End User Computing

Download as pdf or txt
Download as pdf or txt
You are on page 1of 79

END USER COMPUTING

LEARNER GUIDE

Module # 351201001-KM-06
NQF Level 03

Notional hours 60
Credit(s) 6
Curriculum Code 351201000
SAQA QUAL ID 101408
Qualification Title Occupational Certificate: Computer Technician
PURPOSE OF THE QUALIFICATION ................................................................................ 4
QUALIFICATION RULES...................................................................................................... 5
EXIT LEVEL OUTCOMES .................................................................................................... 6
ENTRY REQUIREMENTS: ................................................................................................... 7
ASSESSMENT REQUIREMENTS....................................................................................... 7
PROVIDER ACCREDITATION REQUIREMENTS FOR THE MODULE: ..................... 7
TOPIC ELEMENTS TO BE COVERED INCLUDE: .......................................................... 9
CONTACT INFORMATION:

Name
Contact Address
Telephone (H)
Telephone (W)
Cellular
PURPOSE OF THE QUALIFICATION

Upon completion of the qualification students will be expected to provides technical assistance
to users, including diagnosing and resolving issues and problems with software, hardware,
computer peripheral equipment, networks, databases, systems and the internet.
The qualification outcomes cover types of software, hardware, components, upgrading and
troubleshooting a computer, formatting and partitioning hard drives, and network topologies.
Green technology, maintaining records of daily problems and remedial actions, and prepare
evaluations for systems performance.

A qualified learner will be able to:


● Identify the potential green technologies, processes and procedures to create a
sustainable computer environment to reduce e-waste in an organisation.
● Set up desktop/laptop for a new user according to software compatibility by installing
operating systems and peripheral equipment according to given specifications.
● Communicate effectively using appropriate methods to maintain effective customer
relationships according to organisational standards.
● Analyse and resolve hardware/software problems such as operational discrepancies
to optimise performance of the desktop/laptop systems.
● Apply knowledge of principles and practices in order to identify and solve problems
arising in the course of their work.

Rationale:
This qualification is a response to Output 3.1.2 of the NSDS III target: Programmes offered to
meet industry needs, including those supporting apprenticeships and N-Courses, are
reviewed, updated and made available to and accessed by employers. With the increase in
personal computers, home computers, and computers in schools and businesses, it is
important that students are trained to be able to maintain and upgrade computers and their
components.
The qualification will prepare students to become competent as a computer technician with an
understanding of computer hardware and software troubleshooting. Students will also be
competent and have hands-on computer repair skills.
Computer technicians provide assistance to computer users by answering questions,
resolving technical problems and maintaining a company's network, software and computer
equipment. They are also called desktop support technicians or computer support specialists.

QUALIFICATION RULES

This qualification is made up of the following compulsory Knowledge and Practical


Skill Modules: Knowledge Modules:
1. 351201001-KM-01, Introduction to Data Communication and Networking, Level 5, 15
Credits.
2. 351201001-KM-02, Basics of Computer Architecture: Hardware, Level 5, 30 Credits.
3. 351201001-KM-03, Basics of Computer Architecture: Software, Level 5, 30 Credits.
4. 351201001-KM-04, Basic Concepts of Sustainable Computer Environment and
Green Technologies, Level 4, 10 Credits.
5. 351201001-KM-05, Social Media and Digital Literacy, Level 4, 5 Credits.
6. 351201001-KM-06, End User Computing, Level 3, 6 Credits.
7. 351201001-KM-07, Business communication and customer services, Level 5, 8
Credits.
8. 351201001-KM-08, Ready for work standards, Level 4, 5 Credits.

Total number of credits for Knowledge Modules: 109.

Practical Skill Modules:


1. 351201001-PM-01, Troubleshoot computer and network faults, Level 5, 30 Credits.
2. 351201001-PM-02, Maintain computer and network security Level 4, 8 Credits.
3. 351201001-PM-03, Provide support to end Users, Level 5, 30 Credits.
4. 351201001-PM-04, Install computer software and hardware, Level 4, 5 Credits.
Total number of credits for Practical Skill Modules: 73.

This qualification also requires the following Work Experience Modules:


1. 351201001-WM-01, Respond to user inquiries regarding fault request, NQF Level 5,
30 Credits.
2. 351201001-WM-02, Set up equipment for users, check operating system
performance and ensure proper installation of cables and software, Level 5, 25
Credits.
3. 351201001-WM-03, Processes of maintaining computer systems and peripherals,
Level 5, 15 Credits.
4. 351201001-WM-04, Identify the potential green technologies, processes and
procedures for cost effective application and create a sustainable computer
environment to reduce e-waste, Level 4, 10 Credits.
5. 351201001-WM-05, Maintain records of daily data communication transactions,
problems and remedial actions taken, or installation activities, Level 4, 20 Credits.
Total number of credits for Work Experience Modules: 100.

EXIT LEVEL OUTCOMES

1. Identify the potential green technologies, processes and procedures to create a


sustainable computer environment to reduce e-waste in an organisation.
2. Set up a desktop/laptop for a new user according to software compatibility by installing
operating systems and peripheral equipment according to given specifications.
3. Communicate effectively using appropriate methods to maintain effective customer
relationships according to organisational standards.
4. Analyse and resolve hardware/software problems such as operational discrepancies
to optimise performance of the desktop/laptop systems.
5. Apply knowledge of principles and practices in order to identify and solve problems
arising in the course of their work.
ENTRY REQUIREMENTS:

An NQF Level 4 qualification.

Recognition of Prior Learning (RPL):


RPL for access to the external integrated summative assessment:
Accredited providers and approved workplaces must apply the internal assessment criteria
specified in the related curriculum document to establish and confirm prior learning. Accredited
providers and workplaces must confirm prior learning by issuing a statement of result or
certifying a work experience record.

RPL for access to the qualification:


Accredited providers and approved workplaces may recognise prior learning against the
relevant access requirements.

ASSESSMENT REQUIREMENTS
PROVIDER ACCREDITATION REQUIREMENTS FOR THE MODULE:

Physical Requirements:
● The provider must have lesson plans and structured learning material or provide
learners with access to structured learning material that addresses all the topics in all
the knowledge modules.
● In addition, the following must be provided:
● A computer with the necessary software per student in class
● Printers
● Access to internet facilities
● Distance and e-learning modalities available to learners
Human Resource Requirements:
● Lecturer/ learner ratio of 1:30 (Max)
● Lecturers need to be qualified at a Level 6 or higher in the relevant field or have at
least 5 years relevant experience in Business Communication and Customer services
Legal Requirements:
● Legally compliant venue (i.e. Fire protection services, OHS and other legislation)
● Code of Conduct
● Valid licenced software
● Approved and accredited by the relevant AQP as per QCTO requirements
● It would be advantageous if lecturers are registered with a relevant Professional Body
for continuous professional development purposes
● Assessor and Moderator have professional recognition in the Business
Communication and Customer services field of expertise and approved by the relevant
AQP
Exemptions
● Communication N4, Communication N5, Communication N6, Management
Communication N4, Management Communication N5 and Management
Communication N6
TOPIC ELEMENTS TO BE COVERED INCLUDE:

The learning will enable learners to demonstrate an understanding of:


KM-06-KT01: Understand Keyboard functions (5%)
KM-06-KT02: Create, edit and format word documents (20%)
KM-06-KT03: Understand and use presentation software (20%)
KM-06-KT04: Understand and apply GUI based spreadsheet application skills (20%)
KM-06-KT05: Create, send and receive E-mail messages (20%)
KM-06-KT06: Demonstrate ability to use the Word Wide Web (10%)
KM-06-KT07: Safety and security of ICT (5%)

KM-04-KT01: Understand keyboard functions

KT0101 Identify and use a number of keys and explore their effects in
a word document. (Range: includes but not limited to
alphabetical keys, number keys/n um lock, Caps Lock, Enter,
Backspace,
Delete, Spacebar, Shift, Tab, Ctrl + Alt, Delete and F keys)
KT0102 Practice using these keys to create and edit a text document,
for example using tab key for indenting
KT0103 Describe the GIGO (Garbage In Garbage Out) principle using
a word processor document

Identify and use a number of keys and explore their effects in a word document. (Range:
includes but not limited to alphabetical keys, number keys/n um lock, Caps Lock, Enter,
Backspace,
Delete, Spacebar, Shift, Tab, Ctrl + Alt, Delete and F keys

A computer keyboard is an input device used to enter characters and functions into the
computer system by pressing buttons, or keys. It is the primary device used to enter text. A
keyboard typically contains keys for individual letters, numbers and special characters, as well
as keys for specific functions. A keyboard is connected to a computer system using a cable or
a wireless connection.
Functions of Every Key - Keys on the Computer Keyboard and their Functions

Keys on the computer keyboard

Alt key
● A computer key that you press together with another key so that the other key does
something different from what it usually does. You can also refer to this key simply as
Alt.
Arrow key
● one of four computer keys marked with an up, down, left, or right arrow, used for
moving the cursor
Backspace
the key that you press on a keyboard to move one space backwards in a document
Caps lock
● a key on a computer keyboard that makes all the keys produce capital letters
Character set
● a complete set of letters, numbers, or symbols that can be used by a computer
Command key
● on some computers, a key that you press together with another key to make the
computer do a particular thing
Control
● the control key on a computer keyboard
Control key
● A key on a computer keyboard that is used in combination with other keys for doing
particular operations. This key is usually marked ‘Ctrl’.
ctrl abbreviation
● control: the control key on a computer keyboard
Delete key
● Computer key that removes characters. This key is sometimes simply referred to as
Del.
Enter key
● a key on a computer keyboard that makes the computer perform an action or start a
new line of writing
● Escape
the escape key on a computer
Escape key
● A key on a computer keyboard that allows someone to stop an action, leave a program,
or return to a previous menu. This key is usually marked ‘Esc’.
Function key
● a special button on a computer keyboard that is used for a particular operation in a
program. The keys near the top of a keyboard marked ‘F1’ to ‘F12’ are function keys.
Hot key
● a key on a computer keyboard that provides a short way of performing a set of actions
Key
● One of the parts that you press on a keyboard to make it produce letters, numbers etc.
Keypad
● The part at the side of a computer keyboard that has number keys and arrow keys on
it.
Numeric keypad
● The part of a computer keyboard to the right of the main keys that has keys with
numbers on them.
Num Lock
● a computer key that you press to make the number keys below it enter numbers and
not be used for moving up and down a document
Pound key
● American the hash key on a telephone keypad or computer keyboard
Return
● a return key.
Return key
● a key on a computer keyboard that makes the computer perform an action or start a

● new line of writing


Shift
● computing a shift key on a computer keyboard
Shift key
● the key that you press on a computer keyboard when you want to write a capital letter
Short cut
● computing a computer icon or a combination of keys on the keyboard such as ‘Alt + C’
that helps you to do something on the computer more quickly, for example go to a
particular program or copy information
Space bar
● the long narrow bar at the front of a computer keyboard that you press to make a space
between words when you are typing
Star key
● the key with the asterisk symbol (*) on a telephone keypad or computer keyboard
Tab
● computing a button on a computer keyboard or typewriter that you press to move
several spaces along the same line
Tab key
● a tab on a computer keyboard
Toggle
● computing a key or command (=instruction) on a computer that you use to move from
one operation or program to another and back again
Touchpad
● computing a small flat surface on a laptop computer that you touch with your finger in
order to move the cursor on the screen

Keyboard and Computer Shortcuts

Keyboard and computer shortcuts are designed to make routine computer functions quicker
and easier. The only problem is that many of these have gone unnoticed by the average user.
By using simple keyboard and computer shortcuts in the workplace, you can increase your
productivity and cut back on the strain caused by repetitive motions.

Most shortcuts serve to eliminate additional gestures that might involve your mouse or extra
steps, such as selecting certain menus in the current window. The shortcuts below pertain
specifically to PC users:
1. Ctrl+A
Highlight everything in the current folder, document, or page.
2. Ctrl+C / Ctrl+Insert
Copy the selected text, image, or item to the clipboard.
3. Ctrl+X
Cut (remove) the selected text, image, or item and moves it to the clipboard.
4. Ctrl+V
Paste contents of the clipboard into current program or window.
5. Ctrl+F
In most programs, this command opens up a search window (includes all browsers and most
Office applications).
6. Ctrl+S
Save an open document, file, or webpage (most browsers and programs).
7. Ctrl+Z
Undo the last action performed (supported by most programs and browsers).
8. Ctrl+Left arrow/Right arrow
Move your cursor to the start of the previous word (left) or to the beginning of the next word
(right).
9. Ctrl+Shift+Left arrow/Right arrow
Highlight the previous word (left) or highlight the next word (right).
10. Ctrl+Backspace
Delete the word to the left of your cursor.
11. Ctrl+Home
Move your cursor to the beginning of a document or page.
12. Ctrl+End
Move your cursor to the end of a document or page.
13. Esc
Cancel current/opened task.
14. Shift+Delete
Delete a highlighted item (permanently) without first moving it to the Recycle Bin.
15. Ctrl+Tab
Move through opened tabs.
16. Alt+Underlined letter
Perform corresponding command/shortcut or select corresponding option.
17. Ctrl+Click / Shift+Click
Select more than one item or file
18. Shift+Arrow
Highlight text to the left or the right.
19. Ctrl+P
Print current document or page.
20. Ctrl+Shift+V
Paste current clipboard as plain text.
21. Alt+F4
Close any opened/active windows app.
22. Shift+F7
Open thesaurus lookup in Microsoft Word.
23. Ctrl+Shift+T
Reopen last closed browser tab.
24. Windows key+M
Minimize all opened windows.
25. Windows key+L
Lock your PC.
26. Ctrl+D
Bookmark current webpage.
27. Ctrl+Shift+B/O
Open your bookmarks menu (depends on browser).
28. Ctrl+R (browser)
Refresh current page
29. Ctrl+R (Microsoft Outlook)
Start a reply to currently selected/opened email.
30. F2
Rename highlighted file(s)

Describe the GIGO (Garbage in Garbage Out) principle using a word processor
document

Garbage In, Garbage Out (GIGO)

Definition - What does Garbage- In, Garbage- Out (GIGO) mean?

Garbage in, garbage out (GIGO), in the context of information technology, is a slang
expression that means regardless of how accurate a program's logic is, the results will be
incorrect if the input is invalid.

While the term is most frequently used in the context of software development, GIGO can also
be used to refer to any decision-making systems where failure to make right decisions with
precise, accurate data could lead to wrong, nonsensical results.

A program gives inaccurate results due to inaccurate data provided because a computer will
always attempt to process data given to it. Said another way, the output quality of a system
usually can't be any better than the quality of inputs.

Garbage can be data that is simply filled with errors, but it can also be data that doesn't have
any applicability to the specific circumstance. For example, imagine a company that only sells
to .NET developers. A CRM application might be able to determine the most likely targets from
a batch of leads. However, if the leads were generated from a group of Java developers who
have no interest in the product, the CRM application will produce useless results regardless
of its logic.

The solution is to not just spend time on an application's algorithms, but also spend time
validating the input and/or ensuring that the right sort of data goes into the system.

Internal Assessment Criteria and Weight


● IAC0101 Key the alphabetic and numeric keys by touch
● IAC0102 Develop good keyboard techniques
● IAC0103 Key fluently at least 35 words per minute
● IAC0104 Develop reasonable accuracy
● IAC0105 Proof read of documents
KM-09-KT02: Create, edit and format word documents

KT0201 Starting a Word processing application


KT0202 Purpose of using Word processing applications
KT0203 Use basic features to create and edit and format a document
KT0204 Document management, formatting and techniques
KT0205 Importing data from external sources

Starting a Word processing application

Microsoft Word is a word-processing application that can be part of the Microsoft Office suite
or a stand-alone program installed on to your computer.

The program can be used to write letters and different types of documents that can include
graphics and pictures. This guide explains how to open Microsoft Word and start a new
document, using the Windows 7 operating system.

It will feature Word 2013 for PCs, and is slightly different to earlier versions of Word. A word
processor included free with the Windows operating system is WordPad, which doesn’t have
all the features of Word but does have some formatting features.

It can be found in the ‘Start’ menu under ‘Accessories’. Click on 'All programs' and then scroll
to 'Accessories' folder

You’ll need:
● A computer with Microsoft Word installed.
Follow these step-by-step instructions to start a document in Microsoft Word

Step 1: From the desktop or from your ‘Start’ menu, open Microsoft Word.

If the Word 2013 icon does not appear you can search for it, using the 'Search programs and
files' box in the picture above.

Step 2: Microsoft Word will open up and present you with an option to select a document
template, or a blank document.
Step 3: If you don't want to use any of the templates on display, click on the blank document.

Step 4: A new blank document will open up ready for you to start typing.
Use basic features to create and edit and format a document
How to create a document

To create a document, you must either have a word processor or a computer capable of
creating a document on an online service.

Note: When we refer to a "document", we're talking about a rich text


document with text formatting (e.g., bold), images, different fonts, and font sizes, and
not a plain text file. See our how to create a text file page for steps on making a text-
only file.

The most common and widely used word processor program is Microsoft Word. However,
because of all of the different needs of users today, we've included additional options that are
available for creating a document.

Create a document with Google Docs


Google Docs is one of our favourite solutions for most users, especially those who are new
computers. The reasons we like it are because it's free, easy to access, supports collaborative
editing, can open other document files, and may be accessed from many devices. To create
a document in Google Docs, follow the steps below.
Create a blank document

1. Open Google Drive. If prompted, log into your Google account.

2. In the upper left-hand corner of the window, click the button.


3. In the drop-down menu that appears, move your mouse cursor over the arrow next to
Google Docs.

4. Choose Blank document from the box that appears.


Create a document using a template
1. Complete steps 1-3 in the previous section.
2. Choose From a template instead of Blank document.

3. Select a template from the window that appears.


Tip: Your newly-created document may be accessed in the My Drive section (first tab in the
left menu).

Creating a Document with Microsoft Word


To use Microsoft Word to open a document, follow the steps below.

Open Word in Windows

1. Open Microsoft Word. If you're not sure how to open or find Word, skip to the finding
Microsoft Word section.
2. In newer versions of Word, the first screen will ask what type of Word document you
want to create. Select the "Blank document" option to create a document from scratch.
You can also select from one of the Word templates provided if you would like to create
a specific type of document.
3. Once the blank document or template is open, any new information can be entered
using a keyboard or on-screen keyboard.
4. Once complete or while working on the document, you can Save through the File tab
at the top of the Word program window.

How to find Microsoft Word in Windows

1. In Windows, click the Start button.


2. In the search box, type word. If Word is installed, it will show in the search results. For
example, you may see Microsoft Word 2010, Microsoft Word 2013, or Microsoft Word
365.

In Windows 10, the search box is on the Taskbar next to the Start button. In
Windows 8, start typing word on the Start page and the search results will show on the right
side of the screen.
Note: Word and WordPad are two different programs. See the creating a document with
Microsoft WordPad section below for further information on this program.

How to install Microsoft Word

If Word is not found, it needs to be installed before it can be ran, or one of the other free
alternatives can be used.
Tip: If you've purchased Office or Word in the past, older versions of Office can also be
installed on newer computers, even those running Windows 8 or Windows 10. You must have
the installation discs to install Office or Word again.

How to open a new document if a Microsoft Word document is already open


Press the shortcut keys Ctrl+N simultaneously to open a new document.
- OR -
1. Click on the File menu or the File tab at the top of the program window.
2. Select the New option.
3. A prompt should open that presents you with several options. Select the Blank
document option.
Creating a document with Microsoft WordPad

Microsoft WordPad is a free rich-text editor included with Microsoft Windows for viewing and
editing rich-text files (.RTF, .DOCX, and .ODT) files. WordPad can perform basic text
formatting like changing the font, alignment, and even inserting multimedia. However, keep in
mind that it does not support all formatting options in .DOCX and .ODT files, so some
formatting may be incorrect. To open WordPad, follow the steps below.
1. In Windows, click the Start button.
2. In the search box, type WordPad and select the WordPad application in the search
results. Once open, you should see a blank window similar to the example below.
Tip: In Windows 10, the search box is on the Taskbar next to the Start button. In Windows 8,
start typing WordPad on the Start page and the search results will show on the right side of
the screen.

3. Type and create the document how you want it to appear.


4. After changes have been made to your document, you can save the file in the File
section.

If WordPad is already open and you want to create a new document

Press the shortcut keys Ctrl+N simultaneously to open a new document.


- OR -
In the menu bar, click File and select New. If the File tab or menu is not available, click on the

blue Menu tab in the top left-hand corner of the window and select New from
the drop-down menu that appears.
Creating a document with LibreOffice and OpenOffice

Libre Office and Open Office Writer are other great free products that allow anyone to create
documents on their computer and can even support most of the features in Word.
Below are the steps on how to run LibreOffice and Open Office in Windows.

Open LibreOffice and OpenOffice in Windows


1. In Windows, click the Start button.
2. In the search box, type writer. If LibreOffice or OpenOffice is installed,
either LibreOffice Writer or OpenOffice Writer will show in the search results.

In Windows 10, the search box is on the Taskbar next to the Start button. In
Windows 8, start typing writer on the Start page and the search results will show on the right
side of the screen.

What Is the Styles Feature?

In most cases, you’ll see Styles in the Home tab, slightly right of center. This section is
the Quick Styles Gallery.
Microsoft recently added Focus Mode to Office 2016 for Mac, which eliminates distractions
and helps you focus on your work.

If you don’t see the Styles pane, right-click anywhere on the menu box at the top of the Word
document. This is called the Ribbon.
Click Customize the Ribbon. Make sure the Home box under Main Tabs is checked and
click OK.

If the Styles pane still doesn’t appear on your Ribbon, you can add the Styles feature directly
by following the same steps as above and scrolling through the Popular Commands list to
the left of the Main Tabs box.
Click Styles then click Add.
If you get a message saying you have to create a new group, find the tab under which you’d
like Styles to appear. Click it and then click New Group. Rename the group Styles. Then,
give the steps above another try.
That action adds the horizontal toolbar above to the Microsoft Word Home tab. It also
provides a more detailed popup menu on the right of the screen.

What Do Word Styles Do?


Note the symbols to the right of each style. They indicate which document characteristic
(paragraph or font) the style changes.
See the current style of selected text header and the box underneath? That section tells
you about the style used in the document open on the screen. Unless something has
previously changed, it’s on the Normal setting now.
To view all the available styles in Word, just click Manage Styles at the bottom of the
expanded Styles box.

Now you know how to find Styles in Microsoft Word. By choosing a particular style, you set
parameters for the whole document. That means you avoid making manual changes.

Microsoft Word can help you be more efficient. It can automate much time consuming
processes, ensuring you spend less time messing around and more time writing. Take a few
minutes now to save hours later.
How Microsoft Word Styles Can Save You Time

Microsoft Word Styles help you automate the formatting of a document. Here’s how you can
make Styles more useful and save time.

1. Apply Styles to Sections of Poorly Formatted Documents


In many cases, you might have a formatted document that doesn’t look the way you want.
Fixing it is as easy as highlighting the text, then going to the Styles menu.
Select the existing words in the document, then select a style to apply to it. Just click the
desired style to choose it.

The action of highlighting the text first prevents the whole document from changing. That’s
why this tip is good to use if you like some existing formatting in a document but aren’t happy
with other parts. Instead of going through several stylistic alterations, achieve them in a
couple of clicks.

2. Quickly Make Changes to an Existing Style

Microsoft Word has various built-in styles. You may find many of them are almost what you
need, but not quite right. Thankfully, you can modify the style, making it completely suit your
specifications.
To get started, right-click any style in the Styles list. Choose Modify.
This opens the Modify Style window. Update the style however you like, and then click OK.
You can also select to apply this updated style to only this current document, or you can apply
it to new documents based on the current template.
If the style you’re modifying was already found in the Word Styles gallery, the Add to the
Styles gallery box is already checked. If not, you may want to check it to make the style more
accessible.

Maybe you’re taking a course, and the professor likes you to write essays with bright red
headers. That’s an example of why you might change a setting like this.
Use what you just learned if you’re generally happy with how a style looks. Your new
knowledge lets you alter specific things in seconds, without going through manual changes
later.

3. Create a Table of Contents with Styles


You may depend on Word for long projects, such as multi-section research papers or chapter
books. If so, a table of contents is essential. It sets expectations and tells people how to find
certain topics. This section also gives your document a professional look, but only if
properly formatted. That’s why Microsoft Word Styles could help you save time and get the
desired outcome.

Table of contents are a great way to keep your documents organized and improve navigation.
We show you how to create your own table of contents in four easy steps. Free templates
included. Just place your cursor on the part of the document where you want to feature the
table of contents.
Pay attention to the dialogue box that appears. Selecting Automatic Table 1 or Automatic
Table 2 speeds up the creation process.
A Manual Table gives more control than the automatic tables, but it will take longer to update
if you need to make changes in the future.
Check out the Custom Table of Contents option.
By selecting it, you can use Styles to alter how the table of contents appears. Click on Modify.
(You will only be able to do this if you’re using the From template format.)
If your table of contents has multiple levels, pick the one you want to change and click Modify.

You’ll then see the now-familiar dialogue box used when modifying a style. Switch
characteristics up as necessary, and then click OK.
4. Rely on Styles When Working with Tables

A table is more than a mere grid of cells. In Word, tables are not just containers for data but
essential formatting tools. Find out how to manage this dual role with eight simple tips. To view
charts in Word, click Insert, then Chart.

Select the kinds of chart you want to include in your document, and then click OK.
Now you’ll see a variety of Chart Styles and options appear in a new Design tab under Chart
Tools. Word automatically does this when you select a chart.
The Quick Layout option mostly alters the chart’s dimensions, without really adjusting the
overall format of the chart. For example, if you have a bar graph, the Quick Layout feature will
only allow you to adjust the format to other versions of bar graphs. By contrast, the Chart
Styles section allows you to change the chart’s background and 3D effects.
Don’t see an option you like? Go with the next closest one and modify the Chart Styles to suit
your design preferences. Then just right click on the chart and select Save as Template.
Name your template so that you can easily find it for similar projects later. For example, “Yearly
Report Chart” or “Sales Meeting Chart” might remind you that you already have a template for
the kinds of projects you’re most likely to recreate in the future.
To access this style again, just go to the Templates folder next time you insert a new chart.

Alternatively, if you’ve already created a chart and want to change the style, you can simply
click on the current chart, and then click Change Chart Type from the Chart Tools’ Design
section. Select the previously created template and click OK.
How Will You Use Styles This Week?
As you can see, whether working with text or charts, Styles is a time-saver. Even if this
functionality is brand new to you, you’ll find ways to make it boost efficiency.
Making changes by hand disrupts your creative flow. Thanks to Styles, you can speedily set
up your document and move on with your work.

Internal Assessment Criteria and Weight


● IAC0201 Define the term Word Processing
● IAC0202 List and describe different uses of word processing ( types of documents
created) to represent information to users
● IAC0203 Describe the benefits of using a word processor
● IAC0204 Describe the characteristics of a good document
KM-04-KT03: Understand and use presentation software

KT0301 Use basic features to create, edit and format a presentation


KT0302 Edit and format a presentation

Use basic features to create, edit and format a presentation

Microsoft Office/Creating and Editing a Presentation

The PowerPoint Window

1. Title Bar - Displays the name of the application followed by the title of the presentation
2. Formatting Toolbar - Provides quick access to commands you need for formatting
3. Outline and Slides Tab - The slides tab gives you a thumbnail view of all the slides in
the presentation and allows to rearrange their order; the outline tab adds textual
content to the slides in an outline format
4. Slide Pane - Area where you build the slides for your presentation
5. View Buttons - Change the way you view the presentation; the Normal view (left
button) is the default, the Slide Sorter view (centre button) shows you only the
thumbnails and is used to sort and rearrange the presentation, and the Run view (right
button) runs the presentation from the current slide
6. Drawing Toolbar - Provides all the tools you need to draw and format objects
7. Notes Pane - Adds notes for yourself for each slide in your presentation
8. Task Pane (Windows version) - Varies based on what you are currently working on;
when you first start PowerPoint, you see the New Presentation task pane; other
possible tasks include Slide Layout, Slide Design, and Effects
9. Menu Bar - Includes all of the PowerPoint menu choices
10. Placeholders - Designate the space that will be filled with titles, text, or other objects
such as graphics or charts
11. Application Close Button (Windows Version) - Exits PowerPoint
12. Presentation Close Button (Windows version) - Closes the current presentation

Create a New Presentation

Using a Design Template


1. If necessary, choose File > New to display the New Presentation pane
2. On the New Presentation pane, click on the From Design Template link
3. The Slide Design pane will display on the right side of the screen with a variety of
different templates to choose from
4. Select the design of your choice from the Slide Design pane
5. Click OK to begin working with the first slide in the Normal View

Using a Blank Presentation


1. If necessary, choose File > New to display the New Presentation pane
2. On the New Presentation pane, click on the Blank Presentation link
This will open a new presentation with no template. You will provide the content, background,
colour scheme, text format, etc. This method gives you the most freedom, but also requires
the most amount of time to complete.
Adding a new slide
Once you have opened a new presentation, the next step is to add and format the content.
PowerPoint provides a selection of pre-defined slide layouts based on different types of
content that you can use to quickly add content to the slides. For each of the 27 Slide Layouts
provided, PowerPoint combines the four types of placeholders in different combinations; each
placeholder will be replaced with the following type of content:
Slide Layout Placeholders

Placeholder: Replaced with:

Title A title

Subtitle A subtitle

Text A bulleted list

Content Clipart, a diagram, a chart, a table, a media clip, or a picture

Using a Slide Layout ensures that the text and other elements you enter into the placeholders
will have consistent spacing and be optimally arranged.

How to Add Slides to a Presentation


1. Click the New Slide button on the Formatting toolbar.
2. From the list of Slide Layouts, select the layout you want to apply to the new slide.
3. You may now begin adding content using the placeholders in the layout.

How to Change the Layout for any Slide


PowerPoint will try to guess what layout you want to use for new slides that are added to the
presentation. If you want a different layout for the slide you can quickly change the layout for
any slide.
1. Display the slide that you want to change in the Slide Pane (work area in the centre of
the window).
2. Choose Format > Slide Layout to display the Slide Layout task pane.
3. Click on the layout you want to apply to the slide.
4. PowerPoint will attempt to fit existing content into the new layout, but you will probably
have to make additional changes.

How to Add Slides in the Outline Tab


You can also create new slides while working in the Outline tab. By default, the Outlining
toolbar should display, but if it does not, select View > Toolbars > Outlining.
1. Display the Outline tab by clicking on Outline in the pane on the left.
2. Place the cursor at the end of the text in the slide you wish the new slide to follow.
3. Click the New Slide button to insert a new slide.

Entering Text on a Slide

Enter Text on a Slide Using Placeholders


1. Click on the Title, Subtitle, or Text placeholder.
2. Type the text you want.
3. If necessary, press [Return] or [Enter] to move to a new line.
4. Click anywhere on the slide outside of the placeholder to deselect it.

Enter Text Using the Outline Tab


Working in the Outline Tab allows you to type and edit text for the presentation in a more
word processing-like environment than the Slide pane. The Outline tab displays in the pane
on the left side of the screen when you are working in the Normal view.
Information in the Outline tab is arranged by levels. The Title of each slide appears as the first,
left-most level next to a numbered icon of the slide. Bulleted text is indented one to four levels
to the right of the title. The Outline tab has an Outlining toolbar that displays to the left of the
pane.

If the Outline and Slides panes are not displaying in the Normal view, select View
> Normal (restore panes) and it will display on the left side of the screen.

1. After adding a new slide, Type the slide title and press [Return] or [Enter].
2. To change the slide text to a first level bullet, press [Tab] or click the Demote button
on the Outlining toolbar.
3. Type the text for the first bullet and press [Return] or [Enter] to move to the second
bullet.
4. To create a sub-bullet, press [Tab] and type the text.
5. Continue to enter text for bullets and sub-bullets until the slide is complete.
● Use [Return] or [Enter] to create a new instance of the same level you are on.
For example, if you are typing a level one bullet,
pressing [Return] or [Enter]will create another level one bullet.
● To demote a line of text, use [Tab] or the Demote button. This will make a level
one bullet into a level two sub-bullet.
● To promote a line of text, press [Shift] and [Tab] together or click on
the Promote button. This will turn a level one bullet into the Title of a new slide

Adding Clip Art to a Slide


Effective visuals emphasize the key content points in a presentation. PowerPoint provides a
selection of professionally designed pictures, or clip art, that you can use in your presentations.
These clip art images include many different themes such as animals, people, buildings, food,
holidays, business, and more.

How to Insert a Clip Art Image


1. Move to the slide on which you want to place clip art.
2. Apply a Slide Layout that includes content or clip art placeholder.
3. Open the Select a Picture dialog box by:
● Clicking on the Clip Art button on the content placeholder OR
● Double-clicking on the clip art placeholder
1. In the Search box, type a word or phrase that describes the clip you want.
2. Click Search. PowerPoint displays the search results in the Select Picture List.
3. Click on the clip art image you want and click OK.
How to Resize a Clip Art Image
Once you have added a clip art object to your slide, you can resize it to make it fit better into
your presentation.
1. Click on the Clip Art object to select it.
2. Put the arrow on one of the resize handles at the corner of the picture until the cursor
changes to a double-headed arrow.
3. Depress the mouse button and drag the handle toward or away from the centre to
make the image larger or smaller. The corner handles resize the image proportionally
and the handles on the sides of the image increase or decrease the height or width of
the image. When you release the mouse button, the object appears in its new size.

Editing Slide Text


You know how to enter text into your presentation, but what happens if you decide you want
to change the text? PowerPoint allows you to navigate to a specific slide and change the text.

Navigate in a Presentation
To Move to: Do this:

The last slide in the Drag the scroll box to the bottom of the scroll bar or
presentation press [Ctrl] and [End]

The first slide in the Drag the scroll box to the top of the scroll bar or press [Ctrl]
presentation and [Home]

The next slide in the Click in the scroll bar below the scroll box or press [Page
presentation Down]

The previous slide in the Click in the scroll bar above the scroll box or press [Page
presentation Up]

Drag the scroll box up or down until the scroll indicator


To a specific slide
displays the slide you want

Selecting Text
Knowing how to select text is a critical skill in all Microsoft Office applications. Selecting text
is a necessary step for many procedures such as deleting blocks of text or formatting.

Selection
Technique
Method
To create a highlighted selection, point at one end of the text to be selected.
Drag Press and hold the mouse button while dragging the pointer to the other end
of the text, then release the mouse button.

Select a
Double-click anywhere on the word you want to select
word

Select a Press [Ctrl] and click anywhere inside the bulleted text. You may also triple-
bullet item click anywhere on the word you want to select.

Deselect Make another selection or click the mouse button in the text area.

How to Edit Text in a Slide Pane


You can edit text or move bulleted text in the Slide pane or the Outline tab. To edit text in the
Slide pane:
1. Select the bulleted text you want to change.
2. If necessary, edit the text by:
● Pressing the [Delete] key to delete the text; or
● Typing new text to replace the selected text.
1. If necessary, move the bulleted item by:
● Selecting the entire bulleted item; and
● Dragging the item up or down to move it to its new location.

Move Bulleted Items in the Outline Tab


You can change the order of bulleted items and slides in the Outline tab:
1. Select the slide or bulleted item you want to move.
2. Click the Move Up or Move Down button on the Outlining toolbar until the slide or
bulleted item appears where you want it.

Internal Assessment Criteria and Weight


● IAC0301 Define the term presentation software
● IAC0302 List and describe different uses of presentation ( types of presentation
created) to represent information to users
● IAC0303 Describe the benefits of using presentation applications
● IAC0304 Describe the characteristics of a good document
● IAC0305 Discuss how presentation are used to convey information and knowledge
and list practical examples of such cases
KM-04-KT04: Understand and apply GUI based spread sheet application skills

KT4001 Spreadsheet applications

Spreadsheet applications

Spread sheet Applications

Spreadsheets are frequently used to record information and perform calculations on the
results of investigations and experiments. In mathematics, spreadsheets are particularly
useful when a number of repetitive calculations need to be performed. The main features of
the Microsoft Excel spreadsheet are described below. Open a new Excel spreadsheet to help
you identify the features described.

Rows, columns and cells


● Horizontal rows are labelled 1, 2, 3, 4, … and vertical columns are labelled A, B, C, D,
● The intersection of a row and a column is called a cell.
● The cell at the intersection of column A and row 1 is referred to as A1.
● The highlighted rectangle on the screen is called the cell pointer and the cell
containing the cell pointer is called the active cell.
● Note that Excel contains 256 columns labelled A, B, C, …, AA, AB, …, AZ, …, BA, BB,
BC, …, BZ, CA, CB, CC, …, CZ, …. and it contains 65 536 rows labelled from 1 to 65
536.
Standard toolbar
The Standard toolbar provides easy access to frequently used functions such as save, cut,
copy, paste, etc.

Formatting toolbar
The Formatting toolbar provides easy access to commands such as bold, italics, font,
alignment of text, etc.
Creating a simple worksheet
Two of the data types that can be entered into the individual cells of the worksheet are:
● Text (labels) - used to make a worksheet more readable by identifying rows and
columns.
● Numbers (values) - the numeric characters 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9 are used to
write numbers in the cells. The numbers can also begin with a + or – symbol.

Entering data into a worksheet


The points won by David and Peter in table-tennis match are shown in the table below.

On your spread sheet, enter this data as follows:


● To key in David, move the cell pointer to B1 and type David. Then press Enter.
● To key in Peter, move the cell pointer to C1 and type Peter. Then press Enter.
● To key in 15, move the cell pointer to B2 and type 15. Then press Enter.
● To key in 21, move the cell pointer to B3 and type 21. Then press Enter.
Similarly, we can enter the remaining data.

Editing techniques
● To erase a mistake made while keying in data, use the Backspace key.
● To replace data already entered with other data, move the cell pointer to the cell and
type the new data. Then press Enter. The new data will be displayed in the cell.

Erasing the contents of a cell


To erase the contents of a cell, move the cell pointer to the cell concerned and press
the Delete key. Note that if data is deleted accidentally, the last item deleted can be recovered
by pressing Ctrl + Z or by clicking the Undo button.

Formulas
Numerical data is manipulated by using a formula.
For example, =B2+B3+B4 is a formula that will add the contents of cells B2, B3, and B4.
Note that if the first keystroke is not the equal sign (=), Excel will assume that you have entered
a label and will not calculate a formula.

A formula is an instruction given to Excel to make it perform calculations. In the example


above, a formula is used to add the contents of the cells. Now, we will create formulas for
performing subtraction, multiplication and division of the contents of two or more cells.
The formula bar contains the formula or cell contents in a cell and can be used for editing a
cell's formula. To find the formula bar, repeatedly select Formula Bar from the View menu in
Excel until you can identify it.

Adding the contents of the cells


To find the sum of the points scored by David, move the cell pointer to B5 and key in the
formula =B2+B3+B4. Then press Enter.
The sum 57 is displayed in cell B5.
Likewise, to find the sum of the points scored by Peter, moves the cell pointer to C5 and key
in the formula =C2+C3+C4.Then press Enter.
The sum 42 is displayed in the cell C5.

Finding the average of the contents of the cells


In the example above, to find the average number of points scored per match by David, move
the cell pointer to B6 and key in the formula =B5/3. Then press Enter.
The average score, 19, is displayed in cell B6.

Likewise, to find the average number of points scored per match by Peter, move the cell
pointer to C6 and key in the formula =C5/3. Then press Enter.
The average score, 14, is displayed in cell C6.
Internal Assessment Criteria and Weight
● IAC0401 Define the term spreadsheet processing
● IAC0402 List and describe different uses of spreadsheet ( types of documents created)
to represent information to users
● IAC0403 Describe the benefits of using a spread sheet application
● IAC0404 Describe the characteristics of a good document
● IAC0405 Duscuss how spreadsheets are used to transform data into useful information
and list examples of such cases

KM-04-KT05: Create, send and receive e-mail messages


KT0501 Concept and terms of electronic messaging
KT0502 Email etiquette
KT0503 Internet, e-mail and network e-mail
KT0504 Various Outlook components
KT0505 Format messages
KT0506 Create email folders
KT0507 Move messages to a folder
KT0508 Contacts
KT0509 Internet basics
KT0510 Intranet and the extranet
KT0511 Viruses
KT0512 Spam
KT0513 Trash

Concept and terms of electronic messaging

In general, messaging (also called electronic messaging) is the creation, storage, exchange,
and management of text, images, voice, telex, fax, e-mail, paging, and Electronic Data
Interchange (EDI) over a communications network

Electronic messaging may refer to:

One-to-One communication
● Instant message (on a computer network)
● Personal message (on a computer network)
● Text message (on a cellular phone network)
● SMTP (on a computer network)
● Email (on a computer Network)
● Voicemail (using the PSTN)
● Fax (using the PSTN)
● Pager (using the PSTN)

One-to-Many communication

● Bulletin board system (on a computer network)


● Internet forum (on a computer network)
● Internet Newsgroups on the Usenet (on a computer network)

Create, send and receive e-mail messages

Creating, sending, and receiving email


The New Message windows
Click the toolbar’s New Message button, or press Command-N, and the New Message
window appears. It has its own toolbar that contains, by default, the following buttons: Send
Message, Attach Document, Show Format Bar, Show/Hide Photo Browser, and Show/Hide
Stationery Pane. Like Mail’s toolbar, this one is also customizable. Just Control-click (right-
click) the toolbar, choose Customize Toolbar, and from the sheet that appears drag the tools
you want to the toolbar. From this moment forward, those buttons will appear in every New
Message window (or at least until you hold down the Command key and drag them out).

Below the toolbar are the To, Cc, and Subject fields. They shake out this way.
The To field: This is where you enter the email addresses of those you wish to send the
message to. You can do this in a couple of ways. The first is to simply click in the field and
type the address—[email protected], for instance. To enter multiple email addresses in
this manual way, place a comma after each recipient (except the last one, of course).

The To field also supports auto fill, meaning that if the person you’re intending to send a
message to is in your list of contacts or you’ve received a message from this person in the
not-too-distant past, all you have to do is start typing their name and a list of matching contacts
will appear. Select the one you want, press Return, and the complete address will appear in
the field.

Alternatively, you can expose the Address panel (select Window > Address Panel or press
Command-Option-A) and double-click on contacts you want to add. (If the contact has more
than one email address, double-click the one you want to use.) If you’d like to add a group, it’s
the same idea—double-clicks on the group to add all its members who have email addresses
to the To-field. (Stay tuned for a tip on why you might not want to do this.) To remove a recipient
from the To-field, just select the email address and press the Mac’s Delete key.
Use the Address panel to add recipients.
The Cc field: Seasoned readers will know that Cc stands for Courtesy Copy (some also refer
to it as Carbon Copy) and is the email way of indicating “This message isn’t really directed at
you, but it’s something you should be aware of.” You might, for example, use the To field for
people you’re collaborating with on a work project and Cc the boss so she’s aware of your
progress.

Before we get to the Subject field, here’s that promised tip about the To and Cc fields. There
will be times when it’s unwise to use either. Suppose, for example, you’ve composed a
somewhat delicate message with 25 recipients. If you place those 25 addresses in the To field
(or split some of them out to the Cc field), everyone who receives that message is now aware
of every email address you’ve exposed. This can be a Bad Thing, because some people prefer
that such an address not be shared with every Tom, Dick, and Mary you know.

The Bcc field: It’s for this reason that the Bcc (Blind Courtesy Copy) field exists. Any
addresses placed in the Bcc field are not exposed to your recipients. A helpful technique many
people use is to put their own address in the To field (because you have to
put something there) and place all other addresses in the Bcc field.
And where is this alleged field? Just choose View > Bcc Address Field (or press Command-
Option-B), and it will appear below the Cc field. Once you’ve enabled this option, Bcc will
appear in every New Message window you create.

The Subject field: Every message you send should have a Subject field. And, as its name
implies, this field is where you put a word or short phrase that describes what your message
is about.

The-From menu: If you have multiple email accounts configured in Mail, you can choose
which account to send from via this menu. Why? Suppose you have both work and personal
email accounts configured on your Mac. For work-related messages you’ll want to send from
your work address. For messages complaining to your friends about your work, you’ll use your
personal address.

The Customize menu: To the left of the From pop-up menu is the Customize menu. Click it
and you have options for showing or hiding the Cc, Bcc, Reply-To, and Priority fields. As I
explained when discussing Bcc, once you enable one of these fields, it will appear in every
New Message window. When you choose Customize from this menu, the top of the New
Message window expands and shows you every possible field. Tick the checkbox next to
those fields that you always want to see when composing a new message.

The Reply-To field: Like Bcc, this is another field that’s hidden by default. There may be times
when you want to send a message from one account, but receive any replies to it with a
different account. For example, you’ve sent a message from your iCloud account but want
replies to go to your Gmail account. Place your Gmail account’s address in the Reply-To field,
and when people receiving your message press Reply, their messages will be sent to that
Gmail account.

The Priority menu: It’s possible to mark messages you create as Low, Normal, or High
priority using this menu. Recipients will see your message marked with two exclamation marks
(!!) if it’s sent as high priority.

If all of your messages are high priority, none of them are. And by that I mean that you should
save high priority for only those occasions when something is really, really important—as in,
we’re-all-going-to-be-fired-if-you-don’t-reply-immediately or Timmy-fell-down-the-well
important. Mark each of your kid’s softball game announcements or an entirely uninteresting
press release as high priority, and the people you communicate with will learn to ignore your
messages. In short: Don’t cry wolf.

Composing messages
Finally, to the message body—that large area at the bottom of the New Message window that
begs to be filled. You could, of course, simply click in this area and start typing, but there are
more interesting ways to fill this void. To see what I mean, let’s return to the toolbar.

Attach Document: This first button is one way to send one or more files along with your
message. Click it and a navigation sheet appears which you use to choose the documents
that will be bundled with your message.

Attachments appear inline, meaning that rather than displaying attachments in some kind of
field, they appear in the message body. Image and media files display a preview, whereas
other kinds of documents—Microsoft Word or Apple’s Pages files, for example—appear as
document icons. This inline business doesn’t affect how your recipients will see the
attachments. Rather, the configuration of their email client determines how attachments are
displayed.

You don’t have to use the Attach Document button to add attachments. If you
like, just drag attachments into the message body from the Finder.

Also, be aware of the size of your attachments. It’s not unusual for messages that total more
than 10MB to be blocked by one of the Internet service providers responsible for delivering it.
If you have large files to send to someone, find another avenue such as Drop box or Sugar
Sync for sharing those files.

Show Format Bar: By default, new mail messages are formatted as rich text. Rich text can
be formatted using different fonts, sizes, colours, and justification, much like you’d format text
in a word processor. Plain text is exactly that—no italics, boldface, or colours.
Speaking of rich text, your message will be more readable (and look more professional) if you
keep the formatting to a minimum.
Show/Hide Photo Browser: Want quick access to your iPhoto library so you can easily attach
an image? Click this button, and an Image Browser window appears that includes the contents
of your iPhoto library arranged by events, photos, faces, places, and albums you’ve created.
(If you’re using Apple’s Aperture, its library will appear here as well, as do the images you’ve
captured with Photo Booth.) Browse to the images you desire and drag them into the message
body.

Show/Hide Stationery Pane: Apple’s Mail includes stationery templates much like Pages
includes templates for creating newsletters and business correspondence. Click this button
and you find six stationery categories—Favorites, Birthday, Announcement, Photos,
Stationery, and Sentiments. Within the latter five categories are a number of options—Dinner
Party and Baby in the Announcements category, for example. Select one, and the template
appears in the message body, complete with boilerplate text and, in some cases, images.

Just edit this text to personalize it, drag in images to replace those of the lovely models, and
send. How your recipients see these messages depends on the configuration of their email
clients. Some will see everything inline as intended, while others will receive the stationery as
an attachment.

Another warning regarding taste: For certain kinds of correspondence, these templates may
be a little too cute or casual. Be sure your recipient will appreciate them.

Receiving email
Now that you’ve propelled your thoughts into the world, there’s every chance that you’ll receive
replies to them. Let’s look at getting the messages that are rightfully yours.

When we talked about the anatomy of the Mail window, I told you that you could check for
email any time you liked just by clicking the Get New Mail button on the left side of the Mail
window’s toolbar. (Or by clicking and holding on the dock’s Mail icon and choosing Get New
Mail.) While this gives you absolute control over when you receive your email, it can keep you
from dealing with important messages in a timely manner. Email pros choose, instead, to
automatically receive messages on a regular schedule.

You configure that schedule by choosing Mail > Preferences (Command-comma) and clicking
the resulting window’s General tab. In this window, you’ll spy the Check For New
Messages pop-up menu. From this menu you can choose to check for new mail every 1, 5,
15, 30, or 60 minutes. Or you can choose to receive email only when you issue the Get New
Mail command.
Use the General preference to choose how often Mail checks for new messages.
With one of these automatic options configured, Mail will do its duty and grab what new email
is available. Unless you’ve configured your account to file messages in some other way (a
subject we’ll visit in an upcoming column), your new messages will appear in the inbox in the
Messages pane. Mail needn’t be the front most application to receive email, but it has to be
running.

When you receive new messages, by default you’ll hear a new message sound and the Mail
icon in the dock will bounce. You’ll also see a badge in that icon’s top-right corner indicating
the number of unread messages in your inbox.
Click the inbox and, as I explained in the last lesson, you’ll see a list of your messages in the
Messages pane. New messages are marked with a blue dot. Any messages colored orange
are considered by Mail to be junk. Select a message and its contents will appear in the
Message Viewer area.
Intranet and the extranet

Intranets
Definitions of intranets vary by source, due to the vast range of functions and capabilities
available. However, at their most basic level, intranets can be defined as private networks,
accessible only to an organization’s staff. Commonly, intranets are used to:
● Communicate within the business: both top-down and bottom-up by distributing
news and announcements, providing feedback and sharing information
● Manage documents and business information: intranets offer a centralized location
to host, search and access vital business content
● Facilitate common business processes: through use of workflow and forms, an
intranet can enable users to self-serve for many common business processes, such
as booking holidays or reclaiming expenses
● Enable collaboration: functionality such as team areas, forums, blogs and social
tools can support employees to work together effectively, regardless of their
department or location
● Support strategic business objectives: these may span improved employee
engagement and morale, embedding a business culture, increasing staff retention or
encouraging better productivity and efficiency
At their most basic level, intranets support employees to do their jobs. In an increasingly
globalized workplace, they provide huge benefits by connecting employees across
organizations and providing the digital tools they need to perform and thrive.
From a strategic perspective, these benefits have measurable impact on the employee
experience within the workplace. This, in turn, enhances the experience they deliver for
customers – and ultimately contributes to bottom line benefits and business success.

Intranet portals
Perhaps the easiest way to understand where the distinction lies between an intranet and an
intranet portal is to step back and consider the definition of a portal in isolation:
The focus is on providing access, or an opening. An intranet portal, therefore, is an intranet
platform or window that acts as a doorway to other sites, applications or tools outside of the
intranet itself.

Intranet portals in a connected digital workplace


Employees have increasingly high expectations of the technology they use in the workplace.
In fact, a trend towards improving ’employee experience’ and viewing our staff as
consumers has caused a shift in enterprise technology development in recent years.
The desire to improve user experience, maximize productivity and support employees to
collaborate now means that the ability for applications to seamlessly connect to other systems
is top of the priority list for many organizations.

In simple terms, this means users can access multiple applications and tools from one place,
often using a single login, without having appearing to leave their intranet at all.

Extranets
An extranet permits controlled access to authorized external users to a company intranet.
Essentially, extranets take the concept of an intranet to another level, allowing customers,
vendors, partners or selected third parties access to a company intranet, or selected areas of
it. Extranets offer the same benefits to users as an intranet: centralized hosting of content and
information, ensuring a single version of truth and efficiency, alongside communication and
collaboration tools.
This can prove extremely valuable in organizations where you need to share information or
confidential data with a third party, by providing a more secure and efficient process than
traditional channels such as email.
For example, an organization can provide extranet access for a supplier to manage ordering,
tracking and inventory management, improving efficiency and lowering business overheads.
In a collaborative industry such as healthcare, extranets can be used to bring together different
care providers or Trusts to share best practice and improve patient care.
If your organization is undertaking a project that requires input from third party vendors, limited
access can be provided to support efficient collaboration. With effective security and
permissions settings, dedicated areas of your intranet can be opened securely to third parties,
while protecting your company assets.
Intranet vs. Intranet Portal vs. Extranet
As the digital workplace continues to evolve, more and more organizations are looking to bring
together dispersed or silo-ed employees and partners to communicate and collaborate more
effectively.
The demand for streamlined processes and better collaboration means the terms ‘intranet’
and ‘intranet portal’ are already used interchangeably; going forward, this may become the
case for extranets also. Intranets will have these forms of functionality automatically built in,
answering the demand of the consumer. It will simply be a matter of choice as to how and
when we elect to use those features.

(With integration functionality, your company intranet can serve as the hub for all business
processes, applications and content: streamlining day-to-day tasks and improving the user
experience. It’s an intranet portal or ‘doorway’ for your business, but on another level.)

Internal Assessment Criteria and Weight


● IAC0501 Identify the major applications of the internet
● IAC0502 Identify how the World Wide Web can be applied in the intranet and extranet
● IAC0503 Search internet for reliable information
● IAC0504 Open the electronic diary and create an event
● IAC0505 Apply security to settings to minimize viruses, trash and spam
KM-04-KT06: Demonstrate ability to use the World Wide Web

KT0601 Introduction to the internet

Introduction to the internet

The term "Internet" is a generalization that covers thousands of interconnected networks


around the world based on very different technologies. The networks differ in almost any
possible network specific parameter such as transmission medium, geographical size, number
of nodes, transmission speed, throughput, reliability etc. The only reason why this
generalization is possible is because the Internet is based on an abstraction that is
independent of the physical hardware. In short, it represents a homogeneous interface to its
users in spite of the heterogeneous hardware that it is based on.

The diversity among networks connected to the Internet is partly due to an evolution of
technology resulting in new networks having higher reliability, better throughput etc. However,
there will (at least for a long time) exist a need for fundamental different network architectures
as no network technology today can supply a solution that covers all aspects of
internetworking.

This section introduces the basic architecture of how the Internet is organized. The description
starts at a certain abstraction level that does not include a description of the underlying
physical network technologies such as Ethernet, Token Ring, FDDI etc. These are all
described in Computer Networks. The basic idea of an internet is to provide the possibility of
transporting data from one network to another through a connection in a way that both parties
agree on and understand. The connection between the two consists of a gateway computer
that is physically or logically connected to both networks (logically in the case of a cordless
network). The situation between two networks looks like:
Each cloud is a network with an arbitrary number of connected nodes. The gateway between
them serves as the only way of exchanging data directly between the two networks. Later in
this chapter it is described how two hosts can communicate even though they are not
connected directly but must go through intermediate networks.

Address Scheme
In order to reference any node as a unique point on the Internet, a global two dimensional 32-
bit integer address space has been defined which gives a maximum number of 4G connected
nodes on the Internet. The first element is a noted and the second is a nodded, that is:
Address = (noted, hosted)
A common notation for specifying an Internet address is by using four fields of decimal integer
numbers ranging from 0 to 255 separated by decimal points, e.g.:
128.141.201.214
. which is the IP-address of the World-Wide Web info server at CERN.

Address Classes
In order to provide IP-addresses which suit both large networks with millions of hosts and
small networks with a few hundred hosts, the noted part and the hosted part can occupy a
varying part of the IP-address. The number of possible nodes on a network, being the number
of bits assigned to the hosted, categorizes the address space into 5 classes:

The definition of the classes is as follows:


Class A
This class has a 1 byte noted and a 3-byte hosted. As networks in this category are
characterized by having a 0 as the first bit in the address, the maximum number of networks
is 128. However, as 24 bits are available for the hosted, each network can contain 16M
connections. A network can be categorized by the first fields in the address and for a Class A
network the value of first field is in the range 0-127.
Class B
Class B networks have 2 bytes for the noted, but as they are required to start with the bit
combination 10b, the maximum number of networks is 16K. The number of connected nodes
is 64K and the value of the first field ranges from 128-191 and the second from 1-254.
Class C
This class is for small networks with a maximum number of nodes limited to 256. This class is
characterized by having the leading bit pattern 110b which leaves the maximum number of
networks to 2M. The value of the first field is from 192-233, the second from 0-255, and the
third from 1-254.
Class D
Class D networks are networks without the possibility of addressing any individual node. All
32 bites are used by the noted and hence any reference to the network is automatically a
broadcast message to all the connected hosts. The characteristic leading bit pattern for this
class is 1110b.
Class E
This is currently not in use but reserved for future use. However, the characteristic leading bit
pattern for this class is defined as 11110b.
From this description it can be seen that the IP-address given above is a Class B network with
the possibility of 64K nodes.

An interesting thing to note about having the IP-address containing information of the network
is that a gateway as a consequence of being connected to two networks must also have two
IP-addresses in order to be accessible from both sides. This is the reason for not referring to
a number of hosts but nodes or connections to the network. In the Gateways and Routing it is
described how the current addressing scheme influences the routing algorithms used on the
Internet.

Physical Addresses
It is important to note that Internet addresses are an abstraction from the addresses in a
physical network implementation like Ethernet. They assure that the same addressing scheme
can be used in every part of the Internet regardless of the implementation of the underlying
physical network. In order to do this, a binding must exist between the IP-address and the
physical address. Dependent on the physical network addressing scheme, this binding can
either be static or dynamic. An example of the latter is the Ethernet addressing scheme that
is a 48-bit integer. As it is not possible to map 48 bit into a 32-bit IP-address without losing
information, the binding must be determined dynamically. The Addressing Resolution Protocol
(ARP) is specially designed for binding Ethernet addresses dynamically to IP-addresses but
can be used for other schemes as well.

Sub networks
As will be explained in the section Gateways and Routing, Internet routing between gateways
is based on the noted part of the IP-address. In the past few years a very large number of
small networks with only a few hundred nodes have been connected to the Internet. Having
so many nets makes the routing procedure complicated and time consuming. One solution to
this is to introduce a subnet addressing scheme where a single IP-address spans a set of
physical networks. This scheme can also be used to divide a large number of nodes into logical
groups within the same network.
The scheme is standardized and described in the RFC IP Subnet Extension. The idea is
basically to use three coordinates in the IP-address instead of two, that is:
Address = (noted, submitted, nodded)
However, the submitted only has a special meaning "behind" the front subnet gateway. The
rest of the Internet cannot see it and treats the submitted and the nodded as the hosted. Only
the gateways indicated in the figure need to know of the subnets and can then make the
routing accordingly.
Furthermore, the subnet hierarchy does not have to be symmetric. This is indicated in the
figure where subnet 3 and 4 are subnets of subnet 2, whereas subnet 1 does not have any
subnets.
A 32-bit subnet mask for each level in the subnet hierarchy is required in order to make the
gateway routing possible between the subnets. This mask specifies what part of the IP-
address is submitted and what part is the nodded by simple Boolean Ending.

Special Addresses
One advantage of having the network encoded as a part of the IP-address is that it is possible
to refer to the network as well as individual hosts. Three special cases have been specifically
allocated for exploiting this feature:

Broadcast Messages
It is possible to generate as broadcast message to all nodes on a network by specifying the
noted and letting the hosted be all 1s. However, there is no guarantee that the physical actually
supports broadcast messages, so the feature is only an indicator. It is not possible to make a
broadcast message to the whole Internet in one operation. This is to prevent the network from
flooding the Internet with global broadcast messages.

This network
Situations might appear where a host on a network does not know the noted of the network
that it is connected to. This happens every time a host without stationary memory wants to get
on to the net. However, the host does know its physical address which is sufficient for
communicating locally within the network. In this situation it sets the noted to 0 and sends out
a broadcast message on the local network. Two Internet protocols are available for doing this:

Reverse Address Resolution Protocol (RARP)


This protocol is adapted from the Address Resolution Protocol that is especially created to
resolve 48-bit physical Ethernet addresses into 32-bit IP-addresses. Only a dedicated RARP
server on the network will answer the reply by filling out the noted and send it back to the
requester. In case the main RARP server is down a backup RARP can be chosen to perform
the job.

Internet Control Message Protocol (ICMP)


This is a generic low-level error and information protocol that can be used for sending error
and information messages between any host gateway (also from gateway to gateway and
host to host). It also has the possibility of sending out a simple information request message,
and this can be used to obtain the noted of the network. In this situation, the gateways on the
local network will respond to the request with an information message having the right noted.

Local Host
By convention the Class A address 127.0.0.1 is known as a loopback address for the local
host. This address provides the possibility of accessing resources local to your own system.
On Unix platforms, this is defined in the /etc./hosts system file.

Domain Name Server


This section is an introduction to the Internet Domain Name Service (DNS). See DNS and
Bind for a complete description of the service. The DNS is built on top of a distributed database
where every data record is indexed by a name that is a part of the Domain Name Space. The
index itself is a hierarchically organized tree structure as illustrated in the following figure:

where the top node is called the root domain with the null label (empty string) but referenced
as a single dot. Each node in the tree is labelled with a name consisting of at most 63
characters taken from the set of
● letters from A-Z (case insensitive)
● digits from 0-9
● hyphen
The advantage of having a hierarchical structure of the name space is that administration of
the space can be delegated to different organizations without any risk for name collision. This
is very important as the size of the DNS database is foreseen to be proportional to the number
of users on the Internet as the database not only can contain information about hosts but also
about personal mail addresses.
The structure shown above is very similar to the Unix file system. The most important
difference is that a record in the DNS database is indexed from the bottom of the tree and up
whereas a Unix file is indexed from the top of the tree, e.g.:
info.cern.ch
The info is the host name and the cern.ch is the domain name.
/usr/local/bin/emacs
emacs is the file name and /usr/local/bin is the path
Another similarity is aliases that are pointers to the official host name in the DNS database. In
the Unix file system, it is implemented as (soft) links.

DNS is a client-server-based application consisting of the Domain Name Servers and the
resolvers. A server contains information about some segment of the DNS database and makes
it available to clients or resolvers. Resolvers are often just software libraries that are linked
into any Internet program by default.

In the next section it is described what happens when a host has more than one physical
connection to the Internet and hence more than one host name.

Gateways and Routing


When a message is to be sending from one host to another, some mechanism must provide
the functionality of choosing the exact path of which the message is to be transmitted. When
routing a message, two distinct situations can occur:

Direct Routing
The transmitting and receiving host are connected to the same physical network

Indirect Routing
The transmitting and receiving host are separated by one or many networks
In the first case, routing is a question of resolving the IP-address into a physical address as
described in Physical Addresses. Then the sender encapsulates the IP-datagram into physical
frames and sends it directly to the destination. This section will give an overview of how the
latter case is handled using gateways.

Routing does not lead to changes in the original message. The source and destination address
remain the same. The source always specifies the address of the original host and the
destination address is that of the destination host. The original message is instead
encapsulated in another message in order to specify the next hop address.

The standard routing algorithm used on the Internet is based on routing tables situated in
every gateway. An advantage of the Internet Address Scheme is that it is sufficient for a
gateway to look at the noted part of the IP-address in order to find the destination network.
Only the gateway directly attached to the destination network needs to look at the hosted in
order to resolve the IP-address into a physical address.
However, even if the routing tables only contains nets, it would be impossible to have routing
information on every node on the Internet. The solution to this problem is to use partial routing
information. The idea is to first look at the routing table to see if the noted is there. If it is not
then the gateway sends the IP-datagram to a default destination as illustrated in the following
figure.

As the default gateway again might send it to its default destination a mechanism must assure
that the routing converges towards the final destination. This guarantee is provided by a set
of core gateways that contain full routing tables. All partial routing finally ends up in an core
gateway and the message can then be directed to the right subnet of the Internet.
Until no assumptions have been made on how the gateways actually get the routing tables
and how updated information gets spread throughout the Internet. There are several protocols
to do this but before mentioning them, it is necessary to look into the organization of gateways
on the internet.

The CORE Gateways are a small group of gateways such as the NFSNET backbone net
which guarantees that the partial routing algorithm will converge towards a final destination.
An autonomous system is a set of networks organized under the same administrative
authority. All routing information within the system are passed to other autonomous system
via a few exterior gateways close to the outer edge of the system. The protocols indicated in
the figure are shortly summarized below:
GGP Gateway-to-Gateway Protocol
This is set of protocols used internally between core gateways in order to exchange updated
routing tables. They are often based on the Shortest Path First (SPF) algorithm where a data
base contains the complete network topology and connectivity in every gateway. Then the
core gateway can compute the best shortest routing path and guarantee that it will converge.

EXP Exterior Gateway Protocol


The Exterior Gateway Protocol is used to exchange routing tables between a few dedicated
gateways across autonomous systems.

IGP Interior Gateway Protocol


Actually, this is a set of different protocols that all have the same purpose of having consistent
routing tables internally in an autonomous system. The best known is Routing Information
Protocol (RIP). This protocol is based on a vector distance algorithm defined as the minimum
number of hops between gateways. International Standards Organization (ISO) has defined
the Intermediate System-to-Intermediate System (IS-IS) as another IGP protocol. This means
that OSI Networks and TCP/IP networks can share routing information.

Problems in the Internet Model


Now when the basic properties of the Internet model have been introduced some problems or
weaknesses in the current model have become clear. This section will shortly summarize the
most important limitations in the current Internet architecture.

Address Scheme
The basic disadvantage of having the noted as a part of the IP-address is that if a host is
moved from one place to another it must have a new IP-address. As more and more portable
computers are connected to the Internet this has turned out to be a real problem in the address
scheme.

Routing
When routing is based on the noted of the IP-address multi-homed hosts might have a
significant difference in access time dependent of the IP-address used.
If Host B in the figure wants to communicate with Host C in the figure and chooses the IP-
address of node e then the message have to go through Host A. Unless the system
administrators explicitly have told the local part of the Domain Name Service to return the IP-
address of node d there is no way for Host B to know the optimal route.

Security
Another important aspect not described here is security considerations when using the
Internet. What means do people have to gain access to classified information when
communicating to Internet sites? Today security precautions on the Internet are often based
on the assumption that the transport service provided by the Internet can be considered as a
trusted carrier. This is equivalent to the generally accepted assumption that letters send via
the public postal system is actually delivered to the addressee without being read by anyone
during transportation.
Internal Assessment Criteria and Weight
● IAC0601 Define the term internet
● IAC0602 Describe the term connectivity
● IAC0603 Discuss the components/constituents and the purpose of internet enabling
technologies and terms. ( Range: Internet addresses- Internet protocol (IP)
addresses and domain names)
● IAC0604 Discuss how data travels over the internet in relation to networking
concepts
● IAC0605 Explain the different components required to connect to the internet.
(Range: Internet Service Providers (ISPs), wired and wireless connections)

KM-04-KT07: Safety and security of ICT

KT0701 ICT risks and recommended security solutions

ICT risks and recommended security solutions

Taking responsibility for the use of ICT

ICT and the internet are powerful educational resources that are transforming the process of
learning and teaching in schools and across the community. With a computer and internet
connection – or even just a mobile phone – pupils and adults alike can gain access to a vast
amount of information and communicate and collaborate in a variety of ways.

Not all information available via the internet is accurate, or even legal, however, and schools
have a duty to teach pupils about safe and responsible behavior using technology. Governing
bodies have a duty to understand the implications of the uses of ICT within schools and the
need to provide suitable safeguards for pupils and the school.

The role of the governing body


There is no formal requirement on governing bodies to develop an ICT strategy or to consider
ICT safety and security issues. However, the safe and secure use of ICT has an impact on a
number of areas of statutory responsibility for governing bodies, including Health and Safety
Policy, Child Protection Policy and legal requirements for data protection and freedom of
information.

Good practice suggests that all schools should actively consider ICT safety and security and
that they should take the following steps:
• Governors should develop an awareness of the issues and risks of using ICT
in schools alongside the benefits. Schools could consider appointing an ‘e-
governor’ to lead on ICT including safety issues.
• Governors should expect the school to develop a clear strategy on ICT which
defines roles and responsibilities for management, implementation and safety,
including the school’s Acceptable Use Policy (AUP).
• Resources should be made available to provide a secure ICT system for the
school and to support internet proficiency training for children, parents, staff
and, wherever possible, for the wider community.
• Internet/ICT safety should be reviewed regularly as part of the review of the
school’s health and safety and child protection policies. It is suggested that the
annual report and school prospectus should contain a summary of the school’s
policies on ICT safety for the benefit of parents.
• The school’s risk management strategy should look at the risk of breaches of
ICT security and how these should be dealt with both for pupils and for staff.
• Staff disciplinary procedures should cite the serious misuse/abuse of ICT as a
basis for disciplinary action.

Creating a safe and secure environment for ICT

All schools want to create a safe and secure ICT learning environment but many are unsure
how to begin. There are three components that schools need to establish:
• An infrastructure of whole-school awareness, responsibilities, policies and
procedures
• A secure ICT system
• A comprehensive internet safety education programme for the whole school
community.
Whole-school awareness

There is a need to raise awareness of ICT safety throughout the school. It needs to be stressed
that this affects every member of the school community, including the governing body. All
schools should put in place overall policies for the reasonable uses of ICT, such as an AUP.
Sample policies are available, online and via LEAs, which schools can use as a basis for their
own policies. An effective internet safety policy needs to be tailored to the individual needs of
the school, and is as much about an understanding and consideration of the issues as having
a written policy document. The policy should be developed in consultation with all key
stakeholders, including parents and children, so that there is an understanding of the issues
and the safeguards across the school community.

Secure ICT system

All staff and pupils need to observe ‘simple, everyday’ security measures such as not sharing
password information, teachers logging out of MIS software and not leaving their computers
unattended, and regular backing up of vital assessment data. There are a range of tools that
schools can use to make their ICT system secure:
• Firewall and virus protection to prevent unauthorized access to the school’s
network. A firewall can prevent information about pupils and the school being
seen by unauthorized users and protect computer systems and files from
viruses that can corrupt or destroy important information. The governing body
should ensure that a suitable firewall is in place.
• Software filters: different types of filters are available to restrict access to
inappropriate websites and some schools go further by subscribing only to
collections of websites that have been vetted and approved for access by
children. Schools should monitor the use of ICT on a regular basis, by keeping
track of information accessed and/or downloaded from the internet to check its
suitability.
• A clear policy on using personal devices: as increasing numbers of pupils
and staff use laptops, memory sticks and other portable storage devices on the
school network, there needs to be a policy regarding their use, to protect the
school network from viruses and inappropriate access to sensitive data.

Identifying the risks


In most cases, the misuse of ICT is not serious and can be dealt with at classroom level. In
rare cases, however, the abuse of ICT can place individual children in serious danger and
threaten the integrity of the whole school community.

Risks to children

These can be summarized as communication with inappropriate people, or access to age


inappropriate material.

Exposure to the threat of physical danger and abuse


This is the most worrying risk associated with the use of the internet. A criminal minority makes
use of the internet and related services such as chat rooms to make contact with young
people. These techniques are known as ‘online enticement’, ‘grooming’ or ‘child procurement’.

There is a risk that, whilst online, a young person may provide information that can identify
them, or arrange to meet someone they have communicated with online. The governing body
needs to ensure that every effort is made to educate pupils regarding these issues. Often, of
course, pupils are at most risk outside the school environs, so where possible, advice should
be supplied to parents and the local community.

A new arena for intimidation and bullying


New methods of communication open up opportunities for intimidation and bullying, by text
message or instant messaging services, by email, or within chat rooms. Regrettably, there are
also abusive or discriminatory websites that target vulnerable children. Beta has produced
guidance on how schools can address these forms of bullying.

Misuse of resources
Electronic access to a wealth of information and imagery brings with it the danger of
assignments and projects being copied from the internet or from a CD-ROM; at best, this may
mean that children have no real grasp of the material they are appropriating, at worst it may
mean they are guilty of plagiarism and cheating.

Access to unsuitable and inappropriate materials


There is a risk that, when using the internet, email or chat services, young people may be
exposed to inappropriate material which encourages activities that are considered unhealthy,
dangerous or even illegal.
Risks to the school
Viruses
Viruses can cause disruption and damage, often incurring expense, to computer networks. It
is essential that schools put in place comprehensive security systems that can protect against
unauthorized access and accidental damage.

Unauthorized access
Schools generate information and store data, only some of which may be intended for a wider
audience. The governing body should check that suitable storage and back-up systems are in
place.

Internal Assessment Criteria and Weight


● IAC0701 Identify and explain ICT risks and recommended security solution
References

Merriam-Webster Online, s.v. “risk,” http://www.merriam-webster.com/dictionary/Risk (accessed

August 21, 2009).

Project Management Institute, Inc., A Guide to the Project Management Body of Knowledge

(PMBOK Guide), 4th ed. (Newtown Square, PA: Project Management Institute, Inc., 2008), 273.

Tzvi Raz, Aaron J. Shenhar, and Dov Dvir, “Risk Management, Project Success, and

Technological Uncertainty,” R&D Management 32 (2002): 101–12.

You might also like