Wednesday, 23 November 2022

U-4 Electronic Spreadsheet / 9th IT (402)

 

Class – 9th IT (402)
Book- Domestic Data Entry Operator 

Unit-4 Electronic Spreadsheet

 

Fill in the blanks

1)    A spreadsheet software can also store, manipulate and create graphical representations of data.

2)    The Title bar, located at the top, shows the name of the current spreadsheet.

3)    The column range is the number of cells spread across the column.

4)    The row range is the number of cells spread across the row.

5)    A function should start with = ( is equal to sign ).

6)    A chart has two axes .

7)    The column immediately next to column “Z” is AA  .

8)    Selected cell is called active cell.

9)   The default extension of a workbook created using a LibreOffice Calc spreadsheet is  .ods   .

10)   The spreadsheet feature used to continue the series is called as Fill handle  .

11)  The formula “=MIN(C1:C5)” stored in cell C6 when copied to cell D6 changes to =MIN(D1:D5) .

12)   The formula in cell A2 is =B2+C3. On copying this formula to cell C2, C2 will change to =D2+E3 .

13)   The cell address of the cell formed by the intersection of the ninth column and the eighth row will be 18  .

14)   $A1$B2 is an example of mixed referencing in spreadsheet software.

15)   Numbers entered into a cell are automatically right  aligned.

16)   If A1:A5 contain the numbers 16, 10, 3, 25 and 6 then =Average(A1:A5;60) will display  20  .

17)   In Relative  referencing, the reference changes rows and columns automatically when it is copied to a new cell.

18)  A spreadsheet is a grid which interactively manages and organises data in rows and columns.

19)  In Absolute referencing, a $ symbol is used before the column name as well as row number to make it constant in any formula. For example, $C$12, $D$5, etc.

20)  Sum function is used to add all the values within a range of cells.

21)  COUNT function   is used to count the number of data.

22)  AVERAGE  function is used to find the average of a given number of cells.

23)  A Pie Chart can only display one series of data. A data series is a row or column of numbers used for charting.

24) The Column Chart very effectively shows the comparison of one or more series of data points.

25) Area Charts are like Line Charts except that the area below the plot line is solid.

26) Sorting is mechanism to arrange the data in a particular order.

27)  Validating is mechanism to filter out unnecessary data.

28)  Extension of a worksheet created in Calc is .ods

29) A spreadsheet is also called as worksheet. 

30)  Graphical representation of data is called chart.

31)  A spreadsheet is a grid which interactively manages and organises data in rows and columns. It is also called as Electronic Spreadsheet.

32) Arranging data in ascending and descending order is called sorting.

33) The Title bar, located at the top, shows the name of the current spreadsheet.

34) Menu bar is located just below the Title bar. It contains the menus with commands for various tasks. Each menu item has a submenu called pull-down menu.

35) Name box shows the cell reference, for example A1.

36) Functions wizard search the function from the list of available functions.

37)  In built formula in calc is called function.

38) The sheet tab shows its default name as Sheet1, Sheet2, Sheet3.

39) The intersection of a row and column is called a cell.

40) A block of adjacent cells in a worksheet which is highlighted or selected is called a range of cells.

41) Label is the any text entered by using a keyboard. It may combine with letters, numbers, and special symbols.

42) The numerical data consisting of only numbers are called values.

43) By default values are right aligned.

44)  By default the labels are left aligned.

45) Any expressions that begins with an equals ‘=’ is treated as formula.

46) The Calc Fill Handle tool is used to fill the next cells till you drag it with the next predefined value. For example, if you want to fill the numbers in sequence of 1,2,3.

47) Referencing is the way to refer the formula or function from one cell to the next cell along the row or column.

48) There are three types of referencing. • Relative referencing • Mixed referencing • Absolute referencing.

49) When you drag any formula in any row or column in any direction, the formula gets copied in the new cell with the relative reference.

50) In Mixed Referencing, the $ sign is used before row number or column name to make it constant.

51) : In Absolute referencing, a $ symbol is used before the column name as well as row number to make it constant in any formula. For example, $C$12, $D$5, etc.

52) AutoSum is a function in a spreadsheet program that inserts a formula in the selected cell that adds the numbers in the column above it. It sets the range of cells by looking for numeric data above the selected cell.


Sunday, 20 November 2022

U-4 Web application / class 10 IT (402)

 

Class – 10th

IT (402)

Book : Domestic Data Entry Operator

Unit-4 Web Application and Security



Fill in the blanks

SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS

1)    Computer Accessibility refers to the user friendliness of a computer system for all, regardless of their disability.

2)    when a  combination of hardware and software, it enables a person with a disability or impairment  to use a computer. It is known as Assistive Technology.

3)    Cognitive impairments and learning disabilities, such as dyslexia, attention deficit hyperactivity disorder (ADHD) or autism.

4)    Visual impairment such as low-vision, complete or partial blindness, and color blindness.

5)    Hearing impairment including deafness.

6)    Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel  syndrome and repetitive strain injury.

7)    Accessibility Options in Control Panel are used to customize the way your keyboard,  display, or mouse function. Many of these features are useful for people with disabilities

8)    StickyKeys is an accessibility feature to help computer users with physical disabilities, but it is also used by others as a means to reduce repetitive  strain.

9)    Filter Keys is a feature of Microsoft Windows. It is an accessibility function that tells the  keyboard to ignore brief or repeated keystrokes, making typing easier for people with  hand tremors.

10) ToggleKeys is also a feature of Microsoft Windows. It is an accessibility function which is designed for people who have vision impairment or cognitive disabilities.

11)  When ToggleKeys is turned on, computer emits sound cues when the locking keys (Caps Lock, Num Lock, or Scroll Lock) are pressed. A high sound is emitted when the keys are switched on and a low sound is emitted when they are switched off.

12)  SoundSentry is designed to help users with auditory impairments. SoundSentry generates  visual warnings, such as a blinking title bar or a flashing border, whenever the computer generates a sound.

13)  ShowSounds instructs applications that convey information by sound, to also provide information visually, through text captions or informative icons.

14)  High Contrast is an accessibility feature to assist people with vision impairment. You can change the size and color of fonts and the background for ease of viewing.

15)  Cursor Options is also an accessibility feature that assists people with vision impairment by changing the blink rate and width of the cursor.

16) MouseKeys is an accessibility feature that assists people who have difficulty using a mouse. This option uses the keyboard (especially numeric keypad) as a pointing device instead of a mouse.

17) Select the General Tab, a window to configure additional accessibility options will be displayed.

18) Serial Keys is an accessibility feature that assists people that have difficulty using a keyboard or a mouse (or both).

19)  The option in Microsoft Windows XP used for helping users with physical disabilities and to reduce repetitive strain is sticky keys .

20)   Sound Sentry is designed to help users with  auditory  impairments.

21)   The High Contrast option in Microsoft Windows XP is designed to assist people with vision  impairments.

22)   Serial Key  is designed to assist people that have difficulty using a keyboard or a mouse.

23)  special devices  such as Sip, Puff and Breath Switches to provide input to the computer through Serial Ports.

24) sticky keys  options allow us to press Ctrl key and ‘A’ key separately.

 


SESSION 2: NETWORKING FUNDAMENTALS

1)    A computer network is a collection of computers and other hardware components interconnected by communication channels (cables or satellites) that allow sharing of resources and information.

2)    Networks in which all computers have an equal status are called peer to peer networks.

3)    Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called client server networks.

4)    The computer(s) which provide services are called servers and the ones that use these services are called clients.

5)    There are two major types of network Local Area Network (LAN) and Wide Area Network (WAN).

6)    A local area network (LAN) is one which connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings.

7)    Local Area Networks offer very high speeds and are used for connecting computers and peripherals such as printers, scanners, etc.

8)    A wide area network (WAN) is one which covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries)

9)    The Internet is a global system of interconnected computer networks that use the standard  Internet protocol suite to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks.

10)  World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of interlinked hypertext documents accessed via the Internet.

11)  A Web Browser is a software used to view Web sites and acts as an interface between the user and the World Wide Web.

12)  Advantages of networking are sharing data, can transfer files, share hardware, share interent access, usage of network based applications.

13)  Internet connections are provided by Internet Service Providers (ISP) such as Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc.

14) Á modem is a device that converts digital computer signals into a form (analog signals) that can travel over phone lines.

15)  Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections.

16)  Full form of WiMAX is Worldwide Interoperability for Microwave Access.

17) The acronym for LAN is Local Area Network .

18)  Three types of Wired Internet Connectivity are Dial-Up  , DSL & Cable Internet Access.

19)  Three types of Wireless Internet Connectivity are 3G , WiMAX & Wi-Fi.

 

 

SESSION 3: INTRODUCTION TO INSTANT MESSAGING

1)    Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver.

2)    Most instant messaging software include the option for performing file transfers, audio chat, video calling and conferencing, sharing desktops, etc. apart from standard text chat.

3)    instant messaging software such as Yahoo! Messenger, Windows Live Messenger use email addresses for managing the account and software such as Skype use standard names.

4)    There are two kinds of instant messaging software – application based and Web based.

5)    Application based instant messaging software is downloaded and installed on user’s computer. Some of the popular instant messaging software are: Google Talk ,  Yahoo! Messenger ,  Skype ,  Windows Live Messenger ,  Rediff Bol, etc.

6)    Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc.

7)     Computer, Internet  ,  Microphone and Web Camera are required for audio and video conferencing.

7)

 SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK

1)    Typing your messages in uppercase is extremely rude - it’s considered shouting and very aggressive.

 

 SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG

1)       A blog is a discussion style site used by non-technical (or technical users) users for creating personal web pages. Blogs are similar to an online personal diary and simple to use.

2)       Blogs are usually managed using a web browser and this requires active internet connection.

 

 SESSION 6: USING OFFLINE BLOG EDITORS

1)    There are several free offline blog editors available that can be downloaded and installed on the local computer such as:  Qumana ,  Windows Live Writer ,  Blogdesk

 

SESSION 7: ONLINE TRANSACTIONS

1)       Online transactions have made transactions very convenient and simplified the workflow in many forms in a business.

2)       Online transactions deals with transfer of money over the internet. Revolution in the electronic media has made transaction handling easy.

3)       NEFT/ RTGS are some other examples of online funds transfer. Numerous benefits of online transactions like, fast transaction speed, convenience, low risk of theft etc has exponentially increased its use among people.

4)       Online shopping is a form of electronic commerce where customers can buy or sell goods over the Internet.

5)       COD  means Cash on delivery.

6)       Indian Railway Catering and Tourism Corporation (IRCTC) is an online portal that can be used for booking travel tickets.

SESSION 8: INTERNET SECURITY

1)    Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security.

2)    The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.

3)    Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of users getting compromised.

4)    You can reduce the risks by using best practices such as using Antivirus Software, Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading awareness of the best Practices

5)    Use strong passwords, a combination of alphanumeric and special characters could be used for creating a password that is not so easy to crack or guessed by other users.

6)    Use encryption software: (Usually available within the operating system) to protect your data from unauthorized users. If encryption software is not available within the operating system, use a 3rd party software.

7)    Computers are prone to attacks from software known as Malware that could harm your computer. Malware track browsing behavior or transmit personal data from your computer; programs such as keyloggers could be installed on your computer track and transmit every key that is pressed on a keyboard (keystrokes) to unauthorized users.

8)    Firewalls could be software or hardware and can assist in keeping a computer and a network secure. Firewalls analyze the network traffic and determine if the traffic should be allowed or not.

 

 SESSION 9 : MAINTAIN WORKPLACE SAFETY

1)    Basic safety rules to follow at workplace – Fire safety, Falls and slips, Electrical safety, Use of first aid.

2)    Learning First Aid is the social and civic responsibility of very human being. If provided effectively and on time then it may save life.

3)    Every organization must have basic First Aid Kit. Kit must have all necessary items. Make sure to check for the expiry of medical related items.

 SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES

1)    Accident: an accident is an unplanned event that may happen all of a sudden and may lead to unwanted or unprecedented results/outcomes.

2)    Accidents may be of following types : - Accidents at workplace : Slips and fall accidents, fire , Industrial disease/illness , Road traffic accidents , Clinical Accidents , Sports related accidents.

3)    An emergency situation might pose a sudden risk to life, property health etc. and needs intervention to prevent deteriorating results/ hazards.

 SESSION 11 : PROTECT HEALTH AND SAFETY AT WORK

 1)    An organization can face some health hazards that could put the lives of the employees in danger. A hazard is anything that is the source of any potential harm, damage or any kind of potential loss of health or life

2)    Hazards can be of different types depending on the industry and the environment in which the employees work. The different types of hazards include: ● Physical ,● Chemical ,● Biological ,● Mechanical

3)    Evacuation is the process of emptying a place in case of an emergency, disaster.

4)    An organization can face some health hazards that could put the lives of the employees in danger.

5)     Hazards can be of different types depending on the industry  and the Environment  in which the employees work.

6)     Organization must have a designated emergency management  for emergencies

 

L-1 Indian Heroes in IT/ 8th computer

  Class 8 th Subject : Computer Science L-1 Indian Heroes in IT Make a list of Indian Heroes in IT with their achievement S....