Part of the Computer
Part of the Computer
PART OF
PART OF THE
THE COMPUTER
COMPUTER
1
1|BS8
Google Sycamore
Google Sycamore is a superconducting quantum processor, part of Google's Artificial Intelligence division.
It's designed to perform calculations that would take classical computers an extremely long time. In 2019,
Sycamore demonstrated "quantum supremacy" by completing a task in 200 seconds that would have taken
a supercomputer 10,000 years, according to Google
PARRELEL PROCESING AND ARTIFICIAL INTELLIGENCE
Parallel processing is a computing technique when multiple streams of calculations or data processing tasks
co-occur through numerous central processing units (CPUs) working concurrently.
Parallel processing uses two or more processors or CPUs simultaneously to handle various components of a
single activity. Systems can slash a program’s execution time by dividing a task’s many parts among several
processors. Multi-core processors, frequently found in modern computers, and any system with more than
one CPU are capable of performing parallel processing.
For improved speed, lower power consumption, and more effective handling of several activities, multi-core
processors are integrated circuit (IC) chips with two or more CPUs. Most computers can have two to four
cores, while others can have up to twelve. Complex operations and computations are frequently completed
in parallel processing.
Artificial Intelligence
AI, which stands for artificial intelligence, is a branch of computer science that develops machine systems
capable of demonstrating behaviors linked to human intelligence. AI programs use data collected from
different interactions to improve the way they mimic humans in order to perform tasks such as learning,
planning, knowledge representation, perception and problem-solving.
ACTIVITY
1. As a google subscriber what do you think made google company decided to use quantum
computation?
2. Why do you think brought about the fifth generation of computers.
2|BS8
LESSON
2
DIRECT DATA ENTRY DEVICES
B8.1.1.1.2. Demonstrate understanding of direct data entry devices (Graphic Tablet, Magnetic Card Reader,
Optical Card Reader, QR code reader, Radio Frequency Identification (RFID) Readers)
Magnetic stripe reader– used to read data from magnetic stripes on mostly banking cards
Advantages: information can be put into very quickly, more accurate than typing
Disadvantages: not secure as data stored on the chip, very limited storage capacity in the stripe
PIN pads– use to enter data into Automated Teller Machines (ATM), EFTPOS system, entry doors and
handheld devices
Advantages: PIN codes help prevent unauthorised access, secure entry doors can be accessed without
physical key cards.
3|BS8
Disadvantages: people can be seen entering the code, anyone with the correct code can use the device, PIN
code can be forgotten
Optical mark reader– used to read and input information from a form.
Advantages: whole pages of information can be read very quickly, small marks required
Disadvantages: incorrectly completed forms can result in errors, characters or numbers cannot be read.
Barcode reader– used to scan codes directly from the products,books and membership cards
Advantages: faster, more accurate than manually inputting data, barcodes are used internationally to
identify the product
Disadvantages: barcode only contains numerical code, barcodes can be easily damaged.
Optical character Reader (OCR): used to transfer handwritten or printed text into editable text on a
computer.
Advantages: Much quicker than manually re-typing information.
Disadvantages
1. Handwritting must be neat and legible.
2. Errors can often be made and text will still need proofreading.
3. Information displayed in tables can be read inaccurately.
Radio Frequency ID Tags
RFID tags are small tags that can be directly attached to a product and when a reader passes within a
certain proximity of the tag, the reader can read the contents of the tag.
Advantages
1. Faster than processing a barcode as don’t have find the tag, just be near it.
2. Can also be used as a security device, so set’s off an alarm if too close to a sensor.
4|BS8
Disadvantages
1. Higher set-up costs than barcode readers
2. Higher individual unit cost for the tags than a barcode reader
Near Field Communication (NFC)
NFC is a system of very short range (up to 10cm) radio communication that requires two way
communication.
Common uses
Contactless payment in shops, Contactless travel cards and access cards
Advantages
1. Most modern smartphones are fitted with NFC technology so it is widely compatible.
2. It’s incredibly convenient and more robust that chip and pin / magnetic stripe.
Disadvantages
1. If there are multiple NFC devices very close together (e.g. in your wallet) then they can interfere
with the signals
2. If someone knows your phone password and can get access to your phone they can buy things using
your phone
Magnetic Ink Character Recognition
MICR is mainly used with Cheques and this is the only use for it you will need to know. When cheques are
being printed, the account holder’s name, sort-code and bank account number is printed on to the cheque
using a special magnetic ink. These magnetic ink details are read by a machine when the cheque is
processed, meaning incorrect account details are rarely entered.
Advantages
1. Very accurate due to the technology used
2. Difficult to copy / edit so very secure technology
3. Fast processing times in the bank
Disadvantages
1. High setup costs
2. Because cheques can be received from different banks, it requires all banks adopt the system in order
for it to be effective
ACTIVITY
WAEC institution plans to use a machine or an automated device to mark student script disregarding the
distribution of papers for teachers to mark students script which device do you think will suite new ideas
and why?
5|BS8
LESSON
3
USES OF THE OUTPUT DEVICES
B8.1.1.1.3. Examine the uses of the output devices: Braille printers, Impact, Inkjet, Thermal, Wax, 3D
printers
PRINTERS
A printer is a device that accepts text and graphic output from a computer and transfers the information to
paper, usually to standard-size, 8.5" by 11" sheets of paper. Printers vary in size, speed, sophistication and
cost. In general, more expensive printers are used for more frequent printing or high-resolution color
printing.
The two main types of printers are
impact printers and non-impact printers.
BRAILLE PRINTER
A braille printer (also called a braille embosser) is an impact printer that creates tangible dots on a braille
paper, making written documents readable to the visually impaired individuals.
A Braille printer is a system that enables people who are blind to read using a sense of touch. The utilization
of the Braille printer allows individuals who are visually impaired and blind to access information quickly
and perform tasks that involve reading and writing more efficiently using the Braille printer. In braille, each
letter is represented by a different dot pattern of up to six raised dots.
IMPACT PRINTERS
Impact printers form characters by striking on a print hammer or wheel against an inked ribbon, leaving
an image on a paper. There are two main types or category of printers which are impact printers and
non-impact printers. Example of impact printer
6|BS8
1. Dot matrix printer
2. Daisy wheel printer
3. Band and chain printer
Characteristics of Impact Printers
Advantages Disadvantages
Impact printers are less expensive They produce low quality prints
They are reliable printers They make a lot of noise while printing
They are character or line printers They are very slow in printing
They use cartridges and ink ribbons. Refilling of the cartridge is expensive.
Very useful for larger output prints They are not able to print in colour
Non-Impact Printer
Non-impact printers create images, characters, and figures without requiring continuous contact between
the paper and the printing instrument.
Non-Impact Printer
Importance of Non-Impact Printer
1. Inkjet and laser printers are instances of non-impact printers that offer faster print times, silent
operation, and superior print quality.
2. They are convenient for professional printing jobs including document printing, graphic design work,
and picture printing because of their size to generate rich colors and detailed images.
3. They are therefore frequently utilized in many different settings, including homes, workplaces, and
coaching institutions.
4. All things considered, non-impact printers have completely altered the printing industry by providing
effective, superior, and easy-to-use substitutes for conventional impact printers.
Types of Non-Impact Printer
Below are four types of Non-Impact Printer
7|BS8
• Thermal Printer: In this kind of printer heat is used by thermal printers, which are non-impact
printers, to produce prints. Using heat-sensitive paper or ribbon that is heated and transferred to
create a print, thermal printers create pictures. The three fundamental parts that make up a thermal
printer are a print head, a platen, and a spring.
• Inkjet Printer: Using tiny nozzles, inkjet printers spray droplets onto paper directly. If you want to
construct high-resolution graphics, pictures, or images for your papers, this approach works well for
producing vibrantly colored visuals.
• Laser printers: In laser printers., An image is produced, is a kind of non-impact printer that operates
laser LEDs. The mechanism by which laser printers work involves producing an electrostatic picture
on a drum a cylindrical roller. Laser LEDs are used to selectively charge the necessary regions of the
drum's surface to generate this picture.
• Dye-sublimation Printers: Dye-sublimation printer is a digital printing procedure that is used in Non-
Impact printers. It applies an image to the target substrate using heat transfer. The technique,
sometimes known as digital sublimation, is frequently employed to decorate clothing, banners,
signs, and other objects with surfaces that may be sublimated.
8|BS8
1. The kinds of material that non-impact printers can handle are restricted. Cardstock and carbon
paper, which have thick surfaces, are not suited for these printers since they employ either liquid ink
or dry toner particles.
2. Connectivity problems also affect non-impact printers. Other electrical equipment in the vicinity
may cause interference with wireless communications.
3. The cost of operating non-impact printers is actually higher than that of impact printers. The high
expense of changing toner and inkjet cartridges is mostly to blame for this.
4. It may be difficult or impossible to recycle the plastic and metal components needed to build non-
impact printers. These materials have a good probability of ending up in landfills or other locations
Thermal Printer
A thermal printer is a printer that makes use of heat in order to produce the image on paper. Thermal
printers use heated pins to "burn" images onto heat-sensitive paper. Thermal printers are increasingly
becoming popular and are mostly used in airline, banking, entertainment, retail, grocery, and healthcare
industries. Thermal printing does not make use of ink or toner unlike many other printing forms but
largely depends on thermal papers for producing the images. Advantages of Thermal Printers
9|BS8
4. Printing 3D foods.
5. For printing personal protective equipment (PPE)
6. For manufacturing replacement parts and spare parts.
Advantages of 3D Printer
10 | B S 8
LESSON
4
STORAGE DEVICES
B8.1.1.1.4 Describe storage devices: Flash Memory Storage Systems, Embedded Flash Memory Cards and
Readers, USB Flash Drives, Solid State Drives and Hybrid hard drives
STORAGE DEVICES
In addition to the previously discussed types of storage device in basic 7, other options are available for
specific uses and applications. These include Flash Memory Storage Systems, Embedded Flash Memory
Cards and Readers, USB Flash Drives, Solid State Drives and Hybrid hard drives.
Memory Cards
Memory cards enable mobile users to easily transport digital photos, music, or files to and from mobile
devices and computers or other devices. Memory card is a removable flash memory device, usually no
bigger than 1.5 inches in height or width, that you insert and remove from a slot in a computer, mobile
device, or card reader/writer.
Common types of memory cards include CompactFlash (CF), Secure Digital (SD), Secure Digital High
Capacity (SDHC), microSD, xD Picture Card, and Memory Stick.
11 | B S 8
USB Flash Drive
USB flash drive, sometimes called a thumb drive, is a flash memory storage device that
plugs in a USB port on a computer or mobile device. USB flash drives are convenient for
mobile users because they are small and lightweight enough to be transported on a
keychain or in a pocket. With a USB flash drive, users can easily transfer documents,
photos, music, and videos from one computer to another.
12 | B S 8
4. Data recovery process is time-consuming and can be expensive, as the data on damaged chips may
not be recoverable.
Comparison between SSD and HDD
Property Solid-State Drive Hard Disk Drive
(SSD) (HDD)
Heat Less heat production More heat production due
to moving parts
Hybrid is defined as something which is a combination of two different things and so is a Hybrid hard
drive as it is a combination of hard disk and solid-state drive. Its intended purpose is to bring together
the performance of an SSD and high capacity of an HDD.
SSD provides great speed and performance but it is not very good when it comes to capacity and internal
storage. While in hard disk, it provides a larger capacity and storage than SSD but is not very efficient
when it comes to speed and performance. SSHD combines the speed of SSD and capacity of HDD and
comes at a very affordable price for users.
13 | B S 8
LESSON
5
FILE MANAGEMENT TECHNIQUES
Share
Share: Share and send links, photos, and more to your friends and social networks in the app currently
open. (Windows + H)
Settings: View Start Settings, view settings such as battery monitor, volume, brightness, notifications, and
the power to shut down the computer. (Window + I)
❖ Disk partitioning
❖ Disk defragmentation
❖ File compression
14 | B S 8
Defragmentation
Defragmentation, also known as defragging or defrag, is the process of rearranging the data on a storage
medium, such as a hard disk drive (HDD), for efficient storage and access. Defragmenting is the process of
scanning your hard drive and joining the different file fragments stored on the disk. Defragmentation
increases the speed and performance of a hard disk.
How to perform a disk defragment on windows 10
1. Select the search bar on the taskbar and enter defrag.
2. Select Defragment and Optimize Drives.
3. Select the disk drive you want to optimize or defragment.
4. Select the Optimize button.
Disk Partitioning
Disk Partitioning is the process of dividing a disk into one or more regions called partitions. Disk
partition, is a logical division on a hard disk drive (HDD) that enables a PC to have different drives. A
partition divides the hard drive into several logical storage units on one drive but functions as multiple
drives. Reasons or importance of disk partition
15 | B S 8
5. Right-click on the unallocated space on your hard disk, and then select "New Simple Volume".
6. In the New Simple Volume Wizard interface, click "Next".
7. Enter the size of the volume you want to create in MB or accept the default size, and then select "Next".
8. Accept the default drive letter or choose a different letter for the partition, and then select "Next".
9. Set the default file system as NTFS and click "Next" to format the volume.
10. Click "Finish" to complete creating a new partition in Windows 11/10.
File compression
File compression is the process of reducing or squeezing the size of files to save storage space. File
compression is the act of reducing the size of data while maintaining the integrity of the information. This
is useful because it allows us to store smaller files on storage disks, as well as making file transfer over the
internet more efficient.
ASSESSMENT QUESTIONS
16 | B S 8
MULTIPLE CHOICE 9. Dividing a hard disk into one or more regions
is called?
1. Which generation of computers uses
A. Compression
parallel processing and artificial
intelligence? B. Partition
A. Third generation C. Defragmentation
B. Fourth generation C. Fifth 10. The process of reducing the size of files to
generation reduced storage space is known
2. When a computer is able to process or as
execute more than one instruction at a
time, it refers to as A. Compression
A. Serial processing B. Partition
B. Parallel processing C. Defragmentation
C. Multi-processing
STRUCTURED QUESTION
2. Which of the following device can be
used to mark multiple choice 1. Explain the term direct data entry device and
examination? give four examples
A. Chip and Pin Reader 2. State three (3) uses of barcode reader.
B. Optical Mark Reader C. Barcode 3. What are the advantages and disadvantages of
Reader direct data entry device.
3. The best printer for the visually impaired 4. Explain the following and give 2 examples each.
or blind people is A. Laser printer
I. Impact printer II. Non-Impact
B. Thermal printer
printer 5. State 3 applications of 3D printer
C. Braille printer
4. Which of the following is not an example 6. identify any three advantages of SSD over HDD
of non- impact printer? 7. Explain the following terms
A. Dot Matrix i. Defragmentation ii. File
B. Plotter compression iii.
C. Thermal printer Disk partition
7. Another name for USB flash drive is
A. Memory card
B. thumb drive
C. Memory stick
17 | B S 8
STRAND 1 INTRODUCTION TO COMPUTING
ADAPTIVE TECHNOLOGY
ADAPTIVE AND ASSISTIVE TECHNOLOGIES
Many people have disabilities that limits their ability to perform daily living tasks. Low vision and
mobility issues, as well as speech and hearing problems, can seriously affect a person's ability to
navigate daily life.
Both assistive and adaptive equipment refer to devices and technology that help people live more
independent. Assistive and adaptive equipment help improve people's mobility, communication, and
sensory abilities.
This includes devices and technology that allow people with disabilities or aged person to participate in
daily life with greater ease. Assistive technology can be bought off-the-shelf, modified, or custom-made.
Adaptive technology is a subset of assistive technology, which refers to something specifically designed
for people with disabilities. Adaptive equipment has been modified or enhanced from its original
purpose to specifically meet the needs of a person with a disability. Adaptive equipment is more
specialized.
People with disability can be categorize into different group, which includes; 1. Sensory Disability
18 | B S 8
The following are both adaptive and assistive equipment and technology that can be used to help or
assist people with disabilities.
Computers with visual output Electronic pointing devices Screen readers Joysticks
Text-to-speech software Trackballs
EXERCISE
Describe quantum computing using the Google operational quantum computing called Sycamore
19 | B S 8
LESSON PORTABLE COMPUTERS
2
B8.1.2.1.2. Describe how portable computing devices affect our everyday lives
You can have music in your pocket and make life more enjoyable. you can keep up with people the latest
trends, the latest sports, whatever you want. you don't need to see your friends you can text them
when you are not able to hang out with them.
Smartphones have transformed the world in how people communicate with each other. With the
world's population of about seven billion people, there are over 2.5 billion smartphone users
worldwide.
The most fundamental function of mobile phone is to receive and make calls. It also allows us to tell the
time, take pictures, get directions, entertain ourselves, communicate with people on the various social
media platforms and many more. These small devices are everywhere and have an increasing role in the
lives of everyone.
Smart watches
Smart watch is a wearable computing device that look like a wristwatch or other timekeeping device.
Smart watches have many features that smartphones have, but it is much more compact.
In addition to telling time, many smartwatches are capable of extending the capabilities of th
smartphone to the watch through Bluetooth transmission.
20 | B S 8
The user can use the watch's interface to initiate and answer phone calls from their mobile phone, read
email and text messages, get weather reports, listen to music, access GPS location and health data.
1. Health information, such as heart rate, blood oxygen level, blood pressure and temperature
monitoring;
2. Messaging and calling features, similar to those on a smartphone.
3. Emergency calls for assistance if the watch detects the user has fallen.
4. Location features, such as maps, a compass and GPS tracking.
Laptop
Laptops are very common in the modern-day society. Like smartphones, they are lightweight, portable,
and can be used on the go. Laptops allow us to feel like we are working on a desktop but with the
convenience of being able to work wherever and whenever we want. They also consume eighty percent
less electricity than desktop computers being particularly beneficial for students and businessmen.
People use laptops on a daily basis as they provide many advantages over desktops and smartphones.
PDA
PDA is short for personal digital assistant, and it is a handheld device that combines computing,
telephone, Internet and networking features. A typical PDA can function as a cellular phone, fax sender,
Web browser and personal organizer. PDAs may also be referred to as a palmtop, hand-held computer
or pocket computer. Basically, what a PDA does is to combined the features of a laptop and a cell phone
on same device. GPS
Global Positioning System (GPS) has made the lives of many people safer by reliably transmitting maps
to unfamiliar locations through portable GPS navigational devices that speak to the user rather than
requiring the user to read a map. These devices can save a great deal of time and fuel costs by
preventing a user or driver from becoming lost in an unfamiliar location.
For people who are traveling alone, GPS technology can direct them to the exact location or to a specific
address without any assistance from anyone.
21 | B S 8
LESSON ONLINE SERVICES
3
B8.1.2.1.3. Explain the issues associated with online services (e.g. social media, wikis, blogs, etc.)
An online service is an entity that provides access to various types of data for different uses via the
Internet. Examples of online services include online banking, educational, news, shopping, blogs, e-mail,
wikis and social media networks.
Every day, regardless of your age or the website you use, you are at risk of being hacked and having your
information stolen. It might be your accounts on social networking sites, bank websites, or even
information on your personal computer.
Reliability of passwords
Network Security
Identity Theft
Reliability of Password
Passwords are hard to choose, especially choosing the right one that is easy to remember for yourself
yet hard to guess by others. Many people tend to use very easy passwords for many of their accounts
because they find it much easier to remember. These simple passwords can put their computer or
mobile device at risk, and allow for hackers to access their financial and personal information.
Here is a list of some of the world's most popular passwords that are very easy to be hacked:
1. Password
2. Password1
3. 123456
Security experts suggest that people use a different password for each service or website they have an
account with. For this way if one of your accounts is hacked, the others will remain safe. The way to
create a password that will be hard for others to guess is by using characters that nobody could think of.
Your password should contain UPPERCASE and lowercase letters, numbers and symbols.
Network Security
Network security are software and hardware that protects you from threats.
22 | B S 8
Components of Network Security include:
23 | B S 8
STRAND 1 INTRODUCTION TO COMPUTING
LESSON SUB-STRAND 3
1
HEALTH AND SAFETY IN THE USE OF ICT TOOLS
B8.1.3.1. Demonstrate How to Apply Health and Safety measures in Using ICT Tools
B8.1.3.1.1 Discuss health issues at workstations
Individuals who use computers for long periods of time may experience discomfort or pain as a result of
poor posture, improper adjustment or use of workstation components and other factors. In most cases,
there are relatively simple and inexpensive corrective measures which can be employed to reduce the
likelihood of discomfort or injury. Companies must put measures in place or train computer users on
how to adjust their computer workstations in order to work safely. We will discuss the importance of
taking regular break, adopting good sitting posture and using document holders as a safety measure at
the workstation.
Posture is the position of your body when you are standing or sitting. It describes how your spine is
aligned with your head, shoulders, and hips. Good posture is an essential part of staying healthy, and fit.
It helps you to maintain proper alignment of your spine, shoulders and hips. To prevent chronic health
issues and enhance your wellbeing, it is important to implement healthy workplace habits that improve
your posture at work and anywhere you find yourself.
the right amount of support from muscle tension. The following guidelines can help improve your sitting
posture.
24 | B S 8
Proper Sitting Posture
1. Sit with a back straight (no hunching), your shoulders pulled back and buttock touching the end of
the seat.
2. Keep your neck and head in an upright angle with your ears aligned with your shoulders.
3. Avoid leaning on any side. Keep hips even to distribute weight of body.
4. Bend your knees at a 90-degree angle, and keep your knees even with or slightly lower than hips.
5. Leave a 2 3-inch small gap between the bottom of your thighs and the edge of the seat. This helps
reduce pressure build up in the underside of your thighs.
Almost everybody who use computers on a daily basis at least occasionally have tasks that involve
referring to a hard copy document while typing. In those times and when properly used, a
welldesigned document holder can be greatly impactful ergonomically.
25 | B S 8
Benefits of using documents holder
1. Neck twisting
2. Unnecessary eye fatigue and headaches
3. Curved spine
26 | B S 8
LESSON SAFETY MEASURES TO REDUCE RISK AT
2
WORKSTATIONS
B8.1.3.1.2 Discuss safety measures in risk reduction at workstations
HOW TO SET SEPARATE VOLUME LEVELS FOR THE SPEAKER AND HEADPHONE SOUND.
Set the Levels in Control Panel - Windows 10
1. Search for and select Control Panel. See Where is Control Panel?
2. Select Sound.
27 | B S 8
3. Select the device and set the level.
3. Select Advanced sound options and set the options for the applications.
Windows 11: Right-click the Sound icon and select Open volume mixer or Sound settings.
28 | B S 8
How Computer Glasses Can Help
Computer glasses are specially made to help reduce eye strain associated with looking at a screen.
Unlike regular eyeglasses, computer glasses are designed to optimize your eyesight when you’re looking
at digital screens and are customized for the distance between your eyes and the screen. Here are the
benefits they provide to technology users:
1. Reduced Glare: A special coating on computer glasses can help reduce glare from the screen,
which can strain your eyes.
2. Enhanced Contrast: They can improve contrast, which makes it easier for your eyes to focus on a
screen.
29 | B S 8
3. Blue Light Block: Blue light from screens can lead to digital eye strain; computer glasses can
block or filter out this light, decreasing potential damage to the eye.
4. Improved Posture: Wearing computer glasses can also help improve posture, as they allow users
to sit comfortably at a proper distance from their screens.
AVOID OVERLOADING OF SOCKETS
Overloading a socket is dangerous because it can cause the electrical circuit to overheat,
potentially leading to a fire, electrical shock, or damage to appliances. The strain on the circuit
from multiple devices drawing power can exceed the socket's or extension lead's capacity,
causing the components to overheat and potentially fail.
Here's a more detailed explanation:
1. Risk of Fire:
Overloaded circuits can cause wires, plugs, or outlets to heat up to dangerous levels,
potentially igniting nearby flammable materials and starting a fire.
2. Electrical Shock:
Overloaded circuits can lead to faulty connections, exposing users to the risk of electrical
shock.
3. Damage to Appliances:
The increased current flowing through an overloaded circuit can damage or even destroy
appliances connected to it.
4. Tripping Breakers:
If the circuit is overloaded beyond its capacity, it may trigger the circuit breaker, causing a
temporary or permanent loss of power
A. Hearing impairment
B. Vision impairment
C. Learning impairment
4. Computers with voice output is best
A. Hearing impairment
B. Vision impairment
C. Voice impairment
5. All the following are positive impact of mobile phone except
30 | B S 8
A. For communication
B. For entertainment
C. Distracted driving
31 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
The Tables group is located within the Insert tab in Microsoft Word and Excel. This group provides
options for inserting and working with tables, including features like creating new tables, converting text
to tables, and drawing tables.
To insert a blank table:
1. Place the insertion point where you want the table to appear.
2. Navigate to the Insert tab, then click the Table command.
3. This will open a drop-down menu that contains a grid. Hover over the grid to select the number
of columns and rows you want.
32 | B S 8
4. Click the grid to confirm your selection, and a table will appear.
5. To enter text, place the insertion point in any cell, then begin typing.
To navigate between cells, use the Tab key or arrow keys on your keyboard. If the insertion point is in
the last cell, pressing the Tab key will automatically create a new row.
To convert existing text to a table:
In the example below, each line of text contains part of a checklist, including chores and days of the
week. The items are separated by tabs. Word can convert this information into a table, using the tabs to
separate the data into columns.
1. Select the text you want to convert to a table. If you're using our practice file, you can find this
text on page 2 of the document.
33 | B S 8
4. A dialog box will appear. Choose one of the options under Separate text at. This is how Word
knows what to put into each column.
Modifying tables
You can easily change the appearance of your table once you've added one to your document. There are
several options for customization, including adding rows or columns and changing the table style.
To add a row or column:
1. Hover outside the table where you want to add a row or column. Click the plus sign that appears.
34 | B S 8
You can also right-click the table, then hover over Insert to see various row and column options.
3. A dialog box will appear. Choose Delete entire row or Delete entire column, then click OK.
35 | B S 8
2. Locate the Table Styles group, then click the More drop-down arrow to see the full list of styles.
36 | B S 8
1. Click anywhere in your table, then navigate to the Design tab.
2. Locate the Table Style Options group, then check or uncheck the desired options.
Depending on the Table Style you've chosen, certain Table Style Options may have a different effect.
You might need to experiment to get the look you want.
To apply borders to a table:
1. Select the cells you want to apply a border to.
2. Use the commands on the Design tab to choose the desired Line Style, Line Weight, and Pen
Color.
37 | B S 8
HYPERLINKS
You can create a hyperlink that links to a Word document or to an Outlook email message that includes
heading styles or bookmarks. You can also link to slides or custom shows in PowerPoint presentations
and specific cells and sheets in Excel spreadsheets.
Create a hyperlink to a location in the current document
1. Select the text or picture that you want to function as a hyperlink.
2. On the ribbon Insert tab, select Link. You can also right-click the text or picture and click
Link on the shortcut menu.
3. Under Link to, click Place in This Document.
4. In the list, select the heading (current document only), bookmark, slide, custom show, or cell
reference to which you will link.
Optional: To customize the ScreenTip that appears when you rest the pointer over the hyperlink, click
ScreenTip in the top-right corner of the Insert Hyperlink dialog box and enter your preferred text.
Create a hyperlink to a location in another document
1. Select the text or picture that you want to display as a hyperlink.
2. On the ribbon Insert tab, select Link.
You can also right-click the text or picture and click Link on the shortcut menu.
3. Under Link to, click Existing File or Web Page.
38 | B S 8
4. In the Look in box, click the down arrow, and find and select the file that you want to link to.
5. Click Bookmark, select the heading, bookmark, slide, custom show, or cell reference that you
want, and then click OK.
39 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
B8.2.1.1.2. Demonstrate how to merge, split, add formula, borders and shades
MERGE CELLS
To extend content across multiple rows or columns in a table, merge cells to create a larger cell. Or, split
cells into smaller cells.
Merge cells
1. Select the cells that you want to merge.
2. Select Layout > Merge Cells.
To unmerge cells, select the cells and select Unmerge Cells.
Note: In Excel, select the cells you want and select Merge & Center. To unmerge cells, select the cells and
select Unmerge Cells.
Split cells
1. Select the cell that you want to split.
2. Select Layout > Split Cells.
3. Enter the number of columns or rows that you want to split the selected cell into, and then select
OK.
Split a table in Word
Once you have a table in Word, you might decide to split that table into two or more tables. This
way, you can create smaller tables or add text in between two tables.
1. Put your cursor on the row that you want as the first row of your second table. In the example
table, it's on the third row.
When you click inside the table, two tabs appear on the ribbon: Table Design and Table Layout. These
tools are visible only when you are in the table, for example, when you add content to the cells.
2. On the Table Layout tab, in the Merge group, select Split Table.
The table splits into two tables.
You can split the table further, as long as there are multiple rows.
Insert a formula in a table cell
1. Select the table cell where you want your result. If the cell is not empty, delete its contents.
2. On the Table Layout tab, in the Data group, click Formula.
40 | B S 8
3. Use the Formula dialog box to create your formula. You can type in the Formula box, select a
number format from the Number Format list, and paste in functions and bookmarks using the
Paste Function and Paste Bookmark lists.
How to add a Border
To add a border to a specific cell in a Word table,
1. Select the cell(s):
Click on the cell you want to add a border to. You can also select multiple cells by dragging your
mouse.
2. Open the Table Tools Design tab:
Click anywhere inside the table to activate the Table Tools Design tab.
3. Choose a border style:
Use the Border Styles gallery to select a border style, weight, and color.
4. Apply the border:
Once you've chosen your style, click on the border you want to apply to the selected cell(s).
5. Use the Draw Borders tool:
Alternatively, you can use the Draw Borders tool to manually draw borders on the selected cells,
according to Microsoft Support.
To add the numbers… Type this in the Formula box
Above the cell =SUM(ABOVE)
Below the cell =SUM(BELOW)
Above and below the cell =SUM(ABOVE,BELOW)
Left of the cell =SUM(LEFT)
Right of the cell =SUM(RIGHT)
Left and right of the cell =SUM(LEFT,RIGHT)
Left of and above the cell =SUM(LEFT,ABOVE)
Right of and above the cell =SUM(RIGHT,ABOVE)
Left of and below the cell =SUM(LEFT,BELOW)
Right of and below the cell =SUM(RIGHT,BELOW)
41 | B S 8
The Shading menu in PowerPoint offers several additional options:
o Eyedropper Click any color on your slide to apply that color to a selected cell or cells.
o Picture Select any picture from your computer or an internet location to add it to a selected cell or
cells.
o Gradient Fill a selected cell or cells with one of several built-in gradients, or create your own custom
gradient.
o Texture Fill a selected cell or cells with one of several built-in textures, or create your own custom
texture.
o Table Background Quickly apply a color or picture to the background of an entire table.
Remove shading from a table
1. Select the cells you want to change.
o To select an entire table, click in the table, and then click the Table Move Handle in the upper-left
corner.
o To select a row, column, cell, or group of cells, click and drag your mouse pointer to highlight the cells
you want.
2. On the Table Design tab (Table tab in OneNote), click the Shading menu.
3. Click No Color.
Decreasing and increasing indentation using Bullets Under Home Tab
Changing the position of the bullets in a list, or the spacing between the bullets and text involves fine-
tuning the bullet indents. Here's how:
1. Select the bullets in the list by clicking a bullet. The text won't appear selected.
42 | B S 8
4. Finish making your adjustments, and then select OK.
Change the indent for one bullet
1. Click next to the text for the bullet you want to change.
2. On the Home tab, in the Paragraph group, select the arrow next to Multilevel List, and then select
Change List Level.
3. Select the level where you want the bullet. Each level has a different bullet style.
Add a border to some text in Word
Sometimes, putting a border around text will work better in your document than inserting a text box or
a one-cell table, to achieve a similar look.
43 | B S 8
Customize the border
1. After you've selected your text and found the basic type of border you'd like, open the Borders
menu again, and choose Borders and Shading.
2. Make your choices for style, color, and width, and then apply the choice with the buttons in the
Preview section of the dialog box. When the preview is the way you want it, select OK.
44 | B S 8
2. Go to Home > Line and Paragraph Spacing .
3. Select Line Spacing Options and choose an option in the Line spacing box.
4. Adjust the Before and After settings to change spacing between paragraphs.
5. Select OK.
45 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
B8.2.1.1.3. Demonstrate how to format a page (e.g. page adjustment, inserting header and footer, page
numbers, breaks and orientations)
PAGE ORIENTATION
Page orientation is the way that a rectangular page is displayed or printed. There are two common page
orientations: landscape and portrait. Landscape orients the page so that it is wider than it is tall, while
portrait lays it out so that it is taller than it is wide. Most documents will be portrait, which is the default
in Microsoft Word. But the landscape format can be useful in some cases, such as when a document
contains illustrations or charts too wide to fit on a portrait page.
46 | B S 8
2. Choose Portrait or Landscape.
47 | B S 8
PAGE BREAK
A Page Break is a tool that allows you to mark the ending of a page. It allows your documents to be more
cohesive and formatted properly. Otherwise, you may have the contents on one page overlapping on the
next page. And it looks very inconsistent. Therefore, page split plays a very important function. On the
page, you can find the page split using the straight line at the bottom of the page.
EXERCISE
a. Merge table
b. Split table
48 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
The Images group contains the Picture menu that allows the user to insert a picture from This Device,
Stock Images, and Online Pictures (Figure 10). The placeholder has icons for the first two options in the
picture menu. When the user clicks one of the three options on the menu, an additional window opens
to allow the user to find the picture. For instance, when the user clicks This Device, a File Explorer
window opens.
Depending on which version of PowerPoint you're using, you can insert pictures, photos, clip art, or
other images to your slide show from your computer or from the internet.
1. Select the place in the slide where you want to insert the picture.
2. On the Insert tab, in the Images group, select Pictures and then select This Device.
3. In the dialog box that opens, browse to the picture that you want to insert, select that picture,
and then select Insert.
Tip: If you want to insert multiple pictures at the same time, press and hold the Ctrl key while you select
all the pictures you want to insert.
49 | B S 8
Insert stock images on your slide
1. Select the place in the slide where you want to insert the picture.
2. On the Insert tab, in the Images group, select Pictures and then select Stock Images.
3. Type in what image you're looking for, then select the images you want and select Insert.
1. Select the place in the slide where you want to insert the picture.
2. On the Insert tab, in the Images group, select Pictures and then select Online Pictures.
Tips:
o If you see a message that "The service required to use this feature is turned off" you may
need to check your privacy settings located at File>Account>Account Privacy and then
select on Manage Settings. Check the Enable optional connected experiences box, select
OK, and then restart PowerPoint.
o If you don't have access to your privacy settings, you may need to contact your
administrator.
3. In the search box type in the image you're looking for and press enter.
4. Select all the images you want and then select Insert.
Tip: After you insert a picture, you can change its size and position. To do so, right-click the picture, and
select Format Picture. You can then use the Format Picture tools that are on the right of your slide.
If you want a picture to appear on every slide of a specific type in your PowerPoint template, add it to
the slide master.
If you want a picture to appear as background without affecting all slides in a Master, change the
background settings for the slide.
50 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
LESSON
2
HOW TO ADD A DRAWING CANVAS AND SHAPES
B8.2.2.1.2. Demonstrate how to add a drawing canvas, shapes, and also edit, format and add text to
shapes
Insert Illustrations
The user can insert shapes, icons, 3D models, SmartArt, and charts, which are all found in the
Illustrations group (Figure 11).
Shapes can be found in three locations – in the Drawing group on the Home tab (Figure 12), in the
Illustrations group on the Insert tab, and in the Insert Shape group on the Shape Format tab. Using the
Shapes button, the user has a choice between eight categories of shapes from the gallery. These include
lines, rectangles, basic shapes, equation shapes, flowcharts, starts and banners, callouts, and action
buttons.
Figure 12.
The Drawing group on the Home tab contains shapes. Click the More button (down arrow) to open the
gallery of shapes.
When the user selects a shape, a crosshair pointer allows the user to draw the shape on the slide using
the mouse or touchpad. Once the shape is created, the Shape Format tab appears on the Ribbon and
provides additional options to format the shape.
51 | B S 8
Insert Icons and 3D Models
The Illustration group includes buttons for icons and 3D models. Stock objects are available for both.
Insert SmartArt
When the user clicks on SmartArt in the Illustrations group on the Insert tab, the Choose a SmartArt
Graphic dialog box appears (Figure 13A). Categories of shapes are listed on the left side of the box.
• Click on the SmartArt button in the Illustrations group on the Insert tab. Using the Choose a
SmartArt Graphic dialog box, select a graphic and click OK. Edit the graphic by typing in the text.
• Type the text on the slide. Select the text for the SmartArt graphic. On the Home tab, click the
Convert to SmartArt Graphic button in the Paragraph group (Figure 13B). Select the graphic
desired. The text is automatically inserted into the graphic (Figure 13C).
Figure 13A.
Figure 13B.
Insert Charts
In the Illustrations group, the Chart button can be used to create a chart on the slide. The user also can
click the Insert Chart icon in the placeholder. Clicking on the Chart button or icon will cause the Insert
Chart dialog box to appear (Figure 14A). Chart types are listed on the left side of the box. Select the
chart type and the variation of the chart. Click OK.
52 | B S 8
The chart is inserted into the slide and an Excel spreadsheet appears (Figure 14B). The user can enter
the data into the spreadsheet, and the changes will appear in the chart. Columns can be deleted or
added. Labels can also be added to clarify the data.
When inserting a chart on a slide, the Chart Design tab appears on the Ribbon. By using the features and
commands on this ribbon, the user can modify the chart’s color, data, type, and other characteristics of
the chart.
In PowerPoint, a drawing canvas serves as a container for grouping and organizing shapes, lines, and
other drawing objects. It helps keep these elements together, prevents them from being affected by text
flow, and makes it easier to manipulate the entire group as one object.
• Grouping:
When you insert shapes, lines, or other drawing objects, they can become scattered and difficult to
manage if you don't use a drawing canvas. The canvas acts as a boundary, keeping these elements
together and allowing you to treat them as a single object.
• Text Flow:
Without a drawing canvas, drawing objects can be easily moved around by the text flow on the page.
The canvas helps prevent this by containing the drawing objects and allowing you to move them
independently of the text.
• Organization:
The drawing canvas provides a visual workspace for organizing and arranging your drawing elements.
You can easily move the canvas around the slide and reposition the objects inside.
• Manipulation:
Once you've created a drawing canvas and placed your objects inside, you can manipulate the entire
group as one. This means you can resize, rotate, or move the canvas and all its contents at the same
time.
53 | B S 8
In essence, the drawing canvas in PowerPoint is a helpful tool for organizing and managing complex
visual elements, making it easier to create and present diagrams, flowcharts, and other illustrations.
EXERCISE
Mention two things that can be inserted into headers and footers.
c. Page numbers
d. Page breaks
54 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
55 | B S 8
1. Select the shapes you would like to arrange and click the Arrange button. A pane will appear on
the right-hand side of your presentation.
2. At the top of the pane, you will find the different areas within which UpSlide can propose
arrangement solutions. Hover ever the options to highlight the different areas. You can add any
shape of your own in the slide to form a new area.
3. Choose the area in which you would like to arrange the shapes. Different solutions to arrange the
shapes will be proposed. Select the arrangement you would like to apply.
4. You can choose to fit your shapes on a single slide, or you can select the 'Split' option to separate
your shapes across multiple slides. After choosing a container and an arrange solution, the
current slide is duplicated as many times as necessary and the selected shapes are split across
these slides.
5. In the lower part of the pane you can change the alignment and margins of the shapes.
6. Close the Arrange pane when you are satisfied with the arrangement of your shapes. They
should be perfectly
What to Know
• Select the objects you want to group and press Ctrl-G on the keyboard.
• Select the objects, then right-click on any of them and select Group from the menu.
• Or select Home from the menu, then Arrange in the Drawing section of the ribbon—select
Group from the dropdown menu.
When creating a Microsoft PowerPoint presentation, it can be helpful to group objects. Creating groups
lets you manipulate all of them as a single group. The ribbon options described may display differently in
different versions, but the process is the same.
1. The fastest way to group objects in PowerPoint is with a keyboard shortcut. First, hold the Ctrl
key and use the mouse to select all of the objects you want to group one at a time.
56 | B S 8
2. Once all objects are selected, press Ctrl + G. All selected objects will become a single object that
you can move, nudge, rotate, or otherwise manipulate the grouped object like you would a single
object.
You can ungroup this selection by selecting the grouped object and pressing Ctrl + Shift + G on the
keyboard.
3. Use the same process above to select all objects you want to group. Then, right-click one of the
objects, select Group from the dropdown menu, and choose Group from the sub-menu. Doing
this will create a single grouped box around all selected objects.
You can use this same process to ungroup any objects you've grouped by repeating the process above
and selecting Ungroup from the submenu.
4. You can also find the option to group objects in the ribbon. To do this, hold down the Ctrl button
to select all of the objects you want to group. Then select Home from the menu and select
Arrange in the Drawing section of the ribbon—select Group from the dropdown menu.
57 | B S 8
Ungroup the objects by selecting Arrange in the Drawing section of the ribbon and then choosing
Ungroup from the dropdown menu.
5. Any time you've grouped objects, you can still edit or modify the individual objects in the group.
To do this, use the left mouse key to select the group. Then click the object inside the group to
select it. Now you can resize or move it, or right-click and use the context menu for just that
object.
6. If you've used any of the ungroup methods mentioned above to ungroup a previously created
group, you can recreate it using a simple step. Just right-click any of the objects that were part of
that previous group, select Group from the dropdown menu, and then select Regroup from the
submenu. PowerPoint remembers the last group you created with that object and will recreate
that group for you.
58 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
DESKTOP PUBLISHING
Desktop publishing software (DTP software) is a program media professionals use for outlining and
executing editorial projects. You can use this software to outline texts, move them around a canvas,
create images, design graphics, and edit documents to suit your intentions.
The biggest advantage of desktop publishing is its improved visual communication. DTP enables the
creation of Informative yet interesting documents. With desktop publishing, you can create attractive
content, such as brochures, flyers, business cards, and social media posts.
2. Cost-Effectiveness
Publish high-quality materials used to cost a lot of money for industrial printing presses and
professional designers. Instead, desktop publishing software lets you create prints that look just as good
for a much lower price.
Time is of the essence in content creation. Desktop publishing systems provide a simplified solution
with easy-to-follow features and automation. Most DTP applications include preset templates, drag-and-
drop functionality, and design grids to streamline the preparation of professional-quality documents.
Desktop publishing allows you to do this. Whether you change margins or play with the layout of
images and text, the ability to layout however you want is a huge benefit.
6. High-Quality Output
The main reason you should use desktop publishing software is its ability to produce top-notch output.
DTP tools offer high-resolution workspaces so that your images, graphics, and text are always sharp and
clear. Best of all, whether you print or share digitally, DTP ensures outstanding quality.
In the modern world, multimedia content is royalty. Seamless Integration: Desktop publishing tools
allow you to integrate different types of media, such as images, videos, and audio, into your document,
which can help to create a more dynamic and engaging experience for the reader.
Desktop publishing offers a higher level of customization and personalization. You can use DTP to create
personalized invitations, greeting cards, or even brochures for a particular customer segment.
9. Environmental Sustainability
The traditional printing process wastes paper, ink, and resources. On the other hand, desktop publishing
encourages more sustainable practices.
Finally, learning DTP enables learners to explore more opportunities in their future careers. Whether
you see yourself as a graphic designer, marketing expert, publisher, or businessperson, desktop
publishing is an important skill that can help you get ahead.
60 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
LESSON
2
CREATE AND SAVE NEW DOCUMENT
B8.2.3.1.2 Create and save a new document from a blank or pre- designed template
Publisher is a desktop publishing application that helps you create visually rich, professional-looking
publications.
• Lay out content for a print or online publication in a variety of pre-designed templates.
• Create complex projects like yearbooks, catalogs, and professional email newsletters.
1. Open Publisher.
3. Select Create.
2. Drag the cross-shaped cursor to draw a box where you want to add text.
If the text doesn't fit in the text box, make the text box bigger, or link it to another text box.
Insert a picture
61 | B S 8
You can insert a picture from your computer, or insert an online picture from OneDrive or the web.
3. Select Insert.
1. Open the Publisher publication that you want to save as a Word document.
2. Click File > Save As, and browse to the location where you want to save the Word document.
3. In the File name box, type a name for the Word document.
4. In the Save as type list, select the version of Word you want save for. Older versions of Word will
include the version number; for Word 2016, select Word Document for the current version of
Word.
5. Click Save.
62 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
LESSON
3
USE OF THE COMMANDS IN MS-PUBLISHER
B8.2.3.1.3 Demonstrate the use of the commands in MS-Publisher ribbons under each tab (Home, Page
Design, Mailings, Review, View)
Home-This is the default ribbon in Publisher and the one that you will use most of the time. You can see
that most of the basic text editing tools such as Bold, Italics, alignment, indenting, fonts, etc., are
displayed here. You alos have limited control over objects that you can click on in the publication
layout. This Ribbon is very similar to the one used in Microsoft Word.
Insert-Any time that you would like to add content to your publication then the Insert Ribbon is the one
most likey to be used. There are features here for adding pictures, shapes, calendars, borders,
hyperlinks, and more. The first time that you insert an image Publisher will ask you for the location of
the images on your system and from that point forward it will display the available images when
function is used subsequently.
Page Design-This Ribbon allows users to change the color of their publication, template, fonts, etc.,,
without having to go back to the start and creating a new publication. It is strongly advised that you
save your publication before using the features in this Ribbon and then only save again once you are
satisfied with the changes.
63 | B S 8
Mailings-Probably the least used of the Publisher Ribbons. There are tools here to enable users to mail
merge their publication and send it out, usually through MS Outlook or other email programs.
Review-Another lesser used Ribbon that as its name suggests, allows the user to review the publication,
including spelling errors, language translation, and the use of a thesaurus for words/phrases.
View-This Ribbon allows the user to view the publication while working on it in a variety of ways. There
are functions here for single or two page spreads, adding guides and rulers, cascading windows, and
more. It is a good idea to experiment with these functions to determine the easiest view for working on
your publication.
Microsoft Publisher has several unique ribbons, which includes the Drawing and Text Box Tools. There is
also the Picture Tools Ribbon which adds image editing features to the MS Publisher program. To be
successful with MS Publisher you will need to use these Ribbons to edit a wide variety of what are
termed objects in Publisher.
Picture Tools-Every time an image is clicked on in the publication layout this Ribbon will open, even
though it is not usually displayed with the standard Ribbons. With this Ribbon you can add borders to an
image, various effects, and even captions. This Ribbon also contains some basic image editing tools such
as re-coloring, corrections, and cropping. Anything beyond basic editing should be done in an actual
image editing program such as Adobe Creative Cloud Photoshop or GImp 2, then use the Publisher tools
for any final touch up or size issues. It is also important to note the Bring Forward, Send Backward, and
Align tools that are used with images. Publisher can "stack" objects, such as image on top of a colored
shape which itself is on top of a text box. In this case the position of each obkject is very important and
these tools can control their position in the stack.
64 | B S 8
Drawing Tools-Another Ribbon that only appears when certain objects are selected. This Ribbon allows
the user to select from a wide variety of shapes, borders, text wrapping, alignment, and rotation
tools. Users can add borders to text boxes, effects, color fills for shapes, and much more. It is highly
recommeded that users experiement with the various tools in this Ribbon by creating shapes, effects,
changing colors, and using the Arrange tools.
Text Box Tools-After the Home Ribbon, this is the next most popular Ribbon in Publisher. From this
Ribbon you can control the appearance of any text in your publication. The features include font, font
size, alignment, WordArt, text fills, effects, and more. Like the Drawing Tools Ribbon users should feel
free to experimet with this Ribbon before starting an actual publication to see how text works and what
is possible by using these tools.
65 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
LESSON
4
ORIENTATION AND MARGINS OF A DOCUMENT
Page size refers to the area of your publication. Paper, or sheet, size is the size of the paper used for
printing.
Any publication layout you select in Publisher includes the page size and orientation used most often for
that particular type of publication. You can change the page size and orientation and preview your
changes in the Page Setup group on the Page Design tab. You can change the paper size and orientation
and preview your changes and the relationship between the page size and the paper size in the Print tab
in the Backstage View. F
By setting the size or orientation of your page and paper separately, you can control where the page is
located on the paper and avoid misaligned prints. You can also create a bleed off the edge of the page by
printing on paper that is larger than your publication and trimming it down to the finished size, and you
can print multiple pages on a single sheet.
You cannot change the page size, paper size, or orientation of individual pages in a multiple-page
publication. To produce a multiple-page publication that contains different individual pages, you must
create separate publications for each different paper size, page size, or orientation and then assemble
the printed publication by hand.
This procedure sets the size of your publication. For example, you can use this method to select the size
of the printed publication to print a poster that measures 22 inches by 34 inches when printed—
regardless of whether your printer can handle a single large sheet of paper or whether you will print the
poster as a number of overlapping sheets of paper (called tiles).
Note: You can create publications as large as 240 inches by 240 inches.
66 | B S 8
2. In the Page Setup group, select Size and click the icon that represents the page size that you
want. For example, click Letter (Portrait) 8.5 x 11". If you don't see the size you want, either click
More Preset Page Sizes or click Create New Page Size to create a custom page size.
2. In the Page Setup group, select Size, then Create New Page Size. Under Page, enter the width
and height you want.
The printer that you use determines the paper sizes that you can print on. To check the range of paper
sizes that your printer can print on, consult the manual for your printer, or view the paper sizes that are
currently set for your printer in the Print Setup dialog box.
To print your publication on sheets of paper that match the publication page size, be sure that the page
size and the paper size are the same. If you want to print your publication on a different size of paper—
for example, to create a bleed or to print multiple pages on one sheet—change only the paper size.
2. In the Print Setup dialog box, under Paper, select the size of paper that you want from the Size
list.
You can change the orientation of your page to and from Portrait and Landscape.
2. In the Page Setup group, select the Orientation drop-down menu and select either Portrait or
Landscape.
67 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
LESSON
5
ADD AND MODIFY PICTURES
To add and modify pictures in Publisher, navigate to the "Insert" tab, then "Pictures" and choose from
your device, online sources, or stock images. You can then resize, move, and format the picture using the
"Format Picture" options on the Ribbon.
Adding Pictures:
From your device: Go to "Insert > Pictures > This Device" and select the desired picture.
From online sources: Choose "Insert > Pictures > Online Pictures" and search using Bing.
From stock images: Select "Insert > Pictures > Stock Images" for a curated collection of high-quality
visuals.
Modifying Pictures:
Resizing: Select the picture and drag a corner handle to resize it.
Wrapping text: Choose a text wrapping option from the "Format Picture" options to control how text
interacts with the picture.
Formatting: Use the "Format Picture" tools to adjust brightness, contrast, color, crop, and more.
Cropping: Select the picture, and then use the "Crop" tool in the "Format Picture" tab to remove
unwanted parts of the image.
Changing the background: Use the "Format Picture" tools to set a different fill color or pattern for the
picture's background.
Adding a border: You can add a border to the picture by selecting it and then using the "Format Picture"
tab.
Applying a style: Choose from a range of pre-designed picture styles to enhance the look of your image.
Add text to your publication by inserting a text box first. Most templates contain text boxes you can fill
in, but you can also add your own text boxes.
1. Click Home > Draw Text Box, and drag the cross shaped cursor to draw a box where you want
text.
68 | B S 8
2. Type text in the text box.
If the text you type is too long for the text box, you can make the text box bigger, or link it to another
text box.
You can link text boxes so that text flows from one box to another.
1. When a text box has too much text, a little box with ellipses appears in the lower right of the text
box.
69 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
LESSON
6
CREATE AND PRESENT A PUBLISHER DOCUMENT
B9.2.3.1.7 Create and present a Publisher document (flyer, advertisement, invitation cards, business
cards)
Here are the step-by-step instructions for setting up your flyer artwork for print using Microsoft
Publisher:
1. Choose a template:
Start by choosing a template for your flyer. This will help you get the right layout and design elements in
place. Go to the "File" menu and select "New," then choose "Flyer" from the list of available templates.
Next, add your content to the flyer. This might include text, images, and graphics. Be sure to include all
the information you want to convey, such as the date, location, and details of your event or promotion.
Use the formatting tools to customize the font, color, and size of your text.
Once you've finished designing your flyer, it's time to save and export it for printing. Go to the "File"
menu and select "Save As." Choose a location to save your file, and then select "PDF" as the file type.
This will create a high-quality PDF of your design that's ready for printing.
Now that you have a print-ready file of your flyer, it's time to get it printed. If you have a printer at
home, you can print your flyer yourself. However, for the best quality and professional finish, we
recommend using a print service like instantprint.co.uk. We offer a wide range of flyer printing options,
including different sizes, paper types, and finishing options.
70 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
Some of the most important formulas worth knowing in Excel are basic functions: SUM(), MIN(), MAX(),
AVERAGE(), COUNT(), POWER(), CEILING(), FLOOR(), CONCAT(), TRIM(), REPLACE(), SUBSTITUTE(), LEFT(),
RIGHT(), MID(), UPPER(), LOWER(), PROPER(), NOW(), TODAY(), DATEDIF(), VLOOKUP(), HLOOKUP(), and
IF(). See below for guidance on each of these.
1. Efficiency: They automate repetitive tasks, saving time and reducing manual errors.
2. Data analysis: Excel's range of formulas enables sophisticated data analysis, crucial for informed
decision-making.
3. Accuracy: Formulas ensure consistent and accurate results, essential in fields like finance and
accounting.
4. Data manipulation: They allow for efficient sorting, filtering, and manipulation of large datasets.
5. Accessibility: Excel provides a user-friendly platform, making complex data analysis accessible to
non-technical users.
6. Versatility: Widely used across various industries, proficiency in Excel formulas enhances
employability and career advancement.
7. Customization: Excel offers customizable formula options to meet specific data handling needs.
Functions
A function is a predefined formula that performs calculations using specific values in a particular order.
All spreadsheet programs include common functions that can be used for quickly finding the sum,
average, count, maximum value, and minimum value for a range of cells. In order to use functions
correctly, you'll need to understand the different parts of a function and how to create arguments to
calculate values and cell references.
71 | B S 8
In order to work correctly, a function must be written a specific way, which is called the syntax. The basic
syntax for a function is an equals sign (=), the function name (SUM, for example), and one or more
arguments. Arguments contain the information you want to calculate. The function in the example
below would add the values of the cell range A1:A20.
Arguments can refer to both individual cells and cell ranges and must be enclosed within parentheses.
You can include one argument or multiple arguments, depending on the syntax required for the
function.
For example, the function =AVERAGE(B1:B9) would calculate the average of the values in the cell range
B1:B9. This function contains only one argument.
Multiple arguments must be separated by a comma. For example, the function =SUM(A1:A3, C1:C2, E2)
will add the values of all cells in the three arguments.
Let's practice!
Question 1 of 1
=SUM(A2:A8,E2:E8) SUM(A2:A8,E2:E8)=
SUM=(A2:A8,E2:E8) =A2:A8(SUM)E2:E8
72 | B S 8
Using functions
There are a variety of functions. Here are some of the most common functions you'll use:
• SUM: This function adds all the values of the cells in the argument.
• AVERAGE: This function determines the average of the values included in the argument. It
calculates the sum of the cells and then divides that value by the number of cells in the
argument.
• COUNT: This function counts the number of cells with numerical data in the argument. This
function is useful for quickly counting items in a cell range.
• MAX: This function determines the highest cell value included in the argument.
• MIN: This function determines the lowest cell value included in the argument.
To use a function:
In our example below, we'll use a basic function to calculate the average price per unit for a list of
recently ordered items using the AVERAGE function.
1. Select the cell that will contain the function. In our example, we'll select cell C11.
2. Type the equals sign (=) and enter the desired function name. In our example, we'll type
=AVERAGE.
73 | B S 8
3. Enter the cell range for the argument inside parentheses. In our example, we'll type (C3:C10).
This formula will add the values of cells C3:C10 and then divide that value by the total number of
cells in the range to determine the average.
4. Press Enter on your keyboard. The function will be calculated, and the result will appear in the
cell. In our example, the average price per unit of items ordered was $15.93.
Your spreadsheet will not always tell you if your function contains an error, so it's up to you to check all
of your functions. To learn how to do this, check out the Double-Check Your Formulas lesson.
74 | B S 8
Let's practice!
Question 1 of 1
75 | B S 8
STRAND 2 PRODUCTIVITY SOFTWARE
LESSON
2
HOW TO COPY FORMULAS AND REFERENCES
77 | B S 8
Example: You close a $100,000 deal. However, the cost of that business was $10,000. The gross profit
margin is $90,000. If you receive a 10% commission, that would equal $9,000 in commission.
Note: If this were a “straight” commission model, you’d earn $10,000 in commission (10% of $100,000).
To calculate gross profit commission in a spreadsheet, you can use the following formula:
=(SUM(A1:A10)-SUM(B1:B10))*C1
In this formula, A1:A10 is the range of cells containing the sales amounts, B1:B10 is the range of cells
containing the cost of goods sold, and C1 is the commission percentage.
So, if you want to calculate a 10% commission on the gross profit of sales in the range A1:A10, with the
cost of goods sold in the range B1:B10, you could use the following formula:
=(SUM(A1:A10)-SUM(B1:B10))*0.1
This formula will first calculate the gross profit for each sale in the range A1:A10, by subtracting the cost
of goods sold from the sales amount. It will then multiply the gross profit by the commission percentage
to calculate the commission for each sale. The SUM function is then used to add up the commissions for
all the sales in the range to give the total commission earned.
78 | B S 8
STRAND 3 COMMUNICATION NETWORKS
LESSON
1
SUB-STRAND 1 COMPUTER NETWORKS
• OSI Model
• TCP/IP Model
1. Modularity: As the tasks are divided into different sections, it makes understanding and
maintenance of the system more simplified.
2. Interoperability: Layers follow standard protocols and enable devices from different
organizations to communicate efficiently.
3. Scalability: New technologies or protocols can be integrated without affecting the entire system.
4. Troubleshooting: Problems can be isolated to specific layers and each layer can be analyzed and
tested individually.
OSI Model
Open System Interconnect is an open standard for all communication systems. OSI model is
established by International Standard Organization (ISO). This model has seven layers:
79 | B S 8
• Application Layer: This layer is responsible for providing interface to the application user. This
layer encompasses protocols which directly interact with the user.
• Presentation Layer: This layer defines how data in the native format of remote host should be
presented in the native format of host.
• Session Layer: This layer maintains sessions between remote hosts. For example, once
user/password authentication is done, the remote host maintains this session for a while and
does not ask for authentication again in that time span.
• Transport Layer: This layer is responsible for end-to-end delivery between hosts.
• Network Layer: This layer is responsible for address assignment and uniquely addressing hosts in
a network.
• Data Link Layer: This layer is responsible for reading and writing data from and onto the line. Link
errors are detected at this layer.
• Physical Layer: This layer defines the hardware, cabling wiring, power output, pulse rate etc.
The lowest layer of the OSI reference model is the Physical Layer. It is responsible for the actual physical
connection between the devices. The physical layer contains information in the form of bits. Physical
Layer is responsible for transmitting individual bits from one node to the next. When receiving data, this
layer will get the signal received and convert it into 0s and 1s and send them to the Data Link layer,
which will put the frame back together. Common physical layer devices are Hub, Repeater, Modem, and
Cables.
Physical Layer
• Bit Synchronization: The physical layer provides the synchronization of the bits by providing a
clock. This clock controls both sender and receiver thus providing synchronization at the bit level.
• Bit Rate Control: The Physical layer also defines the transmission rate i.e. the number of bits sent
per second.
• Physical Topologies: Physical layer specifies how the different, devices/nodes are arranged in a
network i.e. bus topology, star topology, or mesh topology.
• Transmission Mode: Physical layer also defines how the data flows between the two connected
devices. The various transmission modes possible are Simplex, half-duplex and full duplex.
The data link layer is responsible for the node-to-node delivery of the message. The main function of
this layer is to make sure data transfer is error-free from one node to another, over the physical layer.
When a packet arrives in a network, it is the responsibility of the DLL to transmit it to the Host using its
80 | B S 8
MAC address. Packet in the Data Link layer is referred to as Frame. Switches and Bridges are common
Data Link Layer devices.
The packet received from the Network layer is further divided into frames depending on the frame size
of the NIC (Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the
header.
The Receiver’s MAC address is obtained by placing an ARP (Address Resolution Protocol) request onto
the wire asking, "Who has that IP address?" and the destination host will reply with its MAC address.
• Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a
set of bits that are meaningful to the receiver. This can be accomplished by attaching special bit
patterns to the beginning and end of the frame.
• Physical Addressing: After creating frames, the Data link layer adds physical addresses (MAC
addresses) of the sender and/or receiver in the header of each frame.
• Error Control: The data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
• Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus, flow control coordinates the amount of data that can be sent before receiving an
acknowledgment.
• Access Control: When a single communication channel is shared by multiple devices, the MAC
sub-layer of the data link layer helps to determine which device has control over the channel at a
given time.
The network layer works for the transmission of data from one host to the other located in different
networks. It also takes care of packet routing i.e. selection of the shortest path to transmit the packet,
from the number of routes available. The sender and receiver's IP address are placed in the header by
the network layer. Segment in the Network layer is referred to as Packet. Network layer is implemented
by networking devices such as routers and switches.
• Routing: The network layer protocols determine which route is suitable from source to
destination. This function of the network layer is known as routing.
• Logical Addressing: To identify each device inter-network uniquely, the network layer defines an
addressing scheme. The sender and receiver’s IP addresses are placed in the header by the
network layer. Such an address distinguishes each device uniquely and universally.
81 | B S 8
The transport layer provides services to the application layer and takes services from the network layer.
The data in the transport layer is referred to as Segments. It is responsible for the end-to-end delivery of
the complete message. The transport layer also provides the acknowledgment of the successful data
transmission and re-transmits the data if an error is found. Protocols used in Transport Layer are TCP,
UDP NetBIOS, PPTP.
At the sender's side, the transport layer receives the formatted data from the upper layers, performs
Segmentation, and also implements Flow and error control to ensure proper data transmission. It also
adds Source and Destination port number in its header and forwards the segmented data to the
Network Layer.
• Generally, this destination port number is configured, either by default or manually. For example,
when a web application requests a web server, it typically uses port number 80, because this is
the default port assigned to web applications. Many applications have default ports assigned.
At the Receiver’s side, Transport Layer reads the port number from its header and forwards the Data
which it has received to the respective application. It also performs sequencing and reassembling of the
segmented data.
• Segmentation and Reassembly: This layer accepts the message from the (session) layer and
breaks the message into smaller units. Each of the segments produced has a header associated
with it. The transport layer at the destination station reassembles the message.
• Service Point Addressing: To deliver the message to the correct process, the transport layer
header includes a type of address called service point address or port address. Thus, by
specifying this address, the transport layer makes sure that the message is delivered to the
correct process.
• Connection-Oriented Service
• Connectionless Service
Session Layer in the OSI Model is responsible for the establishment of connections, management of
connections, terminations of sessions between two devices. It also provides authentication and security.
Protocols used in the Session Layer are NetBIOS, PPTP.
• Session Establishment, Maintenance, and Termination: The layer allows the two processes to
establish, use, and terminate a connection.
• Synchronization: This layer allows a process to add checkpoints that are considered
synchronization points in the data. These synchronization points help to identify the error so that
the data is re-synchronized properly, and ends of the messages are not cut prematurely, and data
loss is avoided.
82 | B S 8
• Dialog Controller: The session layer allows two systems to start communication with each other
in half-duplex or full duplex.
Example
Let us consider a scenario where a user wants to send a message through some Messenger application
running in their browser. The “Messenger” here acts as the application layer which provides the user
with an interface to create the data. This message or so-called Data is compressed, optionally encrypted
(if the data is sensitive), and converted into bits (0’s and 1’s) so that it can be transmitted.
The presentation layer is also called the Translation layer. The data from the application layer is
extracted here and manipulated as per the required format to transmit over the network. Protocols used
in the Presentation Layer are TLS/SSL (Transport Layer Security / Secure Sockets Layer).JPEG, MPEG, GIF,
are standards or formats used for encoding data, which is part of the presentation layer’s role.
• Encryption/ Decryption: Data encryption translates the data into another form or code. The
encrypted data is known as the ciphertext, and the decrypted data is known as plain text. A key
value is used for encrypting as well as decrypting data.
• Compression: Reduces the number of bits that need to be transmitted on the network.
At the very top of the OSI Reference Model stack of layers, we find the Application layer which is
implemented by the network applications. These applications produce the data to be transferred over
the network. This layer also serves as a window for the application services to access the network and
for displaying the received information to the user. Protocols used in the Application layer are SMTP, FTP,
DNS, etc.
Application Layer
83 | B S 8
• File Transfer Access and Management (FTAM): This application allows a user to access files in a
remote host, retrieve files in a remote host, and manage or control files from a remote computer.
• Directory Services: This application provides distributed database sources and access for global
information about various objects and services.
When we transfer information from one device to another, it travels through 7 layers of OSI model. First
data travels down through 7 layers from the sender's end and then climbs back 7 layers on the receiver's
end.
• Data Link Layer: Packets are framed and sent to the next device.
• Physical Layer: Frames are converted into bits and transmitted physically.
Each layer adds specific information to ensure the data reaches its destination correctly, and these steps
are reversed upon arrival.
We can understand how data flows through OSI Model with the help of an example mentioned below.
Step 1: Person A interacts with e-mail application like Gmail, outlook, etc. Writes his email to send. (This
happens at Application Layer).
Step 2: At Presentation Layer, Mail application prepares for data transmission like encrypting data and
formatting it for transmission.
Step 3: At Session Layer, there is a connection established between the sender and receiver on the
internet.
Step 4: At Transport Layer, Email data is broken into smaller segments. It adds sequence number and
error-checking information to maintain the reliability of the information.
Step 5: At Network Layer, addressing of packets is done in order to find the best route for transfer.
Step 6: At Data Link Layer, data packets are encapsulated into frames, then MAC address is added for
local devices and then it checks for error using error detection.
84 | B S 8
Step 7: At Physical Layer, Frames are transmitted in the form of electrical/ optical signals over a physical
network medium like ethernet cable or WiFi.
After the email reaches the receiver i.e. Person B, the process will reverse and decrypt the e-mail
content. At last, the email will be shown on Person B email client.
The OSI Model defines the communication of a computing system into 7 different layers. Its advantages
include:
• It divides network communication into 7 layers which makes it easier to understand and
troubleshoot.
• It standardizes network communications, as each layer has fixed functions and protocols.
• It is easier to improve with advancements as each layer can get updates separately.
• The OSI Model has seven layers, which can be complicated and hard to understand for beginners.
• In real-life networking, most systems use a simpler model called the Internet protocol suite
(TCP/IP), so the OSI Model is not always directly applicable.
• Each layer in the OSI Model adds its own set of rules and operations, which can make the process
more time-consuming and less efficient.
• The OSI Model is more of a theoretical framework, meaning it's great for understanding concepts
but not always practical for implementation.
85 | B S 8
STRAND 3 COMMUNICATION NETWORK
LESSON
2
INTERNET
B8.3.1.1.2 Describe the Internet, world wide web (www) and Internet Protocol (IP) addresses
INTERNET
The internet, sometimes simply called the net, is a worldwide system of interconnected computer
networks and electronic devices that communicate with each other using an established set of
protocols.
The World Wide Web (WWW), often called the Web, is a system of interconnected webpages and
information that you can access using the Internet. It was created to help people share and find
information easily, using links that connect different pages together. The Web allows us to browse
websites, watch videos, shop online, and connect with others around the world through our computers
and phones.
In general, the internet can be used to communicate across large or small distances, share information
from any place in the world, and access information or answers to almost any question in moments.
Some specific examples of how the internet is used include the following:
• Email and other forms of communication, such as Internet Relay Chat, internet telephony, instant
messaging and video conferencing.
• Education and self-improvement through access to online degree programs, courses and
workshops.
• Searching for jobs -- both employers and applicants use the internet to post open positions,
apply for jobs and recruit individuals found on social networking sites such as LinkedIn.
Internet is a global network of networks. WWW stands for World wide Web.
Internet is a means of connecting a computer to any World Wide Web which is a collection of
other computer anywhere in the world. information which is accessed via the Internet.
86 | B S 8
INTERNET WWW
At some advanced level, to understand we can think At some advanced level, to understand we can
of the Internet as hardware. think of the WWW as software.
Each network running TCP/IP must have a unique network number, and every machine on it must have a
unique IP address. It is important to understand how IP addresses are constructed before you register
your network and obtain its network number.
The IP address is a 32-bit number that uniquely identifies a network interface on a machine. An IP
address is typically written in decimal digits, formatted as four 8-bit fields separated by periods. Each 8-
bit field represents a byte of the IP address. This form of representing the bytes of an IP address is often
referred to as the dotted-decimal format.
The bytes of the IP address are further classified into two parts: the network part and the host part.
Figure 3-1 shows the component parts of a typical IP address, 129.144.50.56.
Network Part
This part specifies the unique number assigned to your network. It also identifies the class of network
assigned. In Figure 3-1, the network part takes up two bytes of the IP address.
Host Part
This is the part of the IP address that you assign to each host. It uniquely identifies this machine on your
network. Note that for each host on your network, the network part of the address will be the same, but
the host part must be different.
87 | B S 8
Subnet Number (Optional)
Local networks with large numbers of hosts are sometimes divided into subnets. If you choose to divide
your network into subnets, you need to assign a subnet number for the subnet. You can maximize the
efficiency of the IP address space by using some of the bits from the host number part of the IP address
as a network identifier. When used as a network identifier, the specified part of the address becomes
the subnet number.
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
In IPv4 Packet flow identification is not In IPv6 packet flow identification are Available and uses
available the flow label field in the header
It has a broadcast Message Transmission In IPv6 multicast and anycast message transmission
Scheme scheme is available
IPv4 has a header of 20-60 bytes. IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
88 | B S 8
IPv4 IPv6
Example of IPv6:
Example of IPv4: 66.94.29.13
2001:0000:3238:DFE1:0063:0000:0000:FEFB
Network Classes
The first step in planning for IP addressing on your network is to determine which network class is
appropriate for your network. After you have done this, you can take the crucial second step: obtain the
network number from the InterNIC addressing authority.
Currently there are three classes of TCP/IP networks. Each class uses the 32-bit IP address space
differently, providing more or fewer bits for the network part of the address. These classes are class A,
class B, and class C.
A class A network number uses the first eight bits of the IP address as its "network part." The remaining
24 bits comprise the host part of the IP address, as illustrated in Figure 3-2 below.
The values assigned to the first byte of class A network numbers fall within the range 0-127. Consider
the IP address 75.4.10.4. The value 75 in the first byte indicates that the host is on a class A network.
The remaining bytes, 4.10.4, establish the host address. The InterNIC assigns only the first byte of a class
A number. Use of the remaining three bytes is left to the discretion of the owner of the network number.
Only 127 class A networks can exist. Each one of these numbers can accommodate up to 16,777,214
hosts.
A class B network number uses 16 bits for the network number and 16 bits for host numbers. The first
byte of a class B network number is in the range 128-191. In the number 129.144.50.56, the first two
bytes, 129.144, are assigned by the InterNIC, and comprise the network address. The last two bytes,
50.56, make up the host address, and are assigned at the discretion of the owner of the network
number. Figure 3-3 graphically illustrates a class B address.
89 | B S 8
Class B is typically assigned to organizations with many hosts on their networks.
Class C network numbers use 24 bits for the network number and 8 bits for host numbers. Class C
network numbers are appropriate for networks with few hosts--the maximum being 254. A class C
network number occupies the first three bytes of an IP address. Only the fourth byte is assigned at the
discretion of the network owners. Figure 3-4 graphically represents the bytes in a class C address.
The first byte of a class C network number covers the range 192-223. The second and third each cover
the range 1- 255. A typical class C address might be 192.5.2.5. The first three bytes, 192.5.2, form the
network number. The final byte in this example, 5, is the host number.
The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online
through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol
(IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.
Each device connected to the Internet has a unique IP address which other machines use to find the
device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in
IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in
IPv6).
The process of DNS resolution involves converting a hostname (such as www.example.com) into a
computer-friendly IP address (such as 192.168.1.1). An IP address is given to each device on the
Internet, and that address is necessary to find the appropriate Internet device - like a street address is
90 | B S 8
used to find a particular home. When a user wants to load a webpage, a translation must occur between
what a user types into their web browser (example.com) and the machine-friendly address necessary to
locate the example.com webpage.
In order to understand the process behind the DNS resolution, it’s important to learn about the different
hardware components a DNS query must pass between. For the web browser, the DNS lookup occurs
"behind the scenes" and requires no interaction from the user’s computer apart from the initial request.
Report
• DNS recursor - The recursor can be thought of as a librarian who is asked to go find a particular
book somewhere in a library. The DNS recursor is a server designed to receive queries from client
machines through applications such as web browsers. Typically the recursor is then responsible
for making additional requests in order to satisfy the client’s DNS query.
• Root nameserver - The root server is the first step in translating (resolving) human readable host
names into IP addresses. It can be thought of like an index in a library that points to different
racks of books - typically it serves as a reference to other more specific locations.
• TLD nameserver - The top level domain server (TLD) can be thought of as a specific rack of books
in a library. This nameserver is the next step in the search for a specific IP address, and it hosts
the last portion of a hostname (In example.com, the TLD server is “com”).
1. A user types ‘example.com’ into a web browser and the query travels into the Internet and is
received by a DNS recursive resolver.
3. The root server then responds to the resolver with the address of a Top Level Domain (TLD) DNS
server (such as .com or .net), which stores the information for its domains. When searching for
example.com, our request is pointed toward the .com TLD.
5. The TLD server then responds with the IP address of the domain’s nameserver, example.com.
7. The IP address for example.com is then returned to the resolver from the nameserver.
8. The DNS resolver then responds to the web browser with the IP address of the domain
requested initially.
91 | B S 8
Once the 8 steps of the DNS lookup have returned the IP address for example.com, the browser is able
to make the request for the web page:
10. The server at that IP returns the webpage to be rendered in the browser (step 10).
92 | B S 8
STRAND 3 COMMUNICATION NETWORKS
LESSON
1
SUB-STRAND 2: INTERNET AND SOCIAL MEDIA
SOCIAL MEDIA
Social media refers to online platforms where users can share information and connect with virtual
communities through text, video, photos, and other content. As of 2024, social media had more than
five billion global users, which is equal to more than 62% of the world population.1
This includes apps or websites designed for messaging and chat, social platforms (like Facebook,
Instagram, and TikTok), and community forums, such as Reddit and Discord.
The average social media user spends two hours and 21 minutes each day on social media, visiting an
average of 6.8 different social media platforms each month. These were the most widely used social
media providers as of February 2025, according to DataReportal:22
Launched in 2004, Facebook remains the world’s most used and biggest social media platform, with
almost 2.9 billion Facebook users around the globe. Users can create a profile, exchange content, and
connect with people.
93 | B S 8
Facebook Pages are the most popular platforms for businesses to promote their products and services.
Users can create communities and start discussions about their company, a product, or another subject
using Facebook Groups. Paid ads allow businesses to target specific audiences.
YouTube
YouTube is a video-sharing platform that was launched in 2005 and has over 2.5 billion users currently.
Users may start a channel where they post videos about themselves or their business, its services, and
procedures.
Businesses can run paid ads and use the YouTube Discovery Ads feature to reach the target audience.
The platform also launched YouTube Shorts in 2021 to compete with TikTok.
Founded in 2009, WhatsApp has over 2 billion active users every month, making it the most popular
messaging app. Though mainly launched for texting purposes, many businesses have started to use it to
promote their products or services.
WhatsApp Business and WhatsApp Business API apps allow users to build a branded profile and add a
catalog, website URLs, store locations, and promotional information. Businesses can even use a chatbot
to automate conversations and do other things. The platform allows users to voice call or video call their
friends, family, and other contacts.
Launched in 2010, Instagram has over 1 billion active users. Users can share pictures, videos, reels,
stories, and IGTV content from their profiles. Instagram also gives options for business profiles or
professional accounts.
It also serves as an online store for users to market their products. The business profile provides the
insights and analytics of the account.
TikTok
Founded in 2016 after evolving from 2014’s Musical.ly, TikTok is a short-form video-sharing platform
with over 1 billion active users. It allows users to make short videos of about 15 seconds to three
minutes.
94 | B S 8
TikTok offers a vast music library, and it lets users lip-sync and use music, filters, and other effects on
their videos. Companies can plan TikTok videos for the promotion of their products, with Brand
Takeover ads and branded hashtags.
Snapchat
Launched in 2016, Snapchat has over 538 million users. It lets users share pictures and stories with other
users for a short period of time.
Snapchat was the first app to introduce a disappearing feature. Other features include adding filters to
photos, using AR-based lenses, and sharing live locations on Snap Map.
Launched in 2003, Twitter now has over 200 million users and was almost bought by Tesla founder and
billionaire, Elon Musk. Twitter lets users share their thoughts in a short text message, or “tweet,” of up to
280 characters.
Users can also communicate with others and engage in conversations via threads. Customers frequently
use Twitter to reach out to brands and get their queries resolved.
95 | B S 8
STRAND 3 COMMUNICATION NETWORKS
Types of Attacks
1. Fabrication
2. Interception
3. Interruption
4. Modification
Fabrication
As stated above, fabrication is one of the four broad-based categories used to classify attacks and
threats. A fabrication attack creates illegitimate information, processes, communications or other data
within a system.
Often, fabricated data is inserted right alongside authentic data. When a known system is compromised,
attackers may use fabrication techniques to gain trust, create a false trail, collect data for illicit use, spawn
malicious or extraneous processes. In addition, fabricated data may reduce confidence in genuine data
with the affected system.
Figure 1
: Fabrication Attack.
• SQL Injection
• Route Injection
96 | B S 8
• User / Credential Counterfeiting
• Log / Audit Trail Falsification
• Email Spoofing
Interception
Figure 1
: Interception Attacks.
• Eavesdropping on communication.
• Wiretapping telecommunications networks.
• Illicit copying of files or programs.
• Obtaining copies of messages for later replay.
• Packet sniffing and key logging to capture data from a computer system or network.
• Using Encryption - SSL, VPN, 3DES, BPI+ are deployed to encrypts the flow of information
from source to destination so that if someone is able to snoop in on the flow of traffic, all the
person will see is ciphered text.
• Traffic Padding - It is a function that produces cipher text output continuously, even in the
absence of plain text. A continuous random data stream is generated. When plaintext is available,
97 | B S 8
it is encrypted and transmitted. When input plaintext is not present, the random data are encrypted
and transmitted. This makes it impossible for an attacker to distinguish between tree data flow and
noise and therefore impossible to deduce the amount of traffic.
Interruption
In an interruption attack, a network service is made degraded or unavailable for legitimate use. They are
the attacks against the availability of the network.
Figure 1
: Interruption Attack.
• Use Firewalls - Firewalls have simple rules such as to allow or deny protocols, ports or IP
addresses. Modern stateful firewalls like Check Point FW1 NGX and Cisco PIX have a built-in
capability to differentiate good traffic from DoS attack traffic.
• Keeping backups of system configuration data properly.
• Replication.
Modification
Modification is an attack against the integrity of the information. Basically there is three types of
modifications.
• Change: Change existing information. The information is already existed but incorrect. Change
attacks can be targeted at sensitive information or public information.
• Insertion: When an insertion attack is made, information that did not previously exist is added.
This attack may be mounted against historical information or information that is yet to be acted
upon.
• Deletion : Removal of existing information.
98 | B S 8
Figure 1
: Modification Attack.
• Introduction of intrusion detection systems (IDS) which could look for different signatures which
represent an attack.
• Using Encryption mechanisms
• Traffic padding
• Keeping backups
• Use messaging techniques such as checksums, sequence numbers, digests, authentication codes
99 | B S 8
STRAND 3 COMMUNICATION NETWORKS
LESSON
2
PROTECTION METHODS AGAINST DATA THREATS
Authentication is the process of verifying a user or device before allowing access to a system or
resources.
In other words, authentication means confirming that a user is who they say they are. This ensures only
those with authorized credentials gain access to secure systems. When a user attempts to access
information on a network, they must provide secret credentials to prove their identity. Authentication
allows you to grant access to the right user at the right time with confidence. But this doesn’t occur in
isolation.
2. Authentication—Prove it.
Authorization
Identification requires a user ID like a username. But without identity authentication, there’s no way to
know if that username actually belongs to them. That’s where authentication comes in—pairing the
username with a password or other verifying credentials.
Authorization is the process of giving a user permission to access a physical location or information-
based resource (e.g., a document, database, application, or website).
However, permission is a broad term. A user may pass authentication procedures and be granted access
to a system, but that does not mean they can access all the components of an application or online
service because specific permissions can be defined by the organization that allowed them access.
Permissions are what a user is able to see or do on a website or inside an application. Without these
specific permissions, every user would have access to the same information or features.
As such, permissions and restrictions, and their proper administration, are critical to an organization's
security for several reasons. This is because they:
100 | B S 8
Encryption
Data encryption is a security method that translates data into a code, or ciphertext, that can only be
read by people with access to a secret key or password. The unencrypted data is called plaintext. The
science of encrypting and decrypting information is known as cryptography.
Data encryption protects data from being stolen, changed, or compromised. However, to ensure data
remains protected, the decryption key must be kept secret and protected against unauthorized access.
All data can be encrypted, including data at rest (stored in a fixed location such as a hard drive) or data
in transit (for example, being transferred over a network).
• Symmetric encryption uses the same key for encryption and decryption
• Asymmetric encryption has a private key held by the owner of the data, and a public key granted
to the recipient of the data.
Asymmetric encryption is considered more secure, because it does not require sharing the private key.
This is part of our series of articles about data storage.
Decryption
Decryption is a process through which the already encrypted data or ciphertext is returned to its
readable form, usually referred to as plaintext. A piece of data becomes unreadable if it is encrypted
since it undergoes some special algorithm with a unique key. Thus, it will become undecipherable for
any person who does not possess the right decryption key. The process of decryption, hence, involves
the application of the right decryption algorithm together with the appropriate key of decryption so that
the encryption is reversed and an original form is restored from the given data
101 | B S 8
STRAND 3 COMMUNICATION NETWORKS
LESSON
1
SUB STRAND 4:WEB TECHNOLOGY
Keyword Searching
Use a keyword search to search all parts of a source for the words you enter in the search box. This type
of searching uses "natural language" and is one you're probably already familiar with--you simply enter
words or phrases into a search box that you think are relevant to your topic. Click on the "Keyword
Searching" page for more information.
Boolean Searching
Boolean searching is a search technique which uses Boolean operators to help bring back search results
faster and with more precision. The most common Boolean operators are AND, OR, and NOT. These are
logic-based words that help search engines narrow down or broaden search results. Click on the
"Boolean Searching" page for more information.
Subject Searching
Within a database or online catalog, subject searching allows you to search by categories, which are
found in the subject field of an item record. Subject terms are pre-defined and used for all items within a
database or source that relate to that term. Click on the "Subject Searching" page for more information.
Limiters
Many databases allow users to limit their search results by certain criteria. These options are often
located somewhere on the database search page or results list as drop down menus or check boxes.
Some common and useful limiters include date of publication, material type, full text, and more. Click on
the "Limiters" page for more information.
Phrase Searching
When you search for a phrase like corporate social responsibility the search engine will bring back any
results that have those words in them. However, if you put quotation marks around the
phrase, "corporate social responsibility", the search engine will only bring back results that have all
those words, exactly in the order you have them. This can also be useful when you're searching for the
title of a book or other resource. Click on the "Phrase Searching" page for more information.
102 | B S 8
Using References/Works Cited Lists
Another good search tip is to let one good book or article lead you to others. Scholarly publications
almost always have bibliographies or lists of works cited. These are lists of the resources the author used
to write the book or article you've found. Explore these! If the original source is useful to you, works
used by the author may be valuable, too. Click on the "Using References/Works Cited Lists" page for
more information.
103 | B S 8
STRAND 3 COMMUNICATION NETWORKS
LESSON
2
THE USE OF MORE THAN ONE SEARCH ENGINE
SEARCH ENGINES
A search engine is a software program or a system designed to help users find information stored on
the internet or within a specific database.
Google is the most widely used search engine globally. It is known for its powerful algorithms, vast index
of web pages, and AI capabilities. And it constantly tweaks its search algorithms to deliver relevant
results.
Key features:
• Featured snippets: These highlighted boxes at the top of the search results provide a quick
answer to your query, often from a high-ranking website.
104 | B S 8
• Image and video carousels: This feature displays relevant images and videos in a horizontal
carousel, making it easier to find visual content related to your query.
• AI Overviews: By using advanced AI technology, Google analyzes your search query and provides
a quick, informative summary directly within the search results page.
• Local results: For searches with local intent, Google shows a map and a list of nearby businesses
or services.
• Google Lens: It’s a visual search feature. By simply snapping a picture of an object or uploading
an existing image, you can find similar pictures or products for shopping.
• Instant answers: Google provides immediate answers to certain types of queries, like
calculations, weather, sports scores, and currency conversions, directly at the top of the search
results page.
• Integrations with Google services: You can easily access and manage your Gmail, Google Drive,
Google Calendar, and Google Photos directly from the search results. For example, if you type
the name of a document saved in your Google Drive, it can appear right in the search results,
saving you the hassle of navigating to Drive manually.
• Google’s search operators: By using special symbols and combinations, users can filter search
results and find specific information more efficiently. Search operators are especially useful for
researchers, marketers, SEOs, and anyone who needs to sift through large volumes of
information on the web.
• Search personalization: Google customizes search results based on your location, search history,
and trending topics. While this can enhance the user experience, some people find it distracting
or irrelevant. If you prefer a cleaner search experience, you can learn how to turn off trending
searches.
Bing
Bing, developed by Microsoft, offers a powerful search experience with its own unique flair. Beyond the
standard web search, Bing boasts Microsoft Rewards, where you earn points for searching and redeem
them for gift cards and other perks.
It also excels in visual search, allowing you to find images and related information simply by uploading a
picture. If you're looking for a feature-rich Google alternative with its own rewards system and intuitive
visual search, Bing is a great choice.
Key features:
105 | B S 8
• Visual search: This feature allows users to search using images instead of text. Just upload a
photo, and Bing will identify objects, landmarks, or even products, providing relevant
information and links.
• Rewards program: Microsoft Rewards lets users earn points for searching and convert them into
prizes. It's a fun way to get rewarded for your usual online activity.
• Integration with Microsoft services: Bing seamlessly integrates with products like Office,
Outlook, and Cortana. This integration enhances productivity by allowing you to access and
search your documents, emails, and even calendar events directly from the Bing search bar.
• Local search: It allows you to search for businesses and points of interest in your area. You can
find locations, check ratings and reviews, and get directions from Bing.
• Intelligent search: Powered by AI, Bing also provides answers generated by Copilot. These
features help you find the information you need quickly and efficiently.
• Safe search: Bing provides robust privacy settings, allowing users to control their search history
and preferences.
Yahoo Search
Yahoo, a veteran of the search engine world, offers a familiar and convenient experience for many users.
Powered by Bing since 2009, Yahoo Search offers a robust search experience with a blend of
integrations. It's known for its comprehensive web directory, user-friendly interface, and integration
with services such as Yahoo Mail, Finance, and News.
Key features:
• Bing-powered search results: Yahoo Search leverages Bing's powerful search technology to
deliver relevant and high-quality search results. This partnership ensures that users get accurate
data.
• Rich media integration: Yahoo excels in integrating multimedia content within search results.
Users can easily find images, videos, and news articles related to their search queries.
• Local search: Yahoo Search provides local search features, helping users find businesses,
restaurants, and services near them. It includes reviews, ratings, and detailed business
information.
DuckDuckGo
106 | B S 8
DuckDuckGo is among the top privacy search engines. Founded in 2008 by Gabriel Weinberg, it doesn’t
track search history or personal data. It offers a clean, ad-free search experience that appeals to users
concerned about their online privacy.
Key features:
• Privacy: The DuckDuckGo search engine does not track users' personal data and blocks hidden
third-party trackers on websites, ensuring a private browsing experience.
• Bang search shortcuts (!bangs): The !bangs feature allows users to quickly search within a
specific website directly from DuckDuckGo. For example, typing "!w cats" will take you to the
Wikipedia page for cats.
• Instant answers: Similar to Google’s Knowledge Graph, the DuckDuckGo search engine provides
instant answers to common queries at the top of the search results page. These answers come
from trusted sources and cover a variety of topics such as calculations, weather forecasts,
dictionary definitions, and more
• AI chat integration: DuckDuckGo features a private AI-powered chat that provides users with
quick, relevant information. Although it’s still under development, the chat can already deliver
concise answers.
Ask.com
Key features:
• Engaging topics of interest: The Ask.com starting page serves as a dynamic gateway to a wide
array of interesting topics and categories. Upon landing on the homepage, users can look
through trending questions, popular searches, and featured articles.
107 | B S 8
• Related questions: Ask.com doesn't stop at just one answer. It suggests related questions that
might spark further exploration and help you delve deeper into the topic.
Yandex
Yandex isn't just a search engine – it's a digital ecosystem for the CIS countries market. Founded in 1997,
Yandex offers a wide range of services similar to those of Google, including search, maps, email, and
cloud storage. It leverages advanced algorithms and machine learning technologies to provide
comprehensive and accurate search experiences.
Key features:
• Search filters: Yandex offers extensive search filters that allow users to refine their search results
based on date, type, region, and more.
• Advanced image search: Yandex offers an image search feature that includes options for finding
similar images, identifying objects within images, and searching by image. Users can upload an
image or use a URL to find visually similar pics.
• Voice search: Yandex features voice search capabilities and a virtual assistant named Alice. Users
can perform searches, set reminders, and control smart home devices with natural language
commands.
• Yandex Zen: It’s a personalized content feed integrated into the search engine. It uses AI to
recommend articles, videos, and news based on user interests and browsing history.
• Yandex Market: This integrated shopping service allows users to compare prices, read reviews,
and find products from various online retailers.
Brave Search
Brave Search is a privacy-centric search engine developed by the makers of the Brave browser. Launched
in 2021, Brave Search aims to provide a secure and private alternative to mainstream search engines. It
108 | B S 8
offers unbiased, independent search results. Brave Search is designed to give users control over their
online experience, free from the ad targeting prevalent in other search engines.
Key features:
• Privacy protection: Brave Search ensures complete anonymity by not collecting any personal
information.
• Independent index: Unlike many search engines that rely on third-party indexes, Brave Search
uses its own independent index. Thus, it delivers unbiased search results, free from the influence
of major search engine monopolies.
• AI-generated answers: Brave Search utilizes AI to generate instant answers to user queries
directly at the top of the search results page.
• Goggles feature: It offers a unique twist on search customization. This feature allows users to
personalize search results by applying custom filters and ranking rules.
• Integration with Brave ecosystem: Brave Search integrates seamlessly with the Brave browser.
This integration includes features like the Brave Rewards program, which allows users to earn
tokens for viewing privacy-respecting ads.
Baidu
Baidu is the top search engine in China, with a vast majority of the market share. Like Google, it offers a
range of services, including maps, news, and cloud storage. Baidu is known for its robust search
algorithms tailored to the Chinese language, making it the go-to choice for Chinese users.
109 | B S 8
STRAND 4 COMPUTATIONAL THINKING
An expression is any word or group of words or symbols that is a value. In programming, an expression is
a value, or anything that executes and ends up being a value.
It is necessary to understand that a value is unique. For example, const, let, 2, 4, s, a, true, false, and
world are values because each of them is unique in meaning or character.
Judging from the code above, const, price, =, and 500 are expressions because each of them has a
definite and unique meaning or value. But if we take all of them together const price = 500 - then we
have a statement.
A statement is a group of expressions and/or statements that you design to carry out a task or an action.
Statements are two-sided – that is, they either do tasks or don't do them. Any statement that can return
a value is automatically qualified to be used as an expression. That is why a function or class is a
statement and also an expression in JavaScript.
If you look at the example of the function under the section on expressions, you can see it is assigned
and execute to a value passed to a variable. That is why it is an expression in that case.
Inline statements
110 | B S 8
The whole of the code above is a statement because it carries out the task of assigning $2000 to
amount. It is safe to say a line of code is a statement because most compilers or interpreters don't
execute any standalone expression.
Operators that work on two values place an operator symbol between the two values, similar to
mathematical notation: 1 + 2. Operators that work on only one value place an operator symbol before
that value, like !true.
The OpenTofu language has a set of operators for both arithmetic and logic, which are similar to
operators in programming languages such as JavaScript or Ruby.
When multiple operators are used together in an expression, they are evaluated in the following order
of operations:
1. !, - (multiplication by -1)
2. *, /, %
3. +, - (subtraction)
5. ==, !=
6. &&
7. ||
Use parentheses to override the default order of operations. Without parentheses, higher levels will be
evaluated first, so OpenTofu will interpret 1 + 2 * 3 as 1 + (2 * 3) and not as (1 + 2) * 3.
The different operators can be gathered into a few different groups with similar behavior, as described
below. Each group of operators expects its given values to be of a particular type. OpenTofu will attempt
to convert values to the required type automatically, or will produce an error message if automatic
conversion is impossible.
Arithmetic Operators
The arithmetic operators all expect number values and produce number values as results:
• a % b returns the remainder of dividing a by b. This operator is generally useful only when used
with whole numbers.
111 | B S 8
• -a returns the result of multiplying a by -1.
OpenTofu supports some other less-common numeric operations as functions. For example, you can
calculate exponents using the pow function.
Logical Operators
The logical operators all expect bool values and produce bool values as results.
• a && b returns true if both a and b are true, or false if either one is false.
OpenTofu does not have an operator for the "exclusive OR" operation. If you know that both operators
are boolean values then exclusive OR is equivalent to the != ("not equal") operator.
The logical operators in OpenTofu do not short-circuit, meaning var.foo || var.foo.bar will produce an
error message if var.foo is null because both var.foo and var.foo.bar are evaluated.
112 | B S 8
STRAND 4 COMPUTATIONAL THINKING
LESSON
1
SUB-STRAND 2 ALGORITHM
BODMAS
Example 1:
Input: 1+2+3+4*5*6
Ουτρωτ: 127
Example 2:
This is how below given java program will take the string as input and spi of operators like addition(+)
and multiplication(*).
1+2*3+4*5*6
1/+12*3+/4*5/*6
1/+/6+/20/*6
1|+|6|+|120| = 127
Bodmas in Programming(C++)
num 1 = 7;
System.out.println(num3 - num1);
113 | B S 8
STRAND 4 COMPUTATIONAL THINKING
LESSON
2
PROGRAMMING CONSTRUCTS
B8.4.2.1.2 Describe and use sequence, selection and iteration statements in a programme. Understand
the difference between variables and constants and be able to choose appropriate naming conventions
when writing statements.PROGRAMMING CONSTRUCTS:
PROGRAMMING CONSTRUCTS
Programs are designed and implemented using common building blocks, known as programming
constructs. These constructs are sequence, selection and iteration and they form the basis for all
programs.
Programs are designed using common building blocks. These building blocks, known as programming
constructs, form the basis for all programs.
Sequence
Selection
Iteration
Sequence is the order in which instructions occur and are processed. Selection determines which path a
program takes when it is running.
In programming, sequence is a basic algorithm: A set of logical steps carried out in order Computers
need instructions in the form of an algorithm in order to complete a desired task, and this algorithm
must have the correct order of steps, or sequence.
Example: We can relate sequence to our everyday lives. Think about making a PB & J sandwich as a task,
for example. If we want to make a delicious, peanut butter and jelly sandwich, we need to follow
multiple steps in a logical order. We would begin by gathering our ingredients getting a knife, spreading
the peanut butter, spreading the jelly, and so forth.
114 | B S 8
In this pseudo-code program, designed to find the average of two whole numbers the instructions in the
correct sequence
All programs use one or more of these constructs. The longer and more complex the program, the more
these constructs will be used repeatedly
This guide uses pseudo-code examples to illustrate the constructs. It is important to realise that while all
programming languages include these constructs, there may be slightly different format
Selection is the second programming construct. In programming, there are occasions when a decision
needs to be made. Selection is the process of making a decision. The result of the decision decides
which path the program will take next.
For example, a program could tell a user whether they are old enough to learn how to drive a car. If the
user's age meets the required
driving age, the program would follow one path and execute one set of instructions. Otherwise, it would
follow a different path and execute a different set of instructions.
Selection works by testing a condition. The test gives a Boolean result-TRUE or FALSE. If the result is
TRUE, the program follows one path-otherwise it follows another.
IF age>16 THEN SEND 'You are old enough to drive a car!' TO DISPLAY
ELSE
TO DISPLAY END IF
In the pseudo-code program above, the path the program takes depends on the condition. A variable -
in this case age - is used to test the condition.
115 | B S 8
If the value of age is greater than 16, the result of the tested condition is TRUE and the program follows
the first path, which follows the statement THEN. This path informs the user that they are old enough to
drive.
If the value of age is less than 16, the result is FALSE and the program follows the second path, which
follows the statement ELSE. This path informs the user that they are not yet old enough to drive.
Iteration
Iteration is the third programming construct. There are times when a program needs to repeat certain
steps until told otherwise, or until a condition has been met This process is known as iteration.
Iteration is also often referred to as looping, since the program loops' back to an earlier line of code.
Sections of code that are iterated are called loops.
Iteration enables programmers to greatly simplify a program. Instead of writing out the same lines of
code again and again, a programmer can write a section of code once, and ask the program to execute it
again and again until it is no longer needed.
116 | B S 8
EXERCISE
2 Draw and identify the flowchart symbols and state their functions
117 | B S 8
STRAND 4 COMPUTATIONAL THINKING
LESSON
2
SUB-STRAND 3: ROBOTICS
PARTS/COMPONENTS OF A ROBOT
1. Sensors
Sensors are what allow a robot to gather information about its environment. This information can be
used to guide the robot's behavior. Some sensors are relatively familiar pieces of equipment. Cameras
allow a robot to construct a visual representation of its environment. This allows the robot to judge
attributes of the environment that can only be determined by vision, such as shape and color, as well as
aid in determining other important qualities, such as the size and distance of objects. Microphones allow
robots to detect sounds. Sensors such as buttons embedded in bumpers can allow the robot to
determine when it has collided with an object or a wall Some robots come equipped with thermometers
and barometers to sense temperature and pressure.
That takes us to the next key component of every robot: sensors. Sensors are the powerhouse of a
robot's feedback mechanism.
They act as eyes and ears to help it take in information about its surroundings. Robots typically
incorporate a wide range of sensor types to help them perform their work. These clude typically
incorporate a wide range of sensor types to help them perform their work.
These include:
• Light sensors
• Sound sensors
• Temperature sensors
• Contact sensors
• Proximity sensors
• Distance sensors
• Pressure sensors
118 | B S 8
• Positioning sensors
Contact and proximity sensors help robots navigate more confidently and safely, especially when
deployed alongside human workers. Pressure sensors may control the grip strength of a powered
robotic arm so it doesn't crush the merchandise it's processing.
Positioning sensors include GPS, digital magnetic compasses and other tools to approximate the location
of a robot, either indoors or outdoors. Some robots also navigate their surroundings through vision
sensors, which function like eyes. Cameras feed in visual information, and then an artificial intelligence
(Al) process called machine vision analyzes the video footage to recognize objects, guiding the robot.
A newer but increasingly popular kind of robotic sensor is proprioceptive sensors. These components
monitor a robot's internal factors like heat, electric current and battery life. Since robots are often
expensive, companies must stay on top of their maintenance, and this information helps them do that.
1. The sensors are used in the industrial robotics for monitoring the dangerous and safety conditions in
the robot cell layout, they help in avoiding the physical injuries and other damages caused to the human
workers.
2. Some household appliance applications using sensors are the boiler, washing machines and
dishwashers for heating systems, and other white products. Many vehicles, including automobiles,
trains, buses, etc., employ sensors to monitor petroleum temperature and pressure, jets and steering
systems, and so many more.
3. In hospitals, sensors are used continuously for patient monitoring, temperature, heart rates, MRI
machines, oxygen tanks, and the list goes on.
4. In restaurants, the kitchen will often have an extractor fan which uses a differential pressure switch to
alert the staff if the fan becomes clogged. Ovens also have temperature sensors.
5. When you are at work, the lights may turn on using a motion sensor. Public toilet flushes often use a
push button or an infrared switch. You may also use a computer which uses many different sensors.
End-Effectors are the tools at the end of robotic arms and other robotic appendages that directly
interact with objects in the world.A "gripper" at the end of a robotic arm is a common end-effector.
Others include spikes, lights, hammers, and screw-drivers. Medical robots have their own specialized
effectors, such as tools for cutting in surgery and suturing incisions.
A robot's "control system is that part of the robot that determines the robot's behavior,
Pre-Programmed Robots
The very simplest pre-programmed robot merely repeats the same operations over and over. Such a
robot is either insensitive to changes in its environment or it can detect on very limited information
about very limited parts of the environment. Such a robot will require little in the way of "controls" but
119 | B S 8
it will perform properly only if the environment behaves in accord with the robot's pre-programmed
actions.
Autonomous Robots
More complex robots are able to respond appropriately in environments that are much more
complicated. Such a robot will have sensory apparatus that allow it to detect changing features of the
environment and a range of behaviors that will allow it to respond to those changes. Whatever features
of the robot enable it to adapt its behavior to its environment we will call the "control system."
There are many different kinds of control systems used in robots. In this module, we will focus most of
our attention on robots that have one of two different kinds of control systems (sometimes called
"robotic architectures"):
Top-Down: Build the brain first! Then hook up the sensors and the effectors. If the brain is built properly,
it will take the input data from the sensors and be "smart enough" to behave intelligently in response to
it
Bottom-Up: Don't bother with a brain! Hook each sensor directly to an effector --call this a "behavior."
Then rank each of the behaviors (the sensor-effector pairs) in order of priority, to determine which one
"wins out" and controls the robot if more than one is activated
3. Actuators
If sensors are the eyes and ears of the robot, its actuators function like muscles. Actuators are small
motors attached directly to the structure of the machine thar facilitate movement. Some of the most
common types include:
• Hydraulic actuators typically appear in heavy machinery, including mining and construction
equipment, since they produce a lot of force and are relatively easy to maintain.
• Pneumatic actuators have many of the same benefits and are often less expensive, but they're
sensitive to vibrations. They're a popular choice for manufacturing and other stable, indoor
settings.
• Electric actuators are by far the most common type today They provide more control, have fewer
environmental hazards, make little to no noise and are easy to program.
A gripper is a device which enables the holding of an object to be manipulated. The easier way to
describe a gripper is to think of the human hand. Just like a hand, a gripper enables holding, tightening,
handling and releasing of an object.
In Robotics, Gears are used to transfer rotational forces between axles. They can change speed and
direction. The axles can stand in any orientation, however not all orientation can be done with 2 gears.
Commonly gears are used to reduce the speed of a motor.
Piston mechanisms are used in robots to produce linear movement in a particular direction.
120 | B S 8
Wheeled robots are robots that navigate around the ground using motorized wheels to propel
themselves. This design is simpler than using treads or legs and by using wheels they are easier to
design, build, and program for movement in flat, not-so-rugged terrain. They are also more well
controlled than other types of robots. Disadvantages of wheeled robots are that they cannot navigate
well over obstacles, such as rocky terrain, sharp declines, or areas with low friction. Wheeled robots are
most popular among the consumer marker their differential steering provides low cost and simplicity
Robots can have any number of wheels, but three wheels are sufficient for static and dynamic balance
Additional wheels can add to balance, however, additional mechanisms will be required to keep all the
wheels in the ground, when the terrain is not flat.
ACTIVITY
The mechanical and electronical part of the invented robot worked well after testing the robot but the
robot behaviour is not responding as programmed, which part of the robot do you think the attention of
the creator should go to!
EXERCISE
121 | B S 8
STRAND 4 COMPUTATIONAL THINKING
LESSON
1
SUB-STRAND 4: ARTIFICIAL INTELLIGENCE
Artificial neural networks contain artificial neurons which are called units. These units are arranged in a
series of layers that together constitute the whole Artificial Neural Networks system. A layer can have
only a dozen units or millions of units as this depends on the complexity of the system. Commonly,
Artificial Neural Network has an input layer, output layer as well as hidden layers. The input layer
receives data from the outside world which the neural network needs to analyze or learn about. Then
this data passes through one or multiple hidden layers that transform the input into data that is valuable
for the output sayer Finally the output layer provides an output in the form of a response of the Artificial
Neural Networks to input date provided
Human Intelligence is the creation of God gifted to humans and Artificial Intelligence is creased by
humans. Intelligence plays a vital role whether it is human or artificial. Human intelligence is a quality
that helps humans in learning, understanding, and solving problems with brilliant ideas whereas artificial
intelligence is something that mimics human beings by true information they receive.
Human intelligence alludes to people's scholarly ability that permits us to think, gain from various
expressions, comprehend complex ideas, solve numerical issues, adapt to new situations, use
knowledge to manipulate one's environment and speak with fellow human beings.
Animal intelligence as the combination of skills and abilities that allow animals to live in and adapt to
their specific environments.
Artificial Intelligence simply means technology that can make machines think like human beings and
they can work the way we humans do.
1. If we can compare it nature wise then, human intelligence intends to revise to modem environments
by using a mixture of distinct cognitive procedures, whereas artificial intelligence intends to create
devices that can mock human behavior and conduct human-like actions. Thus, we can say that the
human brain is analogous, but machines are digital.
2. The simple difference is that human beings use their brain, ability to think, memory, while Al
machines depend on the data given to them.
122 | B S 8
3. As we all know that humans learn from past mistakes and intelligent ideas and intelligent attitudes lie
at the basis of human intelligence. Hence, this point is simply because machines cannot think and learn
from the past. They can learn from information and through regular training, but they can never attain
the thinking procedure unique to humans.
4. Artificial intelligence takes much more time to adjust to the new changes whereas human beings can
adapt to changes easily and this makes people able to learn and ace several abilities.
5. Modern computers normally use 2 watts of energy whereas human brains use about 25 watts.
6. Machines can handle more data at a speedier rate as compared to humans. As of now humans cannot
beat the speed of computers.
7. Artificial Intelligence has not aced the ability to choose up on related social and excited codes. People
are many ways better at social interaction since they can develop academic data, have self-awareness,
and are elegant to others' emotions.
Strong Al is a theoretical form of machine intelligence which supports the view that machines can really
develop human consciousness equal to human beings. Strong Al refers to machines or programs with
the mind of their own and which can think and accomplish complex tasks on their own without any
human interference.
Weak Al, also known as narrow Al, is artificial intelligence with limited functionality Weak Al refers to the
use of advanced algorithms to accomplish specific problem solving or reasoning tasks that do not
encompass the full range of human cognitive abilities. An example is Google Search Engine.
1. In Strong Artificial Intelligence, the machine can actually think and perform tasks on its 9 own just like
a human being. In Weak Artificial Intelligence, the devices cannot follow these tasks on their own but
are made to look intelligent.
2. An algorithm is stored in Strong Al to help them act in different situations but in Weak Al all the
actions are entered by a human being.
3. There are no proper examples for Strong Al since it is still in the initial stage, but there are several
examples for WeakAl since it has been performed several times.
4. In Strong Al the machine actually has a mind of its own and can take decisions but in WeakAl, the
machine can just simulate the human behavior.
5. Active Al technology is more based on making the device look real, but Weak Al technology is for
making the machine do the pre-planned activities in a proper manner.
Hologram
123 | B S 8
For recording a hologram, coherent light is reflected from or transmitted through an object and
propagates to the position of the recording material. A second beam of coherent light produces
interference with light from the object, and the interference pattern is recorded in the material.
There are two ways to create holograms: via computer - with augmented reality glasses, and physical -
for optical displays. Depending on which method is used, there are two types of holograms-stereotypical
and realistic.
Holography, means of creating a unique photographic image without the use of a lens. The photographic
recording of the image is called a hologram. Holography technology is a unique method of
photography whereby 3D objects are recorded using a laser and then restored as precisely as possible to
match the originally recorded object.
Simply put, holograms are three-dimensional images generated by interfering beams of light that reflect
real, physical objects (via a laser beam that organizes the light into a three-dimensional representation
of the original object.). Unlike conventional 3D projections, holograms can be seen with the naked eye.
When illuminated via a laser, holograms are able to form an exact 3D clone of the object and duplicate
its features.
ACTIVITY
Robots now are irrigating crops in agriculture, this is typically the application of which type of Al in the
agriculture sector!
EXERCISE
2. Discuss in groups the differences between animal, human and artificial intelligence.
3. What is holography?
124 | B S 8