Introduction To Ict, Computer and Windows
Introduction To Ict, Computer and Windows
Introduction To Ict, Computer and Windows
and Computer
A good way to think about ICT is to consider all the uses of digital
technology that already exist to help individuals, businesses and
organisations use information.
ICT covers any product that will store, retrieve, manipulate, transmit or
receive information electronically in a digital form. For example,
personal computers, digital television, email, robots.
Under these two categories, there are products and ideas that are covered
by ICT.
Traditional Computer Based Technologies
Introduction to I.C.T. and Computer
for example.
Types of Network
Internal networks
Usually referred to as a local area network (LAN), this involves linking
a number of hardware items (input and output devices plus computer
processing) together within an office or building.
The aim of a LAN is to be able to share hardware facilities such as
printers or scanners, software applications and data. This type of network
is invaluable in the office environment where colleagues need to have
access to common data or programmes.
External networks
Often you need to communicate with someone outside your internal
network; in this case you will need to be part of a Wide Area Network
(WAN). The Internet is the ultimate WAN - it is a vast network of
networks.
ICT will almost certainly cover the above examples of ICT in action,
perhaps focusing on the use of key applications such as spreadsheets,
databases, presentation, graphics and web design software.
It will also consider the following important topics that deal with the way
ICT is used and managed in an organisation:
Management of information:
This covers how data is captured, verified and stored for effective use;
the manipulation, processing and distribution of information; keeping
information secure; designing networks to share information
INTRODUCTION TO COMPUTER
WHAT IS A COMPUTER
Introduction to I.C.T. and Computer
Computers are not very intelligent devices, but they handle instructions
flawlessly and fast. They must follow explicit directions from both the
user and computer programmer. Computers are really nothing more than
a very powerful calculator with some great accessories. Applications like
word processing and games are just a very complex math problem.
COMPUTER BOOTING
Booting your computer is the process of powering it on and starting the
operating system.
Think of the data that is created when you buy a product from a retailer.
This might includes:
– Time and date of transaction (e.g. 10:05 Tuesday 23 December
2003)
– Transaction value (e.g. £55.00)
– Facts about what was bought (e.g. hairdryer, cosmetics pack,
shaving foam) and how much was bought (quantities)
– How payment was made (e.g. credit card, credit card number and
code)
– Which employee recorded the sale
– Whether any promotional discount applied
At its simplest, this data needs processing at the point of sale in order for
the customer to receive a valid receipt. So the data about the transaction
is processed to create "information" - in this case a receipt.
Information
Information is data that has been processed in such a way as to be
meaningful to the person who receives it. Similarly, information is a
processed data.
Data Processing
Data processing is any process that uses a computer program to enter data
and summarise, analyse or otherwise convert data into usable
information. The process may be automated and run on a computer. It
involves recording, analysing, sorting, summarising, calculating,
disseminating and storing data. Because data is most useful when well-
presented and actually informative, data-processing systems are often
referred to as information systems.
CLASSIFICATION OF COMPUTERS
Introduction to I.C.T. and Computer
MAINFRAME COMPUTERS
They are relatively Centralized large computers built to handle very large
databases, thousands of user terminals with fast response times, and
millions of transactions. Mainframes (often colloquially referred to as big
iron) are large and "expensive" computers used mainly by government
institutions and large companies for mission critical applications,
typically bulk data processing such as censuses, industry/consumer
statistics and bank transaction processing.
MINI COMPUTERS
Minicomputers (colloquially, mini) came after the Mainframes. Though
centralized, they are smaller in size and capacity compared to the
mainframes. It can also be referred to be a largely obsolete term for a
class of multi-user computers which make up the middle range of the
computing spectrum.
MICROCOMPUTERS
Microcomputers or PC's as they are often called, are abundant on our
desks, tables, offices, suitcases, everywhere. This is the most visible
form of computers in the present world and comes in all forms and
breeds. There are many generations of particular design and technical
specifications from the start of this particular design. Examples of micro
computers are the Desktops and portable computers
Desktop Computers
Desktop computers are made up of individual components, such as a
monitor, a keyboard, a system unit, and a printer. Desktop computers are
not portable and are generally placed on the surface of a desk or a table.
The components of desktop computers can easily be replaced or
upgraded. Desktop computers usually have more memory, a larger hard
Introduction to I.C.T. and Computer
drive, more ports, and a bigger display than laptops and other portable
computers. Desktop computers can run continuously for long periods of
time.
Portable Computers
The main feature of laptop computers is that they are small and portable.
As the name suggests, these can easily be placed on the lap of a user.
Desktop computers run on electricity only, while laptop computers run on
electricity or on batteries that can be recharged. However, laptop
computers consume more power than desktop computers with a similar
hardware setup. Laptop computers perform the same tasks as desktop
computers, but laptop computers generally cost more than desktop
computers.
HARDWARE
The hardware are the parts of computer itself including the Central
Processing Unit (CPU) and related microchips and micro-circuitry,
keyboards, monitors, case and drives (hard, CD, DVD, floppy, optical,
tape, etc.). Other extra parts called peripheral components or devices
Introduction to I.C.T. and Computer
Keyboard
The keyboard is
used to type
information into the
Introduction to I.C.T. and Computer
Some of the keys have a special use. There are referred to as command
keys. The 3 most common are the Control or CTRL, Alternate or Alt and
the Shift keys though there can be more (the Windows key for example
or the Command key). Each key on a standard keyboard has one or two
characters. Press the key to get the lower character and hold Shift to get
the upper.
Mouse
Most modern computers today are run using a mouse
controlled pointer. Generally, the mouse has two buttons;
the left one is used to select objects and text and the right
one is used to access menus.
Introduction to I.C.T. and Computer
One type of mouse has a round ball under the bottom of the mouse that
rolls and turns two wheels which control the direction of the pointer on
the screen. Another type of mouse uses an optical system to track the
movement of the mouse. Laptop computers use touch pads, buttons and
other devices to control the pointer. Hand held’s use a combination of
devices to control the pointer, including touch screens.
Mouse Techniques
Mouse Pointer
– Point
– Left click
– Right click
– Drag
– Double click
Monitors
The monitor shows information on the screen
when you type. This is called outputting
information. When the computer needs more
information it will display a message on the
screen, usually through a dialog box. Monitors
come in many types and sizes. The resolution of
the monitor determines the sharpness of the
screen. The resolution can be adjusted to control
the screen's display.
Introduction to I.C.T. and Computer
To get the full benefit of today's software with full colour graphics and
animation, computers need a colour monitor with a display or graphics
card.
Printers
The printer takes the information on your screen and transfers it to paper
or a hard copy. There are many different types of printers with various
levels of quality. The three basic types of printer are; dot matrix, inkjet,
and laser.
✔ Ink jet printers work like dot matrix printers but fire a stream of
ink from a cartridge directly onto the paper.
Modem
A modem is used to translate information transferred through telephone
lines, cable or line-of-site wireless.
The term stands for modulate and demodulate which changes the signal
from digital, which computers use, to analogue, which telephones use and
then back again. Digital modems transfer digital information directly
without changing to analogue.
Anyone who has used the Internet has noticed that at times the
information travels at different speeds. Depending on the amount of
information that is being transferred, the information will arrive at it's
destination at different times. The amount of information that can travel
through a line is limited. This limit is called bandwidth.
Scanners
Scanners allow you to transfer pictures and photographs to your
computer. A scanner 'scans' the image from the top to the bottom, one
line at a time and transfers it to the computer as a series of bits or a
bitmap. You can then take that image and use it in a paint program, send
it out as a fax or print it.
Digital cameras allow you to take digital photographs. The images are
stored on a memory chip or disk that can be transferred to your computer.
Some cameras can also capture sound and video.
Cards
Cards are components added to computers to increase their capability.
When adding a peripheral device makes sure that your computer has a
slot of the type needed by the device.
Sound cards allow computers to produce sound like music and voice.
Though the human ear can't distinguish the fine difference between
sounds produced by the more powerful sound card they allow for more
complex music and music production.
Video cards allow computers to display video and animation. Some video
cards allow computers to display television as well as capture frames
from video. A video card with a digital video camera allows computers
users to produce live video. A high speed connection is required for
effective video transmission.
SOFTWARE
Computer software, or software, is the collection of computer programs
and related data that provide the instructions telling a computer what to
do. The term was coined to contrast to the old term hardware (meaning
physical devices). In contrast to hardware, software is intangible,
meaning it "cannot be touched". Software is also sometimes used in a
more narrow sense, meaning application software only.
These devices are slower than hard disks, but much faster than floppy
disks.
Input
Information and programs are entered into the computer through Input
devices such as the keyboard, disks, or through other computers via
network connections or modems connected to the Internet. The input
device also retrieves information off disks.
Output
Output Devices displays information on the screen (monitor) or the
printer and sends information to other computers. They also display
messages about what errors may have occurred and brings up message or
Introduction to I.C.T. and Computer
dialog box asking for more information to be input. The output device
also saves information on the disk for future use.
Processing
The CPU or central processing unit is sometimes called the Control Unit
and directs the operation of the input and output devices. The
Coprocessor or the Arithmetic-Logic Unit does arithmetic and
comparisons. The memory or RAM temporarily stores information (files
and programs) while you are using or working on them. The BIOS or
basic input/output system controls the dialogue between the various
devices.
Input Devices
An input device is any peripheral (piece of computer hardware
equipment) used to provide data and control signals to an information
processing system (such as a computer). Input and output devices make
up the hardware interface between a computer as a scanner. E.g. of input
devices are Mouse, keyboard, microphone, webcam, etc.
Output Devices
An output device is any piece of computer hardware equipment used to
communicate the results of data processing carried out by an information
processing system (such as a computer) to the outside world.
Printer
Storage Devices
Storage Devices are the data storage devices that are used in the
computers to store the data. The computer has many types of data storage
devices. Some of them can be classified as the removable data Storage
Devices and the others as the non removable data Storage Devices.
The storage devices are one of the most important components of the
computer system. The memory is of two types; one is the primary
memory and the other one is the secondary memory.
The primary memory is the volatile memory and the secondary memory
is the non volatile memory. The volatile memory is the kind of the
memory that is erasable and the non volatile memory is the one where in
the contents cannot be erased. Basically when we talk about the data
storage devices it is generally assumed to be the secondary memory.
The storage devices are used to record the data over any storage surface.
The memories may also be of different types depending upon the
architecture and the design like the optical data storage memory,
magnetic media storage and the mechanical storage media etc and also
the flash memory devices etc.
The data in the storage devices can be in the form of the files, databases,
digital video and the audio etc. The storage devices that are called as the
non volatile can store the data permanently until otherwise erased
purposely. This is in the case of the hard disk drives or the floppy disk
drives.
Introduction to I.C.T. and Computer
The other kinds of the storage media like for example the CD and the
DVD can even have again two types of the storage; the first one is that in
which the data once written cannot be erased. It is stored permanently
over it. While the second type of the CD’s or the DVD’s are called as the
rewritable; where in the data that is once written can be erased
completely and the same storage device can be used again for storing the
different data.
DATA ENTRY
ENTER or RETURN - Moves the cursor down one line and to the left
margin. Enter also process commands such as choosing an option in a
dialog (message) boxes and submitting a form.
SPACE BAR - Moves the cursor one space at a time to the right
SHIFT KEY - Use the shift keys to type capital letters and to type the
upper character on keys with two characters on them
CAPS LOCK - Locks the keyboard so it types capital letters (a light goes
on when caps lock is on)
TAB - Moves the cursor five spaces to the right (number of spaces are
usually adjustable). Tab moves to the next field in a form or table (Shift-
Tab for previous field).
Introduction to I.C.T. and Computer
Some Notebook or Laptop keys are left out because of space limitations
and they usually have a Special function key which allows other keys to
double for the missing ones.
The first is called Touch Typing. The Touch Typist uses the Home Keys
(ASDF for the left hand and JKL; for the right) and all the fingers on both
hands as well as the thumbs for the Space Bar while typing. There are
many commercial and public domain programs that are designed to teach
this method.
The other method is some times called 'Hunt and Peck' or depending on
finger strength 'Search and Destroy'. This involves using one or more
fingers on one or two hands to type. It is a perfectly acceptable way of
using a computer and many people get along fine with this technique.
PERIPHERAL DEVICES
A peripheral is a device attached to a host computer but not part of it, and
is more or less dependent on the host. It expands the host's capabilities,
but does not form part of the core computer architecture.
UNITS OF MEASUREMENT
The information stored in the computer is internally represented in the
form of 0s and 1s. Each 0 or 1 is called a bit. A combination of eight bits
is called a byte.
1 character (8 Bits) = 1 byte
1024 bytes = 1 Kilobytes
1024 Kilobytes = 1 megabyte
1024 megabyte = 1 Gigabyte
1024 Gigabyte = 1 Terabyte
Introduction to I.C.T. and Computer
In the above figure, you can see an example of the Windows XP desktop.
When you first switch on your machine and Windows XP loads, it will
look similar to that shown in our example (although Windows XP by
default has a picture for the desktop background).
Desktop refers to the main background area (in our example the white
area). You can customize your desktop in various ways, including adding
a background picture, changing the background colour, and changing
the size of the icons on the desktop.
Desktop Icons
Icons are small graphical images that can represent your computer's
programs, files, folders and printers amongst other things as in the figure
above.
The icons on your desktop can be renamed by right clicking on them and
selecting rename. They can be deleted by right clicking and selecting
delete.
It's possible to create your own Windows desktop icons for programs,
files, folders, etc.
In our example we have two icons. The outlook icon is for example
purposes only; you may have different icons including My Documents,
My Computer, My Network Places and the recycle bin icon.
Introduction to I.C.T. and Computer
Recycle Bin
When you delete a file, Windows XP will place the file into the recycle
bin (instead of deleting it altogether), this allows you to restore the file in
case you deleted it by mistake.
For example, if you deleted a file by accident you could double click on
the recycle bin icon to see its contents. Inside you will see the file/folder
that you deleted, to restore the file back to where you deleted it from,
right click on it and then select restore from the menu that appears.
The more you use Windows XP the more your desktop may start to fill
up with icons, either because you install more software or you create your
own icons.
Windows XP can automatically align and sort your desktop icons to keep
the desktop tidy.
To achieve this, click the right mouse button anywhere on the desktop
and a menu will appear (similar to that shown in the figure above). Hover
the mouse pointer over Arrange Icons By and a submenu will appear;
from here you can sort your desktop icons by name, size, type and last
Introduction to I.C.T. and Computer
modified.
Selecting the Auto Arrange option will automatically align your desktop
icons every time one is added to the desktop.
The Desktop Cleanup Wizard will remove any desktop shortcuts that
have never been used. They get stored in a new folder on your desktop
called Unused Desktop
The Windows XP Start Button
The start button is a very important part of
Windows XP. Clicking on the start button
opens up what is called the start menu; the
start menu is used to access your programs, settings, printers and more.
The Start button (at the bottom of the screen, on the Taskbar), allows you
to run programs. A button appears on the Taskbar each time a program is
started or a window opened.
Introduction to I.C.T. and Computer
Help and Support - Opens the built-in Windows help system, including
various help and support topics. You can control windows updates and
also request remote assistance from a friend/colleague via the internet or
network.
Printers and Faxes - Access to your printers and faxes folder, allows you
to add and configure printers/faxes.
Note: some of the options have a small black arrow to their right, this
means that another submenu will appear when you hover your mouse
pointer over it
To open a program simply left click on it with the left mouse button.
Notice some options have a small black arrow to the right hand side, this
indicates that it contains another sub-menu.
You can rename any program on the menu by right clicking on it and
selecting rename from the menu that appears.
To remove a program from the All Programs menu simply right click on
it and select delete.
Note: if you want to uninstall a program then use the control panel to
uninstall it.
If you click on the Turn Off Computer option on the start menu you will
see a dialogue box like that shown in the figure. Below is a summary of
the options available:
Standby - This will put your computer into standby mode. Windows XP
will power down components like the monitor and hard drive to preserve
energy.
Turn Off - Shuts down the PC, always use this option to turn off your
PC.
Restart - this will restart the computer.
In the figure above, we have 2 windows open (word and excel). You can
switch between the windows by simply clicking on the corresponding
window tab, clicking a second time on the same tab will minimise the
window.
window tab. In other words, if you have 2 documents open in Word; you
will only have one tab on the taskbar (instead of 2). You can then access
each document by left clicking on the tab and selecting the file/window
you want from the menu that appears. This feature can be switched off by
right clicking on the taskbar, clicking on properties and then unchecking
the box next to Group similar taskbar buttons.
System Tray - The system tray displays icons for programs that are
loaded into memory, although not all programs place an icon in this tray.
To adjust the time, click on the part of the time you want to change (hour
or minutes) (D) and then use the up and down arrows (E) to change it.
To adjust the time zone click on the Time Zone tab (F) and then select
your time zone from the selection tool provided.
The Internet Time tab (G) allows you to synchronise your PC's clock
with an internet server.
At the right end of the title bar there are three buttons, a minimise button,
a maximise/restore button and a close button. The minimise button will
Introduction to I.C.T. and Computer
reduce the window to a button on the taskbar. To change this button back
to a window, click on the taskbar button. The maximise/restore button
switches between a maximise button, which expands the window to fill
the whole screen, and a restore button which returns the window to its
original size. The close button closes the window, and quits the running
program.
The size of windows can be changed. When you place the pointer over
the border of the window, it will change shape to a double-headed arrow;
then the window border can be moved, by dragging (i.e. holding the left
mouse button down and moving the mouse).
The Menu Bar shows the headings for menus that will appear if the
heading is clicked. A typical menu (File) options include Open,
Save and Exit.
If a window contains more information than can be displayed, a scroll
bar will appear either at the side or bottom of the window, or both. The
bar has arrow buttons at each end; clicking these will move the full
contents of the window up and down or from side to side within the
window, allowing all of it to be viewed. There is also a movable block on
the scroll bar, which can be dragged to achieve the same end.
Dialog Boxes
Windows applications frequently have to ask the user for further
information to complete an operation. Thus if you want to save a new
file, you will be asked to supply a filename and to indicate the drive and
directory where the file will be located. To make these requests,
Windows applications use a dialog box.
saving files onto your computer but can both have very different
outcomes.
When you are saving a file for the first time and press save you will see
options on choosing a file name, file location, and file type.
When you save a file that already has a previous version saved, with the
exact filename, pressing save will overwrite that file. You will not see the
same options as you did when you first pressed save on a new file. In fact
you will most likely see absolutely nothing. It will just silently overwrite
the original file.
Pressing save as will again give you the options to change the file
location, file type, and most importantly, the file name. This will allow
you to save your file under a new name and avoid overwriting the
original file.
Savings a Document/File
Saving your files keeps you from losing your work in the event of a crash
or power failure, and lets you name your files so that you can easily find
it again. You can also save the file in a format that is compatible with all
versions of the application you plan on using to access it, later.
If you’re saving a file and want to create a new folder to save it in,
from within the Save As dialog box click the New Folder button,
enter a folder name in the New Folder dialog box, click OK, and
then
Clicking the Save button saves the file in the location you chose and
with the name you specified.
WORD PROCESSING
What Is Word-Processing?
Word Processor is a Software package that enables you to create, edit,
print and save documents for future retrieval and reference. Creating a
document involves typing by using a keyboard and saving it. Editing a
document involves correcting the spelling mistakes, if any, deleting or
moving words sentences or paragraphs.
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or
Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent
the CD-ROM from automatically playing)
CTRL+SHIFT+ESC (Open Task Manager)
THE INTERNET
A global network connecting millions of computers. More than 100
countries are linked into exchanges of data, news and opinions. Unlike
online services, which are centrally controlled, the Internet is
decentralized by design. Each Internet computer, called a host, is
independent. Its operators can choose which Internet services to use and
which local services to make available to the global Internet community.
Remarkably, this anarchy by design works exceedingly well. There are a
variety of ways to access the Internet. Most online services, such as
America Online, offer access to some Internet services. It is also possible
to gain access through a commercial Internet Service Provider (ISP).
Introduction to I.C.T. and Computer
INTERNET ADVANTAGES
There many advantages to using the internet such as:
Email
Email is now an essential communication tools in business. It is also
excellent for keeping in touch with family and friends. The
advantages to email is that it is free (no charge per use) when
compared to telephone, fax and postal services.
Information
There is a huge amount of information available on the internet for
just about every subject known to man, ranging from government law
and services, trade fairs and conferences, market information, new
ideas and technical support.
Services.
Many services are now provided on the internet such as online
banking, job seeking and applications, and hotel reservations. Often
these services are not available off-line or cost more.
Communities.
Communities of all types have sprung up on the internet. It’s a great
way to meet up with people of similar interest and discuss common
issues.
COMPUTER VIRUS
Computer viruses are malicious computer programs. These are written
with the sole intention of causing you grief or stealing your sensitive
Introduction to I.C.T. and Computer
information. A virus is a type of malware and this simply means that it's
not beneficial for your computer.
Not all computer programs are friendly. A virus is one example of nasty
software which will make your computer less reliable and can even
jeopardize your personal information.
The Spread of Computer Viruses
Computer viruses have been around for a long time. In the past they used
to spread whenever people shared floppy disks. Before the internet, the
sharing of programs and data on floppy disks was very common.
Nowadays most viruses are spread through the internet. The internet has
made viruses spread much quicker and what once took days now takes
hours. Computer viruses can replicate themselves and infect other files on
your computer. This means that if your PC is infected with a virus then
whatever files you share with other people could contain the virus.
However, there are also a number of very dangerous viruses which can
put your entire identity at risk. Identity theft is a major threat which can
affect anyone when they least expect it. Computers know a lot about you
and viruses can help share this information with criminals.
A virus or Trojan could be all a hacker needs to learn all about you. They
will be able to use this information to apply for credit cards and other
loans in your name.
Protecting your PC
Introduction to I.C.T. and Computer
It's essential that you protect your computer against viruses as this will
help to protect your identity. To protect your computer it's important that
you install a virus scanner. It's also essential that you keep your virus
scanner updated regularly. Choosing a reliable antivirus application
which offers a subscription will ensure your PC is fully protected.
A firewall should also be used to ensure your PC is protected from
hackers. The security of your computer is very important and isn't
something that you should overlook.
FOLDERS
Folders are the basic organizational building blocks of any computer
system. Without folders it would be virtually impossible to keep track of
all the files that are found on even the smallest system. New folders can
be created just about anywhere, but three methods are shown below.
Creating a Folder
New Folder on Desktop
Right click anywhere on an open area of the desktop
Select New and then click Folder
Introduction to I.C.T. and Computer
A new folder with the default name New Folder will be created on the
desktop. Either accept the default name New Folder (bad idea) by
hitting the enter key or type a new name for the folder (good idea)
and then hit enter on the keyboard.
Alternatively,
Introduction to I.C.T. and Computer
In the File and Folder Tasks section, click the Make a New Folder
selection.
The New Folder is created in the right hand pane as shown in the
screen capture below.
Introduction to I.C.T. and Computer
Note that the File and Folder Tasks section also expands to include
new entries relative to what can be done with the folder just created.
BACKING UP FILES
Computer errors and software failures happen occasionally so it is
important to backup your files and documents.
One simple way to backup your files is to copy them to a disk. If there
are only a few small files a floppy disk will work but if you are backing
up lots of large files a CD/DVD burner, a second hard drive or tape
backup may be needed. You can use a software program to automate
backups or do it manually. A manual backup usually involves dragging
the files or folders to the backup disk or tape to create the duplicate
backup.
Store your backup files in a safe place out of the sun and away from
electro-magnetic devices such as speakers and wires with strong electrical
currents.
Every file that you create and plan to keep should be backed up. This
includes word processing documents, financial information, databases,
photos, etc...
Most software you buy or get off the Internet is compressed. Computers
store information in bytes which are made up of on or off signals. The
software applications that uses these files need to have all the on and off
signals (bytes) in place but when the file is stored they can be modified to
take up less space on the storage disk or tape.
There are commercial and shareware programs that will compress and
decompressed files for you. The most popular form of data compression
is called zip but there are others available as well.
Eye strain can be caused by staring at a fix object for extended periods of
time (like a computer). People who use glasses may have to get their
prescriptions changed and people who use bifocals can find that the line
interferes with the screen and trifocals triple the problem. Regular users
Introduction to I.C.T. and Computer
Time away from the computer during the work day is crucial! This gives
the body a chance to stretch and gives the eyes a chance to rest. Breaks
should be scheduled and followed with great discipline. Computers, even
more so than television, have a mesmerizing effect on the user so that it is
easy to work right through breaks without noticing.
There are many other issues to be discussed around computer health and
safety but it is important to understand that there are problems and
solutions to those problems that the user, administrator and manager must
address.