In this blog you will get information(notes , question answer) about your computer book
(IT-402) for 2020 board exams.
Some links of videos:
1) Web application - https://www.youtube.com/watch?v=vJgjv38Ufiw
2) Word processing - https://www.youtube.com/watch?v=Z6bpHzJ9IeE&t=278s
3) Spreadsheets - https://www.youtube.com/watch?v=R4jDUD7Al7Q&t=2s
4) Email messaging - https://www.youtube.com/watch?v=sQX8fM7d8uk
1) Web application - https://www.youtube.com/watch?v=vJgjv38Ufiw
2) Word processing - https://www.youtube.com/watch?v=Z6bpHzJ9IeE&t=278s
3) Spreadsheets - https://www.youtube.com/watch?v=R4jDUD7Al7Q&t=2s
4) Email messaging - https://www.youtube.com/watch?v=sQX8fM7d8uk
Some important terms:
Softcopy
A soft copy is an electronic
copy of some type of data, such as a file viewed on a computer's display
(Monitor) or transmitted as an e-mail attachment. It is an intangible output.
Hardcopy
A hard copy is a printed copy of information
from a computer. Sometimes referred to as a printout, a hard copy is
so-called because it exists as a physical object i.e. it is tangible Output.
Sticky
Notes
is a desktop notes application
included in Windows Operating System. The program allows users to take notes
using post-it
note–like
windows on their desktop.
ToggleKeys may
refer to any of the following
·
Term used to describe a computer keyboard button
with one or more functions. For example, the Caps Lock, Num Lock, and Scroll Lock keys are
all toggle keys. In the case of the Caps Lock key, a user could either
enable or disable the keyboard to type in all uppercase
·
This also a Microsoft Windows accessibility
feature that causes Windows to generate a tone or beep each time you press the
Caps Lock, Num Lock, or Scroll Lock keys. ToggleKeys is helpful for
users who mistakenly press these keys while typing.
Computer
Virus
A computer virus is a malicious
software program loaded onto a user’s computer without the user’s knowledge and
performs malicious actions.
- Depending on the available network bandwidth, the restoration of data can be slow. Because data is stored offsite, the data must be recovered either via the Internet or via tape or disk shipped from the online backup service provider.
- It is possible that a remote backup service provider could go out of business or be purchased, which may affect the accessibility of one’s data or the cost to continue using the service.
- If encryption password is lost, no more data recovery will be possible. However with managed services this should not be a problem.
- Residential broadband services often have
monthly limits that preclude large backups. They are also usually
asymmetric; the user-to-network link regularly used to store backups is
much slower than the network-to-user link used only when data is restored.
The Internet can be described as an interconnection of several thousands of computers of different types belonging to various networks all over the world.
E-mail is a message distributed by electronic means from one computer user to or more recipients via a network. It is the services of internet in which messages are sent from and received by the servers. E-mail has several advantages over conventional postal services.
Web Chat
Web chat is a program that enables you to communicate with others in real-time through messages. The user can log on to certain websites and communicate with various other users online by using Internet chat software. Chat software is interactive software that allows user to type comment in one window and receive replies in another from someone who is accessing the same software.
World Wide Web
World Wide Web is the leading information exchange service of the Internet. It gives users access to a vast array of documents that are connected to each other by the help of hypertext or hyperlink.
E-commerce
E-commerce is the commercial transactions conducted electrically on the Internet. It refers to a wide range of online business activities for products and services.
Internet telephony
Internet telephony can be defined as the technology that converts analog speech signals into digital signals and routes them through packet-switched networks of internet.
Video conferencing
Video conferencing means making communication between the users using sounds as well as pictures.
Online
Databackup
Online backup service, also known as cloud backup or
backup-as-a service is a method of offsite data storage in which files,
folders, or the entire contents of a hard drive are regularly backed up on a
remote server or computer with a network connection.
To protect the
information – be it business data or personal – from the risk of loss
associated with fire, theft, hacking, or any other kind of technological
disasters.
The following are the top five benefits of online backup:
Convenience
Online backup is accessible from anywhere, so long as there
is internet connectivity; information is saved automatically as it streams in.
You do not have to proactively save, label and track information..
Safety
As your data is stored in the Cloud, you are not subject to
the typical threats of fire, flooding or theft. In fact, data that is stored in
the Cloud is generally stored on secure, encrypted servers and systems, which
minimizes the risks your data can incur
Ease of
Recovery
Due to multiple levels of redundancy, if data is lost or
deleted, most likely through individual user error or deletion, backups are
available and easily located. Multiple levels of redundancy means that your
online backup service stores multiple copies of your data in locations independent
of each other.
Ease of
Access
As the Cloud has no singular physical location, remote access
is also a simple and feasible benefit to online backup. So long as you can
connect to the remote server, you have access to all the data that you have stored
in the Cloud, without having to do anything differently.
Affordability
Cloud-based back up can be less expensive than the cost of
tape drives, servers, or other hardware and software elements necessary to
perform the back up; the media on which the backups are stored; the
transportation of media to a remote location for safekeeping; and the IT labor
required to manage and troubleshoot backup systems.
Disadvantages of online backup
Online backup has some disadvantages:
- Depending on the available network bandwidth, the
restoration of data can be slow. Because data is stored offsite, the data
must be recovered either via the Internet or via tape or disk shipped from
the online backup service provider.
- It is possible that a remote backup service provider
could go out of business or be purchased, which may affect the
accessibility of one’s data or the cost to continue using the service.
- If encryption password is lost, no more data recovery
will be possible. However with managed services this should not be a
problem.
- Residential broadband services often have
monthly limits that preclude large backups. They are also usually
asymmetric; the user-to-network link regularly used to store backups is
much slower than the network-to-user link used only when data is restored.
NETWORK TOPOLOGY: : The arrangement of computers along with the networking device in the network or A network topology shows how the elements of a computer network are arranged. It allows you to visualize how different nodes are connected and how they communicate. Types are:
1. STAR TOPOLOGY
• Easy
to install and wire.
• No
disruptions to the network when connecting or removing devices.
• Easy
to detect faults and to remove parts.
• Requires
more cable length than a linear bus topology.
• If
the connecting network device (network switch) fails, nodes attached are disabled and cannot
participate in network communication.
• More
expensive than linear bus topology because of the cost of the connecting devices
(network switches).
2. Bus Topology
• Easy to connect a computer or peripheral to a
linear bus.
• Entire network shuts down if there is a break in
the main cable.
• Terminators are required at both ends of the
backbone cable.
• Difficult to identify the problem if the
entire network shuts down.
• Not meant to be used as a stand-alone solution
3. RING TOPOLOGY
The main advantage of
Ring topology is that the signal degeneration is low since each workstation
participating in the network is responsible for regenerating the weak signal.
The disadvantage of ring topology is, if one workstation fails, the entire
network will fail.
HTTPS
HTTP Secure (HTTPS) is an extension of the Hypertext Transfer
Protocol (HTTP) for secure communication over a computer
network, and is widely used on the Internet. It means all
communications between your browser and the website are encrypted.
Bandwidth
Bandwidth is the
capacity of a wired or wireless network communications link to transmit the
maximum amount of data from one point to another over a computer network or
internet connection in a given amount of time -- usually one second.
For digital devices, bits per second (bps)
or bytes per second.
For analog devices, cycles per second,
or Hertz (Hz).
Cookies : These are small files which are stored on a user's computer. They
are designed to hold a small amount of data specific to a particular client and
website, and can be accessed either by the web server or the client computer.
Cookies are a convenient way to carry information from one session
on a website to another, or between sessions on related websites, without
having to burden a server machine with massive amounts of data storage. Storing
the data on the server without using cookies would also be problematic because
it would be difficult to retrieve a particular user's information without
requiring a login on each visit to the website.
------------------------------------------------------------------------------------------------------------------------------------
NETWORK AND TELE COMMUNICATION
Data communication
Data communication system is the collection of hardware, software and other devices that allows exchanging data, information and voice between two or more devices through a wire or radio waves.
Telecommunication
Telecommunication
is a system if transmission of sounds, images, texts or data in the form of
electronic signals.
Components of data communications
The
components of data communication are as follows:
Data:
This is the data that is to be communicated.
Sender:
This is the device used to send data.
Medium:
This is the device through which the sender makes communication to the
receiver.
Receiver:
This is the device which receives data sent by the sender.
Protocol:
This is the set of rules that are followed nu the sender and the receiver to
make communication possible.
Telecommunication
Telecommunication is a system if transmission of sounds, images,
texts or data in the form of electronic signals.
Computer
network
A
computer network is a logical or physical interconnection between two or more
computers such that they could communicate with each other.
Advantages of computer network
i. A
computer networked environment allows faster, easier and reliable transfer of
data files from one computer to another.
ii. A
network computer allows sharing of networked connected peripherals and
simultaneous access to programs and data irrespective of the physical location
of the resources and the user.
iii.
Computers in network can access the network connected hardware devices like
printer, scanner, disk drives etc.
On the basis of Architecture Networking can be categorized into three models:
Three models of network
i.
Client - Server Network
ii.
Peer - to - Peer Network
iii.
Centralized Computing Network
Client Server Network
It is a
type of network in which each computer in a network is either a client or a
server. It is an arrangement where some programs, files or other resources
located on one computer called the server but are available to other systems on
the network, called clients.
Peer to Peer Network
In a P2P network, the "peers" are computer
systems which are connected to each other via the Internet. Files can be shared
directly between systems on the network without the need of a central server.
In other words, each computer on a P2P network becomes a file server as well as a client.
Centralized Computing
Network
A type of network where all users connect to a
central server, which is the acting agent for all communications. This server
would store both the communications and the user account information. Most
public instant
messaging platforms use a centralized network. Also called centralized
server-structure.
Protocols
Protocols
are the sets of rules that the computer on the network must follow to
communicate and to exchange the data with each other.
Names of the protocols
FTP =
File Transfer Protocol
SMTP =
Simple Mail Transfer Protocol
TCP/IP =
Transmission Control Protocol/ Internet Protocol
ARP =
Address Resolution Protocol
POP =
Post Office Protocol
HTTP =
Hyper Text Transfer Protocol
PPP =
CDP =
Cisco Discovery Protocol
Network
Interface Card (NIC)
Each computer on any types of network needs a hardware component
to control the flow of data. The device that performs this function is Network
Interface Card (NIC), commonly called network card.
Personal Area Network (PAN)
A personal area network is a network of computers for personal use. Like for example, a desktop computer may connect to a personal router via Ethernet and a tablet may connect via Wi-Fi. "Smartphone tethering" is a common type of PAN, in which a laptop or any computer is connected. It ranges only upto 10meters
Local Area Network (LAN)
A Local
Area Network (LAN) is a network of computers that are relatively near to each
other and are connected in a war that enables them to communicate by a cable
and a small wireless device. A LAN consists of just two or three computers to
exchange data or share resources or it can include hundreds of computers of
different kinds.
Metropolitan Area Network (MAN)
Metropolitan
Area Networks (MANs) are large computers networks spread over a city or
neighboring cities. A MAN can have a group of many LANs. Especially, big
companies, banks, offices etc. have their branches or sub offices in a city or
in neighboring cities. They use MAN to connect with their branches or sub
offices for communicating data and information. The communication media in MANs
may be optical fiber or unbounded communication media like microwave system,
infrared system, radiowave to link their branches and sub offices.
Wide Area Network (WAN)
Wide
Area Network is a telecommunications network usually used for connecting
computers that spans a wide geographical area. WANs can be used to connect
cities, states or even computers. Typically, it will employ communication
circuits such as long distance telephone wires, microwaves and satellites. WANs
are often used by larger corporations or organizations to facilitate the
exchange of data. The world's most popular WAN is the Internet.
Networking devices are :
MODEM
MODEM
stands for Modulator Demodulator. It is the device that converts digital data
to analog form and vice versa. It is a device used to transfer the data of one
computer to another using telephone lines.
Repeater
The
signals transmitted become weak due to some problem in the transmission mediums
or the distance between the two locations. A repeater is a device that
amplifies the incoming signals, creates a new copy of it and transmits the
signals on the network. Repeaters are required in the network where computers
are a part of each other.
Hub
A hub
is a hardware device that relays communication data. A hub sends data packets
to all devices on a network, regardless of any MAC addresses contained in the
data pocket. It is a device with multiple ports that allows network devices to
be connected together. It acts as a central networking device in the star
topology.
COMPUTER
VIRUS
A
computer virus is a type of computer program that can replicate itself by
making copies of itself by making copies of itself without the user's knowledge
or consent.
Computer virus spread from
following ways
i.
Opening the infected email attachment.
ii.
By downloading infected programs from the internet.
iii.
By using infected floppy disk, pen drives and CDs.
iv.
By transferring an infected program over a network and executing it.
Type of computer virus
i)
Boot Sector Virus
Boot
Sector virus is regarded as one of the most hostile types of virus, a boot
sector virus infects the boot record of a hard or a floppy disk. The virus
moves the boot sector data to a different part of a disk. This virus allows the
actual boot sector data to be read as though a normal start up were occurring.
ii)
File Infecting Virus
This
type of virus infects program files on a disk. When infected program is
launched, the virus code is also launched. After the virus code has been
launched, it will normal load and execute the program that has been infected.
iii)
Multipartite Virus
This
virus is the combination of parasitic and boot sector virus and due to this, it
is able to infect both the files or boot sector of a disk. They infect program
files and when it is executed, these viruses affect the boot record.
iv)
Macro Virus
These
viruses infect the Microsoft Office programs such as Excel, Word, Access and
PowerPoint. When we open the Microsoft program then the virus is loaded and it
affects the normal template or document. Since it is attached in the document,
if the infected document is opened on other computer, it affects the computer
too.
v)
Script Virus
Script
Virus is written in script programming languages, such as VBScript and
JavaScript. It can infect a computer through various scripting environments,
such as Windows Help, Windows installation files and Windows registry files.
The symptoms of computer
viruses
i.
Programs take long time to load.
ii.
Renaming all the files with different names.
iii.
Shows unusual error messages on the screen frequently.
iv.
Corrupt or deletes system data and programs.\
Anti-virus software
Anti-virus
software is a computer program designed to detect and remove viruses from the
computer system.
Avoid the virus attacks
i.
Scanning the email attachment before executing them.
ii.
Use of a good anti-virus program to scan for viruses.
iii.
Scanning the disk frequently for viruses.
iv.
Not installing the pirated software, especially computer games.
MS Access
Data
and Information
Data
consists or raw facts and figures, Data consists of letter, sound, image or
video within the computer.
Processed
data is known as information. Using a data base program or software, they are
converted into the meaningful result called information.
Database
A
database is a collection of interrelated data. It refers to an organized
collection of data stored on a computer in such a way that its content can
easily be accessed, updated and queried upon with the help of a software
program.
Example = Banks must have systems
for keeping track of customers and their accounts.
Advantages
of database
i.
Database saves the data.
ii.
Data can be stored in a small area or space in computerized database.
iii.
Database protects from unauthorized access and use of data.
iv.
It saves data from being lost.
Objects
of MS Access
a.
Table = Table are the core database object, used to store information. The
tables are the containers for all the data in a database. In a table, data are
arranged in a columns and rows.
b.
Queries = Queries means to ask question about the data presented in the table.
BY using queries, we can view records or data, modify the content of table and
a lot more. It is a way of retrieving and editing information according to the
condition asked. It is a strong tool using in searching of desired data from
database.
c.
Forms = A form is a database object used to enter and edit data in a table.
Form can be used to edit the records of underlying tables or to enter new
records.
d.
Reports = A report is especially formatted collections of data organized
according to our specification for summarizing and printing. They are the means
to present the information as a printed document.
e.
Macros = When macro is executed, it executes one or more database commands
automatically. They are meant for automating the task that is done over and
over again.
f.
Modules = Modules are pieces of code used to impose particular behaviors to
your application programmatically. They are more flexible and extensive than
macros, although they are usually written for various and particular
circumstances.
Attributes and
Record
Attributes
refer to a single data item related to a database object. The database schema
associates one or more attributes with each database entity.
Record
is a row of table in Microsoft Access. It contains information about a
particular item stored in a table.
Database
management system and it's software
A
database management system is a collection of programs that enables you to
store, modify, and extract information from database.
Any
four database management systems are as follows:
i.
Relational Database Management System
ii.
Hierarchical Database Management System
iii.
Network Database Management System
iv.
Object Oriented Database Management System
Field
Data Type
A
characteristic of a field that determines what kind of data it can store is
known as Field Data Type.
Data
types used in Ms-Access
a.
Text = A text field contains up to 255 characters or it can set the length in
the field size, text data type can include numbers letters and symbols.
b.
Memo = This type of field holds an unlimited amount of text. It can accommodate
65, 535 characters.
c.
Number = This type of field allows only the numbers to be entered.
d.
Date/Time = This field type only allows date and time to be entered. It
occupies 8 bytes.
e.
Currency = This field allows to enter currency.
f.
AutoNumber = This type automatically generates and insert the unique number in
the new row.
g.
Yes/No = It allows the user to select Yes or No when completing the field.
h.
OLE object = It allows to link to binary data or files.
i.
Hyperlink = It allows to create a hyperlink. It stores up to 64,000 characters.
j.
Lookup Wizard = The lookup wizard creates a field that allows the user to
choose a value from a list of values by using a list box or combo box.
Rules
for naming field
a.
It can be up to 64 characters long.
b.
The naming cannot include control characters.
c.
It cannot begin with leading spaces.
d.
It can include any combination of letters, numbers, spaces and special
characters except a period (.), an exclamation mark (!), an accent grave (`)
and brackets ([ ]).
Primary
Key
The
primary key is a special column or group of columns in the table whose value
must be unique in the table.
We
can set the primary key by creating a table relationship. To relate tables a
field is required which should be common to all the related tables. The common
field of main table is known as primary key field.
The
differences between primary key and foreign key
Primary Key
|
Foreign Key
|
It is a column or a set of column that can be used to uniquely identify a
row in a table.
|
It is a column or a set of column that refer to a primary key or a
candidate key of another table.
|
A table can have a single primary key that can reference different
tables.
|
A table can have multiple foreign key that can reference different
tables.
|
Field
property: A
field property that controls what can be put into a field and how it can be
placed there is known as field properties.
Validatation
Rule: Validation
rule is a property of Date/time field.
Input Mask: An input mask refers to a string expression that governs what a user is allowed to enter in as input in a text box.
Relational
Database management system: A relational Database management system is a
database system that is based on relation model. It is a database management
system designed to manage a relational database.
Sorting
records: Sorting
records is the arrangement of records on the basis of a field or fields of a
table either in ascending order or in descending order.
Filtering
records
Filtering
records is the process of viewing required data of a table that specify the
specified criteria.
The
different techniques for filtering records are as follows:
i.
Filter by selection
ii.
Filter by form
iii.
Advanced filter
DATABASE DEVELOPMENT
What
is SQL ?
It
is Structure Query Language. It is a standard that every database user uses to communicate with and perform
specific task .
1. Give
names of any two RDBMS.
MYSQL,
MS-ACCESS
2 2. What
are different types of SQL commands
available.
a. DDL-DATA
DEFINATION LANGUAGE Eg.-
CREATE ,ALTER,DROP
b. DML-DATA
MANIPULATION LANGUAGUE Eg..
UPDATE,DELETE
c. TCL-TRANSCATION
CONTROL LANGUAGE Eg. COMMIT,ROLLBACK
d. DCL-DATA
CONTROL LANGUAGE Eg.
GRANT,REVOKE
3. What
is the difference between DDL and DML Commands?
DDL statements are used for
creating and defining the Database structure. DML statements are used for
managing data within Database.
4. What
is a Primary key in a table ?
A
Primary key is a column in a table which consists of unique values i.e.
it cannot have duplicate values or null values. (null – no value). For example
in a table school admission number can be a primary key as it is must and
unique for all students.
6 5. What
is Foreign key in a database?
In the context of
relational databases, a foreign keys a field (or collection of fields) in
one table that uniquely identifies a row of another table or the same table. In
simpler words, the foreign key is defined in a second table, but it
refers to the primary key or a unique key in the first
table
6. What
do you mean by Queries , table and Reports in respect to database.
a. Queries
– A query is a request for data or information
from a database table or combination of
tables.
b. Table-
It consists of columns, and rows.It is also called as
relation in database.
c. Report-
Reports are a great way to organize and present
data from your database. The data in a preview or in a printed report is
static. Reports merely present the data; they do not alter the
underlying data in the tables. Each time a report is
opened, database access displays the most recent data.
d. Forms-a form is
a window or screen that contains numerous fields, or spaces to enter data. Each
field holds a field label so that any user who views the form gets
an idea of its contents. A form is more user friendly than
generating queries to create tables and insert data into fields.
e. Macros-
they are mini-programs that automate custom tasks.Macros are a simple way to
get custom results without becoming a programmer.
7. What
are the components of database?
a. Table-also
called as relation
b. Column-also
called as attribute/field/ degree
c. Row-
also called as tuple/record/cardinality
d. Data
also called as value.
8. What
are two ways for creating Query?
Query can be created in
two ways – Query Wizard or Query Design method.
1 9. How
can you define criteria while creating Queries ?
This holds the
conditions on the basis of which the records will be filtered in the query
output. For example >50 is a criteria condition.
1 10. How
can we generate the report in Ms –access database ?
There are two ways for this – Use
of Report command and use of report wizard.
1 11.
Which
type of data type is used to holds the
combination of text and numbers as hyperlink address?
Hyperlink
datatype.
1 12. Which
data type accepts only two values?
Yes/ No
13. . Do
we need to save the data in database ?
No it is automatically save in the
database when we enter data.
14. How
many Autonumber datatype can appear in a table in database?
Only one Autonumber datatype is
allowed.
15. What
do you mean by the default view ?
Default value refers to the
preexisting value for a particular column. If a user forgets or skip the value
of some column than default value will be presented in that particularr column.
(if default defined)
16. What
is the difference between char and varchar datatype of SQL?
A CHAR field
is a fixed length, and VARCHAR is
a variable length field. This means that the storage requirements are different
- a CHAR always takes
the same amount of space regardless of what you store, whereas the storage
requirements for a VARCHAR vary
depending on the specific string stored.
FOR
WRITING SQL QUERIES :
•SQL statements are not case
sensitive.
•Place
a semicolon (;) at the end of the last clause.
•SQL statements can be on one or more lines.
•Keywords cannot be abbreviated or split
across lines.
•Clauses are usually placed on separate lines.
•Tabs and indents are used to enhance
readability.
The general form is :
SELECT COLUMN NAME….
FROM TABLE NAME
WHERE CONDITION;
EXAMPLE : TABLE NAME IS STUDENT
ROLLNO
|
NAME
|
MARKS1
|
MARKS2
|
1
|
RAJ
|
54
|
66
|
2
|
RAM
|
44
|
77
|
3
|
ROSHNI
|
77
|
79
|
4
|
ROHAN
|
23
|
98
|
Write MYSQL Queries for the following :
1. To
create the given table.
2. To
display all the data from table.
3. To
display only name and marks 1 from table.
4. To
display marks1 and marks2 from the table whose Rollno is greater than 2.
5. To
insert one more row as (5,”resham”,55,76)
6. To
delete the record of those students who are having marks1 less than30.
7. To
update the marks1 as 49 of those students who secured marks less than 30.
Answers :
1. CREATE
TABLE STUDENT
( ROLLNO INTEGER(20),
NAME CHAR(20),
MARKS1 INTEGER(4),
MARKS2 INTEGER(4));
2. SELECT
* FROM STUDENT;
3. SELECT
NAME,MARKS1 FROM STUDENT;
4. SELECT
MARKS1,MARKS2 FROM STUDENT WHERE ROLLNO >2;
5. INSERT
INTO STUDENT VALUES(5,RESHAM,55,76);
6. DELETE
FROM STUDENT WHERE MARKS1<30;
7. UPDATE
STUDENT
SET
MARKS1=49
WHERE
MARKS<30;
PREVIOUS YEAR SOLVED QUESTIONS
1- We really enjoyed ourselves on the
trip to Manali last month.
2- My house is a spacious two-bedroom
flat in Mayur Lok.
3- Sound Sentry is designed to help user with auditory impairments.
4- ISP stands for Internet Service Providers
5- Paragraphs can be used to break
continuous text to one or more sentences.
6- Headers can be used for inserting information at the top of each
page automatically.
7- On selecting Capitalize Each Word the
first character in all the words of the selected sentences will be converted to
Capital Letter.
8- Conditional formatting is available under Styles group
in home tab.
9- Chat option is available in Charts group
under the insert tab.
10- A Calendaring Software provides the
user an electronic version of a calendar.
11- Print option is available under File menu.
12- Calendar software allows the user to respond to
other users meeting request.
Very short answer type questions (2 marks each). Answer any 5 questions.
13- What do you mean by P2P?
Answer
- Networks in which all
computers have an equal status are called P2P or peer to
peer networks. Generally in such a network each terminal has an
equally competent CPU.
14-
What do you understand by Documents Template?
Answer
- Templates or document
templates refer to a sample fill-in-the-blank document that can help in saving
time. Usually templates are customized documents that may have sample content,
themes, etc.
For
example, if you want to
create a resume you can use a resume template and modify only the sections that
require changes.
To
view sample templates available with your word processor
Go
to File > New. You will be displayed with different types of
templates
For
example, if you would like to create a letter, you can select the Letters option under
Office.com Templates section.
15-
What do you understand by Styles?
Answer
- Styles or Style sets
are pre-defined or customized options used for creating good looking
professional documents with least efforts. You can find a number of styles
available within word processor that can be applied to a document. In this
exercise, you will learn to apply and manage styles.
To
work with styles, open a new word document in word processor, to view list
of styles, locate the Style group under Home tab
16-
What do you mean by Freeze in Spreadsheet?
Answer
- Freezing rows and
columns is helpful feature in a spreadsheet. When you are dealing with a huge
amount of data that spans several rows or columns, you may want the headers to
remain constant (frozen) while you scroll through the data so that you can see
the identifying names of the rows/columns.
Open
a new spreadsheet. To hide a row or column, do the following:
1.
In order to hide any row or column you can either select the particular row or
column that is to hidden or just one cell in the corresponding row or column
2.
Click on Format option available under Cells group in
the Home tab
3.
A drop-down list appears as shown below.
4.
Click on Hide & Unhide > Hide Rows.
17-
How can you insert audio clip in a presentation?
Answer
- We can include audio
clips to a presentation similar to that of videos. For example, you can play
mild background music while making your presentation. In this exercise you will
learn how to insert an audio clip in slides.
Open
a new file using presentation software. Click on Sound option under Media
clips group in the Insert tab, a drop down appears.
You
can select the Sound from File option to insert the sound
clip. A dialog box appears.
We
can locate the audio clip and click OK to
insert the same in the slide.
18-What
do you mean by grouping object?
Answer
- Grouping can help when
you want to move, rotate or re-size multiple objects in a presentation. We can
group objects such as pictures, clip art, shapes and text box; once grouped
they appear as a single object.
To
group the objects select the Group option available
under Arrange group in the Format tab.
19-
What do you understand by Task in Microsoft Outlook?
Answer
- Tasks refers to
actions that can be performed by an user, tasks may include action items such
as booking a conference room, booking tickets, reminder for a task completion
itself, etc.
We
can create tasks in email calendar application software.
Go
to File > New > Task
Short answer type questions (3 marks each). Answer any 5 questions.
20- What do you mean by prepositions ? Write any two examples of prepositions.
Answer
-
Prepositions
- A preposition is a
word that links a noun and pronoun to other words in a sentence. For example:
1.
We went to the market.
2.
The market is just around the corner.
3.
Many kinds of stores can be found at the market.
21-
Define the following
a)
Paying guest
b)
Landlord
c)
Notice
Answer - a) Paying guest - Someone who lives on rent in the owner’s house.
Answer - a) Paying guest - Someone who lives on rent in the owner’s house.
E.g. Paying guest accommodations are easily
available these days.
b)
Landlord - A
man who provides rooms for rent.
E.g. Our landlord allows us to stay out till 10 p.m. only.
E.g. Our landlord allows us to stay out till 10 p.m. only.
c)
Notice - A
formal announcement that you have to make if you want to move out/ask a tenant
to leave.
E.g. The landlord has a simple rule - every
tenant must give a month’s notice if they want their security back.
22-
Write down the process for inserting Page Break?
Answer - Page and Section breaks can be used to separate a document into sections. If you need another fresh page, choose the page break option in the Page Layout tab.
Answer - Page and Section breaks can be used to separate a document into sections. If you need another fresh page, choose the page break option in the Page Layout tab.
a)
Click on the Page Layout tab on the Ribbon.
b)
Click on the option Breaks in the Page
Setup group.
c)
A drop down list with options for different types of breaks appears.
An explanation is given for each type of page or section break.
23-
Write short notes on the following
a)
Upper Case
b) Sentence Case
c) Strikethrough
Answer - If we are creating a textbook with scientific content, you need to use special formatting for some characters. Character formatting can be applied to a single character or word.
b) Sentence Case
c) Strikethrough
Answer - If we are creating a textbook with scientific content, you need to use special formatting for some characters. Character formatting can be applied to a single character or word.
a)
Upper Case: - On selecting this option from the dropdown list, the selected
text will be converted to Capital Letters (UPPERCASE).
b)
Sentence Case: - On selecting this option from the dropdown list, the first
character in the first word of the selected sentence will be converted to
Capital Letter (Uppercase).
c)
Strikethrough: - After
selecting the text you need to click the icon abc in the Font group to make a strike through the
middle of the selected text.
24- What do you understand by Slide Transition?
25- What do you mean by Speaker Notes?
26- What is RDBMS?
Section
– B
Long
answer/ Essay type questions (5 marks each). Answer any 3 questions.
27- Write down the process for transferring data on the Internet.
28- Write short notes on the following
a) Web server
b) Dial up
c) WiFi
29- Explain different types of Charts.
30- Write down the steps for creating a tables in Open Office application.
31- What is database server ? Explain Primary and Foreign key.
Some links of videos:
1) Web application - https://www.youtube.com/watch?v=vJgjv38Ufiw
2) Word processing - https://www.youtube.com/watch?v=Z6bpHzJ9IeE&t=278s
3) Spreadsheets - https://www.youtube.com/watch?v=R4jDUD7Al7Q&t=2s
4) Email messaging - https://www.youtube.com/watch?v=sQX8fM7d8uk
27- Write down the process for transferring data on the Internet.
28- Write short notes on the following
a) Web server
b) Dial up
c) WiFi
29- Explain different types of Charts.
30- Write down the steps for creating a tables in Open Office application.
31- What is database server ? Explain Primary and Foreign key.
Some links of videos:
1) Web application - https://www.youtube.com/watch?v=vJgjv38Ufiw
2) Word processing - https://www.youtube.com/watch?v=Z6bpHzJ9IeE&t=278s
3) Spreadsheets - https://www.youtube.com/watch?v=R4jDUD7Al7Q&t=2s
4) Email messaging - https://www.youtube.com/watch?v=sQX8fM7d8uk
What is difference between client server and centralised server?
ReplyDeleteClient server network is a type of computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server.
ReplyDeleteWhereas
Centralised network is a type of type of network where all users connect to a central server, which is the acting agent for all communications. This server would store both the communications and the user account information.
Both looks same but differences is that client requests from server in client server module but in centralised networking all the clients are already active like you do Login in Facebook download any file...these all are centralised
This comment has been removed by the author.
ReplyDelete