18) A spreadsheetis
a grid which interactively manages and organises data in rows and columns.
19) In Absolutereferencing,
a $ symbol is used before the column name as well as row number to make it
constant in any formula. For example, $C$12, $D$5, etc.
21)COUNTfunction is
used to count the number of data.
22)AVERAGEfunction is used to find the average
of a given number of cells.
23) A PieChart can
only display one series of data. A data series is a row or column of numbers
used for charting.
24)The ColumnChart very effectively shows the comparison of one or
more series of data points.
25)AreaCharts
are like Line Charts except that the area below the plot line is solid.
26)Sorting ismechanism to arrange the data in a particular
order.
27) Validating is mechanism to filter out unnecessary data.
28)Extension of a worksheet created in Calc is .ods
29)A spreadsheet is also called as worksheet.
30)Graphical representation of data is called chart.
31) A spreadsheet is a grid which interactively
manages and organises data in rows and columns. It is also called as Electronic Spreadsheet.
32)Arranging
data in ascending and descending order is called sorting.
33)The Title bar, located at the top, shows the name
of the current spreadsheet.
34)Menubar is located just below the
Title bar. It contains the menus with commands for various tasks. Each menu
item has a submenu called pull-down menu.
35)Namebox shows the cell reference,
for example A1.
36)Functions
wizardsearch
the function from the list of available functions.
37) In built
formula in calc is called function.
38)The
sheet tab shows its default name as Sheet1,
Sheet2, Sheet3.
39)The
intersection of a row and column is called a cell.
40)A
block of adjacent cells in a worksheet which is highlighted or selected is
called a range of cells.
41)Labelis the any text entered by
using a keyboard. It may combine with letters, numbers, and special symbols.
42)The
numerical data consisting of only numbers are called values.
43)By
default values are rightaligned.
44) By default the labels are leftaligned.
45)Any
expressions that begins with an equals ‘=’
is treated as formula.
46)The
Calc Fill Handle tool is used to
fill the next cells till you drag it with the next predefined value. For
example, if you want to fill the numbers in sequence of 1,2,3.
47)Referencing is the way to refer the formula or
function from one cell to the next cell along the row or column.
48)There
are three types of referencing. • Relative
referencing • Mixed referencing • Absolute referencing.
49)When
you drag any formula in any row or column in any direction, the formula gets
copied in the new cell with the relative
reference.
50)In Mixed Referencing, the $ sign is used before
row number or column name to make it constant.
51): In Absolute referencing, a $ symbol is used
before the column name as well as row number to make it constant in any formula.
For example, $C$12, $D$5, etc.
52)AutoSum is a function in a spreadsheet program that inserts a
formula in the selected cell that adds the numbers in the column above it. It sets the range of cells by looking for
numeric data above the selected cell.
1)Computer Accessibilityrefers
to the user friendliness of a computer system for all, regardless of their
disability.
2)when
a combination of hardware and software,
it enables a person with a disability or impairment to use a computer. It is known as Assistive Technology.
3)Cognitive impairmentsand
learning disabilities, such as dyslexia, attention deficit hyperactivity
disorder (ADHD) or autism.
4)Visual impairmentsuch
as low-vision, complete or partial blindness, and color blindness.
5)Hearingimpairment including
deafness.
6)Motor or dexterityimpairment
such as paralysis, cerebral palsy, or carpal tunnelsyndrome and repetitive strain injury.
7)Accessibility Options in Control Panel are
used to customize the way your keyboard,display, or mouse function. Many of these features are useful for people
with disabilities
8)StickyKeys is an accessibility feature to help
computer users with physical disabilities, but it is also used by others as a
means to reduce repetitivestrain.
9)Filter Keys is a feature of Microsoft Windows. It is
an accessibility function that tells thekeyboard to ignore brief or repeated keystrokes, making typing easier
for people withhand tremors.
10)ToggleKeys is also a feature of Microsoft Windows.
It is an accessibility function which is designed for people who have vision
impairment or cognitive disabilities.
11)When ToggleKeys is turned on, computer emits
sound cues when the locking keys (Caps Lock, Num Lock, or Scroll Lock) are
pressed. A high soundis emitted when the keys are switched on and a low
sound is emitted when they are switched off.
12)SoundSentry
is designed to help users with auditory impairments. SoundSentry generatesvisual warnings, such as a blinking title bar
or a flashing border, whenever the computer generates a sound.
13)ShowSounds
instructs applications that convey information by sound, to also provide
information visually, through text captions or informative icons.
14)High Contrastis an accessibility feature to assist people with
vision impairment. You can change the size and color of fonts and the
background for ease of viewing.
15)Cursor Options
is also an accessibility feature that assists people with vision impairment by
changing the blink rate and width of the cursor.
16)MouseKeys is an accessibility feature that assists
people who have difficulty using a mouse. This option uses the keyboard
(especially numeric keypad) as a pointing device instead of a mouse.
17)Select
the GeneralTab, a window to configure additional accessibility options will
be displayed.
18)Serial Keysis an accessibility
feature that assists people that have difficulty using a keyboard or a mouse
(or both).
19)The option in Microsoft Windows XP used for
helping users with physical disabilities and to reduce repetitive strain is sticky keys .
20)Sound
Sentry is designed to help users with auditoryimpairments.
21)The High Contrast option in Microsoft Windows
XP is designed to assist people with visionimpairments.
22)Serial Keyis designed to
assist people that have difficulty using a keyboard or a mouse.
23)special devicessuch as Sip, Puff and Breath Switches to
provide input to the computer through Serial
Ports.
24) sticky keys optionsallow us to press Ctrlkey and ‘A’ keyseparately.
SESSION 2: NETWORKING FUNDAMENTALS
1)A computer network is a collection of computers
and other hardware components interconnected by communication channels (cables
or satellites) that allow sharing of resources and information.
2)Networks
in which all computers have an equal status are called peer to peernetworks.
3)Networks
in which certain computers have special dedicated tasks, providing services to
other computers (in the network) are called client
servernetworks.
4)The
computer(s) which provide services are called servers
and the ones that use these services are called clients.
5)There
are two major types of network Local Area Network
(LAN)and Wide Area Network (WAN).
6)A local area network (LAN)is one which connects computers and devices in a
limited geographical area such as home, school, computer laboratory, office
building, or closely positioned group of buildings.
7)Local
Area Networks offer very high speedsand are used for connecting computers and peripherals
such as printers, scanners, etc.
8)A wide area network (WAN) is one which covers a
broad area (i.e., any network that links across metropolitan, regional, or
national boundaries)
9)The Internet is a global system of interconnected
computer networks that use the standardInternet protocol suite to serve billions of users worldwide. It is a
network of networks that consists of millions of private, public, academic,
business, and government networks.
10)World Wide Web(abbreviated as WWW or W3, commonly known as the
Web), is a system of interlinked hypertext documents accessed via the Internet.
11)A Web Browseris a software used to view Web sites and acts as an
interface between the user and the World Wide Web.
12)Advantages of networking are sharing data, can transfer files, share
hardware, share interent access, usage of network based applications.
13)Internet connections are provided by Internet Service Providers (ISP)such as Bharat Sanchar Nigam Limited (BSNL), Airtel,
MTS, Vodafone, Tata Docomo, etc.
14)Á modemis a
device that converts digital computer signals into a form (analog signals) that
can travel over phone lines.
15)Wi-Fiis a popular technology that allows an electronic
device such as computers or mobile phones to exchange data wirelessly over a
network, including high-speed Internet connections.
16)Full form of WiMAX is Worldwide Interoperability for Microwave Access.
17)The
acronym for LAN is Local Area Network.
18)Three types of Wired Internet Connectivity are
Dial-Up,
DSL & Cable Internet Access.
19)Three types of Wireless Internet Connectivity
are 3G , WiMAX & Wi-Fi.
SESSION 3: INTRODUCTION TO INSTANT
MESSAGING
1)Instant messaging (IM)is a
form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.
2)Most instant messaging softwareinclude the option for performing file transfers,
audio chat, video calling and conferencing, sharing desktops, etc. apart from
standard text chat.
3)instant
messaging software such as Yahoo! Messenger, Windows Live Messenger use email
addresses for managing the account and software such as Skype use standard names.
4)There
are two kinds of instant messaging software – application
based and Web based.
5)Application based instant messagingsoftware is downloaded and installed on user’s computer.
Some of the popular instant messaging software are: Google Talk ,Yahoo! Messenger ,Skype ,Windows Live Messenger ,Rediff
Bol, etc.
6)Web based instant messagingsoftware
is accessed using browsers such as Internet Explorer, Mozilla Firefox, Google
Chrome, etc.
7)Computer,
Internet, Microphone and Web Camera are required for audio and video
conferencing.
7)
SESSION 4: CHATTING WITH A CONTACT –
GOOGLE TALK
1)Typing
your messages in uppercase is
extremely rude - it’s considered shouting and very aggressive.
SESSION 5: CREATING AND PUBLISHING WEB
PAGES – BLOG
1)A blogis a discussion style site used by non-technical (or
technical users) users for creating personal web pages. Blogs are similar to an
online personal diary and simple to use.
2)Blogs are usually managed using a web browserand
this requires active internet connection.
SESSION 6: USING OFFLINE BLOG EDITORS
1)There
are several free offline blog editors available that can be downloaded and
installed on the local computer such as:Qumana , Windows Live Writer , Blogdesk
SESSION 7: ONLINE TRANSACTIONS
1)Online transactionshave made transactions very convenient and simplified
the workflow in many forms in a business.
2)Online transactions deals with transfer
of money over the internet.
Revolution in the electronic media has made transaction handling easy.
3)NEFT/ RTGSare some other examples of online funds transfer.
Numerous benefits of online transactions like, fast transaction speed,
convenience, low risk of theft etc has exponentially increased its use among
people.
4)Online
shoppingis a form of electronic
commerce where customers can buy or sell goods over the Internet.
5)CODmeans Cash on delivery.
6)Indian
Railway Catering and Tourism Corporation (IRCTC)is an online portal that can be used for booking
travel tickets.
SESSION 8: INTERNET SECURITY
1)Internet securityis a
branch of computer security specifically related to the Internet, often
involving browser security but also network security.
2)The
Internet represents an insecure channel for exchanging information leading to a
high risk of intrusion or fraud, such as phishing.
3)Online threatssuch
as Phishing, email spoofing, chat spoofing, etc. can increase the chances of
users getting compromised.
4)You
can reduce the risks by using best practices such as using Antivirus Software, AntispywareSoftware,
Firewalls, strong passwords, etc. in addition to spreading awareness of the
best Practices
5)Use strong passwords, a combination of
alphanumeric and special characters could be used for creating a password that
is not so easy to crack or guessed by other users.
6)Use encryption software: (Usually available within
the operating system) to protect your data from unauthorized users. If
encryption software is not available within the operating system, use a 3rd
party software.
7)Computers
are prone to attacks from software known as Malware
that could harm your computer. Malware track browsing behavior or transmit
personal data from your computer; programs such as keyloggers could be installed
on your computer track and transmit every key that is pressed on a keyboard (keystrokes)
to unauthorized users.
8)Firewallscould be software or
hardware and can assist in keeping a computer and a network secure. Firewalls
analyze the network traffic and determine if the traffic should be allowed or
not.
SESSION 9 : MAINTAIN WORKPLACE SAFETY
1)Basic safety rulesto
follow at workplace – Fire safety, Falls and slips, Electrical safety, Use of
first aid.
2)Learning
First Aidis
the social and civic responsibility of very human being. If provided effectively
and on time then it may save life.
3)Every organization must have basic First Aid
Kit. Kit must have all necessary items. Make sure to check for the expiry of medical related items.
SESSION 10 : PREVENT ACCIDENTS AND
EMERGENCIES
1)Accident: an accident is an unplanned event that
may happen all of a sudden and may lead to unwanted or unprecedented
results/outcomes.
2)Accidents may be of following types : - Accidents at
workplace : Slips and fall accidents, fire , Industrial disease/illness , Road
traffic accidents , Clinical Accidents , Sports related accidents.
3)An emergency
situation might pose a sudden risk to life, property health etc. and needs intervention
to prevent deteriorating results/ hazards.
SESSION 11 : PROTECT HEALTH AND SAFETY
AT WORK
1)An
organization can face some health hazards that could put the lives of the
employees in danger. A hazard is
anything that is the source of any potential harm, damage or any kind of
potential loss of health or life
2)Hazards
can be of different types depending on the industry and the environment in
which the employees work. The different types of hazards include: ● Physical ,● Chemical ,● Biological ,● Mechanical
3)Evacuation is the process of emptying a place in
case of an emergency, disaster.
4)An
organization can face some health hazards that
could put the lives of the employees in danger.
5)Hazards can be of different types depending on
the industry and the Environment in which the employees work.
6)Organization must have a designated emergency management for emergencies