving the appearance and making it easier to read. It is particularly useful when creating newsletters, brochures, magazines and other similar documents. To convert text into two or more columns look for ‘Columns’. Try: Layout > Columns Figure 5.15 Using the Columns tool A column break works in the same way as a page break. Inserting a column break forces a new column to be started. Organising text in columns The Marketing Department has asked if you could format a press release they’ve written about three new buses that have been added to the fleet. 1 Open the document XXvehicleinfo you created in the earlier activity. 2 Move the cursor to the end of the document. 3 Type in the following text for a press release. ‘The delivery ceremony of 3 new luxury buses, which were recently purchased by the Caribbean Travel Services Company, will be held on Wednesday, June 27th at Caribbean Travel Services’ head office at 10:30am. Members of the public are invited to join the drivers, conductors and general staff at 17 Main Street, Queenstown for the ceremony. The short ceremony will be followed by live entertainment and members of the public will have the opportunity to experience the luxury of these new vehicles with short tours around the city centre. We look forward to greeting you for this special occasion.’ 4 Convert this new text into two columns; look for ‘Columns’. Try: Layout > Columns 145 9781380023322_text.indd 145 31/10/2019 11:19 Theory Productivity Tools 5 Select the text and use the Column tool to create two columns. Fully justify the text. ‘The delivery ceremony of 3 new luxury buses, which were recently purchased by the Caribbean Travel Services Company, will be held on Wednesday, June 27th at Caribbean Travel Services’ head office at 10:30am. Members of the public are invited to join the drivers, conductors and general staff at 17 Main Street, Queenstown for the ceremony. The short ceremony will be followed by live entertainment and members of the public will have the opportunity to experience the luxury of these new vehicles with short tours around the city centre. We look forward to greeting you for this special occasion.’ 6 Position the cursor between ‘10:30am’ and ‘Members’. Try: Layout > Breaks > Column Break ‘The delivery ceremony of 3 new luxury buses, which were recently purchased by the Caribbean Travel Services Company, will be held on Wednesday, June 27th at Caribbean Travel Services’ head office at 10:30am. Members of the public are invited to join the drivers, conductors and general staff at 17 Main Street, Queenstown for the ceremony. The short ceremony will be followed by live entertainment and members of the public will have the opportunity to experience the luxury of these new vehicles with short tours around the city centre. We look forward to greeting you for this special occasion.’ 7 Save your file as you did before. Now try to apply what you have learnt to your own company. ACTIVITY 5.12 Organising text in columns in a document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXdresses. 2 Create a press release for your company. 3 Format the press release text into three columns. 4 Save the document and close. ITQ 5.14 Give TWO reasons for splitting a section of text into columns. Using review features to enhance document readiness Spelling and grammar checking, word count and the thesaurus For many persons the main advantage of using a word processing package is the ability to correct mistakes before sending a document to be printed. All good word processing packages have a built-in dictionary to check the spelling of every word in the document. The user may select the dictionary to use. Additionally, a user may add words, such as regularly used names, to a dictionary. As you type, the word processing program will warn you if you make spelling or grammar mistakes by placing straight or wavy coloured lines under the text. 146 9781380023322_text.indd 146 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing ITQ 5.15 Why is it good practice to spellcheck a document before printing? Note that if you print a document with these underlines, they will not show up on printed pages. It may be too time-consuming to stop every time you see wavy underlines so you can just ignore them as you go. When you have finished typing your text, you can tell the word processing program to check spelling and grammar all at one time. It may also be useful to know the number of words in your document; this is usually displayed in the status information at the bottom of the word processor window. The thesaurus is another useful tool. A thesaurus is a tool that suggests alternatives for the selected word. It is always a good idea to proofread your work after you spellcheck it. When using a word processor there is no excuse for spelling or grammatical errors in a document. Proofreading is the careful reading of the document and the marking of any errors found. To check the spelling and grammar look for ‘Spelling and Grammar’. Try: Review > Spelling & Grammar Figure 5.16 Thesaurus and spelling and grammar checking tool To use the thesaurus feature select an individual word and look for ‘Thesaurus’. Try: Review > Thesaurus Using the spellcheck and grammar tools 1 Open the document XXvehicleinfo you created in the earlier activity. 2 Move to the end of the document. 3 Insert the following three lines of text exactly as typed. Some of the routes that Carib Travel Services cover mountinous areas. One such road is over Morne Diablotins Mountain. The driver wanted to know: ‘What is the hight of Morne Diablotins Mountain.’ 4 First check the proofing language; this is the language against which the spelling and grammar will be checked. For example, in U.S. English ‘color’ is the correct spelling but in U.K. English ‘colour’ is correct. To check the proofing language, look for ‘Set Proofing Language’ or just ‘Language’. Try: Review > Language > Set Proofing Language 5 Select the language you require. 6 To check the spelling and grammar look for ‘Spelling and Grammar’. Try: Review > Spelling & Grammar The tool will check your document and if any errors are found it will prompt you to take action. These action prompts are usually: ‘Ignore Once’, ‘Ignore All’ and ‘Add to Dictionary’. The system may also offer a correction, or ask you to select from a list of possible corrections. You have the option to accept or reject the suggested correction. 147 9781380023322_text.indd 147 31/10/2019 11:19 Theory Productivity Tools 7 Use the spelling and grammar checker in your word processing program to find and correct errors in the document. Notes: In the example text • the word ‘hight’ is misspelt so accept the suggestion ‘height’ by clicking the Change button; • the word ‘Morne’ is the correct spelling for the name of the mountain so click on the Ignore All button; • the word ‘Diablotins’ is also correct, so click on the Ignore All button. The final warning is for the word ‘Mountain’. This is a grammar error and the word processor suggests that a ‘?’ is needed because it has identified the sentence as a question. 8 Save your file like you did before. (If you are interested, the answer is 1,447 metres.) 9 Select the word ‘routes’ in the document and use the Thesaurus tool to find alternative words. 10 To check the thesaurus look for ‘Thesaurus’. Try: Review > Thesaurus 11 Save your file as you did before. 12 Click the ‘X’ in the top-right corner of the window to close the program. Now try to apply what you have learnt to your own company. ACTIVITY 5.13 Check your company document for spelling and grammar mistakes Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g.XXdresses. 2 Use the spelling and grammar checking tools to make sure your document is free of errors. 3 Save the document and close. ITQ 5.16 What is the role of a thesaurus? Review features: tracking and comments Word processors are ideal for professional organisations because they include tracking and comment tools. Tracking allows any changes made to the document to be visible and reversible. This may be useful when a document is reviewed, by a senior manager for example. Any changes made by the manager are clearly marked in the document and can be either accepted or rejected by the author when the document is returned. An alternative to tracking is for the reviewer to add comments to your document. The Comment tool may be used by a reviewer to insert a comment by selecting text and adding the comment. To turn on tracking, look for ‘Track Changes’. Try: Review > Track Changes Figure 5.17 Tracking changes tools 148 9781380023322_text.indd 148 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing To add a comment to a document, look for ‘Comments’. Try: Review > New Comment Figure 5.18 Tools for adding a comment to a document ITQ 5.17 Who might want to review a document in an organisation? Using the tracking and Comment tools 1 Open the document XXvehicleinfo you created in the earlier activity. 2 To turn on tracking look for Track Changes. Try: Review > Track Changes 3 To see how tracking works make some changes to the document, e.g. change the colour of Bus 404 to grey. 4 Choose from the ‘Previous’, ‘Next’, ‘Accept’ and ‘Reject’ options to reject the change. 5 Turn tracking off before continuing. 6 To add a comment to a document look for ‘Comments’. Try: Review > New Comment 7 To remove the comment select the comment and look for ‘Delete Comment’. Try: Review > Delete Comment ITQ 5.18 After a new comment is added to a document, the comment may undergo different operations. Name ANY TWO of these operations. 8 Save your file like you did before. 9 Click the ‘X’ in the top-right corner of the window to close the program. Now try to apply what you have learnt to your own company. ACTIVITY 5.14 Review your company document Use the company you created in earlier activities or use St Luago Fashion. 1 Split into two small groups. Each group should take a copy of the document you created in the earlier activity, e.g. XXdresses. 2 Turn on tracking and make some changes and add comments to the document. 3 Save the file. 4 Swap files with the other small group, look at the changes and comments that have been made and accept or reject the changes. 5 Save the document and close. 149 9781380023322_text.indd 149 31/10/2019 11:19 Theory Productivity Tools Appropriately using features that allow protection of a document As your documents become more professional it may be necessary to create a safety backup copy in case of hardware failure or natural disaster. Modern word processors automatically back up any document you are working on. If the system should crash or there is a power outage the word processor will use this backup copy when it restarts. It is good practice to regularly make a backup copy of your document files and store them on removable storage media to keep them safe. If a document contains confidential data we need to password-protect the document file so that it cannot be accessed by unauthorised persons. If you forget the password, the document file can never be opened. To password-protect a document look for ‘Encrypt with Password’ or ‘Save with Password’. Try: ITQ 5.19 What is the main disadvantage of password-protecting a document? File > Info > Protect Document > Encrypt with Password Figure 5.19 Password-protecting a document Password-protecting a file and creating a backup One of the office administrators accidentally made changes to your document that you now have to correct. You decide to password-protect the document to stop anyone other than yourself from making changes to it in future. 1 Open the document XXvehicleinfo you created in the earlier activity. 2 To password-protect this file look for ‘Protection’ or ‘Password’. Try: File > Info > Protect Document > Encrypt with Password 3 Set a simple password on your document file, e.g. ‘ABC’, so it is easy to remember. 4 Click the ‘X’ in the top-right corner of the window to close the program. 5 Open the document XXvehicleinfo again and see how you need the password to open the document. 6 An easy way to make a backup copy of the document file is to use ‘Save As’. Insert a removable storage device, for example a USB pen drive. 7 To use the ‘Save As’ feature look for ‘Save As’. Try: File > Save As 150 9781380023322_text.indd 150 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing Now try to apply what you have learnt to your own company ACTIVITY 5.15 Password-protect your company document Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXdresses. 2 Use the password-protect tools to encrypt your document. 3 Save the document. 4 Make a backup of your document to removable media such as a USB pen drive and close. Generating a table of contents for a document Large professional documents almost always have a table of contents that allows readers to quickly find different sections in the document. Fortunately, a word processing program can automatically create a table of contents for us. Earlier in this chapter we considered using headings in the document. The table of contents will be created using these headings and sub-headings. To create a table of contents, look for ‘Table of Contents’. Try: Reference > Table of Contents Figure 5.20 Creating a table of contents from the headings in a document Creating a table of contents for a document Now that your document has different types of information in it, you think it would be useful to add a table of contents, which will also make navigation to each piece of information easier. 1 Open the document XXvehicleinfo you created in the earlier activity. 2 To create a table of contents look for ‘Table of Contents’. Try: Reference > Table of Contents 3 Move the cursor to a new line below ‘Caribbean Travel Services’. 4 Use the Table of Contents tool to create a table of contents (ToC), choosing a suitable layout for your ToC. 151 9781380023322_text.indd 151 31/10/2019 11:19 Theory Productivity Tools 5 Save your file like you did before. 6 Click the ‘X’ in the top-right corner of the window to close the program. Now try to apply what you have learnt to your own company. ACTIVITY 5.16 Create a table of contents for your company document Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXdresses. 2 Use the Table of Contents tool to add a table of contents to your document. 3 Save the document. ITQ 5.20 Watch the video about mail merge. In what situation would you consider using mail merge? Note that creating the table of contents is the final task for the document. It will need to be recreated if the document is updated. Using mail merge features in a range of situations If a company like Caribbean Travel Services wanted to send a letter or an email to every VIP passenger to inform them of a ceremony to celebrate the delivery of the new buses for the fleet they could begin the letter ‘Dear Passenger’ and then send it to everyone. Caribbean Travel Services would like to build a strong relationship with their passengers and feel that a more personal approach will support this. So they would rather begin the letter ‘Dear Mr Douglas’ or ‘Dear Miss O’Connor’, etc. The mail merge feature of a word processing program can be used to import the individual’s personal information from a table, database or spreadsheet into the correct position in a template letter. The result is that each letter is personalised for every individual passenger. Mail merge can be used to create a variety of different personalised documents such as: invitations, utility bills and invoices. Mail merge requires two files: • a primary template document (e.g. the letter to the passengers) and • a data file which is the source of the data to be inserted into the template. ITQ 5.21 Identify the THREE documents involved when a bulk mail is created. The mail merge process produces one file, the merged document file. Word processing programs try to lead you through the mail merge process. To start a mail merge look for ‘Mailing’ or ‘Mail Merge Wizard’. Try: Mailings > Start Mail Merge > Letters 152 9781380023322_text.indd 152 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing Figure 5.21 Mail merge tools Creating a mail merge document The Managing Director has given you instructions to create an invitation to be sent out to important stakeholders to celebrate the arrival of the three new buses. 1 Create a new primary document containing the text given below. Caribbean Travel Services The executive board would like to invite to a celebration of the delivery of 3 new luxury buses recently purchased by the Company. The ceremony and celebration will be held on Wednesday, June 27th at Caribbean Travel Services’ head office at 10:30am. VIP guests are invited to join the drivers, conductors and general staff at 17 Main Street, Queenstown for drinks at 10:00am. A short ceremony at 10:30am will be followed by live entertainment and VIP passengers will have the opportunity to experience the luxury of these new vehicles with short tours around the city centre. We look forward to greeting you for this special occasion. Howard Campbell On behalf of the Board of Caribbean Travel Services 2 Save your file like you did before. You need to give this new document file a name ‘your initials VIPletters’, e.g. XXVIPletters. 3 Click the ‘X’ in the top-right corner of the window to close the program. 4 Create a new data file document containing the table given below. The column headings ‘Title’ and Last name’ are the field names that will be used to insert the data into the mail merge. Title Last name Mr Hussey Mrs Douglas Mr Castille Miss Hosein Mrs Ventura Mrs Ridout 5 Save your file like you did before. You need to give this new document file a name ‘your initials VIPnames’, e.g. XXVIPnames. 6 Click the ‘X’ in the top-right corner of the window to close the program. 7 Open the document XXVIPletters you created earlier. 8 Move the cursor to a new line under the text ‘The executive board would like to invite’. 153 9781380023322_text.indd 153 31/10/2019 11:19 Theory Productivity Tools 9 To create a mail merge document look for ‘Mailings’ or ‘Merge Wizard’. Try: Mailings > Select Recipients > Use Existing List Browse to find your XXVIPnames document file. Mailings > Insert Merge Fields > Title Mailings > Insert Merge Fields > Last Name Mailings > Finish & Merge > Edit Individual Documents or Tools > Mail Merge Wizard Follow the instructions given by the wizard. A new document is automatically produced that contains all the personalised letters ready for printing. This document is six pages long since there are six VIPs. Mail merge can easily produce hundreds of pages, so check the length of a document before printing. 10 Save this document file like you did before. You need to give this new document file a name ‘your initials VIPinvite’, e.g. XXVIPinvite. 11 Click the ‘X’ in the top-right corner of the window to close the program. Now try to apply what you have learnt to your own company. ACTIVITY 5.17 Create a mail merge for a new product release at your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the word processor and create a new template document inviting customers to a special event. Leave gaps for the names of the attendees. Save and close this document. 2 Open the word processor and create a table containing the attendees’ details. Save and close this document. 3 Use the mail merge tool to combine these two documents into a bulk mail document. 4 Save the documents and close. Creating a fillable electronic form for online use Word processing packages now allow you to create fillable forms. This means that the document contains elements that can be filled in by the user. These elements include the following: check boxes, text boxes, date picker, drop-down lists and command buttons. • A check box control allows a user to tick the box or leave it empty. • A text box control allows a user to enter text into a form. • A date picker control allows the user to select a date from a drop-down calendar. • A drop-down list allows the user to select a single item from a predefined list. • A command button allows a user to initiate an action. The syllabus requires you to create a fillable electronic form for online use. There are now much better tools for creating online forms than a word processing program, so in this section we briefly cover creating fillable forms and include this document in a web page in Chapter 6, Mastering web page design. 154 9781380023322_text.indd 154 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing ITQ 5.22 State THREE content controls that may be used on a fillable electronic form. One important feature of fillable forms is the idea of design mode. When design mode is ‘on’ the form can be created and modified. When design mode is ‘off’ the form can be interactively filled in. The developer of the form will use design mode ‘on’; the user of the document will use design mode ‘off’. When developing a fillable form you will frequently be switching between the two modes, design mode ‘on’ when creating the form and design mode ‘off’ when testing the form. To create fillable form component controls look for ‘Controls’ or ‘Form Controls’. Try: Developer > Controls Figure 5.22 Developing a fillable form: turning design mode on and off Note that the Developer options can be turned on by selecting File > Options > Customize Ribbon > Developer Creating a fillable form in a document The Customer Services team has asked you to create a form for prospective clients who want to enquire about renting a coach from Caribbean Travel Services. 1 Create a new document containing the text given below: Caribbean Travel Services Coach Rental Enquiry Form Your Name Your Address Your Telephone Number Coach Required Driver Required Date Required Please print the completed form and send to: Caribbean Travel Services Rental Department 17 Main Street Queenstown Or email the completed form to rentals@Caribbeantravelservices.jm. One of our helpful staff will contact you. Thank you for considering Caribbean Travel Services. 155 9781380023322_text.indd 155 31/10/2019 11:19 Theory Productivity Tools 2 Move the cursor to a new line under the text ‘Your Name’. 3 Now you can use the fillable form controls. Try: Developer > Controls Figure 5.23 The fillable form controls 4 Identify the Design Mode button and make sure it is ‘on’. 5 Create a text box control. Try: Developer > Controls > Plain Text Control and draw a box in the correct position. 6 Repeat this process to add a text box control for the Address and Telephone Number. 7 For the Coach Required we will use a drop-down list. Try: Developer > Controls > Drop-down List Control Content With the list selected, click on Properties. Add ‘15-seater’ Add ‘32-seater’ Add ‘52-seater’ or Form Controls > List Box and draw a box in the correct position. 8 For the Driver Required we will use a check box. Try: Developer > Controls > Check Box Content Control and draw a box in the correct position. 9 Finally for the Date Required we will use a date picker or date field. Try: Developer > Controls > Date Picker Content Control and draw a box in the correct position. 156 9781380023322_text.indd 156 31/10/2019 11:19 • Computer 5 • 1Mastering word fundamentals processing Caribbean Travel Services Coach Rental Enquiry Form Your Name Click here to enter text. Your Address Click here to enter text. Your Telephone number Click here to enter text. Coach Required Choose an item. Driver Required Date Required Figure 5.24 A fillable form shown in Design Mode ‘on’ 10 Now, to check your fillable form, click Design Mode to turn it ‘off’. 11 Test the controls to ensure they work as you expect. 12 Save this document file like you did before. You need to give this new document file a name ‘your initials enquiry’, e.g. XXenquiry. 13 Click the ‘X’ in the top-right corner of the window to close the program. Now try to apply what you have learnt to your own company. ACTIVITY 5.18 Create a fillable form for your company to deal with enquiries from customers Use the company you created in earlier activities or use St Luago Fashion. 1 Open the word processor and create a new fillable form document. 2 Save the documents and close. That concludes our introduction to word processing. There are lots more features to discover in word processing but it’s time to move on. 157 9781380023322_text.indd 157 31/10/2019 11:19 Theory Productivity Tools Summary • A word processor is a computer application used for manipulating text. • Tables, consisting of rows and columns, are useful for organising data. • A document may be created using content from a range • Spelling and grammar checkers are word processing of sources such as the keyboard, other documents or an image gallery. features that may be used to enhance the readiness of a document; the feature can automatically detect and correct commonly misspelt words. • Text-formatting features include: bold, italics, underline, font size, font style, font colour, subscript and superscript. • Automatically saving a backup copy of a document that • The block editing tools are: cut, copy, paste and drag-and- is being edited, and restricting the editing of a document using password-protection, are two features that facilitate the protection of a document. drop. • The find and replace features of word processors can quickly find text or replace text with alternative text. • Page formatting allows you to change the page size and the margins of a page. • Headers and footers appear on every page. • References can be added to the end of a document using endnotes. • The use of columns is a paragraph-formatting feature; it • A table of contents for a document may be automatically generated based on the built-in heading styles used in the document. • The mail merge feature may be used in the preparation of a personalised bulk mail document. • A word processor may be used to create a fillable electronic form for online use. allows you to organise content into two or more columns. Answers to ITQs 5.1 Files should always have meaningful names so a file named HCcv might contain Howard Campbell’s curriculum vitae. 5.2 ‘Save’ writes the contents of the document you are working on into the file. If the file does not exist it is created and you are prompted to provide a name. If the file already exists, there is no need to give the filename. 5.7 Fully justified text is spaced so that it neatly aligns with the left and right margins and is often used in books and magazines. Centred text is placed in the middle of the page. 5.8 A footer is text that appears at the bottom of every page. A footnote is referenced in the text and is included at the bottom of the page it is referenced on. 5.3 There are occasions when the text you want to include in a document already exists in another document. It is easier and quicker to import this text than to retype the data. 5.9 Headers and footers are often used to contain information like document title, author and the date. 5.4 Adding pictures to documents should enhance the viewer’s experience. The picture might complement the text, clarify the text or simply break large sections of text. 5.11 Cut, copy and paste are commonly used in block editing. Cut removes the selected text and places it on the clipboard for later use. Copy duplicates the selected text and places a copy on the clipboard for later use. Paste copies whatever is on the clipboard into the document at the current cursor position. 5.5 In almost all word processors, ‘B’ indicates bold, ‘U’ indicates underline and ‘I’ indicates italics. Selecting text and clicking on the B, U or I button applies the formatting. 5.6 The built-in headings in a word processing program are used to create automatic tables of contents. It is good practice to use built-in headings in your document to enable this function. 158 9781380023322_text.indd 158 5.10 The two common paper sizes in use in the Caribbean are A4 and letter. 5.12 If only a small amount of text is to be moved only a short distance, drag-and-drop may be quicker than cut and paste. 158 31/10/2019 11:19 5 • Mastering 1 • The computer word processing system 5.13 The powerful Find tools included in all word processing programs make it easy to navigate around large documents by quickly finding a given word or combination of words. 5.14 You might want to format a section of text into multiple columns to improve the appearance of the document and make it easier to read. 5.15 Spell checking and grammar checking a document before it is printed ensures that there are no spelling or grammar errors in the document. 5.16 A thesaurus can be a useful tool to improve vocabulary in a document because it provides suggestions for alternatives for the selected word. 5.17 When producing a professional document it is good practice to have it checked by someone else. At school this might be a classmate, in a commercial operation it might be a manager. Changes and comments can be used to improve the document before publication. 5.18 When a document is being reviewed the reviewer may add comments to the document. It is then up to the author to delete or edit the comment. 5.19 The big disadvantage of password-protecting a document is that if the password is forgotten you can never open the document. 5.20 Mail merge is used to produce personalised bulk mail. 5.21 When creating a mail merge you need to create the main template letter and the document containing the personal information to be inserted. The result is a large file that contains all the personalised letters. 5.22 Fillable forms have many controls. The check box control allows a user to tick the box or leave it empty, the text box control allows a user to enter text into a form, the date picker control allows the user to select a date from a drop-down calendar, a drop-down list allows the user to select a single item from a predefined list, and the command button allows a user to initiate an action. Examination-style questions: Multiple Choice Instructions: Each item in this test has four suggested responses labelled (A), (B), (C) or (D). Read each question carefully then select the most suitable response. 1) 3) Which of the following is correct in relation to footers, footnotes and endnotes? A) A page can have a footer and footnotes at the bottom. B) Footers, footnotes and endnotes all appear at the bottom of the page. C) Footers only appear at the end of a document. D) Footnotes and endnotes cannot appear on the same page. 5) To create an automatic table of contents which of the following must be applied to text in the document? A) text size 14 B) text colour ‘blue’ C) headings D) headers 6) Which of the following tasks may be accomplished using the cut-and-paste technique? I selecting text II copying text III moving text Which of the following types of content may be used to create a word processing document for printing? I animated gifs II shapes III text IV videos A) B) C) D) 2) 4) II only II and III only III only IV only Word processing programs have features to emphasise text. Which of the following is NOT true? A) Bold makes the characters darker. B) Italics slant the characters. C) Highlight makes the characters taller. D) Underline places a line underneath the characters. Which of the following is NOT a source of content for creating a word processing document? A) keyboard B) local storage C) speech D) video A) B) C) D) I and II only II and III only I and III only III only 159 9781380023322_text.indd 159 31/10/2019 11:19 1 • The computer Productivity Toolssystem 7) Which of the following tasks may be accomplished using drag-and-drop editing? I selecting text II copying text III moving text A) B) C) D) 8) I only I and II only III only II and III only Which of the following is the LEAST appropriate feature that may be applied to the text word ‘player’ to make it stand out in a document? A) bold B) colour C) italics D) capitalisation 9) Which of the following pairs of formatting features are usually used together with references in a document? A) bullets and numbering B) footnotes and endnotes C) superscript and endnotes D) subscript and footnotes 10) Which of the following statements about the mail merge feature is TRUE? A) Field names in the primary document are optional. B) Multiple recipient data files may be used for the same merge. C) Both a primary document and a data file are required. D) The primary document must be longer than the recipient data file. Examination-style questions: Structured JAM CELLULAR Front Street, St Phillipsburg, St Maarten Tel: 707-2700, sales@jamcellular.com October 20, 2020 Dear Mr Mouse, As a valued customer JamCellular would like to reward your loyalty with this special offer. Bonus: Free calls at weekend to other Jam Cellular users. Bonus: Unlimited text on weekdays. Bonus: Huge 500MB allowance per day. Please phone our sales team from 8:00AM−8:00PM by dialling 7912386. We look forward to hearing from you. Yours Sincerely, Michelle Ollivierre Sales Manager 1) The Technical Services Manager wants to modify the document shown above for use as a primary document for mail merging. a) The manager wants to ensure that the formatting of the document is correct. State what formatting now exists for each part of the document specified: i) the justification used for the title [1] ii) the formatting applied to the text ‘Jam Cellular users’ [1] b) In order to enhance document readiness, a spellcheck is to be done. i) Explain why this is good practice. [2] ii) Outline how the appropriate features may be used to ensure that the document is free of spelling and grammatical errors. [2] c) The company’s logo, stored on a USB flash drive, is to be inserted in the header. The logo image should be positioned to the right. Outline the steps required to do this. [4] d) The document is to be used as a basis for a bulk mailing using a mail merge so that each customer receives a personal letter. Explain what mail merge is, what additional files will be needed and describe the general procedure for creating a bulk mailing. [10] Total 20 marks 160 9781380023322_text.indd 160 31/10/2019 11:19 6 By the end of this chapter you should be able to: Mastering web page design The ability to plan, design, create, publish and maintain an effective web page is a highly sought-after skill. There are many specialist website creation programs available, but to master the basic concepts of website creation a word processing program is an ideal tool. To create an effective website you need to consider: the reason for the website; the intended audience; and the number of pages and their layout and content. Your website will need text, images and hyperlinks. In this chapter, we will help you to master website creation and to use the available features to create great-looking websites. You will need to spend time practising these skills at the computer. Microsoft Word is used for all examples in this chapter. All word processing programs, including Microsoft Word and LibreOffice Writer, have similar features that allow you to create and edit web pages. The explanations given in this chapter aim to give you the broader skills to master any web creation program. We would encourage you to experiment with and explore different web creation programs to widen your understanding of the concepts given in this chapter. ✔✔ Plan a website structure and organisation of pages. ✔✔ Design and create simple pages. ✔✔ Insert hyperlinks into a web page. ✔✔ Evaluate a website for content accuracy, user-friendliness and effective display. Mastering web page design Planning a website Creating web pages Reasons for the website Inserting content Audience Viewing in a web browser Number and content of pages Layout of pages Adding hyperlinks to web pages Link to another web page Link to place in web page Link to email address Testing a website Publishing a website Testing for accuracy Web hosting and domain names Testing for accuracy Testing for accuracy Link to user file In this chapter you will learn the required skills of web design by working carefully through many Caribbean Travel Services’ worked examples, as well as producing web pages for your own company’s website. SeaMonkey Composer (seamonkey-project.org) and LibreOffice Writer (libreoffice. org) are website creation programs that are free to download, install and use. Wix and Weebly are two examples of free online Internet-based website creation tools. 161 9781380023322_text.indd 161 161 31/10/2019 11:19 Theory Productivity Tools Planning a website structure and organisation of pages The idea of a website was introduced in Chapter 3, Computer networks and web technologies. A website is a collection of web pages created by companies, organisations or individuals to share information. Web pages are stored in the cloud and are viewed using a web browser program on an Internet-connected device. Look back at Chapter 3 if you need to refresh your memory. Figure 6.1 The Pan Macmillan Science Fiction and Fantasy page is an example of a great user interface design Reasons for the website ITQ 6.1 Suggest the primary purpose for EACH of the following websites: (a) www.cxc.org (b) www.games.com (c) www.foxnews.com Web design is an art. As you surf the World Wide Web, take note of the wide variety of web page designs. Before we start there are some important matters you should consider if you are going to create an effective website. The first is: what is the main purpose of the website? Websites are created for lots of different reasons. Some reasons are: • to entertain • to educate and inform • to persuade • to sell goods and services • to collect feedback • to connect family and friends. The website created by Caribbean Travel Services is primarily used to provide information to passengers and potential clients for vehicle rentals. 162 9781380023322_text.indd 162 31/10/2019 11:19 6 • Mastering 1 • Computer web Fundamentals page design The intended audience Intended audience ▶ The intended audience is the main group of persons that a website is designed to target or appeal to. A website intended for business users (such as www.FedEx. com) is likely to be very different from one such as www.rihanna-fenty.com, which is intended to appeal to fans of international pop megastar Rihanna. Website Possible reason for creating website Intended audience fedex.com To allow shippers to plan, ship and track their packages Individuals and organisations that require logistics and shipping services surveymonkey.com To provide researchers with tools to conduct and report on surveys Researchers, individuals and organisations collecting data using surveys rihanna-fenty.com/ To provide fans with latest news, photos, videos and Fans of Rihanna (born Robyn Rihanna Fenty) more concerning the pop star Rihanna ITQ 6.2 Table 6.1 Websites with possible reasons they were created and their intended audiences Suggest the intended audience for EACH of the following websites: (a) www.cxc.org (b) www.games.com (c) www.foxnews.com The audience for the Caribbean Travel Services website includes a wide range of passengers and clients of different ages and social backgrounds. The website must provide information in a userfriendly, easy-to-access way to all viewers. Number of web pages in a website A large website may have hundreds or thousands of interlinked pages. Great care will be needed to provide navigation features to allow users to quickly and easily find the information they are looking for. Our website will be a maximum of three pages. The website created by Caribbean Travel Services has many pages, with effective navigation links on every page. Content of each web page on a website Web page layout ▶ Viewers will be disappointed if they view a web page and it doesn’t contain the information they were expecting. Website content may include, among other things, text, images, animations, sounds, video clips and interactive content. The content of your website will be guided by the main purpose for your website that you established earlier. The layout of information on a page is important. If you put too much content on a page it may become cluttered and difficult to view; too little and it looks bare and simplistic. A balance of text and images is usually effective. Web page layout is the positioning and sizing of text and images on the web page. 163 9781380023322_text.indd 163 31/10/2019 11:19 Theory Productivity Tools The Caribbean Travel Services website has a balance of page content. Images are included where appropriate, for example each vehicle information page includes an image of the vehicle. Timetables for schedule routes include only a small CTS logo but use tables to lay out the information on the page. Layout of web pages on a website Website theme ▶ It is good practice to establish a common theme for web pages in your website. One popular layout is to include the organisation’s name, logo and navigation tools at the top of every page. Using the same colours, fonts and navigation on every page helps the user become familiar with your website. A website theme is the use of common elements such as page layout, navigation hyperlinks, colours and pictures on every web page. Figure 6.2 depicts a generally accepted and widely used framework for large corporate websites showing the placing of the major elements on the page. Your website will have a much simpler layout. The organisation’s name and the navigation features appear at the top of every page in the website. Primary location for search, shopping carts Link to home page Logo or identity Calendar | A - Z Index Search this site Go Lorem ipsum Header Lorem ipsum | Ipsum lorems | Ipsum lorems Selected Tab Style Lorem ipsum Unselected Tab Unselected Tab Navigation and search Identity and titles Navigation links Tab navigation Breadcrumb trail Home page | Selection menu | Submenu Ipsumna aingtbe Local navigation Alternative right location for scan column Oxhxtygbd sjdkll Ipsumna aingtbe Oxhxtygb dsjdkll Common location for banner ads Ntgjiv nsser Search, banner ads, contact information Left scan column (optional) Main content column ∆ Last revised 2020 Footer Company Name and address Copyright © 2020, Company Name. All rights reserved. Tel number. Contact us about this site. Right scan column (optional) Last revised, jump-to-top button Content information, copyrights, dates Figure 6.2 A possible page design and major page elements 164 9781380023322_text.indd 164 31/10/2019 11:19 6 • Mastering web page design Designing and creating simple pages Web pages are written in special language called HyperText Markup Language (HTML). The file extensions ‘.htm’ and ‘.html’ tell the operating system that these documents are web pages. A web browser is used to view these file types. Fortunately, we don’t have to learn the HTML language because we can use website builders, website creation tools or content management systems (CMS) to create the HTML for us. Website creation programs such as Dreamweaver, Google Web Designer and SeaMonkey Composer include many advanced features that allow users to create feature-rich websites. Common word-processing programs also allow you to create simple but effective websites like the one shown in Figure 6.3. Figure 6.3 A personal website created in a word processing program and viewed in a web browser ITQ 6.3 Give TWO programs you might use for web page creation. ITQ 6.4 These tools are a good introduction to web page design that leads on to more advanced CMSs like WordPress and Joomla, both of which are free and opensource tools for creating websites. In addition to using the tools already mentioned, many small businesses rely on the services of online website creation tools provided by various hosts, including: Duda, GoDaddy, Google Sites, Sitey, Webs, Weebly and Wix. Watch a video about creating a web page in a word processing program. What ‘Save As’ file type should be used to create a web page? 165 9781380023322_text.indd 165 31/10/2019 11:19 Theory Productivity Tools To learn the concepts of web page creation we can use a word processing package that allows us to save our document as a web page. We are already familiar with using a word processing program; we will use it to create our web pages. Although Microsoft Word and LibreOffice Writer are usually ‘WYSIWYG’ (What You See Is What You Get) editors, when used as web page design tools, the final web page (as viewed in a browser) may be different from what appears on the word processing screen. Because of this, it is recommended that you view your pages in a browser before publishing them. Figure 6.4 A personal website created online using Google Sites and viewed in a web browser WYSIWYG ▶ Publishing a website ▶ A WYSIWYG editor is a program that allows you to see what the end result will look like while the interface or document is being created. Publishing a website is to make it available so it can be viewed by anyone with an Internet-connected device and a web browser program. Inserting text in a web page Opening a word processing program for creating a web page You are going to create a web page for Caribbean Travel Services. 1 Open your word processing program. 2 Type ‘Caribbean Travel Services’ on the page that appears. If you save this document as usual using the ‘Save’ option, it will be saved as a word processing document. We want to save the document as a web page, a .html file. 3 To save the document as a web page look for a ‘Save As’ option. Try: File > Save As Figure 6.5 Dialogue for Save As showing File Type to save a document as a web page 4 Save your file as a web page (.htm, .html) file and give the file the name ‘your initials CTSindex’, e.g. XXCTSindex. 5 Click the ‘X’ in the top right-hand corner of the window to close the program. 166 9781380023322_text.indd 166 31/10/2019 11:19 6 • Mastering web page design Home page ▶ It is good practice to call a website’s first page the home page or index. Index is the standard default name for a home page and allows web browsers to find the page easily. A home page is the starting page of a website; it usually contains navigation links to the content of the website. Now try to apply what you have learnt to your own company. ACTIVITY 6.1 Creating a home web page for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Create a web page related to your company. Add the company name to the document. 2 Save the document as a web page (.html) with the name ‘your initials company initials index’, e.g. XXSLFindex. ITQ 6.5 What TWO file extensions indicate that the file is a web page? Adding content to a web page That was a good start and now we need to add content to our web page. Editing text on a web page 1 Open your word processing program. 2 To open a saved document look for an ‘Open’ option. Try: File > Open 3 Browse to the folder containing your file XXCTSindex. 4 Open the file; you see ‘Caribbean Travel Services’. 5 Continue your document and use your word processing skills to create the following document. Caribbean Travel Services Contact Us: info@Caribbeantravelservices.com Caribbean Travel Services Rental Enquiry Form Caribbean Travel Services are delighted to provide scheduled bus service and luxury rentals throughout the Caribbean. We have an extensive fleet of vehicles. Our buses run on scheduled routes. Our luxury coaches, minibuses and cars are available with one of our experienced drivers or self-drive. Hyperlink to Destinations Hyperlink to Vehicle Data to be input to the CTSindex file example. 6 Save your file as you did before; look for a ‘Save’ option. Try: File > Save Note that this time we are not required to give the file a name; it already has a name. 7 Click the ‘X’ in the top right-hand corner to close the program. 167 9781380023322_text.indd 167 31/10/2019 11:19 Theory Productivity Tools Now try to apply what you have learnt to your own company. ACTIVITY 6.2 Editing text on a web page for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXSLFindex. 2 Add information to the document. 3 Save the document and close. Viewing web page in a web browser ITQ 6.6 Suggest a reason for test viewing your web page in a web browser. Having created a web page, it is a good idea to view the page to see what it really looks like. Viewing the page in a web browser will allow you to see what your intended audience will see when they view your pages on the World Wide Web. Viewing your web page in a web browser 1 Open your web browser program. 2 Look to see if there is an icon for a web-browsing program like Internet Explorer, Edge, Firefox, Chrome or Safari on a Mac computer or on the desktop. If not try the Start button and look for Edge, Internet Explorer, Chrome or Firefox. Otherwise your teacher will tell you how to start the web-browsing program. 3 Open the file you created in the earlier activity XXCTSindex. In most web browsers. Try: File > Open 4 Your document should be displayed in the browser window. 5 Click the ‘X’ in the top right-hand corner to close the web-browsing program. Some web browsers, like Edge and Chrome, don’t have a File > Open option. You can always open your web page using this alternative method. 1 Open a File Explorer program – look to see if there is an icon for File Explorer on the desktop. If not try: Start button > File Explorer Otherwise your teacher will tell you how to start the File Explorer program. 2 Browse to the folder containing your web page. 3 Double-click on the .html or .htm file. Congratulations – you have created and viewed your first web page! Now try to apply what you have learnt to your own company. ACTIVITY 6.3 Editing text on a web page for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open the document you created in the earlier activity, e.g. XXSLFindex. 2 Add information to the document. 3 Check the web page by viewing in a web browser. 4 Save the document and close. 168 9781380023322_text.indd 168 31/10/2019 11:19 • Computer 65• •Mastering 1Mastering web word fundamentals page processing design Did the page display correctly? Were you able to read all the text correctly? If not, you should go back and ensure that you completed all the steps correctly. ITQ 6.7 Watch this video about basic web browsing. Name three web browsers. Creating more web pages Your website is going to need another two web pages. The next activity will create these pages. Creating more web pages Create another web page and include the text below. Caribbean Travel Services Destinations > Town A > Town B > Town C > Town D Replace Towns A–D with your own destinations. Add at least 25 additional destinations. Back to top of page Hyperlink to Homepage Hyperlink to Vehicle Data to be input to the Destinations file. 2 As in the previous activity, save your file as a web page (.htm, .html) file and give the file the name ‘your initials destinations’, e.g. XXdestinations. 3 Check that this web page displays correctly by viewing it in a web browser as before. 4 Now create the final web page for your website. Caribbean Travel Services Vehicles > 52-seater luxury coach > 12-seater electric > 25-seater with cycle carrier > 25-seater minibus Add your own vehicles to this list Hyperlink to Vehicle Hyperlink to Homepage Data to be input to the Vehicles file. 5 Save your file as a web page (.htm, .html) file and give the file the name ‘your initials vehicles’, e.g. XXvehicles. 6 Check this web page displays correctly by viewing it in a web browser as before. 7 Click the ‘X’ in the top right-hand corner to close the program. 169 9781380023322_text.indd 169 31/10/2019 11:19 Theory Productivity Tools Now try to apply what you have learnt to your own company. ACTIVITY 6.4 Creating more web pages for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Create two more pages. If you are using St Luago Fashion, your pages could include Wedding Dresses and Mother of the Bride Dresses. 2 Check the web pages by viewing in a web browser. 3 Save the documents and close. You have created your second and third web pages; we hope you are getting the hang of it. You should now have three web pages: XXCTSindex.html, XXdestinations. html and XXvehicles.html. Inserting graphics and pictures into a web page A major part of web design is the imagery you use. Images should be carefully selected and placed on the page in a way that will help viewers understand the information on the web page. An image can: • help explain what the text on the page is about • attract the reader’s attention and encourage them to read the accompanying text • set an emotion/mood. When selecting and using images, you should be aware that each image is owned by someone and as such may be copyrighted. If the image is copyrighted, you will require the owner’s permission to use it on your website. Figure 6.6 Website home page created in this chapter viewed in a web browser 170 9781380023322_text.indd 170 31/10/2019 11:19 • Computer 65• •Mastering 1Mastering web word fundamentals page processing design To insert a picture, look for an ‘Insert’ option or an ‘Insert picture’ option. Try: Insert > Picture/Image ITQ 6.8 Suggest why care should be taken if you include a picture in your web page when you found the picture online. Figure 6.7 Inserting an image Inserting images in a web page 1 Open your word processing program. 2 Open the web page XXCTSindex. 3 To insert a picture into the web page, look for ‘Picture’. Try: Insert > Picture The picture you choose should be copyright-free. Your teacher may provide a set of suitable pictures for you to choose from. Caribbean Travel Services Contact Us: info@Caribbeantravelservices.com Caribbean Travel Services Rental Enquiry Form << insert your picture here >> …… …… Hyperlink to Destinations Hyperlink to Vehicles Positioning an image on the web page 4 Modify the picture’s size as necessary by using the handles that appear when the picture is selected. Some website creation programs insist that you provide alternative text if your picture cannot be displayed. This should be a simple description of the picture, e.g. ‘Caribbean Travel Services Bus 301’. 5 6 7 8 To delete a picture select the picture and press the Delete key on the keyboard. Save your file. Check that this web page displays correctly by viewing it in a web browser as before. Click the ‘X’ in the top right-hand corner to close the program. 171 9781380023322_text.indd 171 31/10/2019 11:19 Theory Productivity Tools Now try to apply what you have learnt to your own company. ACTIVITY 6.5 Inserting images in web pages for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Add images to your web pages. 2 Check the web pages by viewing them in a web browser. 3 Save the documents and close. Wrapping text with an image on a web page The syllabus requires that you learn how to ‘wrap text with image’, that is, to ‘wrap’ text around an image. This is coming to be seen as poor practice because web pages are now increasingly viewed on small-screen devices such as smartphones, and using ‘wrap text with image’ may not allow the image to be displayed well on a small screen. If you must wrap text with an image, use a simple table. For example: ITQ 6.9 Give ONE reason why wrapping text with an image is becoming unpopular. Insert the text here Insert the image here View your web page on a small screen device to see if the effect is what you require. Inserting hyperlinks into a web page Hyperlinks allow the author of a website to join one web page to others. They also allow the viewer of the web page to access external resources. Recall that a hyperlink is part of a web page; it can be in the form of text or an image that when selected and clicked with the mouse displays another web page document (or resource). The person viewing a page can simply click on a hyperlink to view the linked content. Figure 6.8 Viewing a website in a web browser and clicking on a hyperlink 172 9781380023322_text.indd 172 31/10/2019 11:19 •Mastering • Computer 651• •Mastering 1 Computer web word Fundamentals fundamentals page processing design The use of hyperlinks is not restricted to jumping to another web page, although this is the most common use of hyperlinks. Look at the ‘Insert Hyperlink’ window in Figure 6.9 and notice that you can link to: an existing web page, a place in the current document (‘This document’), an email address or a user-created document file. Figure 6.9 The options for inserting hyperlinks ITQ 6.10 Suggest a reason why a web page should contain at least one hyperlink. Creating a hyperlink to another web page The following activities will develop your ability to insert hyperlinks into a document. You will use the application’s ‘Insert Hyperlink’ feature to: • link selected text or an image to another web page • link selected text or an image to another place in the document • link to an email address • link to a user-created document file. Once correctly completed, the appearance of the hyperlinked text will change; it will be blue in colour and will be underlined. To insert a hyperlink into a web page, look for ‘Hyperlink’ or ‘Insert Hyperlink’. Try: Insert > Hyperlink ITQ 6.11 Figure 6.10 Inserting a hyperlink Watch a video giving some simple Internet safety information. What does the padlock and https mean in a web browser? 173 9781380023322_text.indd 173 31/10/2019 11:19 Theory Productivity Tools Adding hyperlinks to a web page 1 Open your web page XXCTSindex. 2 To convert the text ‘Hyperlink to Destinations’ to a hyperlink, select the words ‘Hyperlink to Destinations’ with the cursor. 3 Find the file to link to. Try: Insert > Link > Link > Existing File 4 Browse to find the file and select the .html file XXdestinations. html as the target web page. 5 Click OK to create the hyperlink. 6 Now convert the text ‘Hyperlink to Vehicles’ to a hyperlink by repeating the above steps, but this time select the XXvehicles. html file. 7 Save your file. 8 Click the ‘X’ in the top right-hand corner to close the program. 9 Check this web page displays correctly by viewing it in a web browser. Now try to apply what you have learnt to your own company. ACTIVITY 6.6 Adding hyperlinks to a web page for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Add hyperlinks to your index (home) web page. 2 Save the document and close. 3 Check the web pages by viewing in a web browser. Having added hyperlinks to the index page of the CTS website, you need to continue and add appropriate hyperlinks to the other two pages: XXdestinations.html and XXvehicles.html. The process is the same. Adding hyperlinks to the Destinations and Vehicles pages 1 Repeat the actions in the previous activity to add hyperlinks to the Destinations and Vehicles web pages. 2 Click the ‘X’ in the top right-hand corner to close the program. 3 The complete website is now available, so you must check all the hyperlinks on all the pages. In a web browser, navigate around the website using all hyperlinks and check they all work. 174 9781380023322_text.indd 174 31/10/2019 11:19 6 • Mastering web page design Now try to apply what you have learnt to your own company. ACTIVITY 6.7 Adding hyperlinks to all web pages for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Add hyperlinks to the remaining web pages that make up your website. 2 Save the documents and close. 3 Check the web pages and hyperlinks by viewing in a web browser. ITQ 6.12 Why is it important to check hyperlinks in a web browser when they have been created? Creating a hyperlink to a location within the web page Sometimes the information that you present on a web page is lengthy and requires the viewer to scroll down the page. Your Destinations web page is an example of this, as all the destinations cannot be displayed on a typical monitor screen. That is why we included the text ‘Back to top of page’. Adding hyperlinks to a place in a document 1 To create a hyperlink to a location within a web page look on the hyperlink dialog for ‘Place in this Document’ or ‘Document’. Try: Insert > Hyperlink > Place in this Document Figure 6.11 Inserting a hyperlink to a location within the web page 2 In the XXdestinations web page convert the text ‘Back to top of page’ to a hyperlink to the top of the page. Creating a hyperlink to an email address You should be expert at adding hyperlinks so now try to add a hyperlink that will send an email to you when clicked. Remember that email addresses are always in the same form, for example: info@Caribbeantravelservices.com. In the XXCTSindex web page, convert the text ‘Contact Us’ to a hyperlink for an email. 175 9781380023322_text.indd 175 31/10/2019 11:19 Theory Productivity Tools Creating a hyperlink to a user-created file Creating a hyperlink to a user-created document Finally, you might want to create a hyperlink to a file that you have created. The process is similar. In Chapter 5 you created a fillable form to enquire about coach rental, XXenquiry. You will now link to this document. 1 Open your web page XXCTSindex in a word-processing program. 2 Select the words ‘Caribbean Travel Services Rental Enquiry Form’ to convert the text to a hyperlink. Try: Insert > Hyperlink > Existing File or Web Page 3 4 5 6 7 Browse to and select the document XXenquiry as the target file. Click ‘OK’ to create the hyperlink. Save your file. Click the ‘X’ in the top right-hand corner to close the program. Check that this web page displays correctly by viewing it in a web browser. When you click on the hyperlink the Caribbean Travel Services Rental Enquiry Form should open. Now try to apply what you have learnt to your own company. ACTIVITY 6.8 Creating a hyperlink to a user-created document for your company Use the company you created in earlier activities or use St Luago Fashion. 1 On the index web page, add a hyperlink that links to the fillable form you created for your company in Chapter 5. 2 Save the documents and close. 3 Check the web pages by viewing in a web browser. ITQ 6.13 What type of hyperlink is most applicable for the ‘Contact Us’ text on a web page? Testing and evaluating a website for accuracy, user-friendliness and effective display Persons will use a wide variety of devices from smartphones to desktop computers to view your website. These devices will have different versions of various web browser programs. In addition to ensuring that all hyperlinks work as expected, you need to make sure that your website is displayed effectively and in a userfriendly way on all devices that viewers might use. 176 9781380023322_text.indd 176 31/10/2019 11:19 6 • Mastering 1 • Computer webfundamentals page design Considerations for publishing a website It is now time to consider uploading your website onto the World Wide Web. To make a website available on the WWW, you will need: • the website’s content (all the .html files and the associated images) • a domain name • a web-hosting service. Hosting ▶ ITQ 6.14 State the THREE components needed for publishing a website. Hosting is the act of making a website available on the World Wide Web. Many companies provide services to allow you to publish your website to the WWW. These include Duda, GoDaddy, Google Sites, Sitey, Webs, Weebly and Wix. Web-hosting companies offer a full range of services that covers registering your domain name, hosting your website and providing email addresses associated with your domain name. The costs of these services vary considerably depending on the size of your website, the expected number of viewers visiting the website, the number of company email addresses that you may want, and whether you want additional services such as a shopping cart and payment facilities. Once you have chosen a host provider you will be able to upload your files and publish your site. Your web-hosting company will provide you with instructions on how to upload your files. Once this is done, your website will be available to billions of viewers on the World Wide Web within a few minutes. Verifying that all hyperlinks work correctly The last thing that visitors to your site want is to click on a hyperlink that leads them nowhere, or worse, to a totally unintended place. Whatever the cause, broken links are frustrating errors that need to be addressed immediately. A broken link could prevent a website user doing what they came to the site to do. In order to provide the user with an effective and enjoyable experience, it is good practice to test all links ahead of publishing a website. It can be useful to use a table to create a site map to ensure that all hyperlinks are checked. An example from the testing of the Caribbean Travel Services website is given in Table 6.2. Web page Hyperlink Link works Yes Home page No Destinations page Vehicles page Contact Us Caribbean Travel Brochure Destinations page Home page Vehicles page Back to top of page Vehicles page Home page Destinations page Table 6.2 Grid for a table for testing hyperlinks in a website 177 9781380023322_text.indd 177 31/10/2019 11:19 Theory Productivity Tools Open each web page listed in the web page column in the table. Test the hyperlinks listed in column 2 and record whether the link works (‘Yes’) or not (‘No’) by placing a tick under the applicable column. Testing hyperlinks in a website Open your web page XXCTSindex in a web browser. Test each hyperlink on the web page. Open the XXvehicles web page and test all hyperlinks. Repeat for all remaining web pages in the website. Correct any problem(s) that may exist by editing the source files (the .html files), then retest the affected link(s). 6 Save the files if necessary and click the ‘X’ in the top right-hand corner to close the program. 1 2 3 4 5 Now try to apply what you have learnt to your own company. ACTIVITY 6.9 Testing all hyperlinks in your company’s website Use the company you created in earlier activities or use St Luago Fashion. 1 Test all hyperlinks in the website by viewing in a web browser and correct any errors. 2 Save the documents and close the web browser. Using a test audience Before publishing a website, it is important that you ensure that: • the content is complete, accurate and up to date • the navigation and hyperlinks work correctly • the pages display effectively on a range of devices and platforms. ITQ 6.15 In addition to Chrome and Edge, name THREE other web browsers that you could use to test a website. Proofreading is checking for errors in a document or web page. Proofreading your content ensures completeness, accuracy and currency. Content should be proofread by a test audience made up of more than one person to ensure that it is complete, free of errors and up to date. Considering that your website is going to be available on the World Wide Web, it is possible that you may have millions of viewers. To ensure that each of these viewers has a good user experience, it is recommended that you use your test audience to test your website using a selection of web browsers and hardware. This testing will help you review: • how the website looks if the viewer is using an older/newer version of your web browser • how the website looks if the viewer is using a different browser • how the website looks when viewed on a tablet or smart mobile phone • how the website looks to the visually impaired or colour-blind. 178 9781380023322_text.indd 178 31/10/2019 11:19 •Mastering • Computer 651• •Mastering 1 Computer web word Fundamentals fundamentals page processing design Verifying that all content on a website is up to date Website maintenance is an integral part of updating and keeping your site working properly. When properly maintained a website will: • be free of broken hyperlinks • provide current and relevant content to its users • have an information section at the bottom showing the date the page was last updated and the details of the authors or organisation. It is important that you regularly check and update your website. Information can soon become out of date. Every six months Caribbean Travel Services updates its advertising brochure and prints two thousand for distribution to depots, garages and libraries. The website must be updated alongside the production of the new brochure so that online viewers can also see and download the very latest brochure. Summary • When creating a website, always consider the reasons for the website and the intended audience. • The number of web pages desired, the content of each page and the layout of the web pages are important aspects of web page design. • Choosing an appropriate design for a page is an important first step in the web page design process. • Word processing programs can be used as simple web page creation tools. • Hyperlinks may be text or an image which links to another web page, a location within the web page, an email address or user-created files. • When testing a website, testers should use a variety of web browsers and devices to verify that all the hyperlinks work and that pages display correctly. • To make a website available on the web, designers should ensure they have a domain name and a hosting service so the files can be uploaded to the hosting company’s server. • A web page may include text, graphics and hyperlinks. Answers to ITQs 6.1 The cxc.org website has been designed to provide information about study and examinations to students and teachers. The main purpose of games.com is to provide interactive online games but it also includes product adverts. The foxnews.com website’s main purpose is the dissemination of current news stories. 6.2 The intended audience for www.cxc.org is students and teachers. For games.com the intended audience is young game players. The foxnews.com website has a wide audience of persons interested in American and international news. 6.3 There are many programs that can be used for web page creation. Word processors such as Microsoft Word and LibreOffice Writer have features to create web pages. Specialist web page creation programs include SeaMonkey, Composer and Dreamweaver. You might also choose an online website builder tool such as Wix, GoDaddy or Weebly. 6.4 Web pages have the file extension .htm or .html. 6.5 The two file extensions that indicate that the file is a web page are .htm and .html. 179 9781380023322_text.indd 179 31/10/2019 11:19 Theory Productivity Tools 6.6 Among the most popular web browsers are: Edge, Firefox, Safari, Chrome, Internet Explorer. 6.7 It is important to view any web pages you create in a web browser to check that they are displayed as you anticipated. 6.8 When copying pictures online you should always check whether they are copyrighted. Many images online are copyrighted but personal and educational use is allowed. Microsoft clipart images can be used for personal and educational use. 6.9 As screens become smaller, particularly on smartphones, wrapping text so that it appears alongside an image is becoming unpopular in web page design. 6.10 A web page needs at least one hyperlink to allow viewers to move away from that page. Otherwise the viewer is left viewing the page with no way to move on. 6.11 The padlock symbol and https as part of a web page’s URL indicate that the site has an added level of security to keep your personal data safe. 6.12 You should always test hyperlinks thoroughly in a web browser to ensure that they function correctly. Viewers become frustrated if hyperlinks don’t function properly. 6.13 There are two options for the hyperlink on the text ‘Contact Us’. The hyperlink may be to an email address so the viewer can directly email the organisation. The second option is that the hyperlink leads to another web page which contains all the contact information. 6.14 To publish a website you will need: all the website’s content (all the .html files and the associated images), a domain name and a web-hosting service. 6.15 Chrome and Edge are popular web browsers but users may prefer Internet Explorer, Safari, Firefox or Opera. Examination-style questions: Multiple Choice 1) When planning a website, the _______________ is LEAST important. A) intended audience B) number of hyperlinks C) layout of the web pages D) content of each web page 2) All of the following are tasks that are used to develop a simple web page EXCEPT: A) inserting text and graphics B) uploading page to test server C) creating a home page with hyperlink D) choosing an appropriate design for the page 3) A hyperlink is used to: A) link one web page to your computer B) link a web browser to a web page C) link one web page to another web page D) link the World Wide Web to your computer 4) Which of the following is NOT a target for a hyperlink? A) a web page B) an anchor point within a web page C) an email message D) a web browser 5) Which components are necessary to make a website available on the WWW? I web host II domain name III web browser IV web pages A) I, II and III only B) I, II and IV only C) II, III and IV only D) IV only Questions 6–7 are based on the stimulus material below. Resources Download the resources by clicking on any of the images below. Workbook Worksheets Model Answers The entire package of resources may be downloaded from www.myresourzeweb/pkg Please email webmaster@myresourzeweb.net if you experience any technical issues. 6) How many hyperlinks are displayed on the web page? A) 3 B) 4 C) 5 D) 6 180 9781380023322_text.indd 180 31/10/2019 11:19 6 • Mastering web page design 7) How many different types of hyperlink targets are displayed on the web page? A) 2 B) 3 C) 4 D) 5 Questions 8–10 are based on the stimulus material below. Jonathon, the web developer at Possibility High School, just completed the development of the school’s new website using an online tool. 8) All the teachers in the Mathematics and Science Departments were asked to interact with the website for one month. The teachers were most likely operating in a role as: A) web hosts B) test users C) content updaters D) user interface designers 9) Two teachers reported that they experienced difficulty in navigating through the site. This navigation issue will MOST LIKELY affect the ________________ of the website. A) accuracy B) content C) effective display D) user-friendliness 10) Which of the following processes would help to verify that all content is up to date? I using a test audience II checking all names and dates III verifying that all the hyperlinks work correctly A) I and II only B) I and III only C) II and III only D) I, II and III Examination-style questions: Structured 1) Your uncle wants to create simple web pages, using a variety of design features, for his new bike repair business. He has no knowledge of web page design and has come to you for assistance. a) Outline THREE things he should consider during the planning stage of the project and explain the importance of each item in the web page design process. [6] b) c) Your uncle plans to include a hyperlink to another website from his home page. i) State what a hyperlink is. ii) Name TWO OTHER targets a hyperlink could link to. iii) Name TWO OTHER types of content that could be included on a page. iv) Outline a strategy that he could use to ensure that the hyperlinks work for the life of the website. A test audience was used to evaluate the website for accuracy and effective display. i) What is a test audience? ii) Name FIVE OTHER aspects of the website that the test audience could evaluate. [1] [2] [2] [3] [1] [5] Total 20 marks 181 9781380023322_text.indd 181 31/10/2019 11:19 7 By the end of this chapter you should be able to: Mastering spreadsheets Spreadsheets are one of the main applications used for financial management on personal computers worldwide. A spreadsheet is an important tool for performing automatic calculations and is an electronic replacement for the traditional financial tools: the accountant’s ledger, pencil and calculator. Spreadsheets carry out calculations ranging from large amounts of data, as in a company’s annual account, to small-scale personal use, as in a family budget. In this chapter, we will help you to master spreadsheets and use their many features to create effective financial workbooks. You will learn to enter and format labels, values and formulae, and to sort, filter and display data as charts and graphs. You will need to spend time practising these skills at the computer. Microsoft Excel is used for all examples in this chapter. All spreadsheet programs, including Microsoft Excel and LibreOffice Calc, have similar features and the explanations given in this chapter aim to give you the broader skills to master any spreadsheet program. We would encourage you to experiment with and explore different spreadsheet programs to widen your understanding of the concepts given in this chapter. ✔✔ Explain the purpose of a spreadsheet. ✔✔ Use appropriate terminologies associated with spreadsheets. ✔✔ Use basic predefined functions. ✔✔ Create advanced arithmetic formulae. ✔✔ Replicate (copy) formulae to other cells. ✔✔ Manipulate rows and columns. ✔✔ Manipulate data in a spreadsheet. ✔✔ Perform charting operations. ✔✔ Manipulate one or more worksheets. Mastering web page design The purpose of spreadsheets Spreadsheet terminology Using predefined spreadsheet functions General functions Count functions Lookup functions PMT and IF functions Working with spreadsheets Replicating formulae Creating arithmetic formulae Relative addressing Absolute addressing Move, copy, delete Rows and columns Manipulating data Formatting data Performing charting operations Manipulating worksheets Chart types Sorting data Filtering data Labelling charts Pivot tables 182 9781380023322_text.indd 182 31/10/2019 11:19 7 • Mastering spreadsheets In this chapter you will learn how to use the required functions and features of a spreadsheet mainly by working carefully through many worked examples, with data relating to Caribbean Travel Services. The LibreOffice Calc spreadsheet program is free to download, install and use from LibreOffice.org. Google Sheets and Excel online are both free-to-use Internetbased spreadsheets. The purpose of spreadsheets Spreadsheet ▶ A spreadsheet is basically an automatic calculation tool. A spreadsheet is a computer program that allows the entry, automatic calculation and storage of data in the form of tables. A single spreadsheet workbook can contain a number of related worksheets, just like an accountant’s ledger can contain many pages. Some advantages of using a spreadsheet (as compared to traditional methods such as ledger and calculator) include the ability to: • perform error-free automatic calculation and recalculation every time a worksheet is changed • format the contents of a worksheet into a professional-looking document • move or copy sections of the worksheet to another area of the worksheet or to another worksheet ITQ 7.1 What traditional tools does a spreadsheet replace? • insert or delete rows or columns at any position in the worksheet • sort the entries in a worksheet ready for printing • select entries to be displayed using powerful filtering functionality • create graphs and charts from the data • link data in two or more worksheets. The most important feature of a spreadsheet is that it performs automatic calculations on data in a tabular form. A B C D 2 Price per Km Kms covered Cost 3 2.5 32 =B3*C3 1 4 Table 7.1 Example of an automatic calculation in a spreadsheet program A prospective customer has asked what the total cost would be if they rented a coach from Caribbean Travel Services’. The cost is the Price per Km (kilometre) multiplied by the Kms covered, so we multiply the value in cell B3 (2.5) by the value in cell C3 (32). This gives: Cost = 2.5 * 32 (= B3 * C3). The spreadsheet automatically performs the calculation, so the cost, 80, will be shown in cell D3. If we change the value in B3 or C3 because a different coach was used or a detour was taken, the cost is automatically recalculated. 183 9781380023322_text.indd 183 31/10/2019 11:19 Productivity Tools Using appropriate terminology associated with spreadsheets You need to be familiar with some of the key ideas and terms associated with all spreadsheet programs including Microsoft Excel and LibreOffice Calc. Term Definition Workbook A single spreadsheet file. A spreadsheet workbook is made up of one or more worksheets. Worksheet A worksheet is a single page of a workbook and is made up of a grid of cells, a table. This grid is made up of horizontal rows and vertical columns. Columns are named A, B, C …, Y, Z, AA, AB, AC, etc. Rows are numbered 1, 2, 3, 4, etc. Cell A cell is the intersection of a column and a row. Cell address The cell address is the column letter and the row number combination that can be used to uniquely identify a cell. Examples of a cell address are B5, C4 and AD324 . NOTE: Another term for ‘cell address’ is ‘cell reference’. We use ‘cell address’ for clarity. Cell range The cell range is a rectangle of selected cells. Examples of cell ranges are C9:C24, B5:E17 and D14:G22. Table 7.2 Spreadsheet terminology Figure 7.1 Worksheet showing cell range B5:E17 selected ITQ 7.2 B28:D36 is an example of what in a worksheet? ITQ 7.3 What is the correct term for ‘=C8+C9’? Label ▶ Value ▶ Formula ▶ Function ▶ Cells can contain three types of data. These are illustrated in Figure 7.2. A label is simple text, for example ‘Number of Passengers’ or ‘Fare’. A value is numeric data, for example 34, $52 or 27.85. A formula is an automatic calculation, for example =A5*A6. This means: take the value in cell A5, multiply it by the contents of cell A6, and put the answer in this cell. A function is a standard routine used to perform a mathematical task. 184 9781380023322_text.indd 184 31/10/2019 11:19 7 • Mastering spreadsheets You will already be familiar with many functions from your studies in mathematics such as average, sum, max and min. A wide range of functions is available in modern spreadsheets, for example the ‘PMT’ function, which calculates the payment required to pay off a loan or investment over a specified time period. Let’s get started with some simple spreadsheet examples. Figure 7.2 Cell B2 is an example of a label, cell B3 is an example of a value cell, D3 is an example of a formula and cell C5 is an example of the SUM function in a formula Opening a spreadsheet program You have been tasked with putting together a spreadsheet that calculates the total cost of hiring a coach from Caribbean Travel Services to assist the Customer Services team in responding quickly to cost queries from new customers. 1 Look to see if there is an icon for a spreadsheet program on the desktop. If not, click the Start button and try: Microsoft Office > Microsoft Excel Otherwise your teacher will tell you how to start the spreadsheet program. When a spreadsheet program starts it displays a grid or table of values. Each cell in the grid is identified by a cell address. 2 Look at Figure 7.3 and type the values and formula into your worksheet exactly as they are shown. A B C D 1 A B C D 1 2 Price per Km Kms covered Cost 2 Price per Km Kms covered Cost 3 2.5 3.2 =B3*C3 3 2.5 3.2 8 4 4 Figure 7.3 Data to be input for the simple formula example. Figure 7.4 The results should look like the ones shown above. 3 Try changing the values for Price per Km and Kms covered and see how the Cost value is automatically updated. 4 To complete your School Based Assessment you need to provide evidence of the formula you have used. To display a formula, instead of the result, choose a ‘Show Formula’ option. Try: Formulas > Show Formula 5 To revert to showing the results of the formula, repeat: Formulas > Show Formula 6 To save the document look for a ‘Save’ option. Try: File > Save 7 You need to give the file a name: ‘your initials kmscosts’, e.g. XXkmscosts. 8 Click the ‘X’ in the top-right corner of the window to close the program. NOTE: Almost all programs can be closed by clicking the ‘X’ in the top-right corner of the window. 185 9781380023322_text.indd 185 31/10/2019 11:19 Theory Productivity Tools Now try to apply what you have learnt to your own company. ACTIVITY 7.1 Opening a spreadsheet program and creating a workbook for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Open your preferred spreadsheet program. 2 Add data for your company. For example, material pattern and cost per metre stocked by St Luago Fashion. A B C D Metres of fabric Price per metre Cost 15 =C3*B3 4.5 E Figure 7.5 Example data to be input for the simple formula example 3 4 Save the workbook. You need to give a meaningful file name, for example ‘your initials fabriccosts’, e.g. XXfabriccosts. Click the ‘X’ to close the program. Using basic predefined functions ITQ 7.4 Watch a video about using cells. What is the difference between clearing cells and deleting cells? ITQ 7.5 What function returns the value of a number of cells added up? Modern spreadsheet programs have hundreds of predefined functions ready for you to use. They range from simple (sum, average, date …) to very complex calculations. Whatever the calculation you want to perform there is probably a function to help you. The basic functions include: Function name Function definition SUM function Adds up the values in a cell range. For example =SUM(B5:C8) adds up the values in cells: B5 + B6 + B7 + B8 + C5 + C6 + C7 + C8 AVERAGE function Finds the mean of values in a cell range. For example =AVERAGE(B5:C6) calculates the average of the values in the specified cells: (B5 + B6 + C5 + C6)/4 DATE function Takes the values for the year, month and day and combines them to form a date. For example, if cell B2 contains 2019, B3 contains 3 and B4 contains 12 then =DATE(B2, B3, B4) returns 12/3/2019 MAX function Finds the largest value in a cell range. For example =MAX(B5:C6) MIN function Finds the smallest value in a cell range. For example =MIN(B5:C6) Table 7.3 Predefined functions in spreadsheet programs More useful date functions are TODAY() which gives the current date and NOW() which gives the current date and time. 186 9781380023322_text.indd 186 31/10/2019 11:19 17• •Computer MasteringFundamentals spreadsheets Using predefined functions: SUM, AVERAGE, MAX, MIN and DATE Spreadsheets programs include a large range of mathematical and date functions that you will recognise, including ROUNDUP and ROUNDDOWN. Take some time to look at the functions available in the spreadsheet program you are using. Using predefined functions SUM, AVERAGE, MAX, MIN and DATE in a spreadsheet program You have been asked by management to report on how many kilometres Caribbean Travel Services’ bus fleet travels in a day. 1 Open your spreadsheet program. 2 Look at Figure 7.6 and type the values and formulae into your worksheet exactly as they are shown. A B C D E F G 1 2 Day Month Year 3 3 5 2020 4 5 Bus ID Kilometres 6 B 301 25467 7 B 302 18834 Total Kms covered =SUM(C6:C13) 8 B 403 32481 Average Kms =AVERAGE(C6:C13) 9 B 408 6735 Most Kms =MAX(C6:C13) 10 B 204 28419 Least Kms =MIN(C6:C13) 11 B 202 12455 12 B 105 9341 Today is =DATE(E3,D3,C3) 13 B 101 18984 14 Figure 7.6 Data to be input for the predefined functions activity The results should look like the ones shown in Figure 7.7. Figure 7.7 Expected results for the simple predefined functions activity 3 To save the document look for a ‘Save’ option. Try: File > Save 4 You need to give the file a name: ‘your initials definedfunctions’, e.g. XXdefinedfunctions. 5 Click the ‘X’ in the top-right corner of the window to close the program. 187 9781380023322_text.indd 187 31/10/2019 11:19 Theory Productivity Tools Using predefined functions: COUNT, COUNTA and COUNTIF ITQ 7.6 What spreadsheet function would you use to find the average of a column of numbers in a worksheet? The COUNT function can be useful. For example, a teacher might want to count how many students have been given a mark for their SBA assignment. They may then want to count the number who have achieved a mark of greater than 60; this uses the COUNTIF function. The COUNT function returns the number of cells that contain a value or formula in a cell range. The COUNT function does not count cells that contain labels (text). In a worksheet not all the cells in a cell range need to contain values. Remember cells can contain values (numbers), labels (text) or formulae (calculations). The COUNTA function returns the number of non-blank cells in a cell range. For example, in the worksheet below =COUNTA(B2:E6) would result in 18. The COUNTIF function returns the number of cells in a cell range that contain a value that meets a condition. For example, in the worksheet (Figure 7.6) below =COUNTIF(C3:D6,">30") would result in 1. =COUNTIF(C3:E6,">30") would result in 3. COUNT ▶ COUNTA ▶ COUNTIF ▶ ITQ 7.7 What is the difference between the COUNT and COUNTA predefined functions? Using predefined functions: COUNT, COUNTA and COUNTIF in a spreadsheet program 1 Open your spreadsheet program. 2 Look at Figure 7.8 and type the values and formulae into your worksheet exactly as they are shown. A B C D E 2 Day Price per Km Kms covered Cost 3 Mon 2.5 32 =C3*D3 F 1 4 Tues 2.5 5 Wed 2.5 6 Thur 2.5 =C4*D4 17 =C5*D5 =C6*D6 7 8 countif (Kms>30) =COUNTIF(D3:D6,">30") 9 count (values) =COUNT(B2:E6) 10 counta (non-blanks) =COUNTA(B2:E6) 11 12 13 14 Figure 7.8 Data to be input for the COUNT, COUNTA and COUNTIF functions activity The results should look like the ones shown in Figure 7.9. 188 9781380023322_text.indd 188 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing Figure 7.9 Expected results for the COUNT, COUNTA and COUNTIF functions activity 3 Change cell D4 to contain the value 21 and observe the results. 4 Save your file like you did before. You need to give the file a name: ‘your initials countfunctions’, e.g. XXcountfunctions. 5 Click the ‘X’ in the top-right corner of the window to close the program. Using predefined functions: VLOOKUP VLOOKUP ▶ VLOOKUP, vertical lookup, is a function that allows you to find the closest value in a column of cells to a given value. Having found the correct row it returns another value from that row. For example, a teacher might have the student names and marks in two columns. To find a particular student’s mark they must find the student’s name in the first column and then read out the mark from the second column of the same row. VLOOKUP automates this process and will even work if the name is misspelt because VLOOKUP finds the best match. The VLOOKUP function performs a vertical lookup by searching for a value in the first column of a cell range and returning the value in the same row in another column. A B C D E 2 Day Price per Km Kms covered Cost 3 Mon 2.5 32 4 Tues 2.5 5 Wed 2.5 6 Thur 2.5 F 1 =C3*D3 =C4*D4 17 =C5*D5 =C6*D6 7 8 Choose day 9 Wed =VLOOKUP (B9,B2:E6,4) 10 Figure 7.10 Example data for the VLOOKUP function example 189 9781380023322_text.indd 189 31/10/2019 11:19 Theory Productivity Tools The result is shown in Figure 7.11. Figure 7.11 Expected results for the VLOOKUP function example In this example =VLOOKUP(B9,B2:E6,4) means • Look for the value in B9: ‘Wed’. • Look in cell range B2:E6. Table 7.4 shows the part of the table to be looked up: Day Price per Km Kms covered Cost Mon 2.5 32 80 Tues 2.5 Wed 2.5 Thur 2.5 0 17 42.5 0 Table 7.4 The table referenced in a VLOOKUP function • Then take the value in the fourth column – ‘Cost’ – in the matching row (i.e. the row containing the value ‘Wed’). This is the ‘4’ in the formula =VLOOKUP(B9,B2:E6,4). ITQ 7.8 • ‘Wed’ is identified in the first column and the value in the fourth column of this Suggest what the function HLOOKUP does. The following example will make this clear. row is 42.5. The result of this VLOOKUP is 42.5. 190 9781380023322_text.indd 190 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing Using the predefined function VLOOKUP in a spreadsheet program This activity is suitable for individual work or small groups. 1 Open your spreadsheet program. 2 Look at Figure 7.12 and type the values and formulae into your worksheet exactly as they are shown. A B C D E 2 Day Price per Km Kms covered Cost 3 Mon 2.5 32 =C3*D3 4 Tues 2.5 5 Wed 2.5 6 Thur 2.5 F 1 =C4*D4 17 =C5*D5 =C6*D6 7 8 Choose day 9 Wed =VLOOKUP (B9,B2:E6,4) 10 Figure 7.12 Data to be input for the VLOOKUP functions activity 3 Try changing the value below ‘Choose day’ to ‘Mon’. 4 Now try ‘Thar’, deliberately typing it this way because VLOOKUP finds the closest match, in this case ‘Thur’, and displays the correct result. 5 Save your file like you did before. You need to give the file a name: ‘your initials VLOOKUP’. For example: XXVLOOKUP. 6 Click the ‘X’ in the top-right corner of the window to close the program. Using predefined functions: PMT and IF PMT function ▶ PMT stands for payment and the PMT function is used to calculate the payments required to pay off a loan. Companies like Caribbean Travel Services often require a loan to finance the purchase of new premises or vehicles, and PMT calculates what the repayments will be for a given loan amount, borrowed over a fixed period at a fixed interest rate. The IF function is used whenever you want to make a decision. For example, at CTS if the passenger number is greater than 50 the company wants to run extra buses on this route. The PMT function calculates the payment required to pay off a loan or investment, over a specified time period. Caribbean Travel Services is thinking of taking out a loan to purchase a new coach. A B C D E 3 Interest Rate Number of Amount payments borrowed Payment 4 0.03 120 PMT(B4,C4,D4) F 1 2 50000 5 Figure 7.13 Example data for the PMT function example 191 9781380023322_text.indd 191 31/10/2019 11:19 Theory Productivity Tools The result is shown in Figure 7.14. Figure 7.14 Expected results for the PMT function example For example, in Figure 7.14, in the function =PMT(B4,C4,D4), B4 contains the interest rate, C4 contains the number of payments and D4 contains the present value of the loan. The answer is that to borrow $50,000 at 3% over 10 years (10 years × 12 months per year = 120 payments), the repayments would be $1,544.50 per month. Using predefined function PMT in a spreadsheet program 1 Open your spreadsheet program. 2 Look at Figure 7.15 and type the values and formulae into your worksheet exactly as they are shown. A B C D E 3 Interest Rate Number of Amount payments borrowed Payment 4 0.03 120 PMT(B4,C4,D4) F 1 2 50000 5 Figure 7.15 Data to be input for the PMT function activity 3 Try increasing the number of payments value to 180 to change the repayment period to 15 years (15 × 12). 4 Save your file like you did before. You need to give the file a name: ‘your initials PMT’, e.g. XXPMT. 5 Click the ‘X’ in the top-right corner of the window to close the program. ACTIVITY 7.2 Opening a spreadsheet program and creating a workbook for your company Use the company you created in earlier activities or use St Luago Fashion. Open your spreadsheet program. 1 Your company is considering taking a loan to purchase a new delivery van. Create a worksheet to show the manager the monthly repayments on a $25,000 loan over 5, 6 and 7 years if the interest rate is 5%. 2 Save the workbook. You need to give the file a meaningful name, for example ‘your initials vanloan’: XXvanloan. 3 Click the ‘X’ to close the program. 192 9781380023322_text.indd 192 31/10/2019 11:19 5 • 1Mastering 7• •Computer Mastering word fundamentals spreadsheets processing IF function ▶ ITQ 7.9 What function counts all the nonblank cells in a cell range? The IF function performs a logical test and returns one of two results. For example, =IF(A1>=70,"Pass","Fail") would return ‘Pass’ if the value in cell A1 is greater than or equal to 70 and ‘Fail’ if the value in A1 is less than 70. Creating advanced arithmetic formulae ITQ 7.10 Put these arithmetic operations into the correct order of evaluation: • Multiplication • Ordinates (powers) • Subtraction • Brackets • Division • Addition. It is now time to look at some advanced arithmetic formulae. When working with formulae in spreadsheets it is important to understand that the normal BODMAS rules apply. You will have learnt the BODMAS rules in mathematics, but here is a quick recap. BODMAS stands for Brackets, Ordinates (powers and roots), Division, Multiplication, Addition and Subtraction. This is the order in which a spreadsheet will solve a formula. For example, does 3 + 5 * 2 mean 3 added to 5 giving 8, then 8 multiplied by 2 to give 16 or mean 5 multiplied by 2 giving 10, then 3 added to 10 to give 13? The BODMAS rule states multiplication before addition, so perform the multiplication first: 5 * 2 = 10, then perform the addition: 3 + 10 = 13. The correct answer is 13. ACTIVITY 7.3 The BODMAS rule Ask your mathematics teacher for a BODMAS rule test. Well, maybe not a test, but do ask for help in understanding the BODMAS rule. Try these examples using the BODMAS rule. ACTIVITY 7.4 Using advanced arithmetic formulae in a spreadsheet 1 Open your spreadsheet program. 2 Look at Figure 7.16 and type the values and formulae into your worksheet exactly as they are shown. A B C D E F 3 7 8 4 2 G H 1 2 3 4 BODMAS 5 =B3+C3-D3/E3*F3 6 =B3*C3-D3/E3+F3 7 =(B3+C3)/D3*(E3+F3) 8 Figure 7.16 Data to be input for the BODMAS activity 193 9781380023322_text.indd 193 31/10/2019 11:19 Theory Productivity Tools The results should look like the ones shown in Figure 7.17. Figure 7.17 Expected results for the BODMAS activity 3 Save your file like you did before. You need to give the file a name: ‘your initials BODMAS’. For example: XXBODMAS. 4 Click the ‘X’ in the top-right corner of the window to close the program. Replicating (copying) formulae to other cells It is sometimes necessary to move or copy the contents of cells. Because some of the contents being moved or copied may contain formulae, you need to understand what happens to a formula when it is moved or copied. In general, when cells are moved, the spreadsheet automatically updates the formula to reflect the change in position. Relative addressing Spreadsheets have two different modes of cell addressing: relative addressing and absolute addressing. In normal working we use relative addressing. Using relative addressing allows a formula’s cell references to change when they are copied or moved simply because any two cells can be related by position. For example, consider the cells shown in Figure 7.18. A B C D E Price per Km Kms covered Cost 2.5 32 =C3*D3 F 1 2 3 Mon 4 Tue 5 Wed 6 Thur 7 Fri 8 Sat 9 Sun 10 194 9781380023322_text.indd 194 Figure 7.18 Example data for the relative addressing example 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing ITQ 7.11 Using relative addressing we can read the formula =C3*D3 as ‘multiply the contents of the cell one to the left by the contents of the cell two to the left’. If the formula is copied from cell E3 into cell E4 it is automatically corrected, so that ‘multiply the contents of the cell one to the left by the contents of the cell two to the left’ becomes =C4*D4. Relative addressing allows formulae in a spreadsheet to be automatically updated if they are copied or moved. Why is relative addressing called ‘relative’? Relative addressing ▶ Using relative addressing in a spreadsheet 1 Open your spreadsheet program. 2 Look at Figure 7.19 and type the values and formulae into your worksheet exactly as they are shown. A B C D E 2 Bus ID Price per Km Kms covered Cost 3 B 301 2.5 32 =C3*D3 4 B 302 2.5 47 5 B 403 1.8 12 6 B 408 2.2 58 7 B 204 4.5 35 8 B 202 4.5 19 9 B 105 4.7 23 10 B 101 4.2 27 F 1 11 Figure 7.19 Data to be input for the PMT function activity 3 Copy the formula in cell E3 into cells E4 to E10. You can use the Copy and Paste tools that you are used to from word processing, but many spreadsheet programs allow quick copying. Click in the cell to be copied, E3 in this case, move to the bottom-right corner, click, hold and drag down to copy. Figure 7.20 Expected results for the relative addressing activity Perfect, the formula has been correctly adjusted because of relative addressing. 4 Save your file like you did before. You need to give the file a name: ‘your initials relative’. For example, XXrelative. 5 Click the ‘X’ in the top-right corner of the window to close the program. 195 9781380023322_text.indd 195 31/10/2019 11:19 Theory Productivity Tools Absolute addressing Relative addressing is normally what we want as formulae are automatically updated when moved or copied. Sometimes, however, this is not what we want. Look at this example of a travel tax calculation. Caribbean Travel Services has to collect a 5% tax on behalf of the government and this has to be included in the total cost. A B C D E F G 2 Bus ID Price per Km Kms covered Cost Tax Cost + Tax 3 B 301 2.5 32 =C3*D3 =E3*C13 4 B 302 2.5 47 5 B 403 1.8 12 6 B 408 2.2 58 7 B 204 4.5 35 8 B 202 4.5 19 9 B 105 4.7 23 10 B 101 4.2 27 Tax 0.05 H 1 11 12 13 14 Figure 7.21 Example data for the absolute addressing example showing incorrect use of relative addressing. In this case to calculate the tax for bus B 301 we might use the formula =E3*C13 in cell F3, which works well. But what happens when we copy this formula into cell F4? Remember, relative addressing allows the spreadsheet to update the formula when it is copied or moved, which is what happens here. The calculation of the formula in F4 (=E4*C14) results in 0, which is not what we want. What has happened? When we moved the formula the spreadsheet automatically updated the formula for us from =E3*C13 to =E4*C14, but this is incorrect because cell C14 is empty; the formula is now wrong, it should be =E4*C13. In this case we don’t want the part of the formula C13 to change. We want to make the reference to cell C13 absolute so it does not change when the formula is moved or copied. Fortunately this is easily done by changing ‘C13’ (relative address) to ‘$C$13’ (absolute address). Now we can copy or move the formula and it will always refer to cell C13, the tax rate (Figure 7.22). 196 9781380023322_text.indd 196 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing A B C D E F G H 2 Bus ID Price per Km Kms covered Cost Tax Cost + Tax 3 B 301 2.5 32 =C3*D3 =E3*$C$13 4 B 302 2.5 47 =C4*D4 5 B 403 1.8 12 =C5*D5 6 B 408 2.2 58 =C6*D6 7 B 204 4.5 35 =C7*D7 8 B 202 4.5 19 =C8*D8 9 B 105 4.7 23 =C9*D9 10 B 101 4.2 27 =C10*D10 Tax 0.05 1 11 12 13 14 Figure 7.22 Example data for the absolute addressing example showing correct absolute addressing. Absolute addressing ▶ Note that because we did not include the extra $ signs in the reference to cell E3, this remained a relative address and so was updated when we copied the formula, which is just what we wanted. Absolute addressing prevents a formula, or part of a formula, being automatically updated when the formula is copied or moved. The CTS example below will make absolute addressing clear. Using absolute addressing in a spreadsheet The Finance Department at Caribbean Travel Services have asked you to include tax to the total cost per kilometre for each bus. 1 Open your spreadsheet program. 2 Look at Figure 7.23 and type the values and formulae into your worksheet exactly as they are shown or open the spreadsheet XXrelative from the previous exercise (if you do this, do a Save As and give the new file the name ‘your initials absolute’ before continuing). A B C D E F G 2 Bus ID Price per Km Kms covered Cost Tax Cost + Tax 3 B 301 2.5 32 =C3*D3 =E3*C13 4 B 302 2.5 47 5 B 403 1.8 12 6 B 408 2.2 58 7 B 204 4.5 35 8 B 202 4.5 19 9 B 105 4.7 23 10 B 101 4.2 27 H 1 11 12 Figure 7.23 Data to be input for the absolute addressing activity 3 Try to copy the formula in cell F3 into cells F4 to F10. You will see incorrect results. 197 9781380023322_text.indd 197 31/10/2019 11:19 Theory Productivity Tools 4 Correct the formula in cell F3 to =E3*$C$13. 5 Copy the formula in cell F3 into cells F4 to F10. You will now see the results are correct. Before closing the spreadsheet program we will look at naming a cell range. 6 Select the cell range D3:D10; this is the ‘Kms covered’. Towards the top-left corner you can now type ‘kmcovered’ to name this cell range. Figure 7.24 Giving a cell range a name This can be useful because we can now include this name in formulae to make them more meaningful. Figure 7.25 Using a named cell range in a function, SUM in this example In Figure 7.25, the formula =SUM(kmcovered) is the same as =SUM(D3:D10) but is more meaningful to anyone looking at the formula. 7 Save your file like you did before. You need to give the file a name: ‘your initials absolute’. For example: XXabsolute. 8 Click the ‘X’ in the top-right corner of the window to close the program. ITQ 7.12 What is the difference between relative and absolute addressing? 198 9781380023322_text.indd 198 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing Effect of move, copy and delete operations on formulae Professional workbooks can become very large and contain hundreds of formulae, so it is important that they are designed properly. In a working workbook, try to avoid moving or deleting data in cells. Formulae may rely on that data and will give unexpected incorrect results as a result of the contents of cells being moved or deleted. Copying the contents of cells will not affect any formulae that depend on the cells. Design your workbooks well so that you don’t have to move or delete the contents of cells in a working spreadsheet. If you must move or delete the contents of cells in a working spreadsheet, thoroughly check all formulae to ensure that they are still correct. Manipulating rows and columns: insert, delete and modify Adding or deleting a row or column in a working worksheet should be avoided if possible, although using the relative and absolute addressing in formulae will usually have the desired effect even if rows are added or deleted. All spreadsheet programs have ‘Insert rows and columns’ tools to make adjustments. To insert a new row or column look for ‘Insert’, ‘Copy’ and ‘Paste’. Try: Home > Insert or Sheet > Insert Row Figure 7.26 Inserting rows and columns ITQ 7.13 State ONE reason why a column’s width may need changing. Try to design your spreadsheets well so that you don’t have to insert or delete cells in a working workbook. The width and height of rows and columns can be easily modified to improve the appearance of your worksheet. Simply click and drag a row or column boundary to change its size. 199 9781380023322_text.indd 199 31/10/2019 11:19 Theory Productivity Tools Manipulating data in a spreadsheet Formatting data in a worksheet can make it easier to understand. For example, adding a $ sign to a number indicates this is a monetary value. Sorting can make the data meaningful. Filtering a large amount of data can be used to select only the relevant rows of data. Formatting numeric data Because spreadsheets are frequently used to manage financial data they include formatting tools to improve the presentation of financial data. Formatting data as currency, accounting format, percentage or comma separated, and specifying the number of decimal places, can all help improve the presentation of the data. We will use these formatting tools to improve the XXabsolute spreadsheet you created above. To apply formatting to numeric data, look for ‘Number’ or ‘Currency’. Try: Home tab Figure 7.27 Applying numeric data formatting 200 9781380023322_text.indd 200 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing Using numeric data formatting in a spreadsheet Your spreadsheet needs to be presented to the Caribbean Travel Services’ Board of Directors. You decide to format it to make it more presentable. 1 Open your spreadsheet program. 2 Look at Figure 7.28 and type the values and formulae into your worksheet exactly as they are shown or open the worksheet XXabsolute from the previous activity and modify the data (if you do this, do a Save As ‘your initials formatting’ before continuing). A B C D E F G 2 Bus ID Price per Km Kms covered Cost Tax Cost + Tax 3 B 301 2.5 32 =C3*D3 =E3*$C$13 =E3+F3 4 B 302 2.5 47 =C4*D4 =E4*$C$13 =E4+F4 5 B 403 1.8 12 =C5*D5 =E5*$C$13 =E5+F5 6 B 408 2.2 58 =C6*D6 =E6*$C$13 =E6+F6 7 B 204 4.5 35 =C7*D7 =E7*$C$13 =E7+F7 8 B 202 4.5 19 =C8*D8 =E8*$C$13 =E8+F8 9 B 105 4.7 23 =C9*D9 =E9*$C$13 =E9+F9 10 B 101 4.2 27 =C10*D10 =E10*$C$13 =E10+F10 Tax 0.05 H 1 11 12 13 14 Figure 7.28 Data to be input for the formatting activity 3 Select the cells E3:F10. 4 To change the format of these cells to currency look for ‘Currency’. Try: Home > (Number) Currency 5 Accounting formatting is similar to currency so select cells G3:G10 and change to ‘accounting’. 6 The tax rate 0.05 is a percentage. Select cell B13 and change the formatting to percentage. 7 Select the cell range D3:D10 and change to Number formatting with commas and 2 decimal places. Try: Home > Numbers > More Number Formats The result should be: Figure 7.29 Expected results for the formatting cells activity 8 Save your file like you did before. You need to give the file a name: ‘your initials formatting’. For example: XXformatting. 9 Click the ‘X’ in the top-right corner of the window to close the program. 201 9781380023322_text.indd 201 31/10/2019 11:19 Theory Productivity Tools ITQ 7.14 State the main difference between currency formatting and accounting formatting. Sorting data To present the data in a worksheet in a meaningful way it can be useful to sort the data. Modern spreadsheet programs include powerful sorting tools. Data can be sorted in ascending (going up) or descending (coming down) order. It is possible to sort on two or more fields. This means that if the values in the primary sort field are the same (and so can’t be sorted), the system will look at the values in the secondary field to decide which order to place the rows in. To sort data, look for ‘Sort’ or ‘Data sort’. Try: Data > Sort Figure 7.30 Sorting selected data Figure 7.31 shows some data before sorting cell range B2:G10. Figure 7.31 Example data for the sorting example After sorting with primary field ‘Price per Km’ descending, and secondary field ‘Kms covered’ descending, i.e. largest to smallest: 202 9781380023322_text.indd 202 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing Figure 7.32 Expected results for the sorting example Pay particular attention to where the ‘Price per Km’ values were the same; on these rows the ‘Kms covered’ field was used to decide the order. Sorting data in a spreadsheet The Board of Directors at Caribbean Travel Services are reviewing the Price per Km that is charged for each vehicle. To do this they require the data to be sorted on the Price per Km column. 1 Open your spreadsheet program. 2 Look at Figure 7.33 and type the values and formulae into your worksheet exactly as they are shown or open the spreadsheet XXformatting from the previous activity and modify the data (if you do this, do a Save As ‘your initials sorting’ before continuing). A B C D E F G 2 Bus ID Price per Km Kms covered Cost Tax Cost + Tax 3 B 301 2.5 32 =C3*D3 =E3*$C$13 =E3+F3 4 B 302 2.5 47 =C4*D4 =E4*$C$13 =E4+F4 5 B 403 1.8 12 =C5*D5 =E5*$C$13 =E5+F5 6 B 408 2.2 58 =C6*D6 =E6*$C$13 =E6+F6 7 B 204 4.5 35 =C7*D7 =E7*$C$13 =E7+F7 8 B 202 4.5 19 =C8*D8 =E8*$C$13 =E8+F8 9 B 105 4.7 23 =C9*D9 =E9*$C$13 =E9+F9 10 B 101 4.2 27 =C10*D10 =E10*$C$13 =E10+F10 Tax 0.05 H 1 11 12 13 14 Figure 7.33 Data to be input for the sorting activity 3 Select the cells B2:G10. Notice that this includes the column titles and all the data. 203 9781380023322_text.indd 203 31/10/2019 11:19 Theory Productivity Tools 4 To sort data in selected cells look for ‘Sort’. Try: Data > Sort Figure 7.34 Sorting selected data The result should be: Figure 7.35 Expected results for the sorting activity 5 Save your file like you did before. You need to give the file a name: ‘your initials sorting’. For example: XXsorting. 6 Click the ‘X’ in the top-right corner of the window to close the program. ITQ 7.15 Suggest why it is sometimes helpful to sort data in a worksheet. ITQ 7.16 Filtering data When spreadsheets contain large amounts of data the display can be confusing. It can be useful to filter the data so that only the data you need is displayed. Modern spreadsheet programs include useful filtering tools. Large amounts of data can be filtered before being displayed. It is possible to filter on two or more fields and using complex criteria. What feature in a spreadsheet program can be used to reduce the amount of data being displayed by rejecting some rows using a given set of criteria? 204 9781380023322_text.indd 204 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing To filter data look for ‘Filter’ or ‘More Filters’. Try: Data > Filter Figure 7.36 Filtering selected data The next two examples show how to apply simple and more complex filter data in the CTS spreadsheets. Filtering data in a spreadsheet 1 Open your spreadsheet program. 2 Look at Figure 7.37 and type the values and formulae into your worksheet exactly as they are shown or open the spreadsheet XXsorting from the previous activity and modify the data (if you do this do a Save As ‘your initials filtering’ before continuing). A B C D E F G Bus ID Price per Km Kms covered Cost Tax Cost + Tax 5 Bus ID Price per Km Kms covered Cost Tax Cost + Tax 6 B 301 2.5 32 =C3*D3 =E6*$C$16 =E6+F6 7 B 302 2.5 47 =C4*D4 =E7*$C$16 =E7+F7 8 B 403 1.8 12 =C5*D5 =E8*$C$16 =E8+F8 9 B 408 2.2 58 =C6*D6 =E9*$C$16 =E9+F9 10 B 204 4.5 35 =C7*D7 =E10*$C$16 =E10+F10 11 B 202 4.5 19 =C8*D8 =E11*$C$16 =E11+F11 12 B 105 4.7 23 =C9*D9 =E12*$C$16 =E12+F12 13 B 101 4.2 27 =C10*D10 =E13*$C$16 =E13+F13 Tax 0.05 H 1 2 3 4 14 15 16 17 Figure 7.37 Data to be input for the data filtering activity 3 Select the cells B2:G13. Notice that this includes the column titles and all the data. 205 9781380023322_text.indd 205 31/10/2019 11:19 Theory Productivity Tools 4 To filter data in selected cells look for ‘Filter’. Try: Data > Filter The filters appear as shown in Figure 7.38 and can be used to filter the data. In this example the ‘Price per Km’ filter has been set to show only 2.2 and 2.5. Figure 7.38 Expected results after filtering in the filtering activity Of course, you can filter on more than one field. 5 Clear any filters you have applied before continuing with the next example. Complex data filtering in a spreadsheet CTS wants to find the vehicles that covered more than 3,000 kms and where the tax was less than $600. You need to set up the criteria with exactly the same names as those used in the data. Then just add the criteria to the table as shown in Figure 7.39. A B C D E F G Bus ID Price per Km Kms covered Cost Tax Cost + tax H 1 2 3 >3000 <600 4 5 Bus ID Price per Km Kms covered Cost Tax Cost + tax 6 B 403 1.8 1,293.00 $2,327.40 $116.37 $2,443.77 7 B 408 2.2 5,841.00 $12,850.20 $642.51 $13,492.71 8 B 301 2.5 3,234.00 $8,085.00 $404.25 $8,489.25 9 B 302 2.5 4,756.00 $11,890.00 $594.50 $12,484.50 10 B 101 4.2 2,756.00 $11,575.20 $578.76 $12,153.96 11 B 202 4.5 1,934.00 $8,703.00 $435.15 $9,138.15 12 B 204 4.5 3,548.00 $15,966.00 $798.30 $16,764.30 13 B 105 4.7 2,381.00 $11,190.70 $559.54 $11,750.24 Tax rate 5% 14 15 16 Figure 7.39 Data to be input for the complex data filtering activity 1 Select the cells B5:G13. Notice that this includes the column titles and all the data. Try: Data > Filter > Advanced Filter 206 9781380023322_text.indd 206 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing 2 If it has not been automatically inserted, select the List Range as $B$5:$G$13 and the Criteria Range as $B$2:$G$3. Figure 7.40 Selecting List Range and Criteria Range The result of applying these filters should be just what the CTS Board want. Figure 7.41 Expected results for the filtering activity 3 Clear this filter before trying a few of your own filters. 4 Save your file like you did before. You need to give the file a name: ‘your initials filtering’. For example: XXfiltering. 5 Click the ‘X’ in the top-right corner of the window to close the program. Applying a pivot table and pivot chart to data Pivot table ▶ When you need to summarise large amounts of data, there are two useful tools: pivot tables and pivot charts. A pivot table allows you to summarise complex data in a worksheet into a neat tabular form. 207 9781380023322_text.indd 207 31/10/2019 11:19 Theory Productivity Tools Pivot chart ▶ A pivot chart is a graphical presentation of a pivot table. To create a pivot table, look for ‘Pivot Table’. Try: Insert > Pivot Table To create a pivot chart, look for ‘Pivot Chart’. Try: Insert > Pivot Chart We go straight into an example to show you pivot tables in action. ITQ 7.17 Watch a video about creating pivot tables. What are pivot tables used for? Figure 7.42 Inserting a pivot chart Summarising data in pivot tables and pivot charts in a spreadsheet 1 Open your spreadsheet program. 2 Look at Figure 7.43 and type the values into your worksheet as they are shown or insert your own numbers. A B C D E F Year Quarter B 101 B 202 B 204 1 2 3 2010 1Qtr 4 5 6 4 2010 2Qtr 4 3 7 5 2010 3Qtr 7 4 5 6 2010 4Qtr 5 4 8 7 2011 1Qtr 3 5 9 8 2011 2Qtr 3 2 3 9 2011 3Qtr 9 5 8 10 2011 4Qtr 7 3 6 11 2012 1Qtr 5 8 5 12 2012 2Qtr 2 6 3 13 2012 3Qtr 5 2 3 14 2012 4Qtr 5 3 5 15 2013 1Qtr 7 5 3 16 2013 2Qtr 5 2 7 17 2013 3Qtr 7 8 3 18 2013 4Qtr 3 7 7 19 Figure 7.43 Data to be input for the pivot table activity 208 9781380023322_text.indd 208 31/10/2019 11:19 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing 3 Select the cells B2:F18. Notice that this includes the column titles and all the data. 4 To create a pivot table, look for ‘Pivot Table’. Try: Insert > Pivot Table 5 Spreadsheet programs vary as regards how they create a pivot table. Experiment with your program. In the pivot table in Figure 7.44 we have summarised the data for Report Filter ‘Year’, showing Row Label ‘Quarter’ and using the data from ‘Buses’. Figure 7.44 Possible expected results for the pivot table example 6 Return to Sheet 1, the original data. 7 Select cells B2:F18 again. Notice that this includes the column titles and all the data. 8 To create a pivot chart, look for ‘Pivot Chart’. Try: Insert > Pivot Chart 9 Spreadsheet programs vary as regards how they create a pivot chart. Experiment with your program. In the pivot chart in Figure 7.45 we have summarised the data for Report Filter ‘Year’, Axis (Categories) ‘Quarter’ and using the data from ‘Buses’. Figure 7.45 Pivot chart 10 Save your file like you did before. You need to give the file a name: ‘your initials pivot’. For example: XXpivot. 11 Click the ‘X’ in the top-right corner of the window to close the program. 209 9781380023322_text.indd 209 31/10/2019 11:19 Theory Productivity Tools Spreadsheet programs include many analysis tools. For example, to create a frequency distribution, look for the FREQUENCY function. This function takes a column of values and summarises them into groups. Consider 1000 student marks in a test. The frequency distribution required might be 0–20, 21–40, 41–60, 61–80 and 81–100. Each mark is counted into the appropriate ‘bin’. Each of the 1000 marks has been distributed into one of five bins. This a good way to summarise large amounts of data. Performing charting operations Charts or graphs are a great way to display numeric data to make it meaningful to the viewer. Spreadsheet programs include powerful charting tools. Careful use of charts can summarise a set of complex data into an easy-to-understand picture. Good use of charts can reveal useful patterns and trends in the data. Selecting appropriate chart types: column chart, bar chart, line graph or pie chart Column and bar charts ▶ Line graphs ▶ Pie charts ▶ When using a graphical representation, select the type of chart or graph carefully. Column charts, bar charts, line graphs and pie charts are all easily created in a spreadsheet application, but consider carefully the best way to present the data. Always be ready to answer the question ‘Why did you use an XYZ chart to present that data?’ The three main types of chart are: Column and bar charts are used for comparing a series of values. For example, the distance covered by a bus in the four quarters of the year. Line graphs are used to compare changes over a period of time. For example, how the distance covered by buses varies with time. Pie charts are used to display the contribution of each part to the total. For example, how the distance covered in a year is made by the four quarters. To create a graph or chart, look for ‘Chart’ or ‘Graph’. Try: Insert > Chart ITQ 7.18 What type of chart is most suitable to show the contribution of many parts to a total? Figure 7.46 Inserting graphs and charts The following example shows how to display data as column (bar), line and pie charts. 210 9781380023322_text.indd 210 31/10/2019 11:20 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing Representing data in charts and graphs The garage at CTS is looking at the distance covered by each vehicle. Tables of data are not useful for this task. Graphs and charts will summarise the data in a user-friendly way. 1 Open your spreadsheet program. 2 Look at Figure 7.47 and type the values into your spreadsheet as they are shown or open the spreadsheet XXpivot from the previous activity and modify the data (if you do this, do a Save As ‘your initials charts’ before continuing). A B C D E F 2 Year Quarter B 101 B 202 B 204 3 2010 1Qtr 1,707 3,562 6,001 4 2010 2Qtr 3,035 3,944 13,732 5 2010 3Qtr 8,930 1,633 2,976 6 2010 4Qtr 4,674 4,528 352 7 2011 1Qtr 7,307 458 8,097 8 2011 2Qtr 3,318 101 3,802 9 2011 3Qtr 979 3,105 18,619 10 2011 4Qtr 7,000 1,511 5,444 11 2012 1Qtr 9,825 2,700 13,305 12 2012 2Qtr 2,001 4,322 8,440 13 2012 3Qtr 7,286 3,696 2,742 14 2012 4Qtr 262 3,705 13,764 15 2013 1Qtr 3,308 396 4,720 16 2013 2Qtr 2,287 4,796 8,925 17 2013 3Qtr 3,328 3,255 8,098 18 2013 4Qtr 2,864 2,876 8,865 G 1 19 Figure 7.47 Data to be input for the charting activity Column and bar charts are similar: column charts are vertical and bar charts are horizontal. 3 Select the cells B2:D6. Notice that this includes the column titles and the data. To insert a column chart, use ‘Chart Column’. Try: Insert > Chart > Column and follow the instructions. 4 Spreadsheet programs vary as regards how they create a chart. Experiment with your preferred program. Figure 7.48 A bar chart is created in the same way 211 9781380023322_text.indd 211 31/10/2019 11:20 Theory Productivity Tools 5 Now, drag and drop the graph away from the data. 6 For a line graph select the cell range B2:F18. 7 To insert a line graph, look for ‘Chart Line’. Try: Insert > Chart > Line Figure 7.49 Possible expected line chart for the charting activity; yours may be different From this graph you should easily be able to answer the questions: ‘Which bus is doing the most work?’ and ‘Which bus is doing the least work?’ Line graphs can be very powerful for decision makers. Finally, for a pie chart select the cell range B2:D6. 8 To insert a pie chart, look for ‘Chart Pie’. Try: Insert > Chart > Pie Figure 7.50 Possible expected column chart for the charting activity; yours may be different 9 Save your file like you did before. You need to give the file a name: ‘your initials charts’. For example: XXcharts. 10 Click the ‘X’ in the top-right corner of the window to close the program. Labelling charts: titles, axis labels and data labels Having created your chart or graph you can add more detail by inserting more information including: titles, axis labels and data labels. To add labels to a chart, look for ‘Chart Tools’ or the Chart toolbar. Click or double-click on the chart to display the Chart toolbar. 212 9781380023322_text.indd 212 31/10/2019 11:20 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing Figure 7.51 Charting tools in a spreadsheet program The next example shows you how to insert details to make it clear what your charts are showing. Improving charts and graphs by adding titles, axis labels and data labels You have been asked to include a bar chart of the kilometres travelled by Bus 101 during 2010. 1 Open your spreadsheet program. 2 Look at Figure 7.52 and type the values into your worksheet exactly as they are shown or open the spreadsheet XXcharts from the previous activity and modify the data (if you do this, do a Save As ‘your initials chartlabels’ before continuing). A B C D E F 2 Year Quarter B 101 B 202 B 204 3 2010 1Qtr 1,707 3,562 6,001 4 2010 2Qtr 3,035 3,944 13,732 5 2010 3Qtr 8,930 1,633 2,976 6 2010 4Qtr 4,674 4,528 352 7 2011 1Qtr 7,307 458 8,097 8 2011 2Qtr 3,318 101 3,802 9 2011 3Qtr 979 3,105 18,619 10 2011 4Qtr 7,000 1,511 5,444 11 2012 1Qtr 9,825 2,700 13,305 12 2012 2Qtr 2,001 4,322 8,440 13 2012 3Qtr 7,286 3,696 2,742 14 2012 4Qtr 262 3,705 13,764 15 2013 1Qtr 3,308 396 4,720 16 2013 2Qtr 2,287 4,796 8,925 17 2013 3Qtr 3,328 3,255 8,098 18 2013 4Qtr 2,864 2,876 8,865 G H 1 19 Figure 7.52 Data to be input for the adding details to a chart activity 3 Select the cells B2:D6. Notice that this includes the column titles and all the data. 213 9781380023322_text.indd 213 31/10/2019 11:20 Theory Productivity Tools 4 To insert a column chart, use ‘Chart Column’. Try: Insert > Chart > Column and follow the instructions. Figure 7.53 Possible expected column chart with data and column titles; yours may be different You will see that the spreadsheet has included a title for the chart. 5 You can change the text of the title by double-clicking on it and typing the new title. 6 For more control over the main title, look for ‘Title’. Try: Chart Tools > Layout > Chart Title 7 Adding titles to the axes is similar to changing the title; look for ‘Axis Title’. Try: Chart Tools > Layout > Axis Title 8 Add labels ‘Kms covered’ and ‘Quarter’ to your axes. Figure 7.54 Possible expected column chart with axis titles and chart title; yours may be different 9 Finally, to add data values to the columns look for ‘Data Labels’. Try: Chart Tools > Layout > Data Labels 214 9781380023322_text.indd 214 31/10/2019 11:20 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing Figure 7.55 Possible expected column chart with data point label; yours may be different 10 Save your file like you did before. You need to give the file a name: ‘your initials chartlabels’. For example: XXchartlabels. 11 Click the ‘X’ in the top-right corner of the window to close the program. ITQ 7.19 In addition to a chart title what information might be added to a chart? Manipulating one or more worksheets Earlier we introduced the idea that a workbook is made up of one or more worksheets. A worksheet is a single page of a workbook and is made up of a grid of cells, a table. In all our activities so far we have just used one worksheet in each workbook. We have just used the first page in each spreadsheet workbook. Using one or more worksheets Sometimes we have several tables that are related. For example, the data about each vehicle at Caribbean Travel Services is related. We would like to have one spreadsheet book to contain a worksheet page for each vehicle. Spreadsheet programs allow for multiple worksheets in a single spreadsheet workbook. 215 9781380023322_text.indd 215 31/10/2019 11:20 Theory Productivity Tools Using multiple worksheets in a spreadsheet You have been asked to create separate worksheets detailing each bus in Caribbean Travel Services’ fleet in a single spreadsheet. 1 Open your spreadsheet program. 2 Look at Figure 7.56 and type the values into your worksheet exactly as they are shown. A B C D 1 2 Bus 301 3 Colour Red 4 Number of seats 15 5 Seatbelts fitted Yes 6 Manufacturer Toyota 7 Model Hiace 8 Figure 7.56 Example data for the linking worksheets example; Sheet 1, Bus 301 Notice at the bottom of the page it says Sheet 1. This is the first worksheet in this workbook. 3 Double-click on this name and change it to ‘Bus 301’. 4 Now click on Sheet 2 or the ‘+’ symbol or ‘Insert Worksheet’ and type the values shown in Figure 7.57 into your worksheet exactly as they are shown. A B C D 1 2 Bus 403 3 Colour Blue 4 Number of seats 31 5 Seatbelts fitted Yes 6 Manufacturer Alexander Dennis 7 Model Enviro200 9.8M 8 Figure 7.57 Example data for the linking worksheets example; Sheet 2, Bus 403 Notice at the bottom of the page it says Sheet 2. 5 Double-click on this name and change it to ‘Bus 403’. These are very simple worksheets but you can make each worksheet as complex as you like. 6 Add a few more vehicles to your fleet. 7 Save your file like you did before. You need to give the file a name: ‘your initials vehicles’. For example: XXvehicles. 8 Click the ‘X’ in the top-right corner of the window to close the program. 216 9781380023322_text.indd 216 31/10/2019 11:20 •Mastering • •Computer 51• 1 7Computer Mastering word Fundamentals fundamentals spreadsheets processing Linking two or more worksheets to solve problems A problem that has arisen at Caribbean Travel Services is ‘What is the total seating capacity of the vehicle fleet?’ To get the answer we need to link cells in worksheets together. This is achieved using formulae; for example =‘Bus 301’!C4. This formula looks in the worksheet called ‘Bus 301’ for the value in cell C4. Our final example demonstrates how to link spreadsheets. Linking two or more worksheets to solve problems 1 Open your spreadsheet program. 2 Open the spreadsheet XXvehicles you created in the last activity or simply repeat the last activity without closing the spreadsheet. In our example the fleet has only two vehicles; your example may have more. 3 On the next free worksheet, ‘Sheet 3’ in our example, type the values and formulae into your worksheet exactly as they are shown in Figure 7.58. Figure 7.58 Data to be input for the linking worksheets example summary sheet Your summary worksheet can include all the vehicles in your fleet. Notice at the bottom of the page it says Sheet? 4 Double-click on this name and change it to ‘Fleet Summary’. 5 Save your file like you did before. You need to give the file a name: ‘your initials vehiclesummary’. For example: XXvehiclesummary. 6 Click the ‘X’ in the top-right corner of the window to close the program. That concludes our introduction to spreadsheets. There are lots more features to discover in spreadsheets but it’s time to move on. 217 9781380023322_text.indd 217 31/10/2019 11:20 1 • The computer Productivity Toolssystem Summary • A worksheet is a single working area in a spreadsheet • Spreadsheets are flexible and additional rows and columns program, consisting of a grid of lettered columns and numbered rows, whereas a workbook is a collection of related worksheets saved as one file. • Formulae can be written to allow a spreadsheet to do • A worksheet is a table consisting of cells (row/column • Data in a spreadsheet table may be sorted to arrange the locations) that hold accounting or financial data that simulates the traditional accountant’s ledger book and calculator. • A cell in worksheet can contain a label (text), a value (numbers) or a formula (calculation). • Most spreadsheets provide basic predefined systems functions such as SUM, AVERAGE, DATE, MAX, MIN, COUNT, IF and VLOOKUP. • Cells can be addressed in two ways: in relative addressing may be inserted. computations automatically. data in a predetermined order or the data may be filtered to show only the relevant records. • Spreadsheets use charts and graphs to illustrate the data in a user-friendly way. • Types of charts and graphs in a spreadsheet program include bar charts, column charts, line graphs and pie charts. • Data in several worksheets can be linked together. the cell addresses in a formula change when the formula is moved or copied, while in absolute addressing the cell addresses in a formula do not change when the formula is moved or copied. Answers to ITQs 7.1 Traditionally an accountant would use a ledger book, pencil and calculator to manage an organisation’s accounts. Spreadsheet programs have replaced these tools. 7.2 B28:D36 is an example of a cell range. A cell range includes all the cells in a rectangle with corners at cells B28 and D36. 7.3 In a spreadsheet program any cell that contains an ‘=’ as the first character is a formula; the ‘=’ indicates that this cell has to be calculated. 7.4 Clearing a cell removes the contents of the cell, but leaves the cell in place. Deleting a cell removes the cell completely, together with its contents. 7.5 To add up the values in a rectangle of cells given by cell range use the SUM function. 7.6 The AVERAGE function calculates the average of the values in a rectangle of cells given by cell range. 7.7 COUNT and COUNTA are similar predefined functions but COUNT counts the number of values (numbers) in a rectangle of cells given by cell range. COUNTA is more general and counts the number of non-blank cells in a rectangle of cells given by cell range including labels, values and formulae. 7.8 VLOOKUP is Vertical lookup so HLOOKUP is Horizontal lookup. 7.9 COUNTA is a predefined function that counts the number of non-blank cells in a rectangle of cells given by cell range including labels, values and formula. 7.10 The BODMAS rule defines the order in which mathematical operations should be performed: Brackets, Ordinates (powers), Division, Multiplication, Addition and Subtraction. 7.11 Relative addressing gets its name from the idea that cells in a formula can be addressed relative to each other. For example, multiply the contents of the cell one to the left by the contents of the cell two to the left. 7.12 When a formula is copied or moved, relative addresses are automatically changed to reflect the move and absolute addresses are not changed. 7.13 Often the contents of a cell are longer than the width of the cell. This means that not all the information is displayed. In these cases the column’s width may need increasing so all the data can be seen. 7.14 Currency formatting and accounting formatting are very similar. In currency format the currency symbol is placed next to the value. In accounting format the currency symbol is placed at the left of the cell. 7.15 In many cases data is more meaningful when sorted. For example, sorting vehicles on kilometres covered is useful in identifying vehicles that are ready for replacement. 218 9781380023322_text.indd 218 31/10/2019 11:20 1 • The computer system • The computer 7 •1Mastering spreadsheets system 7.16 Filtering can be used to reduce the amount of data being displayed. Filtering works by taking a criterion and applying it to selected data in a worksheet. Only rows that meet the criterion are displayed. For example, the criterion ‘<200,000’ applied to the Kms covered data filters in vehicles that have not yet covered 200,000kms. 7.17 Pivot tables can be used to summarise large amounts of data. 7.18 A pie chart is used to show the contribution of many parts to a total. 7.19 A chart can be enhanced by including: axis titles, data labels, legend, chart title, axis values and grid lines. Examination-style questions: Multiple Choice Instructions: Each item in this test has four suggested responses labelled (A), (B), (C) or (D). Read each question carefully then select the most suitable response. 1) Which of the following is NOT a purpose of a spreadsheet? A) to create simple tabulations such as invoices and price lists B) to hold accounting or financial data C) to perform advanced text processing D) to capture, manipulate and display numeric data 2) B5:D9 is best described as a: A) cell range B) row range C) column range D) cell reference 3) Which of the following functions should be selected to count the number of flower names in column A? A B 1 Chrysanthemum 350 2 Tulips 550 3 Lilies 275 4 Carnations 300 4) A) B) C) D) C COUNT COUNTA COUNTIF COUNTIFS I and II only II and III only I and III only I, II and III 5) Which of the following chart types is best for displaying the contribution of each part to the total? A) bar chart B) column chart C) line graph D) pie chart 6) A spreadsheet contains the formula =$A$9/B25 in cell C1. What will be the contents of cell D2 if the content of C1 is copied there? A) =$B$9/C25 B) =$A$9/B25 C) =$A$9/B26 D) =$A$9/C26 7) The text ‘Total Amount’ in a cell is best described as a ____________. A) value B) formula C) label D) function 5 A) B) C) D) Which of the following formulae would produce the result shown in cell D2? I = (A2+B2+C2)/3 II = AVERAGE(A2:C2) III = SUM(A1:C1)/3 219 9781380023322_text.indd 219 31/10/2019 11:20 1 • The computer Productivity Toolssystem 8) 9) A cell contains the formula ‘=SUM(A5:A10)+17’. Which of the following statements is UNTRUE? A) 17 is a constant. B) A5:A10 + 17 is a formula. C) SUM is the name of a function. D) The result will be the sum of the values in A5, A6, A7, A8, A9 and A10 plus the value 17. Which samples will be filtered for ‘>1.5’ applied to height AND ‘<2.0’ applied to weight? A B C 1 Sample# Height Weight 2 1 1.1 2.3 3 2 1.7 2 4 3 2.2 2.1 5 4 2.4 1.9 6 5 0.9 2.5 D A) B) C) D) 2 and 3 only 2 and 4 only 2, 3 and 4 only 4 only 10) Which of the following chart types represents data using a structure that is vertical in orientation? A) bar chart B) column chart C) line graph D) pie chart Examination-style questions: Structured 1) The spreadsheet shows the performance of 50 students from a particular high school in an external exam. A 1 B C D E F G H I V Number Passed Number Failed Percentage Pass J Summary of examination results for the Science department 2 3 4 PASS SUBJECTS I FAIL II III IV 5 Int. Science 24 12 8 4 2 44 6 88.00% 6 Chemistry 17 8 9 9 3 34 12 73.91% 7 Biology 16 5 20 3 2 41 5 89.13% 8 Physics 14 14 21 8 2 49 10 83.05% Average Pass Percentage 83.52% 9 10 a) State the number of columns that are illustrated in the spreadsheet. [1] b) State the type of data in: i) cell A5 ii) cell B5 iii) cell G5 [3] c) What spreadsheet feature has been used on row 1 in this worksheet? [1] d) Write the formula used to calculate the Number Passed in cell G5. [2] e) Write the formula used to calculate the Percentage Pass in cell I5. [2] f) What is the correct term for the formatting applied to cell H10? [1] g) State the function used in cell I10. [2] h) A chart has to be created for Integrated Science students to show the contribution of each grade to the total. Suggest the most suitable type of chart. Justify your answer. [3] i) Spreadsheets have two addressing modes: relative addressing and absolute addressing. Use examples to clearly explain how these addressing modes differ when a formula is copied from one cell to another. [10] Total 25 marks 220 9781380023322_text.indd 220 31/10/2019 11:20 8 By the end of this chapter you should be able to: Mastering databases A database system is a useful tool for manipulating records of data. Databases are widely used by large organisations and governments but are also available on personal computers. Commercial enterprises with large database systems such as banks and airlines use specialised database systems including: Oracle, MySQL, Microsoft SQL server, Postgres and IBM Db2. The most common database systems for personal computers are Microsoft Access and LibreOffice Base. Whether to manage the bank accounts of millions of customers or the records of a local sports club, a database system is fit for the task. In this chapter, we will help you to master databases and use their many features to design, create and update database tables. You will also need to know how to create queries, forms and reports. You will need to spend time practising these skills at the computer. Microsoft Access is used for all examples in this chapter. All database programs, including Microsoft Access and LibreOffice Base, have similar features and the explanations given in this chapter aim to give you the broader skills to master any database program. We would encourage you to experiment with and explore different database programs to widen your understanding of the concepts given in this chapter. ✔✔ Explain the concept of a database. ✔✔ Use terminology commonly associated with a database. ✔✔ Design and create a database. ✔✔ Create and populate tables in a database. ✔✔ Link tables using a primary key, foreign key combination. ✔✔ Manipulate data in a database. ✔✔ Use forms and sub-forms to input data to a database. ✔✔ Create queries on the data in a database. ✔✔ Create reports based on the data in a database. Mastering databases The concept of a database (DB) Database systems Purpose of DB systems 221 9781380023322_text.indd 221 Vocabulary Data types Manipulating data in a DB Creating a database Database terminology Table structure concepts Creating the table structure Modifying the table structure Creating DB tables Establishing primary keys Populating tables with data Linking tables with primary keys Creating and using forms Creating and using queries Creating and using reports 221 31/10/2019 11:20 • Computer Productivity 5 1• Mastering Tools word Fundamentals processing In this chapter you will learn how to use the required functions and features of a database mainly by working carefully through many worked examples, with data relating to Caribbean Travel Services. LibreOffice Base is a database program that is free to download, install and use from libreoffice.org. The concept of a database Large database systems are at the heart of many businesses. Banks use huge databases to store account transactions, airlines use them to manage bookings, and social media companies rely on them to store posts. On a much smaller scale a sports club might use a database system to manage membership records, team fixtures and results, and equipment inventory. Definition of a database system Database ▶ Think about how Caribbean Travel Services’ data was organised before the introduction of computers. In the office were three filing cabinets. The first held the employee records, the second held the vehicle records and a third held the journey records. This was a manual database system. A database is an organised set of records (data) held in tables that can be easily managed. This is how the CTS database was organised: If a new driver was recruited a new employee record would be created and inserted into the Employees filing cabinet. If a new vehicle was purchased a new vehicle record would be created and inserted into the Vehicles filing cabinet. After every journey a new journey record would be created and inserted into the Journeys filing cabinet. ITQ 8.1 Watch a video introduction to databases. Give two examples of when you might have seen a database in action. Now, the records in these filing cabinets are clearly related. A driver (an employee) takes a vehicle on a journey. Given time, you could find the phone number of the driver who drove the bus on Route 7 on March 13 this year. You would probably need to follow these steps: Look in the Journeys filing cabinet for the records from March 13. From these, find the record for Route 7. From this, find the driver’s Employee ID. Use this to search through the Employees filing cabinet to find the driver’s record. Look up their phone number in the record. Database systems are great for managing large numbers of records and answering questions. Our example shows that a database is a store of information where records are kept in tables that are related to each other. 222 9781380023322_text.indd 222 31/10/2019 11:20 1 • Computer 8 • Mastering Fundamentals databases ITQ 8.2 What is the relationship between a record and a database? When computers became available Caribbean Travel Services was able to replace the filing cabinets with a database, enabling them to answer queries such as the one above very quickly. Purposes of an electronic database system As we have seen, the main function of a database system is to manage records of data. With the introduction of computers came many more functions that were not practical in a paper-based system: • Databases can store millions of records. • Databases can be designed so that data is never duplicated. • Powerful and flexible sorting can be applied to the data very quickly. • Records can quickly be selected from the database based on given criteria. • Selected records can be viewed in different user-friendly ways. • Calculations can be performed automatically and the results presented. • Selected records can be presented in professional-looking reports. ITQ 8.3 What does RDBMS stand for? The most common type of database system is an electronic Relational Database Management System (RDBMS). As we will see in the following sections, the purpose of an RDBMS is to: input, modify, sort, query, report on, view and calculate from large numbers of records held in related tables. Terminology commonly associated with a database Some database vocabulary These are the key terms relating to databases that we need to understand: Term Definition Database Management System Manages the storing, retrieval and updating of records. Relational Database Management A type of database that stores records in a set of related System (RDBMS) tables with tools to efficiently manage those records. Figure 8.1 A red 15-seat Toyota bus Database table Used to contain numerous related records of stored data. Record Contains data about individual item or entity. Entity A thing, person or event that has characteristics for which we are interested in recording data. A bus is an example of an entity. It may have characteristics such as: colour, number of seats, seat belts fitted, manufacturer and model. Of course, a bus will have many more characteristics. A single record will hold the data, the characteristics, about a single bus. Field Part of a database record and contains a single piece of data. For example: colour ‘red’, number of seats ‘15’ or manufacturer ‘Toyota’. Table 8.1 Database terms and definitions 223 9781380023322_text.indd 223 31/10/2019 11:20 • Mastering 5 Theory 1 Productivity ComputerTools Fundamentals word processing To summarise: • A database management system manages a set of related databases tables. • Each database table contains many records. • Each record contains many fields. • Each field contains a data item about a particular entity. The Caribbean Travel Services database will contain three tables: • Employee records • Vehicle records • Journey records. Each Employee record contains: Each Vehicle record contains: Each Journey record contains: • Employee ID • Employee first name • Employee last name • Home telephone number • Salary rate • House number • Street name • Town • Journey ID • Employee ID • Vehicle ID • Route • Date • Fare • Number of passengers • Vehicle ID • Colour • Number of seats • Seatbelts fitted • Manufacturer • Model Figure 8.2 Table structure for CTS database ITQ 8.4 We will introduce other database terminology as we progress through this chapter. State what should be stored in a field. Data types in database tables A wide range of data types is available in an RDBMS. Some common types are: • Text: words, or more precisely, a sequence of alphanumeric characters. • Numeric: numbers can be integer (whole numbers) or real (decimal numbers). • Logical: true or false. Sometimes known as Boolean or Yes/No. • Currency: monetary values. • Date/Time: various formats for holding the date and time. In the Caribbean Travel Services database, the fields in the Employees table will have these data types: Field name Data type Employee ID Text Employee first name Text Employee last name Text Home telephone number Text Salary rate Currency House number Numeric Street name Text Town Text Figure 8.3 Employee data types for CTS database 224 9781380023322_text.indd 224 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases The fields in the Vehicles table will have these data types: Field name Data type Vehicle ID Text Colour Text Number of seats Numeric Seatbelts fitted Boolean (Yes/No) Manufacturer Text Model Text Street name Text Figure 8.4 Vehicle data types for CTS database The fields in the Journeys table will have these data types: Field name Data type Journey ID Text Employee ID Text Vehicle ID Text Route Numeric Date Date/Time Fare Currency/Decimal Number of passengers Numeric Figure 8.5 Journey data types for CTS database Creating a database ITQ 8.5 Currency and Date/Time are two data types in a database; give TWO other database data types. Before starting to design a database system you must try to understand what the database will be used for. A good starting point is to ask: ‘What are the questions that the database will be used to answer?’ Listing these questions will help you decide the tables you will need and the fields that make up the records in each table. Table structure in a database The database for Caribbean Travel Services allows you to answer questions about the data held. The first question was: Could you find the phone number of the driver who took the bus on Route 7 on March 13 this year? Here are some more: • Find me all the journeys that bus with ID ‘Bus 301’ took from March 1 to March 31. • Find me the number of passengers that used Route 4 from February 1 to February 28. • Create a report showing the total fares collected from passengers on ‘Bus 403’ in April. • Show me all the vehicles that have more than 20 seats and are fitted with seatbelts. 225 9781380023322_text.indd 225 31/10/2019 11:20 • Mastering 1 5 Theory Productivity ComputerTools Fundamentals word processing From these questions we can think about what tables we will need. There are questions about drivers, vehicles and journeys, so that is why we need the three tables: • Employees table • Vehicles table • Journeys table. The questions should also help to consider what fields are needed in each table: • There were questions about a driver’s phone number, bus ID, journey date, route number, seatbelts and number of seats. Can you tell which fields belong in which table? • Some special fields seem to belong in more than one table. A journey needs a vehicle—Vehicle ID, and a driver—Employee ID. These ‘special key fields’ join the tables together. Primary key ▶ Secondary key ▶ We now need to define some more terms: A primary key is a field whose values are unique so they can be used to identify a particular record. A secondary key is a field whose values are not unique so a particular value may identify several records. Figure 8.6 Primary key Composite key ▶ Candidate key ▶ For example, Employee ID is the primary key in the Employees table and Vehicle ID is the primary key in the Vehicles table. An employee’s first name is a secondary key as there may well be more than one employee with the same first name. It is possible to use a combination of fields to create a primary key. For example, a combination of the ‘First Name’ and ‘Last Name’ of an employee could be used to create a primary key. However, it is much easier to give each employee a unique ‘Employee ID’. A composite key is a combination of fields used to create a primary key. For example, the ‘First Name’ and ‘Last Name’ combine to create a composite key. A candidate key is a field that is considered a possibility for a primary field. For example, the ‘Employee ID’ field and the composite ‘First Name’ plus ‘Last Name’ key are both candidates for the primary key in the Employees table. However, it is much easier to simply create unique primary key information for each table. Earlier we saw that the Journeys table will have: • Journey ID • Employee ID • Vehicle ID • Route • Date • Fare • Number of passengers. 226 9781380023322_text.indd 226 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases ITQ 8.6 What is the difference between a primary key and a foreign key? Foreign key ▶ The ‘Employee ID’ belongs in the Employees table. It is a foreign key in the Journeys table, which allows a link to be made between the two tables Journeys and Employees. Likewise ‘Vehicle ID’ belongs in the Vehicles table. It is a foreign key in the Journeys table, which allows a link to be made between the two tables Journeys and Vehicles. The foreign key links to a primary key field in another database table. A foreign key appears in a table where it doesn’t really belong but allows two tables to be linked. Creating the table structure Let’s get started with some simple database examples: To open your preferred database program, look to see if there is an icon for a database program on the desktop. If not Try: Start button and look for: Microsoft Office > Microsoft Access Otherwise your teacher will tell you how to start the database program. To create a new table, look for ‘Create Table’ or ‘Create a Table in Design View’. Try: Create > Table You may need to turn on Design View; look for ‘Design View’. Try: Home tab > View > Design View Figure 8.7 Using Design View When in Design View, add fields to the table and select the appropriate data type from the drop-down menu. Figure 8.8 Creating tables and selecting Field/Data Types from a dropdown menu 227 9781380023322_text.indd 227 31/10/2019 11:20 Theory Productivity Tools Creating the tables in a database A good way to think about creating a database table is to list the fields and their data types before creating the table design. We have already done this for our Caribbean Travel Services example. Opening and creating a database table You have been tasked with setting the data Caribbean Travel Services holds about employees, vehicles and their journeys into a database. When a database program starts it requires you to either open an existing database or create a new database. 1 Select ‘Create’ to create a new database. 2 A database needs at least one table, so if the ‘Create table tools’ does not automatically open, look for ‘Create Table’. Try: Create > Table 3 As explained earlier, you may need to turn on Design View; look for ‘Design View’. Try: Home tab > View > Design View 4 The first table we need to create for the Caribbean Travel Services database is for the employees. Type in the names of each field and select the correct data type from the drop-down menu. We have shortened some of the names. Figure 8.9 Creating tables Each Employee record contains: Field name Data type Employee ID Text First name Text Last name Text Tel number Text Salary Currency/Decimal House number Numeric Street Text Town Text Figure 8.10 Employee data types for CTS database 228 9781380023322_text.indd 228 31/10/2019 11:20 • Computer 5 • 1Mastering 8 • Mastering word fundamentals processing databases 5 To save this table look for ‘Save this Object As’ or ‘Save As’. Save this table with the name ‘Employees’. Try: File > Save this Object As or File > Save As Figure 8.11 Save Object As NOTE: For steps 6, 7 and 8: if asked about a primary key choose ‘no’; we will come to primary keys later. 6 Create a new table for vehicles. Each Vehicle record contains: Field name Data type Vehicle ID Text Colour Text Num of seats Numeric Seatbelts Boolean (Yes/No) Manufacturer Text Model Text Figure 8.12 Vehicle data types for CTS database 7 Save this table with the name Vehicles. 8 Create a new table for journeys. Each Journey record contains: Field name Data type Journey ID Text Employee ID Text Vehicle ID Text Route Numeric Date Date/Time Fare Currency/Decimal Passengers Numeric Figure 8.13 Journey data types for CTS database 9 Save this table with the name Journeys. 10 When you have created the three tables you need to save the database file. To save your database file, look for ‘Save Database As’ or ‘Save As’. Try: File > Save Database As 229 9781380023322_text.indd 229 31/10/2019 11:20 Theory Productivity Tools Figure 8.14 Saving the database 11 Save your database file as ‘your initials CTS’, for Caribbean Travel Services; for example XXCTS. Database programs usually save as you work so there is no need to save your database when you close. The system will prompt you if you need to save. 12 Click the ‘X’ in the top-right corner of the window to close the program. Having created the tables in the database the next step is to input data to the tables. Figure 8.15 Entering data into a table Putting data into the database tables Inputting data to a table 1 Open your database program. 2 Open the database you created in the previous activity XXCTS. Try: File > Open 3 Select the Vehicles table. 4 You may need to switch from Design View to Datasheet View; look for ‘Datasheet View’. Try: Home > View > Datasheet View or double-click on the table to open. 5 Now you can simply type input data into the fields. In the Vehicles table we have already identified three Vehicle IDs: Bus 301, Bus 302 and Bus 403, so use the data for these three buses to get started. Bus 301 Colour: red Number of seats: 15 Seatbelts fitted: Yes Manufacturer: Toyota Model: Hiace Bus 302 Colour: green Number of seats: 12 Seatbelts fitted: Yes Manufacturer: Toyota Model: Hiace Bus 403 Colour: blue Number of seats: 31 Seatbelts fitted: Yes Manufacturer: Alexander Dennis Model: Enviro200 8.9M Figure 8.16 Data to be input into the Vehicles table 230 9781380023322_text.indd 230 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases 6 Click on the Vehicles table and enter the data in Datasheet View. Provide data for several more vehicle records in the Vehicles table. 7 Click on the Employees table and enter the data in Datasheet View. Input the employee data and from Figure 8.17 add some employees of your own. All employees need an Employee ID. At CTS they use a code with a letter indicating the role of the employee followed by a unique number. } For example, D 0001 is a driver, O 0003 is an office employee, C 0005 is a conductor and G 0008 is a garage employee. Employees Employee ID Firstname Lastname Tel number Salary House num Street Town D 0003 Earl Hussey 876-900-9433 $2,950.00 34 King Street Kingston C 0010 Sageena Murphy 876-903-6547 $2,750.00 3 North Avenue Kingston C 0014 Akeem Douglas 880-456-2943 $2,950.00 17 Itsy Road Mandeville D 0001 Arturu Hosein 874-979-2854 $3,450.00 27 Weaver Close Negril D 0002 Mike Venutra 880-842-8931 $3,450.00 164 Keats Crescent Georgetown D 0005 Lesline Ridout 886-385-3843 $3,450.00 54 Queen Street Chapeltown D 0008 Jasmine Castille 894-738-2847 $3,550.00 11 Elgin Road Maggotty D 0011 Kate Wilson 874-384-4858 $3,450.00 46 Monk Street Negril D 0012 Ula Upchurch 876-475-5746 $3,550.00 2 Burlington Crescent Kingston G 0006 Chad Courtois 876-584-2849 $2,800.00 18 Cassia Street Kingston O 0004 Cindi Clevenger 875-858-4221 $3,250.00 38 Brandon Road Ewarton Figure 8.17 Data to be input to the Employees table 8 Click on the Journeys table and enter the data shown in Figure 8.18 in Datasheet View. Provide data for several more journey records in the Journeys table. Journeys Journey ID Employee ID Vehicle ID Route Date Time Fare Passengers J 000001 D 0003 Bus 403 3 02/04/2019 9:30am $1.00 23 J 000002 D 0012 Bus 301 7 02/04/2019 9:45am $3.20 74 J 000003 D 0008 Bus 406 5 02/04/2019 10:00am $1.50 34 J 000004 D 0011 Bus 302 2 02/04/2019 10:30am $2.70 58 J 000005 D 0003 Bus 403 1 02/04/2019 12:30pm $2.20 43 J 000006 D 0012 Bus 301 8 02/04/2019 1:00pm $1.60 63 J 000007 D 0011 Bus 302 4 02/04/2019 1:15pm $2.00 14 J 000008 D 0008 Bus 406 6 02/04/2019 2:00pm $2.80 59 Figure 8.18 Data to be input to the Journeys table Remember: Database programs save as you work so there is no need to save your database when you close. The system will prompt you if you need to save. 9 Click the ‘X’ in the top-right corner of the window to close the program. 231 9781380023322_text.indd 231 31/10/2019 11:20 Theory Productivity Tools Creating your company project database Almost all companies will need to create a database to store their records. Your company and St Luago Fashion are no exception. ACTIVITY 8.1 Creating a database for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Create a database with three tables to manage the staff at your stores or other locations. For example, St Luago Fashion has three stores and five employees working shifts. Employee ID Firstname Lastname Payrate 001 Earl Hussey $12.50 002 Sageena Murphy $14.50 003 Akeem Douglas $11.50 004 Arturu Hosein $14.00 005 Mike Ventura $12.60 Figure 8.19 Example data to be input to the St Luago Fashion Employees table Shift ID Employee ID Store ID Week Day Hours Worked 0001 001 1 1 Mon 8 0002 003 1 1 Mon 6 0003 004 2 1 Mon 8 0004 005 3 1 Mon 8 0005 001 1 1 Tue 7 0006 003 2 1 Tue 8 0007 002 3 1 Tue 8 0008 001 1 1 Wed 7 0009 003 2 1 Wed 8 0010 004 2 1 Wed 6 0011 005 3 1 Wed 8 Figure 8.20 Example data to be input to the St Luago Fashion Shifts table Store ID Street Number Street Town S1 35 Main Street Kingston S2 4 King Street Georgetown S3 17 Monk Avenue Kingston Figure 8.21 Example data to be input to the St Luago Fashion Stores table 2 Save the tables and the database and close the program. 232 9781380023322_text.indd 232 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases Modifying the table structure ITQ 8.7 Watch a video about modifying a database table. Suggest a reason to add a validation rule to a field. We really hope that you carefully thought through the design of your table structure before you created the tables. If you did, there should be no reason to modify the structure of your tables. However, if you have made an error or omission this is the last chance to correct the structure of the database tables. If you leave changes any later there is a serious risk that things will go disastrously wrong with your database. You have been warned. To modify a table structure, select the table and turn on Design View; look for ‘Design View’ or ‘Edit’. Try: Table > Table Tools > Design View Now you can add new fields, delete fields and change field definitions. Make the required changes and use ‘Save Object as’ or ‘Save As’ to save the table. Establishing primary keys We introduced the idea of a primary key earlier. A primary key is a field whose values are unique so they can be used to identify a particular record in a table. A foreign key appears in a table where it doesn’t really belong but allows two tables to be linked. It should be clear that the primary keys for our tables are: Vehicles table Employees table Journeys table Vehicle ID Employee ID Journey ID It should also be clear that the fields Vehicle ID and Employee ID in the Journeys table are foreign keys, used to link tables together. To make a field a primary key, make sure that Design View is on, select the field and look for ‘Primary Key’. Try: Primary Key or right-click on the field and select ‘Primary Key’. Figure 8.22 Making a selected field a primary key ITQ 8.8 Why is a primary key needed in a database table? As you become more experienced at creating database tables you will be able to create the primary key at the time you create each database table. 233 9781380023322_text.indd 233 31/10/2019 11:20 • Mastering 5 Theory 1 Productivity ComputerTools Fundamentals word processing Creating primary keys You now need to choose a primary key for each of your tables. 1 Open your database program. 2 Open the database you created in the previous activity XXCTS. 3 To modify a table structure, select the table and turn on Design View; look for ‘Design View’ or ‘Edit’. Try: Table > Table Tools > Design View 4 To make a field a primary key, select the field and look for ‘Primary Key’. Try: Primary Key 5 6 7 8 9 or right-click on the field and select ‘Primary Key’. Make the Vehicle ID the primary key in the Vehicles table. Make the Employee ID the primary key in the Employees table. Make the Journey ID the primary key in the Journeys table. Save if prompted to do so. Click the ‘X’ in the top-right corner of the window to close the program. Now try to apply what you have learnt to your own company. ACTIVITY 8.2 Add primary keys to the tables in the database for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Add primary keys to the tables in your database. 2 Close the program. Linking tables using a primary key ITQ 8.9 What type of relationship must be avoided when designing a database? One-to-one relationship ▶ One-to-many relationship ▶ ITQ 8.10 State the TWO different types of relationship used in a relational database management system. We have seen that the primary key in one table can be used as a foreign key in another table to link the two tables. This allows the database system to automatically retrieve data from multiple tables to answer our queries. In our example, Vehicle ID and Employee ID are the primary keys in the Vehicles and Employees tables respectively. They are foreign keys in the Journeys table. Different types of link are possible: One-to-one relationship is when one record in the first table matches zero or one records in the second table. For example, one employee has one next of kin. One-to-many relationship is when one record in the first table may match many records in the second table. For example, one vehicle can go on many journeys. You might accidentally create a many-to-many relationship. This is when many records in the first table match many records in the second table. ‘Many-to-many’ relationships MUST be avoided if a database is to perform correctly. If you include a many-to-many relationship in your database it will not perform correctly. You will need to start again and redesign your table structures. To join two or more tables look for ‘Relationships’. Try: Database Tools > Relationships Add all three tables. To link the tables drag the Vehicle ID in the Vehicles table to the Vehicle ID in the Journeys table. 234 9781380023322_text.indd 234 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases Figure 8.23 Creating relationships between database tables Some database programs show the type of relationship, as in this example. Work through this activity to reinforce your understanding of this difficult idea. Establishing relationships between tables, joining tables 1 Open your database program. 2 Open the database you created in the previous activity XXCTS. 3 To join two or more tables, look for ‘Relationships’. Try: Database Tools > Relationships ITQ 8.11 Watch a video explaining relationships between database tables. Why are relationships between tables important in a database system? 4 Add all three tables. 5 To link the tables try dragging the Vehicle ID in the Vehicles table to the Vehicle ID in the Journeys table. Figure 8.24 Creating relationships between database tables 6 Save if prompted to do so. 7 Click the ‘X’ in the top-right corner of the window to close the program. Now try to apply what you have learnt to your own company. ACTIVITY 8.3 Create relationships between the tables in the database for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Create relationships between the tables in your database. 2 Close the program. 235 9781380023322_text.indd 235 31/10/2019 11:20 • Mastering 5 Theory 1 Productivity ComputerTools Fundamentals word processing Manipulating data in a database For a database to be useful, we need to be able to view the data in a user-friendly way. Forms and reports are a good way to do this. Often we don’t want to view all the data, but by creating queries we can select only the data that is of interest to us. Creating and using forms In a database system forms are used to make using the database user-friendly. As we have seen you can input data straight to a database table, but using a form makes the process of inputting data easier for the user. Forms can also be used to display the data in a database in a user-friendly way. A form is a user-friendly interface to a database system. Forms can be used for inputting data or simply viewing data in a user-friendly way. Simple forms are based on a single table but complex forms that are based on two tables are particularly useful when viewing large amounts of data. Database developers have complete control over the contents of a form and how it is laid out. In this section we limit ourselves to simple forms and sub-forms created using a Form Wizard. Form ▶ ITQ 8.12 Why do database designers include forms in their systems? Simple forms To create a form look for ‘Form Wizard’, Try: Create > Form Wizard Figure 8.25 Creating a simple form using a wizard Creating forms based on a single table At CTS the human resources department wants to view the information about its employees in an easy-to-use way. 1 2 3 4 Open your database program. Open the database you created in the previous activity XXCTS. Select the table Employees. To create a form based on this table look for ‘Form Wizard’. Try: Create > Form Wizard 236 9781380023322_text.indd 236 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases 5 Move all the fields onto the Selected Fields before continuing. Figure 8.26 Selecting fields for a form 6 Accept all other defaults until the wizard closes. 7 To view the form, make sure that you are in Form View; look for ‘Form View’. Try: Home tab > View > Form View Figure 8.27 Changing to Form View 8 To look through the records in order, use the Record tool at the bottom of the page. Figure 8.28 Stepping through records using a form on a single table 9 Save if prompted to do so. 10 Click the ‘X’ in the top-right corner of the window to close the program. 237 9781380023322_text.indd 237 31/10/2019 11:20 • Mastering 5 Theory 1 Productivity ComputerTools Fundamentals word processing Sub-forms Caribbean Travel Services wants to see all the journeys that each of its drivers has done. A sub-form achieves this: the main form contains the employee information and the sub-form contains the journeys this employee has been involved in. In most database programs the easiest way to create forms with sub-forms is by using the Form Wizard. Creating complex forms and sub-forms based on multiple tables 1 2 3 4 5 6 Open your database program. Open the database you created in the previous activity XXCTS. Select the table Employees. To create a form based on this table look for ‘Form Wizard’. Move all the fields onto Selected Fields as you did in the previous activity. Open the Journeys table and add all the fields to Selected Fields before continuing or moving on to the ‘Set up a sub-form’ step. Figure 8.29 Adding the Journeys table as a sub-form 7 Accept all other defaults until the wizard closes. 8 Make sure that you are in Form View; look for ‘Form View’. Figure 8.30 A form and sub-form showing the record for driver Jasmine Venutra from the Employees table and the journeys where Jasmine was the driver from the Journeys table as a sub-form 9 Save if prompted to do so. 10 Click the ‘X’ in the top-right corner of the window to close the program. 238 9781380023322_text.indd 238 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases Now try to apply what you have learnt to your own company. ACTIVITY 8.4 Create forms for the tables in the database for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Create forms for viewing and inputting data to the tables in your database. 2 Create a form and sub-form showing employees in the main form and the shifts they have worked in the sub-form. 3 Save the form and database and close the program. ITQ 8.13 When might a form and sub-form view be useful? Creating and using queries Queries are one of the most useful features of a database system. Queries answer the questions that users pose. During the design phase of the database CTS tried to anticipate all these questions. In the earlier Caribbean Travel Services example we identified the following questions: • Find all the journeys that bus with ID ‘Bus 301’ took from March 1 to March 31. • Find the number of passengers that used Route 4 from February 1 to February 28. • Create a report showing the total fares collected from passengers on ‘Bus 403’ in April. • Show all the vehicles that have more than 20 seats and are fitted with seatbelts. We will simplify these questions to demonstrate queries. For example, Caribbean Travel Services wants to see all the journeys Bus 301 has undertaken. To create a query, look for ‘Query’. Try: Create > Query Design Figure 8.31 Creating a query 239 9781380023322_text.indd 239 31/10/2019 11:20 • Mastering 5 Theory 1 Productivity ComputerTools Fundamentals word processing Add the table or tables and then the fields that you want to appear in the query by clicking in the next free field and choosing the field from the drop-down menu. Figure 8.32 Selecting Table and Field in a query In the Criteria row add your criteria. In this example we want to find the journeys made by Bus 301, the vehicle with Vehicle ID ‘Bus 301’. Figure 8.33 A query with criteria set to ‘Bus 301’ To run the query, look for ‘Run’ or the run symbol. Figure 8.34 The Run tool ITQ 8.14 What is a query? The results of the query will be displayed showing only the journeys made by Bus 301. Now we are going to carry out this query activity. Caribbean Travel Services wants to see all the journeys Bus 301 has undertaken. 240 9781380023322_text.indd 240 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases 5 • XXX Creating queries on a database You have been asked to find the journey data for Bus 301 so that the Customer Services team can determine the passenger ratio per route. 1 Open your database program. 2 Open the database you created in the previous activity XXCTS. 3 To create a query on a table, look for ‘Query’. Try: Create > Query Design Figure 8.35 Creating a query 4 Add the table or tables and close the tables dialog. Then add the fields that you want to appear in the query by clicking in the next free field. Figure 8.36 Selecting fields from a drop-down menu for inclusion in a query 5 In the Criteria row add your criteria. You will want to find the journeys made by Bus 301, the vehicle with Vehicle ID ‘Bus 301’. Figure 8.37 A query with criteria set to ‘Bus 301’ 241 9781380023322_text.indd 241 31/10/2019 11:20 • Mastering 5 Theory 1 Productivity ComputerTools Fundamentals word processing 6 To save this query, look for ‘Save Object as’ or ‘Save As’. Try: File > Save Object As Give the query the meaningful name ‘Bus 301 journeys’. 7 To run the query look for ‘Run’ or the run symbol. Figure 8.38 The Run tool The results of the query will be displayed. 8 Save if prompted to do so. 9 Click the ‘X’ in the top-right corner of the window to close the program. Creating a query on more than one table Because all the tables in our database are related, creating a query on more than one table is easy, as shown in the previous activity. Simply add more tables and more fields to the query during the query design phase. For example, find the names of the drivers at Caribbean Travel Services who have driven ‘Bus 403’ on Route 3. This involves the Journeys and Employees tables. Figure 8.39 The result of a query to find the drivers of Bus 403 on Route 3 Calculated field ▶ To expand this example a little further, having identified the drivers we would like to see how much should be in their cash tills. This needs a calculated field. A calculated field is a field that derives its value by performing a function on values from other table fields. 242 9781380023322_text.indd 242 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases Calculated fields are easy to add to a query: just type the formula in a free field during the query design. Figure 8.40 Creating a calculated field The way you specify calculated fields in different database programs can vary. Try: Cash in Till:[Passengers] * [Fare] If you make a mistake in the calculated field most database programs will try to automatically correct the calculation for you. The result of the query showing the calculated field is shown in Figure 8.41. ITQ 8.15 Suggest ONE reason for including a calculated field in a query. Figure 8.41 The calculated field Creating queries on multiple tables in a database 1 2 3 4 Open your database program. Open the database you created in the previous activity XXCTS. Start to create a query as you did in the previous activity. Add the Journeys table and the Employees table before closing the tables dialog. Then add the fields that you want to appear in the query: First name, Last name from the Employees table and Vehicle ID, Fare and Passengers from the Journeys table. 243 9781380023322_text.indd 243 31/10/2019 11:20 • Mastering 5 Theory 1 Productivity ComputerTools Fundamentals word processing 5 In the next free field create a calculated field for the total in the till. In Microsoft Access: Try: Cash in Till: [Passengers]* [Fare] Figure 8.42 Creating a calculated field 6 In the Criteria row add your criteria. In this example we want to find the journeys made by Bus 403, the vehicle with Vehicle ID ‘Bus 403’, on Route 3. Figure 8.43 Creating the criteria Vehicle ID is ‘Bus 403’ and Route is ‘3’ 7 Use ‘Save Object As’ or ‘Save As’ to save this query, giving it the meaningful name ‘Cash in Till 403’. 8 Run the query using the Run button. 9 The results of the query will be displayed. 10 Click the ‘X’ in the top-right corner of the window to close the program. 244 9781380023322_text.indd 244 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases Now try to apply what you have learnt to your own company. ACTIVITY 8.5 Creating queries for the tables in the database for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Create queries to question the data in the tables in your database. 2 Create a query with a calculated field to show employees’ names, hours worked, hourly rate and the calculated pay. 3 Close the program. Creating and using reports The results of querying a database sometimes need to be printed out in a professional-looking document. This might be so that it can be presented to the Board of Governors or included in an annual report. The Board of Caribbean Travel Services often want to review a summary of the database information. The reporting tools include many features and can be used to include grouping, sorting and totals in a report. Grouping allows records with the same value in a selected field to be displayed together. For example, we might group journeys by Vehicle ID or by the driver’s last name. Sorting allows the records to be displayed in order, either ascending or descending. The easiest way to start with the reporting tools is to use the Report Wizard. As with forms, database developers have complete control over the contents of a report and how it is laid out. In this section we limit ourselves to simple reports using a Report Wizard. To create a report look for ‘Report Wizard’.Try: Create > Report Wizard and follow the instructions. Figure 8.44 Creating a report using the Report Wizard The wizard leads you through the following steps: • Add the tables or queries, and then the fields that you want to appear in the report. In this example add the: Vehicle ID, Route and Passengers from the Journeys table and First name and Last name from the Employees table. • Select any grouping that you want to be applied to the report. In this example, group by Vehicle ID. • Select any sorting and any summary options that you want to be applied to the report. In this example, sort by Route. • When the wizard finishes, the report is displayed. 245 9781380023322_text.indd 245 31/10/2019 11:20 • Mastering 5 Theory 1 Productivity ComputerTools Fundamentals word processing Figure 8.45 Section of a report grouped by Vehicle ID, sorted by Route and including the total number of passengers that use each route ITQ 8.16 What is the main reason for creating a report from data held in a database? In some database systems, like LibreOffice Base, you create a query containing the fields needed for the report and then use the Report Wizard to create the report based on the query. Creating a report from multiple tables in a database The Human Resources team have asked you to pull a report to see which buses and routes the drivers are working. 1 Open your database program. 2 Open the database you created in the previous activity XXCTS. 3 To create a report look for ‘Report Wizard’ or ‘Use Wizard to Create Report’. Try: Create > Report Wizard and follow the instructions. Figure 8.46 Creating a report using the report Wizard 4 Add the tables or queries, and then the fields that you want to appear in the report. Add the: Vehicle ID, Route and Passengers from the Journeys table and First name and Last name from the Employees table. 5 The wizard leads you through the following. 246 9781380023322_text.indd 246 31/10/2019 11:20 •Mastering • Computer 51• 1 Computer 8 • Mastering word Fundamentals fundamentals processing databases Figure 8.47 Stages in the wizard 6 Select any grouping that you want to be applied to the report. Group by Vehicle ID. Figure 8.48 Selecting any grouping in the report, group by Vehicle ID, using the Report Wizard 7 Select any sorting and summary options that you want to be applied to the report. Sort by Route. Figure 8.49 Selecting any sorting required in the Report, sorted by Route, using the Report Wizard 8 When the wizard finishes, the report is displayed. 9 Use ‘Save Object As’ or ‘Save As’ to save this report, giving it the meaningful name ‘Bus and Driver’. The results of the query will be displayed. 10 Click the ‘X’ in the top-right corner of the window to close the program. 247 9781380023322_text.indd 247 31/10/2019 11:21 • Mastering 5 1 Theory Productivity ComputerTools Fundamentals word processing Now try to apply what you have learnt to your own company. ACTIVITY 8.15 Create a report for your company Use the company you created in earlier activities or use St Luago Fashion. 1 Create reports on different aspects of the data in your database. 2 Reports should include grouped and sorted data. 3 Close the program. That concludes our introduction to databases. There are lots more features to discover in databases but it’s time to move on. Summary • A database is a collection of records stored in a set of related tables. • A record contains data stored in individual fields. • Data stored in a field can be: text, numeric, logical, date/ time, currency. • Every table needs a primary key that uniquely identifies individual records in the table. • Forms can be created to view or enter data into a database table in a user-friendly way. • Forms can be main form/sub-form combinations. • Queries select data from a database depending on the given criteria. • Reports allow you to group, sort and summarise data and present it in a professional-looking document. • A foreign key is a field that doesn’t really belong in a table but is included so that tables can be joined or related. Answers to ITQs 8.1 Databases are everywhere. Uses include your patient records at the doctor’s surgery or looking up stock items in a store. 8.4 A field in a database table is used to store a single attribute or characteristic about a person, thing or event – an entity. 8.2 A database file can contain many tables, a table can contain many records and a record can contain many fields. 8.5 Modern database systems allow a range of data types. The most common are: Text: words, Numeric: numbers, Logical: true or false, Currency: monetary values, and Date/Time. 8.3 RDBMS stands for Relational DataBase Management System. ‘Relational’ is used because tables in the database are related or joined using primary key/ foreign key pairs. 8.6 A primary key belongs in a table and can be used to uniquely identify any particular record in the table. A foreign key appears in a table where it doesn’t really belong; it is added so that two tables can be joined or related. 248 9781380023322_text.indd 248 31/10/2019 11:21 8 • Mastering databases 8.7 Validation can be added to a field to check the range of a numeric input or to select an allowable input from a list. 8.8 A primary key is needed in a database table to uniquely identify any particular record in the table. 8.9 Many-to-many relationships should be eliminated as you develop your database tables. 8.10 The three types of relationship are one-to-one, oneto-many and many-to-many but only two should be present in a database as many-to-many relationships should be eliminated as you develop your database tables. 8.11 Relationships join tables together allowing data in one table to be joined with data in another table. 8.14 A query is a question that the database system can answer. The essential part of a query is the criteria, such as ‘Passengers greater than 40’. The result is either true, in which case the record is selected for inclusion, or false, in which case the record is not included. 8.15 Calculated fields can be included in a query to perform simple calculations based on numeric values contained in other fields. They eliminate the need to enter this data directly and are automatically updated if the data they refer to changes. 8.16 Reports are created from data held in a database when a professional-looking document is required. Grouping, sorting and summary options all help in producing meaningful, professional reports. 8.12 In a database system forms are a user-friendly way to view and enter data. 8.13 Main form/sub-form combinations are particularly useful when viewing a large amount of data in tables that are related in a one-to-many relationship. Examination-style questions: Multiple Choice 1) Which statement best describes a database? A) a collection of tables B) tables that are in sequence C) tables of related information D) a collection of related tables 2) Possibility High School maintains a database containing tables related to its students and the subjects offered. Which of the following represents a table within the database? A) a student’s name B) a student’s record C) all the personal data on students D) the age of a student 3) Which is NOT a database data type? A) numeric B) currency C) text D) key 4) Which one of the following is NOT a type of database relationship? A) many-to-many B) one-to-some C) one-to-many D) one-to-one 5) Which of the following statements about database forms is TRUE? A) Forms can only be created on a single table. B) A sub-form always needs a main form. C) Forms must be used to enter data into a table. D) When creating a form it has to be either a main form or a sub-form. 6) Databases and spreadsheets can both be used to store data. Which of the following is NOT true? A) Spreadsheet and database are different names for the same program. B) Databases can contain many related tables and worksheets in a spreadsheet can be linked. C) Database tables and spreadsheet worksheets can both hold records of data. D) Both spreadsheets and databases can perform calculations. 249 9781380023322_text.indd 249 31/10/2019 11:21 5 1 • Mastering Productivity ComputerTools Fundamentals word processing The following database table should be used to answer Questions 7–10. Employee ID Firstname Lastname How many different field types are used to store the data? A) 3 B) 4 C) 5 D) 6 Payrate 001 Earl Hussey $12.50 002 Sageena Murphy $14.50 003 Akeem Douglas $11.50 004 Arturu Hosein $14.00 005 Mike Ventura $12.60 7) How many records are displayed in the table? A) 3 B) 4 C) 5 D) 6 8) 9) 10) Consider the following statements and state which are TRUE: I The Payrate field type is Currency II Data in text fields is left aligned III The Payrate field type is Numeric IV The Employee ID field type is Boolean A) B) C) D) How many fields are in the table? A) 3 B) 4 C) 5 D) 6 I and II II and IV II and III I and IV Examination-style questions: Structured 1) The trade promotion agency in St Luago uses a database named INVESTMENTS to store data related to applications for licences to operate in the country. The database contains two tables: COUNTRY and APPLICATIONS. Ccode Cname BB Barbados TT Trinidad and Tobago SV St Vincent and the Grenadines SL St Lucia Table 1 COUNTRY AppID Ccode ProjectType InvestmentAmt Duration ForeignStaff A100 TT Agriculture $10,000,000 16 No B200 BB Mining $4,000,000 4 Yes C325 SV Retail $1,500,000 8 No D450 SL Financial $8,000,000 12 No E503 BB Retail $12,000,000 15 Yes F645 SV Mining $9,500,000 10 No Table 2 APPLICATIONS 250 9781380023322_text.indd 250 31/10/2019 11:21 8 • Mastering databases a) Copy and complete the following table to state the data types of the fields indicated: Fieldname [4] Data type AppID InvestmentAmt Duration ForeignStaff b) Name the primary key for the COUNTRY table. [1] c) Name the field that would be used to join the two tables. [1] d) State the technical term for the field referred to in part (c). [1] e) Write or draw queries to: i) List all project types with investment amounts greater than two million dollars. ii) List the country that submitted the application that requires foreign staff. iii) Create a calculated field to store an ApplicationFee which is 0.5% of the InvestmentAmt. iv) List the following fields: Cname, ProjectType and InvestmentAmt. f) g) [2] [2] [2] [2] Grouping is a useful feature when creating a report. Explain what grouping means and state the TWO fields that might be used for grouping when creating a report on the APPLICATIONS table. What feature in a DBMS would you use to allow users to view an AppID, CCode and all the relevant applications? [4] [1] Total 20 marks 251 9781380023322_text.indd 251 31/10/2019 11:21 9 Problem-solving and program design We have already been using programs and we know that there is a wide range of application programs available. However, sometimes we just cannot find an application program that can solve a particular problem. In this situation we need to write our own program. Before any programming can take place the problem has to be analysed so it is fully understood. Potential solutions can then be considered and the design of a program established. The design has to be clearly represented as a pseudocode algorithm or flowchart before it can be passed to a programmer for implementation. In this chapter we will consider aspects of problem-solving and program design to give you the skills and techniques you will need to develop successful programs. By the end of this chapter you should be able to: ✔✔ Outline the steps in problem-solving. ✔✔ Use a divide-and-conquer approach to decompose large everyday problems into smaller tasks. ✔✔ Define a problem by decomposing it into significant components. ✔✔ Distinguish between variables and constants. ✔✔ Explain the concept of algorithms. ✔✔ Represent algorithms in the form of pseudocode and flowcharts. ✔✔ Test algorithms for correctness. Problem-solving & program design Problemsolving using steps The divide & conquer approach Dividing into sub-problems Decomposing a problem Variables & constants Algorithms IPO charts Data types Definitions & characteristics Decisions Pseudocode & flowcharts Testing algorithms Relational operators Local operators Arithmetic operators 252 9781380023322_text.indd 252 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design Outline steps in problem-solving Problem ▶ Organisations and individuals face many problems. Information Technology can’t help you if you fall out with your best friend but for some problems IT can provide an effective solution. In this chapter we look at techniques to help you look at problems and decide if the use of Information Technology can provide a solution. Information Technology is primarily concerned with taking input data, processing that data and outputting useful information. A problem is a discrepancy (or difference) between the data we have and the information we require. Problems can range from simple to complex. A simple problem usually involves only a few instructions to process the input data into the required output information; for example, computing the tax payable on a single item. More complex problems may take thousands or millions of instructions to process the input data into the required output information. For example, weather forecasting takes thousands of weather readings and processes them into a weather forecast. Figure 9.1 Thousands of weather readings (from 1851 in the Atlantic and 1949 in the Pacific) are processed into cyclone tracks allowing the track of future cyclones to be predicted ITQ 9.1 Watch a video about the concept of an algorithm. What is an algorithm? ITQ 9.2 List THREE simple mathematics problems that you have solved recently. Solution ▶ Problem-solving ▶ Algorithm ▶ Simple problems More complex problems Finding the average of a set of numbers Calculating tax payable on a single item Computing the area of a rectangle Determining the larger of two numbers Generating a list of prime numbers Performing a sort (for example, sorting numbers into ascending order) Determining the orbit of a satellite Calculating the tax return for a company Table 9.1 Simple and complex problems Here are some key terms in problems solving. As we go through this chapter we will explain these terms using practical examples. A solution is a set of instructions that, if followed in order, will produce the required information. Problem-solving is the process of creating a set of instructions that, when executed, accepts input data and produces meaningful information. An algorithm is a sequence of instructions which rigorously defines a solution to a problem. Put more simply, an algorithm is a set of instructions, written in everyday English, that solves a problem. 253 9781380023322_text.indd 253 31/10/2019 11:21 Programming Theory Pseudocode ▶ Flowchart ▶ Pseudocode is a language consisting of English-like statements used to define an algorithm. Pseudocode is a formal way of writing an algorithm using structured English text, numbers and special characters. A flowchart is a pictorial way of representing an algorithm using a set of standard symbols (shapes). When faced with a problem take time to clearly specify the problem ITQ 9.3 Sequence the following list of terms as they appear naturally in the problem-solving process: • test • define problem • propose solutions • create pseudocode or flowchart • choose best solution • develop algorithm. Think about the ways you might solve the problem Implement the solution to create valuable information Figure 9.2 Problem-solving defines how to turn the input data into meaningful, valuable information A typical problem-solving process involves six steps: 1 Define the problem. 2 Propose and evaluate solutions. 3 Determine the best solution. 4 Develop the algorithm. 5 Represent the algorithm as pseudocode or a flowchart. 6 Test and validate the solution. Note: the syllabus requires you to ‘determine the most efficient’ solution. An efficient solution may not be user-friendly and may not include any validation checks. For this reason we use ‘choose the best solution’. Step Outline of activities Define the problem Aim is to understand the problem. Start with a clear description of the problem in narrative form. An Input-Process-Output (I-P-O) chart is used to break the problem down into three main component parts. Propose and evaluate solutions Consider alternative solutions to the problem. Evaluate each proposed solution. Determine the best solution Based on the evaluation of the solutions from the previous step, determine which one is best. Develop the algorithm Formulate the solution into a set of instructions expressed in natural, everyday language. Represent the algorithm as pseudocode or a flowchart Represent the solution as formal pseudocode or a flowchart. Test and validate the solution Test the pseudocode/flowchart for correctness using a trace table. If the algorithm produces correct results for a set of carefully selected test data then the design is deemed valid and program implementation may begin. Table 9.2 The problem-solving process The first step in solving a problem is to write a clear problem definition and the first step in writing a clear problem definition is to understand the problem. To gain a good understanding of the problem we might: interview persons, observe the situation in which the problem occurs, look at any existing paperwork or manual system and consider the objectives to be achieved. We need to know what the inputs will be and what outputs are required. Only when you fully understand the 254 9781380023322_text.indd 254 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design problem can you write the problem definition. The problem definition should be agreed by all the parties involved. Once we have a clear problem definition we can think about solving the problem. Using divide-and-conquer approach to decompose large everyday problems into smaller tasks Divide-and-conquer approach ▶ Some problems may be easy to solve. Others may appear difficult at first, but the divide-and-conquer approach provides a structured method for solving complex problems. For a simple problem it may be immediately apparent how the input data is to be processed into the required information. For example: Finding the average of a set of numbers. You are probably thinking: 1 Read the numbers 2 Add them together 3 Count the number of numbers 4 Calculate the average = sum of the numbers / number of numbers 5 Write out the average. Unfortunately not all problems are that simple. In the case of more complex problems, using the divide-and-conquer approach may help you break down the problem into manageable parts. The divide-and-conquer approach is to repeatedly split a large problem into a number of smaller sub-problems until a complete solution is identified. You use the divide-and-conquer approach in your everyday life. To fry an egg you need to: 1 Put your frying pan on a medium-to-low heat. 2 Add sufficient cooking oil to coat the bottom of the pan. 3 Crack the egg into the pan. 4 When the egg is cooked to your liking, remove the pan from the heat. 5 Transfer the egg onto a plate using a spatula. 6 Enjoy your fried egg. How to divide the problem into sub-problems Think of your own bicycle. How would you build a bicycle? What parts would you need from the supplier? Building a bicycle is an example of a more complex problem. We can use the divide-and-conquer approach to solve this problem. These steps show you how to divide the problem into simpler, more manageable, sub-problems: 1 Get a frame 2 Build the wheels and tyres 3 Make the brakes and cables 4 Make the chain and cogs 5 Get the handlebars 6 Assemble the complete bicycle. 255 9781380023322_text.indd 255 31/10/2019 11:21 Programming Theory Figure 9.3 Dividing the problem into simpler sub-problems full bicycle handlebar gears seat forks frame pedals wheels brakes chain brake cables rim hub spokes tyre valve Now we have divided the problem into sub-problems, we can deal with each subproblem in turn. For example: Getting the frame is easy: order from a supplier. Building the wheels and tyres still needs a little more work so divide the problem into simpler sub problems: 1 Get two hubs: order from supplier 2 Get spokes: order from supplier 3 Get rim: order from supplier 4 Get tyres: order from supplier 5 Assemble hub, spokes and rim 6 Fit tyres to the wheels. Continue to break down the sub-problems until you reach only simple actions, e.g. order from supplier or assemble parts. We conquer the problem of building a bicycle by dividing it into smaller, simpler problems and solving each of these simple problems. We can apply these ideas to solve Information Technology problems. For example: Calculate the tax payable when a company, such as Caribbean Travel Services, buys and subsequently sells an item for a profit. 256 9781380023322_text.indd 256 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design Divide the problem into simpler sub-problems: 1 Input purchase price, sales price and tax rate. 2 Calculate the tax due. 3 Output the tax due. ITQ 9.4 What is the divide-and-conquer approach to problem-solving? Having divided the problem into sub-problems we can deal with each sub-problem in turn: 1 Input purchase price, sales price and tax rate. a Write ‘Please give the purchase price.’ b Get the purchase price. c Write ‘Please give the sales price.’ d Get the sales price. e Write ‘Please give the tax rate.’ f Get the tax rate. 2 Calculate the tax due. a profit = sales price – purchase price b tax due = profit * tax rate 3 Output the tax due. a Write ‘The tax due is’ b Write tax due. Defining a problem by decomposing it into its significant components Decompose ▶ Another way to think of divide-and-conquer is as decomposing large problems into smaller problems that can easily be solved. To decompose is to break down into a combination of simpler components. We decompose the complex problem into a number of simpler sub-problems step by step, breaking down each of these sub-problems into even simpler subproblems. Using this step-by-step decomposition method, the number of problems to be solved will increase but each problem becomes easier to solve. Eventually all the sub-problems become simple problems that we know how to solve with a single action or instruction. Creating an IPO chart A good place to start when developing a computer program is to break the problem down into these three parts: 1 Get the inputs 2 Perform the processing 3 Display the output. An Input-Process-Output (IPO) chart is a helpful diagrammatical way to start. Simply start with the following outline table. Input identify all inputs here Processing Output identify all the outputs here identify the processing that needs to take place to convert the input data into the output information Table 9.3 An outline IPO chart 257 9781380023322_text.indd 257 31/10/2019 11:21 Programming Theory ITQ 9.5 What are the three column headings in an IPO chart? Earlier we defined a problem as a discrepancy between the data we have and the information we require. When investigating the problem in order to write the problem definition, we identified the input data; this will be the input to the program. The required information is the output from the program. A good understanding of the problem and a clearly written problem definition will allow you to identify all the inputs and outputs. Here is a simple example. A simple definition of the problem is: At Caribbean Travel Services a bus operates the same route twice a day. The number of passengers on each journey is recorded. Create a program to get the two passenger numbers from the driver, add them together and display the total result. The IPO chart is: Input first number second number Processing Output total = first number + second total number Table 9.4 An IPO chart for the Simple Add algorithm In this IPO chart we have introduced the idea of a variable. You should already be familiar with the idea of variables from mathematics. A variable is simply a container. In this simple example we have used three variables: (i) first number, (ii) second number and (iii) total. If you were asked to solve this problem manually you might start with a pen and paper and draw: first number (a) second number (b) total (c) You are now waiting for your teacher to give you the first number (the first input), which you will write into the container, the variable (a). You will write the second number (the second input) into variable (b) and, when you have performed the calculation, you will write the answer into variable (c). Now we are ready to output the required information when your teacher asks you for the answer. We cover variables in more detail in a later section. Developing an addition algorithm from the IPO chart The natural, everyday language algorithm developed from the IPO chart is: • write ‘Please give the number of passengers on the first journey’ • read the first number • write ‘Please give the number of passengers on the second journey’ • read the second number • calculate the total = first number + second number • write ‘The total number of passengers on the route today was’ • write the total. A more complex example involves another fictional company, Caribbean Cellular. 258 9781380023322_text.indd 258 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design Caribbean Cellular is a St Vincent-based mobile phone provider with operations in Barbados, Guyana, Jamaica, Trinidad and Tobago and most of the Eastern Caribbean. It has a special introductory offer in which customers get 20% more credit with every top-up over $100, 30% more credit with every top-up over $200 and 40% with every top-up over $500. Thinking about the problem, the complete IPO chart would be: Input phone number credit amount Processing Compute the bonus Add the bonus to the credit Output phone number total credit Table 9.5 IPO chart for introductory offer First step, divide the problem into: 1 Get inputs 2 Perform processing 3 Write outputs. Second step, divide each sub-problem: 1 Get inputs a Get phone number b Get credit amount. 2 Perform processing a Compute bonus i if amount is more than $100 but less than $200, bonus = credit amount * 0.2 ii if amount is more than $200 but less than $500, bonus = credit amount * 0.3 iii if amount is more than $500, bonus = credit amount * 0.4 b Add bonus to credit amount: credit amount = credit amount + bonus. 3 Write outputs a Write phone number b Write total credit. Our complete solution is: 1 Get phone number 2 Get credit amount 3 If amount is more than $100 but less than $200, bonus = credit amount * 0.2 4 If amount is more than $200 but less than $500, bonus = credit amount * 0.3 5 If amount is more than $500, bonus = credit amount * 0.4 6 Add bonus to credit amount: credit amount = credit amount + bonus 7 Write phone number 8 Write total credit. The above steps need no further refinement as they each represent a single instruction that we know how to perform. We have broken the problem down into simple instructions. We can implement the simple instructions directly. Create an IPO chart and write an algorithm Look at the following problem: Caribbean Travel Services records the number of passengers on its buses. Bus 301 has three journeys in a day. Create an IPO chart and algorithm to get three numbers from the user, add them together and display the result. 1 Create an IPO chart for this problem. 2 Write an algorithm to solve this problem. CTS also wants to calculate the average number of passengers for the three journeys of Bus 301. 3 Re-use your ideas to create a new IPO chart and write an algorithm to find the average of three numbers input by the drivers. 259 9781380023322_text.indd 259 31/10/2019 11:21 Programming Theory ACTIVITY 9.1 Decompose a ‘number of tiles needed’ problem 1 2 ITQ 9.6 What does IPO stand for? A wall is measured by its height and width in metres. How many 1 m2 tiles will be needed to cover the whole wall? Draw an IPO chart and write an algorithm to solve this problem. The problems that we have looked at so far have been simple problems that are solved by executing a set of instructions in sequence. In a sequence, instructions are executed one after the other. We represent this structure as a set of statements, written one after the other. Develop an ‘Average’ algorithm from the IPO chart: Loops At CTS Bus 403 covers a short route 25 times a day. CTS wants to know the average number of passengers on these journeys. Create a program to read 25 passenger numbers, calculate the average and display the result. We need ways of saying ‘do this a fixed number of times’. This is called looping; the technical term is ‘iteration’. When designing a solution to the problem of finding the average of 25 numbers we might be thinking of this IPO chart: Input The 25 numbers; these are the number of passengers on each of the 25 bus journeys Processing total = 0 loop 25 times input the next number total = total + number end loop average = total/25 output average Output average Table 9.6 An IPO chart for the Average algorithm Figure 9.4 Looping a fixed number of times 260 9781380023322_text.indd 260 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design The natural, everyday language algorithm is: Write ‘A simple program to average the number of passengers on 25 bus journeys.’ total = 0 Do the following 25 times Write ‘Please give the next passenger number’ Read the number total = total + number Calculate the average = total/25 Write ‘The average number of passengers is’ Write the average Notice the indentation: this shows the instructions that need to be repeated 25 times. To make this even clearer you may put: Write ‘A simple program to average the number of passengers on 25 bus journeys.’ total = 0 Do the following 25 times Begin the loop Write ‘Please give the next passenger number’ Read the next number total = total + number End the loop Calculate the average = total/25 Write ‘The average of these 25 numbers is’ Write the average This type of loop is useful when the number of times to loop is known; this is 25 in this example. Other types of loop: REPEAT UNTIL There are other types of loop that may arise when you are decomposing a problem. You may have to think about looping an unknown number of times. You may be thinking ‘repeat this until something happens’. Here is an example: CTS sometimes runs more buses than scheduled on a route on busy days. On these occasions we don’t know how many journeys there will be. The problem is to read in passenger numbers until there are no more numbers and calculate the average. In these circumstances a REPEAT UNTIL loop is what is needed. An easy way to indicate that there are no more journeys is for the driver to enter a 0 as the number of passengers. When the program reads a 0 it knows it should now calculate and display the average before closing. 261 9781380023322_text.indd 261 31/10/2019 11:21 Programming Theory Input a set of passenger numbers from the user, terminated by a0 Processing Output average total = 0 counter = 0 Repeat Get the next passenger number total = total + number counter = counter + 1 Until number is equal to 0 counter = counter −1 Calculate the average = total/counter Write the average Table 9.7 Indicating no more journeys This is how we write the natural language algorithm solution: total = 0 counter = 0 Repeat Get the next passenger number total = total + number counter = counter + 1 Until number is equal to 0 counter = counter −1 (we counted the 0 as a number, see Note below) Calculate the average = total/counter Write the average ITQ 9.7 What is the minimum number of times a REPEAT UNTIL loop executes the included instructions? Figure 9.5 A Rubik’s cube is another type of complex problem that can be solved by an algorithm using a while do loop (‘while do the cube not solved’) statement Note: Make sure that you understand why we included the line: counter = counter −1 If the numbers entered were 4, 6, 0 then counter would be 3 because we counted the 0. However, the 0 doesn’t indicate a journey; instead it indicates that there are no more journeys, so we shouldn’t count it. We need to take 1 off the counter to get the correct value, 2. REPEAT UNTIL loops execute the included instructions at least once, in this example at least one journey. A REPEAT UNTIL loop is sometimes known as a post-test loop. This is because the test for continuing the loop comes after (post) the instructions in the loop have been executed. Other types of loop: WHILE DO The final type of loop is not so common. When decomposing the problem you might be thinking ‘while some condition is true do this’. For example, a modern bus with an automatic crash system might operate while there is no object in the way and keep the power on and brakes off. An embedded computer system continuously monitors a sensor that detects an object in the vehicle’s path. The IPO chart is: Input object present or absent Processing while noObject is true Begin power = on brakes = off End brakes = on power = off Output power brake Table 9.8 IPO chart 262 9781380023322_text.indd 262 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design This is how we write the natural language algorithm solution: while object detected is equal to No Begin the loop power = on brakes = off End the loop brakes = on power = off A WHILE DO loop may not execute the instructions included between Begin and End. WHILE DO loops execute the included instructions zero or more times. A WHILE DO loop is sometimes known as a pre-test loop. This is because the test for continuing the loop comes before (pre) the instructions in the loop have been executed. ACTIVITY 9.2 Loops Consider the following looping scenarios: 1 A batter at the crease in cricket 2 A knitter following a knitting pattern 3 A vehicle approaching road traffic lights. • In your group decide which type of loop is most appropriate. Clues: a batter must face at least one bowl; a vehicle may not have to stop at the traffic lights. • Justify your decisions. ITQ 9.8 What is the minimum number of times a WHILE DO loop executes the included instructions? Decisions: IF-THEN, IF-THEN-ELSE The final tool to look at when performing divide-and-conquer problem-solving is the decision process. When you are decomposing a problem you may be thinking ‘if this is true then we need to execute these instructions’. At Caribbean Travel Services vehicles need to be serviced once they reach 100,000 kms after their last service. Designing a solution to this problem might involve reading in a vehicle’s kilometres covered since the last service and deciding if a service is needed. The problem is to decide if a vehicle needs a service. The IPO chart is: Input Processing Output Kms covered If Kms >= 100,000 then service is yes service Table 9.9 An IPO chart for the Service (IF-THEN) algorithm 263 9781380023322_text.indd 263 31/10/2019 11:21 Programming Theory This is how we write the natural language algorithm solution: Get the vehicle’s Kms covered since last service If Kms covered is 100,000 or greater Output ‘Yes’ Note: Again the indentation shows the instructions that need to be executed if the condition is met. We can extend the problem above to decide if: ‘yes’ the vehicle needs a service, or ‘no’ the vehicle does not need a service. Now you should be thinking: ‘If this is true we need to execute these instructions otherwise we need to execute a different set of instructions.’ An ‘IF-THEN-ELSE’ decision is needed. The IPO chart is: Input Processing Output Kms covered If Kmscovered >= 100000 then result is ‘Yes’ else (otherwise) result is ‘No’ result Table 9.10 An IPO chart for the Service (IF-THEN-ELSE) algorithm ITQ 9.9 What is the difference between IF-THEN and IF-THEN-ELSE? This is how we write the natural language algorithm solution: Get the vehicle’s Kms covered since the last service reading If Kmscovered is 100,000 or greater then Output ‘Yes’ Else Output ‘No’ End of the if ACTIVITY 9.3 Decisions Consider the following decision scenarios: 1 What happens when the batter misses the ball in cricket? 2 At simple red/green traffic lights what action should a driver take? • In your group decide which type of decision is most appropriate. • Justify your decisions. The more problems you consider and break down, the easier it becomes. Solving the following problems requires you to use sequences of instructions, loops and decisions. If you get stuck on the following activities try re-reading the above sections. 264 9781380023322_text.indd 264 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design ACTIVITY 9.4 Solving problems Use the company you created in earlier activities or use St Luago Fashion. Solve the following problems by: 1 Defining the problem. 2 Creating an IPO chart. 3 Writing a natural language algorithm solution in your notebook. You will need these algorithms in the next chapter. • Your company has three stores. At the end of the day all three stores report their takings to head office. Create an algorithm to input the three values, add them together and output the total. • At the end of the week each of the branches needs to average the five days’ takings. Create an algorithm to input the five values, calculate the average and output the average. (Use a loop.) • Your company has started attending markets during the week. The number of markets varies. Create an algorithm to input the takings at each market, add them together and output the total. • The Board of your company has decided to update underperforming branches. Create an algorithm to input the annual profit of a branch. If the profit is less than or equal to 50,000, then the output is ‘Update’. • The Board of your company has decided to update underperforming branches. Create an algorithm to input the annual profit of a branch. If the profit is less than or equal to 50,000 then the output is ‘Update’, otherwise the output is ‘Excellent performance’. Determining the best solution During the problem-solving process it is usual for one solution to become clear. However, on rare occasions, there may be more than one possible solution. For a simple example: Calculate the tax payable on the sale of 10 items. Two solutions might come out of applying the divide-and-conquer method which can be summarised as: 1 For each of the 10 items, calculate profit, calculate the tax payable on the profit of each item sold and then add this to the total tax payable. 2 For each item, calculate the profit, add this to the total profit and after all 10 items calculate the total tax payable. In these cases the problem solver has to select which solution is best. (The second option is more efficient; it needs only 21 calculations where the first solution needs 30 calculations.) Distinguishing between variables and constants In the previous section we considered inputs and outputs but now it is time to consider how these are dealt with in more detail. When a program reads an input it takes the data from the input device and stores it in main memory (RAM). To do this, part of the main memory is split into containers; each container will hold a value. 265 9781380023322_text.indd 265 31/10/2019 11:21 Programming Theory Each of these containers must have: • a name (identifier) so that we can easily refer to it • a data type so we know the size of the container and what sort of data the container holds; for example a number or character. Variables and constants Variable ▶ Constant ▶ The technical terms for these containers are ‘variable’ and ‘constant’. A variable is an area of storage whose value can change during processing. A constant is also a container but the value in a constant cannot be changed. A constant is an area of storage whose value cannot be changed during processing. Constants are useful for fixed values. For example, pi is always 3.14159 to 5 decimal places. It is good practice to use constants because it makes the source code easier to understand and it means the value of the constant appears only once in the code and so is easy to change. Memory location 25 26 B 27 28 u s 29 30 16 vehicle 3.1459 seats pi variable names Figure 9.6 Memory locations 26 to 28 contain a variable for the type of vehicle, location 29 contains an integer variable for number of seats and location 30 contains a constant for pi Identifier ▶ ITQ 9.10 The name given to variable or a constant by a programmer is called an identifier. When programming it is good practice to develop a system for creating meaningful identifiers. In this book: • each identifier is meaningful, it describes what data is being stored, for example average, totalCost and taxRate What is the difference between a variable and a constant? • all identifiers begin with a lowercase letter • no underscores are used, instead of total_cost we write totalCost. Variables are needed for storing: • all input data that will be provided by the user • any memory that will be required during processing, for example the total when calculating an average • all output data. A clear understanding of the problem and the use of the divide-and-conquer method in problem-solving should have indicated the variables that will be needed. For example, a simple problem is to read in 3 numbers and output the average. The IPO chart would be: Input input num1 num2 num3 Processing numOfNumbers = 3 total = num1+num2+num3f average = total/numOfNumbers Output Output average Table 9.11 IPO chart for the Average problem 266 9781380023322_text.indd 266 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design From this the variables and constants are identified: Variables: num1 num2 num3 total average Constants: numOfNumbers Data types Before variables and constants can be used in a program they should be declared. This allows the computer to allocate the correct amount of memory to hold the values. To declare a variable or constant the programmer must provide: • an identifier (a name) • a data type. Data type ▶ ITQ 9.11 Suggest the most appropriate data type to store values related to EACH of the following: • An employee’s age • An employee’s last name • An employee’s initial • An employee’s hourly wage • Is the employee single? A data type specifies what sort of values a variable or constant can hold. The main data types that are used for writing simple programs are: • integer: whole numbers such as 0, 5, 10, 1,024 and –50 (negative 50) • floating point (real): any number that contains decimal places such as 0.2, 1.5 and –50.4 (negative 50.4) • character: units of data including letters, numbers and symbols such as A, a, 9, $ and @ • string: a sequence of characters such as ‘Frank’, ‘Ruth’, ‘bus’ and ‘925-0000’ • boolean: a true or false value, Yes/No. The concept of an algorithm In previous sections we have considered: 1 Define the problem 2 Propose and evaluate solutions 3 Determine the best solution. It is now time to look at algorithms in more detail. We have been creating natural, everyday language algorithms but now we need to check that our algorithms conform to guidelines. Definition and characteristics of an algorithm An algorithm is a set of instructions that if followed in sequence will lead to a solution for the problem. All algorithms share these basic characteristics: • They have a limited (finite) number of steps to be performed. • They must contain a finite number of instructions. A complex algorithm may contain thousands of instructions but it must be a finite number, it must always finish. • The statements used are precise. • An algorithm is precise when it is strictly defined. • The statements used are unambiguous. 267 9781380023322_text.indd 267 31/10/2019 11:21 Programming Theory • An algorithm is unambiguous when it is not open to more than one ITQ 9.12 Which of the following are ambiguous? (a)Is the person old? (b) Is the number of passengers greater than vehicle capacity? (c)Is the bus fast? (d) Is the bus’s maximum speed greater than 100? interpretation. Algorithms cannot include words or phrases like ‘looks bigger’ or ‘best’, because these can be interpreted differently by different programmers. • They have instructions that pass the flow of control from one process/action to another. • Instructions in an algorithm must be followed in a sequence, control passes from one process to the next until the algorithm terminates. • They eventually terminate. • All algorithms must eventually finish. Representing algorithms in the form of pseudocode and flowcharts Pseudocode and flowcharts are two ways of representing algorithms: • Pseudocode is written in text • Flowcharts are drawn using special symbols (shapes). Using pseudocode to represent algorithms ITQ 9.13 Watch a video that introduces pseudocode. What are the three structures used in pseudocode? Pseudocode is a way of representing an algorithm using structured English text, numbers and special characters. When writing pseudocode it is useful to use a special set of language building blocks. When you were thinking about how to solve problems in the previous sections you will have been using some of these building blocks. Here are some examples: READ the student’s score. total = total + score WRITE the total Some of the other constructs will need a bit more work. For example: Do the following 25 times Begin Write ‘Give the next passenger number’ Read the next number total = total + number End becomes FOR counter = 1 TO 25 DO WRITE ‘Give the next passenger number’ INPUT the next number total = total + number ENDFOR Look at the above example to make sure you understand what is going on. Here is another example – see if you can work out what this pseudocode does. 268 9781380023322_text.indd 268 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design ACTIVITY 9.5 FOR counter = 1 TO 3 DO WRITE ‘hip hooray’ ENDFOR Discuss what the above algorithm does in your group. The next example involves Repeat … Until. Remember this is used when we want to loop at least once but we don’t know how many times to loop. Earlier in this chapter we saw: Repeat Get the next passenger number total = total + number counter = counter + 1 Until number is equal to 0 this becomes REPEAT READ passengerNumber total = total + passengerNumber counter = counter + 1 UNTIL (passengerNumber = 0) The next example involves DO … WHILE. Remember this is used when we may not want to loop at all but we don’t know how many times to loop. Earlier in this chapter we saw: While No object detected Begin power = on brakes = off End brakes = on power = off this becomes WHILE (noObjectDetected) DO BEGIN power = on brakes = off END brakes = on power = off The next example involves IF-THEN. Remember this is used for simple decisions. If Kms covered is 100,000 or greater then Output ‘Yes’ this becomes IF (Kms covered >= 100000) THEN WRITE ‘Yes’ The final example involves IF-THEN-ELSE. This is used for a decisions between two options. If Kms covered is 100,000 or greater then Output ‘Yes’ Else Output ‘No’ this becomes IF (Kms covered >= 100000) THEN WRITE ‘Yes’ ELSE WRITE ‘No’ Pseudocode is a more formal way of writing instructions so that they are unambiguous. If you have been doing all the activities in the earlier section you should already be thinking in the right way. When writing pseudocode it is useful to use the following language constructs. This will help when you get to the program implementation stage. 269 9781380023322_text.indd 269 31/10/2019 11:21 Programming Theory What do you want to do Verb/construct to use Example of how to use it Input data INPUT or READ INPUT name READ name Assign a new value to a variable (or initialise a variable) STORE, = or := STORE age + 1 TO age age = age + 1 age := age + 1 Output data and information OUTPUT, PRINT or WRITE OUTPUT ‘Please enter a number’ PRINT ‘End of processing’ OUTPUT total WRITE ‘The total is ’, total Repeat a statement or set of statements a fixed number of times FOR … DO FOR counter = 1 to 5 DO OUTPUT counter ENDFOR Repeat a statement or set of statements based on a condition that is tested before loop entry. Loop must execute at least once REPEAT … UNTIL total = 0 REPEAT INPUT coin total = total + coin UNTIL (total >= 20) Repeat a statement or set of statements based on a condition that is tested before loop entry. Loop may not execute WHILE … DO counter = 1 WHILE (counter < 5) DO OUTPUT counter counter = counter + 1 ENDWHILE Make a decision with one possible action IF-THEN IF (x > 5) THEN PRINT x ENDIF Make a decision with two possible actions IF-THEN-ELSE IF (passMark > 50) THEN PRINT ‘Pass’ ELSE PRINT ‘Fail’ ENDIF ITQ 9.14 List THREE keywords (verbs) that may be used as instructions for outputting information when writing pseudocode. Table 9.12 Summary of the verbs and control structures used when writing pseudocode There are lots of examples of pseudocode coming up in the following section, but now let us look at an alternative way to represent an algorithm: flowcharts. ITQ 9.15 Watch a video that introduces flowcharts. What is a rhombus shape used for in a flowchart? ITQ 9.16 Which is the only flowchart symbol which MUST be used at least twice in every flowchart? Using flowcharts to represent algorithms A flowchart is a pictorial way of representing an algorithm using a set of standard symbols (shapes). Flowcharts use different symbols to represent input, processing and output operations. Operations are connected with arrows which serve as flow lines. Flowcharts are usually drawn from top to bottom or left to right. It is important that the symbols are used as intended so that the completed flowchart is clear to the programmers. Examples of correct usage of the five standard flowchart symbols are shown below. Each flowchart should have only two terminal symbols. The first one should be labelled either ‘Begin’ or ‘Start’ and the other labelled either ‘End’ or ‘Stop’. ‘Begin’ and ‘End’ will be used in all flowcharts in this chapter. This will help to easily convert the algorithms to program code later. 270 9781380023322_text.indd 270 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design Process Symbol Description Terminal Terminators show the start and stop points in a process. Use only TWO terminators for EACH flowchart. Label the first terminator BEGIN and the second one END. Input/Output Parallelogram. This symbol indicates inputs to and outputs from a process. The shape must be labelled with either INPUT or OUTPUT. Process Rectangle. Program instruction(s) that transform(s) input(s) into output(s) are recorded here. Each symbol MUST be labelled with an operation that includes the assignment operator (➝ or =). Decision Rhombus. Indicates a question or branch in the process flow; for example x > 0? No need to write the words ‘IF…THEN’ in the shape. Label one branch Yes and the other No. Flowlines Flowlines join flowchart symbols and indicate the direction in which the process flows. Table 9.13 Flowchart symbols and their meaning and usage ITQ 9.17 What is the purpose of flowlines in a flowchart? The input/output symbol is used to document data that is coming in or going out of the program. If multiple data items are being input or output one after the other then include them in the same symbol. input fare output ‘Amount in till’ Figure 9.7 A data (input/output) symbol must be labelled with input or output as well as the variable or variables The process symbol is used to show variables being initialised to starting values and variables being assigned new values provided by an arithmetic operation. The following are all valid labels: STORE 1 TO X X=1 X➝1 X := 1 We will use the ‘=’ as our assignment symbol in all our flowcharts. counter = 0 sum = 0 counter = counter + 1 average = total/counter Initialising variable Adding 1 to a counter A division operation Figure 9.8 Correct labelling of the process symbols. Note that each symbol has only one flow line entering and one leaving The decision symbol is used when the flow can miss out a process or pass to one of two possible processes depending on a condition. While there are no very firm rules governing the labelling of the decision symbol, good practice suggests that you should label the: 271 9781380023322_text.indd 271 31/10/2019 11:21 Programming Theory • decision symbol with the question being posed rather than if…then; the shape itself already represents if…then • left branch of a decision symbol ‘No’ and the right branch ‘Yes’ (since we read from left to right, we will naturally read the question in the symbol then process what is on the right as ‘Yes’). No Age >= 21? Yes Figure 9.9 A correctly drawn decision symbol is labelled with a question and has two labelled arrows leaving it. The flow lines leaving the symbol must be labelled, one with ‘No’ and the other with ‘Yes’ Using relational operators Both pseudocode and flowcharts have mechanisms to represent decisions. A decision always has a condition that evaluates to true or false. Examples of conditions are: Algorithm Pseudocode passengers is greater than 50 passengers > 50 letter is ‘K’ letter = ‘K’ first letter is ‘O’ and second letter is ‘K’ firstLetter = ‘O’ and secondLetter = ‘K’ the input word is not equal to ‘exit’ inputWord <> ‘exit’ Table 9.14 Conditions that evaluate to true or false Relational operators ▶ Condition ▶ Operand ▶ These use what are called the relational operators and always result in true or false. Relational operators test the relationship between two values and always result in true or false. A condition is an expression that includes a relational operator and the two operands on which it operates. An operand is a data value, held in a variable that is part of a condition. Symbol Meaning > greater than >= greater than or equal to = equal to <> or!= not equal to < less than <= less than or equal to Table 9.15 Relation operators Take as an example these three boxes of spare parts in a garage: Figure 9.10 Boxes 1, 2 and 3 containing spare parts in a garage Based on the values shown in Box 1, Box 2 and Box 3, the statement: 1 ‘Box 1 = 5’ is TRUE 2 ‘Box 1 < Box 2’ is TRUE 3 ‘Box 1 = Box 2’ is FALSE 272 9781380023322_text.indd 272 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design ITQ 9.18 Based on the values shown: Box 1 Box 2 4 ‘Box 2 = Box 3’ is TRUE 5 ‘Box 2 <> Box 3’ is FALSE 6 ‘Box 2 > Box 1’ is TRUE 7 ‘Box 2 <= 8’ is TRUE Caribbean Travel Services regularly uses relational operators. Some examples are: • In the garage tyre pressure must be equal to 28psi, (pressure = 28) Boxes 1 and 2 containing pens and pencils in an office. State whether EACH of the following statements is TRUE or FALSE: (a) Box1 = 4 (d) Box1 = Box2 (b) Box2 > Box1 (e) Box1 <> Box2 (c) Box1 < Box2 • In the depot a vehicle cannot enter unless there is at least one free bay, (freeBays >= 1) • At the head office there are less than 5 reams of paper left, it is time to re-order, (paperReams <= 5) ACTIVITY 9.6 Relational operators in your company Use the company you created in earlier activities or use St Luago Fashion. • Identify five or more examples of when your company will need relational operators. • Create a condition for each example, e.g. (salary >= 10,000). • Create a short document of your examples and share with the class on the class noticeboard. An important skill that you will need to develop is being able to correctly identify a condition in a problem statement. Below is an example based on the following problem narrative: Caribbean Travel Services has a strict ‘14 years and over’ policy for travel before 6 a.m., unless with an accompanying adult. Develop an algorithm to prompt for, and accept, the age of a person and, if the age is under 14, print ‘sorry – no underage travel before 6 a.m.’. ITQ 9.19 What is the meaning of the ‘>=’ relational operator? Step 1 Identify keywords such as equal to, greater The keyword ‘IF’ has been identified, it than, less than, if, then, until and while. appears in italics. Step 2 Identify variables and values that appear The variable ‘age of a person’ and the close to the keywords identified in step 1. value ‘14’ appear. Both appear close to the keyword. Step 3 Write down the condition; ensure that you have used the correct relational operator. Write the condition as personsAge < 14? Table 9.16 Developing an algorithm 273 9781380023322_text.indd 273 31/10/2019 11:21 Programming Theory Using logical operators Logical operators ▶ Earlier we saw that one of the main data types used for writing simple programs is Boolean, which results in a true or false value. The most common Boolean, or logical operators, perform AND, NOT and OR actions. They occur: • before another condition in the case of the NOT operator • between two relational conditions as in the case of the AND OR operators. The use of a logical operator turns a simple relational condition into a compound condition. Simple conditions: counter = 5 num1 > 7 amount = 8 Compound conditions: (power = true) AND (brakes = false) (amount > 10) OR (discount > 0.2) NOT (taxPaid >= 100) A truth table is helpful in determining whether a statement involving a logical operator is true or false. A truth table is a diagram in rows and columns showing how the truth or falsity of a statement varies with that of its components. A truth table shows all possible true/false values for an expression. A B A OR B A B A AND B TRUE TRUE TRUE TRUE TRUE TRUE TRUE FALSE TRUE TRUE FALSE FALSE FALSE TRUE TRUE FALSE TRUE FALSE FALSE FALSE FALSE FALSE FALSE FALSE Table 9.17 Truth table for the OR operator A NOT A TRUE FALSE FALSE TRUE Table 9.18 Truth table for the AND operator Table 9.19 Truth table for the NOT operator Based on the values shown: Based on the values shown in Box 1, Box 2 and Box 3, the statement: • (Box1 = 5) AND (Box2 = 7) is TRUE (since both conditions are true; look at row 1 in the AND table) • (Box2 = Box3) OR (Box2 = 7) is TRUE (since both conditions are true; look at row 1 in the OR table) 274 9781380023322_text.indd 274 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design • NOT (Box1 > 10) is TRUE (since the expression was originally false; look at row ITQ 9.20 2 in the NOT table) Based on the values shown: Box 1 • (Box2 < 5) AND (Box3 = 7) is FALSE (first expression is false and second Box 2 expression is true; row 3 of the AND table). Caribbean Travel Services regularly uses compound conditions. Some examples are: • Before a vehicle leaves the garage tyre pressure must be equal to 28psi and fuel must be greater than 100 litres ((pressure = 28) AND (fuel>=100)). state whether EACH of the following statements is TRUE or FALSE: • (Box1 = 4) AND (Box2 =8) • NOT (Box1 <= 5) • (Box2 > Box1) OR (Box1 <= 7) • NOT (Box1 < Box2) • (Box1 = Box2) OR (Box1 =4). • In the depot a vehicle cannot enter unless there is at least one free bay or it needs refuelling ((freeBays >= 1) OR (fuel <= 100)). • At the head office, if the reams of paper are less than or equal to 5 or toner cartridges are less than 2, it is time to re-order ((paperReams <= 5) OR (toner < 2). Using arithmetic operators Arithmetic operators ▶ DIV ▶ MOD ▶ ITQ 9.21 Use integer arithmetic to calculate: • 13 DIV 3 • 7 MOD 2 • 125 DIV 10 • 17 MOD 5 • 73 DIV 7 Other important symbols used in programming are those that represent mathematical computations such as addition, subtraction, multiplication and division. These are called the arithmetic operators and these perform +, −, *, /, DIV and MOD actions. The addition, subtraction, multiplication and division operations are the same actions as in mathematics. The DIV and MOD operators may be new to you; they are used in integer arithmetic. Integers are whole numbers. DIV is the integer division operator which discards the fractional part (remainder) of the result. For example: 5 DIV 2 produces 2 since the remainder, which is 1, is discarded. MOD is the integer remainder operator which gives the fractional part (remainder) of the result. For example: 5 MOD 2 produces 1 since this is the remainder. Integer operation Explanation of results 11 DIV 5 = 2 We get a result of 2 since the DIV operation discards the remainder 1 7 MOD 2 = 1 We get a result of 1 since the MOD operation is only interested in the remainder portion of the results 6 DIV 2 = 3 We get a result of 3 since the DIV operation discards the remainder 0 9 MOD 3 = 0 We get a result of 0 since the MOD operation is only interested in the remainder portion of the results Table 9.20 Examples of integer division operations and their results 275 9781380023322_text.indd 275 31/10/2019 11:21 Programming Theory Testing algorithms for correctness Dry run ▶ Test data ▶ Trace table ▶ Before implementing the program, it is wise to fully test the algorithm. Any errors found at this stage are easy to correct. Errors that are not found until the programming stage can be very time-consuming to correct. A good way to test an algorithm is to perform a dry run, sometimes known as a desk check. A dry run is a practice run, a rehearsal of the process before the algorithm is implemented as a program. Performing a dry run through the algorithm makes sure that it operates in the expected way. During the dry run method, the algorithm is tested by a human taking on the role of the CPU, executing each instruction in sequence. When performing a dry run on a program, input values for which the expected result is already known are used. These values are called test data. Test data is a set of carefully selected data values used to determine whether an algorithm or program works as intended. For example, the test data used for dry running an ‘average of three numbers’ algorithm might be 4, 5 and 6 because we know the answer should be 5. A trace table is used to display how the values of variables change as a dry run is carried out. To construct a trace table: 1 Count the number of variables in the algorithm and add one for the output. This will determine the number of columns. 2 Draw a table with the number of columns identified in Step 1 and at least three rows. Always give yourself plenty of room for the trace table to expand downwards. 3 Label the first row of your table with the names of the variables. The last column is labelled output. At Caribbean Travel Services an algorithm accepts the number of passengers as input, calculates the total fares collected and outputs the total monies that should be in the till. The IPO chart is: Input number of passengers Processing fare = 2.5 total Total amount in till = fare * number of passengers Output total amount in the till Table 9.21 IPO chart for the ‘calculate amount in till’ problem Construct a trace table for the pseudocode algorithm shown below. BEGIN fare = 2.5 READ numOfPassengers(a) totalInTill = numOfPassengers * fare (b) WRITE totalInTill(c) END 276 9781380023322_text.indd 276 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design Step 1 Identify the variables as numOfPassengers and totalInTill. Fare is a constant. Step 2 Draw a column for each variable and label the column headings with the variable names as shown in Table 9.22. numOfPassengers totalInTill Output Table 9.22 A trace table with column headings Step 3 Using the test value numOfPassengers = 5, we will step through the program, executing the algorithm just as the processor will. The new value for the variables will be recorded in the table. This corresponds to the dry run of the algorithm line by line, starting with line 1. As shown above, the steps are: BEGIN fare = 2.5 READ numOfPassengers(a) totalInTill = numOfPassengers * fare (b) WRITE totalInTill(c) END numOfPassengers 5 totalInTill (a) 12.5 Output (b) 12.5 (c) ITQ 9.22 Table 9.23 A trace table with recorded variable entries using test data 5 What is the benefit of doing a dry run on an algorithm? Let us expand the example of Caribbean Travel Services to deal with weekly summaries: At the end of the week CTS needs to summarise the total number of passengers and total fares collected over the five working days. The IPO chart is: Input number of passengers (× 5 days) Processing fare = 2.5 totalPassengers = 0 for count = 1 to 5 input numOfPassengers totalPassengers = totalPassengers + numOfPassengers totalFares = totalPassengers * fare Output totalPassengers totalFares Table 9.24 An IPO chart for the ‘calculate passengers and fares’ problem 277 9781380023322_text.indd 277 31/10/2019 11:21 Programming Theory The pseudocode algorithm is: fare = 2.5 totalPassengers = 0(a) FOR count = 1 To 5 (b) READ numOfPassengers(c) totalPassengers = totalPassengers + numOfPassengers (d) ENDFOR totalFares = totalPassengers * fare (e) WRITE totalPassengers(f) WRITE totalFares(g) Construct a trace table for the algorithm shown. Step 1 Identify the variables as numOfPassengers, totalPassengers, totalFares. Step 2 Draw a column for each variable and label the column headings with the variable names as shown in Table 9.25, not forgetting the output column. totalPassengers count numOfPassengers totalFares output Table 9.25 The trace table with column headings Step 3 Dry run the algorithm with test data for passenger numbers 25, 35, 30, 20, 45. The expected results are total passengers 155 (the sum of all the passenger numbers) and total fares US$387.50. Data input will be 25, 35, 30, 20, 45. As we showed above, the steps for this algorithm are: fare = 2.5 totalPassengers = 0(a) FOR count = 1 To 5(b) READ numOfPassenger s(c) totalPassengers = totalPassengers + numOfPassengers (d) ENDFOR totalFares = totalPassengers * fare (e) WRITE totalPassengers(f) WRITE totalFares(g) totalPassengers count numOfPassengers 0 (a) 1 (b) 25 (c) 25 (d) 2 (b) 35 (c) 60 (d) 3 (b) 30 (c) 90 (d) 4 (b) 20 (c) 110 (d) 5 (b) 45 (c) 155 (e) totalFares 387.5 output (f) 387.5 (g) Table 9.26 The completed trace table showing the changing variable values using test data: 25, 35, 30, 20, 45 278 9781380023322_text.indd 278 31/10/2019 11:21 9 • Problem-solving 1 • Computer and program fundamentals design ACTIVITY 9.8 • Look at the pseudocode algorithm below. REPEAT READ passengerNumber total = total + passengerNumber counter = counter + 1 UNTIL passengerNumber = 0 WRITE total • Identify the variables from the algorithm. • Create the trace table for this algorithm. • Dry run the algorithm to complete the trace table with the test data 27, 43, 0. • Share your completed trace table with the class. ITQ 9.23 Why might it be necessary to dry run an algorithm with more than one set of test data? ITQ 9.24 What is the relationship between a trace table and a dry run? At this stage we have seen: • defining a problem • proposing and evaluating solutions • determining the best solution • developing the algorithm • representing the algorithm as pseudocode or a flowchart • testing and validating the solution. Now that we are confident the solution is correct we can move to the next stage, which is to implement the algorithm as a program. Summary • A problem is a discrepancy between the data we have and the information we require. • A program is a sequence of instructions that a computer can interpret and execute. • Problems may be partitioned into their three component parts – input, process, output – using an IPO chart (note that storage is also a step in all programming work). • Variables and constants provide storage for program data: • Pseudocode is a method of documenting algorithms using simple structured instructions. • Flowcharts are a pictorial way of representing algorithms using a standard set of symbols. • The keywords READ, INPUT and GET are used to accept data; WRITE, PRINT and OUTPUT to output results. • Algorithms may be designed using a combination of three flow control structures: sequence, iteration (loops) and decisions. the value held by a variable can be changed while the value held by a constant remains fixed for the life of the program. • The IF-THEN-ELSE control structure implements decision- • A variable has both a name and a data type. • Integer, real and character are data types for variables and • Iteration (looping) is implemented in various ways: FOR constants. making logic. loops, REPEAT UNTIL loops and WHILE DO loops. • It is important to test an algorithm thoroughly. 279 9781380023322_text.indd 279 31/10/2019 11:21 Programming Theory • To construct a trace table, identify the variables in the pseudocode as the column headings. • Humans dry run an algorithm by playing the part of the processor and executing the sequence of instructions given by the algorithm and recording interim results in the trace table. • Select appropriate data to ensure that all paths through the algorithm are tested, for example where IF-THEN-ELSE is used, there are a number of possible paths through the algorithm. Answers to ITQs 9.1 An algorithm is a set of steps used to achieve a specific task. 9.2 Simple mathematics problems that you may have solved recently might have included: calculating your change from the shop, working out how many more points you need to win a game, calculating how long a journey is likely to take or working out if you have enough money left to go to the cinema and buy popcorn. 9.3 The correct sequence in the problem-solving process is: define problem, propose solutions, choose best solution, develop algorithm, create pseudocode or flowchart, and test. 9.4 The divide-and-conquer approach is to repeatedly split a large problem into a number of smaller sub-problems until a complete solution is identified. 9.5 An IPO chart or Input, Process, Output chart helps you start breaking down a problem. The three column headings are Input, Processing and Output. 9.6 IPO stands for Input, Process, Output. 9.7 A REPEAT UNTIL loop must execute the included instructions at least once. 9.12 An ambiguous statement is one that can be interpreted in different ways: Is the person old? Is ambiguous. Is the number of passengers greater than vehicle capacity? Must be true or false so unambiguous. Is the bus fast? Is ambiguous. Is the bus’s maximum speed greater than 100? Must be true or false so unambiguous. Is the fare expensive? Is ambiguous. 9.13 The three structures used in pseudocode are: sequence, selection and iteration, also known as sequence, decisions and loops. 9.14 OUTPUT, PRINT and WRITE are three keywords used in pseudocode to output results. 9.15 In a flowchart a rhombus shape is used to indicate a selection or decision. 9.16 In a flowchart there must be only two terminator symbols, one for BEGIN and the other for END. 9.17 Flowlines in a flowchart join symbols together. 9.18 If Box 1 is 4 and Box 2 is 8: 9.8 A WHILE DO loop executes zero or more times; the included instructions may not be executed at all. Box1 = 4 is TRUE 9.8 An IF-THEN decision executes the block of instructions or does nothing. An IF-THEN-ELSE decision executes one of two alternative blocks of instructions. Box1 < Box2 is TRUE 9.10 The contents of a variable can change during processing. The contents of a constant are fixed during processing and cannot be changed. 9.11 An employee’s age, e.g. 34, is an integer. Box2 > Box1 is TRUE Box1 = Box2 is FALSE Box1 <> Box2 is TRUE 9.19 The ‘>=’ relational operator is greater than or equal to. 9.20 If Box 1 is 4 and Box 2 is 8. (Box1 = 4) AND (Box2 =8) is TRUE An employee’s last name, e.g. Douglas, is a string. NOT (Box1 <= 5) is FALSE An employee’s initial, e.g. F, is a character. (Box2 > Box1) OR (Box1 <= 7) is TRUE An employee’s hourly wage e.g. 4.8, is a real or floating point number. NOT (Box1 < Box2) is FALSE (Box1 = Box2) OR (Box1 =8) is TRUE Whether employee is single, e.g. ‘Yes’, is a Boolean. 280 9781380023322_text.indd 280 31/10/2019 11:21 9 • Problem-solving and program design 9.21 Using integer division 18 DIV 3 = 6 7 MOD 2 = 1 125 DIV 10 = 12 17 MOD 5 = 2 9.23 It is always a good idea to test an algorithm with a variety of test data including typical values and extreme values. 9.24 When you dry run a program you act as the processor. During a dry run the values of variables are recorded in the trace table. 73 DIV 7 = 10 9.22 Dry running an algorithm can identify logic errors early in the development of a program. Examination-style questions: Multiple Choice Instructions: Each item in this test has four suggested responses labelled (A), (B), (C) or (D). Read each question carefully then select the most suitable response. 1) 2) 3) All the steps in problem-solving are correctly stated EXCEPT: A) define the problem B) propose some solutions C) determine the best solution D) test and validate the solution The divide-and-conquer approach is used to: A) define a problem B) validate a solution C) decompose large problems D) create solution algorithms All the following statements about problem decomposition are correct EXCEPT: A) Significant components are input, process and output. B) An IPO chart may be used to delineate the components. C) Problems are broken down into simpler subproblems. D) Problem decomposition simplifies the problem in one step. Questions 4–5 are based on the following algorithm: SET pi TO 3.14 SET radius, circumference TO 0 READ radius LET circumference = 2 * pi * radius 4) The identifier pi is an example of a: A) constant B) data type C) string D) variable 5) The identifier radius is an example of a: A) constant B) data type C) string D) variable 6) Which of the following is NOT a characteristic of an algorithm? A) finite number of steps B) flow of control is forward C) precise D) unambiguous 7) When representing algorithms using a flowchart, the rectangle may be used to represent: A) input only B) output only C) both input and output D) a process 8) An algorithm that states ‘roll the dice a few times’ may be described as: A) imprecise B) incomplete C) infinite D) unambiguous 9) When representing algorithms using a flowchart, the parallelogram may be used to represent: A) input only B) output only C) both input and output D) a process 10) Which of the following statements about a trace table is UNTRUE? A) values placed in cells B) variables as row headings C) identifiers as column headings D) final variable values in last row 281 9781380023322_text.indd 281 31/10/2019 11:21 1 • The computer system Programming Examination-style questions: Structured 1) Jessica wants to start a small business. She decided to approach her bank for a small business loan in order to finance the business. a) The bank has offered a loan at an annual rate of 7%. Jessica plans to manufacture and sell scented candles. Each candle will be sold for $15.00 and will give a 20% profit. Write algorithms to: i) prompt for the loan principal and calculate and display the interest payable based on the formula: interest = (principal * rate) ii) b) c) [4] prompt for the 12-monthly figures for candle sales, calculate and display the total number of candles and total profit [4] iii) prompt for the interest payable and total profit, calculate and display the difference. [2] Suggest the MOST APPROPRIATE data types for each of the following: i) the number of passengers on an aircraft ii) the weight of fish, meat and vegetables iii) the code used at the start of the following sequence: *120 iv) whether a payment is late or not. [4] State the FIVE steps in problem-solving and explain how the divide-and-conquer approach may be used to decompose a problem such as determining the passing score for a course comprised of three different types of assessments (homework, tests and exams), each having different weighting. [6] Total 20 marks 282 9781380023322_text.indd 282 31/10/2019 11:22 10 Program implementation Having developed algorithms in Chapter 9, it is now time to implement these as programs. The process will start with the creation of source code in a high-level programming language. We want you to learn the skills that you will need to program in any programming language so we give Pascal examples but equivalent Python code is also included so that you can see the similarities. Once a program is written, it can be compiled. This checks the source code and translates it into machine code. The program can then be executed and tested to make sure it functions correctly in all circumstances. Next, the documentation for the user and for other programmers needs to be created. The final step is to maintain and adapt the program. You will need to spend time practising at the computer. The practice activities will help you develop all the skills you will need. All programming languages have similar features and it is not our intention to limit your skills to one particular programming language but to give you the broader skills to master any programming language. We would encourage you to experiment and explore with different programming languages to widen your understanding of the concepts given in this chapter. By the end of this chapter you should be able to: ✔✔ Distinguish between low-level and high-level programming languages. ✔✔ Describe the sequence of steps in implementing a program. ✔✔ Perform checks and tests on programs to verify correctness. ✔✔ Declare variables and constants using elementary data types. ✔✔ Translate algorithmic statements into high-level language syntax. ✔✔ Effectively document programs. Free Pascal Compiler (freepascal.org) and IDLE for Python (python.org) are program development environments that are free to download, install and use. Program implementation Low- & high-level languages Machine & assembly language Programming languages 9781380023322_text.indd 283 Syntax, logical and run-time errors Assignment statements & loops Internal documentation Testing & test data Conditional branching Debugging techniques Integer division & constants Creating source code Executing a program The development program 3 lines OM Documenting programs Program tests & checks Translating source code Declaring variables & constants Using highlevel languages Implementing a program External documentation Combining program elements 283 31/10/2019 11:22 Programming 1 • Computer Fundamentals Distinguishing between low-level and high-level languages Recall from Chapter 9 that an algorithm is a set of instructions that when executed will solve a problem. It is the instructions that will process the input data into the meaningful information required by the user. Having developed our algorithms and documented them using pseudocode or flowcharts, we now need to ensure that they are expressed in a way that the computer can understand. Low-level languages (machine and assembly) Machine language ▶ Binary code ▶ Assembly language ▶ The Central Processing Unit (CPU) of a computer understands a very specific language called machine language. Machine language consists of binary code that a microprocessor can execute directly. Binary code is a sequence of 1s and 0s. Here is an example of a machine code instruction written in binary code: 00110010 00001110 00010010 00000000 You could write a program using binary code but because humans often make mistakes when using machine code to write programs, the early computer scientists created assembly language. Assembly language uses short words to represent simple instructions that can Figure 10.1 Humans don’t read binary code well! easily be translated into machine code. Here is an example of an instruction to move 5 into a variable called counter, written in assembly code: mov Low-level language ▶ ITQ10.1 State the main difference between machine code and assembly code. High-level languages ▶ 5,counter Assembly language is translated into machine code using a special program called an assembler. Both machine code and assembly code are low-level languages and they aren’t easy for humans to understand. Low-level language is a machine-dependent language written in machine code or assembly code. Low-level languages are not useful for modern programming, so let us look at high-level languages. High-level languages (e.g. Pascal, Python, Visual Basic and C) High-level languages are machine-independent languages written in statements that closely resemble English. High-level languages include Pascal, Python, Visual Basic and C. 284 9781380023322_text.indd 284 31/10/2019 11:22 10 • Program implementation ACTIVITY 10.1 Understanding a simple Pascal program Here is a simple example program written in the Pascal high-level language: PROGRAM SimpleAdd; VAR firstNumber : INTEGER; secondNumber : INTEGER; total : INTEGER; BEGIN WRITELN ('Please give your first number'); READ (firstNumber); WRITELN ('Please give your second number'); READ (secondNumber); total := firstNumber + secondNumber; WRITELN ('The total is', total); END. Use common sense to try to answer the following questions. • What is the name of the program? • What does the program do? • How many inputs does the program take? • Write down what you think the program will display. (Hint: WRITELN stands for write line and go on to a new line.) • How many outputs does the program produce? • Discuss in the group how easy analysing this program was. ITQ 10.2 Which level of language uses ‘human-like’ syntax? Now it is time to look at how to implement a pseudocode algorithm or flowchart in a high-level language. The sequence of steps in implementing a program The process of implementing a program consists of four major steps: 1 Create source code (in a high-level programming language). 2 Translate source code into machine code. 3 Execute the program (run the machine code). 4 Maintain the program (using the documentation provided). Step 1: Creating source code All high-level languages have extensive books, tutorials, built-in help functions and support forums to help you learn the language you choose to use. In this book we give general advice applicable to all program languages but provide examples only in Pascal and Python. If you are using another high-level language you will be able to follow the examples but you will not be able to use the code examples directly. 285 9781380023322_text.indd 285 31/10/2019 11:22 Programming Theory ITQ 10.3 Watch this video that introduces programming. Name three programming languages. All high-level languages you are likely to use will have one or two ‘help pages’. Ask your teacher to find and print out a reference help page for the language you are using. By looking at this, alongside the Pascal and Python examples in this chapter, you will be able to implement the programs in your chosen language. All programmers use a development environment to make writing programs easy. Your teacher will have installed a development environment program on the computers at your school. We use the Free Pascal Compiler and Python IDLE because they are easy and free to install and use. Important differences between Pascal and Python are: • In Pascal, case (uppercase or lowercase) is not important; in Python, case is important. • In Pascal, indentation is good practice to aid understanding of the source code; in Python, the correct use of indentation is essential to the correct operation of the program. • Pascal is a compiled language; a compiler is used to translate the source code into machine code. Python is an interpreted language; an interpreter is used to translate and run the source code directly. Similarities of high-level languages To see how similar high-level languages are, look at this example from Caribbean Travel Services. At CTS a bus operates the same route two times per day. The number of passengers on each journey is recorded. Create a program to get the two numbers from the driver, add them together and display the total for the day. The algorithm from Chapter 9 Write 'Please give the number of passengers on the first journey’ Read the first number Write 'Please give the number of passengers on the second journey' Read the second number Calculate the total = first number + second number Write 'The total number of passengers on the route today was ' Write the total In the Pascal programming language the program is: PROGRAM SimpleAdd; VAR firstNumber : INTEGER; secondNumber : INTEGER; total : INTEGER; BEGIN WRITELN ('A simple program to add the number of passengers on two journeys.'); WRITELN ('Please give the number of passengers on the first journey '); READ (firstNumber); WRITELN (firstNumber); WRITELN ('Please give number of passengers on the second journey '); READ (secondNumber); WRITELN (secondNumber); total := firstNumber + secondNumber; WRITELN ('The total number of passengers is ',total); READLN; END. 286 9781380023322_text.indd 286 31/10/2019 11:22 10 • Program implementation In the ‘C’ programming language the program is: #include<stdio.h> int main() { int firstNumber; int secondNumber; int total; printf("Please give the number of passengers of the first journey\n"); scanf("d", &firstNumber); printf("Please give the number of passengers on the second journey\n"); scanf("d", &secondNumber); total = firstNumber + secondNumber; printf("Sum of the numbers = %d\n", total); return 0; } In the Python programming language the program is: print ('a simple program to add the number of passengers on two journeys') print ('Please give the number of passengers on the first journey ') firstnum = input('Enter first number: ') print ('Please give the number of passengers on the second journey ') secondnum = input('Enter second number: ') total = int(firstnum) + int(secondnum) print ('The total number of passengers is ', total) • Identify similarities between the programs. • Discuss each program to decide which is easiest to understand. We hope you agree that these three programming languages all have similar features. ITQ 10.4 Arrange the following into the correct order to implement a program: • Translate source code into machine code • Create source code • Maintain the program • Execute the program Development environment program A development environment program will look a little like a word processor when it runs, so we can just start typing our source code. All development environments have enhanced features that will help you to write correct source code. One of the ways it may do this is by displaying colourcoded text and automatic indentation which help you to better understand the syntax of the language. A good development environment may also suggest what needs to come next for correct code. For example, ‘IF’ must have a following ‘THEN’ in Pascal. Figure 10.2 The simple, easy-to-use Python IDLE interface showing coloured text A programmer must be aware of the reserved words and grammatical rules of any programming language they choose to use. 287 9781380023322_text.indd 287 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Reserved words ▶ Syntax ▶ ITQ 10.5 What are reserved words in a programming language? The reserved words in a programming language have specific meaning and use. It shouldn’t come as any surprise that some reserved words appear in most programming languages. For example: IF THEN ELSE REPEAT UNTIL BEGIN END AND OR NOT The syntax rules of each language define how the reserved words should be used. They help define the grammar of the language. Syntax is a set of rules defining the structure of statements in a programming language. It is not necessary to memorise all the reserved words and syntax rules of a language but you should have a reference help page or instruction book to hand so you can easily look them up. Help pages for a language summarise all the reserved words and syntax rules on one or two pages. Get a printout of the help pages for the language you are using from your teacher. Having written your source code in a programming language, you will need to translate, or compile, it in order for it to be executed by a computer. Step 2: Translating source code Earlier in this chapter we saw that the microprocessor of a computer system can execute only machine code, for example: 00110010 00001110 00010010 00000000 So, how do instructions written in a high-level language like Pascal end up as machine code? How does this: WRITELN ('Please give your first number'); become this: 00110010 00001110 00010010 00000000 Translator ▶ Compiler ▶ Interpreter ▶ The answer is that we need a translator. A translator converts one language into another. A compiler is a special translator that converts high-level language into machine code. An interpreter is a translator that converts and executes high-level language in one step. The development environment for a high-level language will have a Compile option or a Run option. Look for ‘Compile’ or ‘Run’ on a menu or a toolbar. Pascal is a compiled language and so uses ‘Compile’; Python is an interpreted language and so uses ‘Run Module’. 288 9781380023322_text.indd 288 31/10/2019 11:22 10 • Program implementation (a) (b) Figure 10.3 Example of a Run option and a Compile option in different development environments: (a) Free Pascal Compiler, (b) Python IDLE Syntax error ▶ ITQ 10.6 State why a compiler is needed in program development. The first role of the compiler or interpreter is to check that the high-level source code is correct according to the syntax rules of the language. A syntax error is an error in how the statements in source code are written in a particular program. When a syntax error occurs the compiler will stop and report the error back to the user. Compilers will check the whole program and so will report all the syntax errors at the end of the compilation. Interpreters will stop and report a syntax error as soon as it is detected. Either way the syntax errors have to be corrected and a compiler will try to help you find and correct the error. Here are some examples of compiler error messages: Error message Example Illegal use of ‘:’ You typed READLN (firstNumber): instead of READLN (firstNumber); Comparative operator must return a Boolean value You typed IF (num1 > num2 < num3) THEN instead of IF ((num1 > 2) AND (num2 < num3)) THEN Only one variable can be initialised You typed firstNumber, secondNumber : INTEGER; instead of firstNumber : INTEGER; secondNumber : INTEGER; Illegal expression You typed IF (num1 ( > num2)) THEN instead of IF (num1 > num2) THEN ITQ 10.7 Which TWO of the following sentences use correct English syntax? • Come for a visit I have plenty of snacks. • This car is dusty, filthy and smelly. • Come for a visit! I have plenty of snacks. • This car is dusty filthy and smelly. Table 10.1 Typical syntax errors Unfortunately not all compiler error messages will be this easy to understand and they may be very technical. Don’t worry; just look at your source code, find the error and correct it. Repeat the compile process, correcting errors, until the compiler returns a: ‘Compile successful: Press any key’ or similar message. 289 9781380023322_text.indd 289 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Step 3: Executing a program At this point the compiler has successfully taken your high-level source code, checked that it is free from syntax errors, translated it into machine code, and put the result in an executable file, for example: SimpleAdd.exe. If your development environment used a ‘Compile and Run’ or ‘Run’ option, your program will have started to run automatically. In Pascal the program no longer needs the development environment. You could double-click on the executable file (SimpleAdd.exe) and your program will run just like any other application program on your system. If you are using Pascal ask your teacher where to find the SimpleAdd.pas and the SimpleAdd.exe file on the school’s computer systems; remember that: • a .pas file contains the Pascal source code • a .exe file contains the executable code. Figure 10.4 A folder showing a source code file (.pas) and an executable file (.exe) ITQ 10.8 State why you cannot execute Pascal source code. As programs become more complex they may need to use facilities provided by the operating system. For example, if your program wants to read input from a data file instead of the keyboard then the operating system needs to be involved. Remember that back in Chapter 1 we defined an operating system as a collection of software that manages computer hardware resources and provides common services for computer programs. If your program needs the services provided by the operating system, like opening a file, you need to ‘Compile and Link’ instead of the simple ‘Compile’ ‘Compile and Link’ compiles the program and links it to the operating system. However, none of the simple programs in this book needs the services provided by the operating system. Your program is running. It is now time to test and document the program. A very simple program like Simple Add does not need extensive testing or documentation but for larger, more complex programs testing and documentation are important stages in program development. They are so important that they are dealt with in their own sections later in this chapter. The last step in the sequence of steps in implementing a program we identified earlier is maintenance of the program. 290 9781380023322_text.indd 290 31/10/2019 11:22 10 • Program implementation Maintaining a program Corrective maintenance ▶ Adaptive maintenance ▶ ITQ 10.9 When a program has been written, compiled, tested and documented it enters a maintenance phase. This maintenance phase continues until the program is no longer needed. Maintenance is of two types: corrective and adaptive. Corrective maintenance is fixing program bugs or flaws in the program. Adaptive maintenance is implementing new features or changing the way a particular feature works. What sort of maintenance is needed if a bug is found in a program? Performing checks and tests on programs to verify correctness A critical part of program implementation is testing. Failure of a program can have catastrophic results. Here is such an example: On June 4, 1996 an Ariane 5 rocket exploded just 40 seconds after its lift-off from Kourou, French Guiana. The development of the rocket cost $7 billion. The rocket and its cargo were valued at $500 million. The cause of the failure was a software error in the guidance system. A 64-bit floating point (real) number was converted to a 16-bit integer. The resulting number was larger than 32,767, the largest integer storable in a 16-bit integer. Figure 10.5 Photos show the maiden flight of the Ariane 5 rocket, at lift off, and its catastrophic explosion less than a minute later – caused by program failure To avoid this type of catastrophic failure when developing a program, always check and test at every stage during development and implementation. In Chapter 9, ‘Problem-solving and program design’, the testing process began. The design of the algorithm was rigorously tested by desk checking, dry running and using trace tables. 291 9781380023322_text.indd 291 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Types of errors: syntax, logical and run-time In this chapter the concern is about three types of potential errors: syntax, logic and run-time errors. Remember: a syntax error is an error in the structure of the source code. In the example below there is a missing '(' character: WRITELN 'Please give your second number'); logic error ▶ A logic error is a mistake in the design of the program. In this example a mark of only 25 is given a pass and a mark of 80 is given a fail: IF mark <= 40 THEN PRINT ‘Pass’ ELSE PRINT ‘Fail’ ENDIF Run-time error ▶ Could you correct this error? A run-time error is a program error that occurs during program execution. For example: The Ariane 5 rocket disaster was caused by a run-time error. Run-time errors are detected during execution and usually cause the program to terminate abnormally. Input data values and/or variable declarations are usually the cause of run-time errors. The source code may not need to be changed, only the data. R Create source code Compile Link S Syntax errors are detected during compilation. The programmer must go back to the source code and correct the statement containing the error before the process can continue through to the end. ITQ 10.10 Give one difference between a syntax error and a logic error. Execute Maintain L Logic errors are detected during execution. Unlike syntax errors that cause the compilation process to be aborted, a logic error has no such effect. The programmer will detect that a logic error exists when the program produces results that are unexpected. S/he must go back to the source code and locate and correct the statement containing the error before the process can continue through to the end. Figure 10.6 Detecting and correcting syntax, logic and run-time errors in source code 292 9781380023322_text.indd 292 31/10/2019 11:22 10 • Program implementation Testing and test data Test data ▶ ITQ 10.11 Why does a program need to be tested with extreme values? Knowing the types of errors that can occur in a program is not enough. You need to understand how to detect and eliminate all errors in a program. Test data is used to test an algorithm and to test a program when it has been implemented. Test data is a set of data values selected to test a computer program. Test data is used for positive testing when the data values entered are what might be expected during normal operation; in this case the anticipated result should be output. Test data is also used for negative testing; in negative testing the data values entered are unusual, extreme, exceptional or unexpected, and the question is: Does the program still produce the expected output? Test data should be selected to test all the paths through the program. For test data to be useful the expected output must be known before the test data is input. Example, the Simple Add program (get two numbers, add them together and display the total): Positive testing Negative testing Input 3 4 1304 2858 -37 47 -17 -21 Input 1000 2000 0 0 -1000 -2500 2000000000 2000000000 Expected output 7 4162 10 -38 3.5 4.5 Two seven Figure 10.7 Positive and negative tests for SimpleAdd Expected output 3000 0 -3500 What did you expect here? Does your program accept numbers this big? What did you expect here, 8.0? Does your program accept real numbers? What did you expect here, nine? Did your program perform a validation ‘data type check’ on the inputs? (see Chapter 2) Earlier in this chapter the problem was introduced as simply ‘a program to get two numbers from the user, add them together and display the result’. A more detailed understanding of the problem would have defined the problem like this: Create a program to get two whole, numeric numbers in the range −10,000 to 10,000 from the user, add them together and display the result. Note: • whole numbers because we declared the numbers as integers • numeric because your program cannot accept text numbers like ‘two’ or ‘seven’ • in the range −10000 to 10000 because that is a good range for an integer. (The actual range is 216 = 65536 which is −32768 to 32767.) Fully understanding the problem to be solved and being able to fully define the problem will always lead to a better solution. Testing the program against the test data simply involves repeatedly running the program with values from the test data and checking that the results produced correspond to the expected results. 293 9781380023322_text.indd 293 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Debugging techniques Debugging ▶ Debugging is the process of finding and removing errors from computer hardware or software. The origin story for the term ‘debugging’ goes that the original ‘bug’ in debugging was a moth discovered stuck in a relay (an electrically operated switch) of an early computer; to correct the problem the programmers had to ‘debug’ (remove the bug from) the system. We saw that the first opportunity to debug a program occurs at the program design stage. During development the algorithm was rigorously tested by desk checking, dry running, and using trace tables and test data. You should now realise just how important that stage was, because errors not found in the algorithm will progress into the program, where they are more difficult and time-consuming to correct. The second opportunity to debug a program is at compilation. The compiler will identify any syntax errors (errors in the syntax or ‘grammar’ of the programming language) so that they can be eliminated. Successful compilation does not mean that the program is correct – only that it contains no syntax errors. Logic errors are more difficult to detect because the program operates – it does not terminate abnormally (or crash), but produces incorrect or undesired output. The presence of a logic error may be revealed during testing, particularly if an extensive, well-thought-out set of test data is used. If specific input test data produces an unexpected result then a dry run of the program producing a trace table can be used to locate the logic error. Desk checking and dry running a program are exactly the same procedures as for an algorithm. We covered dry running an algorithm in Chapter 9, Problem-solving and program design. As your programs become more complex and the dry run trace tables become larger, it may become impossible to create a manual trace table. In these circumstances the program development environment can help. Look for an option to ‘Debug’. (a) (b) Figure 10.8 Example of Debug options in different development environments. (a) Free Pascal Compiler, (b) Python IDLE Different program development environments have different debugging facilities so you will need to check the documentation for the development environment you are using. We now look at the final type of error – a run-time error. Remember that a run-time error is a program error that occurs during program execution. Run-time errors may be caused by an error in the program but they may also be caused by an external error, for example: • a faulty keyboard being used to provide input data • a hardware fault on a storage device. 294 9781380023322_text.indd 294 31/10/2019 11:22 10 • Program implementation ITQ 10.12 State THREE types of errors that can occur in a program. Good validation checks (see Chapter 2) may be able to detect corrupt input data produced by a faulty keyboard. While such checks are not able to correct the error the user will be alerted to a problem and the program will be suspended, without crashing, while the problem is investigated and corrected. Recall that in Chapter 1 we discussed the option of installing computer hardware components, such as power supply units, in pairs, so that a hardware failure does not affect the running of the computer system. This ‘built-in redundancy’ can help prevent run-time errors that would otherwise have been caused by hardware failure. Declaring variables and constants using basic data types Chapter 9 introduced the data types for developing algorithms. The main ones are: Data type Possible values that can be taken Examples Integer Any whole number 0, –27, 540 Real or floating point Any decimal number 13.5, 3.1472, –8.0 Character A single value from the ASCII* character set ‘D’, ‘k’, ‘#’ String Multiple characters ‘Frank’, ‘Ruth’, ‘925–0000’ Boolean One of two possible values True/False, Yes/No *Note: ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication. Table 10.2 Main data types in algorithms The syntax of different programming languages allows many data types. In Pascal for example the following data types can be used: Name Type of data Examples String Text ‘New York’, ‘Evan’ Integer Whole numbers 3, –6, 1024 Real Decimal numbers 3.14, 503.2 Boolean True or false TRUE, FALSE Character Single character ‘A’, ‘E’ Table 10.3 Overview of common Pascal data types When a string is declared in Pascal, it is usually given a length: ITQ 10.13 What is the difference between a) an integer and a real number b) a character and a string? For example: town : STRING[25]; means that the variable ‘town’ is large enough for 25 characters. 295 9781380023322_text.indd 295 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Translating algorithmic statements into high-level language syntax ITQ 10.14 Watch this video about simple programming using Python. What does IDE stand for? This section looks at taking a simple algorithm and writing high-level language source code. The foundations for this have been laid throughout Chapter 9 and earlier in this chapter. The syllabus states that ‘no particular programming language will be assumed’, so there is no need to memorise a particular language syntax or reserved words. Remember that you should always have a language help sheet on your desk when programming. You are advised to try out solutions to a variety of different problems on a computer using a programming language of your choice. In Chapter 9 you learnt how to develop algorithms using: 1 A sequence of instructions 2 Loops a FOR loops for looping a fixed number of times b REPEAT UNTIL loops for looping until a condition is met (executes the instructions in the loop at least once) c WHILE DO loops for looping while a condition is met (executes the instructions in the loop 0 or more times) 3 Decisions a IF-THEN decisions simply decide whether the instructions in the decision are executed or not b IF-THEN-ELSE decisions decide which of two sets of instructions will be executed, the IF instructions or the ELSE instructions. The method we will follow: The algorithms developed in Chapter 9 will be developed into Pascal and Python source code. In order to provide a complete overview of the whole process of program development, the problem definition, IPO chart, algorithm, pseudocode, flowchart, Pascal and Python source code, test data and documentation are included. Detailed discussion of the documentation for more complex programs is included in a later section, but for these simple programs the documentation is straightforward. If you are using another language you should ask your teacher to provide the source code for these examples for you to work with. Following the overview of the process you practise the programming process for the CTS problem (which is ideal for teacher-guided classwork), as an extension exercise, an algorithm is provided for you to translate into program code. This is followed by an activity for your company. Note that you should complete each activity before moving on as this will help to ensure that you understand how to translate different types of algorithms into your chosen programming language source code. Assignment statements and input/output in a sequence of instructions You will be used to assignment statements because they are used all the time in mathematics. For example, X = 5, means assign the value 5 to X; X now contains 5. Here is an example of a program that uses assignment statements and input/ output statements to solve a simple problem. 296 9781380023322_text.indd 296 31/10/2019 11:22 10 • Program implementation At Caribbean Travel Services a bus operates the same route two times per day. The number of passengers on each journey is recorded. Create a program to get the two passenger numbers from the driver, add them together and display the total result. The IPO chart: Input first number second number Processing Output total = first number + second total = first number + second number number The algorithm, pseudocode, flowchart, Pascal and Python program source code: Algorithm Write 'A simple program to add the number of passengers on two journeys.' Write 'Please give first number of passengers on the first journey ' Read the first number Write 'Please give the number of passengers on the second journey ' Read the second number Calculate the total = first number + second number Write 'The total number of passengers is ' Write the total Pseudocode WRITE 'A simple program to add the number of passengers on two journeys.' WRITE 'Please give first number of passengers on the first journey ' READ firstNumber WRITE 'Please give the number of passengers on the second journey ' READ secondNumber total = firstNumber + second Number WRITE 'The total number of passengers is ' WRITE the total Pascal program PROGRAM SimpleAdd; VAR firstNumber : INTEGER; secondNumber : INTEGER; total : INTEGER; BEGIN WRITELN ('A simple program to add the number of passengers on two journeys.'); WRITELN ('Please give the number of passengers, between 1 and 100, on the first journey '); READ (firstNumber); WRITELN (firstNumber); WRITELN ('Please give number of passengers, between 1 and 100, on the second journey '); READ (secondNumber); WRITELN (secondNumber); total := firstNumber + secondNumber; WRITELN ('The total number of passengers is ',total); WRITELN ('Press Enter to finish.'); READLN; END. Flowchart Begin Output ‘welome’ prompt first number Input first number Output prompt second number Input second number Total = first number + second number Output total End 297 9781380023322_text.indd 297 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Python program print ('a simple program to add the number of passengers on two journeys') print ('Please give the number on passengers, between 1 and 100, on the first journey ') firstnum = input('Enter first number: ') print ('Please give the number on passengers, between 1 and 100, on the first journey ') secondnum = input('Enter second number: ') total = int(firstnum) + int(secondnum) print('The total number of passengers is ', total) Figure 10.9 Typical results from the Simple Add program The result of running this program is shown in Figure 10.9. This version was created running the Python program in the IDLE environment. Your results may be displayed in a different way. >>> RESTART: simpleadd.py a simple program to add the number of passengers on two journeys Please give the number on passengers, between 1 and 100, on the first journey Enter first number: 78 Please give the number on passengers, between 1 and 100, on the first journey Enter second number: 89 The total number of passengers is 167 >>> User documentation: This is a Caribbean Travel Services program. At the end of the day drivers should record the number of passengers carried on each of their two journeys. Drivers will be asked for the passenger numbers and the program prints the sum of the numbers. Limitations: The input numbers must be numeric integers in the range 0 to 100, e.g. 12 or 58. Test data: This is a simple program, so test data will include just a few examples of expected input values and a few examples of more extreme and unexpected values. Notice that in the user documentation we limited the input values to numeric integer values in the range 0 to 100. For test data values that do not meet this criteria, the expected result will be a run-time error. Input values Reason Expected result Actual result 40, 52 typical values 92 92 24, 66 typical values 90 90 −10000, −15000 extreme values error −25000 4.6, 32.8 incorrect values error error 106 two, five invalid type error error 106 Table 10.4 Test data for testing the Simple Add program 298 9781380023322_text.indd 298 31/10/2019 11:22 10 • Program implementation Input, compile, correct, run and test the Simple Add program 1 Use the Pascal or Python code on the previous page, or convert the pseudocode algorithm into a high-level language of your choice. 2 Use a program development environment to type in the source code program. 3 Compile the source code using the ‘Compile’, ‘Compile and Link’ or ‘Run’ option. 4 Correct any syntax errors that might occur. 5 Run or execute the program using the ‘Run’ option in the development environment. 6 Test the program with the test data provided above. EXTENSION ACTIVITY 10.2 Demonstrating a sequence of instructions Use the above example as a starting point, develop an algorithm and implement a program to solve the problem: A program to get three numbers from the user, add them together and display the result. ACTIVITY 10.3 Input, compile, correct, run and test the Simple Add program for your own company Use the company you created in earlier activities or use the St Luago Fashion company. At the end of the day all three stores report their takings to head office. In an earlier activity (Activity 9.5) you created an algorithm to input the three values, add them together and output the total. • Convert the pseudocode algorithm into a high-level language of your choice. • Use a program development environment to type in the source code program. • Compile the source code using the ‘Compile’, ‘Compile and Link’ option or ‘Run’ option. • Correct any syntax errors that might occur. • Run or execute the program using the ‘Run’ option in the development environment. • Test the program with the test data. • Create the user documentation for this program. Syntax for iteration (loops): demonstrating a FOR loop Now we will demonstrate a FOR loop for looping a fixed number of times. Here is an example of a program that uses a FOR loop to solve a simple averaging problem. At Caribbean Travel Services a bus operates the same route 25 times per day. The number of passengers on each journey is recorded. Create a program to get the 25 numbers from the driver, calculate the average and display the average result. 299 9781380023322_text.indd 299 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming The IPO chart for the Simple Average algorithm: Input 25 numbers from user Processing total = 0 Do the following 25 times Begin the loop Get the next number total = total + number End of the loop Calculate the average = total/25 Output average The algorithm, pseudocode, flowchart, Pascal and Python program source code: Algorithm Flowchart Write ‘A simple program to average the number of passengers on 25 bus journeys.’ total = 0 Do the following 25 times Write 'Please give the next passenger number ' Read the number total = total + number Calculate the average = total/25 Write 'The average number of passengers is ' Write the average Pseudocode BEGIN WRITE 'A simple program to average the number of passengers on 25 bus journeys.' total = 0 FOR counter = 1 TO 25 DO WRITE 'Please give the next passenger number, between 0 and 100 ' READ the number total = total + number END FOR average = total/25 WRITE 'The average number of passengers is ' WRITE the average END Begin Output ‘welcome’ Total = 0 counter = 0 Output prompt for number No Input number Total = total + number counter = count + 1 Counter == 25 Yes Average = total/25 Output average End 300 9781380023322_text.indd 300 31/10/2019 11:22 10 • Program implementation Pascal program PROGRAM SimpleAverage; VAR currentNumber : REAL; total : REAL; average : REAL; counter : INTEGER; BEGIN WRITELN ('A simple program to find the average number of passengers on 25 journeys.'); total := 0; FOR counter := 1 TO 25 DO BEGIN WRITELN ('Please give the number of passengers, between 0 and 100 for journey ', counter); READ (currentNumber); WRITELN (currentNumber:10:0); total := total + currentNumber; END; average := total/25; WRITELN ('The average of these 25 numbers is ', average:10:2); WRITELN ('Press Enter to finish.'); READLN; END. Python program print ('A simple program to find the average number of passengers on 25 journeys.') total = 0 counter = 0 numpassengers = 0 average = 0 for counter in range (0, 25): numpassengers = input('Please give the number of passengers ') total = int(numpassengers) + int(total) counter = counter + 1 average = total/counter print ('The average number of passengers is ',average) User documentation: This is a Caribbean Travel Services program. At the end of the day drivers should record the number of passengers carried on each of the 25 journeys. Drivers will be asked for the numbers and the program prints the average of the numbers. Limitations: The input numbers must be numeric integers in the range 0 to 100, e.g. 12 or 48. Test data: This is a simple program so test data will include a few examples of expected input values and a few examples of more extreme and unexpected values. Notice that in the user documentation we limited the input values to numeric integer values in the range 0 to 100. For test data values that do not meet this criterion the expected result will be a run-time error. 301 9781380023322_text.indd 301 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Input values Reason Expected result Actual result 4, 6, 4, 6, 4, 6, 4, 6, 4, 6, 4, 6, 4, 6, 4, 6, 4, 6, 4, 6, 5, 5, 5, 5, 5 typical values 5 5 error 6.84 (correct) unexpected values 2.2, 3.6, 18.5, 5.1, 19.4, 20.6, 3.0, −34.0, 16.5, −4.5, 13.8, 3.4, 65.2, 5.9, −45.6, −4.0, 56.2, 6.2, 7.2, −1.0, −99.4, 5.7, 32.7, 18.0, 56.3 −20000,−20000,−20000, −20000,−20000,−20000, −20000,−20000,−20000, −20000,−20000,−20000, −20000,−20000,−20000, −20000,−20000,−20000, −20000,−20000,−20000, −20000,−20000,−20000, −20000 extreme values −20000 −20000 two, five, … invalid type error error 106 Table 10.5 Test data for testing the Simple Average program. Input, compile, correct, run and test the Simple Average program • Use the Pascal or Python code above, or convert the pseudocode algorithm into a high-level language of your choice. • Use a program development environment to type in the source code program. • Compile the source code using the ‘Compile’, ‘Compile and Link’ option or ‘Run’ option. Run or execute the program using the ‘Run’ option in the development environment. • Correct any syntax errors that might occur. Create the user documentation for this program. • Run or execute the program using the ‘Run’ option in the development environment. • Test the program with the test data provided above. EXTENSION ACTIVITY 10.4 Demonstrating a sequence of instructions Copy the above example and modify it to deal with 10 numbers instead of 25. Make sure that you modify: • the program definition • the IPO chart • the pseudocode algorithm or flowchart • the source code program • the user documentation • the test data 302 9781380023322_text.indd 302 31/10/2019 11:22 10 • Program implementation ACTIVITY 10.5 Input, compile, correct, run and test the Simple Average program Use the company you created in earlier activities or use the St Luago Fashion company. At your company, at the end of the week each branch needs to average the five days takings. In an earlier activity (Activity 9.5) you created an algorithm to input the five values, calculate the average and output the average. (Use a loop.) 1 Convert the algorithm into pseudocode or a flowchart. 2 Convert the pseudocode algorithm into a high-level language of your choice. 3 Use a program development environment to type in the source code program. 4 Compile the source code using the ‘Compile’, ‘Compile and link’ option or ‘Run’ option. 5 Correct any syntax errors that might occur. 6 Run or execute the program using the ‘Run’ option in the development environment. 7 Test the program with test data. 8 Create the user documentation for this program. Syntax for iteration (loops): demonstrating a REPEAT UNTIL loop Now we will look at a REPEAT UNTIL loop for looping an unknown number of times but at least once. Here is an example of a program using a REPEAT UNTIL loop to solve a simple problem. CTS sometimes runs more buses than scheduled on a route on busy days. On these occasions we don’t know how many journeys there will be or what the passenger numbers will be. The problem is to read in numbers until a 0 is entered and then calculate the average. The IPO chart for the Repeat Average algorithm: Input Processing Output average total = 0 a set of passenger numbers input by user and counter = 0 Repeat terminated by a 0 Get the next passenger number total = total + number counter = counter + 1 Until number is equal to 0 counter = counter − 1 Calculate the average = total/counter Write the average 303 9781380023322_text.indd 303 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming The algorithm, pseudocode, flowchart, Pascal and Python program source code: Algorithm Flowchart total = 0 counter = 0 Repeat Get the next passenger number total = total + number counter = counter + 1 Until number is equal to 0 counter = counter – 1 because we counted the ‘0’ Calculate the average = total/counter Write the average Pseudocode BEGIN total = 0 counter = 0 REPEAT WRITE 'Please give the number of passengers.' READ the next passenger number total = total + number counter = counter + 1 UNTIL number = 0 counter = counter – 1 because we counted the ‘0’ Calculate the average = total/counter WRITE 'The average number of passengers is ' WRITE average END Begin Output ‘welcome’ Total = 0 counter = 0 Output prompt for number No Input number Total = total + number counter = count + 1 Number = 0 Yes Counter = counter – 1 Average = total/counter Output average End 304 9781380023322_text.indd 304 31/10/2019 11:22 10 • Program implementation Pascal program source code PROGRAM RepeatAverage; VAR currentNumber : INTEGER; total : REAL; average : REAL; counter : INTEGER; BEGIN WRITELN ('A simple program to read in the number of passengers '); WRITELN ('terminated by 0 and to output the average'); total := 0; counter := 0; REPEAT BEGIN WRITELN ('Please give your next number of passengers, between 1 and 100. Enter 0 to end.'); READ (currentNumber); WRITELN (currentNumber); total := total + currentNumber; counter := counter + 1; END UNTIL (currentNumber = 0); (* Note to programmer: need to take one off the counter because we counted the 0 *) counter := counter − 1; average := total/counter; WRITELN ('The average number of passengers on these ', counter, ' journeys '); WRITELN ('is ', average:10:2); WRITELN (‘Press Enter to finish.'); READLN; END. Python program print ('A simple program to read in the number of passengers ') print ('terminated by 0 and to output the average') total = 0 counter = 0 numpassengers = 999 average = 0 while (int(numpassengers) != 0): numpassengers = input('Please give the number of passengers ') total = int(numpassengers) + int(total) counter = counter + 1 counter = counter – 1 average = total/counter print ('The average number of passengers on these ', counter, ' journeys is ', average) User documentation: This is a Caribbean Travel Services program. At the end of the day drivers should record the number of passengers carried on each of the many journeys. Drivers will be asked for the numbers and should enter 0 to indicate the last of the journeys. The program prints the average number of passengers carried on the journeys. Limitations: The input numbers must be numeric integers in the range 0 to 100, e.g. 12 or 58. 305 9781380023322_text.indd 305 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Test data: This is a simple program so test data will include a few examples of expected input values and a few examples of more extreme and unexpected values. Notice that in the user documentation we limited the input values to be numeric integer values in the range 0 to 100. For test data values that do not meet this criteria the expected result will be a run-time error. Input values Reason Expected result Actual result 4, 5, 0 typical values 4.5 4.5 24, 66, 96, 0 typical values 62 62 –15459.67, –23567.84,0 extreme/unexpected values –19513.76 –19513.76 two, five, zero invalid type error error 106 Table 10.6 Test data for testing the Repeat Average program. Input, compile, correct, run and test the Repeat Average program. Input the source code in your chosen development environment, compile the source code correcting any syntax errors that may occur. Run and test the program using suitable test data. EXTENSION ACTIVITY 10.6 Demonstrating a REPEAT UNTIL loop Use the above example as a starting point. Drivers reported that sometimes the bus is empty and so when they input 0 the program finishes when it should not. To improve the program, develop an algorithm and implement a program to solve the same problem but terminating on the value –99 instead of 0. What needs to be done to the total to make sure that –99 is not included in the total? Test your program with the test data: 20, 30, 40, –99. The result should be 30. ACTIVITY 10.7 Input, compile, correct, run and test the Simple Add program Use the company you created in earlier activities or use the St Luago Fashion company. Your company has started attending markets during the week. The number of markets varies. In an earlier activity (Activity 9.5) you created an algorithm to input the takings at each market, add them together and output the total. (Use a loop.) 1 Convert the algorithm into pseudocode or a flowchart. 2 Convert the pseudocode or flowchart into a high-level language of your choice. 3 Input, compile, correct, run, test and document this program. 306 9781380023322_text.indd 306 31/10/2019 11:22 10 • Program implementation Syntax for iteration (loops): demonstrating a WHILE DO loop We now demonstrate a WHILE DO loop for looping an unknown number of times, maybe zero. Now we will look at a WHILE DO loop for looping an unknown number of times, maybe zero. Here is an example of a program using a WHILE DO loop to solve a simple problem. CTS installs crash detection systems to its vehicles. The problem is to read from an object detection sensor, and while no object is detected, to keep the power on and brakes off. The IPO chart: Input object present or absent Processing While noObject is true Begin power = on brakes = off End brakes = on power = off Output power brake The algorithm, pseudocode, flowchart, Pascal and Python program source code: Algorithm Flowchart Write 'A simple program to stop a vehicle if an object is detected.' Get the value of the object detected sensor While object detected is 'no' do Write 'power on' Write 'brakes off' Write ‘Please give result of object detection yes or no’ Get the next value of object detected Write 'STOP!' Write 'power on' Write 'brakes off' Begin Output ‘welcome’ Object detected = ‘N’ Output ‘power ON’ ‘power OFF’ Prompt for Y or N Pseudocode BEGIN WRITE 'A simple program to stop a vehicle if an object is detected.' READ the value of the object detected sensor WHILE object detected = 'no' DO WRITE 'Power ON' WRITE 'Brakes OFF' WRITE 'Please give result of object detection Y or N' READ the next value of object detected WRITE 'STOP!' WRITE 'Power OFF' WRITE 'Brakes ON' END Yes Input object detected Object detected =N No Output ‘STOP’ ‘power OFF’ ‘brakes ON’ End 307 9781380023322_text.indd 307 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Pascal program PROGRAM crashdetection; VAR objectDetected : CHAR; enterDummy : CHAR; BEGIN WRITELN ('A simple program to model a crash prevention system'); objectDetected := 'N'; WHILE (objectDetected = 'N') DO BEGIN WRITELN ('Power ON'); WRITELN ('Brakes OFF'); WRITELN ('Please give result of object detection: Y for object detected otherwise N '); READ (objectDetected); (* This is a comment. It is used to add notes to aid understanding of the program. *) (* Programmer note: read in the press of the Enter key because this is *) (* an input character that is coming from the keyboard *) READ (enterDummy); END; WRITELN ('EMERGENCY STOP! EMERGENCY STOP! EMERGENCY STOP!'); WRITELN ('Power OFF'); WRITELN ('Brakes ON'); WRITELN ('Press Enter to finish.'); READLN; END. Python program print ('A simple program to model a crash detection system.') objectDetected = input('Please give result of object detection: Y for object detected otherwise N ') while (objectDetected == 'N'): print ('power is ON') print ('brakes are OFF') objectDetected = input('Please give result of object detection: Y for object detected otherwise N ') print ('EMERGENCY STOP! EMERGENCY STOP! EMERGENCY STOP! ') print ('power is OFF') print ('brakes are ON') User documentation: This is a Caribbean Travel Services program. CTS installs a crash detection system to its vehicles. This program models the crash detection system, which reads in from an object detection sensor and while no object is detected keeps the power on and brakes off. Limitations: The input must be ‘Y’ for ‘yes object detected’ or ‘N’ for ‘no object detected’. Test data: This is a really simple program so test data will include a few examples of expected input values and a few examples of more extreme and unexpected values. Notice that in the user documentation we limited the input values ‘Y’ or ‘N’. For test data values that do not meet this criteria the expected result will be a run-time error. 308 9781380023322_text.indd 308 31/10/2019 11:22 10 • Program implementation Input values Reason Expected result Actual result N, N, Y typical values Power ON, Brakes OFF, Power ON, Brakes OFF Emergency Stop Power OFF, Brakes ON Power ON, Brakes OFF, Power ON, Brakes OFF Emergency Stop Power OFF, Brakes ON Y typical value Emergency Stop Power OFF, Brakes ON Power OFF, Brakes ON Emergency Stop Power OFF, Brakes ON 1.3, Y invalid type Error Emergency Stop Power OFF, Brakes ON Stop, Y invalid type Error Emergency Stop Power OFF, Brakes ON Table 10.7 Test data for testing the crash detection program The 1.3, Y and Stop, Y sets of test data give an interesting outcome because the program actually performs correctly even though an invalid data type is input. This is because the program checks only for an ‘N’ to continue; any other input is interpreted like a ‘Y’. Input, compile, correct, run and test the crash detection program Input the source code in your chosen development environment, compile the source code correcting any syntax errors that may occur. Run and test the program using suitable test data. EXTENSION ACTIVITY 10.8 Demonstrating a WHILE DO loop Use the above example as a starting point, develop an algorithm and implement a program to solve the problem: Write a program to model a traffic light system. While the light is green the vehicle can go; any other colour the vehicle must stop. Syntax for conditional branching: IF-THEN decisions Here we demonstrate IF-THEN – a simple decision for deciding whether to execute instructions or not. At Caribbean Travel Services vehicles need to be serviced once they reach 100,000 kms since the last service. Consider designing a solution to the problem. Read in the vehicle’s ‘kilometres covered’ since last service and decide if a service is needed. The problem is to decide if a vehicle needs a service. The IPO chart for the Service Algorithm is: Input kms covered Processing If kms >= 100,000 service is yes Output service 309 9781380023322_text.indd 309 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming The algorithm, pseudocode, flowchart, Pascal and Python program source code: Algorithm Flowchart Write 'A simple program to see if a vehicle requires a service.' Write 'Please give the kms covered since last service.' Get the kms covered If the kms is greater than or equal to 100000 then Write 'Yes service required' Pseudocode BEGIN WRITE 'A simple program to see if a vehicle requires a service.' WRITE 'Please give the kms covered since last service.' READ the kms covered IF the kms >= 100000 THEN WRITE 'Yes service required' END Pascal program PROGRAM service; VAR kms : REAL; BEGIN WRITELN ('A simple program to see if a vehicle service is required'); WRITELN ('Please give the kms covered since last service '); READ (kms); WRITELN (kms); IF (kms >=100000) THEN BEGIN WRITELN ('YES Service required'); END; WRITELN ('Press Enter to finish.'); READLN; END. Begin Output ‘welcome’ Input ‘welcome’ Yes Number >= 100000 No Output ‘Service required’ End Python program kmsCovered = 0 print ('A simple program to see if a vehicle service has to be performed.') kmsCovered = input('Please give the kms the vehicle has covered since last service ') if int(kmsCovered) >= 100000: print('YES vehicle need a service') User documentation: This is a Caribbean Travel Services program. CTS needs to service vehicles when the kms covered since the last service equals or exceeds 100,000. This program determines if a service is required. The input is the kms covered since the last service. Limitations: The input must be a number. Test data: This is a simple program so test data will include a few examples of expected input values and a few examples of more extreme and unexpected values. For test data values that do not meet this criteria the expected result will be a run-time error. 310 9781380023322_text.indd 310 31/10/2019 11:22 10 • Program implementation Input values Reason Expected Result Actual result 34450 typical values program terminates program terminates 157082 typical values Yes service required Yes service require 0 extreme values program terminates program terminates 1000000 extreme values Yes service required Yes service required Two invalid type error error 106 Table 10.8 Test data for testing the simple service program Input, compile, correct, run and test the service program Input the source code in your chosen development environment. Compile the source code, correcting any syntax errors that may occur. Run and test the program using suitable test data. EXTENSION ACTIVITY 10.9 Demonstrating an IF-THEN simple decision Copy the above (servicetest) program source code and modify it to read in a student’s test mark and display ‘pass’ if the mark is greater than or equal to 50. ACTIVITY 10.10 Convert algorithm to source code; input, compile, correct, run and test a program Use the company you created in earlier activities or use the St Luago Fashion company. The Board of your company has decided to update underperforming branches. In an earlier activity (Activity 9.5) you created an algorithm to input the annual profit of a branch. If the profit is less than or equal to 50,000, then the output is ‘Update’. 1 Convert the algorithm to pseudocode or a flowchart. 2 Convert the pseudocode or flowchart into a high-level language of your choice. 3 Input, compile, correct, run, test and document this program. Syntax for conditional branching: IF-THENELSE decisions Here we demonstrate an IF-THEN-ELSE decision for deciding which of two blocks of instructions to execute. We can pose a variation of the problem above which results in a more useful version. In this version, users receive a clear ‘yes’ or ‘no’ answer. At Caribbean Travel Services vehicles need to be serviced once they reach 100,000 kms since the last service. Consider designing a solution to the problem; read in the vehicle’s kilometres covered since the last service and decide if a service is needed or if it is not needed. The problem is to decide whether a vehicle needs a service or not. 311 9781380023322_text.indd 311 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming The IPO chart for the Service Test algorithm is: Input kms covered Processing If kms >= 100,000 service is yes else service is no Output service The algorithm, pseudocode, flowchart, Pascal and Python program source code: Algorithm Flowchart Write 'A simple program to see if a vehicle requires a service.' Write 'Please give the kms covered since last service.' Get the kms covered If the kms is greater than or equal to 100000 then Write 'Yes service required' Else Write 'No service required' Pseudocode BEGIN WRITE 'A simple program to see if a vehicle requires a service.' WRITE 'Please give the kms covered since last service.' Yes READ the kms covered IF kms >= 100000 THEN WRITE 'Yes service required' Output ELSE Output ‘YES WRITE 'No service required' Service required’ ENDIF END Pascal program PROGRAM servicetest; VAR kms : REAL; BEGIN WRITELN ('A simple program to see if a vehicle service is required'); WRITELN ('Please give the kms covered since last service '); READ (kms); WRITELN (kms); IF (kms >=100000) THEN BEGIN WRITELN ('YES Service required'); END ELSE BEGIN WRITELN ('NO Service required on this vehicle'); END; WRITELN ('Press Enter to finish.'); READLN; END. Python program kmsCovered = 0 print (‘A simple program to see if a vehicle service has to be performed.’) kmsCovered = input(‘Please give the kms the vehicle has covered since last service ‘) if int(kmsCovered) >= 100000: print(‘YES vehicle needs a service’) else: print(‘NO service needed on this vehicle’) Begin Output ‘welcome’ Input ‘welcome’ Number >= 100000 No Output Output ‘NO Service required’ End 312 9781380023322_text.indd 312 31/10/2019 11:22 10 • Program implementation User documentation: This is a Caribbean Travel Services program. CTS needs to service vehicles when kms covered since the last service equals or exceeds 100,000. This program determines if a service is required or not required. The input is the kms covered since the last service. Limitations: The input must be a number. Test data: This is a simple program so test data will include a few examples of expected input values and a few examples of more extreme and unexpected values. For test data values that do not meet this criteria the expected result will be a run-time error. Input values Reason Expected result Actual result 34450 typical values No service required No service required 157082 typical values Yes service required Yes service require 0 extreme values No service required No service required 1000000 extreme values Yes service required Yes service required two invalid type error error 106 Table 10.9 Test data for testing the simple service test program. Input, compile, correct, run and test the service test program Input the source code in your chosen development environment. Compile the source code, correcting any syntax errors that may occur. Run and test the program using suitable test data. EXTENSION ACTIVITY 10.11 Demonstrating an IF-THEN simple decision Copy the above (service test) program source code and modify it to read in a student’s test mark and display ‘pass’ if the mark is greater than or equal to 50 and ‘fail’ if the mark is less than 50. ACTIVITY 10.12 Convert algorithm to source code; input, compile, correct, run and test a program Use the company you created in earlier activities or use the St Luago Fashion company. The Board of your company have decided to update underperforming branches. In an earlier activity (Activity 9.5) you created an algorithm to input the annual profit of a branch. If the profit is less than or equal to 50,000 then the output is ‘Update’, otherwise the output is ‘Excellent performance’. 1 Convert the algorithm to pseudocode or a flowchart. 2 Convert the pseudocode or flowchart into a high-level language of your choice. 3 Input, compile, correct, run and test this program. 313 9781380023322_text.indd 313 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Syntax for integer division: using MOD and DIV integer operations This problem demonstrates the MOD and DIV functions for integer arithmetic. Remember that: • Integers are whole numbers • DIV is the integer division operator, which discards the fractional part (remainder) of the result. For example: 5 DIV 2 produces 2 since the remainder, which is 1, is discarded • MOD is the integer remainder operator, which gives the fractional part (remainder) of the result. For example: 5 MOD 2 produces 1 since this is the remainder. The Caribbean Travel Services vehicles record the duration of any journey in minutes. A program is needed to read in a number of minutes and convert it into hours and minutes. The IPO chart for the hoursmins program is: Input Number of minutes Processing Output Hours and minutes Get the number of minutes integer divide minutes by 60 to get the hours part, (minutest DIV 60). Take the remainder of minutes divided by 60 to get the minutes part, (minutes MOD 60) The algorithm, pseudocode, flowchart, Pascal and Python program source code: Algorithm Write 'A simple program to convert minutes into hours and minutes.' Write 'Please give the number of minutes.' Get the minutes Calculate the hours part Calculate the minutes part Write the hours part Write the minutes part Pseudocode BEGIN WRITE 'A simple program to convert minutes into hours and minutes.' WRITE 'Please give the number of minutes.' READ the minutes hoursPart = minutes integer division by 60 (minutes DIV 60) minsPart = remainder of minutes integer division by 60 (minutes MOD 60) WRITE minutes, ' minutes is ', hoursPart, ' hours and ', minsPart, ' minutes' END Flowchart Begin Output ‘welome’ prompt first number Input mins Hourspart= mins DIV 60 minspart = mins MOD 60 Output hourspart minspart End 314 9781380023322_text.indd 314 31/10/2019 11:22 10 • Program implementation Pascal program PROGRAM hoursmins; VAR minutes : INTEGER; hourspart : INTEGER; minspart : INTEGER; BEGIN WRITELN ('A simple program to convert minutes into hours and minutes'); WRITELN ('Please give the number of minutes '); READ (minutes); WRITELN (minutes); hourspart := minutes DIV 60; WRITELN ('The hours part of ', minutes, ' is ', hourspart); minspart := minutes MOD 60; WRITELN ('The minutes part of ', minutes, ' is ‘, minspart); WRITELN (minutes, ' minutes is ', hourspart, ' hours and ', minspart); WRITELN ('Press Enter to finish.'); READLN; END. Python program Python does not have a DIV function; instead use int to get the integer part of a number. For example: hourspart = int(int(minutes)/60) (It is beyond the scope of this book to explain why you need two int functions here. If you are interested look up ‘type casting in Python’.) Python does not have a MOD function; instead use ‘%’ to get the remainder. For example: minspart = int(minutes)%60 minutes = 0 hourspart = 0 minspart = 0 print (‘A simple program to convert minutes into hours and minutes.’) minutes = input(‘Please give the number of minutes. ‘) hourspart = int(int(minutes)/60) minspart = int(minutes)%60 print(‘The hours part is ‘, hourspart) print(‘The minutes partUser is ‘, minspart) documentation: This is a Caribbean Travel Services program. The CTS vehicles record the duration of a journey in minutes. A program is needed to read in a number of minutes and convert it into hours and minutes. Limitations: The input must be numeric integers in the range 0 to 10000, e.g. 1204 or 1858. Test data: This is a simple program so test data will include a few examples of expected input values and a few examples of more extreme and unexpected values. Notice that in the user documentation we limited the input values to be integer numbers in the range 0 to 10000. For test data values that do not meet this criteria the expected result will be a run-time error. 315 9781380023322_text.indd 315 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Input values Reason Expected result Actual result 340 typical values 5 hours 40 minutes 5 hours 40 minutes 5748 typical values 95 hours 48 minutes 95 hours 48 minutes –10000 extreme values –166 hours and 40 minutes –166 hours and 40 minutes 15,000 invalid values error error 106 two invalid type error error 106 Table 10.10 Test data for testing the minutes to hours program Input, compile, correct, run and test the hoursmins program Input the source code in your chosen development environment, compile the source code correcting any syntax errors that may occur. Run and test the program using suitable test data. EXTENSION ACTIVITY 10.13 Demonstrating the DIV and MOD functions Copy the above (hoursmins) program source code and modify it to accept hours and display days and hours. Syntax for using constants Here we demonstrate the use of constants. Remember: a constant is an area of storage whose value cannot be changed during processing. If a value cannot be changed during processing it should be made a constant. This makes your program easier to understand because it is easier for other programmers to understand pi than 3.1416 to four decimal places. It is also good practice to use a constant because the value is defined in only one place; this makes it easy to change the value of the constant should the situation change. For example, the taxRate may have been 25% when the program was written, but it has now changed to 20%. Declare values that don’t change as constants. Converting the hoursmins program above to use constants will improve the program. Figure 10.10 Timing the journey 316 9781380023322_text.indd 316 31/10/2019 11:22 10 • Program implementation The IPO chart, algorithm, pseudocode, flowchart, documentation and test data do not change. Pascal program PROGRAM useconst; CONST minsInHour = 60; VAR minutes : INTEGER; hourspart : INTEGER; minspart : INTEGER; BEGIN WRITELN ('A simple program to convert minutes into hours and minutes'); WRITELN ('Please give the number of minutes '); READ (minutes); WRITELN (minutes); hourspart := minutes DIV minsInHour; WRITELN ('The hours part of ', minutes, ' is ', hourspart); minspart := minutes MOD minsInHour; WRITELN ('The minutes part of ', minutes, ' is ', minspart); WRITELN (minutes, ' minutes is ', hourspart, ' hours and ', minspart); WRITELN ('Press Enter to finish.'); READLN; END. Python program minsInHour = 60 hourspart = 0 minspart = 0 print('A simple program to convert minutes into hours and minutes.') minutes = input('Please give the number of minutes. ') hourspart = int(int(minutes)/minsInHour) minspart = int(minutes)%minsInHour print('The hours part is ', hourspart) print('The minutes part is ', minspart) Input, compile, correct, run and test the minutes to hours conversion using constants program Input the source code in your chosen development environment. Compile the source code, correcting any syntax errors that may occur. Run and test the program using suitable test data. The above components of programming can be combined to solve more complex problems. 317 9781380023322_text.indd 317 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Combining program elements to solve more complex problems Here we demonstrate how programming elements can be combined. At Caribbean Travel Services vehicles need to be serviced once they reach 100,000 kms since the last service. The garage needs to plan this work. Consider designing a solution to the problem. For each vehicle: • Read in the vehicle’s number of kilometres covered since the last service (terminated by 0). • Decide if a priority service is required (kms >= 120,000), a scheduled service is required (kms >= 100,000) or if a service is not needed. • If too many vehicles have exceeded 120,000 kms since the last service and need a priority service, the garage will have to open at the weekend. • Display the number of vehicles requiring a priority service, the number requiring a scheduled service and the number not requiring a service. The IPO chart for the Service Priority program is: : Input kms covered by each vehicle, terminated by a 0 Processing countPriority = 0 countService = 0else countService = 0 Repeat Get the next kmsCovered If kmsCovered >= 120000 countPriority = countPriority +1 Else If kmsCovered >= 100000 countService = countService + 1 Else countNoService = countNoService + 1 Endif Until kmsCovered is 0 Output countService Output countNoService Output countPriority Output Total number of vehicles requiring service Number of vehicles not requiring a service Number of vehicles requiring priority service 318 9781380023322_text.indd 318 31/10/2019 11:22 10 • Program implementation The algorithm, pseudocode, flowchart, Pascal and Python program source code: Algorithm regularService = 100000 priorityService = 120000 countRegularService = 0 countNoService = 0 countPriorityService = 0 Repeat Get the next kmsCovered If kmsCovered >= priorityService countPriorityService = countPriorityService + 1 Else If kmsCovered >= regularService countRegularService = countRegularService + 1 Else countNoService = countNoService + 1 Endif Endif Until kmsCovered is 0 countNoService = countNoService – 1 Output countService Output countNoService Output countPriority Pseudocode regularService = 100000 priorityService = 120000 countRegularService = 0 countNoService = 0 countPriorityService = 0 Repeat Get the next kmsCovered If kmsCovered >= priorityService countPriorityService = countPriorityService + 1 Else If kmsCovered >= regularService countRegularService = countRegularService + 1 Else countNoService = countNoService Endif Endif Until kmsCovered is 0 countNoService = countNoService – 1 Output countService Output countNoService Output countPriority Flowchart Begin countPriority = 0 countService = 0 countNoService = 0 Output ‘welcome’ Output ‘prompt for Kms’ Input Kms Yes No Kms >= 120000 Yes countPriority = countPriority +1 Yes Kms >= 100000 No countService = countService +1 countNoService = countNoService +1 Kms >= 120000 No countNoService = countNoService -1 Output countPriority countService countNoService End 319 9781380023322_text.indd 319 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming Pascal program (********************************************************************) (* Program Service Priority—This program reads in kms covered by vehicles since *) (* the last service and counts the number that require a priority service, those that *) (* require a scheduled service and the number that do not require a service yet. *) (* The program is terminated by entering a 0 kms covered. *) (* The output is the number of vehicles: *) *) (* requiring a priority service (* requiring a service *) (* not requiring a service *) (* *) (* Author: Alan Wood *) (* Date: 20/10/2019 *) (********************************************************************) (PROGRAM servicepriority; CONST priorityService = 120000; regularService = 100000; VAR kms : REAL; countPriority : INTEGER; countService : INTEGER; countNoService : INTEGER; BEGIN countPriority := 0; countService := 0; countNoservice := 0; WRITELN ('A simple program to count the number of vehicles '); WRITELN (' requiring a priority service'); WRITELN (' requiring a scheduled service'); WRITELN (' not requiring a service'); WRITELN (' '); REPEAT BEGIN WRITELN ('Enter the next vehicle’s kms covered since last service or terminate with 0'); READ (kms); WRITELN (kms:10:0); IF (kms >= priorityService) THEN BEGIN countPriority := countPriority + 1; END ELSE BEGIN IF (kms >= regularService) THEN BEGIN countService := countService + 1; END ELSE BEGIN countNoService := countNoService + 1; END; END; END; UNTIL (kms = 0); 320 9781380023322_text.indd 320 31/10/2019 11:22 10 • Program implementation (* Programmer note subtract 1 from totalNoService because we counted the 0 as a NoService *) countNoService := countNoService – 1; WRITELN ('The number of vehicles requiring a priority service is ', countPriority); WRITELN ('The total number of vehicles requiring a service is ', countService); WRITELN ('The number of vehicles NOT requiring a service is ', countNoService); WRITELN (' '); WRITELN ('Press Enter to finish.'); READLN; END. Python program # Program Service Priority—This program reads in kms covered # by vehicles since last service and counts the number that require # a priority service, those that require a scheduled service and # those that do not require a service yet. # The program is terminated by entering a 0 kms covered. # The program displays: # the number of vehicles requiring a service # the number not requiring a service # the number requiring a priority service # Author: Howard Campbell # Date: 20/10/2019 # priorityService = 120000 regularService = 100000 kmsCovered = 99 countPriority = 0 countService = 0 countNoService = 0 print ('A simple program to count the number of vehicles ') print (' requiring a priority service') print (' requiring a service') print (' that do not need a service') while (int(kmsCovered) != 0): kmsCovered = input('Please give the kms covered since last service, 0 to finish ') print (kmsCovered) if int(kmsCovered) >= priorityService: countPriority = countPriority + 1 elsif int(kmsCovered) >= regularService: countService = countService + 1 else: countNoService = countNoService + 1 countNoService = countNoService – 1 # # Programmer note subtract 1 from the countNoService because we counted the 0 as a NoService print('The number of vehicles requiring priority service is ', countPriority) print('The total number of vehicles requiring service is ', countService) print('The number of vehicles NOT requiring a service is ', countNoService) 321 9781380023322_text.indd 321 31/10/2019 11:22 • Computer Fundamentals Theory 1 Programming User documentation: This is a Caribbean Travel Services program. CTS vehicles need to be serviced once they reach 100,000 kms and need a priority service if the kms covered is greater than or equal to 120,000 since the last service. The garage needs to plan this work. This program reads in vehicles’ current kilometres covered since last service (terminated by 0). The program displays the total number requiring a priority service, the number requiring a regular service and the number of vehicles not needing a service. Limitations: The inputs must be whole numbers. Test data: This is a simple program so test data will include a few examples of expected input values and a few examples of more extreme and unexpected values. Notice that in the user documentation we limited the input values to numbers. For test data values that do not meet this criteria the expected result will be a run-time error. Input values Reason Expected result Actual result 34450, 125968, 103456, 75832, 0 typical values Total for priority service 1 Total for regular service 1 Not requiring service 2 Total for priority service 1 Total for regular service 1 Not requiring service 2 157082, 32, 0 typical values Total for priority service 1 Not requiring service 1 Total for priority service 1 Not requiring service 1 0 extreme values Total for priority service 0 Total for regular service 0 Not requiring service 0 Total for priority service 0 Total for regular service 0 Not requiring service 0 1000000, –1000000,0 extreme values Total for priority service 0 Total for regular service 1 Not requiring service 1 Total for priority service 0 Total for regular service 1 Not requiring service 1 Two invalid type error error 106 Table 10.11 Test data for testing the service priority program Input, compile, correct, run and test the service priority program Input the source code in your chosen development environment, compile the source code correcting any syntax errors that may occur. Run and test the program using suitable test data. Documenting programs effectively When a program has been implemented and tested it needs to be documented. It is important to fully document so that users can correctly operate the program and so that other programmers can easily understand the source code program. There are two types of documentation: internal documentation and external documentation. 322 9781380023322_text.indd 322 31/10/2019 11:22 10 • Program implementation Features of internal documentation Internal documentation ▶ Internal documentation is an aid to programmers trying to understand the source code. If you look at an example of a well-written program it will include all these features of internal documentation. Some of the key features of internal documentation include: • use of meaningful variable and constant names • extensive use of comments • good use of indentation to show the structure of the program • effective use of white spaces to split the code into logical parts • programmer notes explaining why the program was written in a particular way. ITQ 10.15 State two features of good internal documentation. Internal documentation along with the external documentation provides potential programmers with a means of understanding the workings of the code. This will be useful for both corrective and adaptive maintenance. Remember: corrective maintenance is fixing program bugs or flaws in the program and adaptive maintenance is implementing new features or changing the way a particular feature works. Figure 10.11 Internal documentation Features of external documentation External documentation is a manual, or instruction book, for users of the program. A good user manual will usually: • identify the context in which the program will operate • clearly identify the problem that the program solves, i.e. the clear problem definition created earlier • give clear instructions for the use of the program • identify all limitations of the program • list any error codes, conditions or messages the program may produce. Errors cause the program to terminate 323 9781380023322_text.indd 323 31/10/2019 11:22 • Computer 9 1• Computer 1 Programming Problem-solving Fundamentals Fundamentals and program design • list any warning codes, conditions or messages the program may produce. Warnings are issued when there is a problem but the program can continue to run. For example, if an input value is rejected because of a range check validation problem, the program continues to run and waits for a valid value to be input • give contact details for customer support with the program’s operation. ITQ 10.16 Suggest the main difference between internal documentation and external documentation. For programs such as Microsoft Word, the external documentation, the user manual, is hundreds of pages long and is supported by help facilities built into the program and extensive online support. A payroll program will also have an extensive user manual and built-in help features. For your simple program all that will be required is simple external documentation. ACTIVITY 10.14 Using built-in help Use the spreadsheet package you are familiar with and find the help facility. It may be called ‘Help’ or be indicated by a ‘?’ icon. 1 Lookup the SUM function. 2 Find out about pivot tables. 3 Record your findings in your notebook. Summary • Assembly and machine language are two examples of low- • Relational operators, like ‘greater than’, compare values. level languages. • Test data is selected to check that the program produces correct results in all situations. • A programming language is a set of formal grammatical rules used to write computer programs. Like natural • Program documentation consists of internal documentation languages, there are many computer languages with their own grammar (syntax) and vocabulary of reserved words. • Machine language has a vocabulary consisting of ones and zeros. • There are four steps in implementing a program: create source code, translate and/or link, execute/run program, and maintain program. and external documentation. • Internal documentation is used by other programmers who may need to understand the program ahead of implementing changes. • Good-quality internal documentation has features such as meaningful variable names, comments, indentation and effectively used white space. • An incorrectly written program may contain all of the • External documentation is a guide for end users of the following types of errors: syntax, logic and run-time. • Syntax errors occur when the grammar and syntax of the program. programming language are incorrectly used. • Programs written in high-level language must be translated to machine language. • Programs can contain loops and decisions as well as sequences of instructions. 324 9781380023322_text.indd 324 31/10/2019 11:22 10 • Program implementation Answers to ITQs 10.1 Machine code is made up of 1s and 0s and can be directly executed by processor. Assembly code is made up of simple words and numbers and has to be translated into machine code using an assembler program. 10.8 Pascal code cannot be executed because it is a high-level language. It needs to be translated, using a compiler, into machine code that can be executed. 10.2 High-level language uses ‘human-like’ syntax. 10.10 Syntax errors are detected by the compiler. Logic errors are more difficult to find but may be identified during dry run testing using a trace table. 10.3 Some of the languages you might name are Python, JavaScript, Java, C++ and Pascal. 10.4 The correct order in which to implement a program is: create source code, translate source code into machine code, execute the program and, finally, maintain the program. 10.5 The reserved words in a programming language have special meaning and are used by a compiler to create the correct source code. 10.6 A compiler is needed in program development to translate the high-level language code that humans understand into the machine code that the processor understands. 10.7 The sentences written as: ‘This car is dusty, filthy and smelly.’ and ‘Come for a visit! I have plenty of snacks.’ use correct English syntax. 10.9 Corrective maintenance is needed if a bug is found in a program. 10.11 Programs need to be tested with a variety of test data including typical values and extreme values to ensure that they work properly under all circumstances. 10.12 The three types of errors are: syntax, logical and runtime. 10.13 An integer holds whole numbers, e.g. 32; a real number holds decimal numbers, e.g. 2.56. A character holds a single character, e.g. ‘H’; a string holds a sequence of characters, e.g. ‘hello’. 10.14 Integrated development environment. 10.15 Good internal documentation will use meaningful variable names, comments, indentation, white spaces and programmer notes. 10.16 Internal documentation is to help programmers understand the source code. External documentation is to help the user to operate the program effectively. Examination-style questions: Multiple Choice Instructions: Each item in this test has four suggested responses labelled (A), (B), (C) or (D). Read each question carefully then select the most suitable response. 1) 2) Which of the following programming languages is NOT a high-level language? A) Assembly B) C C) Pascal D) Python Which of the following correctly lists the sequence of steps required to the complete implementation cycle of a program? A) create source code, translate, link, execute B) assemble code, document, translate, execute C) create source code, translate, execute, maintain D) develop algorithm, create source code, link, execute 3) All of the following tools may be used to translate a high-level program EXCEPT: A) assembler B) compiler C) editor D) interpreter 4) Which of the following errors must be corrected before a program can be executed? I logic II run-time III syntax A) B) C) D) I and II only II only II and III only III only 325 9781380023322_text.indd 325 31/10/2019 11:22 9 • Computer 1 Programming Problem-solving Fundamentals and program design 5) A program which executes but produces incorrect output may have which type of error? I logic II run-time III syntax A) B) C) D) 6) 7) I only I and II only II only III only If age and rate are numeric variables and dept is a character variable, which of the following statements is invalid? A) age = 23 B) dept = ‘A’ C) dept = ‘Sales’ D) rate = age Which of the following statements would be used to implement conditional branching in a program? A) IF value < 0 B) INPUT value C) PRINT value D) WHILE value = 0 8) Which of the following controls would be used to implement a pre-test loop in a program? A) case B) for C) repeat D) while 9) When trying to debug a program a programmer is MOST LIKELY to look at: I external documentation II internal documentation III source code A) B) C) D) I and II only II only II and III only III only 10) Which of the following will help to effectively document a program by improving its readability? I mnemonic variable names II comments white space III IV indentation A) B) C) D) I and II only II and III only II, III and IV only III and IV only Examination-style questions: Structured 1) Alexia has been asked to translate an algorithm to a program using a popular high-level programming language. a) Distinguish between a low-level language and a high-level language. [2] b) After successfully compiling the program, Alexia observed that the results produced were incorrect. i) Name the process that Alexia could use to identify, locate and correct the error. ii) Suggest the type of error that is MOST LIKELY to be present in the program. Justify your response. [1] Alexia finally managed to get the program to work correctly as the program was effectively documented. (i) Name FOUR features that might be included in the internal documentation of the program. (ii) Describe how any TWO of these features could contribute to Alexia’s understanding of the program. [4] c) d) [3] [4] Translate the following algorithm into a program using a programming language of your choice. PROMPT topUpAmount READ topUpAmount IF topUpAmount >= 100 THEN topUpAmount = topUpAmount * 1.2 WRITE topUpAmount [6] Total 20 marks 326 9781380023322_text.indd 326 31/10/2019 11:22 11 The School-Based Assessment An important part of the requirements of the syllabus is the School-Based Assessment (SBA). The SBA requires you to apply the skills you have learnt in a realistic project. In this chapter we look at some techniques for tackling the SBA and ensuring you produce a high-scoring project. We then provide you with an example SBA project which details exactly how to go about producing an SBA of the highest quality. By the end of this chapter you should be able to: ✔✔ Describe the requirements of an SBA. ✔✔ Outline the distribution of marks for components of the SBA. ✔✔ Practise the skills that must be demonstrated in the SBA. ✔✔ Assemble documentation for your SBA. SBA requirements The SBA is an important component of the CSEC® Information Technology examination, contributing up to 25% of the overall total marks. It is designed to provide students with the opportunity to demonstrate their problem-solving and programming skills as well as their ability to use office productivity tools effectively. You are required to accomplish the following: (i) Use a word processing program to enter text and images into 2 documents and formatting tools to improve the presentation of the document. (ii) Use a word processing program or a web page authoring program to create a simple web page. (iii) Use a spreadsheet program to create no more than 3 linked worksheets in a workbook. (iv) Use a database management program to create no more than 3 related tables by entering data, performing simple queries and reports. (v) Develop an algorithm and implement, test and document a program in a high-level programming language. The SBA consists of one practical project consisting of these five related components, prepared and marked by the teacher in accordance with CXC® Guidelines. The five components will cover the Specific Objectives in Sections 4, 5, 6, 7 and 8. 327 9781380023322_text.indd 327 31/10/2019 11:22 The School-Based Assessment Theory Mark scheme and key The following is a summary of the mark scheme for assessing SBA assignments. Your teacher will clearly indicate which of these marks you have achieved when your assignments are marked. Assignment 1: Word Processing (20 marks) Two documents are enough but you should include: • at least 4 formatting features from: bold, italics, underline, justification (left, right, centre, full), line spacing, superscript, subscript, font size, font style and page numbers (4 marks) • a page layout feature from: margins, page orientation, paper size or text orientation (2 marks) • importing and resizing a picture/chart/table (up to 2 marks) • text split over two or more columns (up to 2 marks) • a table that has been formatted using colour, shading or borders (up to 2 marks) • an automatic table of contents using headings. (5 marks) One document needs to be either: • an example of a mail merge. You should include: data source, primary document, insert fields and create the merge (5 marks) or • an example of a fillable form. You should include at least three of: option box, check box, date picker, dropdown list or command button. (5 marks) Assignment 2: Web Page Design (10 marks) One web page is required but you should include: • well-presented text and pictures (3 marks) • layout suitable for the intended audience (2 marks) • information consistent with the intended use (3 marks) • at least 2 hyperlinks to: another web page, a location on this page, an email address or a user-created file. (2 marks) Assignment 3: Spreadsheets (20 marks) One workbook is required containing two or more linked worksheets and you should include: • three different functions, for example: max, min, average or sum (3 marks) • three different formulas (3 marks) • use of relative addressing and absolute addressing (2 marks) • at least 4 formatting features from: currency, decimal places, comma, percentage, justification (left, right, centre, full), font size, font style, merge cells, wrap text (4 marks) • sorting data (1 mark) • filtering data (2 marks) • a pivot table (1 mark) • no more than 2 graphs of different types appropriately labelled (3 marks) • linking cells in different sheets. (1 mark) 328 9781380023322_text.indd 328 31/10/2019 11:22 The School-Based Assessment Assignment 4: Database Management (20 marks) One database file is required containing three tables, two queries, one calculated field, one form and one report and you should include: • at least two tables created and populated using appropriate field names, types and primary keys (5 marks) • two tables joined and related (2 marks) • simple query (1 mark) • complex query with more than one condition and involving more than one table (2 marks) • query with calculated field (2 marks) • form with appropriate sub-form (2 marks) • report with sorted records (1 mark) • report with appropriate fields, grouping, specific title and summary feature. (5 marks) Assignment 5: Problem-solving and program implementation (15 marks) Develop an algorithm, pseudocode, flowchart, implement as a program, test and document. Include: • an algorithm that uses friendly variable names, initialises variable, gets input, uses loops and decisions (6 marks) • a trace table using suitable test data (4 marks) • working program (1 mark) • program initialising variable and using loops and decisions (3 marks) • program documentation. (1 mark) Preparation for the SBA A good way to develop the skills you will need to complete a high-scoring SBA is to practise an SBA, working in a small group. We have provided a walk-through of an example SBA assignment in the second part of this chapter: Caribbean Food and Drink Festival 2025 Event Management. This example provides step-by-step instructions on how to complete and submit a typical SBA project. Some useful tips Here are some tips to help you gain top marks: 1 Get a full understanding of the project: Make time to sit down quietly and read through the project carefully. Read through it again and try to understand fully what is involved in the project. Seek guidance from your teacher and make notes in your folder. 2 Work in small groups: The syllabus encourages you to work in groups. Discuss each task in your group. Create your own documents, web page, spreadsheet, database and program but regularly compare your work with the others in the group. 3 Stay organised: Keep everything related to your SBA as hard copy in a file jacket, in a ring binder. Keep your electronic files on the computer as well as a copy on removable storage media, for example a USB pen drive. 329 9781380023322_text.indd 329 31/10/2019 11:22 The School-Based Assessment Theory 4 Know your mark scheme: Use the submission check list from this book or the syllabus (available from www.cxc-store.com). Ensure that you review this regularly so you have a good understanding of the skills that are being assessed. 5 Complete a task and move on: You score marks in the SBA by demonstrating different skills. When you have completed a task print out all the evidence and store it safely in your folder. Fill in the submission check list to monitor your progress and then move on to the next task. 6 Plan: Identify what tasks you must complete, in which order they will be attempted and when they are due. 7 Beat deadlines: Don’t just try to meet deadlines, beat them! Finally, allocate a time for completing each task. 8 Follow instructions: Follow all instructions carefully. If you are in doubt, seek clarification! 9 Keep backups: Ensure that you have a recent backup of your files in case the unexpected happens. Make personal copies of files on a removable media, for example a USB pen drive, or send copies to yourself via email each time you make significant changes. Ensure that you name the files in a manner that lets you know, at a glance, which is the most recent. Submitting your SBA Once you have done all the hard work completing the SBA, make it easy for the examiner to give you all the marks you deserve by including ALL the evidence in your final submission. Remember, if your teacher or the examiner can’t see the evidence you don’t get the marks. Include printouts of documents, worksheets, source code and screen shots showing your working. The example SBA shows you all the documents that you will need to submit. Good Luck! 330 9781380023322_text.indd 330 31/10/2019 11:22 The School-Based Assessment Example SBA Assignment Possibility High School Empowering and enabling students to attain new heights CSEC® Information Technology (General Proficiency) Paper 031 – School-Based Assessment (SBA) Weighting of Paper: 25% Background Food festivals are popular attractions in many countries worldwide. Food in the . Caribbean is influenced by many other cultures; this makes the Caribbean an increasingly popular destination for any foodie or food travel lover. Over the past decade, many international travellers have planned their vacations to coincide with at least one major food festival. Some of the festivals where ‘foodies’ have enjoyed the cuisine of the region include the Caribbean Food and Wine Festival (Providenciales), Barbados Food and Wine and Rum Festival (Barbados), Cayman Cookout (Cayman Islands) and Saborea Puerto Rico: A Culinary Extravaganza (Puerto Rico). These food and drink festivals have afforded travellers the opportunity to taste some of the local dishes, as well as versions of international dishes of the Caribbean. A major challenge, however, is the absence of proper coordination among the various territories, resulting in travellers being unable to island hop and experience multiple food festivals during their Caribbean trip. Description of the Project A group of tourism interests in 10 Caribbean islands – Anguilla, Barbados, Barbuda, Bequia, Nevis, Puerto Rico, St Maarten, Turks and Caicos, Tortola, and Tobago – has collaborated to plan for the staging of the inaugural Caribbean Food and Drink Festival from October 10 to November 26, 2025. You are required to utilise suitable word processing, web design, spreadsheet, database management as well as programming tools to design and implement computer-based solutions to the tasks involved in the event-planning process. 331 9781380023322_text.indd 331 31/10/2019 11:22 The School-Based Assessment Word processing assignment You are required to prepare two documents for dispatch to potential sponsors: • an event brief that summarises the festival events • a fillable electronic form for sponsors to complete and return. Task A 1) Event Brief Prepare a four-page event brief that includes: (i) the need for the event (ii) a brief geographic profile of each participating island, a well-formatted table containing the draft schedule of the event dates, and (iii) a brief description of the two sponsorship packages: Tier 1 (US$50,000) and Tier 2 (US$25,000). The document should be made ready for presentation by adding a cover page with a table of contents and an image. Pages should be numbered; use the following to guide your design with headings and sub-headings: Cover Page The Need Table of Contents Col 1 Country Profiles Col 2 Schedule of Ten Events Country 1 Country 2 Country 3 Country 4 Country 5 Country 6 Country 7 Country 8 Country 9 Country 10 Sponsorship Tier Tier 2 Include a footnote on the last page (the Sponsorship page) to indicate that ‘The Sponsorship Expression of Interest Form is available on the website at www.cfdf2025.biz’. Ensure that you appropriately utilise the text formatting and page layout features to produce a well-laidout and easy-to-read document. 2) Print out the document, store it in your SBA folder and update your submission check list. Task B 1) Fillable Form Create a fillable form with the title: Caribbean Food and Drink Festival 2025 Sponsorship Expression of Interest The form should be clearly laid out and easy to use and should capture the following data: (i) Name of organisation (ii) Name, email address and telephone number of the contact person (iii) Sponsorship a. Select events being sponsored b. Sponsorship level – Tier 1 or Tier 2 – for each event selected (iv) Date of application. 2) Print out the form document. 3) Create and print out a screenshot showing the form in Design Mode. 4) Store the printouts in your SBA folder and update your submission check list. 332 9781380023322_text.indd 332 31/10/2019 11:22 The School-Based Assessment Web design assignment You are required to prepare a single informational web page for tourists who might wish to attend the festival as well as for potential sponsors. Task A 1) Event Website Create a web page that will contain the following information: (i) Event logo and title of the event (ii) A navigation section (iii)Background to the event (iv)Hyperlink to the email address of the event office: eventoffice@cfdf2025.biz (v) Hyperlink to the Sponsorship Expression of Interest Form. 2) Print out the web page document. 3) Create and print out a screenshot showing a hyperlink in a web browser. 4) Store the printout in your SBA folder and update your submission check list. Spreadsheet assignment You are required to design a spreadsheet worksheet and enter the data submitted on the Sponsorship Expression of Interest Form. On a second worksheet enter your own ‘Location/projected attendance’ data. On a third worksheet calculate the projected event deficit or surplus. Produce the required charts to support the presentation of the financial report at the Quarterly Event Planning Meeting. Suggested values: • entry fee: $40 • number of sponsors responding ranges from 10 to 20 • proportion of sponsors in each tier (1 and 2) varies between 40 and 60%. Base data: Location Projected attendance Anguilla 725 Barbados 4,100 Barbuda 600 Bequia 1,780 Nevis 600 Puerto Rico 5,400 St Maarten 3,700 Tobago 1,800 Tortola 1,725 Turks and Caicos 1,125 Table 1 Projected attendance for the events 333 9781380023322_text.indd 333 31/10/2019 11:22 The School-Based Assessment Calculations you will need: • gate receipts per location = projected attendance * entry fee • total gate receipts = sum(gate receipts per location) • sponsorship value = (fee for tier) • total sponsorship = sum(sponsorship value) • total income = (total sponsorship + total gate receipts) • venue expenditure = venue expenses (the expenses for each venue are 25% of the entry fee) • advertising expenditure = $200,000 • administration expenditure = $150,000 • total expenditure = (venue expenditure + advertising expenditure + administration expenditure) • surplus/deficit = all income from event – all expenses to run event Task A Spreadsheet Design and Construction 1) Create a worksheet (named Sponsorship) that accepts and stores the data provided on the Sponsorship Expression of Interest Forms organisation, a contact name, email, telephone number, HQ location, number of events sponsored at Tier 1 and the number of events sponsored at Tier 2. 2) Insert a column that shows the results of the calculation of the sponsorship value. 3) Create a formula to sum the total sponsorship. 4) Create a formula to show the average sponsorship. 5) Create a formula to show the maximum sponsorship. 6) Print out the Sponsorship worksheet. 7) Print out the Sponsorship worksheet showing all formulae. 8) Create a second worksheet (named Locations) that accepts and stores data like that shown in Table 1. 9) Insert a column that shows the results of the calculation of the gate receipts per location. 10) Create a formula to sum the total gate receipts. 11) Print out the Locations worksheet. 12) Print out the Locations worksheet showing all formulae. 13) Create a worksheet (named Accounts) that copies (links) the total gate receipts and the total sponsorship from different worksheets and use a formula to calculate the total income. 14) Enter the data for the expenditures and create a formula to calculate the venue expenses and the total expenditure. 15) Create a formula to calculate surplus/deficit. 16) Print out the Accounts worksheet. 17) Print out the Accounts worksheet showing all formulae. 18) Store the printouts in your SBA folder and update your submission check list. Task B Sorting, Extracting and Summarising Data 1) Sort the data in the Sponsorship worksheet by the name of the organisation (in ascending order). 2) Print out the sorted Sponsorship worksheet showing sorting. 3) In the Sponsorship worksheet extract all sponsors with zero Tier 1 sponsors. 4) Print out the filtered Sponsorship worksheet. 5) Summarise the data in the main section of the Sponsorship worksheet into a meaningful pivot table. Column label is HQ location, Row labels are Name of Organisation and Sum values is Sponsorship value. 6) Print out the pivot table worksheet. 7) Store the printouts in your SBA folder and update your submission check list. 334 9781380023322_text.indd 334 31/10/2019 11:22 The School-Based Assessment Task C Presentation of Results 1) Generate an appropriate bar/column chart that compares the projected attendance for each location. 2) Print out the bar/column chart. 3) Generate a pie chart that compares Venue expenditure, Advertising expenditure and Administration expenditure. Each slice of the chart must be appropriately labelled to show the value data label. Give this chart the title ‘Expenses’. 4) Print out the pie chart. 5) Store the printouts in your SBA folder and update your submission check list. Database management assignment You are asked to use a suitable database application to manage data on sponsors and the associated events. Appropriately named tables must be used to store the data related to sponsors, events and sponsorship deals. Task A Database Design and Creation 1) Create a database table, Sponsors, to store the data about sponsors obtained from the Sponsorship Expression of Interest Forms: unique (three letter) sponsor ID, name of organisation, contact name, email, telephone number and HQ location. Include a suitable primary key. 2) Create and print out a screenshot showing the table design and primary key. 3) Create a suitable form for inputting data and populate the table with data from the Sponsorship Expression of Interest Form. 4) Print out the populated Sponsors table. 5) Design and create a second table, Events, and store data related to the events: unique (number) event ID, event name, projected attendance per location and event country. Include a suitable primary key. 6) Create and print out a screenshot showing the table design and primary key. 7) Populate the table with data from Table 1. 8) Print out the populated Events table. 9) Design and create a third table, Sponsorship Deals, and store the following data: unique (number) sponsorship deal ID, sponsor ID, event ID and tier. Include a suitable primary key. 10) Create and print out a screenshot showing the table design and primary key. 11) Populate the table with suitable data. 12) Print out the populated Sponsorship Deals table. 13) Join/relate the three tables together. 14) Create and print out a screenshot showing the relationships between tables. 15) Store the printouts in your SBA folder and update your submission check list. 335 9781380023322_text.indd 335 31/10/2019 11:22 The School-Based Assessment Task B Queries Generate the following queries: 1) List of locations with projected attendance is greater than or equal to 2,000. Extra facilities will be needed at these events. 2) Create and print out a screenshot showing the query design and criteria. 3) Print out the result of the query. 4) It is anticipated that 35% of attendees will be adult females, 25% adult males and the remainder children. Create a query to show the event, country, sponsoring organisations and the number of females, males and children projected to attend. Sponsors need this information to manage their stands at the fair. 5) Create and print out a screenshot showing the query design and calculated fields. 6) Print out the result of the query. 7) Store the printouts in your SBA folder and update your submission check list. Task C Viewing and Reporting 1) Generate a form and sub-form to view the information about sponsors and the events they have sponsored. 2) Create and print out a screenshot showing the form and sub-form. 3) Generate a report based on the following specifications: • Grouping: sponsorship tier • Sort order: country name • Fields: country name, organisation, tier, projected number of females • Title: ‘Projected Adult Female Attendance at Sponsored Events’. 4) Print out the report. 5) Store the printouts in your SBA folder and update your submission check list. Problem-solving and program implementation assignment Task A Algorithm Development 1) Develop an algorithm to determine the total income for each of the 10 events and the grand total for all events. The algorithm must loop through all the 10 events and prompt the user to enter the total sponsorship value and total gate receipts value. The algorithm should output the total value for each event and, if the total value is greater than or equal to $50,000, output ‘Star Event’. At the end the algorithm should output the grand total for all events. Document your algorithm using pseudocode OR a flowchart. 2) Print out the pseudocode algorithm. 3) Your flowchart document may be neatly hand drawn. 4) Store the printouts in your SBA folder and update your submission check list. Task B Test and Validate Algorithm 1) Design and execute a trace table that utilises appropriate test data to verify the algorithm is correct. 2) Your trace table document may be word-processed or neatly hand drawn. 3) Print out the test data document. 4) Store the printouts in your SBA folder and update your submission check list. Task C Program Implementation 1) Implement the program using your chosen programming language. 2) Print out the source code document. 3) Create and print out a screenshot showing the program operating correctly. 4) Store the printouts in your SBA folder and update your submission check list. 336 9781380023322_text.indd 336 31/10/2019 11:22 The School-Based Assessment Submission check list Word processing Marks 1) At least four formatting features. Two from: bold, italics, underline, justification (centre, right, full), changes in line spacing, superscript and/or subscript, font style, font size and page numbering. 4 2) Page layout. Changes in page orientation, paper size or text orientation. Use of header or footer or footnotes or endnotes. 2 3) Any two from: a. Including a graphic or chart resized and positioned on page. b. Text in multiple columns. c. Table formatted with borders, shading of cells and colour. 4 4) Any two from: a. Auto-generated table of contents with two levels of headings. (5 marks) b. Mail merge with: data source, primary document, inserted fields and merged document. (5 marks) c. Fillable form with at least three of: option box, check box, text box, date picker, drop-down list and command button. (5 marks) 10 Check Page Number Web design 1) Web page with balance of text and graphics. 3 2) Suitable layout and content for intended audience. 2 3) Content consistent with requirements. 3 4) Any two hyperlinks to: another web page, location within the web page, an email or an online location. 2 Spreadsheets 1) Correct use of three different functions. 3 2) Correct use of three different formulae. 3 3) Use of relative addressing and absolute addressing. 2 4) Formatting any two from: decimal place, currency, comma or percentage. 2 5) Justified left, right, centre; font style or font size. 1 6) Merged cells or wrap text. 1 7) Data sorted. 1 8) Simple filter showing criteria. 2 9) Pivot table. 1 10) Charts showing labels: chart title, data labels, chart axis. 3 11) Linking of cells in different worksheets. 1 Database 1) Create and populate at least two database tables with appropriate fieldnames, types and primary keys. 5 2) Show joined (related) tables. 2 3) Simple query on one table. 1 4) Complex query on more than one table. 2 5) Query with at least one calculated field. 2 6) Appropriate form with sub-form. 2 7) Evidence of sort. 1 8) Report showing: title, grouping, summary information and selected fields. 5 Programming 1) Pseudocode or flowchart using: start/end, user-friendly variable names, initialised variables. 3 2) Pseudocode or flowchart using: prompt for data, input, loops and decisions. 3 3) Trace table: identifying variables, appropriate test data, and values changing. 4 4) Working program. 1 5) Program: initialises variables, uses loops and decisions. 3 6) Program documentation. 1 9781380023322_text.indd 337 337 31/10/2019 11:22 The School-Based Assessment Preparing and submitting You will prepare both hard copy and soft copy documents for submission. Your teacher will guide you. Task A Preparing Hard-Copy Documents for Submission 1) Create and print out a cover page with your candidate number, name of subject and component (CSEC Information Technology Paper 031) and year of examination. 2) Create and print out a document listing the programs used to complete the assignments, for example Microsoft Office 2019 and Free Pascal Compiler. You can also add comments supporting your submission, for example any limitations in your SBA. 3) Complete and print out a submission check list or create a table of contents with page numbers (you could use the example provided above). 4) Print out a copy of each of the documents specified in the table below. Write the page numbers in pencil at the bottom of each page. Word processing 1 Printout of the Event brief document (Event Brief.docx), ensure that it includes: a. At least four formatting features. The specimen document includes: bold, underline, centre justification, line spacing, superscript, font size, font style and page numbers. (4 marks) b. Page layout features. The specimen document includes: narrow margins, paper size set to A4. (2 marks) c. Importing and resizing a picture/chart/table. The specimen document includes a picture centred. (2 marks) d. Text split over two or more columns. (2 marks) e. A table that has been formatted using colour, shading or borders. (2 marks) f. An automatic table of contents using headings. (5 marks) 2 Printout of fillable electronic form (Sponsorship Form.docx). The specimen form includes: text box, check box and date picker and the layout is clear. (5 marks) 3 Printout of a screenshot of the fillable form in Design View (Sponsorship Form screenshot.docx). Web design 4 Printout of the web page document (Caribbean Food Festival.html). The specimen web page uses relevant text and graphics in an appropriate, well-laid-out way and includes navigation tools and hyperlinks to an email and an online location. (10 marks) 5 Printout of a screenshot of the web page displayed in web browser showing a hyperlink (web page and hyperlink screenshot.docx). Spreadsheet 6 Printout of Sponsorship Deals worksheet (Food.xlsx). The specimen worksheet contains three different functions: SUM, AVERAGE and MAX (3 marks) and uses relative addressing and absolute addressing. We also include four formatting features from: currency, justification (left, right), font size and font style. (4 marks) 7 Printout of Sponsorship Deals worksheet showing formula. 8 Printout of Events worksheet showing formula. 9 Printout of Events worksheet (after sort). (1 mark) 10 Printout of Events worksheet (after filter). (1 mark) 11 Printout of the pivot table created from Sponsorship Deals worksheet. (1 mark) 12 Printout of Accounts worksheet showing formulae. Our worksheet contains three different formulae (3 marks) and linking cells in different sheets. (1 mark) 13 Printout of bar/column chart. 14 Printout of pie chart. Our pie chart includes data labels and a title. (3 marks) 338 9781380023322_text.indd 338 31/10/2019 11:22 The School-Based Assessment Database 15 Printout of a screenshot of Design Mode for all three tables, Events, Sponsors and Sponsorship Deals, showing field names, types and primary keys. 16 Printout of database table listings for all three tables: Events, Sponsors and Sponsorship Deals. (5 marks) 17 Printout of a screenshot showing the relationship between the three tables: Events, Sponsors and Sponsorship Deals. (2 marks) 18 Printout of the Attendance Greater Than 2000 query result. 19 Printout of a screenshot Design Mode of the query showing the criteria. (1 marks) 20 Printout of the Attendance Breakdown query result. 21 Printout of a screenshot Design Mode of the query showing the complex query and calculated fields. (4 marks) 22 Printout of the Events and Sponsors form with sub-form. (2 marks) 23 Printout of the Projected Adult Female Attendance at Sponsored Events report. This includes: sorted records, appropriate fields, grouping, specific title and summary feature. (6 marks) Programming 24 Drawing or printout of the pseudocode or flowchart. The specimen pseudocode or flowchart: uses user-friendly variable names, initialises variables, gets input, uses loops and decisions. (6 marks) 25 Drawing or printout of the test data and trace table. The specimen trace table uses suitable test data. (4 marks) 26 Printout of a screenshot of the program working. (1 mark) 27 Printout of the source code. Our program includes a loop and decision. (3 marks) 28 Printout of the program documentation. (1 mark) 5) Arrange your printouts in order and number the pages neatly in pencil at the bottom. 6) Assemble the documents into a neat presentation. Task B Preparing Electronic Files for Submission 1) Create a folder with a meaningful name that includes your candidate number. 2) Copy your files you created in Task A into the folder. 339 9781380023322_text.indd 339 31/10/2019 11:22 Appendix A Specimen Paper 01 – General Proficiency 1 hour 15 minutes 1. 2. 3. 1) 2) This test consists of 60 items. You will have 1 hour and 15 minutes to answer them. In addition to this test booklet, you should have an answer sheet. Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each item you are about to answer and decide which choice is best. In a computer system, the ________ directs the IPOS cycle whereas _________ ensures that data and information are accessible at a later date. A) storage and memory B) CPU and memory C) procedure and storage D) CPU and storage Which pairs of the following are likely to have SIMILAR processing power: I. desktop computer II. game console II. smartphone IV. tablet A) B) C) D) 3) 4) Three storage media – a hard drive, a solid state drive and a CD – have capacities of 1 TB, 256 GB and 700 MB respectively. Which of the following statements are NOT true: A) The hard drive has the smallest capacity. B) The capacity of the hard drive is twice that of the solid state drive. C) The capacity of the solid state drive is larger than that of the CD-ROM but smaller than that of the hard drive. D) The capacity of the solid state drive is more than 100 times larger than the capacity of the CD-ROM. 5) All of the following are optical discs EXCEPT: A) Blu-Ray B) CD C) DVD D) ROM 6) Which of the following types of computer system is MOST portable: A) desktop system B) game console C) mainframe D) supercomputer 7) Which of the following pairs of devices are MOST LIKELY to be used by immigration personnel at ports of entry to capture biometric data: A) digital camera and fingerprint reader B) document scanner and barcode reader C) light-pen and graphic pad D) web camera and fingerprint reader I, II and III, IV I, III and II, IV II, III and III, IV II, IV and III, IV What is the name of the component which acts as a temporary storage place for data, instructions and information while the computer system is in operation: A) control unit B) input device C) memory D) storage 340 9781380023322_text.indd 340 31/10/2019 11:22 Specimen Paper 01 8) All the following may be associated with processing a cheque EXCEPT: A) barcode reader B) document scanner C) MICR D) OCR 9) A computer system designed for web browsing is equipped with a 3 MHz Quad Pro processor, 2 GB on-board memory upgradeable to 8 GB, and a 16 GB removable memory card. The capacity of the secondary storage is A) 16 GB B) 8 GB C) 3 MHz D) 2 GB 10) Which of the following is NOT a type of special-purpose application software which is used with general-purpose computers: A) media player B) statistical software C) web browser D) word processor 11) Which of the following types of interface is MOST LIKELY to be used in a motor vehicle to control the entertainment, climate and satellite navigation systems: A) command driven B) graphical user C) menu-driven D) joystick-controlled 12) Your computer monitor’s power switch is in the ‘on’ position; however, the display is blank. Which of the following is NOT a likely cause of this problem: A) The interface cable may be loose. B) The network adapter is malfunctioning. C) Monitor may be in sleep/hibernate mode. D) The monitor controls are improperly adjusted. 13) Cloud storage has some advantages compared with local storage. Which of the following statements are NOT true: A) Cloud storage is generally less expensive than local storage. B) Cloud storage offers users more flexibility options in choosing capacity. C) Documents stored in the cloud are always accessible from a local device. D) Cloud storage offers more data security than data stored on desktop computers. 14) Which of the following statements are TRUE about information: I. It takes the form of numbers only. II. It may be presented as symbols, pictures and sounds. III. When in the form of words or numbers, it must be presented so that underlying patterns are clear. IV. It may be produced by counting, sorting and carrying out mathematical computations on numeric values. A) I and IV ONLY B) II, III and IV ONLY C) II and III ONLY D) II and IV ONLY 15) Which of the following statements DOES NOT represent information: A) The number is 650. B) The average number of meals sold last week was 73. C) The last flights leaving today are 1552, 1500 and 1502. D) The first flight that departed the Port of Spain yesterday was the 1552. The diagram in Figure 1 below refers to Question 16. Figure 1 CPU Input devices Output devices Device X 16) What is the correct name of the hardware component labelled ‘Device X’: A) control unit B) RAM C) ROM D) secondary storage 17) Which statement is UNTRUE about length checks: A) It is a data validation method. B) It can be applied to numeric fields only. C) It is carried out by the computer system. D) It can be applied to text and numeric fields. 341 9781380023322_text.indd 341 31/10/2019 11:22 Appendix A 18) Which of the following statements is UNTRUE about an attendance register used by a homeroom teacher to record daily attendance of students: A) It is human-readable. B) It is a source document. C) It is a turnaround document. D) It contains both data and information. 19) Which of the following statements is NOT TRUE about computer networks: A) All activities are governed by protocols. B) A LAN may include wired media only. C) A WAN may include both wired and wireless media. D) Data uploads may be sent to a remote computer only. 20) ________ are special-purpose application software that run on Internet-connected computers and use _______ to connect with ________. A) web browsers, FTP, web servers B) web browsers, HTTP, web servers C) web servers, FTP, web browsers D) web servers, HTTP, web browsers 21) Which of the following are TRUE about web technologies: I. A website must be written using ONLY HTML. II. A web page is accessible only on the Internet. III. A website may consist of a single web page only. IV. A home page is the default landing page on a website. A) B) C) D) I, II and III only I, II and IV only II, III and IV only III and IV only 22) A website with a ‘last updated’ date more than a year ago may be an unreliable source of information because of its: A) authenticity B) currency C) level of bias D) relevance Questions 23–25 are based on the following narrative: Caribbean Network Solutions is a company that specialises in network design and installation. It has been contracted by your school to install a Wi-Fi LAN in the school’s library. 23) Which device should ideally be used as the central communication point for the network: A) hub B) network controller card C) router D) modem 24) Which of the following types of cable should ideally be used to connect the computers to the device named in Question 23: A) coaxial B) fibre optic C) twisted pair D) none of the above 25) One of the desktop computers does not have a port in which to plug the cable referred to in Question 24. Which of the following components should be added to the computer to facilitate this connectivity: A) hub B) network controller card C) router D) wireless access point 26) Which of the following is LEAST LIKELY to affect an organisation: A) cyberbullying B) identity theft C) phishing attack D) violation of privacy 27) Which of the following statements are TRUE in relation to the elements of computer security: I. An attack exploits a vulnerability. II. A countermeasure mitigates a threat. III. A vulnerability reveals the possibility of harm. A) B) C) D) I and II ONLY I and III ONLY II and III ONLY I, II and III 28) Which of the following is MOST LIKELY to affect an individual who repeatedly clicks on hyperlinks without first checking their source: A) data theft B) identity theft C) phishing attack D) electronic eavesdropping 342 9781380023322_text.indd 342 31/10/2019 11:22 Specimen Paper 01 29) Which of the following statements are TRUE about data validation: I. It is performed by a human. II. It is performed by a computer system. III. It may be implemented using proofreading. IV. It includes methods such as double entry and data type check. A) B) C) D) I and III ONLY II and III ONLY II, III and IV ONLY II and IV ONLY 30) Accessing records in a file in the same order in which they were written is an example of what type of file organisation: A) direct B) random C) sequential D) serial 31) Which of the following technologies are utilised by mobile networks as the carrier of their signals: A) Bluetooth B) radio C) satellite D) Wi-Fi 32) Proprietary data related to a new product design that is stored on a lost or misplaced company-issued device such as a laptop or smartphone could lead to which of the following types of misuse: I. phishing attack II. industrial espionage III. copyright infringement A) B) C) D) I and II ONLY II ONLY III ONLY II and III ONLY 33) A set of physical measures designed to prevent unauthorised access to computing resources by unauthorised persons may consist of all the following EXCEPT: A) backup and recovery procedures B) biometric systems C) hardware firewall D) intrusion detection systems 34) The computer-related professional who will be responsible for ensuring that routers and switches are configured and working properly on a day-to-day basis is MOST LIKELY a: A) database administrator B) network administrator C) network engineer D) systems administrator 35) The increase in the incidents of plagiarism in education is MOST LIKELY associated with: A) e-learning B) distance teaching C) collaborative teaching D) increased access to information 36) Which of the following types of content may be used to create a word processing document for printing: I. animated gifs II. shapes III. text IV. videos A) B) C) D) II ONLY II and III ONLY III ONLY IV ONLY 37) Which of the following is NOT a source of content for creating a word processing document: A) keyboard B) local storage C) speech D) video 38) When planning a website, the _______________ is LEAST important: A) intended audience B) number of hyperlinks C) layout of the web pages D) content of each web page 39) All of the following are tasks that are used to develop a simple web page EXCEPT: A) inserting text and graphics B) uploading page to test server C) creating a home page with hyperlink D) choosing an appropriate design for the page 40) Which of the following is NOT a target for a hyperlink: A) a web page B) an anchor point within a web page C) an email message D) a web browser 343 9781380023322_text.indd 343 31/10/2019 11:22 Appendix A 41) Which components are necessary to make a website available on the WWW: I. web host II. domain name III. web browser IV. web pages V. website A) B) C) D) I, II and III ONLY I, II and IV ONLY II, III and V ONLY IV and V ONLY 42) B5:D9 is best described as a: A) cell address B) cell reference C) formula D) range 43) What is the new cell address if the set of cells G1:J1 is merged: A) G1 B) H1 C) I1 D) J1 44) A primary field is MOST LIKELY used when: A) creating a pivot table B) filtering data C) formatting numeric data D) sorting data 45) A school maintains a database containing student information such as their name, date of birth, and daily attendance data. All the data held in relation to one student is known as a: A) field B) primary key C) record D) table 46) Which of the following activities must be done prior to showing a join between two tables: I. add a new field II. establish relationship III. establish primary key IV. join all the candidate keys V. ensure presence of a foreign key A) B) C) D) I, and IV ONLY II and IV ONLY II, III and V ONLY III and IV ONLY 47) In order to display a one-to-many join between two tables, all the following keys MUST be present in the tables EXCEPT: A) candidate B) foreign C) primary D) secondary 48) All the steps in problem solving are correctly stated EXCEPT: A) define the problem B) propose some solutions C) determine the most efficient solution D) test and validate the solution 49) The divide-and-conquer approach is used to: A) define a problem B) validate a solution C) decompose large problems D) create solution algorithms 50) All the following statements about problem decomposition are correct EXCEPT: A) Significant components are input, process and output. B) An IPO chart may be used to delineate the components. C) A defining diagram may be used to delineate the components. D) Problem decomposition is used at the second step in problem solving. Question 51 is based on the following algorithm: SET pi to 3.14 SET radius, circumference TO 0 READ radius LET circumference = 2 * pi * radius 51) The identifier pi is an example of a: A) constant B) data type C) string D) variable 52) Which of the following is NOT a characteristic of an algorithm: A) finite number of steps B) flow of control from start to end C) precise D) unambiguous 344 9781380023322_text.indd 344 31/10/2019 11:22 Specimen Paper 01 53) When representing algorithms using a flowchart, the parallelogram may be used to represent: A) input only B) output only C) both input and output D) a process 54) Which of the following programming languages is NOT a high-level language: A) Assembly B) C C) Pascal D) Python 55) Which of the following BEST lists the sequence of steps required for the complete implementation cycle of a program: A) develop algorithm, create source code, translate, link, execute, test, document, maintain B) develop algorithm, create source code, link, translate, test, execute, document, maintain C) create source code, translate, develop algorithm, execute, link, test, document, maintain D) develop algorithm, translate, link, create source code, execute, test, document, maintain 56) All of the following tools may be used to translate a high-level program EXCEPT: A) assembler B) compiler C) editor D) interpreter 58) A program which executes but produces incorrect output may have which type of error: I. logic II. run time III. syntax A) B) C) D) I ONLY I and II ONLY II ONLY III ONLY 59) Which of the following statements would be used to implement conditional branching in a program: A) IF value < 0 B) INPUT value C) PRINT value D) WHILE value = 0 60) Which of the following controls would be used to implement a pre-test loop in a program: A) case B) FOR C) REPEAT D) WHILE END OF TEST Number of objectives covered = 44 of 63 Syllabus coverage = 70% 57) Which of the following errors must be corrected before a program can be executed: I. logic II. run time III. syntax A) B) C) D) I and II ONLY II ONLY II and III ONLY III ONLY 345 9781380023322_text.indd 345 31/10/2019 11:22 Appendix B Specimen Paper 02 – General Proficiency 2 hours 1. Marie wants to travel from Port of Spain, Trinidad, to Castries, Saint Lucia. She saw a special offer being advertised on social media. She intends to book her ticket online at the airline’s website and will print her boarding pass at home. (a) State the name of the computer-related professional that would most likely have: placed the advertisement on the Internet ________________________________________________________________________________________________________ planned, created, tested and published the website ________________________________________________________________________________________________________ (2 marks) (b) State TWO tasks usually carried out by ANY ONE of the professionals named in Part (a). ________________________________________________________________________________________________________ ________________________________________________________________________________________________________ (2 marks) (c) Marie logged on to the airline’s website using a special-purpose software package installed on her computer. Name: the type of special-purpose software that was likely used ________________________________________________________________________________________________________ the protocol used to transfer the web page from the airline’s server to Marie’s computer ________________________________________________________________________________________________________ (2 marks) (d) Marie was presented with the electronic form shown in Figure 1. The form included a number of built-in checks to ensure that all the data submitted is valid. DEPART 1 2 RETURN DATE POS Port of Spain, Trinidad - POS Enter depart date ARRIVE RETURN DATE SLU Castries, Saint Lucia - SLU SUBMIT ! 3 ! 4 Date must be in the future. CANCEL Figure 1 346 9781380023322_text.indd 346 31/10/2019 11:22 Specimen Paper 02 (i) Name the type of checks built into-the form. _______________________________________________________________________________________________________ (1 mark) (ii) Name the check that ensures that the fields are not empty when the form is being submitted. _______________________________________________________________________________________________________ (1 mark) (iii) A length check was carried out on fields labelled 1 and 2. Explain how this check would work. _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ (4 marks) (iv) Marie entered data in fields 1 and 2 as shown and pressed the ‘SUBMIT’ button. She was presented with an error message. Outline the sequence of processing activities that is MOST LIKELY to have occurred after the command button was pressed. _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ (4 marks) (v) Describe the check that the airline MOST LIKELY carried out on fields 3 and 4. _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ (4 marks) Total 20 marks 347 9781380023322_text.indd 347 31/10/2019 11:22 Appendix B 2. The government of St Luago observes cybersecurity awareness month during November each year. Last year, activities were carried out based on the theme ‘Think before you click’. The goal of the series of activities was to increase awareness of the dangers of not adopting ‘personal security practices’ when shopping online. (a) At the opening event, the cybersecurity consultant said that ‘clicking on a link from an unknown source may affect the device being used and also the person’. (i) State ONE way in which a device may be affected. _______________________________________________________________________________________________________ (ii) State TWO ways in which an individual may be negatively impacted. _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ (3 marks) (b) State THREE personal security practices that individuals should follow to help them stay safe online. ________________________________________________________________________________________________________ ________________________________________________________________________________________________________ (3 marks) (c) During one of the events, the cybersecurity expert set up a network and offered free Wi-Fi access to persons who were within the specific area. What is the name given to: (i) a specific location that provides Internet access via a wireless local area network ________________________________________________________________________________________________________ (ii) the particular type of wireless transmission medium used by Wi-Fi systems. ________________________________________________________________________________________________________ (2 marks) (d) Each participant at the session was asked to write their full name, email address and telephone number on a sheet of paper. The organisers of the event intended to create a mailing list in order to keep the participants informed of the other activities that would take place during the month. (i) Complete the table by writing suitable data types and field sizes for each of the fields. (4 marks) (ii) In order to ensure that no duplicates are stored in the table, a primary key is required. Suggest the names of two candidate keys from which a suitable primary key may be selected. ________________________________________________________________________________________________________ (2 marks) (iii) Name TWO methods that may be used to input the data into the table. ________________________________________________________________________________________________________ (2 marks) 348 9781380023322_text.indd 348 31/10/2019 11:22 Specimen Paper 02 (e) Outline how the data in the table may be used as part of a mailing list to send information to the persons listed. ________________________________________________________________________________________________________ ________________________________________________________________________________________________________ ________________________________________________________________________________________________________ (4 marks) Total 20 marks 3. Marie booked her ticket online at the airline’s website but was unable to print her boarding pass at home. She instead downloaded a digital version of the boarding pass to her smartphone, which she intends to present at the airport. The boarding pass is shown in Figure 2. GATE GATE H43 FBB1963 MIA SEAT 55C IAH STATUS On Time TERM North DEPARTS 6.00 PM CAMPBELL/HOWARD Figure 2 (a) In addition to her smartphone, name ONE OTHER mobile device that she could download the boarding pass to. _______________________________________________________________________________________________________ (1 mark) (b) Figure 2 shows the boarding pass as displayed on the screen of the mobile device. Name: (i) the type of document shown _______________________________________________________________________________________________________ (1 mark) (ii) the device that would be used to scan the boarding pass _______________________________________________________________________________________________________ (1 mark) (iii) the type of file organisation that is MOST LIKELY used by the application to process the boarding pass _______________________________________________________________________________________________________ (1 mark) 349 9781380023322_text.indd 349 31/10/2019 11:22 Appendix B (c) Marie has made a spreadsheet that she will use to convert prices from Eastern Caribbean dollars (XCD) to United States dollars (USD) and then to Trinidad and Tobago dollars (TTD). She has used the exchange rates 1 XCD: 0.37 USD and 1 USD: 6.75 TTD. The incomplete spreadsheet is shown in Figure 3. Figure 3 A 1 Exchange Rates > 2 XCD Price 3 10.00 4 11.00 5 12.00 6 13.00 7 14.00 8 15.00 9 16.00 10 17.00 11 18.00 12 13 B C 0.37 6.75 Equivalent Currency USD TTD 3.70 24.98 (i) The label ‘Equivalent Currency’ is spread across multiple columns for effective presentation. State the name of the formatting feature used to achieve this. ________________________________________________________________________________________________________ (1 mark) (ii) Write the text for the formula to be inserted in cell B4 to calculate the equivalent currency for USD. ________________________________________________________________________________________________________ (3 marks) (iii) Marie copied the formula from B4 to B5 and received a ‘#VALUE’ error. Explain what she should do to correct this error. ________________________________________________________________________________________________________ (2 marks) (d) The algorithm below was developed to perform currency conversions similar to using a high-level programming language. Line 1 n = 18 Line 2 xcd_to_usd = 0.37 Line 3 usd_to_ttd = 6.75 Line 4 print (“XCD – USD – TTD”) Line 5 counter = 1 Line 6 for counter 1 to n do Line 7 usd = n * xcd_to_usd Line 8 ttd = usd * usd_to_ttd Line 9 print (n, usd, ttd) (i) Explain the purpose of the data item ‘n’ as used at lines 6 and 7. ________________________________________________________________________________________________________ (2 marks) (ii) How many times will Line 7 be executed? Justify your response. ________________________________________________________________________________________________________ (3 marks) (iii) Represent the algorithm using a flowchart. (10 marks) Total 25 marks 350 9781380023322_text.indd 350 31/10/2019 11:22 Specimen Paper 02 4. Mr Runcie wants to automate the process of producing monthly progress reports for his class of 30 students. He has a laptop he purchased seven years ago and wants a range of computer-based tools to get the task done. (a) Mr Runcie intends to use a program written in a high-level language to compute averages. (i) Write an algorithm using pseudocode to prompt for the homework score, classwork score and test score for each student, then calculate and output the average score. ________________________________________________________________________________________________________ ________________________________________________________________________________________________________ ________________________________________________________________________________________________________ (5 marks) (ii) Extend the algorithm to find the highest average score calculated to a variable named highestAverage and output this highest average. _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ (4 marks) (iii) Name one high-level programming language that he could use to translate the algorithm. _______________________________________________________________________________________________________ (1 mark) (b) Mr Runcie wants to use the mail merge feature of a word processor to generate progress reports. He plans on using a data file he created in a spreadsheet. Outline the process he should follow to get the set of documents for all 30 students ready for printing. _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ (5 marks) (c) The teacher is planning on printing the progress reports on a wireless laser printer located in an adjoining room. He had difficulty connecting to the printer and sought help from a computer-related professional employed at the school. He was later advised that his laptop did not have a wireless card installed and as such he would need a network adapter. (i) Name the computer-related professional who would be most suitable for connecting the laptop to the printer. _______________________________________________________________________________________________________ (1 mark) 351 9781380023322_text.indd 351 31/10/2019 11:22 Appendix B (ii) State two roles of the computer-related professional named in Part (c) (i). _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ (2 marks) (iii) Explain the role of the network adapter. _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ (2 marks) (d) Construct a trace table and use it to determine the result of the following algorithm for input values 2, 4, 6, 8 and 10. Begin n = 5 runningTotal = 0 averageScore = 0.0 counter = 0 print “Please enter a score” read score = int(input) while score not equal to –1: runningTotal = runningTotal + score counter = counter + 1 print “Please enter a score” averageScore = runningTotal/counter print averageScore End _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ (5 marks) Total 25 marks 352 9781380023322_text.indd 352 31/10/2019 11:22 Glossary A computer an electronic device capable of executing a set of instructions or a ‘program’ absolute addressing prevents a formula, or part of a formula, from being automatically updated when the formula is copied or moved adaptive maintenance implementing new features or changing the way a particular feature works algorithm a sequence of instructions which rigorously defines a solution to a problem application software the category of software that performs end user tasks archiving storing files that are accessed only infrequently and modified even less frequently, on another storage device arithmetic operators represent mathematical computations such as addition, subtraction, multiplication and division assembly language uses short words to represent simple instructions that can easily be translated into machine code B backing storage the computer’s secondary storage: the hard disk drives and optical drives backup the copying of files to a separate, removable storage device so that they can be restored to the original location if the original data is ever lost or destroyed binary code a sequence of 1s and 0s bit a binary digit, taking a value of either 0 or 1 Bluetooth a wireless protocol for exchanging data over short distances from one device to another byte a collection of eight bits that is referenced as a single unit C calculated field a field that derives its value by performing a function on values from other table fields candidate key a field that is considered a possibility for a primary field clipboard a temporary area of memory where applications can store items for future use cloud storage a model in which data is stored on remote servers and can be accessed only via the Internet or cloud computer misuse Any activity during which a computer system/network or its data is accessed, modified or deleted without proper authorisation computer network a group of computing devices that are connected together so that they can share data and resources. computer security All the activities related to identifying, assessing and managing vulnerabilities, threats and attacks on a computer system computer system a complete computer installation including hardware, software, users, procedures and data. condition an expression that includes a relational operator and the two operands on which it operates constant an area of storage whose value cannot be change during processing cookies a piece of data sent from a website and stored on the user’s computer by the user’s web browser copyright a legal right that gives the creator of an original work exclusive rights over its use and distribution corrective maintenance fixing program bugs or flaws in the program COUNT a function that returns the number of cells that contain a value or formula in a cell range COUNTA a function that returns the number of non-blank cells in a cell range COUNTIF a function that returns the number of cells in a cell range that contain a value that meets a condition CPU the ‘brains’ of the computer, where the program instructions (calculations) are processed or carried out cyberbullying a form of bullying or harassment using computer-based communications cybercrime any crime perpetrated using computers and networks cybersecurity all the activities related to identifying, assessing and managing the vulnerabilities, threats and attacks originating from cyberspace cyberspace any data or resources that can be accessed via a network or the space where the Internet operates coaxial cable a single copper core surrounded by a metal D shield to reduce interference and all enclosed in a plastic covering column and bar charts used for comparing a series of values command line interface when interaction with a computer is by means of individual lines of text common carrier a company that offers communication services to the general public compiler a special translator that converts high-level language into machine code composite key a combination of fields used to create a primary key Dark Net the parts of the Internet that are kept hidden from the general public and cannot be accessed by standard search engines data raw, unprocessed facts about persons, places, things or events that have been collected through observation or measurement data theft the unauthorised copying or removal of data from the legitimate owner’s computer system data type specifies what sort of values a variable or constant can hold 353 9781380023322_text.indd 353 31/10/2019 11:22 Appendix A Glossary database an organised set of records (data) held in tables that can be easily managed debugging the process of finding and removing errors from computer hardware or software decompose to break down into a combination of simpler components denial-of-service attack a cyber-attack where the intent is to prevent a service being delivered by the target system desktop system a computer system small enough to fit on a desk, but also powerful enough for common business tasks and inexpensive enough for home ownership direct access storage media secondary storage where each file has a specific location or unique address in the storage, allowing it to be accessed quickly distributed denial-of-service attack a cyber-attack during which the target system is flooded with requests that overload the targeted system DIV the integer division operator which discards the fractional part (remainder) of the result divide-and-conquer approach to repeatedly split a large problem into a number of smaller sub-problems until a complete solution is identified document printed or written, usually paper-based, and used to collect, store and share data double entry a data verification method that requires that the data is entered twice download a process whereby programs or data are transferred via communications channels from a computer and stored on media located at the user’s computer dry run a practice run, a rehearsal of the process before the algorithm is implemented as a program E electronic eavesdropping the act of electronically intercepting communications without the knowledge or consent of at least one of the participants electronic mail mail or messages transmitted electronically by computers via a communications channel embedded devices a special-purpose computer that carries out a specific (and dedicated) function within a larger electrical or mechanical system or a combination of both encryption the process of converting data/information to a code to prevent unauthorised persons from accessing it endnote a note at the end of the document, often used for references extranet a private computer network where authorised persons within an organisation and selected partners outside the organisation can access specific resources F fibre optic cable consists of flexible fibres with a glass core; they carry information using light file a container in a computer system for storing data, firewall Monitors a network, blocking dangerous content such as viruses flash memory a small electronic device that maintains stored data without any external power source flowchart a pictorial way of representing an algorithm using a set of standard symbols (shapes) font style the way the characters look footer content that appears at the bottom of every page Footnote a portion of text in the footer area of a page foreign key appears in a table where it doesn’t really belong but allows two tables to be linked form a user-friendly interface to a database system formula an automatic calculation full justification the extension of each line so that it reaches both margin function a standard routine used to perform a mathematical task G general-purpose application software that is used to perform a wide range of related tasks general-purpose computer an example of a general-purpose computer system, which is one that is suitable for undertaking a wide range of common computing tasks graphical user interface when interaction with a computer is by using a pointing device H hard copy a permanent printed output from the computer. hardware the physical parts of the computer system hardware Interface physical hardware components (input and output devices) that allow the user to manipulate the computer header content that appears at the top of every page high-level language a machine-independent language written in a statement that closely resembles English home page starting page of a website hosting the act of making a website available on the World Wide Web hotspot a physical location where persons may obtain Internet access, typically using Wi-Fi technology hub a multiport device that connects many computing devices together human-readable document a document that may be read by a human but may not be in a form that a computer can automatically accept as input hyperlink a piece of text or part of a web page or an image that when selected and clicked with the mouse displays another web page document (or resource) Hypertext Mark-Up Language a mark-up language used to structure text and multimedia documents Hypertext Transfer Protocol a protocol used to request and transmit files, especially web pages and web page components, over the Internet or other computer network information or programs File Transfer Protocol the special language two computers use when copying or moving files between them. I identifier the name given to variable or a constant by a programmer 354 9781380023322_text.indd 354 31/10/2019 11:22 Glossary identity theft the deliberate use of someone else’s identity, metropolitan area network a computer network in a usually as a method to gain a financial advantage IF function a function that performs a logical test and returns one of two results information meaningful knowledge derived from raw data Information Technology the use of computers, storage, communication and other physical devices to create, process and exchange all forms of electronic data infrared part of the electromagnetic radiation spectrum at wavelengths that fall between visible light and radio waves at frequencies 300GHz up to 430THz input data entered into the computer via some form of input device such as keyboard, mouse, microphone or scanner input device any specialised hardware peripheral component that allows the entry of data and instructions into a computer integrated package contains several related programs in one package intended audience the main group of persons that a website is designed to target or appeal to internal documentation an aid to programmers trying to understand the source code internet public, globally accessible, wide area network providing information and communication facilities interpreter a translator that converts and executes highlevel language in one step intranet a private computer network where only authorised persons within an organisation can access resources geographic area or region larger than that covered by a large local area network (LAN) microwaves part of the electromagnetic radiation spectrum at frequencies 300MHz to 300GHz mobile devices computing devices that are small enough to hold and operate in one’s hand and are easily portable mobile network a network of communication and computing devices where the last link is over a mobile phone network MOD the integer remainder operator which gives the fractional part (remainder) of the result modem an abbreviation for modulator-demodulator, a device that converts signals from analogue to digital and vice versa L operand a data value, held in a variable that is part of a label simple text line graphs used to compare changes over a period of time local area network a computer network that interconnects operating system a collection of software that manages N network adapter a converter that adapts/extends a USB port in order for it to function like a NIC or a wireless NIC network interface card a computer hardware component installed in a device into which a network cable may be plugged O obscene material material of a sexual nature or material that offends against society’s morality one-to-many relationship when one record in the first table may match many records in the second table one-to-one relationship when one record in the first table matches zero or one records in the second table computers within a limited area such as a home, school, laboratory or office building local storage any physical storage device directly connected, internally or externally, to the computer system hardware logic error a mistake in the design of the program logical operators perform AND, NOT and OR actions low-level language a machine-dependent language written in machine code or assembly code M machine language consists of binary code that a microprocessor can execute directly machine-readable document a document that can be read directly and understood by computer systems main memory the functional unit of a computer that stores data and instructions being used by the CPU mainframe a large-scale, powerful computer with a large storage capacity and a fast Central Processing Unit (CPU) malware software designed to disrupt, damage or gain unauthorised access to a computer system menu-driven interface when interaction with a computer is by the user selecting one option from a list of presented options condition computer hardware resources and provides common services for computer programs output the displaying, playing, printing or storing of the information a computer generates as a result of its processing output device any device that displays, plays or prints the results of processing operations or status messages related to that processing P peripheral any hardware device connected to and controlled by the central processing unit personal security practices countermeasures used by individuals to implement computer security and cybersecurity phishing the attempt to obtain sensitive information such as usernames, passwords and credit card details by sending fraudulent emails physical security measure any mechanism that reduces the risks of unauthorised access to a computer system’s hardware pie charts used to display the contribution of each part to the total pivot chart a graphical presentation of a pivot table pivot table allows you to summarise complex data in a worksheet into a neat tabular form 355 9781380023322_text.indd 355 31/10/2019 11:22 Appendix A Glossary PMT function a function that calculates the payment secondary storage device retains data permanently, even required to pay off a loan or investment, over a specified time period port a physical docking point by which an external device can be connected to a computer or other electronic device primary key a field whose values are unique so they can be used to identify a particular record privacy the right of persons to choose freely under what circumstances and to what extent they will reveal information about themselves problem a discrepancy (or difference) between the data we have and the information we require problem-solving the process of creating a set of instructions that, when executed, accept input data and produce meaningful information processing performing a series of instructions in order to convert data into useful information program a sequence of instructions that a computer can interpret or execute proofreading a manual method of verification during which a data entry clerk visually checks the source document against data that has already been input by another data entry clerk propaganda communication of information of a biased or misleading nature that is aimed at influencing the recipient protocol a set of rules or an agreed way to exchange or transmit data between devices pseudocode a language consisting of English-like statements used to define an algorithm publishing a website to make it available so it can be viewed by anyone with an Internet-connected device and a web browser program when the device is disconnected or the computer system is turned off sequential file access data that is stored in an ordered way or in sequence serial file access where the data is stored in the file in the order in which the data was written to the file soft copy a temporary form of output, as produced by a visual display unit or audio output device software a program (set of instructions) that is executed by the hardware software countermeasures a combination of specialised system software and application software used to protect computer systems software interface programs that are used to communicate with the computer via the hardware software piracy the unauthorised reproduction, distribution or use of software products solution a set of instructions that, if followed in order, will produce the required information source document a document that contains data for input into an information processing system speakers, headphones, earphones hardware devices that enable the user to hear sounds as they are generated (soft copy) special-purpose application software that is used to perform narrowly focused tasks special-purpose computer a computer system which performs a small range of tasks and contains features uniquely designed for use in a particular industry or application spreadsheet a computer program that allows the entry, automatic calculation and storage of data in the form of tables supercomputer designed to carry out single, extremely complex computing tasks such as climate research, cryptanalysis (code breaking), etc switch an intelligent device that routes incoming data directly to the specific output port that will take the data toward its intended destination syntax a set of rules defining the structure of statements in a programming language syntax error an error in how the statements in source code are written in a particular program system backup a copy of all the files on a computer system that can be used to restore the whole computer after a case of hardware failure or data loss system software the category of software used to operate and maintain a computer system including the operating system, utility programs and program language translators system utility a specialised program that assists in maintaining and improving the efficiency of a computer system R random access data that can be quickly accessed wherever it occurs in main memory real-time system a computer system where response time is critical relational operators test the relationship between two values and always result in true or false relative addressing allows formulae in a spreadsheet to be automatically updated if they are copied or moved reliability the degree or extent to which the content of the information can be depended on to be accurate reserved words words in a programming language that have specific meaning and use router an intelligent network device that connects two networks together run-time error a program error that occurs during program execution S satellite a communication device orbiting in space that T relays and amplifies radio telecommunication signals to and from remote locations secondary key a field whose values are not unique so a particular value may identify several records tab stops allow the layout of words in a document to be controlled so that the words line up vertically the IPOS cycle the Input, Process, Output, Store cycle trace table used to display how the value of variables change as a dry run is carried out 356 9781380023322_text.indd 356 31/10/2019 11:22 Appendix Glossary A translator converts one language into another transmission media mechanisms by which computing devices are connected together transposition error an error caused by switching the position of two adjacent characters in a number or text string turnaround document a printed document that has been output from a computer system and contains machinereadable objects that will allow the same document to provide input to a computer system twisted pair consists of eight copper wires, twisted in pairs to reduce interference, and enclosed in a plastic covering typographical error a typing error that affects the text, such as missing or additional characters U Uniform Resource Locators the name of the unique address of each page on the World Wide Web upload a process of reading data from a user’s computer storage and sending it to another computer via communication channels user interface the combination of hardware and software that allows persons and computers to communicate with each other effectively V validation a checking process in a program which is aimed at finding out if the data is genuine value numeric data variable an area of storage whose value can change during processing verification a process during which data that has already VLOOKUP a function that performs a vertical lookup by searching for a value in the first column of a cell range and returning the value in the same row in another column W web browser a program that allows users to view and explore information on the World Wide Web web page layout the positioning and sizing of text and images on the web page web server a computer that delivers (serves up) web pages website theme the use of common elements such as page layout, navigation hyperlinks, colours and pictures on every web page wide area network a computer network in which the computers connected may be far apart, even in different countries Wi-Fi a standard for wireless communication between computing devices wired network uses a wired medium such as twisted pair cable, optical fibre cable or coaxial cable to transfer data between connected devices wireless network uses radio waves instead of physical cables as the transmission medium word wrap the idea that word processors automatically move text onto a new line when the current line is full of characters World Wide Web a graphical easy-to-use system of interlinked files on the Internet WYSIWYG a program that allows you to see what the end result will look like while the interface or document is being created been input or captured is checked to ensure that it matches the data on the source document visual display unit the main output hardware component of a computer system that handles the display of soft copy information that the user sees 357 9781380023322_text.indd 357 31/10/2019 11:22 Appendix A Index 2G-5G wireless standards 76–7, 88 absolute addressing 196–8 adaptive maintenance 291 addition algorithm 258–60 airlines 6, 80, 85 algorithms 252, 253–4 addition 258–60 average 260–3, 266, 300–3, 303–6 concept of 267–8 developing 296, 336 testing 276–9, 336 translating to high-level language 296–322 using flowcharts 270–1 using pseudocodes 268–70 AND operator 274 antivirus 30 application software 29, 30–2 archiving 64, 66, 67 Ariane 5 rocket disaster 291, 292 arithmetic formulae 193–4 arithmetic operators 275 ASCII 295 assembly language 284 assignment statements 296–9 ATMs 8, 21, 36, 74 audio output 28 average algorithm 260–3, 266, 300–3, 303–6 AVERAGE function 186–7 axis labels 213, 214 backups 6, 13, 30, 64 file organisation 67 security measures 115, 116–17 word processing 150–1 bar charts 210–11, 213 barcodes 21, 22, 51 binary chop method 61, 64–5 binary code 284 bit 16 block operations 140–1 Blu-Ray disc 15 Bluetooth 78 BODMAS rule 193–4 books eBooks 88 in a library 64, 66 Boolean data 267, 295 Boolean operators 274–5 byte 16, 17 Cable & Wireless 81 cables 10, 12, 82, 83, 84 calculated field 242–3 cameras 22 candidate key 226 Caribbean cybercrime laws 100 Internet providers 81 Caribbean Hurricane Network 5 CD-ROM 15 cell address 184, 194–8 cell phones 76 cell range 184, 198 cells 184, 185 clearing and deleting 186 replicating formulae across 194–9 central processing unit (CPU) 11, 12, 38 character 267, 295 charting operations 182, 210–15 clipboard 140–1 cloud storage 19–20, 94 coaxial cable 82, 84 column charts 210–11, 215 columns, manipulating 199 columns tool 145–6 command line interface 35 comment tool 148–9 common carriers 76, 77 compact disc 15–16 compiled language 286 compiler 288–9, 290 complex problems 253 combining program elements 318–22 composite key 226 computer-aided instruction (CAI) 120 computer games 124 computer misuse 98, 99, 100 impact 98 on governments 103, 112–13 on individuals 103, 104–7 on organisations 103, 108–13 by individuals, organisations and governments 102–3 computer networks 71, 72 different types of 71, 73–82 functions of components 82–7 358 9781380023322_text.indd 358 31/10/2019 11:22 Appendix Index A in journalism 89 see also mobile networks computer-related professions 119 computer science 3 computer security 98, 99–102 backups 115, 116–17 see also security computer systems 4 and job security 117–18 major types of 2, 4–9 specification 37–40 troubleshooting 40–1 see also hardware components; software computers 4 in business 122 in education 88–9, 120–1 and law enforcement 123 in medicine 121 and recreation 124 supercomputers 5, 9 connection devices 82, 85–7 consistency check 59 constants 266–7, 295 syntax for using 316–17 content management systems (CMS) 165 cookies 107 copyright 108, 170 infringement 108–9 corrective maintenance 291 COUNT/COUNTA function 188–9 countermeasures 98, 102, 113–17 personal security 116–17 physical security 102, 114–15 software 115–16 COUNTIF function 188–9 crash detection program 308, 309 CT scan 121 currency 54, 179 cut, copy and paste 140–1 CXC Learning Hub 88 cyberbullying 104 cybercrime 99–100 cybersecurity 98, 99, 100–1 see also security cyberspace 99 Dark Net 109–10 data 18, 47 collection, storage and sharing 51–2 in a database see database table; databases IPOS cycle 17–18 personal 107 security 20, 64 sources of 46, 48–50 spreadsheets see spreadsheets test see test data vs. information 48 data entry, verification 55–6, 57–8 data labels 213, 214, 215 data storage 51–2 in the file 46, 63 on storage media 46, 64–6 data theft 109–10 data types 224–5, 228, 229, 267 check 59 variables and constants using 295 database management system 223, 224 database table 223, 224 creating 227–30 a query on 239–45 a report from 246 inputting data 230–2 modifying structure 233–4 relationships 234–5 structure 225–7 databases 31, 221–48 assignment 329, 335–6, 339 concept of 221, 222–3 creating 221, 225–35, 335 manipulating data 221, 236–48 terminology 221, 223–5 datasheet view 230–1 DATE function 186–7 debugging 294–5 decision symbol 271–2 decisions 263–5, 269, 270, 296 see also IF-THEN decision; IF-THEN-ELSE decision decomposing a problem 252, 257–65 denial-of-service attack (DOS attack) 110 design mode 155–7 design view 227, 228, 233, 234 desktop systems 4, 6–7, 9 developer tool 155–7 development environment program 287–8 Dewy Decimal number 64 dictionary 146 Digicel 76, 81 DIR command 35 direct file access 62, 65–6, 67 distributed denial-of-service attack (DDOS attack) 110 DIV operator 275, 314–16 divide-and-conquer approach 252, 255–7 DNA analysis 123 documents 51 importing text 131–2 programs 322–4 types of 50–3 see also word processing 359 9781380023322_text.indd 359 31/10/2019 11:22 Appendix A Index domain name 92, 177 dot matrix printers 25 double entry 57 download 94 drag-and-drop editing 140–1 dry run 276, 278, 279, 294 DVD-ROM 15–16 e-commerce 89 earphones 28 eBooks 88 editing photo-editing 31 text 130–1, 167–8 word processing 128, 140–6 education, computers in 88–9, 120–1 electronic access systems 114 electronic calculators 4 electronic eavesdropping 112 email 94, 99 phishing 105–6, 111, 116 email address 94, 175 email message 94 embedded devices 8, 9 encryption 81, 115, 150 endnote 137–9 entity 223, 224 EPOS (electronic point-of-sale) 122 errors correction 58 data entry 55–6 debugging 294–5 types of 292 external documentation 323–4 extranets 80, 81–2 Facebook 113 facial recognition 123 fibre optic cable 82, 84 field name 228, 229 fields 223, 224–5 calculated 242–3 key 226–7, 233–4 file 61 data storage 46, 63 on storage media 46, 64–6 file access methods 46, 61–2 choosing an appropriate 66–7 random and direct 62, 65–6, 67 serial and sequential 61, 62, 63, 64–5, 67 file organisation 46, 61–6 File Transfer Protocol (FTP) 93, 99 fillable electronic form 154–7, 332 filtering data 204–7 find tool 142–3 fingerprint reader 22, 123 firewall 101, 115 flash memory 14–15, 19 floating point 267, 295 FLOPS (floating point operations per second) 5 FLOW 76, 81 flowcharts 252, 254, 270–2 using high-level language 296–322 flowlines 271 font style 133, 134 footer 137–9 footnote 137–9 FOR loop 296, 299–303 foreign key 227, 233, 234 form wizard 236, 238 format check 59 formatting, word processing 128, 133–9 forms 236–7 fillable electronic 154–7, 332 sub-forms 238–9 formulae 184, 185 absolute addressing 196–8 advanced arithmetic 193–4 move, copy and delete operations 199 relative addressing 195 replicating 182, 194–9 Free Pascal Compiler see Pascal FREQUENCY function 210 full justification 136, 146 functions 184–5 basic predefined 182, 186–93 see also individual functions games consoles 8 general-purpose applications 31, 32 general-purpose computer system 6 gigabyte (GB) 14, 15, 16 government, computer misuse and 103, 112–13 grammar tool 147–8 graphic pad and tablet 23 graphical user interface 36–7 hackers 110 hard copy 24, 52 hard disk drives 13, 14, 19, 39 hardware components 2, 10–16 interrelationships 12, 17–18 troubleshooting 40–1 see also input devices; output devices; storage devices hardware interfaces 33–5 header 137–9 heading tools 135 headphones 28 360 9781380023322_text.indd 360 31/10/2019 11:23 Appendix Index A high-level languages 284–5 creating source code 285–8 using 296–322 see also Pascal; Python hospitals 79, 121 hosting 177 hotspot 78–9 hubs 85, 86, 88 human-readable documents 51, 52 hyperlinks 91 inserting 161, 172–6 testing 177–8 Hypertext Mark-up Language (HTML) 91, 92, 165 Hypertext Transfer Protocol ( HTTP) 92, 93 identifiers 266, 267 identity theft 104–5, 116 IEEE 802.11 standard 78 IF function 191, 193 IF-THEN decision 263–4, 269, 270, 296, 309–11 IF-THEN-ELSE decision 264, 269, 270, 296, 311–13 images, inserting 132–3, 170–2 importing text 131–2 indentation 261, 286 information 18, 47 from online sources 46, 54–60 sharing of 81 vs. data 48 information and communications technology (ICT) 3, 98, 120–4 information technology (IT) 3, 253 staff 119 infrared 84 inkjet printers 25, 26 input 10, 20 IPOS cycle 17–18 input devices 10, 11, 12, 20–4 light-sensing 21–2 pressure/touch-sensing 21, 23–4 sound-sensing 21, 22–3 specification 39 input/output statements 296–9 input/output symbol 271 insert rows and columns tool 199 integer division 275, 314–16 integers 267, 295 intended audience 163 internal documentation 323 Internet 81–2 access via hotspot 78–9 backbone network 84 cloud storage 19, 94 Dark Net 109–10 email on 94 information from 54 mobile access to 72 protocol 87 router 86 security threats 100 interpreted language 286 interpreter 288–9 intranets 79–80, 81–2 IP (Internet Protocol) 87 iPads 7–8 IPO chart 254 addition algorithm from 258–60 Average algorithm from 260–3, 266, 300–3, 303–6 creating 257–8 using high-level language 296–322 IPOS cycle 17–18 ISPs (Internet service providers) 81 iteration see looping job security, automation and 117–18 journalism 89 joystick 23, 24 key fields 226–7, 233–4 keyboard 23, 34, 41 kilobyte (KB) 16, 17 L3 cache memory 38 labels 184, 185, 213, 214, 215 laptops 7, 9 laser printers 25 law enforcement 123 length check 59, 60 library, books in a 64, 66 LibreOffice Base 31, 221, 222, 246 LibreOffice Calc 31, 182, 183 LibreOffice Writer 31, 128, 129, 161, 166 light pen 21, 22 light-sensing devices 21–2 line graphs 210, 212 list tools 136–7 local area networks (LANs) 73, 74, 78 local storage 19–20 logic errors 292, 294 logical operators 274–5 looping 260–4, 269–70, 296 syntax for 299–309 low-level languages 284, 288 m-commerce 89 MAC (Media Access Control) 87 machine language 284, 288 machine-readable documents 51, 52, 53 magnetic storage devices 13–14 361 9781380023322_text.indd 361 31/10/2019 11:23 Appendix A Index magnetic tape 13, 14, 64, 65 mail merge tools 152–4 main memory 38 mainframes 6, 9 malware 111–12, 115 many-to-many relationship 234 MAX function 186–7 measurements 48 media player 31 medicine, computers in 121 megabyte (MB) 16, 17 memory 11, 12, 38 flash memory 14–15, 19 RAM 11, 65, 265 ROM 11, 15–16 memory locations 266 memory sticks/cards 14–15 menu-driven interface 36 metropolitan area networks (MANs) 74 microphones 23 microprocessor 10 Microsoft Access 31, 221 Microsoft Excel 31, 60, 182 Microsoft Word 31, 128, 161, 166, 324 microwave 77, 84 MIN function 186–7 mobile devices 7–8, 9, 82, 85–7 mobile network masts 76 mobile networks 72 basic components 71, 82–7 in commerce 89 different types of 71, 73–81 mobile wireless standards 76–7 MOD operator 275, 314–16 modems 87 mouse 23, 24 music piracy 109 musical instrument digital interface (MIDI) 23, 124 negative testing 293 network adapter 87 network interface cards 87 NOT operator 274 notebooks 7 numeric data, formatting 200–1 obscene material 105 office automation 3 one-to-many relationship 234 one-to-one relationship 234 online banking 66, 67, 89 ATMs 8, 21, 36, 74 extranets 80 online sources, information from 46, 54–60 operand 272 operating systems 29–30, 290 updates 115 optical character recognition (OCR) 22, 55 optical mark recognition (OMR) 22 optical technology 15–16, 19 OR operator 274 organisations computer misuse and 103, 108–13 computers in 122 output 10, 24 IPOS cycle 17–18 output devices 10, 11, 12, 24–8, 39 audio output 28 printers 25–7, 40 VDUs 27–8 page-management tools 137–9 Pascal 283, 285, 286–7, 289 executing a program 290 using 296–322 password best practices 116 password-protecting a document 150–1 payroll processing 18, 66, 67 peripherals 20 personal data 107 personal security practices 116–17 petabyte (PB) 16 phishing 105–6, 111, 116 photo-editing 31 physical security measures 102, 114–15 pie charts 210, 212 pivot chart 208–9 pivot table 207–9 pixels 27 plagiarism 108 plotters 26 PMT function 185, 191–2, 195 port 12 positive testing 293 presence check 59 pressure-sensing devices 21, 23–4 primary data types 50 primary key 226, 233–4 primary storage 11 print screen (screenshot) 141 printers 25–7, 40 privacy levels of 79–82 violation of 107 problem-solving 252, 265 assignment 329, 336 decision process 263–5 decomposing it 252, 257–65 362 9781380023322_text.indd 362 31/10/2019 11:23 Appendix Index A divide-and-conquer approach 252, 255–7 IPO chart see IPO chart outline steps in 253–5 problems simple and complex 253, 318–22 sub-problems 255–7 troubleshooting hardware 40–1 process symbol 271 processing 10, 17–18 processing speed 38 processor 10, 11, 12, 31 program design 252 see also algorithms program implementation 283 assignment 329, 336, 339 combining program elements 318–22 declaring variables and constants 295 documenting programs 322–4 sequence of steps 283, 285–91 testing for correctness 291–5 using high-level languages 283, 296–322 programs 18 documenting 322–4 executing 290 maintaining 291 proofreading 57, 58, 147, 178 propaganda 113 protocol 78 pseudocodes 252, 254, 268–70 using high-level language 296–322 publishing a website 161, 166, 177 Python 283, 286–7, 289 using 296–322 QR codes 51, 89 queries, creating and using 239–45, 336 radio-based common carriers 76, 77 random access memory (RAM) 11, 65, 265 random file access 62, 65, 67 range check 59 ransomware 111 Raspberry Pi computer 12 read only memory (ROM) 11, 15–16 real-time system 66–7 reasonableness check 59 records 223, 224 field name and data types 228, 229 relational database management system (RDBMS) 223, 224 relational operators 272–3 relationships 234–5 relative addressing 194–5, 196 reliability, online sources 54–60 REPEAT UNTIL loop 261–2, 269, 270, 296, 303–6 replace tool 142–3 reports, creating and using 245–8 reserved words 288 resolution 25, 27 routers 86–7 rows, manipulating 199 Rubik’s cube 262 Run option 288–9 run-time errors 292, 294 satellite 84–5 secondary key 226 secondary storage 6, 11, 13–16 files on 61 specification 39 security data 20, 64 levels of privacy 79–82 storage devices 20 see also computer security security threats 98, 102 countermeasures mitigating 113–17 Internet 100 sequence of instructions 296–9 sequential file access 61, 62, 63, 64–5, 67 serial file access 61, 62, 63, 64, 67 service priority program 318–22 shopping, online 89 simple problems 253 simple service program 310, 311 SimpleAdd program 290, 293, 297–9 smartphones 8, 9, 72 social media 113 soft copy 24 software 2, 29–33 licences 108, 109 malware 111–12, 115 sources of 32–3 touchscreen 36 software countermeasures 115–16 software interfaces 33, 35–7 software piracy 109 solid state drive (SSD) 15, 39 solution 253, 254, 265 sorting data 202–4 sound-sensing devices 21, 22–3 source code creating 285–8 translating 288–9 using high-level languages 296–322 source documents 50, 52–3 spam 105–6 speakers 28 special-purpose applications 31–2 363 9781380023322_text.indd 363 31/10/2019 11:23 Appendix A Index special-purpose computer 8 spellcheck tool 147–8 spreadsheets 31, 182, 183 advanced arithmetic formulae 193–4 assignment 328, 333–5, 338 charting operations 182, 210–15 data 182, 334 filtering 204–7 numeric data formatting 200–1 pivot table/chart 207–9 sorting 202–4 opening a program 185–6 predefined functions 182, 186–93 replicating formulae 182, 194–9 rows and columns 199 terminology 182, 184–5 using multiple worksheets 215–17 spyware 111, 112 storage 10, 20 cloud and local 19–20, 94 units of 16 see also data storage; secondary storage storage devices 10, 11, 12 file storage on 46, 64–6 string 267, 295 stylus 23 sub-forms 238–9 sub-problems 255–7 SUM function 185, 186–7, 198 supercomputers 5, 9 supermarkets 122 switch 86–7 symbols flowcharts 271–2 relation operators 272 syntax 288 for constants 316–17 for decisions 309–13 for integer division 314–16 for loops 299–309 syntax errors 289, 292, 294 system backup 64 system software 29–30 system utilities 30 test audience 178 test data 276–7, 279, 293 using high-level language 296–322 text-formatting tools 134 text-positioning tools 136–7 thermal printers 26 thesaurus 147 threats see security threats 3D printers 26 titles, charts 213, 214 touch-sensing devices 21, 23–4 touchscreen software 36 trace table 276–9, 294 tracking changes tool 148–9 traffic police 123 transaction processing 6 translator 288–9 transmission media 82, 83–5 transposition errors 55–6 travel arrangements 89 Trojans 111, 112 troubleshooting, hardware problems 40–1 truth table 274 turnaround document 52 twisted pair cable 82, 83 typographical errors 55–6 TAB stops 136 table of contents 62, 151–2 table tools 143–5 see also database table tablets 7–8, 9 telecommuting 122 telephone directory 63 terabyte (TB) 14, 15, 16–17 terminators 271 weather forecasting 5, 253 web browser 31, 90, 165 HTML and URL 91–2 viewing web pages 168–9 web hosting companies 177 web pages adding hyperlinks 161 assignment 328, 333, 338 content of 163–4 Uniform Resource Locators (URLs) 91–2 upload 93, 177 USB cable 10, 12 USB flash drive 15 USB ports 12 user interfaces 2, 33–7 validation 56, 59–60, 233 values 184, 185 variables 258, 266–7, 295 VDUs (visual display units) 27–8, 39 verification 55–8 violation of privacy 107 virtual assistants 33–4, 35 viruses 30, 111, 112 VLOOKUP function 189–91 vulnerability 102 364 9781380023322_text.indd 364 31/10/2019 11:23 Appendix Index A creating 161, 165–72 design 31 inserting hyperlinks 161, 172–6 layout 163, 164 number in a website 163 viewing in a web browser 168–9 web server 93 web technologies 71, 90–4 website home page 167, 170 websites creation 165, 166–7, 171 intended audience 163 interacting with 93 maintenance 179 planning 161, 162–4 publishing 161, 166, 177 reasons for 162, 163 testing 161, 176–9 using a test audience 178 web page content 163–4 web page layout 164 web page numbers in 163 WHILE DO loop 262–3, 269, 270, 296, 307–9 Wi-Fi 72, 75, 78–9, 79 router 86 satellite communication 85 security practices 116 wide area networks (WANs) 74–5 WIMP 36, 37 Windows Access 31, 221 Windows Defender Firewall 101 Windows Excel 31, 60, 182 Windows Word 31, 128, 161, 166 wired network 82, 83–4 wireless network 78–9, 82 local area 8 transmission media 84–5 wireless standards 76–7, 88 word processing assignment 328, 332, 338 creating a document 128, 129–33 editing 128, 140–6 fillable electronic form 154–7, 332 formatting 128, 133–9 mail merge features 152–4 protecting a document 128, 150–1 review features 128, 146–9 table of contents 151–2 website creation 165, 166–7, 171 word processor 31 word wrap 133 workbooks 184, 186 worksheets 184, 333–4 using multiple 215–17 World Wide Web 54, 90 uploading a website 177 worms 111, 112 wrap text with image 172 WYSISYG editor 166 365 9781380023322_text.indd 365 31/10/2019 11:23 9781380023322_text.indd 366 31/10/2019 11:23