0% found this document useful (0 votes)
2K views17 pages

Information Access and Sharing

The document provides an overview of spreadsheet programs, their applications, and the functionalities of Microsoft Excel, including its interface and common terms. It also discusses information access and sharing, including the use of the internet, email, and cloud computing, along with their advantages and disadvantages. Additionally, it covers safety practices for internet use and netiquette rules for effective online communication.

Uploaded by

pascolizey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views17 pages

Information Access and Sharing

The document provides an overview of spreadsheet programs, their applications, and the functionalities of Microsoft Excel, including its interface and common terms. It also discusses information access and sharing, including the use of the internet, email, and cloud computing, along with their advantages and disadvantages. Additionally, it covers safety practices for internet use and netiquette rules for effective online communication.

Uploaded by

pascolizey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

SPREADSHEET 1

Introduction
Examples of spreadsheet programs
Microsoft excel
Open Office Calc
Corel Quattro pro
GS-Calc
King soft spreadsheets
Apple Works Spreadsheet
Areas where spreadsheet is applied
In schools to organize and store information about school fees payments by
learners
In shops to store daily transactions of all items purchased
In the finance departments of any company to create budget
In hospitals to capture payments by patients
Using MS Excel
Microsoft excel interface
Quick access toolbar
This tool bar contains commonly used commands such as save and save As,
Undo and Redo any many others
Ribbon Tabs
There are eight main tab in excel window each with its ribbon command to
help in manipulating information.
The file tab however is unique, with backstage view of commands that affect
the whole workbook/worksheet
Tabs name and their functions

Tab Functions
Home This include commands for formatting documents
Insert Used to insert objects such as charts, pictures, hyperlinks, headers and footers and
text box
Page layout Used to change the colour themes, Page orientation, print area settings etc.
Formula tab It contains functions used in Excel
Data Used for importing external data, sorting and filtering data and forecasting
Review Used to check spelling and grammar, insert comments and more
View Used to change the workbook view, show the ruler or navigation pane, zoom in or
zoom out etc.
“Tell me what Seek help by typing anything on which you want Excel’s support
to do”
The file tab Used for managing rather than making changes to the worksheet. It has key
functions like opening, saving and printing a document

Common terms used in Microsoft Excel Spreadsheet

Spreadsheet: A computer program designed to organize numerical data in table form.

Worksheet: A grid of columns (indicated by letters) and rows (indicated by numbers)

Workbook: A collection of worksheet

Row: The horizontal arrangement of cells from left to right of the worksheet. Each row has a number to
identify it

Column: The vertical arrangements of cells from top to bottom of the worksheet. Each column has a
letter to identify it

Cell: The intersection of a column and a row. It can contain either text, numbers or formulas

Cell address/cell Reference: A value that identifies a specific cell in a spreadsheet i.e. A5

Range: A selected group of adjacent cells i.e. A3:A7

Label: Text that is typed in a cell to identify column or a row in a worksheet. It can be either a row title
or a column title

Value: A number or text that can be used to perform calculations e.g. (0-9), dates, currency figures etc.

Working with Spreadsheet

Cursor styles in spreadsheet

Cursor style Description


Click and drag to highlight multiple cells with this cursor, or click in a cell to select a
single cell
Click and drag the contents of the selected cell to any other cell
Click to place the cursor into the formula bar contents so that you can edit an equation
or formula
Click and drag with this cursor to fill cell content into cells below or to the right

Navigating through a spreadsheet

INFORMATION ACCESS AND SHARING


INFORMATION ACCESS
This is the ability to identify, obtain and use information effectively.
Ways of accessing Information
 Reading newspapers
 Through radios
 Watching television
 Through internet
 Talking to people
Offline Information access
The use of Encarta Encyclopedia which is basically an offline information
search platform containing information ranging from text videos and images
to sound files

Information Sharing
This is the act of exchanging information between organizations people and
devices. It can be done with or without computers.
Importance of sharing information
 Helps people to make up informed decision
 Helps to enhance innovation and growth because of the ability to
conduct research
 Helps to improve service delivery to customers hence help retain them
 Helps to improve the welfare of the society i.e information about a
certain disease when shared helps people to be aware and avoid
Online information access
This refers to searching for information on the internet

The internet
This is a global system of interconnected computer networks which enables
various ICT users in different parts of the world to access and share
information
How internet works
 First you need to have internet service providers like Airtel
 An ISP is a company that provides internet services to individuals and
companies
 The computer must have a web browsing software like Google chrome,
opera etc.
 Each computer connected to the internet is assigned a unique address
by the ISP known as IP address (Internet Protocol Address)
 An IP address identifies each computer uniquely on the internet
Examples of ISPs in Uganda
 Airtel Uganda
 MTN Uganda
 Africell Uganda
 Smile Communications
 Uganda Telecom
 Roke Telecom
Factors to consider while choosing ISP
 Availability: Not all ISP offer services in all areas
 Speed/Network performance
 Price: This vary by package
 Support services/Customer care
 Restriction by use
 Reliability: How long has the ISP has been in business
 Compatibility: That the speed of their modems and their software
should match the speed of your computer/gadget
Advantages of using the internet
 Interactive communication using tools like e-mails
 Newsgroup: Offers a forum for people to discuss topics of common
interest
 Telnet: Used to log on to remote computer that is attached to the
internet
 Internet Relay Chat (IRC): Allows people from all over the world to
communicate in real time
 Internet Telephony (VoIP) Allows internet users to talk over the internet
using any pc equipped to receive the call
 Instant Messaging: Offers real time chat between individuals and
groups of people. Examples include Yahoo messenger and MSN
messenger
 File Transfer Protocol (FTP): Enables users to transfer files
 Video Conferencing/ Video Teleconferencing: It’s a method of
communicating by a two-way video and audio transmission with the
help of telecommunication technologies.
Disadvantages of the internet
 Computer viruses can be spread over the internet
 Internet provides access to unsuitable materials such as pornography
 Theft of personal information by hackers
 Many people are computer illiterate and so cannot use the internet
 The initial cost of connecting to the internet is high
 Internet Addiction can lead to problems like lack of social interaction
with family members and friends
 Spamming: this refers to the sending of unwanted emails in bulk,
which provide no purpose and needlessly obstruct the entire system
How the internet works
Information in the internet is found in the World Wide Web (WWW) which is a
collection of websites
A Website is a collection of related web pages with a unique address called
Uniform Resource Locator (URL)
URL is an internet address that identifies the location of a file or particular
information on the internet
Example of a URL is https://www.Handsoflove.com
Web browser: This is a software or an application that enables one to access
the web
Examples of Web browsers
 Mozilla Firefox
 Internet explorer
 Opera
 Microsoft edge
 Brave
 Google chrome
 Netscape
Requirements for connecting computers to the internet
 Computer/device with a network interface card. The NIC be based on
the Ethernet or wireless technologies
 An internet service provider (ISP)
 Modem: This is a device that converts analog telephone signal into
digital computer information and vice versa. Some computers have
internal/inbuilt modems
 Required software such as web browser
Some important Commands in web browsers
 Backward navigation button: Used to roll back web pages available
 Forward Navigation button: Used to roll forward web pages available
 Refresh button: Used to make the web browser reload a web page
 Home button: Used to redirect the user to the browser home (default)
page
 Close button: Used to close the current tab or page displayed on a
browser
 New tab button: Used to open a new tab on a browser
 Padlock: This is a verification security symbol used to show that a
website is safe or secure to visit and use
 Https: This is a protocol or scheme used to access resources on the
internet
 www.UNEB.co.ug: This is the domain name (host name). This indicates
the name of the website being accessed or the host that holds the
resource
Search engine
This is a program that finds information from the World Wide Web containing
keywords specified by the user
It is usually integrated in a web browser
The information is searched from databases and internet sites
Examples of search engines
 Google: www.google.com
 Bing: www.bing.com
 Yahoo: www.yahoo.com
 Duckduckgo
 AOL
 Ask.com
Technologies used to share information on the Internet
 E-mail
 Social networks
 Cloud
 Bluetooth
Electronic mail (e-mail)
It is defined as the transmission of electronic messages (mail) using
electronic devices. Both the sender and receiver must have an email address
Email service providers
 Gmail
 Yahoo
 Outlook
 Hotmail
Structure of an email address
An email address has 3 main parts:
 Username
 @ Symbol
 Domain name
They are always arranged as follows: Username@domain.com
Examples of email addresses
Email address Username Domain name
david@gmail.com David www.gmail.com
Nakato@yahoo.com Nakato www.yahoo.com
amina@statehouse.gov Amina www.statehouse.gov

Using an email system


Email vocabulary
Keyword Meaning/use
Signup(Create Registering your email account details
Account)
Login/Sign in Opening your email account using your
details(username and password)
Logout/sign-out Exiting your email account
Inbox Folder for keeping incoming messages
Sent/Outbox Outgoing messages
Compose/New Writing a new message
Send Send a message
Trash Box for deleted messages
Spam The location for storing unwanted email as
determined by the email system

Creating an email Address


Composing and sending an email
Parts of a new message window
Part Function
To The email address of the person that the email is being
addressed/sent to
Cc (Carbon The email address of a person you want to receive a copy
Copy) of the sent email. Everyone will know that they received a
copy
Bcc (Blind The email address if you are sending a copy and you do
Carbon Copy) not want the other recipient to see that you sent it to this
contact
Subject The title of the mail/message. It should be a summary of
the mail content
Message This is where you type the message
body
Signature It’s a block of a text appended to the end of an email
message which often contains the senders name and
contact information. It is created in the email setting so
that it appears automatically with each new message
composed

Using Attachments in an email


An attachment is a file that you send along with an email message.
It may include images, videos or documents
Using cloud services to share information
Cloud computing
This refers to the practice of using a network of remote servers hosted on
the internet to store and manage resources. The resource can be a software
or file
Cloud computing services
 Google Drive
 Icloud (for apple)
 One Drive (formerly called SkyDrive-for Microsoft)
 IBM smart cloud (for IBM)
 Drop Box
 Hightail
 SugarSinc
Advantages of cloud computing
Disadvantages of cloud computing
Using network to share information
Computer network enable several devices to share resources such as files
etc.
Requirements necessary to have a computer network
 A set of computers installed with an operating system such as windows
or linux
 Each computer should have a Network interface card (NIC)
 Ethernet cables, Crimped by a (RJ-45) connectors
 Network switch or hub depending on the nature of the network desired
 Router/Modem for internal connection
Resources that can be shared via network
 Files and folders such as documents such as invoices and budgets
 Storage space on a hard disk i.e. all people on a network can saver
work on the same hard disk
 Programs such as Microsoft Encarta and office applications
 Optical drives like DVD/CD ROM drives and other removable storage
media
 Multimedia information such as videos, audio files photographs and
maps
 Email
 Printer
 Scanner
Examples of apps that support sharing via network
 Whatsapp
 Facebook
 Snap chat
 Instagram
 Twitter
Advantages of computer networks
 Cost saving: Due to sharing of resources e.g. one printer can be
connected to the network and shared by more than 10 people
 It improves communication: Many people can easily share information
conveniently
 File sharing: Users on the same network can easily share documents
 Resource sharing: Users on the same network can easily share network
connected peripheral devices like printers, scanners etc.
 Sharing a single internet connection: Users on the same network can
share internet access. This is cost saving
 Increased storage capacity: Users on the same network can easily
access files and multimedia like images remotely stored on the other
machines or network attached storage devices
Disadvantages of computer Networks
 Setting up computer network infrastructure is expensive in the short
run because of the need to buy hardware and cables
 If a hacker gets unauthorized access to the network, then there are
higher chances that all the computers on the network would be
affected.
 If one computer on the network gets affected by a virus or worm, then
there are higher chances that all the computers will be affected
 If the network server fails, then all the computers on the network will
be able to access information on the network
Using Bluetooth to share information
Bluetooth is a wireless technology built within computers and mobile devices
to exchange data over short distances.it uses short wavelength UHF radio
waves
Advantages of Bluetooth technology
 Bluetooth technology is free to use
 It provides a quick connection that does not require wires
 Its range in distance is better than infrared connections
 It can be used for both voice and data transfer
 Most Bluetooth devices are affordable
 It has no issue of interoperability among different Bluetooth devices. It
can transfer data to any Bluetooth enabled device
Disadvantages of Bluetooth Technology
 It works for only short range data or voice transfer
 It provides a low bandwidth compared to Wi-Fi
 It can easily be hacked because it operates on a radio frequency
Safety practices while using the internet
Internet safety is the action of staying safe when you are online. It involves
maximizing the user’s awareness of personal safety and security risks
involving private information.
Some of the safety practices while using the internet
 Always use strong passwords that are hard to crack
 Avoid posting personal information on the websites, blogs, social
networks or any other place on the network.
 Always ensure that the internet connection is secure
 Always be careful with what you post
 Mind about what you download. Not everything is good for you and
your computer
Some of areas that may need Safety
 Social media Facebook
 Email communication
 Online banking
 E-commerce
 E-learning

Netiquette
It is a short form for Network etiquette which means the
required/acceptable code of behavior for communicating online.
Some of netiquette rules for learners
 Make positive and peaceful communication
 Visit positive sites and choose online friends who share positive
updates
 Do not use all capital letters in message writing on social media or
message chat
 Communicate effectively; be short and precise.
 Observe before participating in any discussion.
 Don‘t participate in flame wars. Flame wars are nasty exchange of
messages.
 Use other people‘s work with their permission.
 Do not spam especially when doing business. Spamming is when a
person sends out unsolicited messages to a large number of people.
 Protect your privacy, security and well-being; avoid unnecessary give
away of usernames and passwords.
 Avoid downloading pornography from the internet.
 Avoid using a company‘s account to join discussion groups.
Possible risks associated with the internet use
 Financial loss: Malicious people can use malware to steal information
on credit card and debit cards and bank account details
 High risk of physical harm, harassment and sexual abuse by persons
who meet online
 Exposure to drug related information e.g. about marijuana, tobacco
and alcohol
 Identity theft: The internet has many websites that asks for personal
information in order to assume identity of the person
 Violation of copyright: This may happen when many people download
music, movies and software and use them for commercial purposes
without paying for them
 Los of productivity when employee’s waste time chatting on social
media or playing games
 Exposure to racist and discriminatory language, texts and images all
have negative effect on children
 Possible damage to company, especially when an employee post the
company/s confidential information

Digital Divide
This is a gap between those people who have technological access and those
who do not have
It’s caused by several factors such as socioeconomic status, gender and
edge
Whereas it’s difficult to eliminate digital divide it can be minimized
Ways of minimizing digital divide
 Increase affordability
 Empowering users
 Improve the relevance of online content
 Internet infrastructure development
 Address gender gap in internet access
HEALTH AND SAFETY
Introduction
Prolonged use of computers or ICTs can result to various human problems
such eye strain, back pain etc.
Computer ergonomics is a field of study that attempts to reduce strain,
fatigue and injuries by improving the design of a computer and the
workplace arrangement
Some of health problems associated by use of ICTs
Deep thrombosis
This is a medical condition which involves a clot forming in the vein leg. It’s a
threatening because a small bit of the clot can break off, travel through the
blood system and lodge in the brain resulting in a stroke
Causes
 It’s caused by sitting for long period of time without breaks
Symptoms
 Pain in the affected leg
 Swelling in the affected leg
 Heat in the affected leg
Ways to avoid deep vein thrombosis
 Frequently stand and move around to allow normal blood flow in the
legs
 Take regular breaks to stretch the body
Repetitive strain injury (RSI)
This is a problem which brings about swelling of wrist, fingers and other body
parts due to repeated small movements such as repetitive mouse clicks
Causes
 Typing for a very long period of time
 Using too much force when typing
 Poor sitting posture
 Using the mouse for a very long period of time
Symptoms
 Swelling of the arms and hands
 Aching of the arms and hands
 Arm and wrist pain even if after resting
 Weakness of the arms and hands
 Burning sensation on the arms and hands
 Stiffness of the shoulders and neck
 Aching of shoulders and the neck
Ways to avoid Repetitive strain Injury
 Use wrist rest
 Take regular breaks from typing to rest hands
 Using ergonomic keyboard and mouse
 Ensuring that the chair and the computer desk have the correct height
so that the arms don’t strain
Back pain and neck pain
Prolonged use of computers can bring about back and neck pain especially
due to poor sitting posture and incorrect positioning of the computer screen
Causes
 Poor sitting posture
 Incorrect positioning of the computer screen
 Working in a cramped workspace
Symptoms
 Back pain when standing, walking and bending
 Pain when moving the neck
 Back pain that worsens with movement
 Muscle spasm: Refers to painful contractions in the injured neck or
back muscles
 Stiff neck: Moving neck in one direction or more directions may be
difficult
Ways to prevent Back pain and neck pain
 Always sit upright
 Do not bend your head
 Taking regular breaks when using the computers and stretching the
body in the form of small exercise
 Use adjustable chairs for better height depending on the computer
desk
 Placing your feet flat on the floor when sitting on a chair
 Placing the computer screen directly in front of users with the top at
eye level
Eye strain and headache
Prolonged use of computers can cause eye strain which may result to blurry
eye vision
Causes
 Looking at a computer screen for a long period of time
 Working in a room with dim light
 Working with flickering computer screen
 Using a dirty computer screen
Symptoms
 Itching eyes
 Blurry vision
 Headache
 Fatigue
Ways to avoid eyestrain and headache
 Make sure that your eyes are atleast18 inches from the screen
 Make sure that the sun does not shine directly on to the computer
screen when you are using it
Stress
Prolonged use of computers can bring about stress. The stress varies from
person to person depending on the cause
Causes
 Working for long in a computer (to beat deadline) can be stressful
 Information overload because ICT devices generate a lot of information
that can confuse users
 Little resting time: People can hardly separate work from home life
because they can be contacted anytime which causes stress
 Workers are monitored using ICT systems. The feeling of being
watched all time brings about stress
Symptoms
 Isomnia
 Illness
 Low productivity
 Irritability
 Low mood
Ways to void stress
 Do something relaxing
 Switch off some ICT devices while at home to avoid distractions
 Using only authentic information to avoid overload
 Choosing an area of specialization and focusing only on the trends
within that area
Suffocation
ICT equipment generate a lot of heat that can affect the users
Causes
 Having many computers in a room which is not properly ventilated
Symptoms
 Loss of breath
Ways to avoid excessive noise
 Place a noisy ICT equipment in a separate room
 An acoustic screen can help to protect the operator from noise created
by fellow workers in an open plan office
 Using headphones to limit noise irritation of computer based training
(CBT) materials containing audio
 Frequent maintenance of ICT equipment to ensure they are in good
working condition. Equipment in poor condition emits a lot of noise

You might also like