SPREADSHEET 1
Introduction
Examples of spreadsheet programs
Microsoft excel
Open Office Calc
Corel Quattro pro
GS-Calc
King soft spreadsheets
Apple Works Spreadsheet
Areas where spreadsheet is applied
In schools to organize and store information about school fees payments by
learners
In shops to store daily transactions of all items purchased
In the finance departments of any company to create budget
In hospitals to capture payments by patients
Using MS Excel
Microsoft excel interface
Quick access toolbar
This tool bar contains commonly used commands such as save and save As,
Undo and Redo any many others
Ribbon Tabs
There are eight main tab in excel window each with its ribbon command to
help in manipulating information.
The file tab however is unique, with backstage view of commands that affect
the whole workbook/worksheet
Tabs name and their functions
        Tab                                               Functions
 Home               This include commands for formatting documents
 Insert             Used to insert objects such as charts, pictures, hyperlinks, headers and footers and
                    text box
 Page layout        Used to change the colour themes, Page orientation, print area settings etc.
 Formula tab        It contains functions used in Excel
 Data               Used for importing external data, sorting and filtering data and forecasting
 Review             Used to check spelling and grammar, insert comments and more
 View               Used to change the workbook view, show the ruler or navigation pane, zoom in or
                    zoom out etc.
 “Tell me what      Seek help by typing anything on which you want Excel’s support
 to do”
 The file tab       Used for managing rather than making changes to the worksheet. It has key
                    functions like opening, saving and printing a document
Common terms used in Microsoft Excel Spreadsheet
Spreadsheet: A computer program designed to organize numerical data in table form.
Worksheet: A grid of columns (indicated by letters) and rows (indicated by numbers)
Workbook: A collection of worksheet
Row: The horizontal arrangement of cells from left to right of the worksheet. Each row has a number to
identify it
Column: The vertical arrangements of cells from top to bottom of the worksheet. Each column has a
letter to identify it
Cell: The intersection of a column and a row. It can contain either text, numbers or formulas
Cell address/cell Reference: A value that identifies a specific cell in a spreadsheet i.e. A5
Range: A selected group of adjacent cells i.e. A3:A7
Label: Text that is typed in a cell to identify column or a row in a worksheet. It can be either a row title
or a column title
Value: A number or text that can be used to perform calculations e.g. (0-9), dates, currency figures etc.
Working with Spreadsheet
Cursor styles in spreadsheet
 Cursor style    Description
                 Click and drag to highlight multiple cells with this cursor, or click in a cell to select a
                 single cell
                 Click and drag the contents of the selected cell to any other cell
                 Click to place the cursor into the formula bar contents so that you can edit an equation
               or formula
               Click and drag with this cursor to fill cell content into cells below or to the right
Navigating through a spreadsheet
INFORMATION ACCESS AND SHARING
INFORMATION ACCESS
This is the ability to identify, obtain and use information effectively.
Ways of accessing Information
      Reading newspapers
      Through radios
      Watching television
      Through internet
      Talking to people
Offline Information access
The use of Encarta Encyclopedia which is basically an offline information
search platform containing information ranging from text videos and images
to sound files
Information Sharing
This is the act of exchanging information between organizations people and
devices. It can be done with or without computers.
Importance of sharing information
    Helps people to make up informed decision
    Helps to enhance innovation and growth because of the ability to
     conduct research
    Helps to improve service delivery to customers hence help retain them
    Helps to improve the welfare of the society i.e information about a
     certain disease when shared helps people to be aware and avoid
Online information access
This refers to searching for information on the internet
The internet
This is a global system of interconnected computer networks which enables
various ICT users in different parts of the world to access and share
information
How internet works
   First you need to have internet service providers like Airtel
   An ISP is a company that provides internet services to individuals and
    companies
   The computer must have a web browsing software like Google chrome,
    opera etc.
   Each computer connected to the internet is assigned a unique address
    by the ISP known as IP address (Internet Protocol Address)
   An IP address identifies each computer uniquely on the internet
Examples of ISPs in Uganda
     Airtel Uganda
     MTN Uganda
     Africell Uganda
     Smile Communications
     Uganda Telecom
     Roke Telecom
Factors to consider while choosing ISP
     Availability: Not all ISP offer services in all areas
     Speed/Network performance
     Price: This vary by package
     Support services/Customer care
     Restriction by use
     Reliability: How long has the ISP has been in business
     Compatibility: That the speed of their modems and their software
      should match the speed of your computer/gadget
Advantages of using the internet
   Interactive communication using tools like e-mails
   Newsgroup: Offers a forum for people to discuss topics of common
    interest
   Telnet: Used to log on to remote computer that is attached to the
    internet
   Internet Relay Chat (IRC): Allows people from all over the world to
    communicate in real time
   Internet Telephony (VoIP) Allows internet users to talk over the internet
    using any pc equipped to receive the call
    Instant Messaging: Offers real time chat between individuals and
     groups of people. Examples include Yahoo messenger and MSN
     messenger
    File Transfer Protocol (FTP): Enables users to transfer files
    Video Conferencing/ Video Teleconferencing: It’s a method of
     communicating by a two-way video and audio transmission with the
     help of telecommunication technologies.
Disadvantages of the internet
    Computer viruses can be spread over the internet
    Internet provides access to unsuitable materials such as pornography
    Theft of personal information by hackers
    Many people are computer illiterate and so cannot use the internet
    The initial cost of connecting to the internet is high
    Internet Addiction can lead to problems like lack of social interaction
     with family members and friends
    Spamming: this refers to the sending of unwanted emails in bulk,
     which provide no purpose and needlessly obstruct the entire system
How the internet works
Information in the internet is found in the World Wide Web (WWW) which is a
collection of websites
A Website is a collection of related web pages with a unique address called
Uniform Resource Locator (URL)
URL is an internet address that identifies the location of a file or particular
information on the internet
Example of a URL is https://www.Handsoflove.com
Web browser: This is a software or an application that enables one to access
the web
Examples of Web browsers
      Mozilla Firefox
      Internet explorer
      Opera
      Microsoft edge
      Brave
      Google chrome
      Netscape
Requirements for connecting computers to the internet
    Computer/device with a network interface card. The NIC be based on
     the Ethernet or wireless technologies
    An internet service provider (ISP)
    Modem: This is a device that converts analog telephone signal into
     digital computer information and vice versa. Some computers have
     internal/inbuilt modems
    Required software such as web browser
Some important Commands in web browsers
      Backward navigation button: Used to roll back web pages available
      Forward Navigation button: Used to roll forward web pages available
      Refresh button: Used to make the web browser reload a web page
      Home button: Used to redirect the user to the browser home (default)
       page
      Close button: Used to close the current tab or page displayed on a
       browser
      New tab button: Used to open a new tab on a browser
      Padlock: This is a verification security symbol used to show that a
       website is safe or secure to visit and use
      Https: This is a protocol or scheme used to access resources on the
       internet
      www.UNEB.co.ug: This is the domain name (host name). This indicates
       the name of the website being accessed or the host that holds the
       resource
Search engine
This is a program that finds information from the World Wide Web containing
keywords specified by the user
It is usually integrated in a web browser
The information is searched from databases and internet sites
Examples of search engines
      Google: www.google.com
      Bing: www.bing.com
      Yahoo: www.yahoo.com
      Duckduckgo
      AOL
      Ask.com
Technologies used to share information on the Internet
      E-mail
     Social networks
     Cloud
     Bluetooth
Electronic mail (e-mail)
It is defined as the transmission of electronic messages (mail) using
electronic devices. Both the sender and receiver must have an email address
Email service providers
     Gmail
     Yahoo
     Outlook
     Hotmail
Structure of an email address
An email address has 3 main parts:
     Username
     @ Symbol
     Domain name
They are always arranged as follows: Username@domain.com
Examples of email addresses
    Email address                  Username               Domain name
   david@gmail.com                   David                www.gmail.com
  Nakato@yahoo.com                  Nakato               www.yahoo.com
 amina@statehouse.gov                Amina              www.statehouse.gov
Using an email system
Email vocabulary
Keyword                 Meaning/use
Signup(Create           Registering your email account details
Account)
Login/Sign in           Opening your email account using your
                        details(username and password)
Logout/sign-out         Exiting your email account
Inbox                   Folder for keeping incoming messages
Sent/Outbox             Outgoing messages
Compose/New             Writing a new message
Send                    Send a message
Trash                   Box for deleted messages
Spam                  The location for storing unwanted email as
                      determined by the email system
Creating an email Address
Composing and sending an email
Parts of a new message window
Part               Function
To                 The email address of the person that the email is being
                   addressed/sent to
Cc (Carbon         The email address of a person you want to receive a copy
Copy)              of the sent email. Everyone will know that they received a
                   copy
Bcc (Blind         The email address if you are sending a copy and you do
Carbon Copy)       not want the other recipient to see that you sent it to this
                   contact
Subject            The title of the mail/message. It should be a summary of
                   the mail content
Message            This is where you type the message
body
Signature          It’s a block of a text appended to the end of an email
                   message which often contains the senders name and
                   contact information. It is created in the email setting so
                   that it appears automatically with each new message
                   composed
Using Attachments in an email
An attachment is a file that you send along with an email message.
It may include images, videos or documents
Using cloud services to share information
Cloud computing
This refers to the practice of using a network of remote servers hosted on
the internet to store and manage resources. The resource can be a software
or file
Cloud computing services
      Google Drive
      Icloud (for apple)
      One Drive (formerly called SkyDrive-for Microsoft)
     IBM smart cloud (for IBM)
     Drop Box
     Hightail
     SugarSinc
Advantages of cloud computing
Disadvantages of cloud computing
Using network to share information
Computer network enable several devices to share resources such as files
etc.
Requirements necessary to have a computer network
   A set of computers installed with an operating system such as windows
    or linux
   Each computer should have a Network interface card (NIC)
   Ethernet cables, Crimped by a (RJ-45) connectors
   Network switch or hub depending on the nature of the network desired
   Router/Modem for internal connection
Resources that can be shared via network
     Files and folders such as documents such as invoices and budgets
     Storage space on a hard disk i.e. all people on a network can saver
      work on the same hard disk
     Programs such as Microsoft Encarta and office applications
     Optical drives like DVD/CD ROM drives and other removable storage
      media
     Multimedia information such as videos, audio files photographs and
      maps
     Email
     Printer
     Scanner
Examples of apps that support sharing via network
     Whatsapp
     Facebook
     Snap chat
     Instagram
     Twitter
Advantages of computer networks
   Cost saving: Due to sharing of resources e.g. one printer can be
    connected to the network and shared by more than 10 people
   It improves communication: Many people can easily share information
    conveniently
   File sharing: Users on the same network can easily share documents
   Resource sharing: Users on the same network can easily share network
    connected peripheral devices like printers, scanners etc.
   Sharing a single internet connection: Users on the same network can
    share internet access. This is cost saving
   Increased storage capacity: Users on the same network can easily
    access files and multimedia like images remotely stored on the other
    machines or network attached storage devices
Disadvantages of computer Networks
   Setting up computer network infrastructure is expensive in the short
    run because of the need to buy hardware and cables
   If a hacker gets unauthorized access to the network, then there are
    higher chances that all the computers on the network would be
    affected.
   If one computer on the network gets affected by a virus or worm, then
    there are higher chances that all the computers will be affected
   If the network server fails, then all the computers on the network will
    be able to access information on the network
Using Bluetooth to share information
Bluetooth is a wireless technology built within computers and mobile devices
to exchange data over short distances.it uses short wavelength UHF radio
waves
Advantages of Bluetooth technology
     Bluetooth technology is free to use
     It provides a quick connection that does not require wires
     Its range in distance is better than infrared connections
     It can be used for both voice and data transfer
     Most Bluetooth devices are affordable
     It has no issue of interoperability among different Bluetooth devices. It
      can transfer data to any Bluetooth enabled device
Disadvantages of Bluetooth Technology
   It works for only short range data or voice transfer
   It provides a low bandwidth compared to Wi-Fi
   It can easily be hacked because it operates on a radio frequency
Safety practices while using the internet
Internet safety is the action of staying safe when you are online. It involves
maximizing the user’s awareness of personal safety and security risks
involving private information.
Some of the safety practices while using the internet
    Always use strong passwords that are hard to crack
    Avoid posting personal information on the websites, blogs, social
     networks or any other place on the network.
    Always ensure that the internet connection is secure
    Always be careful with what you post
    Mind about what you download. Not everything is good for you and
     your computer
Some of areas that may need Safety
      Social media Facebook
      Email communication
      Online banking
      E-commerce
      E-learning
Netiquette
It is a short form for Network etiquette which means the
required/acceptable code of behavior for communicating online.
Some of netiquette rules for learners
    Make positive and peaceful communication
    Visit positive sites and choose online friends who share positive
     updates
    Do not use all capital letters in message writing on social media or
     message chat
    Communicate effectively; be short and precise.
    Observe before participating in any discussion.
    Don‘t participate in flame wars. Flame wars are nasty exchange of
     messages.
    Use other people‘s work with their permission.
    Do not spam especially when doing business. Spamming is when a
     person sends out unsolicited messages to a large number of people.
    Protect your privacy, security and well-being; avoid unnecessary give
     away of usernames and passwords.
    Avoid downloading pornography from the internet.
    Avoid using a company‘s account to join discussion groups.
Possible risks associated with the internet use
    Financial loss: Malicious people can use malware to steal information
     on credit card and debit cards and bank account details
    High risk of physical harm, harassment and sexual abuse by persons
     who meet online
    Exposure to drug related information e.g. about marijuana, tobacco
     and alcohol
    Identity theft: The internet has many websites that asks for personal
     information in order to assume identity of the person
    Violation of copyright: This may happen when many people download
     music, movies and software and use them for commercial purposes
     without paying for them
    Los of productivity when employee’s waste time chatting on social
     media or playing games
    Exposure to racist and discriminatory language, texts and images all
     have negative effect on children
    Possible damage to company, especially when an employee post the
     company/s confidential information
Digital Divide
This is a gap between those people who have technological access and those
who do not have
It’s caused by several factors such as socioeconomic status, gender and
edge
Whereas it’s difficult to eliminate digital divide it can be minimized
Ways of minimizing digital divide
    Increase affordability
    Empowering users
    Improve the relevance of online content
    Internet infrastructure development
 Address gender gap in internet access
                        HEALTH AND SAFETY
Introduction
Prolonged use of computers or ICTs can result to various human problems
such eye strain, back pain etc.
Computer ergonomics is a field of study that attempts to reduce strain,
fatigue and injuries by improving the design of a computer and the
workplace arrangement
Some of health problems associated by use of ICTs
Deep thrombosis
This is a medical condition which involves a clot forming in the vein leg. It’s a
threatening because a small bit of the clot can break off, travel through the
blood system and lodge in the brain resulting in a stroke
Causes
      It’s caused by sitting for long period of time without breaks
Symptoms
      Pain in the affected leg
      Swelling in the affected leg
      Heat in the affected leg
Ways to avoid deep vein thrombosis
    Frequently stand and move around to allow normal blood flow in the
     legs
    Take regular breaks to stretch the body
Repetitive strain injury (RSI)
This is a problem which brings about swelling of wrist, fingers and other body
parts due to repeated small movements such as repetitive mouse clicks
Causes
      Typing for a very long period of time
      Using too much force when typing
      Poor sitting posture
      Using the mouse for a very long period of time
Symptoms
     Swelling of the arms and hands
     Aching of the arms and hands
     Arm and wrist pain even if after resting
     Weakness of the arms and hands
     Burning sensation on the arms and hands
     Stiffness of the shoulders and neck
     Aching of shoulders and the neck
Ways to avoid Repetitive strain Injury
   Use wrist rest
   Take regular breaks from typing to rest hands
   Using ergonomic keyboard and mouse
   Ensuring that the chair and the computer desk have the correct height
    so that the arms don’t strain
Back pain and neck pain
Prolonged use of computers can bring about back and neck pain especially
due to poor sitting posture and incorrect positioning of the computer screen
Causes
     Poor sitting posture
     Incorrect positioning of the computer screen
     Working in a cramped workspace
Symptoms
     Back pain when standing, walking and bending
     Pain when moving the neck
     Back pain that worsens with movement
     Muscle spasm: Refers to painful contractions in the injured neck or
      back muscles
     Stiff neck: Moving neck in one direction or more directions may be
      difficult
Ways to prevent Back pain and neck pain
   Always sit upright
   Do not bend your head
   Taking regular breaks when using the computers and stretching the
    body in the form of small exercise
   Use adjustable chairs for better height depending on the computer
    desk
   Placing your feet flat on the floor when sitting on a chair
   Placing the computer screen directly in front of users with the top at
    eye level
Eye strain and headache
Prolonged use of computers can cause eye strain which may result to blurry
eye vision
Causes
     Looking at a computer screen for a long period of time
     Working in a room with dim light
     Working with flickering computer screen
     Using a dirty computer screen
Symptoms
     Itching eyes
     Blurry vision
     Headache
     Fatigue
Ways to avoid eyestrain and headache
   Make sure that your eyes are atleast18 inches from the screen
   Make sure that the sun does not shine directly on to the computer
    screen when you are using it
Stress
Prolonged use of computers can bring about stress. The stress varies from
person to person depending on the cause
Causes
     Working for long in a computer (to beat deadline) can be stressful
     Information overload because ICT devices generate a lot of information
      that can confuse users
     Little resting time: People can hardly separate work from home life
      because they can be contacted anytime which causes stress
     Workers are monitored using ICT systems. The feeling of being
      watched all time brings about stress
Symptoms
     Isomnia
     Illness
     Low productivity
     Irritability
     Low mood
Ways to void stress
   Do something relaxing
   Switch off some ICT devices while at home to avoid distractions
   Using only authentic information to avoid overload
   Choosing an area of specialization and focusing only on the trends
    within that area
Suffocation
ICT equipment generate a lot of heat that can affect the users
Causes
     Having many computers in a room which is not properly ventilated
Symptoms
     Loss of breath
Ways to avoid excessive noise
   Place a noisy ICT equipment in a separate room
   An acoustic screen can help to protect the operator from noise created
    by fellow workers in an open plan office
   Using headphones to limit noise irritation of computer based training
    (CBT) materials containing audio
   Frequent maintenance of ICT equipment to ensure they are in good
    working condition. Equipment in poor condition emits a lot of noise