ICT Student G9
ICT Student G9
INFORMATION
COMMUNICATION
TECHNOLOGY
Student Textbook
Grade 9
Federal Democratic Republic of Ethiopia ISBN: 978-99944-2-245-6 Federal Democratic Republic of Ethiopia
Ministry of Education Price: ETB 23.15 Ministry of Education
INFORMATION
COMMUNICATION
TECHNOLOGY
STUDENT TEXTBOOK
Grade 9
Authors
Dixit J.B.
Saurabh Gupta
Evaluators
Gelan Tulu
Genene Tadesse
Zekarias Kebede
The development, printing and distribution of this student textbook has been funded through the General Education
Q uality Improvement Pr oject (GEQ IP) , which aims to improve the quality of education for Grades 1- 12 students in
government schools throughout Ethiopia.
The Federal Democratic Republic of Ethiopia received funding for GEQ IP through credit/ financing from the
International Development A ssociations (IDA ), the Fast Track Initiative Catalytic Fund (FTICF) and other development
partners—F inland, Italian Development Cooperation, the N etherlands and U K aid from the Department for
International Development (DFID).
The M inistry of Education wishes to thank the many individuals, groups and other bodies involved—d irectly and
indirectly—i n publishing the textbook and accompanying teacher guide.
Developed, printed and distributed for the Federal Democratic Republic of Ethiopia, M inistry of Education by Laxmi
Pu blications Pv t. Ltd., India under GEQ IP Contract N o. ET-M oE/ GEQ IP/ IDA / ICB / G-02/ 09- D
A ll rights reserved; no part of this publication may be reproduced, stored in a retrieval system, or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written
permission of the copyright owner or a licence permitting restricted copying in Ethiopia by the Federal Democratic
Republic of Ethiopia, Federal Negarit Gazeta, Proclamation No. 410/2004 Copyright and Neighboring Rights Protection
Proclamation, 10th year, No. 55, Addis Ababa, 19 July 2004.
D i sc l ai m er
Every effort has been made to trace the copyright owners of material used in this document. W e apologise in advance
for any unintentional omissions. W e would be pleased to insert the appropriate acknowledgement in any future
edition.
Pr inted in India.
CONTENT S
U n i t 1: I n trod uc ti on to I C T _ _ 1
1.1 Overview of ICT ........................................................................................................................... 1
1.2 Generation of Computers ........................................................................................................... 9
1.3 Types of Computers .................................................................................................................... 13
1.4 Introduction to Data Representation ........................................................................................ 18
1.5 Computer System ......................................................................................................................... 28
Review Q uestions............................................................................................................................ 43
U n it2 : Ap p l i c at i on S of tw ar e _ 45
2.1 W ord Pr ocessor............................................................................................................................. 45
2.2 Pr esentation Software and Techniques ..................................................................................... 58
Review Q uestions............................................................................................................................ 6
U n it3 : I n f orm at i on an d C om p uter S ec uri ty _ 68
3.1 Information and Computer Security ........................................................................................ 68
Review Q uestions............................................................................................................................ 75
U n it4 : Ap p l i c at i on S of tw ar e _ 7
4.1 Spreadsheets .................................................................................................................................. 7
Review Q uestions............................................................................................................................ 90
U n it5 : U si n g I n ter n et _ 92
5.1 U sing Internet ............................................................................................................................... 92
5.2 U sing E-mail.................................................................................................................................. 105
Review Q uestions............................................................................................................................ 16
U n it6 : C on trol an d L ear n i n g w i th L O G O _ _ 17
6.1 Control and Learning with LOGO .......................................................................................... 17
Review Q uestions............................................................................................................................ 132
G l ossar y _ 134
PREFACE
Information and Communication Technology (ICT) is so important in the world today that it makes it
imperative for every person to be competent in the use of ICT for the many tasks that one will have
to accomplish. This book is written to provide the basic skills in ICT for Grade 9 students of Federal
Democratic Republic of Ethiopia. It is expected that the knowledge and skills gained through this book
will help the students to use ICT in almost all their courses at school. The book covers selected basic
topics in ICT which offer hands-on activities to help students in acquiring the required ICT skills.
The key features of this book will help the students to:
l understand the development of computers and communication technology.
l develop interest and use ICT for learning in other subjects.
l understand information and computer security
l acquire the knowledge for application of ICT in word processing, presentation and spreadsheet
application.
l use the Internet to communicate effectively.
l access and share information through the Internet.
l follow basic ethics in the use of ICT.
l learn LOGO language.
The text has been designed in a simple and user friendly way. This text focuses on the fundamentals
of ICT, which change slowly. This not only makes the information remain useful to a student when
one graduates, but also makes the student focus on the foundation concepts on ICT. This book also
illustrates the latest developments in the rapidly changing world of ICT. Review questions have also
been given at the end of each unit.
Suggestions for the improvement of this book will be gratefully acknowledged.
Authors
Unit – 1 Introduction to IC T
Unit 1 INTRODUCTION
TO ICT
UNIT OUTCOME
Students will be able to:
know the term data, information, technology and the sources of information;
understand the differences between computers of one generation from the other;
recognize the types of computers used today and their difference;
understand the computer system.
l Data vs Information
The frequency of the use of the words data and information are very high in our daily lives. Depending
on the context, the meanings and use of these words differ. B oth data and information are types of
knowledge or something used to attain knowledge. Though used interchangeably, there are many
differences between the meanings of these two words.
Data is a collection of raw facts and figures or a raw input which when processed or arranged makes meaningful
output. Data is the plural of the Latin word “ datum” . For example, students fill an admission form when
they get admission in school/ college. The form consists of raw facts about the students. These raw facts
are student’ s name, father name, mother name, address, etc. The purpose of collection of this data is
to maintain the records of the students during their study period in the school/ college.
In computer terms, symbols, characters, images, or numbers are data. These are the inputs for the
system to give a meaningful interpretation.
Figure 1.3 illustrates the processing of raw data into useful information, its recycling and its packaging
in a new form so that it is easier to understand, more attractive, or more useful.
l Technology
Technology is the usage and knowledge of tools, crafts, techniques, or systems, or methods of organizations.
Science is concerned with how and why things happen. Technology focuses on making things happen.
Technology began to influence human beings as soon as people began using tools.
N ow-a-days, technology is an integrated part of lives of human beings. For example, the technology
in communications such as mobile phones help us to connect with the other people easily.
Technology has a simple but important role in our life now-a-days. W ithout it, we will not be
having the connection with the other people.
l Information Technology
“Information Technology”, or “IT”, refers to anything related to computing technology, such as networking,
hardware, software, the Internet, or the people that work with these technologies.
or
Information Technology is the study, design, development, implementation support and/or management of any
computer based information systems. This relates particularly to software applications and computer hardware.
Information Communication Technology — Grade 9 Student Textbook 3
Unit – 1 Introduction to IC T
The use of information sources is influenced by the following factors:
(i) subject of the study,
(ii) nature of the information sought,
(iii) the attitude of the user,
(iv) the intensity of the need one feels, and
(v) working conditions.
Fig. 1.5: Use of Information Sources is
Documentary Sources Influenced by the Working Conditions
A s mentioned earlier the sources of information or evidence are often categoriz ed as primary, secondary,
or tertiary material. These classifications are based on the originality of the material and the proximity
of the source or origin. This informs the reader as to whether the author is reporting information that
is first hand or is conveying the experiences and opinions of others which is considered second hand.
Determining if a source is primary, secondary, or tertiary can be tricky. Let us describe the three
categories of information and give examples to help you make a determination.
P ri m a ry D oc um e n ta ry
Pr imary sources of information are original materials that often convey new ideas, discoveries, or
information. These sources originate from the time period under study. Examples of primary sources
include:
4 Information Communication Technology — Grade 9 Student Textbook
Unit – 1 Introduction to IC T
(i) original research studies (often in the form of journal articles in peer-reviewed publications), also
called empirical studies (e.g., psychology)
(ii) patents, technical reports
(iii) original documents such as diaries, letters, e-mails, manuscripts, lab data/ notes
(iv) newspaper articles from the time period under study
(v) autobiographies, first-person accounts, case studies
(vi) artifacts and archival material such as official documents, minutes recorded by government agencies
and organiza tions, photographs, coins, fossils, natural specimens
(vii) works of art such as literature, music, architecture, or paintings.
S ce on d ar y D oc um en tar y
Secondary sources of information are based on primary sources. They are
generally written at a later date and provide some discussion, analysis,
or interpretation of the original primary source. Examples of secondary
sources include:
(i) review articles or analyses of research studies about the same topic
(also often in peer-reviewed publications)
(ii) analyses of original documents or archival material
(iii) biographies, reviews, or critiques of an author. Fig. 1.6: A biography—One of the
Secondary Documentary Sources of
T e rti ar y D oc um en tar y Information
Tertiary sources of information are based on a collection of primary and secondary sources. Examples of tertiary
sources include:
(i) textbooks (sometimes considered as secondary sources)
(ii) dictionaries and encyclopedias
(iii) manuals, guidebooks, directories, almanacs
(iv) indexes and bibliographies.
Once you have some background knowledge on your topic, you will be better able to understand,
interpret, and analyze the primary source of information. See if you can find primary source evidence to
support or refute what other scholars and experts have said about your topic, or try an interpretation of
your own and look for more primary sources to confirm or refute your thesis. Wh en you present your
conclusions, you will have produced another secondary source to assist others in their research.
Non-documentary Sources
The non-documentary sources are also called Informal Information Sources. These include government
departments, research organizat ions, learned professional societies, industries, universities, colleagues,
corridor meetings at conferences and social gatherings.
Some examples of institutes which are excellent non-documentary sources in Ethiopia are given below
along with their U RLs (U niform Resource Locators).
(i) A ddis A baba U niversity (U RL: www.abyssiniacybergateway.net/ ethiopia/ )
(ii) A lemaya U niversity (U RL: www.alemayau.edu.et/ )
(iii) Institute of Ethiopian Studies (U RL: www.ies-ethiopia.org)
(iv) International Community School of A ddis A baba (U RL: www.icsaddis.edu.et/ )
(v) J imma Institute of H ealth Sciences (J imma, Ethiopia) (U RL: www.ju.edu.et/ )
3. N ew social information exchange tools like B logs (fun keeping journals on the Internet–ac cessible
to other users) and Twitter, such as:
(i) www.twitter.com (ii) ethiopiatwitter.blogspot.com
(iii) www.ethiopianreview.com (iv) www.african-safari-information.com
(v) twitter.com/ethiopiawire (vi) green.blogs.nytimes.com
Activity 1.1
A REPORT ON SOURCES OF INFORMATION IN EDUCATION
Information can come from many sources — personal experiences, books, articles, expert opinions,
encyclopaedias, the World Wide Web — and the type of information can change depending on the situation.
In recent times, Ethiopia has shown encouraging signs in the expansion of utilizing ICT for multi-purposes. ICT
plays a vital role in studying the sources of information in education sector all over the world.
Sources of Information
Look at the following sources of information. Notice the similarities between them. Keep in mind the following
three questions:
1. Which sources can you find online?
2. Which sources guide you to other information on your topic?
3. Which sources would you use when writing a report?
Magazines Newspapers
Books Encyclopedias
Library Catalogue
KEY CONCEPTS
Data is a collection of raw facts and figures or a raw input which when processed or arranged makes meaningful
output.
Information is the data that is organized, meaningful and useful.
Technology is the usage and knowledge of tools, crafts, techniques, or systems, or methods of
organizations.
Information Technology (IT) refers to anything related to computing technology, such as networking, hardware,
software, the Internet, or the people that work with these technologies.
An information ‘source’ can be categorized by the type of information it contains. The types are primary,
secondary and tertiary.
Assessment 1.1
Fill in the Blanks
1. ICT stands for ...................................... .
2. ...................................... consists of raw facts and figures that are processed into information.
3. ...................................... is the usage and knowledge of tools, crafts, techniques, or systems, or methods of
organizat ions.
4. The sources of information are usually classified as ....................., ..................... and .................... .
Suggested Activities
1. Explain and demonstrate the terms data, information and technology.
2. Explain and demonstrate the different sources of information.
Field Trips
1. Students should visit some big educational organiz ation in their city. Interact with faculties there and
prepare a report on “ B asic concepts of ICT and sources of information” .
2. Students should visit some places like shopping centre, hospitals and science laboratory in their city and
report on “I mpact of ICT on everyday life”.
computers that used vacuum tube circuits were called the First Generation Computers. The vacuum tube
circuits contained a filament that was heated to emit electrons.
The main features of the first generation computers were as follows:
1. They used vacuum tubes.
2. They had a very big size.
3. They consumed huge electricity.
4. They were prone to failures.
5. They generated a lot of heat. Fig. 1.8: Vacuum Tube
6. They only supported machine language.
Activity 1.2
INTRODUCTION TO ARTIFICIAL INTELLIGENCE
In small groups students will discuss “Introduction to Artificial Intelligence” based on the following information.
The group leader from each group will give a brief presentation to the class based on the discussions.
Artificial Intelligence
Artificial Intelligence (AI) is the ability of a computer or other machines to perform those activities that are
normally thought to require intelligence.
or
Artificial Intelligence is the branch of computer science concerned with making computers behave like
humans.
The term was coined in 1956 by John McCarthy at the Massachusetts Institute of Technology, located in
Cambridge, Massachusetts (United States).
Artificial intelligence includes:
1. Games playing: Programming computers to play games such as chess and checkers.
KEY CONCEPTS
The computers that used vacuum tube circuits were called the First Generation Computers.
The computers that used transistors were called the Second Generation Computers.
The Third Generation Computers used Large Scale Integration (LSI) circuits for processing.
The computers that used Very Large Scale Integrated (VL SI) chips were called the Fourth Generation Computers.
Recent research has focused on developing “thinking computers”. These computers are called the Fifth
Generation Computers. They would be able to work like humans do.
Assessment 1.2
Fill in the Blanks
1. The evolution of computers is mainly divided into ............................ main generations.
2 . Each new generation of computers resulted in decrease in ...................... and ..........................
3. The computers that used ............................ circuits were called the First Generation Computers.
4. ............................ generation computers will have the power to learn and apply knowledge to solve a
problem.
Suggested Activity
Explain and demonstrate (pictorially or physically) each generation of computers.
Field Trip
Organize a field trip to various places such as government organizat ions and science laboratories to find out
and report on:
Different generations of computers.
l Super Computers
(i) Super computers are the largest and fastest computers. They are also the costliest computers.
Information Communication Technology — Grade 9 Student Textbook 13
Unit – 1 Introduction to IC T
(ii) They are used in fields like science and defence. These
computers are used for designing and launching
missiles, weather forecasting, biomedical research,
aircraft design and automobile design.
(iii) There are only a few super computers throughout
the world. Some examples are IB M B lue Gene/ L, IB M
Roadrunner and Cray J aguar.
Fig. 1.14: Super computer
l Mainframe Computers
(i) M ainframe computers are more powerful than minicomputers.
(ii) They have high processing speeds and can store large amounts of
data. They are used in wide area networks and support hundreds of
users. H owever, these computers consume more electricity.
(iii) Some examples are IB M 30 series and U nivac 180.
Fig. 1.15: Mainframe computer
l Minicomputers
(i) M inicomputers are small general-purpose computers, also called mid-
range servers. These computers can perform more complex tasks and cost
more than microcomputers.
(ii) They are larger in size and they have small to medium storage
capacity.
(iii) They are used for processing data and analysing results of experiments.
They are also used for controlling and monitoring production
processes.
(iv) Some examples are PD P 1/ 42 and V A X 1 .
Fig. 1.16: Minicomputer
l Microcomputers
(i) M icrocomputers are also called P ersonal Computers (PC s). These computers use microprocessors.
(ii) They are small in size. A lso, they do not have large storage capacities.
(iii) They can perform difficult tasks. They are used mainly for desktop publishing, accounting, statistical
analysis, graphics designing and project management.
(iv) Some examples are A pple II, IB M PC , PS / 2 and M acintosh.
P ersonal computer or PC s are the popular form of computers. Individuals as well as organizat ions use
these computers. The classification of P Cs is as:
1. Desktops: These CP s are those in which the case or main housing sits on a desk, with keyboard in
front and screen (monitor) often on top.
2. Portables: These PC s are so small that they can be placed on your lap.
The difference between portables and desktops is that portables can be carried while travelling unlike
desktops. The portables are classified as:
(i) Laptops: These are small-sized machines that have the same power of a desktop. The weight of a
laptop is around 7 to 12 kg. The drawback of a laptop is that it is too bulky. Examples: Toshiba 520 0C
and SLT/ 286.
(ii) Notebooks: These are smaller than a laptop and are designed to overcome the drawbacks of a
laptop. They have the size of a notebook but are as powerful as a desktop. They weigh 3 to 4 kg.
Examples: Contura 3/ 20 and A cer A nyW are.
(iii) Palmtops or Personal Digital Assistants ( PDAs) : These are handheld computers which have the size
of a pocket calculator. They are not as powerful as a desktop. PD A s combine personal organizat ion
tools — schedule planners, address books, to-do lists — with the ability in some cases to send e-mail
and faxes. Example: H P95L X .
l Characteristics of a Computer
Computers are capable of performing highly complex tasks, which human beings cannot perform efficiently.
The following are the main characteristics of computers, which make them so powerful:
1. Speed
Computers work at an amazi ng speed without any mistakes. The work, which a normal person would
complete in a few hours can be done within fractions of a second by a computer. Speed of computers
– 3 – 6
is measured in terms of milliseconds (10 seconds), microseconds (10 seconds) or nanoseconds
– 9
(10 seconds).
2. Accuracy
A computer performs its task with great accuracy. It never commits mistakes in processing the data. It
produces errors when we enter inaccurate input, i.e., Garbage In Garbage Out (GIGO).
3. Reliability
Computers are more reliable than human beings as they do not get bored of the repetitive tasks and
never get tired.
4. Storage Capacity
A computer can store large amount of data. It can store various documents, articles, pictures, etc., in
its memory which can be used whenever required. On the other hand, a human being can keep only a
limited information in his/ her mind and rest of the things, he/ she forgets.
5. Versatility
A computer can perform various types of jobs. On a computer system, we can listen to songs while
typing text or play games while working on any other package, do calculations, make drawings, surf
the net, send e-mail, etc.
6. Reduction in Manpower
Earlier, the work in industries/ factories was done by a number of persons. B ut with computers, it can
be completed by a few persons and that too more accurately and efficiently. The advent of computer
has reduced the need of manpower.
l Limitations of a Computer
Despite having various advantages, computers do have the following limitations that are the strengths of
human beings. These are:
1. No Decision-making Ability
Computers cannot take any decisions. H uman beings assist the computer to take the decisions. For
example, suppose a street hawker is selling flowers. If such kind of flowers are already in our house, we
will decide not to purchase them. Taking decision in this way, without the assistance of human beings,
is not possible by a computer.
2. No Intelligence
Computers do not have intelligence of their own, they work according to the instructions given by
humans.
Activity 1.3
USES OF COMPUTERS
In small groups students will discuss “Some uses of computers” based on the following information. The group
leader from each group will give a brief presentation to the class based on the discussions.
Computers are everywhere. Some of the modern uses of computers are:
KEY CONCEPTS
Super computers are the most powerful computers among digital computers.
Mainframe computers are designed to handle huge volumes of data and information.
Minicomputers are small general purpose computers, also called mid-range servers.
Microcomputers are also called Personal Computers (PCs). These are classified into desktops and portables.
The main characteristics of a computer are: speed, accuracy, reliability, storage capacity, versatility, reduction
in manpower and reduction in paper work.
Assessment 1.3
Fill in the Blanks
1. ........................... can be classified into super computers, mainframe computers, minicomputers and
microcomputers.
2. ........................... are the largest and fastest computers.
3. ........................... are those computers in which the case or main housing sits on a desk, with keyboard in
front and screen (monitor) often on top.
4. P ersonal Digital A ssistants (PD A s) have the size of a ........................... .
Suggested Activity
Categorize the computers in terms of size, processing speed and capacity only.
Field Trips
1. Determine what types of computers are being used in your school. In which departments are the different
types of computer used? Wh at are they used for? H ow are they connected to other computers?
2. Organize a field trip to various places such as science laboratories and government organizat ions to find
out and report on:
Types of computers and their uses.
0, 1 , 2, 3, 4, 5, 6, 7, 8, 9, two signs + and – and decimal point. A lphanumeric data is used to represent
alphabetic data, numeric data, special characters and symbols.
One digit in binary number system is called a bit and combination of eight bits is called a byte. A byte
is the basic unit that is used to represent the alphabetic, numeric and alphanumeric data.
A ll the data that is entered into a computer is first converted into the binary form and after processing,
it is again converted to human readable form as shown in Fig. 1.2.
l Number Systems
There are different types of number systems that are used to represent data. Y ou are already familiar with the
decimal number system. The other useful number systems are binary, octal and hexadecimal. Y ou may regard
each digit as a box that can hold a number.
Let us discuss the various number systems:
A s shown in Table 1.4, there is a direct correspondence between the binary system and the octal system,
with three binary digits corresponding to one octal digit. Likewise, four binary digits translate directly into
one hexadecimal digit. In computer usage, hexadecimal notation is especially common because it easily
replaces the binary notation, which is too long and human mistakes in using the binary numbers are too
easily made.
Table 1.4: Base Conversion Table
Decimal Binary Equivalent Octal Equivalent Hexadecimal Equivalent
0 0 0 0
1 01 1 1
2 01 2 2
3 01 3 3
4 01 4 4
5 01 5 5
6 01 6 6
7 01 7 7
8 10 10 8
9 10 1 9
10 10 12 A
1 10 13 B
12 10 14 C
13 10 15 D
14 10 16 E
15 1 17 F
2 2 3 Remainder
2 1 1 1
2 5 1 = 10
2 2 1
2 1 0
0 1
= 1 + 0 + 4 = 5
and 01 = 1 × 2 0 + 1 × 2 1 + 0 × 2 2
= 1 + 2 + 0
= 3
Therefore, (101) 2 = (53) 8
22 Information Communication Technology — Grade 9 Student Textbook
Unit – 1 Introduction to IC T
It must be remembered that whatever number system one may use, the information stored in the
computer memory is always in terms of binary digits. It is only for our convenience that we use octal
or hexadecimal numbers.
A computer handles non-numeric data in addition to numerical data, that is, alphabets, punctuation
marks and other special characters. Some predefined codes are used to represent the numeric and non-
numeric characters. These codes are known as al p han um er i c c od es . A ny data or information is represented
internally using the bits 0 and 1.
A computer system’ s data/ information storage capacity is represented by bytes, kilobytes, megabytes,
gigabytes and terabytes.
1 B yte = 8 bits
1 0
1 K ilobyte (K B ) = 2 bytes = 1024 bytes
1 0 1 0 2 0
1 M egabyte (M B ) = 1024 K B = 2 × 2 bytes = 2 bytes
1 0 2 0 3 0
1 Gigabyte (GB ) = 1024 M B = 2 × 2 bytes = 2 bytes
1 0 3 0 4 0
1 Terabyte (TB ) = 1024 GB = 2 × 2 bytes = 2 bytes
10 = 01 0 or 00010000 in BCD
1 0 1 0
Similarly,
01 or 00010101 in BCD 15 = 01
1 5 1 0
In the discussion above, we have used a group of four bits to represent a digit (character) in B CD. 4- bits
B CD coding system can be used to represent only decimal numbers because four bits are insufficient to
represent the various characters used by a computer. H ence, instead of using four bits with only 16 possible
characters, computer designers commonly use six bits to represent characters in B CD code. In 6- bit B CD
code, the four B CD numeric place positions are retained but two additional zo ne positions are added. W ith
six bits, it is possible to represent 64( 2 6 ) different characters. This is sufficient to code the decimal digits
(10) , alphabetic letters (26 in number), and other special characters (28 in number). Table 1.6 illustrates
coding of alphabetic and numeric characters in B CD.
Table 1.6: Alphabetic and numeric characters in BCD along with their Octal equivalent
Character BCD Code Octal Character BCD Code Octal
Equivalent Equivalent
Zone Digit Zone Digit
A 1 01 61 S 01 01 2
B 1 01 62 T 01 01 23
C 1 01 63 U 01 01 24
D 1 01 64 V 01 01 25
E 1 01 65 W 01 01 26
F 1 01 6 X 01 01 27
G 1 01 67 Y 01 10 30
H 1 10 70 Z 01 10 31
I 1 10 71
0 0 0 0
J 10 01 41 1 0 01 01
K 10 01 42 2 0 01 02
L 10 01 43 3 0 01 03
M 10 01 4 4 0 01 04
N 10 01 45 5 0 01 05
O 10 01 46 6 0 01 06
P 10 01 47 7 0 01 07
Q 10 10 50 8 0 10 10
R 10 10 51 9 0 10 1
Example 1.1 Write the binary digits used to record the word BASE in BCD.
Solution. In B CD notation:
B = 110010 A = 110001 S = 010010 E = 10
H ence, the binary digits
10 10 01 10 10
B A S E
will record the word B A SE in B CD.
Example 1.2 Using Octal notation, write the BCD coding for the word DIGIT.
Solution. In B CD notation:
D = 64 I = 71 G = 67 I = 71 T = 23
H ence, the B CD coding for the word DIGIT in octal notation will be
64 71 67 71 23
D I G I T
ASCII
Pr onounced “a sk-ee”, A SCII (American S tandard C ode for I nformation I nterchange) is the binary code
most widely used with microcomputers. It has replaced many of the special codes that were previously
used by computer manufacturers.
A SCII 7- bit code can represent up to 128 characters. A letter, digit or special symbol is called a character.
It includes upper-case and lower-case alphabets, numbers, punctuation marks, special characters and
control characters.
A SCII 8- bit code can represent up to 256 characters. Table 1.7 shows A SCII 8- bit coding scheme for
alphabets and digits.
0 48 0 1 0 5 53 01 01
1 49 0 1 01 6 54 01 01
2 50 0 1 01 7 5 01 01
3 51 0 1 01 8 56 01 10
4 52 0 1 01 9 57 01 10
UNICODE
U nicode uses two bytes (16 bits) for each character. It can handle 65, 536 character combinations. Thus,
it allows almost all the written languages of the world to be represented using a single character set.
Formally,
U n i c od e p rov i d es a un i q ue n um b e r f or ev er y c har ac ter ,
n o m at ter w hat the p l at f orm ,
n o m at ter w hat the p rog ram ,
n o m at ter w hat the l an g uag e.
U nicode standard covers the principal written languages of the A merica, Europe, the M iddle East,
A frica, India and A sia.
KEY CONCEPTS
A digital computer works with binary number system.
All the data that is entered into a computer is first converted into the binary form and after processing, it is
again converted to human readable form.
There are different types of number systems (binary, octal, hexadecimal) that are used to represent data.
We can convert a number in one system to the other system by following rules specified by the number
system.
Some useful computer coding systems are BCD, ASCII and UNICODE.
Assessment 1.4
Fill in the Blanks
1. A digital computer works with ........................... number system.
2. A ........................... is the basic unit that is used to represent the alphabetic, numeric and alphanumeric
data.
3. 1 K ilobyte (K B ) = ........................... bytes.
4. The full form of A SCII is ........................... .
The computer mainly consists of hardware and software components. B oth of these work together to
process data. Figure 1.23 illustrates these two components.
Hardware
The physical components of the computer that can be seen and touched are called as hardware. The
term hardware is used to refer to all the components inside or outside the computer. In addition to
this, components used to interconnect two or more components, for example, wires are also regarded as
hardware. W e have several hardware devices that are used at various phases of data processing cycle.
The hardware that are used to supply input to computer are called as input devices. The hardware that are
used to process the data, are called as processing devices and the devices that are used to present output
of computer are called as output devices. Each of these categories has a broad variety of devices of various
brands and qualities.
Software
The sets of instructions that instruct the computer to do different tasks are called as software. For example,
word processing, games, painting, e-mail, spreadsheets etc.
Software is the driving force behind the working of computer. W ithout the presence of software, the
computer is as good as a piece of plastic and metal. H ardware can be considered as organs and the software
is life that moves inside these organs. B oth of them cannot perform their function without the presence of
each other.
28 Information Communication Technology — Grade 9 Student Textbook
Unit – 1 Introduction to IC T
l Hardware Components
H ardware consists of all the machinery and equipment in a computer system. The hardware includes, the
keyboard, the monitor, the printer, and the “b ox” — the computer or processing device itself. Figure 1.24
illustrates hardware of a computer.
Input Devices
Input devices allow people to put data into the computer in a form that the computer can use, for example,
keyboard and mouse.
Output Devices
Output devices translate information processed by the computer into a form that humans can understand—
print, sound, graphics, or video. For example, monitor, printer and sound speakers.
System Unit
The system unit is also known as case. It is the box that houses the processor chip
(CPU ) i.e., the ‘ brain’ of computer, the memory chips, and the motherboard with power
supply, as well as some secondary storage devices—f loppy-disk drive, hard-disk drive,
and CD or DV D drive. The case comes in desktop or tower models. It includes a power
supply unit and a fan to keep the circuitry from overheating.
Fig. 1.28: Case or
Secondary Storage Devices system cabinet
W ithin the motherboard in the system cabinet, the secondary storage devices are connected to it. Secondary
storage or permanent storage stores your data as long as you want.
Let us discuss the commonly used secondary storage devices—C ompact Disk (CD) and Digital V ersatile
Disk (DV D):
C om p ac t D i sk ( C D )
The compact disk or CD is an optical storage medium. It is relatively cheap and has a storage capacity of
up to 7 0 M egabytes of data. There are three main types of CDs:
(i) CD-ROM (Compact Disk—Read Only Memory): It is an optical-disk format that is used to hold pre-
recorded text, graphics and sound, for example, encyclopedias, software, games, e-books etc. It is a
read-only disk. Read-only means that the disk’ s content is recorded at the time of manufacture and
cannot be written on or erased by the user.
(ii) CD-R (Compact Disk-Recordable): It is an optical-disk format on which data can be recorded only once
but can be read many times. It allows users to make their own CD disks, though it is a slow process.
Once recorded the contents cannot be erased. CD-R is often used by companies for archiving, that
is, to store vast amounts of information.
(iii) CD-RW (Compact Disk-Rewritable): It is an erasable disk that allows users to record and erase data,
so the disk can be used over and over again. CD-RW disks are used for archiving and backing up
large amounts of data or work in multimedia production or desktop publishing, however, they are
relatively slow.
D i g i tal V er sat i l e D i sk ( D V D )
The digital versatile disk or digital video disk or DV D is an optical storage medium. It is a CD-style disk
but is able to hold about 15 times as much information and transfer it to the computer about 20 times as
fast as a CD-ROM . There are three main types of DV Ds:
(i) DVD-ROM (Digital Versatile Disk—Read Only Memory): It is a high capacity optical disk capable of
storing 4.7 Gigabytes to 17 Gigabytes. It is a powerful and versatile secondary storage medium
which was originally developed for the movie industry.
(ii) DVD-R (DVD-Recordable): It is similar to CD-R that
allows users to write on the disk only once but read it
many times. Recordable DV Ds offer the user yet another
option for storing large amount of data.
(iii) DVD-RW (DVD-Rewritable): M ost writable DV D drives
are DV D-RW . The DV D-RW disks can be recorded on
and erased more than once.
DV D technology is bringing down prices these days.
Figure 1.29 shows how to use a CD/ DV D. Fig. 1.29: How to use a CD/DVD
30 Information Communication Technology — Grade 9 Student Textbook
Unit – 1 Introduction to IC T
Some secondary storage devices are also called input and output devices. For example, CD, DV D and
P en Drive etc.
l Types of Software
Software is generally divided into two main categories: System Software and Application Software. The system
software are generally concerned with the various operations of a computer system and the application
software are concerned with providing various services to the users. Figure 1.30 shows the two types of
software.
System Software
System software is a set of master programs that keep the computer system working.
The basic components of system software are given below:
O p er at i n g S y stem S of tw a re
Operating system is a bridge between the computer hardware and the user. V arious types of operating systems
are W indows, M ac OS, U nix, Linux etc.
Operating systems perform basic tasks, such as:
1. Recognizi ng input from the keyboard
2. Sending output to the display screen
3. K eeping track of files and directories on the disk
4. Controlling peripheral devices such as disk devices and printers.
Language Software
A language acceptable to a computer system is called computer language or programming language. A ll
computer languages can be classified broadly into the following three categories:
1. M achine Language
2. A ssembly Language
3. H igh-level Language.
L ow L ev el L a n g uag e
Machine Language
Every computer understands only one language without using a translation program which is called
machine language of the computer.
Assembly Language
A language that allows instructions and storage locations to be represented by letters and symbols instead
of numbers is called assembly language or symbolic language.
M achine and assembly languages are often referred to as low-level programming languages.
H i g h L ev el L an g uag e
High-level programming languages overcome the limitations of low-level programming languages. The main
feature of high-level languages is machine independence, i.e., portable (can be used on different computers
with or without minor changes).
Today many different high-level languages are in use because each one was designed for a different
purpose. For example, LOGO, FORTRA N , COB OL, B A SIC, P ascal, C, C++, C#, J ava, RPG , LISP and
SN OB OL.
D ve i c e D ri v er s
Device drivers are programs which allow hardware devices such as the keyboard, printers to interface with
the computer.
M odern operating systems have inbuilt support for a variety of input and output devices. For example,
W indows X P contains drivers of hundreds of printers, scanners and other devices.
l Application Software
A pplication software allows the user to perform specific tasks. A n application software, designed to satisfy
one purpose may not be able to solve other purpose of the same user. For example, software for financial
management cannot be used for designing two-dimensional graphics. Similarly, we have word processors
for letter writing and presentation software for presentations. W e cannot interchange the use of two
application software with each other.
There are two main categories of application software: Pre-Written and Customised A pplication
Software.
P re- Wr i tten Ap p l i c at i on S of tw ar e: These are designed for common needs of various businesses. For
example, Wo rd Pr ocessing Software, Electronic Spreadsheets, Pr esentation Software, Database M anagement
Systems, Communication Software, Desktop Pu blishing Software.
C ustom i zed Ap p l i c at i on S of tw ar e: These are created for a specific application of a specific environment.
For example, software required by a publishing house. This type of software may not be useful for a
computer assembling house who deals in the items having warranty period. Software engineers are hired
to create such software. Different computer languages are used to create these software.
3. From the cascading menu, select the option Folder (see Fig. 1.34 ). A folder icon appears with the
name ‘ N ew Folder’ highlighted.
4. Type a name for the newly created folder and press Enter key.
(ii) T o C re at e a F ol d er i n a D ri v e/ F ol d er
1. In ‘ M y Computer’ navigate to the item (drive/ folder) in which you wish to create a new folder.
2. Double click on this item, so that a window exhibiting its contents is opened.
3. Right-click on an empty area in the window.
4. Select New from the pop-up menu displayed, and Folder from the cascading menu (see Fig. 1.35) .
A folder icon appears with the name ‘ N ew Folder’ highlighted.
5. Type a name for the newly created folder and press Enter key.
Say, you create a new folder called Software in the ICT folder. In this case, the ICT folder is called the
parent folder and the Software folder is called the subfolder.
Copying an item places an exact replica of the copied item at the new location also retaining the item
as the location where it is copied from. B ut, moving an item from a location to another erases its
existence at the original location.
Recycle Bin window. If any file or folder has to be deleted permanently from the machine, then right click
on the Recycle Bin and select the Empty Recycle Bin option.
On clicking Empty Recycle Bin option the following message will be displayed (see Fig. 1 .4 1 ).
3. The Display Properties dialog box appears. Click the Desktop tab (see Fig. 1.45) .
4. Select any option from the Background list box. For example, select W indows X P as the background
and click the Apply button (see Fig. 1.45) .
5. Click the OK button to close the dialog box.
You can change Color scheme and Font size depending on your choice.
KEY CONCEPTS
A computer system consists of hardware components and software components.
Hardware are the physical parts of the computer that can be seen and touched.
Software are the sets of instructions that instruct the computer to do different tasks for example: word
processing, games, painting, email, spreadsheets.
Software can be classified as systems and application software.
Operating system is a bridge between the computer hardware and the user.
Review Questions
Fill in the Blanks
1. A ........................... consists of hardware and software components.
2. Commonly used secondary storage devices are ........................... and ........................... .
3. ........................... software keep the computer system working.
4. ........................... are programs which allow hardware devices to interface with the computer.
Suggested Activities
1. Demonstrate and explain in brief a computer system.
2. Define and explain the difference between system software and application software.
Field Trip
Students should visit some big educational organizat ion in their city. Interact with faculties there and prepare
a report on the latest computer system in use.
44 Information Communication Technology — Grade 9 Student Textbook
Unit – 2 Application Software
Unit 2 APPLICATION
SOFTWARE
UNIT OUTCOME
Students will be able to:
understand how to open word processing software, and create, and save a document;
recognize how to format a document in a desired way;
apply any of formatting features in their document;
understand how to open presentation software, and create and save a document;
recognize how to create a slide show using animation and sound.
Difficulty in inserting pictures and images Pi ctures and images can be inserted easily
Looks messy after making corrections Error correction is simple and neat
M icrosoft W ord (M S-W ord) is the most popularly used word processing application software
that provides you with a number of useful and fabulous features to process the text.
Let us understand the word processing features using M S-W ord.
Component Description
Office B utton Displays as a M icrosoft Office logo and, when clicked, displays a list of
options and most recently opened documents.
Ribbon A rea containing the tabs and commands divided into groups.
Status B ar Shows details about the document you are working on.
Table 2.3 shows how to move around a document using the keyboard.
Table 2.3: Moving around a document using the keyboard
Key(s) Function(s)
<U p> arrow, <D own> arrow, One character up, down, left and right
<L eft> arrow, <R ight> arrow
<C trl> + < Right> arrow N ext word
<C trl> + < Left> arrow Pr evious word
<H ome> B eginning of the line
<E nd> End of the line
<C trl> + < H ome> B eginning of the document
<C trl> + < End> End of the document
<C trl> + < P age U p> Pr evious page
<C trl> + < P age Down> N ext page
l Saving a Document
Wh en you type in a document, the document is stored in the internal memory of the computer. Figure 2.3
shows a typed passage in a document using M S-Wo rd 207.
l Closing a Document
A fter your work is complete you need to close the document without exiting from M S-W ord. To close a
document without exiting M S-Wo rd, perform the following steps:
Click O f f i c e B utton → C l ose
If you have not saved the document before closing, M S-
W ord gives you warning asking to save the document (see
Fig. 2.5) .
From this dialog box:
(i) If you want to Save the document, click the Yes
Fig. 2.5: The warning dialog box
button.
(ii) If you do not want to Save the document, click the No button.
(iii) If you want to remove the message box, click the Cancel button.
l Editing a Document
Editing is the act of altering your document. Some Edit features are insert and delete, undelete, find and
replace, cut/copy and paste, spelling and grammar checker, and thesaurus. A ll of these commands except
spelling and grammar checker which is in the Review tab are in the Home tab.
W h en you edit text, you change text by either inserting text, deleting text or replacing text. To edit text,
place the cursor at the required position and insert, delete or replace text.
Useful Tip
Y ou must keep on saving document when working to avoid losing document when power goes
off.
l Formatting a Document
Wh en you wish to make a document both more attractive and easier to read, you use formats. A ll word
processing programs have built-in format setting called defaults, which are designed such that you can
easily override them.
Wh en creating a document, formatting is usually a separate stage—o ften completed after the document
has been entered. The ease of applying and changing formats lets you play with a document’ s design.
M SW ord works on the principle of ‘ ‘ F I R S T S E L E C T I O N T H E N AC T I O N ’ ’ .
Formatting text means changing the text appearance by changing the alignment, style, font and font
color. To format text, you need to use the Home tab.
In Home tab you have all the formatting tools readily available (see Fig. 2.6) .
S le ec ti n g the T ext
For any text to be formatted, first it has to be selected. There are various ways of selecting the text, i.e.,
using the keyboard by pressing shift key with arrow keys or using the mouse.
Let us discuss some useful features of formatting a document:
Character Formatting
Select the character and format it as required i.e., change its appearance by changing font, style, size, color
and changing font style.
W e can apply the effects before typing as well as after typing the text (see Fig. 2.7) .
Paragraph Formatting
Select the paragraph and format it as required i.e., apply alignment (Left, Right, Centre and J ustify), indent,
line spacing, bullets and numbers, and draw boarders around it (see Fig. 2 .8 ).
Page Formatting
P age formatting includes features of M S-Wo rd that are used to improve the appearance of the page. Select
the entire page or selection and format it as required i.e., apply formatting features including page size,
border, header and footer, margins, a page break and page numbering etc. (see Fig. 2.9) .
Spell Checking
Spell checking is a very big plus point while talking about word processing. Y ou can spell check your
document for wrong spellings.
The red and g reen wavy underlines are only visible on screen. These will not appear in print out.
There are two methods of correcting these errors. One method is to correct these errors one by one,
picking them up. Secondly, you can spell check the whole document.
The steps for spell check of the whole document are:
1. P lace the cursor at the beginning of the text in the document (refer to Fig. 2.3) .
2. Select Spelling & Grammar from the Pr oofing P anel of Review tab.
OR
Pr ess F7
This will initiate the spell checking process and will start the spell checking of the document with
each word of the document being searched with the similar words available in the dictionary. If not
found, it will point it out to you. Select the appropriate word from the suggestions box. H ere, we
will select “t aught” to change the word “t hought” (see Fig. 2.10) .
Inserting Tables
Tables provide an easier and effective method of arranging the data in rows and columns. M S-word offers
a set of commands for creation, modification and formatting of tables. To insert a table in your document
follow these steps:
1. Open a document and enter some text in it (refer to Fig. 2.3) .
2. Select the Insert tab.
3. Select the Table option from Tables panel. On clicking the Table option, a list will be displayed.
4. Select the desired table size by moving the cursor on the table cells (see Fig. 2.12) . H ere, we select
4 × 5 table.
52 Information Communication Technology — Grade 9 Student Textbook
Unit – 2 Application Software
Y ou can also insert table using Draw Table option from Insert Table list, available in Table option of the
Tables panel under Insert tab.
Inserting Pictures
Clipart or pictures are inserted to create effective documents. M S-word supports many popular picture
formats, for example .wmf (window meta files). Y ou can insert pictures from the disk as well as cliparts
from the clipart gallery of M S-OFFICE. Y ou can also insert downloaded pictures or pictures taken by your
web cam or digital camera, into your documents.
The steps for inserting a picture are given below:
1. Open a document (refer to Fig. 2 .3) .
2. Click the Insert tab.
3. Select the Picture option from Illustrations panel (see Fig. 2.14) .
On clicking this button the Insert Picture dialog box will appear.
The selected picture will be inserted in the document at the insertion point (see Fig. 2.16) .
Activity 2.1
INSERTING, REMOVING UNWANTED ITEMS AND/OR CHANGING EXISTING ONES IN THE
DOCUMENT AND ALSO APPLYING UNDO AND REDO
Students will perform the following steps for doing the activity:
1. Open an existing MS-Word document as shown in Fig. 2.17.
3. To undo an action,
Click the Undo icon in the title bar (see Fig. 2.18).
KEY CONCEPTS
Word processing software allows to create, edit, format, print and store text material.
MS-Word is a Windows based application.
A file created using MS-Word is known as a document.
Text can be entered anywhere in a document area by placing the cursor at that place.
The Undo option is used to undo the previous action and the Redo option will repeat the previous Undo
action.
Formatting means changing the appearance of text.
Assessment 2.1
Fill in the Blanks
1. WY SIWY G stands for ........................... .
2. Wh en you start M S-Wo rd, a ........................... window appears.
3. To create a new document in M S-Wo rd, click the Office Button, New option and ........................... button.
4. ........................... is the act of altering your document.
Suggested Activities
1. Locate where the word processing software is in the computer and create, save and close the
document.
2. Explain and demonstrate how to change the appearance of text changing font, style, size, color and
changing font style.
3. Explain and demonstrate powerful formatting features including header and footer, margins and the
steps involved to insert and delete bullets, a page break, a header and footer, page numbers and date
and time on a document you have already created.
A placeholder is a location on a slide marked with a border that holds text or an object.
W e can change the appearance of text in a number of ways. W e can change font, size , color, highlight
and other special effects by using Home tab. W e can apply the effects before typing as well as after typing
the text. W e can also change the background of slides using the Design tab.
To format the text and background, perform the following steps:
1. Select the placeholder that contains the text you want to format.
2. Click on the Home tab and select the desired font style and size from the Font command group.
3. Click on Format tab and select the desired text style from WordArt Styles (see Fig. 2.25) .
4. For changing the background of slide, click on the Design tab and select appropriate theme from
Themes command group. The background color can be changed by selecting the Background Styles
from Background command group (see Fig. 2.25) .
Slide 1 Slide 2
Slide 3 Slide 4
Slide 5 Slide 6
62 Information Communication Technology — Grade 9 Student Textbook
Unit – 2 Application Software
Slide 7
Fig. 2.30: Slide show
7. Pr ess Esc to exit the Slide Show.
Applying Animation
To apply animation to your Po werPo int slide, perform the following steps:
1. Open the slide to which you want to apply the animation.
2. Click on the Animations tab and select the desired transition style from the Transition to This Slide
command group (see Fig. 2.31) .
3. N ow select the desired effect from Add Effect which you want to apply for a particular image or text.
The selected applied effect is shown in Fig. 2.32.
Applying Sound
Y ou can add sound to the transition effects and to the preset animation. Y ou can also add audio to your
presentation by inserting files from Clip A rt Gallery or from other folder available to you.
Po werPo int can use audio files stored in common formats such as A IFF, M IDI, M P3 and W A V file. If
your audio file is stored in a different file format, such as Real A udio, you will have to convert the file
before you can add it to a Po werPo int presentation.
To add an A udio File, perform the following steps:
1. Select the slide to which you want to put an audio.
2. Open the Insert tab and click on the Sound icon from the Media Clips command group. The Insert
Sound dialog box appears (see Fig. 2.3) .
3. Choose the desired sound file you want to add and click OK.
P werPo int displays a dialog box asking whether you want to play the sound automatically or when
o
you click the mouse (see Fig. 2.34) . Choose your option. A horn icon is displayed which means that the
sound has been inserted (see Fig. 2.35) .
Fig. 2.34: Selecting Sound Starting Option Fig. 2.35: Horn Icon
Sound icon is displayed on your slide. Y ou can move it so that it does not obscure your slide (see
Fig. 2.3 6) .
KEY CONCEPTS
Presentation software is a tool used to create visual presentations.
A presentation package helps both: the speaker with an easier access to his/her ideas and the participants
with visual information.
We can make slides using features such as creating slides, inserting text, formatting text, inserting clipart,
formatting background, inserting slides, deleting slides and inserting images from other files.
Presenting a slide show is the most useful view of PowerPoint. It is used to display the slides in a desired
sequence.
The slide layout in PowerPoint is the arrangement of all the items that make up your slide, such as title,
graphics or text boxes.
Review Questions
Fill in the Blanks
1. Po werPo int is the most widely used ........................... software.
2. Certain presentation packages can also be used for web ........................... .
3. ........................... a slide means changing the formats of characters, words, paragraphs of a slide to provide
them an effective look and feel.
4. Y ou can add ........................... to the transition effects and to the present animation.
4. Wh ich of the following is/ are included in the slide layout in Po werPo int?
(a) Title (b) Graphics
(c) Text boxes (d) A ll of these
Suggested Activities
1. Explain and demonstrate the slide making features such as creating slides, inserting text, formatting text,
inserting clipart, formatting background, inserting slides, deleting slides and inserting images from other
files.
2. Explain various design techniques such as design templates, animation scheme, color schemes and
adding sound.
3. Each group of students to present their slide shows to the class, giving explanations as necessary,
presentation software, spare paper, magazi nes, newspapers, reference books etc.
Field Trip
Organize a field trip to various historical places in Ethiopia to get useful information and present the slide
shows to the class.
UNIT OUTCOME
Students will be able to:
understand the responsible behaviour in the computer laboratory;
recognize the nature of computer virus and measure to protect.
3. N o gum, eat or drinks in the computer lab, electronic equipment does not like to get wet or
sticky.
4. Listen to directions given by your computer teacher.
5. Review your notes, on-line materials and of course the H ELP option in all programs.
6. Only use the Internet as instructed. Do not click on links that seem suspicious or are offers of “f ree”
anything.
7. Do not use the mouse or keyboard as a toy, that is, do not randomly click on the mouse or hit the
keys on the keyboard without a purpose.
8. Do not change computer preference settings or endeavour to “h ack” into unauthorized areas.
9. A lways use print preview before you print.
10. Take permission from your computer teacher before printing.
1. B efore leaving from the computer lab you should follow these procedures:
(i) Exit any programs you are using. The login screen should be showing on the desktop. Return
supplies (if any).
(ii) Straighten your work area and retrieve your books from the book shelf.
(iii) Log Off/ Turn Off your computer and push in your chair.
Do not give own or another’ s data to anyone. E-mail address should not be given to anyone. A lways
stick to safe on-line behaviour.
Sanctions
It is always expected that students will follow these rules and codes of behaviour; there may be occasions
when sanctions will need to be invoked (called upon), including:
1. Temporary removal from the lesson (time out).
2. A temporary or permanent ban on I n ter n et use or even using the computers in general. (P arents
would usually be informed at this stage.)
3. Wh en necessary, police or local authorities may have to be involved.
4. A dditional disciplinary action may be added in line with existing practice on inappropriate language
or behaviour.
Table 3.1 gives some responsibilities of the schools relating to ICT, which need to be allocated.
Table 3.1: Some Responsibilities Relating to ICT
M anaging the implementation of ICT policy Ensuring safe on-line behaviour
Ensuring staff access to ICT A ssessment of students
Ensuring attitude towards ICT Overseeing equipment maintenance
Ensuring ICT progression H ealth and safety policy and practice
Pu rchasing/ organizi ng ICT resources Reviewing the ICT policy
The following points must be included for implementing the ICT policy:
1. H ow does the school ensure that all students have opportunities to use ICT according to their
needs?
2. H ow does ICT help to give students with special educational needs access to the whole
curriculum?
3. H ow does ICT support gifted students?
4. H ow is the gender issue handled?
5. Wh at account is taken of pupils’ use of ICT at home?
A ll pupils should be given equal access to ICT within the school with appropriate arrangements being
made to support individual needs, when and where necessary.
The day-to-day organizat ion procedures, guidance, rules and other operational matters should be placed
in a school handbook.
70 Information Communication Technology — Grade 9 Student Textbook
Unit – 3 Information and Computer Security
Please complete and return this form to the ICT Co-ordinator or Computer Teacher.
Student’s agreement:
I have read and understood the school rules for ICT policy. I will use the computer systems
and Internet in a responsible way and obey these rules at all times.
I understand that if I break these rules then I may not be allowed to use the Computer
Lab.
Parent’s/Guardian’s Acknowledgement:
I have read and understood the school rules for ICT policy and give permission for my son/
daughter to live with it. I understand that the school will take all reasonable precautions
to ensure that students cannot access inappropriate materials, although I understand that
the school cannot accept liability for the material accessed, or any consequences of Internet
access.
Computer Viruses
A computer virus is a malicious program that is designed to corrupt or
delete the information stored in the computer. Y ou will know if you have a
computer virus very quickly, because nothing will function as it should. If
other computers are connected to this computer by network or e-mail, the
virus can be spread very quickly because the virus replicates itself to enter and Fig. 3.3: Computer virus can
infect these computers (see Fig. 3.3) . create problems on computer
Computer V iruses are spread through transportable secondary storage devices and networks.
Activity 3.1
RESPONSIBLE BEHAVIOUR IN THE COMPUTER LABORATORY
In small groups students will discuss “Responsible Behaviour in the Computer Laboratory”. The group leader
from each group will give a brief presentation to the class based on the discussions.
Computer Laboratory
A computer laboratory is a special place which contains delicate and expensive equipment.
To keep your computer laboratory and computers in proper working condition, it is necessary to behave in a
calm manner and not damage any machines or furniture. You must not touch any electrical connections for
any reason.
Points to be borne in mind while working in the computer laboratory:
Do’s
1. Sit properly and behave in a calm manner.
KEY CONCEPTS
Security of information and related computer systems is a big concern for the computer users.
Computer laboratory contains delicate and expensive equipment.
In computer lab; students must behave in a calm manner and not damage any machines or furniture; they
must not touch any electrical connections for any reason.
School ICT policy means rules prepared by the school and students must live with it.
Computer viruses are software programs which are proving to be main cause of crashing computer system.
The best way to protect computer viruses is installing antivirus software.
Review Questions
Fill in the Blanks
1. Computer laboratory contains ........................... and ........................... equipment.
2. In computer laboratory, the students must not touch any ........................... connections for any reason.
3. A ........................... is a malicious program that is designed to corrupt or delete the information stored in
the computer.
4. The ........................... software protects your computer from virus attacks.
Suggested Activities
1. Explain and demonstrate school ICT policy.
2. Discuss what a computer virus can do to a computer system and demonstrate the measure to protect
the computer.
Field Trip
Students should visit some big educational organizat ion in their city. Interact with faculties there and
prepare a report on “I nformation and Computer Security”. Discuss it in the class also.
76 Information Communication Technology — Grade 9 Student Textbook
Unit – 4 Application Software
Unit 4 APPLICATION
SOFTWARE
UNIT OUTCOME
Students will be able to:
recognize the uses of spreadsheets;
understand the screen elements in the spreadsheet window;
recognize how to create and use simple spreadsheet using text and numbers;
understand how to format worksheets;
recognize to use built in functions and create custom formula.
4.1 SPREADSHEETS
l Introduction
A spreadsheet is a document which helps you organiz e data in rows and columns that intersect to
form cells.
The electronic spreadsheet is the brain child of Dan Bricklin and Bob Franktor. B ehind the invention
of first electronic worksheet VisiCalc (V isible Calculator) was this duo. Bricklin, a H arvard B usiness
school student, got the idea of V isiCalc while spending hours manually to solve financial-planning
problems.
Purpose of a Spreadsheet
A spreadsheet package is a numeric data analysis tool, which not only allows us to quickly calculate
and analyse numbers, but also lets us quickly explore a variety of possible outcomes. The spreadsheet
allows users to create tables and financial schedules by entering data and formulae into rows and columns
arranged as a grid on a display screen. Some examples of spreadsheets are M icrosoft Excel, Corel
Q uattro Pr o, OpenOffice Calc, Google Spreadsheets, Lotus-1 2 3 etc.
l Starting Spreadsheets
M S-Excel 2 0 0 7 is a GU I based spreadsheet package that is part of M icrosoft Office 2 0 0 7 suite of
software. It is a powerful spreadsheet package that supports data of various formats, pictures,
graphs and drawing objects. There are 1 ,0 4 8 ,5 7 6 rows and 1 6 ,3 8 4 columns in an Excel worksheet.
It has got many user friendly features that makes it the first choice of its users.
Suppose you are having M S-Excel 2 0 0 7 installed on your computer. To start M S-Excel 2 0 0 7
perform the following:
Information Communication Technology — Grade 9 Student Textbook 77
Unit – 4 Application Software
3. Double click the Blank Workbook or click on the Create button (see Fig. 4 .4) .
Using a Spreadsheet
Each cell in a spreadsheet can contain words, a number, or a formula. Data is always entered in the active cell
and at one time only one cell can be active. N ow, you can use the spreadsheet as per your requirement.
F i l l H a n d l e is a small black dot or square in the bottom right corner of the active cell. The fill handle
has a number of uses including copying a cell’ s contents to adjacent cells or to create a series.
If Excel recognizes the cell contents as part of a series it will Auto Fill other selected cells with the next
items in the series. U se the fill handle by clicking on it with the mouse pointer to drag select adjacent
cells.
A fter entering the data, the worksheet may look as shown in Fig. 4.6.
D rag S le ec t is a method used to select a range of cells. To do so, click on a cell with the left mouse
button and, without releasing the button drag the pointer over a block of cells. Release the mouse
button once the correct block, or range of cells has been selected.
Editing Data
To edit data (in case we have made mistakes or some changes are required),
1. Double-click the cell, which has to be edited.
2. U se the arrow key if necessary then press B ackspace or Delete key to edit the content of the cell.
3. Pr ess the Enter key.
OR
1. Select the cell, which needs to be edited.
2. Click the Formula bar.
3. U se the B ackspace or Delete key to edit the content of the cell.
4. Pr ess the Enter key.
Formatting Spreadsheet
Formatting refers to the act of changing the appearance of data in cells. Data in M S-Excel can be grouped
into two broad categories: text and numbers. Different formatting options are available for these two
categories of data. Excel allows many formats for numeric data, for example, general number, positive
number, decimal number and its precision, currency etc.
For textual data, Excel allows you to change fonts, colors, sizes and other features. Excel has a complete
dialog box for formatting cells.
I n ser ti n g C ol um n s, R ow s an d C el l s
M S-Excel 207 provides an easy way to insert columns, rows or cells.
To insert a column,
1. Open an existing worksheet (refer to Fig. 4.6) . Select the cell before which you want to insert the
column.
2. Select the Insert Sheet Columns option from Insert available in Cells panel of H ome tab (see
Fig. 4.7 ).
Information Communication Technology — Grade 9 Student Textbook 81
Unit – 4 Application Software
To insert a cell,
1. Open an existing spreadsheet (refer to Fig. 4.6) .
2. Select the Insert Cells... option from Insert available in Cells panel of H ome tab (see Fig. 4 .1 1 ).
D el te i n g C ol um n s, R ow s an d C el l s
M S-Excel 207 provides an easy way to delete columns, rows or cells.
To delete a column,
1. Open an existing worksheet (refer to Fig. 4.6) .
2. Select the column to be deleted.
3. On right clicking the selected column, a shortcut menu appears.
4. Select the Delete option from the shortcut menu (see Fig. 4.14) .
l Addition
For addition, perform the following steps:
1. Create a new worksheet.
2. Type Add in cell A 1. Pr ess Enter key.
3. Type 2 in cell A 2. Pr ess Enter key.
4. Type 3 in cell A 3. Pr ess Enter key.
5. Type = A 2 + A 3 in cell A 5.
6. Click the check mark on the Formula bar. Excel adds cell A 1 to cell A 2 and displays the result in
cell A 5. The formula is displayed on the Formula bar (see Fig. 4.19)
Clicking the check mark on the Formula bar is similar to pressing Enter key. Excel records your entry
but does not move to the next cell.
Similarly, you can subtract, multiply and divide the data by using the proper operators (see Fig. 4 .1 9).
86 Information Communication Technology — Grade 9 Student Textbook
Unit – 4 Application Software
l Sum (dragging)
To find sum by dragging method, perform the following steps:
1. Type your data and apply sum formula in a cell where you wish to store the result.
2. Select the cell with the sum formula.
3. A ctivate the formula drag corner. To drag a formula you can easily do so by using the cursor to
highlight the lower right corner of the cell, where a drag box will appear.
4. Drag the formula to the new cells. To drag the sum formula across the span of other cells, left-click
on this drag box and hold as you drag the box to highlight new cells. Wh en you let go off the mouse
button, the formula will appear in all of the cells that you highlighted when you used the drag box
(see Fig. 4.20) .
Function
Afunction is a built-in formula that performs calculations on a range of values. It allows you to perform
mathematical, statistical and date-time functions. For example, Sum, A verage, Count, M ax, M in etc.
Information Communication Technology — Grade 9 Student Textbook 87
Unit – 4 Application Software
Fig. 4.23: Using fill handle for copying after applying bold to a cell
3. A dd bold formatting (Ctrl + B) to the data in cell A 1.
4. P lace the mouse pointer over the small black dot in the bottom right corner of cell A 1.
5. The mouse pointer will change to a small plus sign(+ ) when you have it over the fill handle.
88 Information Communication Technology — Grade 9 Student Textbook
Unit – 4 Application Software
6. h W en the mouse pointer changes to the plus sign, click and hold down the mouse button.
7. Drag the fill handle to cell A 7 to copy the data and the bold formatting to cells A 2 , A 3, A 4, A 5, A 6
and A 7 (see Fig. 4.23) .
8. Cells A 1 to A 7 now all contain the bold formatted data Ethiopia (see Fig. 4.24) .
Copying formulas to other cells only works if the formula is created using cell references.
Activity 4.1
ADDING BACKGROUND TO A WORKSHEET, FORMATTING CELLS, NUMBERS, ALIGNMENT, FONT,
BORDERS AND PATTERN
In small groups students will discuss “Formatting of Worksheet” to make screen displays more readable and
attractive.
For formatting a worksheet, perform the following steps:
1. Open a worksheet.
2. Type the data you wish to format (see Fig. 4.25).
3. Now apply the formatting required i.e., Adding background, Formatting cells, Numbers, Alignment, Font,
Borders and Pattern. Doesn’t the worksheet look really attractive! (see Fig. 4.26).
KEY CONCEPTS
A spreadsheet is a document which helps you organize data in rows and columns that intersect to form
cells.
In a spreadsheet each cell can contain words, a number, or a formula.
Some examples of spreadsheets are Microsoft Excel, Corel Quattro Pro, OpenOffice Calc, Google Spreadsheets
and Lotus–123 etc.
MS-Excel has screen similarities with MS-Word and other MS products; main differences in a spreadsheet
are
(i) the formula bar which is used for operations on cells such as calculations
(ii) the working area.
A function is a built-in formula that performs calculations on a range of values. Some examples of functions
are Sum, Average, Count, Max, Min.
Review Questions
Fill in the Blanks
1 . ........................... is a GU I based spreadsheet package that is a part of M S-Office 207 suite of software.
2. In Excel, Title B ar shows the name of the ........................... .
3. The ........................... is a small black dot or square in the bottom right corner of the active cell.
4. In M S-Excel, we can use some ........................... to calculate totals and averages.
Suggested Activities
1. Explain and demonstrate the features of spreadsheet.
2. Explain and demonstrate how to calculate sum(total) using auto sum.
3. Explain and demonstrate formatting text and numbers in a cell.
4. Explain and demonstrate cell reference: A bsolute and Relative.
Field Trip
U sing the Internet or computer magazi nes, look up information on M S-Excel 201. List any features you
find. List which of these features appeal to you and describe why they do.
UNIT OUTCOME
Students will be able to:
understand the Internet as a global network;
recognize the meaning of some basic terms related to the Internet;
recognize the work with a search engine to search for items;
understand hotspots and hyperlinks;
comprehend the meaning of some common e-mail terms.
l Definition of Internet
Internet is the network that is available to users across the globe (see Fig. 5 .1 ). It is called “ the mother
of all networks” .
OR
Internet is the network that contains other networks of computers around the globe into one
seamless network (see Fig. 5 .1 ). These networks link educational, commercial, nonprofit and military
entities, as well as individuals.
A uctions Sell old stuff, acquire more stuff, with online auctions.
E-mail and discussion groups Stay in touch worldwide through electronic mail and online chat rooms.
E-shopping Pr ice anything from plane tickets to cars, order anything from books to
sofas.
Research and information Find information on any subject, using browsers and search tools.
Telephony and conferencing M ake inexpensive phone calls; have online meetings.
Wh o G ov er n s the I n ter n et ?
Y ou will be surprised to know that there is no one who owns or runs the Internet. Every subnetwork
of Internet is responsible for maintenance of its own part and does not bother about the other one.
The Internet is coordinated by many volunteer organisations and no single organisation is having the
complete control over it.
l Terms
Wo rld W ide W eb (WW) is a set of programs, standards and protocols that allows the text, images,
animations, sounds, videos to be stored and accessed and linked together in the form of websites. B asically,
W is a collection of millions of web pages stored in thousands of computers all over the world. It is a
safe house for storing information on the Internet.
Website
A computer with a domain name is called a website (site). The top-level domains are .com, .edu, .org, and
.net. Wh en you decide to buy books at the online site of a bookseller, you would visit its website. The
website is the location of a web domain name in a computer somewhere on the Internet.
Each website has a unique address.
Web Page
A website is composed of a web page or collection of related web pages. A web page is a document on the
Wo rld W ide W eb that can include text, pictures, sound and video. The first page you see on a website
is like the title page of a book. This is the home page, or welcome page, which identifies the website and
contains links to other pages at the site.
If you have your own personal website, it might consist of just one page—t he home page. Large websites
have many pages.
The contents of home pages often change. Or they may disappear, and so the connecting links to them
in other web pages become links to nowhere.
Browser
B rowsers are software for connecting with websites. A web browser, or simply browser, is software that
enables users to locate and view web pages and to jump from one page to another. It is what you use to
get around the web. A web browser makes it easy to navigate (or “s urf” ) the web and to download items.
For example, Internet Explorer, M ozi lla Firefox, Google Chrome, etc.
Internet Explorer
Internet Explorer is one of the most popular web browsers (see Fig. 5.3) .
Mozilla Firefox
M ozi lla Firefox browser is coming up very fast i.e., its users are increasing everyday (see Fig. 5.4) .
Google Chrome
Google Chrome is providing a tough fight to other web browsers and is very popular among users (see
Fig. 5.5) .
Information Communication Technology — Grade 9 Student Textbook 95
Unit – 5 Using Internet
In addition to the Standard toolbar and the A ddress bar, IE also includes a Links bar and a Radio
toolbar. Like the toolbars in other W indows programs, you can show, hide, size and arrange the IE toolbars
to suit your work style.
Address Bar
The Address bar indicates the location of the W eb page currently displayed in the content window
(see Fig. 5.7) . This location is also known as Uniform Resource Locator (U RL). Y ou can think of a U RL as
the Internet address of a web page. The A ddress bar also provides a drop-down list of the recently visited
sites.
Standard Toolbar
The Standard toolbar provides buttons to facilitate navigation, searching, printing and other common tasks.
Y ou can customise this toolbar to include other buttons—s uch as cut, copy and paste—an d you can delete
any of the default buttons that you do not commonly use. Figure 5.8 shows the Standard toolbar.
History
The history list allows you to quickly return to the page you have recently visited. If you want to return to
a previously viewed site using Internet Explorer, click on History.
Favorites
One great helper for finding your way is the favorite system, which lets you store the U RL or web pages
you frequently visit so that you do not have to remember and retype your favorite address.
If you are at a website you may want to visit again, you click on your Favorites (in Internet Explorer)
button and choose Add to Favorites. Later, to revisit the site, you can go to the Favorites menu, and site will
reappear.
l Using Internet
To connect to the Internet, we have to connect our computer to the computer server of Internet Service
Pr ovider (ISP) . ISP’ s are companies which provide Internet related services to its users. ISP’ s have special
computers called Internet Servers which are connected to the Internet from one end and to several users from
the other end. These servers work 24 hours a day, 365 days a year to provide services to their customers.
Y ou must follow the rules and regulations in the use of Internet (netiquette). In general, netiquette has two
basic rules:
1. Do not waste people’ s time, and
2. Do not say anything to a person online that you would not say to his/ her face.
Information Communication Technology — Grade 9 Student Textbook 97
Unit – 5 Using Internet
l Browsing Information
The words “B row si n g ” or “S urf i n g ” are used to describe the process of looking at documents, websites
and web pages on the Internet. A s mentioned earlier you will need to use a W eb B rowser for this. M any
people will use Internet Explorer, which is the M icrosoft B rowser that is supplied with most PC s, but there
are alternative (some say better) solutions such as Firefox and Google Chrome.
B row si n g b eh av i our differs from person to person. To access a website you can either type the domain
name (the website address) of the website directly into the address bar or you can use a search engine to
search for the site using the business name or some other keywords that you know can be found on the
website.
l Saving Document
A fter browsing information, it can be saved for future use. For saving a document, perform the following
steps:
1. Click on the File menu.
2. Select the Save Page As (Ctrl + S) option (see Fig. 5.9) .
l Saving Images
A fter getting the images, perform the following steps to save these:
1. Right click on the image.
2. A menu appears (see Fig. 5.10) .
l Printing Documents
For printing a document, perform the following steps:
1. Click on the File menu.
2. Select the Print (Ctrl + P) option (see Fig. 5.1) .
l Searching Information
In order to help you locate information easily, there are a number of websites on the Internet that provide
a search engine (a program that helps to locate information on the Internet). Let us have look at a search
engine and use it to locate information. First, let us go to the side http:/ / www.google.com/ , which offers a
search engine.
In the space provided for the search, you need to enter the word or words that describe the item you
wish to search for, specify if you want the search to be based on the Wo rld W ide W eb or Ethiopia tourism
(see Fig. 5.12) and then press Enter key.
The names of the websites are links; you can click them to access the requried page. N ow, go ahead
and find the required information.
H yperlinks enable you to navigate the W eb by clicking words, icons, pictures or other graphics on
a web page. Wh en you point to a hyperlink, your mouse pointer changes to a pointing hand. A t the
same time, the browser status bar shows you the U RL associated with the hyperlink to which you are
pointing.
Text-based hyperlinks are often underlined or displayed in a different color than the rest of the text on
a W eb page. Graphics-based hyperlinks can be icons, logos, buttons, photographs and so on. Clicking
a hyperlink is just one way to access a specific U RL.
Activity 5.1
TO INVESTIGATE FOUR SEARCH ENGINES (FOR EXAMPLE ALTAVISTA, LYCOS, GOOGLE AND YAHOO),
EXPLAINING THE FEATURES OF SEARCH ENGINES, AND WRITE A REPORT ON THE PREFERRED SEARCH
ENGINE, GIVING REASONS OF ITS PREFERENCE.
In small groups students will investigate four search engines, explain their features and present their report in
the class.
Search Engine
A search engine is a website that collects and organizes content from all over the Internet. Those who wish to
locate something would enter a query about what they want to find and the engine provides links to content
that matches it. For example, AltaVista, Lycos, Google and Yahoo.
Let us investigate these search engines and explain their features:
1. AltaVista: It is a web search engine owned by Yahoo! (see Fig. 5.14). AltaVista was once one of the most
popular search engines but its popularity declined with the rise of Google.
2. Lycos: It is one of the oldest search engines (see Fig. 5.15). It was originally developed at Carnegie Mellon
University to calculate the size of the web using a “spider” robot program that walked around the Internet
from site to site through page links.
KEY CONCEPTS
Internet is the network that is available to users across the globe.
The major use of Internet is for searching the information stored in millions of computers of the Internet.
A web browser, or simply browser, is software that enables users to locate and view web pages and to jump
from one page to another. For example, Internet Explorer, Mozilla Firefox, Google Chrome etc.
Screen elements of Internet Explorer are: Menu bar, Address bar, Standard toolbar, Workspace, Content
window, Status bar etc.
Examples of search engines are AltaVista, Lycos, Google and Yahoo.
Information Communication Technology — Grade 9 Student Textbook 103
Unit – 5 Using Internet
Assessment 5.1
Fill in the Blanks
1. ...................................... is called “t he mother of all networks”.
2. A computer with a domain name is called a ...................................... .
3. To use the web, the software you need is a ...................................... .
4. Google has a ...................................... engine.
Suggested Activities
1. Explain the difference between a website and web pages; show some sites and pages.
2. Explain that each website has a unique address; a website holds information; creation of websites briefly;
there may be a few or many pages on the website.
3. Explain and demonstrate some hyperlinks, and returning back to the original web page.
Field Trip
Students to locate the name and telephone number of a local Internet access provider. A lso, get the name,
telephone number, and e-mail address of their help desk so they can help if you have any questions getting
connected. A sk the following questions.
(i) Wh at is the one-time connect charge, if any?
(ii) Wh at is the monthly charge?
(iii) H ow many free hours are there?
(iv) Wh at is the cost per hour after you exceed the maximum free hours?
(v) Do they provide an e-mail address?
(vi) Wh at browser is required? Do you have a choice?
The name that you enter in the Y ahoo ID text box is your yahoo mail ID. Y ou can choose any name for
the ID, but it should be one that you can identify easily. It has to be unique, since two people cannot have
the same ID. For example, let us assume your name is Senya A li and you choose Senya_A li as your ID. If
there is already another user with the same ID, you will be asked to choose a different ID.
Click the ‘ Create M y A ccount’ button (see Fig. 5.21) .
Editing of an e-mail message can be done like editing of text in M S Wo rd. V arious editing features like
font, font size , bold, italic, underline, text color, emoticons, text alignment, bullets, numbering etc. are
available in the mail box.
Spell checking must be done before sending e-mail messages by the user. Y ou can spell check by
clicking the Spelling button in the mail box.
Sending an e-mail
First of all compose your e-mail. N ow, enter the recipient’ s e-mail address in the ‘ To’ option. Y ou can send
copies of the mail to other users by using the ‘ Cc’ option. Y ou can enter the contents and addresses in the
appropriate places provided.
Click the ‘ Send’ button when you have typed in the message and addresses and you are ready to send
the e-mail. M ka e sure that y ou hav e sp el l c hec k e d the m es sag e b ef ore sen d i n g i t.
From the Sent folder, you can view the message sent.
Replying to an e-mail
To reply to an e-mail, use the Reply command icon. A fter clicking Reply button you will see a screen similar
to shown in Fig. 5.26, where you can type your reply message.
l Distribution List
A distribution list, also known as a mailing list, is a collection of e-mail addresses that allows you to e-mail
multiple people at one time. A distribution list can contain a few addresses, or many. Wh en you send to a
distribution list, you are really sending to everyone whose address is included in the list (see Fig. 5.28) .
3. Click “C ontacts” link in the left pane of the window if you are using “Y ahoo M ail” or click the
“C ontacts” tab near the top of the window if you are using “Y ahoo M ail Classic” (see Fig. 5.30) .
System
Categories
User-defined
Categories
l Attachments
If a file of your matter exists in the computer from which you are sending e-mail, you can write your e-mail
message, (your cover note) and then use the A ttach link to attach the document. Such attached documents
may be in M S Wo rd or Excel and are called attachments.
W h ile you could also copy your document into the main message and send it that way, some e-mail
software lose formatting options such as bold or italic text or special symbols. Thus, the benefit of the
attachment feature is that it preserves all such formatting, provided the recipient has the same software
that you used for creating the attachment. Y ou can also attach pictures, sounds, videos, and other files to
your e-mail message.
Sending
To send an e-mail attachment,
1. A ddress the person who will receive the attachment.
2. Wr ite a ‘ ‘ cover letter’ ’ e-mail or your message advising the recipient of the attachment.
3. Click on Attach button on your e-mail software’ s toolbar.
4. Select the file you want to attach.
5. Click on Send to send the e-mail message and the attachment (see Fig. 5.3) .
Receiving
Wh en you receive a file containing an attachment, you will see an icon indicating that the message contains
more than just text. Y ou can click on the icon to see the attachment. If you have the software the attached file
was created in, you can open the attachment immediately to read or print, or you can save the attachment
in a location of your choice (on your computer). Y ou can also forward the attachment to another person.
l Auto Reply
A uto Reply feature is useful when you are on holidays and want to inform people that you would not be
checking your e-mail for a few days. In other words, you may also want to take holidays from e-mail and
answering it.
114 Information Communication Technology — Grade 9 Student Textbook
Unit – 5 Using Internet
Surely, you will read and reply to all your e-mail when you will be back. Y ahoo M ail offers a nice way
to tell those who send you e-mail during this period that they should not expect an immediate answer.
KEY CONCEPTS
E-mail is the exchange of messages stored on computers, through a communication channel.
To send and receive e-mail, you need to create an account with an e-mail service provider.
Composing of an e-mail message is done very much like a paper letter.
All e-mail systems have the ability to send, receive and discard mail.
Auto Reply feature is useful when you are on holidays and want to inform people that you would not be
checking your e-mail for a few days.
Review Questions
Fill in the Blanks
1. E-mail was one of the first uses of the ..................... .
2. Y ou do not have to be ..................... while composing your e-mail messages.
3. The attached documents (e.g., in M S Wo rd or Excel) with your e-mail message are called ..................... .
4. A ..................... is a collection of e-mail addresses that allows you to e-mail multiple people at one time.
State Whether True or False
1. E-mail is not very popular now a days.
.2 To send and receive your e-mail, you do not require an e-mail account.
.3 Y ou can attach pictures, sounds, videos, and other files to your e-mail message.
.4 A uto Reply is not a useful feature during your holidays.
Multiple Choice Questions
1. Wh o owns the Internet?
(a) N o one owns the Internet (b) M icrosoft (c) IB M (d) U .S. government
2. A location on the Internet is called a/ an ...................................... .
(a) U ser ID (b) Domain (c) B rowser (d) W eb
3. Wh ich of the following is/ are e-mail service provider(s)?
(a) Y ahoo (b) Gmail (c) H otmail (d) A ll of these
4. A distribution list is also known as a ...................................... .
(a) M ailing list (b) A uto reply (c) A ttachment (d) Item list
Match the Following
Column A Column B
1. B rowsing (a) Search engine
.2 A ltaV ista (b) A lso known as surfing
.3 E-mail systems (c) Can be used when you are on holidays
4. A uto Reply (d) H ave the ability to send, receive and discard mail
Answer the Following
1. Wh at is e-mail? Give the steps to create an e-mail account.
2. Give the steps to compose and send an e-mail.
3. Give the steps to receive and open an e-mail.
4. Discuss the facilities provided in the e-mail system.
Suggested Activities
1. Explain why distribution lists are useful and demonstrate how to implement.
.2 Explain and demonstrate how to attach a file to an e-mail, and how to open an attachment on an
incoming mail.
3. Open a browser and indicate the following screen elements:
M enu bar, A ddress bar, Standard toolbar, Status bar and Wo rkspace.
116 Information Communication Technology — Grade 9 Student Textbook
Unit – 6 Control and Learning with LOGO
UNIT OUTCOME
Students will be able to:
understand the logo language;
recognize to produce a variety of diagrams using the logo language.
Starting LOGO
To start L O G O , perform the following steps:
Click S ta rt → Al l P rog ra m s → M i c rosof t W i n d ow s L og o → M i c rosof t W i n d ow s L og o
(see Fig. 6 .1 ).
The turtle moves on the screen according to the commands given. It understands only LOGO
commands. Centre of the screen is the home of the turtle.
l Using Primitives
W hen you load L O G O , a triangular shape pointer appears at the centre of the screen called Turtle.
It has a pointing tip. Turtle indicates that position on the screen, from where the drawing will
start. In other words, we can say that turtle is a point of invisible pen, that helps in drawing
figures. The home position of turtle is in the centre of the screen, where it appears in the beginning.
The primitives are typed in the white space at the bottom left corner of the screen known as the
Command Input B ox.
The first step to learn any drawing is to know about drawing a line. Therefore, you will read
about some primitives which are useful in drawing lines and boxes.
Information Communication Technology — Grade 9 Student Textbook 119
Unit – 6 Control and Learning with LOGO
Forward (FD)
This primitive moves the turtle in the forward direction with the number of steps mentioned with
the primitive. The turtle draws a line while moving. For example, to draw a line of 4 0 steps type
the following command in the Input B ox.
C O M M AN D R E S U L T
Back (BK)
Turtle moves backward and draws a line of specified number of steps.
The turtle moves in the direction, where it has its back.
It is just like driving a car in reverse (back) gear.
For example, to draw a line of 50 steps in backward direction, type the following command in the Input
B ox.
C O M M AN D R E S U L T
R i g ht ( R T )
To turn the Turtle in right or clockwise direction, use RT/ RIGH T primitive. It needs number of degree to
know the angle of turn. For example,
L fe t ( L T )
To turn the Turtle towards left or in anti-clockwise direction, use LT/ LEFT primitive. It needs number of
degree to know the angle of turn. For example,
W e can move the turtle forward, backward, right and left on the screen.
Home
Turtle always rests in the centre of the screen which is known as its home. From here, the turtle moves
around the screen.
H OM E primitive sends the turtle in the centre of the screen. The H OM E primitive is not followed by
any number. The turtle draws a line as it goes back to its home and faces upwards in its home position.
For example,
Type the following commands in the Command Input B ox to see the output shown on right side:
FD 10 ↵
RT 90 ↵
FD 10 ↵
H OM E ↵
H i d e T urtl e ( H T )
W h en this command is entered, the turtle disappears from the screen.
Turtle follows all the commands and can draw anything even though it is not seen on the screen. For
example,
1. N o space(s) is/ are required within a primitive. If you give space, error message appears.
2. To use more than one primitive at a time, we must leave a space in between them.
S how T urtl e ( S T )
ST command brings the turtle back on the screen, which had disappeared using H T command. For
example,
C l ear T ext ( C T )
It clears the Text A rea.
A ll the commands disappear from the Listener window. For example,
C l ear S c reen (C S )
CS command clears the Graphics area. For example,
CLEA N command clears the entire drawing from the screen but leaves the turtle at its last position.
P en U p (P U )
A s you lift your pencil up when you want to leave some gap between the two words while writing, so is
the case with the turtle.
To move the turtle without drawing a line PE N U P primitive is used. There is no need to give any
number after P EN U P command. For example, to draw the two lines shown on left, type the commands
shown on right side.
In the above example, we have used PD command, let us see why this command has been given.
P ne D ow n ( P D )
Y ou cannot draw till you put your pencil down. The same way, turtle starts drawing again only when
you give P EN DOW N (P D) command. There is no need to mention any number after P D command. For
example,
P ne E ras e ( P E )
The turtle can erase a line on which it moves. For this P EN ERA SE (P E) primitive is used. Y ou need to move the
turtle on the lines you want to remove/ erase after giving P E command. For example,
To erase a line of 10 steps so that this figure can become a square of 40 steps, give the following
commands:
To bring your turtle in the normal mode again, give PE command so that you can complete your figure
after correcting the mistake.
Type the following command in the Command Input B ox to create a circle of radius 8 0 with the turtle
at the edge of the circle:
CIRCLE2 80 ↵
P ri n t C om m an d
P RIN T/ P R primitive is used to display a letter, number, word or a sentence on the screen. It can also
be used for doing calculations. This command takes only one input at a time and displays the output in
Recall List B ox. For example,
P RIN T 201 ↵
Use “ before a letter/word and enclose a sentence in “ “ or [ ].
R pe eat C om m an d
REP EA T primitive is used when same set of commands are to be given again and again. Instead of
typing same set of commands repeatedly, they can be clubbed up in a single line REP EA T command. For
example, to draw a square of side 6 0 steps, type the following command:
REP EA T 4 [FD 60 RT 90] ↵
OR
REP EA T 4 [FD 60 RT 360/4] ↵
H ere, the number 4 after the REP EA T primitive, tells the computer to repeat four times whatever
command is given within the square bracket.
The structure of REP EA T command is:
JN o. of turtle steps in N
N o. of times
K each line direction and O
REP EA T the commands are
K O
KK the angle by which
to be repeated OO
L turtle turns each time P
N ow, type the following command in the Command Input B ox to draw the regular polygons (pentagon
and hexagon) by using the REP EA T command:
REP EA T 5[FD 100 RT 72] ↵
REP EA T 6[FD 100 RT 60] ↵
For an N side regular polygon, the Turtle will turn by 360/ N degrees.
Procedures
Pr ocedures are the heart of LOGO and other programming languages. Pr ocedures are small programs that
can be called on again and again through one word and without typing them all out.
The structure of a procedure in LOGO is:
To Procedurename
Steps of the procedure
End
A procedure must start with the word To, followed by a name you give. Then come all the steps you
would write on the command line. A procedure must end with the word End.
Random Command
LOGO provides one of the best ways of stimulating children in their work by using the RA N DOM command.
The command RA N DOM is usually followed by a number. For example,
RA N DOM 1 5 ↵
would generate a random integer number less than 15.
Type the following and see the output:
REP EA T 5 [SH OW RA N DOM 100] ↵
H ow d o y ou w ri te a p roc ed ure i n L O G O ?
A LOGO procedure can be written in the following ways:
1. U sing the Input B ox (see Fig. 6.4) , which can be opened
by typing in TO followed by the Pr ocedure N ame in the
Command Input B ox.
2. U sing the Editor window (see Fig. 6. 5) , which can be opened
Fig. 6.4: User Input Box
by any one of the following:
(i) Clicking the Edall button on the Button bar
(ii) U sing the Edit option in the File menu
(iii) Typing “ Edit Pr ocedure N ame in the Command Input B ox (do not forget quotation mark before
Pr ocedure N ame).
Let us write a simple procedure S Q U AR E in LOGO, using the I n p ut B ox , to draw a square of side of
length 50.
To code, run and save the procedure, perform the following steps:
1. Click the I n p ut B ox .
2. Type in T O followed by the name of the procedure, here we type, T O S Q U AR E .
3. Pr ess the Enter key. The user I n p ut B ox appears.
4. Enter the set of instructions one after other for drawing a square. Pr ess the Enter key after each
line.
5. Wh en all the instructions have been entered, type in E N D and press the Enter key. Y our Pr ocedure
S Q U AR E has been defined. The entered procedure code is shown below:
TO SQ U A RE
; Pr ocedure SQ U A RE
CS ; Clear Screen
REPEAT 4 [FD 50 RT 90]
H T ; H ide Turtle
EN D
6. To run the procedure, type S Q U AR E in the C om m an d I n p ut B ox and press the Enter key.
This draws a square of side length 5 0 on the graphics screen as shown below:
In LOGO, you can put a procedure within REPE A T command or within another procedure. Let us write
procedures to include REPE A T and RA N DOM command:
E xam p l e 1: Wr ite a procedure to draw a simple star shape using REPE A T command.
TO STA R
; Pr ocedure STA R
CS ; Clear Screen
REPEAT 10 [LT 60 FD 50 RT 120 FD 50 LT 60 RT 36]
H T ; H ide Turtle
EN D
Type the following in the Command Input B ox and press the Enter key to run the procedure:
STA R
Y our output may be different every time when you run the LOGO procedure(s) having RA N DOM
command(s).
E xam p l e 3: Wr ite procedure(s) to draw squares randomly using RA N DOM command.
Let us write a procedure SQ U A RE1 first and then use it in another procedure RSQ U A RES to draw
random squares:
TO SQ U A RE1
; Pr ocedure SQ U A RE1
REPEAT 4 [FD 40 RT 90]
HT ; Hide Turtle
EN D
TO RSQ U A RES
; Pr ocedure RSQ U A RES
CS ; Clear Screen
REPEAT 30[SQUARE1 PENUP RT RANDOM 360 FD RANDOM 50 PENDOWN]
EN D
Type the following in the Command Input B ox and press the Enter key to run the procedure:
RSQ U A RES
This will draw random squares on the screen, lifting the pen and moving it to a random location before
drawing another square as shown below:
Type ERA SE “Pr ocedure N ame and press Enter key to erase a procedure. The ERA SE A LL command
erases all the procedures.
Activity 6.1
DRAW A VARIET Y OF SHAPES USING THE LOGO PRIMITIVES AND PROCEDURES
Students in small groups will use the LOGO primitives and procedures to draw a variety of shapes. The group
leader from each group will give a brief presentation to the class based on it.
LOGO Primitives
The LOGO Primitives are basic LOGO Commands.
Procedures
Procedures are small programs that can be called on again and again through one word and without typing
them all out.
A S q uar e TO Square
; This procedure will draw a square
CS
REPEAT 4[FD 100 RT 90]
HT
END
KEY CONCEPTS
LOGO stands for Logic Oriented, Graphics Oriented.
MSW LOGO screen is divided in two parts—Graphics window and Listener window.
CS primitive clears the graphics screen.
We can write a procedure in two ways using the “Input Box” or using the “Editor window”.
Procedures are small programs that can be called on again and again through one word without typing them
all out.
The file saved in LOGO will have an extension .LGO.
BYE primitive closes the LOGO.
Review Questions
Fill in the Blanks
1. LOGO was developed by ...................... and his team.
2. Wh en you load Logo, a triangular shape pointer appears at the centre of the screen called .................... .
3. The ...................... primitive moves the turtle in forward direction.
4. The ...................... primitive turns turtle’ s face on left side.
State Whether True or False
1. Logo is a high-level programming language.
.2 Logo is considered an interpreted language because Logo programs are executed by an interpreter.
.3 The B K primitive turns turtle face on right side.
.4 The ST primitive shows the turtle again.
Multiple Choice Questions
1. A ll the figures are drawn by ...................................... in LOGO.
(a) Turtle (b) H and
(c) B ye (d) Pr int
2. Wh ich of the following LOGO primitive moves the turtle’ s face in right side?
(a) ST (b) H OM E
(c) PD (d) RT
132 Information Communication Technology — Grade 9 Student Textbook
Unit – 6 Control and Learning with LOGO
3. Wh ich of the following LOGO primitive moves the turtle in backward direction?
(a) FD (b) B K
(c) H T (d) B Y E
4. A set of LOGO commands referred by a name, which is given to perform a particular task is called a .
..................................... .
(a) Operator (b) Pr ocedure
(c) A ction (d) Random
Column A Column B
1. Graphics window in LOGO (a) Generates a random integer number
2. Listener window in LOGO (b) U sed to exit LOGO
3. B Y E primitive (c) The area where the commands are typed
4. Random command (d) The area where the turtle moves and draws
3. Wh at are LOGO primitives? Explain any four LOGO primitives to draw shapes.
4. Wr ite a procedure using RA N DOM command in LOGO.
Suggested Activities
1. Wr ite a procedure to draw an equilateral triangle.
2. Wr ite a procedure to include a random number generator e.g., throwing a die.
3. U se Full version of LOGO language.
GLOSSARY
A D at a C om m un i c at i on s: The moving or sharing
of encoded information between two or more data
AI ( Arti f i c i al I n tel l i g en c e) : It is the branch of sources using an electronic medium.
computer science concerned with making computers
behave like humans. D i stri b uti on L i st: A lso called a mailing list, is a
collection of e-mail addresses that allows you to e-mail
An al og : It is any fluctuating, evolving, or
multiple people at one time.
continually changing process that represents data by
measurement of a continuous physical variable. D V D : Digital V ersatile Disc or Digital V ideo Disc.
Ap p l i c at i on S of tw ar e: A program that is designed
to perform specific tasks. E
AS C I I : A merican Standard Code for Information E - C om m er c e: B uying and selling or business
Interchange. It is pronounced (as-kee). transaction conducted on the Internet.
B E - M ai l : Stands for Electronic M ail. This is a system
of relaying messages across the Internet, from one
B ac k up : To copy files or data to a second source or Internet user to another.
media so as to safeguard it.
B C D : B inary Coded Decimal. F
B I T ( B i n ar y D i g I T ) : It is the smallest unit of F orm at P ai n ter : H elps to copy the format that has
processing of computerized data in terms of 1s or 0s .
been applied to text and apply it to another.
B row ser : Software program that allows the user to
find and read encoded information in a form suitable F T P ( F i l e T ran sf er P rotoc ol ) : A software protocol
for display especially on Wo rld W ide W eb. for exchanging information between computers over a
network.
B y te: A combination of 8 bits to represent computer
data transfer or data storage measurement.
G
C G i g ab y te ( G B ) : 2 to the 30t h power (1,073,741,824)
C D -R O M ( C om p ac t D i sc R ead - O n l y M em ory ) : bytes. One gigabyte is equal to 1,024 megabytes.
A durable and low cost circular optical storage device G I G O : It is an acronym that stands for Garbage In,
widely used to store large amounts of information. Garbage Out.
C om p uter : A computer is an electronic device that
accepts, processes, stores and outputs data under the H
control of a set of instructions.
C P U ( C en tral P roc es si n g U n i t) : A processor on H ar d w a re : The physical equipment used in a
an IC chip (called a microprocessor) that serves as the computer system, such as the CPU , peripheral devices
and memory.
‘ brain’ of the computer.
H om e P ag e: The initial page of a site on the Wo rld
W ide W eb.
D
H T M L ( H y p er text M ar k up L a n g uag e) : It is a
D at a: A collection of raw facts and figures or a collection of structuring and formatting tags used to
raw input which when processed or arranged makes create W eb pages.
meaningful output.
134 Information Communication Technology — Grade 9 Student Textbook
Glossary