Академический Документы
Профессиональный Документы
Культура Документы
[A
dvanced
omputer
pplications
SECRETARIAL STUDIES
page
A.C.A.
[A
dvanced
omputer
pplications
DEFINE A COMPUTER
An electronic machine that works under the control of stored programs to accept, process & output
data/information for use by the operator.
A device that accepts data, processes the data in accordance with a stored program, generates results, and
usually consists of input, output, storage, and arithmetic, logic, and control units.
A functional unit that can perform substantial computation, including numerous arithmetic operations or
logic operations, without human intervention during a run.
Computer program:
A set of instructions, written in a specific programming language, which a computer follows in processing
data, performing an operation, or solving a logical problem. See also software.
A computer program is a set of statements or instructions to be used directly or indirectly in a computer in
order to bring about a certain result.
Input unit
Output unit
Main memory
CPU
Arithmetic &
logic unit- performs
Input Unit
logic
Data &
instructions
Output Unit
Information after
processing
Backing/Auxiliary
Storage-
supplements
the main storage.
page
A.C.A.
[A
dvanced
omputer
pplications
Hardware comprises all of the physical parts of a computer, as distinguished from the
data it contains or operates on, and the software that provides instructions for the
hardware to accomplish tasks.
DEFINE SOFTWARE & GIVE EXAMPLES.
Computer software (or simply software) refers to one or more computer programs and
data held in the storage of a computer for some purpose.
Program software performs the function of the program it implements, either by
directly providing instructions to the computer hardware or by serving as input to
another piece of software.
page
A.C.A.
[A
dvanced
omputer
pplications
page
A.C.A.
[A
dvanced
omputer
pplications
their PCs and get recommendations from persons you trust. Eventually you may
need to have your PC serviced. Ideally, the vendor has a service department that
can repair your PC. If not, you may need to locate a third-party to provide this
service.
6. PC architecture. PC architecture refers to the design and construction of the PC
and its system unit, and not all architectures are the same. For example, the
architecture of an Apple Macintosh differs from that of an IBM or compatible PC.
Therefore, software written for an Apple Macintosh PC may not run on an IBM or
IBM-compatible PC. Although some users prefer a Macintosh PC, more software is
available for IBM and IBM-compatible PCs.
7. Microprocessor. Selecting the right microprocessor is extremely important.
Processing speed, measured in megahertz (MHz) or gigahertz (GHz), is probably the
first consideration. The higher the number of MHz or GHz, the faster the processor
will manipulate data. If speed is important, consider choosing a microprocessor
with a speed of 866 MHz or more. PCs containing microprocessors with speeds up to
1.5 GHz and higher are available.
8.
Main memory. Main memory (RAM) is needed for the temporary storage of
programs and data while the data is being processed. Some application software
requires a considerable amount of RAM to function properly, and newer software
versions usually require more RAM than older versions. Typical PCs now come with
64 megabytes (MB), 128 MB, or more of RAM. Make certain the PC has sufficient
RAM to run the software you will be using.
9. Secondary storage. What type(s) and amounts of secondary storage are you likely
to need? Typical computers come with a floppy disk drive and a hard disk drive
already installed. A standard floppy disk can store up to 1.44 MB of data, although
other types of floppy disks are available that provide greater storage capacity. A
hard disk drive contains one or more rigid storage platters and provides for the
permanent storage of considerably more data. However, the disk itself cannot be
removed from the drive. The storage capacity of a hard disk is an important
consideration because it is used to store all system and application software.
Typical hard disk capacities are 20, 40, or 60 GB and more. Be certain the PC you
are considering has sufficient secondary capacity for your needs.Other secondary
storage devices and media are available. CD-ROM drives provide high storage
capacities. Most software publishers store their programs on CD-ROM because of
the high capacity and because CD-ROMs operate faster than floppy disks. If you will
use your PC to play movies, your purchase should include a DVD (digital video disk)
drive. If you will work with large files, consider purchasing a computer that
includes a CD-RW drive. A CD-RW disk is a reusable high-capacity disk that allows
you to store huge amounts of data and to erase data no longer needed.
10. Ports. The number of ports (slots) available inside the system unit determines the
number of add-on boards that can be installed inside the system unit. For example,
you cannot connect a printer to your computer unless your computer is equipped
with an appropriate port (slot). Be sure the PC contains the necessary slots for the
add-on boards and peripheral devices you will be using with your computer.
11. Input Devices. Typical input devices are a keyboard and a mouse, although other
kinds of input devices are available. Most keyboards and mice operate similarly.
However, there are slight differences in how each "feels" to the user. Before buying
a PC, you may want to test the keyboard and mouse for comfort and ease of use.
page
A.C.A.
[A
dvanced
omputer
pplications
Some sellers will allow you to exchange the keyboard or mouse that comes with the
computer for a different one.
12. Output Devices. Output devices produce output in either soft copy or hard copy
form. Most PCs come with a monitor (for soft copy output), but you may have to
purchase a hard copy device, such as a printer, separately.
13. Monitors. There are wide differences among PC monitors, with resolution being
perhaps the most important variable. Resolution refers to the clarity of the text
and images being displayed. Before making a purchase, carefully evaluate the
monitors resolution. Many vendors allow you to choose from monitors with varying
resolutions. A resolution of 1,024 by 1,024 is considered high-resolution, in which
text and images display exceptionally clearly. High-resolution monitors are typically
more expensive.Monitor size is another important consideration. Viewing areas
range from 15 diagonal inches to 21 inches and higher. Larger monitors are usually
more expensive, but may be worth the extra cost. For example, an individual with
weak vision may prefer a larger monitor. If your desktop space is limited, consider
purchasing a flat-panel monitor, which occupies less space. Flat-panels are more
expensive than standard monitors, however.
14. Printers. Two popular types of printers are inkjet and laser, both of which are
versatile and capable of producing high-quality output in color. Examine a variety
of printers and models and check the price and output quality of each type and
model.
Most inkjet printers are quiet, produce high-quality output, and are
relatively inexpensive, although the ink cartridges they use can be
expensive. Print resolution is an important factor to consider. Some offer
impressive resolution and can produce output of amazing color.
Laser printers are fast and can produce high-quality output in both black
and color tones. Color laser printers are more expensive than those using
only black toner. The cost of color laser printers ranges from a few hundred
to thousands of dollars. Choose Software to Match Your Needs List
You have been delegated the task of selecting a new printer from a range of different
options currently on the market. The machine has to serve a small network of
microcomputers in your office. Software used includes a word processing package,
database, spreadsheet, and presentation packages. Assuming that cost is not a major
constraint, list 10 features of the printers, which you would investigate in your evaluation.
1. Print quality, for example the print from dot matrix printers varies with the number of
pins and even the best are inferior to laser printers.
2. Character formation, whether made from dots as in matrix printer, or full characters
as with daisywheel or laser printer
3. Multi-part, i.e. whether several copies can be printed at once, as with an impact
printer.
4. Fonts or type style; early computer users were satisfied with any quality whatsoever,
but the advances into areas such as word processing and desk top publishing have
stimulated a demand for varying type faces or fonts within the same document
5. Letter quality, whether the quality is equivalent or superior to that of a good
typewriter and so acceptable for the word processing of mail. Some printers have a
choice of two print modes, draft quality and letter quality.
6. Speed, in terms of characters per second.
7. Graphics capabilities.
page
A.C.A.
[A
dvanced
omputer
pplications
8. Flexibility, for example is it suitable for one task only, such as good letter quality but
9.
10.
11.
12.
13.
14.
not graphics, as with daisywheel printers, or good graphics but slow speed and
indifferent letter quality, as with some dot matrix printers.
Sheet feeding, in terms of single sheets, friction feed or sprocket feed.
Capital cost or what it costs to buy.
Running cost or what it costs in ribbons, print toner, special stationery & maintenance.
Compatibility with standard packages; many programs support a range of printers by
generating the correct control characters for fonts, features like italics and underline,
and for graphics.
Robustness; some very cheap printers are ideal at home but would not last very long in
an office.
Reputation of the manufacturer as a supplier of printers.
decrypted only if you have the key & code to decrypt the data on the receiving end.
The process of transforming a message in ordinary language i.e. plain text to produce
what is called cipher text which is then send along a communication line/link. The
receiving computer uses another transformation to decode the message.
Definitions of decryption on the Web:
The process of converting encrypted content back into its original form, often the process
of converting cipher text to plaintext. Decryption is the opposite of encryption.
Definitions of encryption on the Web:
Any procedure used in cryptography to convert plaintext into cipher text in order to
prevent anyone except the intended recipient from reading that data. There are many
page
A.C.A.
[A
dvanced
omputer
pplications
types of data encryption, and they are the basis of network security. Common types include
Data Encryption Standard and public-key encryption.
Definitions of cipher text on the Web:
Data that has been transformed by encryption so that its semantic information content (ie,
its meaning) is no longer intelligible or directly available.
building.)
Protecting yourself against viruses by running anti-virus software.
Using a system of passwords so that access to data is restricted.
Safe storage of important files stored on removable disks - eg locked away in a fireproof and waterproof safe.
Allowing only authorized staff into certain computer areas, eg by controlling entry to these areas by means
of ID cards or magnetic swipe cards.
Always logging off or turning terminals off and if possible locking them.
Avoiding accidentally deletion of files by write-protecting disks.
Using data encryption techniques to code data so that it makes no apparent sense.
BACK UP
Copying or saving data to a different location. One can restore the backup copy
if data is lost or damaged.
page
A.C.A.
[A
dvanced
omputer
pplications
DISASTER PLANNING
Many companies have comprehensive emergency plans so that even after suffering a
severe:
Bomb
Fire damage
Natural disaster, the company can be up and running within a day or two.
A completely up to date copy of the company Database may be permanently maintained at this site with all
transactions being transmitted to this remote site updating the database, copying etc.
The data should be backed up/stored to one or more media to ensure recovery in case of disaster.
The back up procedures and media should be tested periodically to assess their effectiveness.
Data can be lost or damaged during a system crash - especially one affecting the hard disk.
Data can become corrupt as a result of faulty disks or disk drives, or power failures.
Data can be lost by accidentally deleting or overwriting files.
Data can be lost or become corrupted by computer viruses.
Data can be hacked into by unauthorized users and deleted or altered.
Data can be destroyed by terrorist activities, war, bombs and fire.
Data can be deleted or altered by unpleasant employees wishing to make money or seek revenge on their
employers.
Explain 5 major threats to information systems; for each threat describe its impact and
preventative measure you would adopt to prevent it. [15].
THREAT
Hardware failure
Electrical faults
IMPACT
CONTROL
Loss of data
Disk crushes
Damage to hardware
page
A.C.A.
[A
dvanced
Software failures
omputer
pplications
Absolute destruction
Security is breached
Security is bypassed
Destruction of files
Data is stolen
protectors
Buy software from reputable
vendors.
Do regular back ups
Software diagnostics
Relocate backups to other
areas free from disasters
Install a reliable anti-virus
software
Never download unknown email attachments
Scan unknown diskettes
Change passwords regularly
Employ a security guard
Install a firewall
Prevent unauthorized access to
computer facilities.
Human error
page
10
A.C.A.
[A
dvanced
omputer
pplications
h)
i)
j)
k)
l)
m)
n)
page
11
A.C.A.
[A
dvanced
omputer
pplications
transmit itself to other computers that are connected to yours, just like a physical virus can
move from one human host to another.
Viruses began in the late 1980s as personal computers and electronic bulletin boards became
more common. Back then, operating systems, word processing programs and other programs
were stored on floppy disks. Hidden viruses were programmed onto these disks; as the disks
were transferred from person to person, the virus spread.
WHO CREATES VIRUSES?
Where do viruses come from? Every virus is created by an author with a different motivebut
all virus builders feel their actions are justified. For some, a killer virus is the ultimate
technical challenge, like climbing a mountain. For others, creating viruses is a form of selfexpression. Some disgruntled employees, consumers or citizens turn to virus building as
revenge for perceived injustices. And though its a frightening thought, some viruses are built
and aimed by legitimate (but disreputable) businesses to weaken competitors. Other virus
authors want to make their mark in Internet history; these writers get a thrill out of seeing
their virus cause damage enough to attract news headlines both online and on the evening
news.
Todays viruses are far more potent than the beginner versions we saw several decades ago.
1)
2)
3)
4)
5)
page
12
A.C.A.
[A
dvanced
omputer
pplications
Multi-partite viruses are a combination of the boot sector and file virus. These begin in the
boot sector and affect both your boot records and program files.
The demonstrated characteristics of computer viruses include several remarkable items, including size,
versatility, propagation, effectiveness, functionality, and persistence.
1)
Size. The sizes of the program code required for computer viruses has been demonstrated to be surprisingly
small. This has facilitated the ability of these programs to attach themselves to other applications and escape
notice for long periods of time.
2)
Versatility. Computer viruses have appeared with the ability to generically attack a wide variety of
applications. Many do not even require information about the program they are infecting.
3)
Propagation. Once a computer virus has infected a program, while this program is running, the virus is able
to spread to other programs and files accessible to the computer system. The ability to propagate is essential to a
virus program.
4)
Effectiveness. Many of the computer viruses that have received widespread publicity have had far-reaching
and catastrophic effects on their victims. These have included total loss of data, programs, and even the
operating systems.
5)
Functionality. A wide variety of functions has been demonstrated in virus programs. Some virus programs
merely spread themselves to applications without otherwise attacking data files, program functions, or operating
systems activities. Other virus programs are programmed to damage or delete files and systems. The effectiveness
of these programs is enhanced through the use of several phases of operation, in which the virus propagates
through a system or lies dormant until triggered by a specified event. This allows the virus program increased time
to spread before the victim system's user becomes aware of its presence.
6)
Persistence. Even after the virus program has been detected, recovery of data, programs, and even system
operation has been difficult and time consuming. In many cases, especially in networked operations, eradication
of viruses has been complicated by the ability of the virus program to repeatedly spread and reoccur through the
networked system from a single infected copy.
page
13
A.C.A.
[A
dvanced
omputer
pplications
Antivirus tools/packages/software
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
Scanner examine every file on a specific disk drive, looking/searching for known virus
signatures. A signature is a string of software code that identifies a virus program. Every
virus has a unique signature
Anti-virus measures
Preparation includes making backups of all software (including operating systems) and making a
contingency plan.
Prevention includes creating user awareness, implementing hygiene rules, using disk
authorization software, or providing isolated 'quarantine' PCs.
Detection involves the use of anti-virus software to detect, report and (sometimes) disinfect
viruses.
Containment involves identifying and isolating the infected items.
Recovery involves disinfecting or removing infected items, and recovering or replacing corrupted
data.
page
14
A.C.A.
[A
dvanced
omputer
pplications
COMPUTER LANGUAGES
(a) Machine Language
Low level means the language can better communicate with the system.
LLL are closer to machine code
They use mnemonics i.e. ADD to add SUB to subtract etc
Easier for a programmer to write a program in LLL than machine language.
Programs have to be translated from source code into machine language
A programming language where each instruction corresponds to several machine code instructions. A compiler or
interpreter must translate instructions in this language before they can be processed.
MACHINE LANGUAGE
ADVANTAGES
No translation is needed
DISADVANTAGES
Much harder to code for programmers
because its a series of 1s & 0s.
Not portable
Machine Dependent
Errors are difficult to remove
DISADVANTAGES
Machine dependent
Harder to code than HLL
Not portable
DISADVANTAGES
page
15
A.C.A.
[A
dvanced
omputer
pplications
It is a portable language
Programs are much easier to read/
write coz its close to English
language.
Programs are problem oriented.
Errors are removed before translation
to Machine code [during compiling].
Slower in execution
Programs tend to be wordy hence they
take long to compile.
Requires more memory.
page
16
A.C.A.
[A
dvanced
omputer
pplications
9. Many interpreters will allow a program to run up to a point where an error occurs, let the
programmer fix the error & then continue to run the program from that point.
10. With an interpreter debugging is easier since the code is executed line by line.
11. Line by line interpretation can be slow
12. Interpreter can test your code as you write it
13. With an Interpreter there is no need to create object code & link programs.
GENERIC SOFTWARE AND THE ORGANISATION OF DATA
Define Software
Are basically programs, which are in a computer system?
Computer programs and procedures concerned with the operation of a computer system.
Definitions of software on the Web:
Written coded commands that tell a computer what tasks to perform. For example,
Word, PhotoShop, Picture Easy, and Photo Deluxe are software programs.
TYPES OF SOFTWARE
SYSTEM SOFTWARE
Programs that control and support operations of a computer system.
System software includes a variety of programs such Operating Systems, DBMS, Communication
control programs. Service and utility programs, and programming language translators.
A computer program that controls the components of a computer system and facilitates
the operation of applications. Windows Me, Windows XP, Linux, and MacOS are common
operating systems.
APPLICATION SOFTWARE
Programs that specify the information processing activities required for the completion of
specific tasks of computer users. E.g. Electronic Spreadsheet and word processing programs or
inventory or payroll programs.
o Software that is designed and written for a specific personal,
organizational, or processing task, such as graphics software.
o These programs accomplish the specialized tasks of the user, while
operating system software allows the computer to work. A computeraided dispatch system is application software, as is each word
processing program.
OPERATING SYSTEM
Description of the operating system
page
17
A.C.A.
[A
dvanced
omputer
pplications
The operating system thus allows the "dissociation" of programmes and hardware, mainly to simplify
resource management and offer the user a simplified Man-machine interface (MMI) to overcome the
complexity of the actual machine.
1.
Management of the processor: the operating system is responsible for managing allocation
of the processor between the different programmes using a scheduling algorithm. The type
of scheduler is totally dependent on the operating system, according to the desired
objective.
2.
Management of the random access memory: the operating system is responsible for
managing the memory space allocated to each application and, where relevant, to each
user. If there is insufficient physical memory, the operating system can create a memory
zone on the hard drive, known as "virtual memory". The virtual memory lets you run
applications requiring more memory than there is available RAM on the system. However,
this memory is a great deal slower.
3.
Management of input/output: the operating system allows unification and control of access
of programmes to material resources via drivers (also known as peripheral administrators or
input/output administrators).
4.
5.
6.
File management: the operating system manages reading and writing in the file system and
the user and application file access authorisations.
page
18
A.C.A.
7.
[A
dvanced
omputer
pplications
OPERATING SYSTEM
Definition
Are programs that create an environment, which enables us to use computers?
Is an integrated system of program that manages the operations of the CPU, controls
the input/output and storage resources and activities of the computer system, and
provides various support services as the computer executes the application programs?
Is a set of software routines that communicate between application programs and the
hardware?
All communications go through the operating system.
E.g. when a user issues a command to print, the O/S receives the command
& processes it according to priorities with the use of interrupts.
Once the processor is free to execute the command, the O/S sends the
message to the processor & receives the output, which is then directed to
the printer.
Examples:
NOVELL,VMS, OS/400, AIX, and z/OS, Windows Me, Windows XP, 95, 98,NT
2000, MS Dos, UNIX, Linux, and MacOS are common operating systems.
Types of operating system
There are several types of operating system, defined according to whether they can simultaneously
manage information measuring 16 bits, 32 bits, 64 bits or more.
System
Multi-task
DOS
16 bits
Windows3.1
16/32 bits
not pre-emptive
cooperative
Windows95/98/Me 32 bits
WindowsNT/2000 32 bits
pre-emptive
WindowsXP
32/64 bits
pre-emptive
Unix / Linux
32/64 bits
pre-emptive
MAC/OS X
32 bits
pre-emptive
VMS
32 bits
pre-emptive
page
19
A.C.A.
[A
dvanced
omputer
pplications
one person to use the system at one time. Multitasking OS may allow a user to
receive a fax message at the same time one is searching a database.
Is it a task switching operating system? A task switching OS lets one load more
than one program at a time and allows switching between the programs. The task
that one is working with is the foreground task and the suspended tasks are
background tasks.
What utilities are available with the OS? Some of the most commonly used
utilities on microcomputer OS are delete, copy contents of one diskette to another,
format a diskette, delete files stored in a diskette, and compress data.
Is the OS hardware dependent? An OS may be limited to running on specific
hardware or may have versions that allow it to run on different types of computer
systems.
What user interface is offered by the operating system? Graphical User Interface
and Command Driven User Interface are examples of user interfaces. See Interface
section.
Modes of operation
Computers can operate in many different ways requiring different and complex operating
systems.
This can mean running a couple of applications, sending a document to the printer and
downloading a web page.
However, operating systems are not truly multi-tasking - in order to do this, you would need
parallel processors, which are now appearing on personal computers.
Multiprocessing
An operating system technique which can manage multiple instruction processors, assigning each
to operate upon a different instruction stream (program or job) concurrently.
Multiprocessing is the use of two or more central processing units (CPUs) within a single
computer system. The term also refers to the ability of a system to support more than one
page
20
A.C.A.
[A
dvanced
omputer
pplications
processor and/or the ability to allocate tasks between them.[1] There are many variations on this
basic theme, and the definition of multiprocessing can vary with context, mostly as a function of
how CPUs are defined (multiple cores on one die, multiple chips in one package, multiple
packages in one system unit, etc.).
Multiprocessing sometimes refers to the execution of multiple concurrent software processes in a
system as opposed to a single process at any one instant. However, the terms multitasking or
multiprogramming are more appropriate to describe this concept, which is implemented mostly
in software, whereas multiprocessing is more appropriate to describe the use of multiple
hardware CPUs. A system can be both multiprocessing and multiprogramming, only one of the
two, or neither of the two.
Multi-access or multi-user
A multi-access (or multi-user) system is one where a number of users are able to use the same
system together.
Modern personal computers can allow multi user access i.e. more than one person can make use
of the computer resources at the same time via a LAN.
The central processor deals with users in turn; clearly the more users, the slower the response
time. Generally, however, the processor is so fast that the response time at the most is a fraction
of a second and the user feels they are being dealt with immediately.
An example is a UNIX server where multiple remote users have access (such as
via Secure Shell) to the UNIX shell prompt at the same time. Another example
uses multiple X Window sessions spread across multiple terminals powered by a
single machine - this is an example of the use of thin client.
Single-user
Batch processing
A batch processing system is where programs or data are collected together in a batch and
processed in one go. Typically the processing of payrolls, electricity bills, invoices and daily
transactions are dealt with this way.
This method of operation lends itself to jobs with similar inputs, processing and outputs where
no human intervention is needed. Jobs are stored in a queue until the computer is ready to deal
with them. Often batch processed jobs are done overnight.
page
21
A.C.A.
[A
dvanced
omputer
pplications
Consider a typical home computer. There is a single keyboard and mouse that accept input
commands, and a single monitor to display information output. There may also be a printer for
the printing of documents and images.
In essence, a single-user operating system provides access to the computer system by a single
user at a time. If another user needs access to the computer system, they must wait till the
current user finishes what they are doing and leaves.
Students in computer labs at colleges or University often experience this. You might also have
experienced this at home, where you want to use the computer but someone else is currently
using it. You have to wait for them to finish before you can use the computer system.
Today, these terminals are generally personal computers and use a network to send and receive
information to the multi-user computer system. Examples of multi-user operating systems are
UNIX, Linux (a UNIX clone) and mainframes such as the IBM AS400.
page
22
A.C.A.
[A
dvanced
omputer
pplications
The operating system for a large multi-user computer system with many terminals is much
more complex than a single-user operating system. It must manage and run all user requests,
ensuring they do not interfere with each other. Devices that are serial in nature (devices which
can only be used by one user at a time, like printers and disks) must be shared amongst all
those requesting them (so that all the output documents are not jumbled up). If each user
tried to send their document to the printer at the same time, the end result would be garbage.
Instead, documents are sent to a queue, and each document is printed in its entirety before
the next document to be printed is retrieved from the queue. When you wait inline at the
cafeteria to be served you are in a queue. Imagine that all the people in the queue are
documents waiting to be printed and the cashier at the end of the queue is the printer.
page
23
A.C.A.
[A
dvanced
omputer
pplications
divided amongst the users. It also makes better use of the resources. Since the resources are
shared, they are more likely to be in use than sitting idle being unproductive.
One problem with multi-user computer systems is that as more users access it, the
performance becomes slower and slower. Another disadvantage is the cost of hardware, as a
multi-user operating system requires a lot of disk space and memory. In addition, the actual
software for multi-user operating systems tend to cost more than single-user operating
systems.
What is a multi-tasking operating system?
A multi-tasking operating system provides the ability to run more than one program at once.
For example, a user could be running a word processing package, printing a document, copying
files to the floppy disk and backing up selected files to a tape unit. Each of these tasks the user
is doing appears to be running at the same time.
A multi-tasking operating system has the advantage of letting the user run more than one task
at once, so this leads to increased productivity. The disadvantage is that more programs that
are run by the user, the more memory that is required.
Revision Exercise 1
List FOUR things an operating system does.
List THREE home appliance devices in your home that probably have an operating system
controlling their function.
List FOUR hardware devices on a typical home computer that an operating system has to
initialize when it is turned on.
List THREE possible errors that might occur in a typical home computer that an operating
system has to handle.
page
24
A.C.A.
[A
dvanced
omputer
pplications
State THREE possible basic routines an operating system might provide for handling a hardware
device.
SYSTEM SOFTWARE- consists of programs that manage and support a computer system and its
information processing activities. These programs serve as a vital software interface between
computer system hardware and the application programs of end users.
3 functional categories
APPLICATION PACKAGES/SOFTWARE
rmakaha/Advanced Computer Applications/
page
25
A.C.A.
#
1
[A
dvanced
omputer
pplications
Are programs that are or were developed to solve specific user problems?
Word processors and spreadsheets fall into this category.
Software application packages can be custom built or they can be bought off the shelf.
APPLICATION
SOFTWARE
Word processing
software
EXAMPLES
A collection of software that permits the user to create,
edit and print documents. Most word processing packages
come with spell-checkers, grammar checkers and
thesaurus programs for creating drawings and table of
contents.
Allows managers to prepare budgets, tax analysis, sales
and profit projections. Managers can design templates,
which contain formulas used to create columns or row
averages. Spreadsheets allow managers to simulate various
solutions. A user may enter a number of different values
and see the effect on the results such as profit margins
Allows user to prepare reports based on data found in
different records. DBMS is an important managerial
decision support tool for managers at all levels of the
organization.
Ms publisher, Aldus
Internet explorer , Netscape ,
Mosaic
Ms Outlook, Ms Exchange
AutoCAD, CAM
Spreadsheet
software
Database
management
software
4
5
6
Payroll
Accounting
Presentation
graphics software
7
8
Desktop Publishing
Multimedia
9
10
Communication
Design
Advantages of using a word processor (e.g. MS Word) rather than a manual typewriter in an office
1) Ability to correct mistakes
2) Ability to view documents on screen before printing
3) Ability to incorporate diagrams
4) Ability to move parts of text to other sections of the document.
5) Ability to save or store documents for future reference or use.
6) Ability to alter or change document layout.
7) Ability to print a lot of copies [no retyping]
8) Ability to insert tables
9) Ability to format document [font, paragraphs, bullets etc]
Other - Good reasoning
List 10 facilities that spreadsheets offer. [10 marks]
Format cells, rows and columns, specifying for example, the alignment of text, number of
decimal points, height and width of a cell.
2. Copy cell contents to other locations
3. Determine the effect of several different hypothetical changes of data
4. Insert, move or delete rows and columns
5. Use functions such as SUM, AVERAGE, MAX, MIN in formulae
6. Create a simple database and sort or query the data to produce a report
7. Write macros to automate common procedures
8. Create templates i.e. spreadsheets with formats and formulae already entered, into which
new figures may be inserted.
9. Create multi-dimensional spreadsheets using several sheets, and copy data from one sheet
to another
10. Create many different types of charts and graphs
a)
1.
page
26
A.C.A.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
[A
dvanced
omputer
pplications
Cost. This includes the original cost of the package, technical support, and upgrades.
Portability, can it be installed on one type of hardware or a variety
Relevance of the software to the task at hand.
Compatibility with existing hardware & software. Will the package run on existing
hardware? Can files be easily transferred from existing systems without re-keying? Can files
created in the package be exported to other systems in use in the company?
It should be on a media compatible with your computer i.e. if you purchase software on
CD media your computer should have compact disk drive.
Sophistication, simple programs are usually easy to learn, cost less and are appropriate for
those who use the software infrequently.
Should include enough documentation such as installation instructions, system
requirements e.g. Pentium 4, reference manual, registration information, supplier details
and user manual.
Standard software, which is well supported locally i.e. used by most people in that area
Is the application upgradeable and does it support future upgrades.
Easiness of installation
Technical support. Is support available? Is it very costly? Often, technical support contract
can add 50% or more to the price of a package, but without it no support at all will be
given by the manufacturer.
Easy of learning. Are tutorials supplied? Are books on the software available in bookshops?
Are training courses available?
Easy of use and user- friendliness. Is it easy to use, for example using pull down menus,
icons, helpful error messages when you do something wrong?
Is the application from a reputable supplier e.g. Microsoft.
Do you have enough resources on your PC to install it e.g. it may require 256MB RAM,
80GB HDD. Memory requirements; software packages vary in the amount of memory they
require. Will the system require expenditure on more powerful hardware?
Does the version of the product that I am considering run on my personal computer
system? Is it compatible with my platform (PC, Macintosh, Sun, and so on)? with the
processor used in my computer (486, Pentium, Motorola 6040, PowerPC, and so on)? and
with the operating system that I am running (DOS, Windows, NeXT Step, UNIX)?
Is the product compatible with other programs, such as extensions and device drivers,
that I have on my personal computer system?
Does the product do all that I want it to do? Is it simple enough to use immediately but
powerful enough to provide the capabilities that I will want as my familiarity with the
program increases?
Is the product an up-to-date, current version or release?
Does the product have a clear, step-by-step tutorial? Is the product easy to learn?
Is the product accompanied by clear, easy-to-follow instructions, or documentation?
Does the manufacturer provide technical assistance? Is a toll-free technical assistance
number included in the software documentation? Does the manufacturer have a bulletin
board or Internet address for technical assistance questions? Does the manufacturer
charge for technical assistance? for product revisions or upgrades?
Can I find instruction, or training, in the use of the product?
Is the product from a respected, well known manufacturer?
Does the program have any known problems, or bugs, and will these affect my use of the
program?
Does the product come with a warranty, and what are the conditions of that warranty?
Does the product cost more or less than comparable products on the market?
page
27
A.C.A.
[A
dvanced
omputer
pplications
Education
Utility
page
28
[A
A.C.A.
dvanced
omputer
pplications
Utility programs - these can be part of an operating system, but are also available for separate
purchase. Examples include virus checkers, disk defragmenters, back up utilities and disk
checker software.
Generic - general purpose software that is not written for any particular type of business.
Examples of this include word processors and spreadsheets.
Integrated - a collection of software that has a common set of commands/icons. Usually they
include word processors, spreadsheets and graphics software, but they can contain databases as
well. They tend to be cheaper than purchasing each application separately.
Specific - software written for a defined purpose. Accountancy software is a good example of
this, and can be bought by anyone.
Bespoke - also known as 'tailor made'. A company may need a particular piece of software that it
cannot purchase because it does not exist yet - or it does not like what is available. The company
can commission the software to be specially written for them. This tends to be expensive.
Disadvantages
1. The package may not do exactly what you want it to do;
2. It may not run on the firms existing hardware
3. It may not interface with other software already in use in the organization.
page
29
A.C.A.
[A
dvanced
omputer
pplications
Disadvantages
1.
2.
3.
4.
5.
6.
7.
8.
9.
Being customized, the non-standard software may not be used by any other
organization.
It has huge support costs after implementation.
Dependency syndrome with the supplier. There is heavy reliance on the developers of
the software for its continued existence & maintenance
Future support may be difficult if the supplying company goes under, shuts down, or
liquidate or if its development staff leaves.
May not be upgradeable and may not run if moved to a new hardware platform.
You are tied to a supplier of which you may not be willing to have a maintenance
contract with.
Written or Custom-built software performs a defined function and is expensive to
build.
Custom built is expensive to maintain
Custom built software has reduced lifespan due to high speed of technological
advancement in the field of computers.
3. Managerial applications
Help to make management decisions
Decision support systems
Database Management Systems Report Writing Tools
MAKE NOTES ON:
How application packages solve problems?
Typical problems which can be solved by application packages
Customization of packages using macros
Examples
Disk defragmenters. Examples include a Disk defragmenter can detect computer files
whose contents have been stored on the hard disk in disjointed fragments, and move
the fragments together to increase efficiency;
Disk checker can scan the contents of a hard disk to find files or areas that are
corrupted in some way, or were not correctly saved, and eliminate them for a more
efficiently operating hard drive;
Disk cleaner can find files that unnecessary to computer operation, or take up
considerable amounts of space. Disk cleaner helps the user to decide what to delete
when his hard disk is full.
System Profilers. A System profiler can provide detailed information about the
software installed and hardware attached to the computer.
Backup software can make a copy of all information stored on a computer, and restore
either the entire system (e.g. in an event of disk failure) or selected files (e.g. in an
event of accidental deletion).
page
30
A.C.A.
[A
dvanced
omputer
pplications
Disk compression software can transparently compress the contents of the hard disk, in order to fit more
information to the drive.
Virus scanners. Virus Scanners scan for computer viruses among files and folders.
Compression utilities output a shorter stream or a smaller file when provided with a stream or file.
Encryption utilities use a specific algorithm to produce an encrypted stream or encrypted file when provided
with a key and a plaintext.
Software that contains several applications rolled into one. Integrated software usually includes
word processing, spreadsheet, database, graphics and communication capabilities. Two popular
integrated software packages are Microsoft Works and ClarisWorks:
ANOTHER EXAMPLE OF INTEGRATED SOFTWARE is the developer's office suite for those who
create new software. These packages offer programs including word processing, Hypertext Markup
Language (HTML) editors, web navigation tools, e-mail, bulletin board managers, application builders,
scripting languages, directory browsers, help browsers, and program editors.
A suite of programs for home computer use can include software that a home user would find helpful,
such as word processing, money management, e-mail, a web browser, an encyclopedia, and a dictionary. A
lawyer's office suite typically includes a combination of word processing, proofreading, document
assembly, research, web navigation, and e-mail programs.
A variety of manufacturers offer these integrated software packages, and each has its own unique
advantages depending on the needs of its targeted customer base. This article describes the typical
business office suite.
The first efforts to combine capabilities resulted in integrated programs, such as Microsoft Works and
Claris Works. Each was a single program that combined several software functions, such as simplified
versions of word processors, spreadsheets, and databases. Early versions of these programs created
documents that could not be exported into more sophisticated full-sized word processing or spreadsheet
page
31
A.C.A.
[A
dvanced
omputer
pplications
applications. Their primary benefit to the user was that multiple office functions could be accomplished
using one piece of software.
Microsoft Office 97 and Lotus SmartSuite 97 are both fully functional integrated software packages of
several programs. When they were introduced, they were immediately adopted by many businesses
because they allowed several applications to share data easily. Each suite included word processing,
spreadsheet, organizer/scheduler, database, graphics, and e-mail programsall designed to work
seamlessly together. They allowed users to create complex documents that incorporated information
generated by two or more of the applications, such as a word processing document that included
diagrams, graphs, spreadsheets, and hyperlinks.
Pasting, Linking, and Embedding
Integrated software offers users a variety of cut and paste tools to share data among applications. On the
simplest level, information can be cut or copied from the source application (for example, a block of cells
from a spreadsheet) and pasted into the target application (such as a word processing document). With
the paste tool, a user can place a snapshot of the desired section of the spreadsheet in the document.
The cutting and copying tools save the desired spreadsheet cells in multiple formats so that the paste
process will be successful with a display of the added material in the format that works best. Although the
cut, copy, and paste tools are the simplest way to share information, the data in the target document is
not kept current if changes are made in the source location. The old data remains until the new data is
pasted in its place.
Object Linking and Embedding (OLE) helps resolve this limitation by pasting an embedded link or object in
the target application. This process requires the paste link or paste special tools, instead of paste. OLE
works only with OLE-enabled applications. When a link is pasted into a target document, it becomes a
compound document. All compound documents require the cooperation of all linked applications to
create the final product and require that all source applications be kept in their original location. If one
of the source applications is moved, or if the compound document is moved, the link is broken and the
document remains incomplete until the link is reestablished. As long as the link is intact, all changes
made on the source applications are displayed on the compound document.
For example, if the compound document is an analytical paper created on a word processor that includes
links to a drawing and a spreadsheet, all three applications (the word processor, the drawing program,
and the spreadsheet software) must cooperate to display and print the finished paper. Once the
document is created, all subsequent changes made on the spreadsheet or drawing are tracked by a system
of reminders. The next time the paper is opened using the word processor, the reminders deliver the
changes, which then appear in the document.
A second kind of compound document is one that includes embedded objects, which are created by using
the paste special tool. The successful use of embedded objects requires that all source applications
remain in their original locations. Embedded objects can be edited directly from within the compound
document, without the need to open the source document first. To make changes to an embedded
spreadsheet, for example, the user first opens the compound document and then double clicks on the
cells that are embedded on the page. This causes a small window to open so changes can be made
directly on the page. However, these changes are not transmitted to the source document. Likewise, any
changes made to the original spreadsheet are not reflected in the word processing document.
Another option, called paste as hyperlink, creates a hyperlink of the pasted object, such as the cells of a
pasted spreadsheet. By double clicking on a hyperlink, the user opens the source application for
easy editing. As long as the link remains valid, all changes made on the hyperlinked file are
reflected in the compound document.
SOFTWARE PACKAGE
A computer program supplied by computer manufacturers, independent software
companies, or other computer users.
Also known as canned programs, proprietary software or packaged programs.
A software package is a special method for the distribution and installation of software
on computer systems.
Proprietary software/Applications
Is software offered for sale or license where the vendor controls the source code?
Much of the software users are accustomed to is known as proprietary software. With
proprietary software users are not allowed to see the source code. Nor are they able to
modify the code for their own use or to distribute to others. In some cases certain
customers are allowed to view the source code - sometimes for an additional fee - but
page
32
A.C.A.
[A
dvanced
omputer
pplications
even then they are not able to alter and re-distribute the software. Examples of
proprietary software include Microsoft's Office suite.
Proprietary software is a term used to describe software in which the user does not
control what it does or cannot study or edit the code, in contrast to free software.
Non-proprietary software
Non-proprietary software is, in its widest possible sense, software that has no
proprietary restrictions attached to it, particularly the restriction about the access to
the source code. Non-proprietary software is the opposite of proprietary software,
which is software where the source code has not been made available, or it is
protected by restrictive licensing clauses.
SOFTWARE PIRACY
page
33
A.C.A.
[A
dvanced
omputer
pplications
Hard-Disk Loading. Some computer dealers load unauthorized copies of software onto the
hard disks of the computers they offer for sale, as an incentive for an end user to purchase
a computer from that particular dealer.
Counterfeiting. This is the illegal duplication and sale of copyrighted software, often in a
form designed to make the product appear legitimate. Software counterfeiting can be very
sophisticated, including significant efforts to replicate packaging, logos, and anticounterfeiting techniques such as holograms. It can also be unsophisticated, consisting of
inferior or hand-written labels, with disks folded into a plastic bag and sold on street
corners. A recent trend in counterfeiting is the emergence of compilation CD-ROMs, where
numerous unauthorized software publishers programs appear on one CD-ROM. In any
form, software counterfeiting is very damaging to both the software developer and
legitimate end users.
Online. This form of piracy occurs when copyrighted software is downloaded to users
connected through a modem to an electronic bulletin board or the Internet without the
express permission of the copyright owner. This should not be confused with sharing public
domain software or providing shareware. Shareware is software that may or may not be
copyrighted but is generally offered for little or no charge by the author for nearly
unrestricted use, including copying or sharing with others. Microsoft distributes
promotional products, free software, updates, or enhancements over bulletin boards or
online services, which may or may not be licensed for use solely with licensed Microsoft
products. You should check the EULA accompanying the product to determine how it can be
used.
License Misuse. This form of piracy occurs when copyrighted software is distributed
outside the restricted legitimate channels it was designed for or the product is used in
ways not allowed in the license agreement. Examples of license misuse include:
(1) Academic product misuse
This form of license misuse occurs when a product that is manufactured, licensed,
and specifically marked for distribution to educational institutions and students at
reduced prices is diverted into normal commercial channels of distribution.
Typically this product will contain a sticker indicating that it is academic product
and for use only by educational institutions.
(2) Not for Resale (NFR) product misuse.
Again, this form of license misuse occurs when a product that has been clearly
marked "Not for Resale," and is typically distributed as a promotional or sample
product and is not licensed for normal commercial distribution and use, is diverted
into normal commercial channels of distribution.
(3) Original equipment manufacturer (OEM) stand-alone product. This form of
license misuse occurs when OEM version software has been unbundled from its
designated computer system and distributed as a separate, stand-alone product.
Microsofts agreement with computer manufacturers prohibits them from distributing
Microsoft products in this fashion, i.e. without accompanying computer hardware.
Microsoft products on the retail shelf should never include a line on the front cover of
the Users Guide that states, For Distribution Only With New Computer Hardware.
(3) Microsoft Easy Fulfillment (MEF) product misuse. This form of license misuse
occurs when a Microsoft Easy Fulfillment (MEF) product is diverted into normal
commercial channels of distribution. The MEF product may be distributed only to
end users who have a Select or Open (MOLP) license and who order the product in
accordance with their license terms. The MEF product has a sticker on the jewel
case identifying the product as Microsoft Easy Fulfillment.
(4) Volume licensing misuse. Volume Licensing enables organizations to acquire the
rights to copy and use specific Microsoft software products with agreements
tailored to the number of products needed at the particular organization. These
volume programs offer a broad range of products and licensing options and reduce
administrative overhead and software management costs.
page
34
A.C.A.
[A
dvanced
omputer
pplications
a. Select provides savings for medium and large organizations with significant volume
requirements through forecasting software needs over a two-year period.
b. Open provides savings for small and medium organizations for licenses of as few as
20 units of a particular software product, with a simple ordering process.
Misuse under volume licensing occurs when organization copies software purchased
through the volume program on more computers than specified in their license
agreement. Other violations occur when an organization allows concurrent use of
software products (which currently is offered only as an option under the Select and
Open programs) without the purchase of the option that allows for this concurrent use.
User licenses show users rights to use pieces of software.
Definitions of data processing on the Web
Taking the raw data gathered by interviewers, finding and correcting any errors,
tabulating it and creating spreadsheets similar types of documents so that response
patterns can be read and interpreted.
The systematic performance of operations upon data, eg, handling, merging, sorting,
computing. Synonymous with information processing.
DATA
Relationship between Data and Information
Data is raw information
a collection of facts from which conclusions may be drawn; "statistical data"
INFORMATION
Data that has been processed to add or create meaning and hopefully
knowledge for the person who receives it. Information is the output of
information systems.
Organized data which is understood to have significance and meaning
Methods of data collection {see Systems Analysis & Design}
Questionnaires
Observation
Sampling
Interviews
Written documents & research
page
35
A.C.A.
[A
dvanced
omputer
pplications
DATABASE
Is a collection of files?
An organized collection of interrelated files.
Is a collection of related files that provides a way of finding information quickly and easily from
a chosen reference point?
Is an integrated collection of logically related records or files?
A database consolidates records previously stored in separate files into a common pool of data
records that provides data for many applications.
Examples of databases are MS Access, MS Works Database, and DBaseIV.
File-Is a collection of related records.
Record-Is a collection of fields. It is a collection of fields arranged in a
predefined order.
Field-Is a collection of single items. It is an implementation of the data
attribute. It is the smallest unit of data to be stored in a database.
Primary key-Is a field whose value identifies one & only one record in a file.
Secondary key-An alternative index for identifying an entity. Its value can
identify single entity occurrences of all entity occurrences. A subset of all
entity occurrences.
Foreign key-Are pointers or links to occurrences of a different file. A foreign
key in one file must be a primary key in another file.
Descriptors-Are any other fields that describe business entities.
page
36
A.C.A.
[A
dvanced
omputer
pplications
DBMS functions
1. Data storage, retrieval and update. The DBMS must allow users to store retrieve and
update information as easily as possible, without having to be aware of the internal
structure of the database.
2. Creation and maintenance of the data dictionary
3. Managing the facilities for sharing the database. The DBMS has to ensure that
problems do not arise when two people simultaneously access a record and try to
update it
4. Back up and recovery. The DBMS must provide the ability to recover the database in
the event of system failure.
5. Security. The DBMS must handle password allocation and checking, and the view of
the database that a given user is allowed.
page
37
A.C.A.
2.
3.
4.
5.
6.
7.
8.
9.
10.
[A
dvanced
omputer
pplications
#
1
8
9
10
DISADVANTAGES
Limitations of databases arise from
increased technological complexity
Developing a large database and installing a
DBMS can be difficult and expensive.
More hardware capability is required, since
storage requirements for the organization of
data, overhead control data, and the DBMS
is greater
Problems of data inconsistency can arise if a
distributed database approach is used.
page
38
A.C.A.
iii.
[A
dvanced
omputer
pplications
Data dependence In a file processing system, the organization of files, their physical
location on storage hardware and application software used to access those files
depend on each other.
Changes in format and structure o data and records in file require changes to all the
programs
Database Environment
i.
Database
ii.
Database users
iii.
DBM System
iv.
Data Dictionary
v.
Database Administrator
vi.
User/system interface
Database Users
i.
Casual users
ii.
Nave users parametric users
iii.
Sophisticated end users
I. Occasionally use it, and if they do a HLL such as AQL may be used.
II. Those who use Standard queries and updates only e.g. bank cashiers, data entry
clerks e.t.c.
III. Know the whole range of facilities on a database environment.
Q a. Explain the 3 Major disadvantages of a file system (6)
b. Give and explain any 7 functions of a DBM System
FUNCTIONS OF A Database Management SYSTEM
1. Storage, Retrieval &Update
2. Catalogue
3. Logical transactions
4. Concurrency control
5. Recovery
6. Security
7. Communications
8. Integrity
9. Data Independence
10. Utilities
1. Storage, Retrieval &Update
- Allows users with the ability to store, retrieve and update data in the
database.
2. Catalogue
- Allows a catalogue in which descriptions of data items are stored and which is
accessible to users
3. Logical Transactions
- Allows a mechanism which will ensure that either all of the updates
corresponding to a given transaction are made or not made. .e.g.
ABORT ROLLBACK or undo all the changes
COMMIT- Transaction gone thru and is already in the database.
4. Concurrency Control
- Allows a mechanism to ensure that the database is updated correctly when
multiple users are updating the database concurrently
LOCKING OR DEADLOCK situations must be avoided
page
39
A.C.A.
[A
dvanced
omputer
pplications
5. Recovery
- Allows a mechanism for recovering the database in the event that the
database is damaged in any way.
A before / after image is usually created
6. Security
- Allows a mechanism to ensure that only authorized users can access the
database.
- Authorizations, encryption features and limited views can be used as security
provisions
7. Communication
- Must be capable of integrating with communications software on the database
environment on a multi-user environment.
8. Integrity
- Allows a mechanism to ensure that both the data in the database and changes
to the data follow certain rules.
9. Data Independence
- (Has facilities to) support the independence of programs from the actual
structure of the database.
10. Utilities
- Provide a set of utility services e.g. optimized
COMPONENTS OF A DBMS
1.
2.
3.
4.
5.
6.
7.
8.
9.
Data dictionary/directory
Data language
Application development tools
Security software
Report writers
Query language
Web server software
Teleprocessing monitors
Archiving, backup and Recovery systems
page
40
A.C.A.
[A
dvanced
omputer
pplications
You can ask ad-hoc questions of the database interactively without the aid of
programmers.
Examples SQL, NLQ, QBE. Structured Query language, Natural language Queries and
Query by Example.
7. WEB SERVER SOFTWARE
Turns the computer system housing database into a web server and enables users with
web connection to access data from wherever they are located.
Also convert data into a format that is readable by standard browsers.
8. TELEPROCCESSING MONITORS
A software package that manages communication between the database and remote
terminals.
9. ARCHIVING, BACK UP AND RECOVERY SYSTEMS
Provides the database manager with tools to make copies of the database.
Restart/ Recovery systems are tools used to restart the database and to recover lost
data in the event of a failure.
Database Models
i)
ii)
iii)
iv)
DEPT
course
Student
ii) Network database Model
Relationship among records is many to many
Allows entry into a database at multiple points because any data element
or record can be related to many other data elements.
Permits a record to be a member of more than one set at a time
page
41
[A
A.C.A.
dvanced
omputer
pplications
Network database
A logical data structure that allows many to many relationships among data records.
It allows entry into a database at multiple points, because any data element or record
can be related to many other data elements.
Hierarchical and network models are less flexible than other database
models because the relationship between records must be determined and
implemented before a search can be conducted.
CUSTOMER
CUSTOMER NO.
-
CUSTOMER NAME
-
CUSTOMER ADDRESS
-
Each object in an object-oriented database model is bound together with its own data
and a set of instructions that describe the behavior and attributes of the objects.
Objects use messages to interact with one another.
Every object is described by a set of attributes.
E.g. the object building in a database or architectural drawing may have the attributes
TYPE, SIZE, COLOUR just as in any.
page
42
A.C.A.
[A
dvanced
omputer
pplications
FILE PROCESSING
Is the process of updating the records in a file to accurately reflect changes in
the data?
It can be a manual process where procedures are in place to update forms,
which are sent to the respective person responsible for the update.
It can also be a computerized process where information is first stored in
transaction files until the master file is updated.
File processing methods:
Batch Processing
Transactions are collected and processed in batches [groups].
Transaction processing in which transactions are gathered and stored
for later execution.
E.g. a supermarket chain operates 5 outlets. At the end of the day all
information on sales [transaction file] is collected, & the main records
[master file] are updated with the sales for that day.
Performs a group of tasks all at once, while requiring little [or no]
interaction with the user.
It is a great time saver because the computer can perform repetitive
functions quickly & consistently.
Real-time Processing
The master records are updated as and when the transactions occur.
A form of transaction processing in which each transaction is executed
as soon as complete data becomes available for the transaction.
A supermarket chain would be linked by a network to a main computer.
Each time a sale is made the stock information is updated and the sale
information is also updated.
It is expensive and complicated.
Record and file locks are implemented to avoid problems with realtime processing.
Centralized processing
An information system where all critical data and programs are stored
on one main computer, usually a mainframe. Unlike the task-sharing
concept of a client/server system, the central computer retains all the
brains and brawn.
A computing environment in which all processing takes place on a
mainframe or central computer.
Puts all processing and control authority within one computer to which
all other computing devices respond.
Distributed Processing
The ability to have several computers working together in a network,
where each processor runs different activities for a user, as required.
Computers connected together by a communications network. Data
processing occurs on each of the computers, unlike a centralized
processing system in which terminals are connected to a host computer
that performs all of the data processing.
Use of computers at various locations, typically interconnected via
communication links for the purpose of data access and/or transfer.
page
43
[A
A.C.A.
dvanced
omputer
pplications
Scratch files- [Work files/Temporary files] are special files that contain
temporary duplicates of subsets for alternate sequencing of a master or
transaction file.
Definitions of scratch file on the Web:
A temporary file holding intermediate data during an operation, such as when
calculating arc intersections, or building feature topology.
page
44
A.C.A.
[A
dvanced
omputer
pplications
Log files-Are special records of updates to other files especially master and transaction
files. They are used in conjunction with archive files or to retrieve lost data
Definitions of log file on the Web:
A file that lists actions that have occurred.
A coverage or workspace history file containing a list of all commands used to operate
on a coverage or all commands used in the workspace.
MAKE NOTES ON:
Requirements for file processing.
File maintenance e.g. updates, additions, deletions, appending
File organization methods & access
File Organization-Is the arrangement of data records on storage media
It determines the manner in which individual records can be accessed or
retrieved
TYPES OF QUERIES
i.
ii.
i.
DIRECT QUERY
INVERTED QUERY
ii.
DIRECT QUERY
Is one where the user can identify the entity in which he is interested?
He may want to know some of the particular of attributes of that entity.
e.g. Where a sales man wants to know the amount and location of a particular product
in the organization.
He is able to identify the product by name or product number and this identification is
used as the key for making the query which is also the primary record key.
The basic purpose of the direct query is to know the attribute values of already
identified entities
INVERTED ENTITIES
is one where the user does not know the identification of entities in which he is
interested
he wants to identify the entities by some criteria or attribute values
e.g. the purchase department requiring a list of items for wh9ch the stock level is
below the desired level
in this case user does not know the identity of items already but want to know it
only specify a criterion as the basis of the query
Obviously the primary key cannot be used for retrieval, it is not available
Some attribute like stock level has to be used for the retrieval of records
Definitions of cycle time on the Web:
The time usually expressed in seconds for a controller to complete one on/off cycle.
Definitions of access time on the Web:
The average time interval between a storage peripheral (usually a disk drive or
semiconductor memory) receiving a request to read or write a certain location and
returning the value read or completing the write.
The amount of time it takes a computer to locate an area of memory for data storage
or retrieval.
The time required to retrieve data from a storage device and transmit it to a specified
location.
page
45
A.C.A.
[A
dvanced
omputer
pplications
Refers to reading or writing data records in sequential order, that is, one record after
the other. To read record 10, for example, you would first need to read records 1
through 9. This differs from random access, in which you can read and write records in
any order.
FILE ORGANIZATION
MODELS OF FILE ORGANISATION
i.
serial file organization
ii.
sequential file organization
iii.
indexed sequential file organization
iv.
direct file organization
v.
inverted file organization
Is one where the records are not stored in any particular order?
They are stored in the order in which they are received. New records are added at the end
of the files.
This method of file organization is used when:
o The usage of the records is not clearly known
o As a means of recording transactions as they happen
o As dump files reflecting the physical layout of a file
o Or as a prelude to organizing the file in another order. E.g. Transactions may be
punched and stored on a serial file .the file may subsequently be sorted into a
desired sequence.
It gives maximum utilization of space but there is no room left for inserting other records.
Examples of files stored using serial organization are: archive files, output files, security
files.
It does not cater for direct access to records.
Is the only file organization method used on magnetic tapes?
page
46
A.C.A.
[A
dvanced
omputer
pplications
Updating on tape is carried out in batch mode by reading the whole file and rewriting it
after necessary modification on to a new file.
On disk can be carried out without rewriting the whole file.
RETRIEVAL
Retrieval of a record from a sequential file on tape media can be made only in the
sequential mode by reading all the records in sequence till the desired record is reached.
o Retrieval of a record from a sequential file on direct access media (DISK) can be made by
using sequential reach skip search, binary search.
HIT RATE
o In a batch processing run: The proportion of the number of records processed during a run to
the total number of records on the file is called a hit rate.
o The higher the volatility and the lower the frequency of updating,, the higher the hit rate.
PROCESSING OF SEQUENTIAL FILES
o Tapes provides for only serial access
o Disks can be accessed in a serial order or random order.
o
Files are stored randomly or haphazardly and an address or key field is used as reference.
Records are physically located at an address that is calculated from its primary key field.
The calculation of the address from the key field is called hashing.
Records are scattered on the storage disk instead of being arranged next to one another or
linked via a pointer field.
Records can be retrieved rapidly
Used on magnetic disks e.g. Floppy disks & hard disks.
Types of files: transaction files, master files.
Direct access [information is readily available].
Method is costly in terms of device used and space.
Records are stored in sequence but in addition an index is provided to enable individual
records to be located directly after reading the index.
Records are pointed to by indexes.
Used with disks only not with magnetic tapes.
A method of storing data records in a file sequentially, But in addition some sectors of the
disk are reserved for an index-key field to locate data records in this organization.
Wastes space
The index may be ignored & the data is read sequentially.
page
47
A.C.A.
[A
dvanced
omputer
pplications
The file may be accessed sequentially but using the index to skip over unwanted records,
this is called selective sequential access.
The index may be read into memory & used to obtain data randomly.
ISAM stands for Indexed Sequential Access Method, a method for storing data
for fast retrieval. ISAM was originally developed by IBM and today forms the
basic data store of almost all databases, both relational and otherwise.
COMPUTER MEMORY
rmakaha/Advanced Computer Applications/
page
48
A.C.A.
[A
dvanced
omputer
pplications
The computer has two types of memory chips within the system unit, known as RAM and ROM.
RAM (Random Access Memory)
Also referred to as Main Memory, Primary Memory or Working Memory is memory that is accessed
by the CPU as it processes information. The CPU also places results of processing on the memory
chip. The memory has the following characteristics.
1) can be read from
2) can be changed and can be rewritten
3) used for short-term storage of data i.e. it is temporary storage,
4) is volatile (data lost when power is turned off).
Static RAM
It is a volatile memory
Data is stored; it remains there indefinitely unless if the power is lost or new data is
written
Dynamic RAM
Is one which data is stored on capacitors, which require periodic recharging [refreshing] to retain
data?
*if you wish to upgrade your PC, you would buy additional memory chips to increase the power of
your computer (computer performance).
ROM (Read Only Memory)
This memory chip has essential programs that start up the computer hardwired on the microchip
during the manufacture of the computer. It forms what is known as FIRMWARE, being a halfway
between hardware and software. The characteristics of this memory are that:1) can be read from,
2) cannot be changed
3) is permanent
4) non-volatile (data not lost when power is turned off).
ROM
Stores instructions & data which do not change
It is written once during manufacture
It is for holding software such as MS-DOS.Windows 95, 98.XP.
It is programmed by the manufacturer and cannot be altered by the user
It is static & non volatile
It stores control routines for personal computers
VARIATIONS OF ROM
Allow users to store and in some cases to change data stored in ROM
PROM [Programmable ROM] is not programmed during manufacture but can be
programmed by the user. It is programmed according to the needs of the user
organization. If you make a mistake the ROM once programmed will became permanent
to the effect that any errors will never be corrected thus the user will throw away any
chip if errors are made.
EPROM [Erasable Programmable ROM] can be programmed and erased as many times.
This time you dont have to worry about errors too much because there is room for
correction. The programming is done electronically. Stored data can be lost by exposing
it to Ultra Violet light over a period of minutes.
1) EEPROM [Electrically Erasable Programmable ROM] can be read, erased, rewritten,
without removing from the computer. The erasing & rewriting process is very slow
compared with reading, which limits their use. These can be erased & programmed
with electrical pulses. Can be erased in a few Milliseconds
MEMORY CAPACITY
Everything entering into the computer is converted into digital (number) form, and is stored in
that form. When one needs to view the information, it is converted into human sensible text,
graphics, audio or video by the operating system. A binary digit is known as a bit being either a
0 (zero) or a 1 (one). It is the smallest item that can be stored in a computers memory.
Memory capacity is measured in bytes, a byte being a set of eight (8) bits and the byte often represents a
single character. Measurement units used for computer memory are:
BIT
1 binary digit (Either a 0 or a 1)
BYTE
Eight bits.
page
49
A.C.A.
[A
dvanced
NIBBLE
KILOBYTE (KB)
MEGABYTE (MB)
GIGABYTE (GB)
TERABYTE
omputer
pplications
The user is offered a simple menu from which to choose an option. One menu often leads to a further
menu. Part of the screen may have an instruction followed by a numbered list of options to choose from:
Graphical user interface is sometimes shortened to GUI. The user chooses an option usually by pointing a
mouse at an icon representing that option.
page
50
A.C.A.
[A
dvanced
omputer
pplications
WIMP interface
Windows, Icons, Menus and Pointer - a method by which a user can interact with a
computer without having to learn lots of special words - it provides a much more
intuitive 'view' of the computer and its facilities than non-WIMP operating systems
provide
"Windows, /images/, Menus and Pointer", or "Windows, /images/, Mouse and Pull-down
menus" This is a graphical interface which makes access to computers much more
straightforward and intuitive than the main alternative, the command-line interface.
The WIMP interface has been used on Apple Macintosh computers since they were
invented, and are coming into use on PCs through Microsoft Windows and on Unix and
other workstations through the X Window system.
page
51
A.C.A.
[A
dvanced
omputer
pplications
NETWORKING
LANs and WANs
LAN
(1) A computer network located on a user's premises within a communication across the
LAN boundary may be subject to some form of regulation. (2) A network in which a set
of devices are connected to one another for communication and that can be connected
to a larger network.
Communications network connecting computers by wire, cable, or fiber optics link.
Usually serves parts of an organization located close to one another, generally in the
same building or within 2 miles of one another. Allows users to share software,
hardware and data.
WAN
rmakaha/Advanced Computer Applications/
page
52
A.C.A.
[A
dvanced
omputer
pplications
DISADVANTAGES
1. Security concerns. Some user can gain unauthorized access to private data.
2. Increased administration. There will be need for a systems administrator to tune the
network, monitor the network, administer database files, and ensure network integrity
(ensure the network runs smoothly)
3. Network failure. As applications increase their use of a network, network failures
become catastrophic.
page
53
A.C.A.
[A
dvanced
omputer
pplications
The WWW stores millions of web pages on web servers. These pages can contain text, pictures,
movies, animation and sound. Web pages are written in a language or code called HTML
(Hypertext Markup Language). A set of web pages is called a website.
Each web page has its own unique address or URL. The URL will have the format "http" and a
domain (such as ."co.uk"). What goes in between is arbitrary, but often has the term "www "such
as in "http://www.name.co.uk". but it doesnt have to (e.g. http://news.bbc.co.uk).
Most sites have a page that links the user to the other main areas of the site. This is called the
homepage.
Web pages are connected by hypertext links. When a link is clicked you will be taken to another
page which could be on another server in any part of the world.
When you move around web pages you are said to be surfing the net. For this you need a
program to read the pages (called a browser), such as Firefox or Internet Explorer.
To search for a particular item or topic on the net you use a search engine. There are many
different kinds of search engine, each using slightly different ways of searching and indexing web
content. Google, MSN and Alta Vista are all examples of search engines, while Yahoo and Excite
are web directories (a bit like the Yellow Pages phone book) which have a search function built
in.
The World Wide Web Is software that runs on the internet which includes all
documentation that is shared and accessed on the internet.
page
54
A.C.A.
[A
dvanced
omputer
pplications
A Web page is a document designed to be accessed and read over the WWW. It must
have an address in a recognized format.
The Internet provides opportunities galore, and can be used for a variety of things. Some of
the things that you can do via the Internet are:
E-mail: E-mail is an online correspondence system. With e-mail you can send and
receive instant electronic messages, which works like writing letters. Your messages
are delivered instantly to people anywhere in the world, unlike traditional mail that
takes a lot of time.
Access Information: The Internet is a virtual treasure trove of information. Any kind of
information on any topic under the sun is available on the Internet. The search
engines on the Internet can help you to find data on any subject that you need.
Shopping: Along with getting information on the Internet, you can also shop online.
There are many online stores and sites that can be used to look for products as well as
buy them using your credit card. You do not need to leave your house and can do all
your shopping from the convenience of your home.
Online Chat: There are many chat rooms on the web that can be accessed to meet
new people, make new friends, as well as to stay in touch with old friends.
Downloading Software: This is one of the most happening and fun things to do via the
Internet. You can download innumerable, games, music, videos, movies, and a host of
other entertainment software from the Internet, most of which are free.
There are certain cons and dangers relating to the use of Internet that can be summarized as:
Personal Information: If you use the Internet, your personal information such as your
name, address, etc. can be accessed by other people. If you use a credit card to shop
online, then your credit card information can also be stolen which could be akin to
giving someone a blank check.
Pornography: This is a very serious issue concerning the Internet, especially when it
comes to young children. There are thousands of pornographic sites on the Internet
that can be easily found and can be a detriment to letting children use the Internet.
Spamming: This refers to sending unsolicited e-mails in bulk, which serve no purpose
and unnecessarily clog up the entire system.
There is information overload for the internet. Sifting through relevant information
can be a task in itself.
If there is tremendous increase in internet use, then gaining access will be a problem.
If you come across any illegal activity on the Internet, such as child pornography or even
spammers, then you should report these people and their activities so that they can be
controlled and other people deterred from carrying them out. Child pornography can be
reported to:
page
55
A.C.A.
[A
dvanced
omputer
pplications
page
56
A.C.A.
[A
dvanced
omputer
pplications
HTML
When you go on the Internet, you see web pages. The web pages are written in a code called
HTML (Hypertext Markup Language). This code is then converted into a viewable web page on
your screen. You need a browser to do this. A browser is a software application which has been
especially written to view web pages.
HTML code can be written by anyone, and there are three ways of doing it.
Type the code 'by hand' using a text editor such as Notepad. This requires you to know
how the code works and what it means, so it does require some learning. The
advantage however is that the writer has complete control of what is going on.
Use an office application. You can use a DTP, word processing or presentation package
to set up a normal page and then have the page converted to HTML by the program.
The disadvantage of this method is that you can only create a basic page.
A web authoring application is one that is written specifically for this purpose. Many
applications allow you to make changes to the page as it will look in an internet
browser and provide templates to which you can add your own content. The
disadvantage is that some measure of control is still lost. It is, however, much quicker
and much simpler to use this sort of software than the first two options to make a web
page or website.
Electronic mail
Electronic mail or email is a means of sending messages, text, and computer files between
computers via the telephone network. Because the telephone network covers the whole world,
email enables you to communicate world wide.
Web mail
Web mail, as its name suggests, is web-based email. To use web mail, you do not need any
email software - just a computer connected to the internet via any one of the connection types
listed above, and a browser.
Users simply sign up to the web mail service of a web portal such as MSN or Yahoo. They are
given a unique user name and a personal mailbox on the portal's email server, and they can
then send and receive messages via a special web page.
page
57
A.C.A.
[A
dvanced
omputer
pplications
A basic web mail account is usually free, although this will have a very limited amount of
storage.
The advantage of web mail is that users can receive and send mail from any computer in the
world with internet access. If you have a dial-up connection you can download your emails and
then read them offline to avoid staying on-line for long periods.
Some ISPs will enable their regular email customers to access their mailbox via web mail as
well as through the email software on their PC.
Features of email
Using email
Broadband email
- Your connection is always on - so simply write and address your message and hit 'send'
to send your mail and 'receive' to download any incoming messages from your email
provider's server.
Web mail
- Connect to the internet (if using a dial-up account) and open your browser.
- navigate to your web mail provider's portal and enter your user-name and password.
- all incoming mail will now be visible, and you can also compose and send mail, and
download attachments to your computer.
- When you're done, log out and close your connection.
Dial-up email
- Prepare your message offline as typing your message online will increase phone
charges.
- Connect to the internet and log on to your email account.
- Send your message and download any incoming mail sitting on your service provider's
computer.
- Log off and close your connection.
is evolving...
Many mobile phones already allow messages to be sent to the recipient's email inbox
while the sender is on the move. The latest generation of mobile phones enables users
to send and receive wireless email in exactly the same way as a static computer.
Email can be sent and received via digital TV, specially adapted phones, public kiosk
terminals and the latest generation of games console.
A spreading network of wireless 'hotspots' in public places allows people to send and
receive email via laptop computers.
A new range of in-car phones will enable motorists to check their email on the road
page
58
A.C.A.
[A
dvanced
omputer
pplications
Cheap: when using broadband, individual mail transfers are effectively free. When
going online from a dial-up account, calls are charged at local rates and (for
conventional email) need only last a few seconds.
Facility to send the same message to more than one person
Graphics and text can be electronically transmitted and placed in a document by the
recipient.
The message can be sent anywhere in the world at the price of a local call, without
having to leave your desk.
concerns
It can only be sent to people who themselves have access to the internet.
Viruses are easily spread via email attachments - anti virus measures must be in place
to avoid this and are now offered by many e-mail providers.
Phishing - sending an e-mail to a user falsely claiming to be a legitimate company to
scam the user into providing information such as personal information and bank
account numbers on a bogus website. The details will then be used for identity theft.
No guarantee the mail will be read until the user logs on and checks their mail.
Spam! Or Junk mail
NETWORK SYSTEMS
Is one in which processing is carried out independently in more than one
location, but with shared & controlled access to some common facilities, which
normally include file storage & information resources?
Definitions of hub on the Web:
A common connection point for devices in a network. Hubs are commonly used to
connect segments of a LAN. A hub contains multiple ports. When a packet arrives at
one port, it is copied to the other ports so that all segments of the LAN can see all
packets. A passive hub serves simply as a conduit for the data, enabling it to go from
one device (or segment) to another. ...
Node a terminal point in a communications network.
Workstation A computer terminal or micro- or minicomputer system designed to
support the work of one person.
STAR NETWORK
page
59
A.C.A.
[A
dvanced
omputer
pplications
A network in which all terminals are connected through a single point, such as a star
coupler.
A network topology in the form of a star. At the center of the star is a wiring hub or
concentrator, and the nodes or workstations are arranged around the central point
representing the points of the star.
BUS/LINEAR NETWORK
page
60
A.C.A.
[A
dvanced
omputer
pplications
RING NETWORK
page
61
A.C.A.
[A
dvanced
omputer
pplications
SYSTEM ANALYST.
Is the person who conducts systems study to learn relevant facts bout a
business/system activity?
Is the person who studies the problems and needs of a business to determine how
people, processes & technology can best accomplish improvements for the business?
Definitions of system analyst on the Web:
page
62
A.C.A.
[A
dvanced
omputer
pplications
An investigation which tries to clearly establish whether a project will work and achieve its expected results.
Such a study usually evaluates in detail a project's technical design, its costs and benefits, social and
environmental aspects, institutional issues, financial aspects, etc. Feasibility studies are usually carried-out
in the preparation stage of the project cycle
Operational feasibility
It is a measure of how well the solution of problems or a specific solution will work in the organization. It is also a
measure of how people feel about the system/project. It determines if it is worth to solve the problem & determines
the end user reaction.
Definitions of operational feasibility on the Web:
The process of assessing the degree to which a proposed system solves business problems or takes advantage
of business opportunities
Technical feasibility
It is a measure of the practicality of a specific technical solution & the availability of technical resources & expertise.
Availability of proposed technology & its application .The decision to buy new technology or use existing technology.
Availability of technical expertise.
Definitions of technical feasibility on the Web:
The process of assessing the development organization's ability to construct a proposed system.
Whether reliable hardware and software, technical resources capable of meeting the needs of a proposed
system can be acquired or developed by an organization in the required time
Economic feasibility
It is a measure of cost effectiveness of a project or solution. This is often called a Cost Benefit analysis. During the
early stages of the project, economic feasibility analysis amount to, little more than judging whether the possible
benefits of solving the problem are worthwhile. Costs are practically impossible to estimate at this stage.
Definitions of economic feasibility on the Web:
page
63
A.C.A.
[A
dvanced
omputer
pplications
A process of identifying the financial benefits and costs associated with a development project.
Whether expected cost saving, increased revenue, increased profits and reductions in required investment
exceed the costs of developing and operating a proposed system
Social feasibility
How the system is going to affect the workers/users. The analyst has to find ways of developing the
system taking into consideration the fear of the users as well as the operation staff. Fear of losing
jobs, wage reduction, loss of prestige & inability to learn a new job may result in resistance for
change.
2.
3.
4.
Analysis
Analyzing the current system. What is wrong and what to do in order to sort it out?
Interviews
Questionnaires
Walkthroughs
Observation
Each module is tested alone in an attempt to discover any errors in its code.
The process of bringing together all of the modules that a program comprises for testing
purposes. Modules are typically integrated in a top-down, incremental fashion.
Integration testing is the phase of software testing in which individual software modules
are combined and tested as a group. It follows unit testing and precedes system testing.
Regression testing
Regression testing helps to ensure that changes made to the software code do not
break other previously working parts of the software. It is important to do
regression testing frequently while writing code, because the code as a whole may
easily "regress" to a lower level of quality after making a change. Regression testing
is necessary, even though a change appears to be working correctly and is believed
not to affect the rest of the software.
page
64
A.C.A.
[A
dvanced
omputer
The bringing together of all the programs that a system comprises for testing
purposes. Programs are typically integrated in a top-down, incremental fashion.
The testing of a complete system prior to delivery. The purpose of system testing is
to identify defects that will only surface when a complete system is assembled. That
is, defects that cannot be attributed to individual components or the interaction
between two components. System testing includes testing of performance, security,
configuration sensitivity, startup and recovery from failure modes. [21]
User acceptance testing- Involves the users of the programs, testing to see whether it
meets what was stated in the requirements of specifications [ROS]. User acceptance
testing involves the testing by the user to ensure that the complete package not only
works but also does what the users requested it to do.
A formal product evaluation performed by a customer as a condition of
purchase.
Formal testing of a new computer system by prospective users. This is carried
out to determine whether the software satisfies its acceptance criteria and
should be accepted by the customer.
Volume testing - Testing where the system is subjected to large volumes of data.
Testing which confirms that any values that may become large over
time (such as accumulated counts, logs, and data files), can be
accommodated by the program and will not cause the program to
stop working or degrade its operation in any manner.
5.
pplications
System testing-Involves testing all programs in the full form in which they will be used
i.e. to see if they link and coordinate correctly as expected. It is the testing of the whole
system.
Testing that attempts to discover defects that are properties of the entire system
rather than of its individual components.
Testing that the system can cope with the anticipated volumes of
data.
Implementation
Delivering the new system The new system is delivered to the users. Sometimes small
groups are selected to try the new system.
People are trained to operate and use the system, and the organization converts to the
use of a newly developed system.
Getting the new system going.
Getting the people involved working with it.
CHANGEOVER = CONVERSION
CURRENT SYSTEM = OLD SYSTEM
Implementation Methods
Parallel changeover
Definitions of parallel conversion on the Web:
Is a process of converting from one information system to a newer system by using both systems concurrently
until the new system is demonstrably stable and reliable?
page
65
A.C.A.
[A
dvanced
omputer
pplications
6.
Maintenance
The monitoring, evaluating, and modifying of a system to make desirable or necessary
improvements.
System maintenance also known as the feedback stage
Complete all the documentation.
Let the system run and review it to ensure that it does what is required
The system analyst has to listen to user demands/needs to improve the current system
and make changes to operational needs of the new system that is implemented.
Does the system meet objectives?
FACT GATHERING
Objectives of FACT-finding or FACT-gathering
To find what the current system is supposed to accomplish
To determine inputs of the current system for example volumes, file structures, size &
frequency.
To determine the problems and difficulties presently being encountered.
To determine the nature of outputs and processing
To determine the cost of running and maintenance of the current system.
To identify the organizational structure
page
66
A.C.A.
[A
dvanced
omputer
pplications
Sampling
Is the process of learning about the population by using a sample drawn from
that population?
A sample is part/ a representative of the whole population that is used to know
the behaviour of the population [research project].
The sample drawn should be representative
It should be adequate
It should be independent
It should be homogeneous
It involves selecting the sample, collecting the information & drawing a
conclusion of the population based on the info obtained from a sample.
Random Sampling methods are: Simple sampling, Stratified, Cluster &
Systematic sampling
Non-random Sampling methods are: Judgment, Convenience & Quota sampling
Reading existing documentation
Questionnaires
Is a list of questions pertaining to a survey/study, on a paper with filling in
spaces sent to a target group?
Questions can be structured or unstructured
Can easily be suited to the intention of the study
Can only be used by those who are literate
Respondents answer at their own time
Respondents may lie
Wrong people may fill
Time consuming
Can be misinterpreted
Response rate is low
Advantages and disadvantages of each
REASONS FOR PERFORMING A SYSTEMS STUDY
Solving a problem
Limitations or failures of the existing system
Competition
Opportunities created by new hardware
Possibility & need to integrate with other systems
Responding to new requirements
Implementing new technology
Making broad system improvements.
APPLICATION PACKAGES
PRESENTATION PACKAGE
Presentation is the process of presenting the content of a topic to an audience.
Presentation software such as Microsoft PowerPoint, Harvard Graphics or Lotus
Freelance is often used to illustrate the presentation content. However, when more
page
67
A.C.A.
[A
dvanced
omputer
pplications
professional graphics are required, other software such as Adobe Illustrator and
CorelDraw may be used to develop complex charts and illustrations, such as market
segmentation graphs. ...
SPREADSHEET PACKAGE
A software application program designed to manipulate numerical data. (ie, accounting
data, time records, etc.) Common examples would include Lotus 1-2-3, MS-Excel, and
Corel Quattro Pro.
A spreadsheet is a sheet of paper that shows accounting or other data in rows and
columns; a spreadsheet is also a computer application program that simulates a
physical spreadsheet by capturing, displaying, and manipulating data arranged in rows
and columns. The spreadsheet is one of the most popular uses of the personal
computer.
An application program used as a computerized tool for analysis, planning, and
modeling that allows users to enter and manipulate data into an electronic worksheet
of rows and columns.
WORD PROCESSOR
Software (eg, Microsoft Word or WordPerfect) that allows the creation, editing and
formatting of text files.
A program which is used for entering and editing text documents on computer. The
standard word processor for most people is Microsoft Word. Alternatives include
StarOffice, OpenOffice, and WordPerfect.
A word processor (also more formally known as a document preparation system) is a
computer application used for the production (including composition, editing,
formatting, and possibly printing) of any sort of viewable or printed material.
Dedicated word processor. A specialized computer typewriter designed only for word
processing
DATABASE PACKAGE
Software used to create, maintain, retrieve, and produce reports about information
kept in database records.
a computer program that allows the storage of large amounts of information and give
the capacity to search, retrieve, sort, revise, analyze and order data quickly and
efficiently (eg, Access). There are two types of databases, flat file databases and
relational databases.
GRAPHICS PACKAGE
In computer graphics, graphics software is a program or collection of programs that
enable a person to manipulate visual images on a computer.
Includes pictographs, typography and some types of text, as well as symbols,
photographs and geometric designs. Graphics are visual elements used to point readers
and viewers to particular information.
QUERY
In general, a query is a form of questioning, in a line of inquiry.
A request for information, usually to a search engine.
An object that requests information from a database and creates a dataset of the
requested information.
A word, phrase or group of words characterizing the information a user seeks from
search engines and directories. The search engine subsequently locates Web pages to
match the query.
INTERNET
An electronic network of computers that includes nearly every university, government,
and research facility in the world. Also included are many commercial sites. It started
with four interconnected computers in 1969 and was known as ARPAnet.
A worldwide network of computer networks. It is an interconnection of large and small
networks around the globe. The Internet began in 1962 as a resilient computer network
page
68
A.C.A.
[A
dvanced
omputer
pplications
for the US military and over time has grown into a global communication tool of more
than 12,000 computer networks that share a common addressing scheme.
The Internet is a worldwide communications network originally developed by the US
Department of Defense as a distributed system with no single point of failure. The
Internet has seen an explosion in commercial use since the development of easy-to-use
software for accessing the Internet.
INTERNET SERVICE PROVIDER
An ISP is a company that provides access to the Internet to individuals or companies.
ISPs provide local dial-up access from your personal computer to their computer
network and their network connects you to the Internet.
An institution (usually a private company) that provides access to the Internet in some
form, usually for money.
A business that delivers access to the Internet.
An organization that provides access to the Internet, usually for a monthly fee. An ISP
can be a commercial provider, a corporate computer network, a school, college,
university, or the government.
E.g. Zarnet, Ecoweb, Comone, M-Web, Africa Online etc
EXTRANET
An extranet is a private network that uses the Internet protocols and the public
telecommunication system to securely share part of a business's information or
operations with suppliers, vendors, partners, customers, or other businesses. An
extranet can be viewed as part of a company's intranet that is extended to users
outside the company. An extranet requires security and privacy. ...
Refers to an intranet that is partially accessible to authorized outsiders. Whereas an
intranet resides behind a firewall and is accessible only to people who are members of
the same company or organization, an extranet provides various levels of accessibility
to outsiders. You can access an extranet only if you have a valid username and
password, and your identity determines which parts of the extranet you can view.
A private, secure extension of a corporate intranet that allows organizations to build a
persistent network link with customers, vendors, or other business partners.
INTRANET
An internal use, private network inside an organisation that uses the same kind of
software which would also be found on the Internet.
Inter-connected network within one organization that uses Web technologies for the
sharing of information internally, not world wide. Such information might include
organization policies and procedures, announcements, or information about new
products.
Intranets are private networks, usually maintained by corporations for internal
communications, which use Internet - usually Web- protocols, software, and servers.
They are relatively cheap, fast, and reliable networking and information warehouse
systems that link offices around the world. They make it easy for corporate users to
communicate with one another, and to access the information resources of the
Internet.
TELNET
The Internet standard protocol for remote terminal connection service. TELNET allows
a user at one site to interact with a remote timesharing system at another site as if the
user's terminal was connected directly to the remote computer.
A text-based Internet program used for connecting to a remote host or server.
An Internet command that allows your computer to directly connect and interact with
remote computers, often through a text-based 'terminal' environment. Often involves
the need for passwords and access information.
INTERNET BROWSER
page
69
A.C.A.
[A
dvanced
omputer
pplications
Software package used to view pages on the World Wide Web (including Netscape
Navigator, Microsoft Internet Explorer and Mosaic).
A graphical tool designed to read HTML documents and access the WWW. Examples are
Microsoft's Internet Explorer, Netscape Navigator or Mozilla Firefox.
A web browser is a software application that enables a user to display and interact with HTML
documents hosted by web servers or held in a file system. Popular browsers available for
personal computers include Microsoft Internet Explorer, Mozilla Firefox, Opera, and Safari. A
browser is the most commonly used kind of user agent. The largest networked collection of
linked documents is known as the World Wide Web.
What is a web/internet browser?
A Web browser is the vessel by which you are able to view the internet. This is a
program, which,
A browser is an application program that provides a way to look at and interact with all
the information on the World Wide Web.
Default
Default in computer science refers to a setting or value automatically assigned to a
computer program or device, outside of user intervention.
INTERNET ADDRESS
The numbering system used in TCP/IP internetwork communications to specify a
particular network or a particular host on that network with which to communicate.
Internet addresses are commonly denoted in dotted decimal form.
An IP address (Internet Protocol address) is a unique number, a kind of telephone
number, used by machines (usually computers) to refer to each other when sending
information through the Internet. This allows machines passing the information
onwards on behalf of the sender to know where to send it next, and for the machine
receiving the information to know that it is the intended destination.
SEARCH ENGINE
Internet search engines (eg Google, AltaVista) help users find web pages on a given
subject. The search engines maintain databases of web sites and use programs (often
referred to as "spiders" or "robots") to collect information, which is then indexed by the
search engine. Similar services are provided by "directories," which maintain ordered
lists of websites, eg Yahoo!
E-mail
Electronic Mail.
A system whereby a computer user can exchange messages with other computer users
(or groups of users) via a communications network.
A form of communication where messages can be sent to individuals or groups on
NEWS GROUPS
A newsgroup is a discussion about a particular subject consisting of notes written to a central Internet site
Voicemail
Similar to an answering machine used for conventional phones, except that the messages are saved and
serviced at a central location, rather than ...
A network-based telephone answering and messaging service for each extension on a network. On most
systems messages can be retrieved from any ...
Voicemail systems provide a method of recording messages when you are on the phone, away from your desk,
or concentrating on important work. ...
A personal answering machine which allows callers to leave you messages, accessed by calling into your
mobile network.
Facsimile
rmakaha/Advanced Computer Applications/
page
70
A.C.A.
[A
dvanced
omputer
pplications
This drawing was made by the author in 1981 to depict an integrated terminal in the office of
the future. All these functions are available on today's computers
OFFICE AUTOMATION refers to the varied computer machinery and software used to digitally create,
collect, store, manipulate, and relay office information needed for accomplishing basic tasks and goals.
Raw data storage, electronic transfer, and the management of electronic business information comprise
page
71
A.C.A.
[A
dvanced
omputer
pplications
the basic activities of an office automation system. [1] Office Automation helps in optimize or automate
existing office procedures.
The backbone of office automation is a LAN, which allows users to transmit data, mail and even voice
across the network. All office functions, including dictation, typing, filing, copying, fax, Telex, microfilm
and records management, telephone and telephone switchboard operations, fall into this category. Office
automation was a popular term in the 1970s and 1980s as the desktop computer exploded onto the scene.
[2]
Examples of OA include:
Generate Microsoft Word documents or business forms from data stored in other applications
such as Microsoft Access or Microsoft Excel.
Generate presentations from external data.
automatically send emails to customers or groups in Microsoft Outlook.
Create custom data entry mechanisms for Microsoft Office Documents.
Create custom procedures for CAD programs including AutoCAD, Autodesk Inventor and Solid
Works.
Maintain and organize data stored in Microsoft Excel or Microsoft Access.
Extract data from PDF files for further processing.
Create stand-alone executables to automate your office environment.
Text handling software and systems cover the whole field of word processing and
desktop publishing. Word processing, the most basic and common office automation activity, is
the inputting (usually via keyboard) and manipulation of text on a computer. Today's
commercial word processing applications provide users with a sophisticated set of commands to
format, edit, and print text documents. One of the most popular features of word processing
packages are their preformatted document templates. Templates automatically set up such
things as font size, paragraph styles, headers and footers, and page numbers so that the user
does not have to reset document characteristics every time they create a new record.
page
72
A.C.A.
[A
dvanced
omputer
pplications
DATA EXCHANGE While data storage and manipulation is one component of an office
automation system, the exchange of that information is another equally important component.
Electronic transfer is a general application area that highlights the exchange of information
between more than one user or participant. Electronic mail, voice mail, and facsimile are
examples of electronic transfer applications. Systems that allow instantaneous or "real time"
transfer of information (i.e. online conversations via computer or audio exchange with video
capture) are considered electronic sharing systems. Electronic sharing software illustrates the
collaborative nature of many office automation systems.
Office automation systems that include:
The ability to electronically share information between more than one user simultaneously are
sometimes referred to as groupware systems. One type of groupware is an electronic
meeting system.
exchange information in real time. Participants in such electronic meetings may be within the
same office or building, or thousands of miles apart. Long-distance electronic sharing systems
usually use a telephone line connection to transfer data; while sharing in the same often
involves just a local area network of computers (no outside phone line is needed). The
functional effectiveness of such electronic sharing systems has been one factor in the growth of
telecommuting as an option for workers. Telecommuters work at home, maintaining their ties
to the office via computer.
Electronic transfer software and systems allow for electronic, voice, and
facsimile transmission of office information. Electronic mail uses computer based storage and a
common set of network communication standards to forward electronic messages from one
user to another. Most of these systems allow users to relay electronic mail to more than one
recipient. Additionally, many electronic mail systems provide security features, automatic
messaging, and mail management systems like electronic folders or notebooks. Voice mail
offers essentially the same applications, but for telephones, not computers.
Facsimile transmissions are limited to image relay, and while usage of this
communication option has declined somewhat with the emergence of electronic mail, fax
machines remain standard in almost all business offices in America. In addition, new
technologies continue to transform fax use, just as they have influenced other modes of
corporate communication. For example, facsimile converters for the personal computer that
allow remote printing of "faxed" information via the computer rather than through a dedicated
facsimile machine are now available. Indeed, these facsimile circuit boards for the
microcomputer are slowly replacing stand-alone fax machines. Simultaneously, other
traditional office equipment continues to undergo changes that improve their data exchange
capacities as well. Digital copiers, for example, are increasingly multifunctional (with copying,
printing, faxing, and scanning capabilities) and connectable to computer networks.
DATA MANAGEMENT Office automation systems are also often used to track both
short-term and long-term data in the realms of financial plans, workforce allocation plans,
marketing expenditures, inventory purchases, and other aspects of business. Task management
or scheduling systems monitor and control various projects and activities within the office.
Electronic management systems monitor and control office activities and tasks through
timelines, resource equations, and electronic scheduling. As in data exchange, groupware and
network computer systems are gaining in popularity for data management. Under such
page
73
A.C.A.
[A
dvanced
omputer
pplications
arrangements, multiple members of the office environment are provided with access to a
variety of information at a central electronic location
Electronic calendar
Packages are available that enable users to use electronic versions of a variety of office tools
such as calendar, appointment book, address book and contact list. These tools are an extension
of many of the features provided by time management software such as desk accessory packages
and mainframe office automation systems
Telecommuting
Telecommuting, e-commuting, e-work, telework, working from home (WFH), or working at
home (WAH) is a work arrangement in which employees enjoy flexibility in working location
and hours. In other words, the daily commute to a central place of work is replaced by
telecommunication links. Many work from home, while others, occasionally also referred to as
nomad workers or web commuters utilize mobile telecommunications technology to work
from coffee shops or myriad other locations. Telework is a broader term, referring to
substituting telecommunications for any form of work-related travel, thereby eliminating the
distance restrictions of telecommuting.[1] All telecommuters are teleworkers but not all
teleworkers are telecommuters. A frequently repeated motto is that "work is something you do,
not something you travel to".[2] A successful telecommuting program requires a management
style which is based on results and not on close scrutiny of individual employees. This is
referred to as management by objectives as opposed to management by observation. The terms
telecommuting and telework were coined by Jack Nilles in 1973.[3]
How Many People Telecommute?
Estimates suggest that over 50 million U.S. workers (about 40% of the working population)
could work from home at least part of the time [4] yet, in 2008, only 2.5 million employees (not
including the self-employed) considered home their primary place of business. [5]
Occasional telecommuters--those who work remotely (though not necessarily at home) totaled
17.2 million in 2008[6]
Very few companies employ large numbers of home-based full-time staff. The call center
industry is one notable exception to this; several U.S.-based call centers employ thousands of
home-based workers. For most employees, the option to work from home is granted as an
employee benefit; most do so only part of the time.[7]
Technology
The roots of telecommuting lay in early 1970s technology, linking satellite offices to downtown
mainframes by dumb terminals using telephone lines as a network bridge. The massive ongoing
decrease in cost and increase in performance and usability of personal computers forged the
way to decentralize even further, moving the office to the home. By the early 1980s, these
branch offices and home workers were able to connect to the company mainframe using
personal computers and terminal emulation.
Long distance telework is facilitated by such tools as groupware, virtual private networks,
conference calling, videoconferencing, and Voice over IP (VOIP). It can be efficient and useful
for companies as it allows staff and workers to communicate over a large distance, saving
significant amounts of travel time and cost. As broadband Internet connections become more
commonplace, more and more workers have enough bandwidth at home to use these tools to
link their home office to their corporate intranet and internal phone networks.
The adoption of local area networks promoted sharing of resources, and client server
computing allowed for even greater decentralization. Today, telecommuters can carry laptop
PCs around which they can use both at the office and at home (and almost anywhere else). The
rise of cloud computing technology and Wi-Fi availability has enabled access to remote servers
via a combination of portable hardware and software. [8]
Potential Benefits
Telecommuting offers benefits to communities, employers, and employees.
For communities, telecommuting can offer fuller employment (by increasing the employ-ability
of proximal or circumstantially marginalized groups, such as Work at home parents and
page
74
A.C.A.
[A
dvanced
omputer
pplications
caregivers, the disabled, retirees, and people living in remote areas), reduces traffic
congestion and traffic accidents, relieves the strain on transportation infrastructures, reduces
greenhouse gases, saves fuel, reduces energy use, improves disaster preparedness, and reduces
terrorism targets.
For companies, telecommuting expands the talent pool, reduce the spread of illness, reduces
costs, increases productivity, reduces their carbon footprint and energy usage, offers an
inexpensive method of complying with the Americans with Disabilities Act of 1990 (ADA),
reduces turnover and absenteeism, and improves employee moral, offers an continuity of
operations strategy, improve their ability to handle business across multiple timezones, and
hasten their cultural adaptability. Full-time telework can save companies approximately
$20,000 per employee. [9]
For individuals, telecommuting, or more specifically, work from home arrangements, improves
work-life balance, reduces their carbon footprint and fuel usage, frees up the equivalent of 15
to 25 workdays a year--time they'd have otherwise spent commuting, and saves between $4,000
and $21,000 per year in travel and work-related costs (not including daycare). [10]
Environmental Benefits
Telecommuting gained more ground in the United States in 1996 after "the Clean Air Act
amendments were adopted with the expectation of reducing carbon dioxide and ground-level
ozone levels by 25 percent."[11] The act required companies with over 100 employees to
encourage car pools, public transportation, shortened workweeks, and telecommuting. In 2004,
an appropriations bill was enacted by Congress to encourage telecommuting for certain Federal
agencies. The bill threatened to withhold money from agencies that failed to provide
telecommuting options to all eligible employees.
If the 40% of the U.S. population that holds telework-compatible jobs worked from home half
of the time, - The nation would save 453 million barrels of oil (57% of Gulf oil imports) - The
environment would be saved the equivalent of taking 15 million cars permanently off the road.
- The energy potential from the gas savings would total more than twice what the U.S.
currently produces from all renewable energy source combined. [12]
Employee Satisfaction
Telework flexibility is a desirable perquisite for employees. A 2008 Robert Half International
Financial Hiring Index, a survey of 1,400 CFOs by recruitment firm Robert Half International,
indicated that 13% consider telework the best recruiting incentive today for accounting
professionals.[13] In earlier surveys, 33% considered telework the best recruiting incentive, and
half considered it second best.[14]
page
75
A.C.A.
[A
dvanced
omputer
pplications
Benefits of DSS
1. Improves personal efficiency
2. Expedites problem solving (speed up the progress of problems solving in an
organization)
3. Facilitates interpersonal communication
4. Promotes learning or training
5. Increases organizational control
6. Generates new evidence in support of a decision
7. Creates a competitive advantage over competition
8. Encourages exploration and discovery on the part of the decision maker
9. Reveals new approaches to thinking about the problem space
10. Helps automate the managerial processes.
page
76
A.C.A.
[A
dvanced
omputer
pplications
Electronic bulletin boards (also known as message boards or computer forums) are
communication systems online where one can share, request, or discuss information on just
about any topic. While e-mail is a way to converse privately with one or more people over the
Internet, electronic bulletin boards are totally public. Any message posted on one can be read
(and responded to) by anyone else in the world who has access to the Internet or the particular
online service that is providing the message board. A large collection of electronic bulletin
boards is known as a newsgroup. Thousands of newsgroups exist on the World Wide Web, each
dedicated to a single topic, making it easier for one to navigate through the information
contained on it.
Electronic bulletin boards operate in a very simple manner. Any person can start a discussion on
a particular topic and then wait for replies. These lines of discussion are known as threads.
Some threads can go on endlessly, while other posts run the risk of getting no replies at all. The
longer threads tend to find people responding to not only the original post, but to the
subsequent replies as well. This can often lead to some confusion, since later posts in longer
threads often have nothing to do with the original subject.
The main advantage of electronic bulletin boards is the fact that they are so public. Because of
their accessibility, they give users the opportunity to get information from a huge number of
sources, each with the possibility of a unique, original, and even global perspective. There are
several disadvantages to electronic bulletin boards as well. Since they are so public and often
unedited, they are almost like an open invitation for troublemakers whose sole intention seems
to be to stir things up. The proliferation of unwanted ads (also known as spamming) is another
problem for computer forums. Some online providers like AOL have board hosts whose sole job
is to keep the peace and weed out irritating posts and threads. Also, most electronic bulletin
boards do not keep an archive of each thread and post. Some may disappear over a period of
time as
A Bulletin Board System, or BBS, is a computer system running software that allows users
to connect and log in to the system using a terminal program. Once logged in, a user can
perform functions such as uploading and downloading software and data, reading news and
bulletins, and exchanging messages with other users, either through electronic mail or in public
message boards. Many BBSes also offer on-line games, in which users can compete with each
other, and BBSes with multiple phone lines often provide chat rooms, allowing users to interact
with each other.
Originally BBSes were accessed only over a phone line using a modem, but by the early 1990s
some BBSes allowed access via a Telnet, packet switched network, or packet radio connection.
The term "Bulletin Board System" itself is a reference to the traditional cork-and-pin bulletin
board often found in entrances of supermarkets, schools, libraries or other public areas where
people can post messages, advertisements, or community news.
During their heyday from the late 1970s to the mid 1990s, most BBSes were run as a hobby free
of charge by the system operator (or "SysOp"), while other BBSes charged their users a
subscription fee for access, or were operated by a business as a means of supporting their
customers. Bulletin Board Systems were in many ways a precursor to the modern form of the
World Wide Web and other aspects of the Internet.
Early BBSes were often a local phenomenon, as one had to dial into a BBS with a phone line and
would have to pay additional long distance charges for a BBS out of the local calling area. Thus,
many users of a given BBS usually lived in the same area, and activities such as BBS Meets or
Get Togethers, where everyone from the board would gather and meet face to face, were
common.
As the use of the Internet became more widespread in the mid to late 1990s, traditional BBSes
rapidly faded in popularity. Today, Internet forums occupy much of the same social and
technological space as BBSes did, and the term BBS is often used to refer to any online forum
or message board.
Although BBSing survives only as a niche hobby in most parts of the world, it is still an
extremely popular form of communication for Taiwanese youth (see PTT Bulletin Board
page
77
A.C.A.
[A
dvanced
omputer
pplications
System). Most BBSes are now accessible over telnet and typically offer free email accounts,
FTP services, IRC chat and all of the protocols commonly used on the Internet.
to make the move to the Internet and provide commercial products with BBS capabilities.
Features
A classic BBS had:
A computer
One or more modems
One or more phone lines
A BBS software package
A sysop - system operator
An user community
The BBS software usually provides:
Menu Systems
One or more message bases
File areas
Voting Booths
Statistics on Message Posters, Top Uploaders / Downloaders
Online games (usually single player or only a single active player at a given time)
A doorway to third-party online games
Usage auditing capabilities
Multi-user chat (only possible on multi-line BBSes)
Internet email (more common in later Internet-connected BBSes)
Networked message boards setup by the SysOp
Most modern BBSes allow telnet access over the Internet using a telnet server and a
virtual FOSSIL driver.
A "yell for sysop" feature that would make the BBS computer emit an audible noise so
that if the SysOp was near the computer and chose to respond, he or she could join a
remote user in text-to-text chat.
Teleconferencing
o
o
o
o
What is a teleconference?
page
78
A.C.A.
[A
dvanced
omputer
pplications
Types of Teleconferences
Audio Teleconference: Voice-only; sometimes called conference calling. Interactively links
people in remote locations via telephone lines. Audio bridges tie all lines together. Meetings can
be conducted via audio conference. Preplanning is necessary which includes naming a chair,
setting an agenda, and providing printed materials to participants ahead of time so that they can
be reviewed.
Distance learning can be conducted by audio conference. In fact, it is one of the most
underutilized, yet cost effective methods available to education. Instructors should receive
training on how to best utilize audio conferences to augment other forms of distance learning.
Audiographics Teleconference: Uses narrowband telecommunications channels to transmit
visual information such as graphics, alpha-numerics, documents, and video pictures as an
adjunct to voice communication. Other terms are desk-top computer conferencing and enhanced
audio. Devices include electronic tablets/boards, freeze-frame video terminals, integrated
graphics systems (as part of personal computers), Fax, remote-access microfiche and slide
projectors, optical graphic scanners, and voice/data terminals.
Audiographics can be used for meetings and distance learning.
page
79
A.C.A.
[A
dvanced
omputer
pplications
Computer Teleconference: Uses telephone lines to connect two or more computers and
modems. Anything that can be done on a computer can be sent over the lines. It can be
synchronous or asynchronous. An example of an asychronous mode is electronic mail. Using
electronic mail (E-Mail), memos, reports, updates, newsletters can be sent to anyone on the local
area network (LAN) or wide area network (WAN). Items generated on computer which are
normally printed and then sent by facsimile can be sent by E-Mail.
Computer conferencing is an emerging area for distance education. Some institutions offer credit
programs completely by computer. Students receive texts and workbooks via mail. Through
common files assigned to a class which each student can assess, teachers upload syllabi,
lectures, grades and remarks. Students download these files, compose their assignment and
remarks off-line, then upload them to the common files.
Students and instructors are usually required to log on for a prescribed number of days during the
week. Interaction is a large component of the students' grades.
Through computers, faculty, students and administrators have easy access to one another as well
as access to database resources provided through libraries. The academic resources of libraries
and special resources can be accessed such as OCLC, ERIC, and Internet.
Administrators can access student files, retrieve institutional information from central repositories
such as district or system offices, government agencies, or communicate with one another. Other
resources can be created such as updates on state or federal legislation.
Video Teleconference: Combines audio and video to provide voice communications and video
images. Can be one-way video/two-way audio, or two-way video/two-way audio. It can display
anything that can be captured by a TV camera. The advantage is the capability to display moving
images. In two-way audio/video systems, a common application is to show people which creates
a social presence that resembles face-to-face meetings and classes and enables participants to
see the facial expressions and physical demeanor of participants at remote sites. Graphics are
used to enhance understanding. There are three basic systems: freeze frame, compressed, and
full-motion video.
Video conferencing is an effective way to use one teacher who teaches to a number of sites. It is
very cost effective for classes which may have a small number of students enrolled at each site.
In many cases, video conferencing enables the institution or a group of institutions to provide
courses which would be canceled due to low enrollment or which could not be supported
otherwise because of the cost of providing an instructor in an unusual subject area. Rural areas
benefit particularly from classes provided through video conferencing when they work with a
larger metropolitan institution that has full-time faculty.
Through teleconferencing, institutions are able to serve all students equitably.
page
80
A.C.A.
[A
dvanced
omputer
pplications
Videoconferencing maximizes efficiency because it provides a way to meet with several groups in
different locations, at the same time.
As the limited resource of funding has decreased, limited resources now include instructors,
parking spaces and buildings. Students now include time as a limited resources.
Teleconferencing enables institutions to share facilities and instructors which will increase our
ability to serve students.
TELECONFERENCING
Why is it useful?
page
81
A.C.A.
[A
dvanced
omputer
pplications
page
82
A.C.A.
[A
dvanced
omputer
pplications
Personal computers;
A main computer control system;
Special microphones
One or more dedicated telephone lines or a satellite hook-up;
A television or computer monitor for each participant or group of participants; and
A video camera for each participant or group of participants.
page
83
A.C.A.
[A
dvanced
omputer
pplications
Tele text
Fax
Data service transmitted on TV lines not used for picture information, either utilising
spare capacity or instead of video information.
An over-the-air system for the transmission of text and simple graphics onto a
television screen (ie, a video newspaper). It utilizes the unused portion of the
broadcast scanning bar and requires a decoder. Teletext is essentially a one-way
system. By using a special keypad provided to the household, however, the user may
select specific pages to be seen.
Teletext is an information retrieval service provided by television broadcast companies.
Teletext pages can be viewed on television sets with suitable decoders. They offer a
range of text-based information, usually including national, international and sporting
news, weather and TV schedules. Subtitle (or closed caption) information is also
transmitted in the teletext signal.
Expert system
page
84
[A
A.C.A.
dvanced
omputer
pplications
A software system with two basic components: a knowledge base and an inference
engine. The system mimics an expert's reasoning process.
Computer with 'built-in' expertise, which, used by a non-expert in a particular subject
area, can evaluate or make other decisions concerning that subject.
Problem-solving and decision-making system based on knowledge of its task and logical
rules or procedures for using the knowledge. Both the knowledge and the logic are
codified from the experience of human specialists in the field (the domain experts).
Codification can take many forms, including rules, frames, or scripts. Examples in
meteorology include systems used for the interpretation of satellite imagery and for
fog and turbulence forecasting. See also knowledge-based system.
'Expert Systems'
these are software programs that are written to simulate or mimic a human's expertise
or intelligence in some field of knowledge.
Examples include: Medicine - you feed in your symptoms and get a diagnosis.
Route itineraries for delivery vehicles - you enter the start point and destination and
shortest route is calculated.
What are expert systems?
An expert system is a program, which attempts to mimic human expertise by applying inference
methods to a specific body of knowledge called the domain. Knowledge is different from data or
information in that data is passive. Knowledge on the other hand is active in that it can be used to
infer new information from what is already known about a problem. As will be seen later, this
domain knowledge is frequently represented as rules.
Artificial Intelligence Expert systems owe their origin to the field of Artificial Intelligence (AI).
One of the pioneers of AI, Dr. Marvin Minsky defined AI as "The field of study which is attempting to
build systems which if attempted by people would be considered intelligent". AI is a broad field,
with some of the application areas shown in the diagram below.
1.
2.
3.
4.
5.
An expert system can complete some tasks much faster than a human, for example performing
all the calculations required to estimate the costs of a construction project which will enable
an immediate response to be made to a client.
A reduction in the downtime of an expensive piece of equipment when an expert system is able
to quickly diagnose a fault.
The error rate in successful systems is often very low and may lower than that of a human being.
Recommendations will be consistent: given the same facts, the recommendation will always be
the same and completely impartial.
An expert system can capture the scarce expertise of a well-qualified professional who may
leave or retire, and can be used at locations where the human expert is not available say, for
geological surveys or medical expertise in remote areas.
page
85
A.C.A.
6.
7.
[A
dvanced
omputer
pplications
An expert system can be used as a repository for organizational knowledge the combined
knowledge of all the qualified experts in an organization which makes the organization les
dependent on individuals knowledge, which may be lost when they leave.
Expert systems can be useful for training employees.
3.
4.
5.
6.
Medical diagnosis
Fault diagnosis of all kinds gas boilers, computers, power stations, railway locomotives. If your gas
boiler breaks down, the service engineer may well arrive with a laptop computer and type in all the
symptoms to arrive at a diagnosis, and then use the system to find out the exact part numbers of any
replacement parts required for your particular model of boiler.
Geological surveys, to find oil and mineral deposits.
Financial services, to predict stock market movements or to recommend an investment strategy.
Social services to calculate the benefits due to claimants.
Industrial uses such as the expert systems in construction.
Heuristics
Expert systems are considered as a branch of AI because the method of problem solving is predominantly based on
heuristics. This contrasts very much with the conventional programming paradigm that uses algorithms to solve
problems. An algorithm is a step by step procedure that solves a category of problems. For example, algorithms may
be used to process a company payroll. A typical algorithm would use a step by step procedure on the input data such
as employee hours worked, overtime rate and so on, to generate output in the form of payslips for employees. The
steps in this procedure involve direct manipulation of numeric data to produce information.
Heuristics, on the other hand, solve a problem by trial and error guided by some reference to a predetermined goal.
There are many examples that we may encounter in our daily lives. For example, a motorist searching a multistorey
car park for a parking space would not use an algorithm to find a space. There is no guarantee that whatever
procedure is adopted a parking space will be found. The motorist may for instance, drive to the top-level first rather
than searching each level in turn. Whilst this strategy may sound attractive there is no guarantee it will work: there
may be no more spaces on the top-level available. The motorist then may have to try a lower level.
As we have already seen, expert systems differ from conventional programming in that they process knowledge rather
than data or information. This knowledge is frequently represented in a computer in the form of rules; they store the
'rules of thumb that guide the human expert. For example, a typical rule used by the MYCIN expert system is
IF the stain of the organism is gram negative
AND the morphology of the organism is rod
AND the aerobicity of the organism is anaerobic
THEN there is strongly suggestive evidence (0.8) that the class of the organism is Enterobacter iaceae.
The real forte of expert systems is their capacity to make inferences or the drawing of conclusions from premises.
This is precisely what makes an expert system intelligent. Even when it is possible to represent domain knowledge as
rules, a human expert would not only have to know how to apply these rules but in which order they should be applied
page
86
A.C.A.
[A
dvanced
omputer
pplications
to solve a particular problem. Similarly, a computer expert system would need to decide which, and in what order, the
rules should be selected for evaluation. To do this, an expert system uses an inference engine. This is a program that
interprets the rules in the knowledge base in order to draw conclusions. Two alternative strategies are available:
backward chaining and forward chaining. A particular inference engine may adopt either or both.
Explanation facilities
The ability to explain their reasoning processes are another key feature of expert systems. Such explanation facilities
provide the user with a means of understanding the system behaviour. This is important because a consultation with a
human expert will often require some explanation. Many people would not always accept the answers of an expert
without some form of justification. For example, a medical expert providing a diagnosis and treatment of a patient
would be expected to explain the reasoning behind his/her conclusions: the uncertain nature of this type of decision
may demand a detailed explanation so that the patient concerned is aware of any risks, alternative treatments, and so
on.
A survey conducted by Waterman in 1986 showed that the majority of applications of expert systems that were built in
the 1980's were in the field of medicine., Durkin suggested that expert systems in medicine still account for about 12%
of those under current developments, However, other useful problem areas are emerging which lend themselves well
to expert systems. These include: help desk systems, knowledge publishing, configuration and intelligent front-ends.
Knowledge Publishing
Knowledge Publishing is a growing application area of expert systems. The idea of knowledge publishing is
encapsulated in the concept of a book. A book is a passive object in that it awaits us to read the part of interest.
Knowledge Publishing delivers knowledge to the user actively, by providing what the user specifically requests. There
are examples in common use that are disguised; that is, working within other systems. An example is GRAM@TIK the
very popular grammar checker sold with WordPerfect software.
Help desk systems are likely to be a key growth area in the future. Most help desk programs are expert system based
and growth in this market is predicted at 20% - 30% per annum. Large savings in time and costs can be achieved
because people increasingly turn to the telephone when they have a problem rather than read manuals. The Compaq
computer company now includes an online printer help desk program with all printers sold. The Quicksource program
includes 5000 cases of printer problems to help diagnose the printer fault and it is estimated that 20% fewer customers
are telephoning the company for support. This has resulted in substantial savings for the company as well as a better
service for it's customers.
Configuration
The configuration system XCON is one of the most well known expert systems in use today. It was built by DEC
corporation for turning customer orders into feasible VAX computer configurations. The system was completed in the
early 1980's. It has been an enormously successful application and was followed by other large computer companies.
Another new wave of configuration applications is beginning to emerge suited to 'mass customisation' applications.
An Intelligent Front-End (IFE) is software which sits between a user and a conventional software program. An IFE uses
KBS or AI techniques to make more effective use of software packages. Classical examples are found in database
software. An IFE would provide an easier to use interface with the database for example, by permitting more flexible
user dialogue. The IFE would do this by gaining an understanding of the user's requirements, and then using this
specification to generate instructions for running the software package. The dialogue with the user will often be
interactive. The IFE may also use a variety of techniques, particularly when carrying out the dialogue with the user to
produce the specification of the user's problem.
page
87
A.C.A.
[A
dvanced
omputer
pplications
Adjust the brightness controls on the screen until they are comfortable to your eyes.
2. Carpal Tunnel Syndrome:
Adjust your chair or table height to have your elbow angle at 90-100 degrees.
Position your keyboard so that you don't have to bend your hands uncomfortably upward to reach
the keys; place a raised wrist rest on the table in front of the keyboard if necessary.
Clinch your fists, hold for one second, then stretch your fingers out wide and hold for 5 seconds.
Organize your workday, if possible, to intersperse other tasks with your computer work so that
you're not sitting at the computer for several hours without a break. Variety is key.
Hold the mouse loosely and click lightly.
3. Neck and Back Strain:
Check your posture - sit up straight. Thanks Mom.
The monitor screen surface should be approximately 18-24 inches away from your torso.
Preferably chairs should be on wheels, have backrest tilt adjustment, and have arms.
Be sure you have enough desktop space for work papers and other equipment.
4. Conjunctivitis (itchy, bloodshot eyes) and Dermatitis:
Be sure the screen doesn't flicker or wave - this could indicate that service or adjustment is
needed.
Look away from the screen periodically.
A computer user should be seated at least two feet away from the screen
with the screen below eye level. Their chair should be comfortable and they
should sit up straight in the chair with feet firmly on the floor. They should
not cross their legs.
7. Posture-related injuries
Back and neck pain, headaches, and shoulder and arm pain are common computer-related injuries. Such
muscle and joint problems can be caused or made worse by poor workstation design, bad posture and
sitting for extended periods of time.
Although sitting requires less muscular effort, it still causes fatigue and requires parts of the body to be
held steady for long periods of time. This reduces circulation to the muscles, bones, tendons and
ligaments and can result in stiffness and pain. If a workstation is not set up properly, these steady
positions can put even greater stress on muscles and joints.
Prevention tips muscle and joint injuries
Suggestions to reduce the risk of muscle and joint problems include:
Use an adjustable desk designed for use with computers; position the monitor so that it is either
at eye level or slightly lower.
Position your keyboard at a height that allows your elbows to rest comfortably at your side.
Forearms should be roughly parallel with the floor and level with your keyboard.
Adjust your chair so that your feet rest flat on the floor.
Use a footstool (if your feet do not rest on the floor when the chair is adjusted for good arm
position).
Switch to an ergonomic chair, which helps your spine to naturally hold its curve while sitting.
Use an ergonomic keyboard to offer your hands and wrists a more natural holding position.
Take frequent short breaks and go for a walk or perform stretching exercises at your desk. Stand
often.
8. Overuse injuries of the upper limbs
Muscles and tendons can become painful with repetitive movements and awkward postures. This is known
as overuse injury and these typically occur in the elbow, wrist or hand of computer users. Symptoms of
page
88
A.C.A.
[A
dvanced
omputer
pplications
overuse injuries in the upper limbs include pain, swelling, stiffness of the joints, weakness and numbness.
Prevention tips overuse injuries
Suggestions to reduce the risk of overuse injuries include:
Keep your mouse at the same height as your correctly positioned keyboard.
Remove the hands from the keyboard when not actively typing, to allow the arms to relax.
9. Eyestrain
Focusing your eyes at the same distance point for extended periods of time causes fatigue. The human
eye structurally prefers to look at objects further than six metres away, so any work performed close-up
puts extra demands on the eye muscles.
The illuminated computer screen can also contribute to eye fatigue. While there is no evidence that eye
fatigue is associated with damage to the eyesight, computer users may experience symptoms such as
blurred vision, temporary inability to focus on faraway objects and headaches.
Prevention tips eyestrain
Suggestions to reduce the risk of eyestrain include:
Make sure your primary light source (such as a window) is not shining into your face or directly
onto the monitor.
Tilt the monitor slightly to eliminate reflections or glare.
Make sure your computer screen is not too close to your face.
Position the screen so that it is either at eye level or slightly lower.
Reduce the contrast and brightness of your screen by adjusting the controls on the monitor.
Frequently look away from the screen and focus on faraway objects.
Have regular eye examinations to check that blurring, headaches and other associated problems
are not caused by any underlying disorders.
Low Back pain
Usually due to using the wrong type of chair, these have been four legged chairs found in any office for
visitors, executive chairs where the back is not separate from the seat and therefore cannot be adjusted to
offer any lumbar support.
If the user has not taken any time to adjust the chair.
Sitting on the edge of the chair and leaning forward can also cause problems and this often happens when
there are arms on the chair which are not adjustable in height or when the user is short in stature, the arms
on the chair will not move low enough to allow the user to get close enough to the desk.
Sitting with the legs crossed causes uneven weight on each buttock and strain on back muscles.
I have seen a lot of problems caused by arms on chairs that cannot be raised or lowered and recommend that all
chairs are purchased without arms for this reason.
Poor desk configuration
If the screen is placed off to one side, the keyboard should still be positioned centrally to avoid twisting the torso,
often if the screen is off to one side, the user will support one elbow on the desk putting strain in the muscles of the
back.
If odd pieces of furniture are used to make up a workstation ensure that they are the same height. It is best to draw
your proposed desk layout before moving furniture.
Having a set of drawers that prevent sideways movement
The L shaped desk layout allows more space and freedom of movement if writing and keyboard activity is required but
when two desks are butted onto each other, one set of drawers can restrict movement. The set of drawers restricting
movement can be removed with a screwdriver.
Ideally desks should be purchased without drawers and then modular drawer units can be placed in convenient
locations.
Room temperature
If a room is too cold muscles can go into spasm and injury is more likely.
Dehydration
Many office workers drink too much tea and coffee, which has a diuretic action so water is the best choice. Remember
that offices with several computers can make the air feel very dry.
Overstretching
Items used most frequently should be positioned within easy reach
If the hard drive/midi tower is housed under the desk, muscles can be pulled when bending over to switch the
computer on.
page
89
A.C.A.
[A
dvanced
omputer
pplications
Using bifocals because the neck is bent backwards to focus on the screen. These people should speak to their
Optician about using a special pair of glasses for computer use or have their bifocal section on the glasses
made wider.
If the screen is too high. The head should be in the neutral position with the gaze at a slightly downward
angle when viewing the screen.
Not taking posture breaks
Posture breaks are important to prevent overuse of one group of muscles, break up periods of keying and mouse work
regularly. (See information sheet on posture breaks and wrist exercises)
Pressure on the wrists from a sharp edge on a desk
Some desks have a sharp edge, which can cause pressure on the wrists. If users are trained typists, they usually do not
rest their wrists whilst keying but most self taught keyboard users do, this causes pressure and increased risk of injury
if the user is also working with their wrists bent. A gel wrist rest can be used to provide a soft cushion for resting the
wrists in between periods of keying or mouse activity. Gel mouse mats are also available.
Painful wrists or fingers
Painful wrists or fingers often occur when the chair is not adjusted to the correct height to allow a perfect L
shape between the shoulder, elbow and wrist, if the wrists are bent up or down then the fingers are not
horizontal to the keys or the mouse, the clicking finger is not horizontal to the control mechanism and the
wrist is left unsupported.
Striking the keys too hard or excessive mouse use can also cause painful fingers or by not keeping the mouse
close enough to the body. Ideally a mouse should be used directly in front of the shoulder and as close to the
body as possible.
Dirty mice are not efficient and require more clicking therefore increasing your risk of overuse syndrome.
Research has shown that intensive use of the mouse is more likely to cause symptoms of overuse syndrome than
keyboard activity; you should consider keyboard shortcuts (These can be viewed on a separate page.)
Alternative mice
There are various alternative mice that relieve and prevent symptoms of overuse:
Optical mice are more efficient because they do not get dirty balls!
Beware of mice that are advertised as being ergonomic because they may not be. Some mice totally fill the
hand and can be uncomfortable for users with small hands.
Touch pads can be used in either hand and are ideal for people with one-handed symptoms because they can
be used in either hand; the same amount of dexterity is not required for operation.
The whale mouse is ideal for mouse intensive work and can open out to fit any hand.
There are numerous options on the market but it is better to try before you buy.
You may want to contact other members of staff on the intranet at UWB to see if someone has a different type of
mouse for you to try or you can contact the OHSU to see if there is a mouse for you to borrow for a short period so that
you can evaluate its effects on your symptoms
Pain in the buttocks
Pain in the buttocks radiating down the thigh can be caused by a chair seat that is too long and causing pressure behind
the knees or from inadequate lumbar support.
Pain in the shoulders
Pain in the shoulders can be caused by having arms on the chair that cannot be adjusted this causes the user
to sit with the arms sticking out.
Sitting at the desk with one elbow supported on the desk and the other held lower or twisting the torso to
look at the monitor will also cause pain.
Pain in the knees
Pain in the knees can be caused by the fact that when the chair has been adjusted to the correct height to
allow the fingers to be horizontal to the keys, the feet are left unsupported, the solution is to purchase a
footrest the small step type called (twin plus in the Lyreco catalogue are best because they do not take up
much space under the desk, they can be adjusted according to the height of the person using them.)
If transcription is carried out it is better to have a large surface area on the footrest and the ability to keep
this level to support the footswitch.
Pain in the knees can also be caused by a seat that is too long resulting in pressure behind the knees.
page
90
A.C.A.
[A
dvanced
omputer
pplications
Eye strain
Eyestrain can be caused by glare from the monitor or from overhead lights. Ideally the desk should be placed
between lights and not directly under them. If this is not possible you may be able to switch the overhead
light off and use an angle poise lamp.
Glare from windows without blinds or with incorrectly fitted blinds.
Where there are casement window at the top and blinds cannot be used there is often glare from the sun on
the screen. Some vertical blinds are not efficient and additional blackout roller blinds would improve
efficiency and keep the room cool. If blinds cannot be fitted it may be possible to fit a tinted transparent
film to the window.
Other solutions:
See the Optician about middle distance correction
Remove the antiglare device. (These can cause problems focusing because you have to look thought it to see
your screen.)
Introduce regular task rotation to break up periods of keying.
Choosing the right chair
Tudor Jones in the Estates department will order chairs for you and will be able to advise on models that are
appropriate for computer use, by using this service you will also benefit from considerable cost savings.
If you use a computer you should order a chair that has a height adjustable back and preferably without arms as these
often cause poor posture. If you really cannot live without arms on your chair they should be totally height adjustable
(They do cost extra).
When you receive your new chair you should read the booklet that is usually attached so that you understand how all
the mechanisms work. There is usually a handle or knob to raise and lower the height of the seat and another to
enable a rocking action.
It is important to use the rocking action, as this will reduce static loading.
There will be a mechanism for raising and lowering the height of the backrest to ensure adequate lumbar support.
(Sometimes you need to release a tension knob at the back of the chair to allow for movement of the backrest.
.
WORD PROCESSING TERMINOLOGY
Most computers today come with a word processing program which allows the user to
write text documents like letters, business correspondence, and even books. The first step
in learning how to use a word processor is to understand the terminology that is unique to
word processing programs. Here are a few basic terms that will help.
1. Typeface
A typeface defines the shape of the characters. Some common typefaces are Times New
Roman, Arial, and Courier. If you look closely, you will see that the letters in each of these
are shaped differently, some narrower, some rounder.
2. Font
A font is collection of letters and numbers in a particular typeface. The font includes the
typeface plus other qualities, such as size, pitch, and spacing. For instance, within the
Times Roman family, there are many fonts to choose from, including different sizes, italic,
and bold. If you are working in a word processing program, the font might be Times New
Roman, 10 point, bold. Changing the font can completely change the look and feel of a
Web page or document.
3. Format
In a word processing program, you can format any text that you create. Formatting
involves specifying the font, alignment, margins, and other properties. The format is the
layout of a document. The format determines how the document will appear on the screen
and how it will look when printed.
4. Alignment
The alignment refers to the way lines of text are arranged relative to the edges of a block
of text. For example, the text can be flush with the left side of the document (left
page
91
A.C.A.
[A
dvanced
omputer
pplications
aligned), flush with the right side of the document (right aligned), or centered horizontally
on the document (centered). There is also an alignment option called justified. In text that
is justified both the right and left sides of the text will appear to line up evenly.
5. Tab
The tab function in a word processor works much like the tab function on a typewriter. Tab
stops can be set in the ruler at the top of the page. When the tab key is pressed, the cursor
will move to the next tab location. This allows the user to indent paragraphs and lists.
6. Margins
Margins are the blank space to the left and right sides and at the top and bottom of a page.
The size of the margins can be increased or decreased. In Microsoft Word, this is done by
choosing File-Page Setup and changing the numbers on the Margin tab.
7. Header/Footer
The header is one or more lines of text that appear at the top of every page of a
document. The header often includes information like names and titles. The footer consists
of one or more lines of text that appear at the bottom of every page of a document. The
footer often includes the page number.
8. Line Spacing
Line Spacing refers to the number of blank spaces between lines of type. The most common
line spacings are single-spaced and double-spaced, but the line spacing in a word processor
can be set to almost any amount of line spacing.
9. Word Wrap
Word wrap is a word processing feature that permits information to be keyed on
successive lines without having to tap the return/enter key at the end of each line.
10. Table
A collection of data arranged in rows and columns. Tables are commonly used in word
processing programs. They are also used in spreadsheets and database programs.
11. Spell/Grammar Check
Word processing programs contain a spell check program which can verify the correct
spelling of words in a document. In some programs you will click on a menu choice or an
icon to start the spell checking. Some programs will automatically check your spelling as
you go, inserting a squiggly red line under words that may be misspelled. Grammar
checking works in much the same way with the program inserting a squiggly green line
under words that may be grammatically incorrect. Remember the spell check and grammar
checking are not foolproof. A word may pass both checks and still be incorrect.
12. Indent
An indent is one or more spaces that are used to move the text to the right of the left
margin.
13. Ruler
In a word processor, you can use the ruler to set the indent, margin and tab markers and
this can allow complex formatting options. Never use the space bar and return key to align
text.
14. Template
Templates establish the initial document setting and formats. A word processing program
like Microsoft Word uses the "normal" template as the basis for all documents. A user can
modify the "normal" document, and/or may create other templates to use.
15. Bullets & Numbering
A word processing program can automatically add bullets and/or numbers to the text.
16. Print Preview
This is a very useful feature. Click on the menu choice or icon for a Print Preview and you
will be shown an image of exactly what the printed output will look like.
17. Spelling checker
o A companion application that you use with a word-processing application to
check for misspelled words.
o A word processing function which searches for and corrects misspellings by
comparing a document's words with those in a built-in spelling dictionary.
page
92
A.C.A.
[A
dvanced
omputer
pplications
18. Macros
o A series of commands and instruction that you group together as a single command to
accomplish a task automatically. Instead of performing a series of time consuming
repetitive actions in MS WORD you can create and run a single macro.
19. Alignment
Alignment refers to the position of lines in a paragraph in relation to the document s left and right
margins; i.e., whether they are left-aligned, centered, right-aligned, or justified (evenly spaced).
20. AutoCorrect
AutoCorrect continuously checks your document for misspelled and unrecognized words and for
grammar errors. Right-click a word with a wavy red or green line beneath it to see a menu of
alternatives.
21. AutoFit
Use the AutoFit command to format each column to the width of the widest entry in that column.
22. AutoFormat
AutoFormat is a feature that automatically changes text as you type. AutoFormat includes such
formatting as numbered and bulleted lists, borders, capitalization, and common spelling errors.
23. BACKSPACE
The [BACKSPACE] key on the keyboard is most often used to delete data to the left of the insertion
point.
24. Bold
Bold characters appear on the screen in a higher intensity or in a different color than surrounding text.
Bold characters on the printed page appear as darker characters or makes them appear "fatter." Bold
should be used for emphasis, but like all formatting characteristics, should be used sparingly.
25. Borders
Borders are boxes that are placed around text, pages, and tables. Borders add emphasis or decoration
to the enclosed data, and they can be in any number of formats.
26. Bullets
Bullets are special characters or symbols that are used to set off a paragraph. Typically, each bulleted
paragraph is an item in a list, and it consists of the bullet symbol and indenting to set the bullet apart
from the text
27. Center
With center alignment, each line of a paragraph is centered between the left and right margins or
indents.
28. Centering
Centering is the placement of a line of text in the center of the screen or page where the left-most
and right-most characters in the line are the same distance from the left and right margins.
29. Click-anddrag
To click-and-drag, press the left mouse button and keep it down while you move the mouse on the
mouse pad.
30.
Dictionary
Word uses two kinds of dictionaries in tandem: a main dictionary and a custom dictionary. The main
dictionary cannot be altered. You can add words to your custom dictionary.
Alignment
31. Drag-and-
Drag-and-drop is a feature that allows you to move or copy information without using the Windows
Clipboard. To use it, you simply drag a selected item from one location to another. It is best used for
moving or copying small items short distances.
32. Folder
A folder is an area on the disk that can contain files and subfolders that are usually related by type,
purpose, or application.
33. Font
A font is a style and size of type, such as Times New Roman, 12 point, bold. A font is a set of all the
characters available in one typeface and size, including uppercase and lowercase letters, punctuation,
and numerals
drop
34. Font
Formatting
Font Formatting changes the appearance of the text. Font formatting includes enhancements such as
font style (bolding, centering, and underlining), point size (12 pt), and font typeface (Times New
Roman, Arial, and Courier).
page
93
A.C.A.
[A
dvanced
omputer
pplications
35. Frame
A frame is a container for text and graphics that can be placed anywhere within a document, including
the margins, and which forces existing text to wrap around it.
You can force Word to end a paragraph and move to the next line by pressing [ENTER]. When you press
[ENTER], you insert a hard return.
37. Header
A header is the contents of an area located within the top margin of a page.
38. Footer
A footer is the contents of an area located within the bottom margin of a page
39. Indentation
An indentation is an amount of space measured from the page margin that is applied to a paragraph or
an area of a document.
40. Italic
Italic characters appear on the screen slightly tilted to the right. Italics is usually used to provide
special emphasis to text.
41. Justification
Justification determines how lines and characters within those lines are printed. With full justification,
all lines start at the left margin and end at the right margin.
42. Justified
With justified alignment, all but the last line of a paragraph is aligned with both the left and right
margins or indents. To accomplish this, Word adjusts the spacing between words, which can result in
uneven and "loose" spacing.
43. Left
Left alignment is Word's default alignment for body text. The left side of the paragraph is aligned with
the left margin or indent, and the right side is "ragged."
44. Left
Left-justified text starts at the left margin and wraps all text at the right margin to form a ragged
appearance.
Alignment
Alignment
Justification
Line spacing refers to the number of lines used by each line of text. In single-line spacing, each line of
text is followed by another line of text, and there are no blank lines in between. In double-line
spacing, each line of text is followed by a blank line.
Mail Merge refers to the process of combining a data source, and a main document to produce a unique
output.
47. Margin
The margin is the amount of blank space, usually measured in inches or characters, above and below
and to the right and left of the main body of a document.
48. Margins
Margins are the areas that border the printed portion of a page along its top, sides, and bottom.
The menu bar contains the names of Word's menus and is used to navigate through their commands.
Use the Merge Cells command on the Table menu to combine selected cells in a row. This results in a
single cell with the combined width of the original cells.
A merge field is a placeholder inserted into a main document that instructs Word where to put
information that comes from a data source during a mail merge.
52. Mouse
A mouse pointer is a screen element that corresponds to the spot where you are rolling the mouse. The
mouse pointer can change depending on the current action.
53. Non-printing
Non-printing characters are those elements that can be seen in the document area of the screen, but
that cannot be printed; e.g., paragraph marks, spaces, tabs, and gridlines.
Normal style refers to the default text style that Word uses as a basis for defining all other styles.
Pointer
Characters
page
94
A.C.A.
[A
dvanced
omputer
pplications
Normal View is Word's default document view and is the most practical view for performing such
routine functions as typing, editing, and formatting.
56. Office
The Office Assistant gives you tips as you work, and it can be used to get help about Word.
Assistant
Online Layout View is better for viewing documents on-screen. It shows the document map which makes it easy to
move around in the document.
Outline View provides a structured view of the document, arranging its contents according to heading levels and
opening the Outlining toolbar for modifying the document's organization.
Page Layout View shows the document's margins, headers and footers, frames, and other elements, thus providing
a more accurate representation of what a document will look like when it is printed.
60. Paragraph
A paragraph in Word begins where you start typing, and it ends where you press [ENTER].
Paragraph formatting includes formatting options such as text alignment, indents, tabs, margins, and justification.
When you click a dotted-line hot spot, a separate window "pops up" on your screen. When you are done reading
the information in the pop-up window, you can click anywhere to close it.
Print Preview in Word allows you to see how your document will look on the page before it is printed.
The Print range area allows you to specify parts of the document to print. The All option prints the entire
document. The Current page option prints the page where the insertion point is located. The Pages option allows
you to specify which pages to print by typing their page numbers.
With right alignment, the right side of the paragraph is aligned with the right margin or indent, and the left side is
"ragged."
66. Save As
Use the Save As command on the File menu to open the Save As dialog box if you want to save the current
document under a new name or store it in a different folder or disk while also keeping the original version.
Use the Save As dialog box to save the current document for the first time, save the current document under a
different name, or save the current document in a different folder or on a different disk.
68. Scroll Bar
The scroll bar is a panel for moving the display horizontally or vertically within a window.
The scroll bar arrows, located at the ends of the scroll bars, may be clicked to slowly move the view within a
window up, down, or across.
The scroll box is the box within a window's horizontal or vertical scroll bar that indicates your position within the
window. Use it to navigate windows horizontally and vertically in very large increments by clicking-and-dragging
them along the scroll bar.
71. Scrolling
Scrolling is the act of moving up and down (vertical scrolling) or across a window (horizontal scrolling) using the
scroll bars, the scroll arrows, or the scroll boxes.
page
95
A.C.A.
[A
dvanced
omputer
pplications
72. Selecting
The selection bar is an unmarked area in the left margin of a document that allows for easy data selection. When
you click within the selection bar, you select the line directly to the right of the mouse pointer.
When text is wrapped to the next line, Word enters a soft return at the end of the first line.
Use the Spelling and Grammar dialog box to fix spelling or grammar errors or to add words to the spelling
dictionary.
76. Spacing
Spacing refers to the space above and below a paragraph. Spacing is measured in points.
Set the grammar and spelling rules on the Spelling and Grammar card in the Options dialog box.
Located under the menu bar, the standard toolbar gives quick access to various often used commands and
functions such as opening, saving, and printing files.
Use the Start button on the Taskbar to show the Start menu to open applications.
Located at the bottom of the window, the status bar contains information about many formatting options such as
current font, insert and overtype mode, and page number.
The status box is an informational panel on one end of the Taskbar that provides information about the system.
82. Taskbar
The Taskbar is a panel on the Desktop that contains the Start button, the Tray, and task buttons that correspond to
any open windows.
83. Template
A template is a preformatted document that serves as a model for other documents. Templates include common
formats such as addresses and date entries and allow you to create professional looking letters, memos, reports,
and other documents easily.
Choose a Text Wrapping option in the Frame dialog box to specify whether text should move around the edges of a
frame or stop above the frame and resume below the frame.
Times New Roman is a serif font that is available on every Windows-based computer. Word's default font is Times
New Roman.
The title bar shows you the name of the current document and contains the standard Windows control buttons.
87. Toolbar
A toolbar is a group of tools of usually related functions. Toolbars can contain buttons, menus, or combinations of
both that can be used to quickly perform actions in Word.
88. Triple-click
To triple-click, hold the mouse steady while you press the left mouse three times quickly.
Triple-clicking a word will select the entire paragraph in which it appears. Triple-clicking in the selection bar will
select the entire document.
page
96
[A
A.C.A.
dvanced
omputer
pplications
90. Underline
Underlining places a thin line beneath selected text. It is used primarily for emphasis, but not as often as bold or
italic
91. View
There are four views available in Word: Normal, Page Layout, Online Layout, and Outline. Some show you how the
document will look when it is printed, and some make working in Word quick and easy.
The Window menu provides a list of all the available windows and allows you to switch to any of them or arrange
all of them so that they can be seen at one time.
Use the Widow/Orphan Control command to prevent Word from placing the last line of a paragraph at the top of a
page (widow) or the first line of a paragraph at the bottom of a page (orphan).
94. Wizard
A wizard is a feature of Microsoft applications that lets you work through a series of dialog boxes to help you
complete a task.
Wrapping text is an automatic feature of Word. When you reach the end of a line while typing, Word forces the
text to break onto a new line.
Use the various writing styles to define the grammar rules for checking grammar. Choose from casual, standard,
formal, or technical styles, or create your own custom style. You also can change the rules that each style uses to
check the grammar
Zimbabwe just like most African or developing countries basically faces a number of
hurdles in order to roll out effective Internet & computer technologies to the general
population.
Rollout issues and challenges do include but not limited to;
1)
2)
3)
page
97
A.C.A.
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
[A
dvanced
omputer
pplications
In this article I address some key elements that affect internet penetration and telephone usage. You will note that the
main factors that affect telephony also affect data communications. ICT has challenges in both the data and voice
arenas. When we talk about bridging the digital divide we seek to reduce or eliminate entry barriers that the people
face in both data and voice. A number of terms will be used loosely in both areas.
It is important however, for the ICT ministry to be able to dissect and separate common issues and independent issues
that affect data and voice. This approach is necessary so that the issues are addressed at a root cause level. We seek to
deal with the root problem like inadequate infrastructure manifested symptomatically as congestion or slow
connections. Voice and data networks are fast converging and this calls for a smart unified communications approach
whose success hinges on reliable, fast and robust network infrastructure.
1. Internet Access
In Zimbabwe just like most African countries most people who access the internet do so via Cyber cafes, colleges,
varsities, work place an some at home. The limiting factors are basically cost and unavailability. Most urban dwellers
either cant afford it or the ISPs serving them are out of capacity as discussed further below. There are people who
own farms who could easily afford it, but can not do so from where they are because there is no network coverage of
one form or the other in their area.
As a result internet penetration is very low due to a number of issues. One of ICTs core tasks is to help present
operators unclog their stuffed networks and also adopting the concept of cyber cafes for many communities whose
chance of using a computer or accessing the internet are next to none.
Donating computers to schools is great. More could be done in the form of setting up computer centers at libraries,
district offices, ALL colleges using the cyber caf approach. This has the advantage of also spinning some business to
the struggling ISPs.
Hopes are hinged on the 3G data access. All I can say for now is that we hope Econet will not make it an elite service
for the business brass. Last year when I was in Joburg I was pretty impressed about how easy it is to connect to the
internet MTNs 3G using a USB dongle with a 3G capable SIM card. Because right now in Zimbabwe before we even have
3G, is it possible to walk to a distribution shop and buy a SIM card ?
2. Telephone Access
The state of telecom facilities. The poor general level of telecommunication facilities--caused largely by policy
factors--is clearly the most critical inhibiting element..
Teledensity is a metric that is used to broadly estimate the number telephone lines per 100 individuls. Presently
Zimbabwe has a teledensity of about 3 .This means that there are about 3 telephone lines per 100 people. This figure
heavily depends on the accuracy of the actual number of telephone lines divided by the total population.
Now this is a very tricky estimation as millions of Zimbabweans have left the country while mobile operators have
availed more lines. The teledensity metric has been used as an indicator of economic development or governance.
Current voice providers include Telone , NetOne , Econet , Telecel. Now wireless usage in Zimbabwe has indeed
enabled many people a means of communication. Wireless growth rate is highest in Africa because cellular phones
page
98
A.C.A.
[A
dvanced
omputer
pplications
offer any one within coverage range an equal opportunity to communicate. At this stage Zimbabwe has serious
complications that basically point to a collapsed economy. Cellular operators have managed just to stay afloat in a very
un-business like environment. This has made it impossible for the operators to increase both capacity and coverage at
a time when spares and maintenance were made in hard currency whilst end users were paying in a currency that long
lost its value.
Stabilization of the economy should allow cellular companies to increase their coverage to more areas.
3. Cost of computers, equipment and software
Computer and internet penetration is very low in Zimbabwe due to the cost of owning a PC or MAC and the cost of
having an internet connection .What is needed in this area is for the stake holders to identify equipment manufactures
that can supply Zimbabwean market PCs in bulk and at competitive rates. Secondly in most developed nations people
throw away their PCs just to get a new one. Most of these PCs are recyclable easily and the Ministry can setup
collection centers in the US and UK to pick these PCs clean them up and store them in a container before shipping
them to Zimbabwe. This is already being done in Kenya and Ghana.
Thirdly the ministry should encourage local companies to team up with PC manufactures and open up assembly plants
in Zimbabwe. This should be one of ICTs long term plan and has bankable off shoot benefits like job creation , local
availability of PCs , generation of forex through exports and generation of revenue for the state via the taxman. The
more people have access to PCs whether publicly via schools , libraries or internet cafes the better. One way of doing
this is availing mobile digital libraries. Take an old ZUPCO bus. Refurbish it , install like 30 computers in the bus and
pull a diesel powered generator at the back. These mobile libraries are used in Rwanda to visit remote areas with no
PC access.
Windows based software is generally pricy because of licensing fees. The ICT ministry must encourage and even fund
open source software initiatives in Zimbabwe. This literally means that refurbished computers that are shipped into
Zimbabwe can run on free BUT extremely loaded Linux based like uBuntu.Ubuntu is a community developed operating
system that is perfect for laptops, desktops and servers. uBuntu comes loaded with thousands of FREE open software
applications like word processing , spreadsheets , presentations , databases , web servers , email servers , fax servers ,
call centers , phone billing , internet caf billing , hotel reservation , project management , programming tools ,
educational and scientific software and many more.
Cost of software as a stumbling block in ICT development can not be used as an excuse.
Cost, As mentioned earlier, the high price of Internet services in some countries, together with the absence of local
dial-up access outside almost all of the capital cities, severely limits access for the bulk of those with computers. As
far as the rest of the population is concerned, so far there have been few attempts to provide low-cost public-access
facilities at drop-in centers for those without computers.
4. Electricity
All ICT gadgets use electricity to function. Inadequate power generation and unreliable transmission and distribution
capacity has a direct impact on ICT development strategies. This means that there can be no meaningful digital
revolution if there is no electricity full stop. This calls for an elevated sense of urgency to resuscitate and improve
power generation, transmission and distribution capacity. It is too obvious that Zimbabwe has to look explore and
improve the present forms of power generation methods that may include but NOT limited to water , solar , wind ,
biogas and even nuclear energy.
Mail servers , web servers , routers , switches , base stations etc all need electricity to operate. So before we even
worry about creation of a national website , it is necessary that we have adequate electricity to power the servers that
will serve the web pages !
If people can not access the website because the hosting ISP has experienced a power outage, then our problems are a
lot wider and complex to be solved by having a national website.
Now erratic power supplies has made life horrible for ALL telcos or ISPs as they are forced to install alternative power
sources mainly diesel powered generators. This has pushed operation costs for all companies to go up. Not with
standing that the diesel in question was at one stage scarce and only available via the black market. This is one of the
many problems that have pushed the price of the service as soon as use of forex was officially approved.
5. Access technologies
Lack or unavailability of telecommunications infrastructure makes it difficult for remote areas to access e-services like
the internet or even basic email. Some farmers can afford PCs but how are they can not access the internet because
either the telephone infrastructure is inexistent, broken down or unreliable in their areas. This points back directly to
telco providers ComeOne ,Telone, Econet, NetOne, Telecel, Transmedia, Powertel, Africom, Ecoweb, ZOL, Mweb and
Telecontract just to mention the main players. It is very tough for these fellows to maintain their network
infrastructure because of overheads like electricity for plants and base stations.
page
99
A.C.A.
[A
dvanced
omputer
pplications
That aside , there is need for Zimbabwe to pursue more rigorous wireless last mile connection technologies like Wi-Max
, Wi-Fi , 3G , CDMA etc. Already Powertel and Telone are involved in CDMA rollouts in and around Harare. The access
technologies are further discusses under sub heading Broadband below.
6. National & International Bandwidth
Bandwidth, Lack of Internet bandwidth linking ISPs and countries is an increasingly severe constraint to efficient
information flows. This is largely a result of the high cost of international leased lines, which results in ISPs' crowding
too many users into channels of limited bandwidth. Such crowding is greatly exacerbated by the very limited peering
between ISPs within the same country and also between countries. As a result, it can take many minutes to download
a single Web page-speeds of 20 characters per second are not uncommon--even from another ISP's site across town.
Packets often must traverse at least two saturated international links because the peering point is in another country.
Not withstanding the limited access technologies available by remote stations to access e-resources , there is the
question of available national and international bandwidth.
Your connection speed to you ISP might be 56k but the speed with which you access local and international websites
will solely depend on the available capacity on the network you are connecting to. It means that to pull a page from
Harare ISP will depend on the traffic congestion between your access point to the web server which heavily relies on
the number of connections made to that site. Failure to connect to you ISP might be caused by total capacity of the
access network to handle your call. This is a national bandwidth issue. Zimbabwe has limited access points and this
literally means a lot of people are competing to gain access to a thin pipe. I am sure you know how frustrating it is to
try and drive your new BMW in a very congested road with pot holes!
To access emails from the web you will send a request via your ISP who will in turn forward your request to your email
hosting service. Now the issue of contentions comes into the picture again with internationally hosted sites. You have
to compete with other users from your ISP and other ISPs to access websites via the international gateway that maybe
a satellite dish in Mazowe! So international access bottleneck add to the other national bandwidth whores caused by
few POPs (point of presence).
What is needed then is an increase in access points and using thicker bandwidth pipes between these POPs. Between
main centers Zimbabwe uses fibre optics as the back bone. Also satellite alone can not meet Zimbabwe bandwidth
needs.
ICT must look into ways of connecting via fibre to the undersea cable in the Indian Ocean. The cables at the sea
connect to the rest of the world at lightning speed. Why fibre? Fibre has a higher carrying capacity. A fair comparison
between using copper wires and fibre would be comparing a wheel barrow to a gonyeti to carry 100 tons of sand.
In a nutshell ICT needs to do some audit of both the national and international bandwidth info. This audit will point out
major bottlenecks that choke Internet usage in Zimbabwe. The solution after the audit should include amongst other
things the following fibre network links:
- Harare to Mutare to provide a link the Indian Ocean under sea cables in Beira.I am reliably informed that
AfriCom is doing this project already.
- Bulawayo to Beitbridge to provide high speed link to SA fibre network. South Africa is Zimbabwes largest
trading partner
Having multiple gateways will assure and ensure that Zimbabwe does not experience total black out associated with
network failure. Investing in fibre optics today is not an option but a must/
7. Broadband Access
To address the slow speed and low bandwidth challenges that Zimbabwe faces , all efforts MUST point into the availing
of broadband access.
The term broadband commonly refers to high-speed Internet access. Technically this refers to data transmission rates
of at least 200 kilobits per second. When you connect to your ISP you have to values that you deal with , download
speed (down stream) and upload speed (up stream).As the names suggest , down streams refers to the data transfer
rate when you are pulling resources from the internet to you PC like downloading email, downloading software ,
listening to music or watching a video from Youtube.
Up stream refers to the data transfer rates when you are pushing or publishing content from you PC to the Internet.
Examples here including sending email , posting your profile to Facebook and publishing your website.
Pull and push. In general most internet users pull that push to the internet and as a result the rates of downstream
rates are higher than up stream rates.
Broadband allows a higher data transfer rates than dial up rates .An interesting comparison would be that of trying to
empty a 200L drum full of water using a hosepipe or a drinking straw!
page
100
A.C.A.
[A
dvanced
omputer
pplications
page
101
A.C.A.
[A
dvanced
omputer
pplications
underdeveloped in their use of computers and networks. Many machines are older, 286 DOS-based machines-for which
there are dwindling levels of support-and very few are networked, either locally or on a
10. Scarcity of computers. The scarcity of computers and the small base of skills also contribute to the low level of
institutionalization of much of the networking activity. E-mail and Internet access are usually limited to those with
the most resources
11. Vandalism. Due to high resale value, vandalism of the copper network infrastructure is a general problem.
12. Telone, Powertel and Transmedia
These 3 companies enjoy unmatched monopolies based on their origins or parenting company namely PTC , Zesa and
ZBC. These 3 companies have a combined capacity to reach all corners of Zimbabwe by virtue of their infrastructural
inheritance for both data and voice.
The ICT ministry must carry out very thorough performance audits these seasonal failures. It is an open secret that
their failure is mainly due to political meddling and interference which makes them operate more like social clubs
than companies.
Despite their failure for years to provide, adequate telephone services, electricity, radio and TV services these
companies have moved into the Internet market with, remarkable speed.
It is clear why NRZ has not conceived a Telco business unit based on their own data network for the rail system? Well
Transtel would be a great idea but likely to be plagued by the same virus that affects its other 3 cousins.
13. Taxation, Licensing and external investment.
Taxation. Import duties may be significant disincentives through their contribution to increased prices, but the
growing trend toward taxation of services may become an even larger impediment to the effective use of computer
networks.
The issue of regulation will not be complete if no mention is made of the prohibitive nature of the licensing fees in the
range of several million US dollars. What makes it even more complicated is that should one wish to partner with a
foreign investor, the imposition of fixed percentages for local ownership stake makes this really look like a circus.
Which sane investor is interested in investing in an environment where he /she are expected to invest more dollars but
get the minority share? 51 % local sounds really attractive and nationally correct since Indigenization is the core agenda
of empowering locals.
That however does not mean replacing common sense with hollow pride which has so far worked negatively against
Zimbabwe.
Pride alone has never fed any nation.
page
102
A.C.A.
[A
dvanced
omputer
pplications
Voice over IP is still a grey area in Zimbabwe. Obviously its success depends on reliable network infrastructure. With 3G
on its way, POTRAZ should allow people to connect over IP and make calls. Also a smart combination of wi-max and wifi can bring voice to many people that presently have NO hope of getting a Telone line via copper or wireless CDMA.
Businesses and organizations might be forced to install a satellite dishes and then use their IP connectivity for both
data and voice and by pass the national operators because they cant get service from them!
Besides the obvious use of VoIP for voice , other spin offs can be realized in Zimbabwe like the deployment of call
centers .This allows local companies to generate employment for the local community , generate scarce forex and
revenue for the state in taxes. I used to think that this was common sense but it appears common sense is not so
common. Presently most favored call center destination for call centers are India, Malasyia, Philiphines and of late
Kenya and South Africa thanks to their open VoIP policy.
VoIP opens so many avenues of communication between end users. For instance through use of open source PBX like
Freeswitch, one can easily provide free voicemail mail service. This is how it works. A Linux server running a PBX is a
capability of creating infinite user extensions. So a particular user can sign up and be assigned an extension say 600244
and a PIN code 9561.Now this user will have to call an access number say 011 800 600 to check and or send
voicemails. If he does NOT have a personal phone this user can still use any phone just to retrieve his messages from
the system. So in short this person can advertise whatever business he is in and then specify his details as Please call
me on 011 800 600 ext 600244. Callers will be greeted by an interactive voice response system that will ask them if
they want (1) to check messages or (2) to send a message to another user.
16. Brain Drain & Skilled Manpower
Training and literacy, In general, the limited technical skills for the establishment of electronic network services
and the lack of literacy in the effective exploitation of network applications by users are major impediments to the
spread of new technologies. In addition, there have been no attempts to train the trainers in training techniques.. In
addition, relevant training guides, documentation, and online tutorial software to support trainers have been
insufficiently developed.
The effect of brain drain on the digital revolution is obvious. As the country continues to lose more and more skilled
and trained personnel, it becomes difficult for the nation to move forward in an attempt to turn around the economy.
This applies to all sectors of the economy and not just ICT. The GNU should be creative enough and try and lure skilled
personnel back by coming up with a well thought out come back home schemes. I am talking about highly trained
professionals from all walks of life. Trust me there thousands of Zimbabweans inside & outside the country prepared to
help rebuild the country.
The question of patriotism comes up. Ask what you can do for Zimbabwe and not what Zimbabwe can do for you?
Thats fair enough.
Trust me most skilled professionals would not mind an incentive in the form of some small piece of land somewhere in
Mvurwi or Insiza. If we expect to lure patriotic professionals to leave their well paying jobs at Cisco or Microsoft or BT
and join the ICT in Zimbabwe. Patriotism is a two headed beast.
17. ICT training & Certification
ICT training and development has not been spared the economic wrath that affects the whole country. As part of a long
term plan Zimbabwe ICT must look into establishing more ICT based institutes and academies as part of the digital
empowerment plan. Software programming is particularly one area in which ICT must look. Writing a computer code
requires very few resources other than a computer and programming knowledge of certain languages like C++ , Java ,
Python , Perl etc.
What is needed is that the ministry of ICT at a government level must travel to India and strike deals to have Indian
programmers to come and train students at various training academies mentioned.
Software is a great product that is easily exported. This is where the Hon Minister should be setting his eyes as a long
term plan. There is need to promote establishment of MORE academies that can provide ICT certifications that include
but NOT limited to A + , N+ , Security + , Linux + , Cisco etc.
18. Web Presence, Promotion and Optimization
Designing and placing a website on the internet is very simple and straight forward.
But what matters is whether the website has been designed properly and optimized well so that it is searchable on the
internet. People use search engines to look for information, products and services. A poorly developed website will
affect that websites visibility on the internet. Most search engines like Google , Yahoo , MSN and Dogpile use various
page
103
A.C.A.
[A
dvanced
omputer
pplications
algorithms to rank websites. But key making our website visible includes search engine optimization .This involves
items like :
-
using certain key words in your website title and header and also depends on the
number and quality of links on your web page
the actual content and relevance of your web pages
registering your website with different search engines
Linking out to other websites and have them linked back to you is useful in making your website visible on the internet.
A good website must be able to retain visitors and even encourage future visits. A good website must not only
disseminate information to its visitors but must be able to call the visitors to action .Like click here to subscribe for
free reports or click here to place a donation or click here to get a call back from us or enter your cell phone
here to receive promotional info via SMS etc etc.This makes the website interactive and not static.
19. Website Standards
Zimbabweans are a very tech savvy people. You dont need to look far. Zimbabweans based both in Zimbabwe and
outside run fairly successful websites ranging from news and media through money and shipping services right up to
digital telephony services. News websites dominate the number of websites ran by Zimbabweans on the internet.
Since Zimbabwe government ministries and departments already have dozens of websites that are hardly searchable on
the web, the ICT ministry must come up with a minimum standard guideline for website deployment.
Different ministries and departments do run their different websites, but some minimum quality standard or
benchmark MUST be created by ICT ministry .If you look at the different Zimbabwe government websites, you will see
varying designs which are not up to scratch if I could be generous with my comments. What is needed is a compliance
standard that is set up by ICT.
Hats off to the webmasters who have managed to setup theses websites with little or NO training and resources. What
needs to be done is to come up with a government website policy that clearly sets standards of design technique,
layout, interactivity, promotion and optimization.
SPREADSHEET TERMINOLOGY
Microsoft Excel is a spreadsheet program written and distributed by Microsoft for computers
using the Microsoft Windows operating system and for Apple Macintosh computers. It features
an intuitive interface and capable calculation and graphing tools which, along with aggressive
marketing, have made Excel one of the most popular microcomputer applications to date. ...
Workbook
A spreadsheet document that contains one or more worksheets, a Microsoft Excel
document.
A collection of related worksheets contained within a single file. (in spreadsheet
applications).
The workbook is the main document used in software programs like Excel. A workbook
consists of individual worksheets, like an accountant's workbook, each of which can
contain data. Basically, a workbook is a very sophisticated ledger.
Worksheet
A single spreadsheet that contains rows and columns of data. In Excel, a worksheet will
have a little white tab at the bottom of the screen. A worksheet is treated like a
database table.
An electronic spreadsheet containing 256 columns by 16,384 rows. (in spreadsheet
applications).
A work area comprised of rows and columns, also known as a spreadsheet.
x-axis label
A label describing the x-axis of a chart. (in spreadsheet applications
Cell
An intersection of a row and column, the smallest element in which you can enter
data.
page
104
A.C.A.
Column
Row
[A
dvanced
omputer
pplications
A vertical selection of cells identified by one or more letters, starting with A at the
left side of the spreadsheet.
A horizontal selection of cells identified by a number, starting with 1 at the top of
the spreadsheet.
A user-defined selection of contiguous cells.
Named
Selection
Formula An equation that performs an operation on cell data and displays the result. For
example, to add the contents of cells A1 and A2, and display the results in A3, cell
A3 would contain =A1+A2, a simple formula.
Function A pre-defined formula that allows you to quickly perform a more difficult operation
on cell data, such as finding the average of a range of numbers. Functions always
take arguments, or additional information that enables the computation to occur.
For example, the argument to the AVG, or average, function is the range of cells to
be averaged: =AVG(A1..C10) averages all cells between A1 (in the upper left) and
C10 (in the lower right).
Cell reference
The column number and the row letter of a cell.
The address or name of a specific cell. Cell references may be used in formulas and are
relative or absolute. (Spreadsheet application).
A cell name used in a formula.
Cell pointer
A highlighted rectangle around a cell that indicates the active cell. (Spreadsheet
application)
Relative cell reference
Used to indicate a relative position in a worksheet. This allows you to copy and move
formulas from one area to another of the same dimensions. Excel, for example,
automatically changes the column and row numbers to reflect the new position. (in
spreadsheet applications).
Cell references in formulas that change when Excel copies them to another location.
Absolute cell reference on the Web:
A cell reference in which a dollar sign ($) precedes both the column and row portions
of the cell reference.
Mixed cell reference
Cell reference in which either the column or the row is never adjusted if the formula
containing it is copied to another location.
Cell address
Usually the intersection of a cell's row and column.
Unique location identified by intersecting column and row coordinates. (Spreadsheet
application)
What if analysis
The process of playing with numbers to see how they interact in a spreadsheet.
Freeze panes
Freezing panes prevents the data in the panes from scrolling as you move to different
areas in the worksheet.
Goal seek on the Web:
Goal Seek is a tool that is used to find the value needed in one cell to attain a result
you want in another cell.
Formula
A set of instructions that you enter in a cell to perform numeric calculations
(adding, multiplying, averaging, etc.); for example, +A1+B1. (in spreadsheet
applications)
page
105
[A
A.C.A.
dvanced
Filter
omputer
pplications
Solver
Solver is a tool used to perform what-if analyses to determine the effect of changing
values in tow or more cells on another cell.
Recalculation
The act of calculating again (usually to eliminate errors or to include additional data);
"recalculation yielded a much larger value"
Excel Terms
A cell address in a formula that does not change when copied to
Absolute cell reference:
another cell. An absolute reference has the form $A$1.
The selected cell in a worksheet. The active cell is surrounded by a
Active cell:
heavy border and is identified by the cell address.
Shows the beginning and ending balances and the amount of
Amortization schedule:
payment that applies to the principal and interest for each year over
the life of the loan.
A function used to perform multiple tests on the content of cells in a
AND function:
spreadsheet and display a value or text based on whether the overall
test is true or false.
The information that a function uses to produce a new value or
perform an action. For example, a new value is displayed when the
Argument:
SUM function adds the argument (A6:A12). An argument consists of
numbers, references, text, operators, or error values.
A method of ordering a group of items from lowest to highest, such
Ascending:
as from A to Z.
Assumptions:
Values in cells you can change to determine new values for formulas.
Auditing:
AutoFilter:
AutoFormat:
AVERAGE function:
Cell reference:
Cell:
Chart:
Column heading:
Comment:
Comparison criteria:
Condition:
page
106
A.C.A.
[A
dvanced
Conditional formatting:
Consolidation:
Criteria:
Currency style format:
Data table:
Data validation:
omputer
pplications
Allows you to apply formatting that appears only when the value in a
cell meets conditions that you specify.
Process of summarizing data found on multiple worksheets on one
worksheet.
The conditions that control which records to display in a query; the
words or values used to determine the data that appears in a data
list.
Displays a dollar sign to the left of the number, inserts a comma
every three positions to the left of the decimal point, and displays
numbers to the nearest cent (hundredths place).
Range of cells that shows the answers generated by formulas in
which different values have been substituted.
Restricts the values that may be entered into a cell by the worksheet
user.
Date stamp:
DCOUNT function:
Debugging:
Dependents:
Descending:
Dummy data:
Embedded chart:
Filter:
Format code:
Formula:
Function:
Goal seeking:
Gridlines:
HLOOKUP function:
IF function:
Label:
Legend:
MAX function:
page
107
A.C.A.
[A
dvanced
omputer
pplications
MIN function:
NOW function:
Worksheet:
X-axis:
Y-axis:
A set of rows, columns, and cells in which you store and manipulate
data. Several worksheets can appear in one workbook, and you can
switch among them easily by clicking their tabs with the mouse.
A line, usually horizontal, along the bottom of a chart. The x-axis
shows the labels for the data series. Also called the horizontal axis.
A line, usually vertical, along the left side of a chart. The y-axis
shows the values for the data series.
DATABASE TERMINOLOGY
Database: A collection of related information stored in a structured format. Database
is often used interchangeably with the term table (Lotus Approach, for instance, uses
the term database instead of table). Technically, they?re different: A table is a single
store of related information; a database can consist of one or more tables of
information that are related in some way. For instance, you could track all the
information about the students in a school in a students table. If you then created
separate tables containing details about teachers, classes and classrooms, you could
combine all four tables into a timetabling database. Such a multi-table database is
called a relational database.
Data entry: The process of getting information into a database, usually done by people
typing it in by way of data-entry forms designed to simplify the process.
Dbms: Database management system. A program which lets you manage information in
databases. Lotus Approach, Microsoft Access and FileMaker Pro, for example, are all
DBMSs, although the term is often shortened to ?database?. So, the same term is used
to apply to the program you use to organise your data and the actual data structure
you create with that program.
Field: Fields describe a single aspect of each member of a table. A student record, for
instance, might contain a last name field, a first name field, a date of birth field and
so on. All records have exactly the same structure, so they contain the same fields. The
values in each field vary from record to record, of course. In some database systems,
you?ll find fields referred to as attributes.
Flat file: A database that consists of a single table. Lightweight database programs
such as the database component in Microsoft Works are sometimes called ?flat-file
managers? (or list managers) because they can only handle single-table databases. More
powerful programs, such as FileMaker Pro, Access, Approach and Paradox, can handle
multi-table databases, and are called relational database managers, or RDBMSs.
Foreign key: A key used in one table to represent the value of a primary key in a
related table. While primary keys must contain unique values, foreign keys may have
duplicates. For instance, if we use student ID as the primary key in a Students table
(each student has a unique ID), we could use student ID as a foreign key in a Courses
table: as each student may do more than one course, the student ID field in the
Courses table (often shortened to Courses.student ID) will hold duplicate values.
Index: A summary table which lets you quickly look up the contents of any record in a
table. Think of how you use an index to a book: as a quick jumping off point to finding
full information about a subject. A database index works in a similar way. You can
create an index on any field in a table. Say, for example, you have a customer table
which contains customer numbers, names, addresses and other details. You can make
indexes based on any information, such as the customers? customer number, last name
+ first name (a composite index based on more than one field), or postal code. Then,
when you?re searching for a particular customer or group of customers, you can use the
index to speed up the search. This increase in performance may not be noticeable in a
page
108
A.C.A.
[A
dvanced
omputer
pplications
page
109
A.C.A.
[A
dvanced
omputer
pplications
Design View
A table's Design view allows you to add fields or make changes to the overall formatting and
properties of a table.
Embedded Object
An embedded object is linked to the original data and is updated when the original data is
updated or changed.
Field
A field is a category of information, such as a phone number, product name, or unit cost. If a
table contains customer information, its fields might be first name, last name, address, city,
state, zip code, and phone number.
Field List
The field list appears at the top of the Query design window when you have added a table to
the query. It lists all of the fields in the table, and you can use it to add fields to the query
design grid.
File Type
File type refers to the format the file was saved in and often refers to the application that
created the file.
Files
A file is a collection of data referred to by a given name.
Normalization
Normalization is the process of splitting a table into related tables, in order to eliminate
wasted space, redundancy, and keying errors.
Primary Key
The primary key is the unique identifier for each record, such as an employee number, a
product number, or a customer number. Access will not allow duplicate entries in a field that is
set up as a primary key.
Primary Key Fields
The primary key is the unique identifier for each record, such as an employee number, a
product number, or a customer number.
Query
A query is a question that you ask about the data in your table(s). For example, you may want
to know which of your customers bought pinto beans in March. Access searches designated
tables or queries and provides you with an answer.
Query Design View
Query Design view lets you build or edit a query using the design grid.
Record
A record is all of the information collected about a specific event, thing, product, or person,
such as a customer record. A record can consist of many fields. For instance, a customer record
could consist of the customer's first name, last name, address, city, state, zip code, and phone
number.
Relational Database
A relational database management system is an application that allows you to organize,
manipulate, query, and view your data, while building links between related topics. Access is a
relational database management system.
Relationships
Relationships are ties that are created between tables in the database so that Access can
combine data from more than one table to create reports. It is how tables determine how they
correspond to each other.
Report Wizard
Report Wizard helps you create a report by giving you a variety of choices in a series of dialog
boxes.
Report Sections
In Design view, a report is divided into different sections, which vary depending on the
individual report. Some common sections include the Report Header, Detail, and Page Footer
sections. When printed, some sections, such as Report Header, appear only once on the report.
page
110
A.C.A.
[A
dvanced
omputer
pplications
Other sections, such as the Detail section, are repeated over and over until all the records are
shown.
Report Design View
Report Design view lets you create a report from scratch or modify the way a report appears.
Fields, lines, labels, color, and graphics can be added to a report in Design view.
Table Wizard
The Table Wizard provides step-by-step help in creating a table, selecting the fields,
designating a primary key, and naming the table.
Wizards
Wizards guide you through difficult tasks using step-by-step dialog boxes.
Attribute the name of a column of a table, indicating the meaning of the data in that column. A logical
data value of an object.
Database Administrator Responsible for the design, control and administration of a DB.
Database Metadata a class in java.sql that contains information about the database server.
Data Definition Language used to define the logical, external and physical schemas and access rights.
Data dictionary a collection of information stored in the DBMS about what objects exist.
DBMS a software system able to manage large, shared, persistent collections of data while ensuring
reliability and privacy.
Form a page of a Graphical User Interface used to display the results of a query.
Metadata data about the structure of data
Normalization the process of changing a database design to comply with the various normal forms.
Primary Key a key (in the second sense) that is constrained to not contain null values. An arbitrarily
selected Candidate Key used for identification of tuples in a relation.
Foreign key SQL keyword. Used to define a referential constraint in SQL. See also references.
Query a function mapping instances of a given database schema into relations on a given set of
attributes.
Query Language a language in which queries may be expressed.
Record an ordered sequence of values of possibly different types.
Schema the characteristics of the data (not the data itself) within the database.
Schema (of a relation or table) its heading (or name), followed by (in brackets) the names of its
attributes. E.g. TEACHING (Course, Tutor)
Spurious Tuple a tuple in a join between two (badly designed) relations that contains wrong
information, even though the original relations contained correct information.
Secondary Key a Candidate Key which was not selected to be the Primary Key.
SQL a standard language, the structured query language, incorporating DDL and DML features, used to
manipulate databases.
Top-down design a design methodology that begins by creating a conceptual model (a domain model),
and translates this into a collection of tables.
page
111
A.C.A.
[A
dvanced
omputer
pplications
Tuple a function from a set of attributes to a collection of elements from the domains of the attributes.
Conceptually similar to an ordered pair or triple etc.
DUPLEX
1.
2.
3.
4.
SIMPLEX TRANSMISSION
FULL-DUPLEX
Full-duplex transmission uses two communication channels so that devices (usually two) on
each end of a transmission can transmit and receive data at the same time.
page
112
A.C.A.
[A
dvanced
omputer
pplications
HALF-DUPLEX
Half-duplex transmission is a compromise between simplex and full-duplex. In half-duplex mode, there is
only one channel. However, both devices can transmit and receive by sharing the channel. When one device
transmits data, the other device receives. Citizen's band radio and most LAN data transmission use this
mode.
Half-duplex transmission is similar to a one-lane bridge on a two-lane road. Travel over the bridge is
permitted in both directions, but not at once. You must wait until traffic traveling in the opposite direction
clears the bridge before you can pass over the bridge.
SUMMARY
Half-duplex data transmission means that data can be transmitted in both directions on a
signal carrier, but not at the same time. For example, on a local area network using a
technology that has half-duplex transmission, one workstation can send data on the line and
then immediately receive data on the line from the same direction in which data was just
transmitted. On the other hand, full-duplex transmission implies that data are transmitted in
both directions simultaneously.
For example, a walkie-talkie is a half-duplex device because only one party can talk at a
time. In contrast, a telephone is a full-duplex device because both parties can talk
simultaneously. When two computers communicate over a LAN, data typically travels in only
one direction at a time, because the base band network used for most LANs supports only a
single signal. In other words, it is transmitted in half-duplex fashion.
With the right equipment, full-duplex communication is possible on certain types of LANs.
The first requirement is a separate channel for traffic running in each direction. Whether this
page
113
A.C.A.
[A
dvanced
omputer
pplications
is possible depends on the network medium. Coaxial cable, for example, contains a single
conductor and a ground, so there is no physical way that traffic could run in both directions,
unless you were to install two cable runs for each connection. Twisted pair cable, on the other
hand, contains four separate wire pairs within a single sheath, one of which is dedicated to
incoming traffic and one to outgoing. Networks that use this type of cable can therefore
theoretically operate in full-duplex mode, and some manufacturers are making Ethernet
equipment that makes this possible. Full-duplex Ethernet essentially doubles the throughput
of the existing network.
Revision
Q* Give and explain the broad categories of Computer Applications
Scientific applications
Commercial applications
Payroll systems
Invoicing systems
MIS
Q* Input technologies that provide a more natural user interface for computer users
i.
ii.
iii.
iv.
page
114
A.C.A.
[A
dvanced
omputer
pplications
IV. Allows users to write or draw on the surface of a tablet the handwriting is
digitized by the computers and accepted or input display on the screen
Q* What is an electronic office
Is a collection of various technologies that are intended to improve the efficiency of office
work in a digitized manner i.e. Email, Desktop Publisher and so on.
Q*give and explain any six areas of office Automation
i.
ii.
iii.
iv.
v.
vi.
vii.
viii.
ix.
x.
Word processing
Desktop publishing
Email
Facsimile (Fax)
Voice Mail
Video Text Teletext - View data
Sending documents images relay
Telescoping device that electronically transmits written or graphical material over
telephone lines to produce hardcopy @ a remote location.
Storing and forwarding of digitized speed
Teletext information transmitted on TV, which is text, based
View data- use telephone lines, the computer output is displayed on an adapted TV set
or VDU
Q* what is a set of interrelated component that collect (or retrieve), process, store and
distribute information to support decision making and control in organization
Q* Information systems can be used for competitive advantage
Give and explain 4 basic strategies a business organization can use to deal with competitive
forces
I.
II.
III.
IV.
Product differentiation
Focused differentiation
Developing tight linkages to customers and suppliers
Overall cost leader Becoming a low cost producer
I. Creating brand loyalty by developing new and unique products and services that are
not easily duplicated by competitors
II. Developing new market niches for specialized products or services where a business
can compete in the target area better that its competitors
III. Reduces customers, bargaining and power and the bargaining power of suppliers
IV. Raise switching costs
V. Produce goods and serves at a lower price that competitors without sacrificing quality
and level of services
Q*A firm faces a number of threats and opportunities
List Them
I.
II.
III.
IV.
Q*What is outsourcing
page
115
A.C.A.
[A
dvanced
omputer
pplications
1) Preliminary investigation
2) Analysis
3) Design
4) Development
5) Implementation
6) Maintenance
page
116
A.C.A.
[A
dvanced
omputer
pplications
5. IMPLEMENTATION STAGE
-Implementing the working system
- Delivering the new system The new system is delivered to the users, sometimes small
groups are selected to try the new system.
- People are trained to operate and use the system and the orgn converts to the use of a
new developed system.
- Getting the people involved working with it.
- Various implementation methods.
i)
Phased changeover
ii)
Direct/complete overhaul changeover
iii)
Parallel changeover
page
117
A.C.A.
iv)
[A
dvanced
omputer
pplications
Pilot changeover
Requirements planning
User design
Construction
Installation (cut over)
a) Requirement planning
End users and developers participate in workshops where they review the RAD
methodology and prepare for the next phase.
Users work with developers in determining the general parameters of the
problem the system is trying to resolve and user needs it will attempt to fulfill.
A JAD (Joint application development) team is formed to focus on to business
aspects of the system.
This leads to a problem identification and allow the JAD team classify the
problem in general business terms.
b)
c)
Construction phase
page
118
A.C.A.
d)
-
[A
dvanced
omputer
pplications
Prototyping
Leads to more accurate requirements, in a shorter time period, than
Conventional development methods.
Obtain user buy-in to the new system through involvement in the system design.
Reduces initial training costs, as the user learns more about the system.
Manages expectations, as they understand the system look, feel, and functionality.
Criticisms of SDLC Approach
1. Failure to meet the needs of management
2. Unambitious system design
3. Instability
4. Inflexible
5. User dissatisfaction
6. Problems without documentation
7. Incomplete system
8. Application backlog
9. Maintenance workload
Weakness of Prototype
1.
Inefficiency
2.
Incomplete, performing only some of the tasks
3.
Poorly documented
4.
Unsuitable for integration with other operation system
5.
Incomplete, e.g. lacking security features
6.
Incapable of holding the Number of records necessary
7.
Inadequate, being designed for one type of user only
DOCUMENTING THE SOFTWARE DEVELOPMENT PROCESS
1.
2.
3.
4.
page
119
A.C.A.
[A
dvanced
omputer
pplications
2. User (documentation)
- Describes the user responsibilities directly associated with the information system.
- Describes how to prepare, control, distribute computer input and output, and how to
perform all on-line terminal procedures for data entry, processing control and output
generation.
3. Operations (documentation)
-Describes all normal and exception processing for computer operations personnel.
- Includes info needed to learn and operate the entire new application system.
4. Technical (documentation)
- Provides the material needed for effective and efficient maintenance of the
application system programming.
- Include all documentation and design data generated prior to programming, with all
updates and modifications clearly identified.
TRANSACTION PROCESSING SYSTEM
- Supports the organizations daily activities.
- Maintains the majority of the organizations internal data.
- Employ simple but highly repetitive process.
- Require capability to deal with high volumes of transactions with great accuracy and
high security.
- Provide operational details, summary reports, and exception reports, which help
supervise and control routine operations.
- Transaction processing system can be divided into Accounting, marketing,
manufacturing.
Management Reporting Systems
- Not concerned with the daily operations on a nitty gritty level.
- Utilize data from Transaction processing systems to help mid management to control the
acquisition and allocation of resources which support those operations.
Decision Support System
Info-System
Info derived from external sources.
Provide info required in maintaining a strategic vision.
Provide management with the ability to quickly obtain status info and portray it in
graphical or tabular formats.
Analyse the situation and determine course of action.
Expert system
Programs written to stimulate or mimic human expertise or intelligence in some
field of knowledge.
Composed of a knowledge base and an inference engine
CASE (Computer Aided Software Engineering)
Support tool for software engineer
page
120
A.C.A.
[A
dvanced
omputer
pplications
Case Workbenches
- Designed to support the analysis and design stages of the software process.- Oriented towards the support of graphical notations such as used in the various
methods.
Components of a Case Workbench are:
1 A diagram editing system that is used to create dataflow diagrams, structure charts,
ERDs.
- The editor is aware of the types of entities in the diagram.
- It captures information about theses entities and saves this information.
2
3
4
5
6
7
8
Design analysis and Checking facilities that process the design and report on errors
and anomalies.
Are integrated within the editing system so that the user may be informed of errors
during diagram creation.
Query language facilities that allow the user to browse the store information and
examine completed design.
Data dictionary facilities that maintain information from the central store and
automatically generate system documentation.
Report generation tools, that allows screen and document formats to be specified.
Forms generation tools, that allows screen and document formats to be specified.
Import/export facilities that allow the interchange of information from the central
repository with other development tools.
Some systems support skeleton code generators, which generate code or code
segments automatically from the design captured in the central store.
Questions
(a) Discuss any 4 possible uses of spreadsheets in a business organization. [8 marks]
(b) Explain the following terms as used in spreadsheets
I. Cell
o
II. Range.
o
(c)
I. Soft return
o
page
121
A.C.A.
[A
dvanced
omputer
pplications
feature when the text reaches the end of the line. It is contrasted with a
hard return which is used primarily to begin a new paragraph. A little
known feature of Microsoft Word and OpenOffice. ...
Made by pressing the return or enter key on the keyboard. A hard return, or
carriage return, creates a line break and identifies the end of a paragraph.
III. Thesaurus
o
o
IV. Widow
o
o
V. Orphan.
o
[2 marks each]
Question 24
(a) Define an electronic spreadsheet. [3 marks]
(b) List 5 facilities provided by a spreadsheet. [5 marks]
(c) What is word processing? [2 marks]
(d) Explain the following word processing terms
I. Justification
II.
III.
IV. Header
o
V. Orientation.
o
o
Whether page is vertically or horizontally aligned. For example we have portrait and
landscape orientation.
Portrait orientation. The mode in which content is viewed where the width is shorter
than the height. Portrait orientation mimics the way most reading material is printed,
eg, letters, newspapers, books. ...
Landscape orientation. The mode in which content is viewed where the width is
longer than the height. Landscape is the traditional orientation for computer viewing
and is appropriate when viewing spreadsheets, video games, and movies.
[2 marks each]
Question 15
Briefly explain the following terms as used in a spreadsheet
(a) Active cell
(b) Cell
page
122
A.C.A.
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
[A
dvanced
Legend
What if analysis
Label
FUNCTION
GRAPH
Formula
Cell address
Worksheet
Cell reference
Relative cell reference
[1 mark each]
omputer
pplications
(m)
(n)
(o)
(p)
(q)
(r)
(s)
(t)
(u)
(v)
Cell pointer
Absolute cell reference
Mixed cell reference
Work book
Goal seek
Range
Protected cells
Freeze panes
Embedded chart
Row & column
Question 16
Briefly explain the following terms as used in a Word processing
(a) Orphan
(o) Hard return
(b) Header
(p) STATUS BAR
(c) Footer
(q) Indentation
(d) TEMPLATE
(r) Soft return
(e) Spellchecker
(s) Widow/Orphan Control
(f) FONT
(t) Widow
(g) TAB STOPS
(u) Thesaurus
(h) Mail merge
(v) Format bar
(i) Font type
(w) Standard bar
(j) Justification
(x) Center alignment
(k) Word wrap
(y) Hyphenation is used to eliminate gaps in
(l) Bold
justified text or to maintain even line lengths in
(m) Borders
narrow columns. You can hyphenate manually or
(n) Bullets
automatically.
[1 mark each]
Question
(a)
(b)
(c)
6
Define a word processor & give an example [2 marks]
List down at least 5 facilities provided by a word processor [5 marks]
Give a suitable term/ phrase that best describes the following statements in word processing.
i)
The automatic movement of typed text to the new line, without pressing the enter key.
ii)
Different handwritings in a computer.
iii)
Line spacing.
[1 mark each]
(d) Define a spreadsheet and give an example [2 marks]
(e) Give the difference between a spreadsheet & a worksheet [2 marks]
(f) Give a suitable word/ phrase that best describes the following spreadsheet terms
I. Cell
[2 marks]
II. Hard copy [2 marks]
III. Creating a permanent copy of a worksheet on a computer. [2 marks]
QUESTION 31
(a) Define the term Operating System. [3 marks]
(b) State any 4 functions of an operating system. [4 marks]
(c) State any 3 examples of an Operating system (exclude the Windows family).
[3 marks]
(d) Define the following Windows Operating Systems based terms:
I. Desktop
o
II. Icon
o
page
123
A.C.A.
[A
dvanced
omputer
pplications
III. Taskbar
o
o
The bar usually found at the bottom of a Windows screen. The taskbar
shows which software programs are open. It also contains the Start button.
A windows 95/98 screen elements, displayed on the desktops which
includes the start button and lists the programs currently running on the
computer.
IV. Window
o
V. Cascade window
o
o
[2marks each]
Question 6
Expand the following abbreviations.
a) GIGO
b) WYSIWYG
c) LED
d) LCD
e) MS DOS
f)
OCR
g) MICR
h) CD ROM
i)
ASCII
j)
COM
k) WIMP
l)
GUI
m) WIMP
n) CRT
o) DBMS
p) POP 3
q) HTML
r)
s)
t)
u)
v)
w)
x)
y)
z)
aa)
bb)
cc)
dd)
ee)
ff)
gg)
hh)
URL
TCP
HTTP
CPU
DBA
EPROM
VDU
ALU
DOS
FORTRAN
COBOL
ISP
VOIP
CPU
WWW
DVD
PROM. [20 marks]
Question 7
Explain the following terms in detail, giving examples where applicable.
a) Computer peripherals
b) Program
c) BLUETOOTH
a. Bluetooth is the codename for a
technology specification for lowd)
cost, short-range radio links
e)
between mobile PCs, mobile
f)
phones and other portable
g)
devices, and connectivity to the
h)
i)
Internet. ...
j)
b. Bluetooth is the name given to a
k)
radio technology making
transmission of signals over short
Question 8
a) Menu
a.
b)
c)
Footer
Soft return
d) Edit
page
124
[A
A.C.A.
dvanced
omputer
Cell
Label
pplications
g)
h)
i)
j)
Chart
Mail merge
Print preview
Work sheet. [2 marks each]
page
125