Skip to main content
In this blog you will get information(notes , question answer) about your computer book 
(IT-402) for 2020 board exams.


Some important terms:

Softcopy
soft copy is an electronic copy of some type of data, such as a file viewed on a computer's display (Monitor) or transmitted as an e-mail attachment. It is an intangible output.
Hardcopy
A hard copy is a printed copy of information from a computer. Sometimes referred to as a printout, a hard copy is so-called because it exists as a physical object i.e. it is tangible Output.
Sticky Notes
 is a desktop notes application included in Windows Operating System. The program allows users to take notes using post-it note–like windows on their desktop.

ToggleKeys may refer to any of the following
·        Term used to describe a computer keyboard button with one or more functions. For example, the Caps LockNum Lock, and Scroll Lock keys are all toggle keys. In the case of the Caps Lock key, a user could either enable or disable the keyboard to type in all uppercase

·        This also a Microsoft Windows accessibility feature that causes Windows to generate a tone or beep each time you press the Caps Lock, Num Lock, or Scroll Lock keys. ToggleKeys is helpful for users who mistakenly press these keys while typing.

Computer Virus
A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally. They are always induced by people.
  • Depending on the available network bandwidth, the restoration of data can be slow. Because data is stored offsite, the data must be recovered either via the Internet or via tape or disk shipped from the online backup service provider.
  • It is possible that a remote backup service provider could go out of business or be purchased, which may affect the accessibility of one’s data or the cost to continue using the service.
  • If encryption password is lost, no more data recovery will be possible. However with managed services this should not be a problem.
  • Residential broadband services often have monthly limits that preclude large backups. They are also usually asymmetric; the user-to-network link regularly used to store backups is much slower than the network-to-user link used only when data is restored.
Internet 

The Internet can be described as an interconnection of several thousands of computers of different types belonging to various networks all over the world.



E-mail

E-mail is a message distributed by electronic means from one computer user to or more recipients via a network. It is the services of internet in which messages are sent from and received by the servers. E-mail has several advantages over conventional postal services.



Web Chat

Web chat is a program that enables you to communicate with others in real-time through messages. The user can log on to certain websites and communicate with various other users online by using Internet chat software. Chat software is interactive software that allows user to type comment in one window and receive replies in another from someone who is accessing the same software.



World Wide Web

World Wide Web is the leading information exchange service of the Internet. It gives users access to a vast array of documents that are connected to each other by the help of hypertext or hyperlink.



E-commerce

E-commerce is the commercial transactions conducted electrically on the Internet. It refers to a wide range of online business activities for products and services.



Internet telephony

Internet telephony can be defined as the technology that converts analog speech signals into digital signals and routes them through packet-switched networks of internet.



Video conferencing

Video conferencing means making communication between the users using sounds as well as pictures.



Online Databackup



Online backup service, also known as cloud backup or backup-as-a service is a method of offsite data storage in which files, folders, or the entire contents of a hard drive are regularly backed up on a remote server or computer with a network connection.
 To protect the information – be it business data or personal – from the risk of loss associated with fire, theft, hacking, or any other kind of technological disasters.
The following are the top five benefits of online backup:
Convenience
Online backup is accessible from anywhere, so long as there is internet connectivity; information is saved automatically as it streams in. You do not have to proactively save, label and track information..
Safety
As your data is stored in the Cloud, you are not subject to the typical threats of fire, flooding or theft. In fact, data that is stored in the Cloud is generally stored on secure, encrypted servers and systems, which minimizes the risks your data can incur
Ease of Recovery
Due to multiple levels of redundancy, if data is lost or deleted, most likely through individual user error or deletion, backups are available and easily located. Multiple levels of redundancy means that your online backup service stores multiple copies of your data in locations independent of each other.
Ease of Access
As the Cloud has no singular physical location, remote access is also a simple and feasible benefit to online backup. So long as you can connect to the remote server, you have access to all the data that you have stored in the Cloud, without having to do anything differently.
Affordability
Cloud-based back up can be less expensive than the cost of tape drives, servers, or other hardware and software elements necessary to perform the back up; the media on which the backups are stored; the transportation of media to a remote location for safekeeping; and the IT labor required to manage and troubleshoot backup systems.

Disadvantages of online backup

Online backup has some disadvantages:

  • Depending on the available network bandwidth, the restoration of data can be slow. Because data is stored offsite, the data must be recovered either via the Internet or via tape or disk shipped from the online backup service provider.
  • It is possible that a remote backup service provider could go out of business or be purchased, which may affect the accessibility of one’s data or the cost to continue using the service.
  • If encryption password is lost, no more data recovery will be possible. However with managed services this should not be a problem.
  • Residential broadband services often have monthly limits that preclude large backups. They are also usually asymmetric; the user-to-network link regularly used to store backups is much slower than the network-to-user link used only when data is restored.
NETWORK TOPOLOGY: :  The arrangement of computers along with the networking device in the network or network topology shows how the elements of a computer network are arranged. It allows you to visualize how different nodes are connected and how they communicate. Types are:
1. STAR TOPOLOGY
 Easy to install and wire.
 No disruptions to the network when connecting or removing devices.
 Easy to detect faults and to remove parts.
 Requires more cable length than a linear bus topology.
 If the connecting network device (network switch) fails, nodes attached are disabled and cannot participate in network communication.
 More expensive than linear bus topology because of the cost of the connecting devices (network switches).
2. Bus Topology
Easy to connect a computer or peripheral to a linear bus.
 Requires less cable length than a star topology.
Entire network shuts down if there is a break in the main cable.
 Terminators are required at both ends of the backbone cable.
 Difficult to identify the problem if the entire network shuts down.
 Not meant to be used as a stand-alone solution
3. RING TOPOLOGY
The main advantage of Ring topology is that the signal degeneration is low since each workstation participating in the network is responsible for regenerating the weak signal. The disadvantage of ring topology is, if one workstation fails, the entire network will fail.


HTTPS

HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet. It means all communications between your browser and the website are encrypted.

Bandwidth

Bandwidth is the capacity of a wired or wireless network communications link to transmit the maximum amount of data from one point to another over a computer network or internet connection in a given amount of time -- usually one second.
For digital devices,  bits per second (bps) or bytes per second.
For analog devices,  cycles per second, or Hertz (Hz).

Cookies : These are small files which are stored on a user's computer. They are designed to hold a small amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer.
Cookies are a convenient way to carry information from one session on a website to another, or between sessions on related websites, without having to burden a server machine with massive amounts of data storage. Storing the data on the server without using cookies would also be problematic because it would be difficult to retrieve a particular user's information without requiring a login on each visit to the website.

------------------------------------------------------------------------------------------------------------------------------------

NETWORK AND TELE COMMUNICATION

Data communication

Data communication system is the collection of hardware, software and other devices that allows exchanging data, information and voice between two or more devices through a wire or radio waves.

Telecommunication
Telecommunication is a system if transmission of sounds, images, texts or data in the form of electronic signals.

Components of data communications
The components of data communication are as follows:
Data: This is the data that is to be communicated.
Sender: This is the device used to send data.
Medium: This is the device through which the sender makes communication to the receiver.
Receiver: This is the device which receives data sent by the sender.
Protocol: This is the set of rules that are followed nu the sender and the receiver to make communication possible.

Telecommunication
Telecommunication is a system if transmission of sounds, images, texts or data in the form of electronic signals.

Computer network
A computer network is a logical or physical interconnection between two or more computers such that they could communicate with each other.

Advantages of computer network
i. A computer networked environment allows faster, easier and reliable transfer of data files from one computer to another.
ii. A network computer allows sharing of networked connected peripherals and simultaneous access to programs and data irrespective of the physical location of the resources and the user.
iii. Computers in network can access the network connected hardware devices like printer, scanner, disk drives etc.
 On the basis of Architecture Networking can be categorized into three models:
Three models of network
i. Client - Server Network
ii. Peer - to - Peer Network
iii. Centralized Computing Network

Client Server Network
It is a type of network in which each computer in a network is either a client or a server. It is an arrangement where some programs, files or other resources located on one computer called the server but are available to other systems on the network, called clients.
Peer to Peer Network

In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client.
Centralized Computing Network
A type of network where all users connect to a central server, which is the acting agent for all communications. This server would store both the communications and the user account information. Most public instant messaging platforms use a centralized network. Also called centralized server-structure.
Protocols
Protocols are the sets of rules that the computer on the network must follow to communicate and to exchange the data with each other.

Names of the protocols
FTP = File Transfer Protocol
SMTP = Simple Mail Transfer Protocol
TCP/IP = Transmission Control Protocol/ Internet Protocol
ARP = Address Resolution Protocol
POP = Post Office Protocol
HTTP = Hyper Text Transfer Protocol
PPP =
CDP = Cisco Discovery Protocol

Network Interface Card (NIC)
Each computer on any types of network needs a hardware component to control the flow of data. The device that performs this function is Network Interface Card (NIC), commonly called network card.


 On the basis of geographical area Networking can be categorized into four types:
Personal Area Network (PAN)

A personal area network is a network of computers for personal use. Like for example, a desktop computer may connect to a personal router via Ethernet and a tablet may connect via Wi-Fi.  "Smartphone tethering" is a common type of PAN, in which a laptop or any computer is connected. It ranges only upto 10meters 


Local Area Network (LAN)
A Local Area Network (LAN) is a network of computers that are relatively near to each other and are connected in a war that enables them to communicate by a cable and a small wireless device. A LAN consists of just two or three computers to exchange data or share resources or it can include hundreds of computers of different kinds.

Metropolitan Area Network (MAN)
Metropolitan Area Networks (MANs) are large computers networks spread over a city or neighboring cities. A MAN can have a group of many LANs. Especially, big companies, banks, offices etc. have their branches or sub offices in a city or in neighboring cities. They use MAN to connect with their branches or sub offices for communicating data and information. The communication media in MANs may be optical fiber or unbounded communication media like microwave system, infrared system, radiowave to link their branches and sub offices.

Wide Area Network (WAN)
Wide Area Network is a telecommunications network usually used for connecting computers that spans a wide geographical area. WANs can be used to connect cities, states or even computers. Typically, it will employ communication circuits such as long distance telephone wires, microwaves and satellites. WANs are often used by larger corporations or organizations to facilitate the exchange of data. The world's most popular WAN is the Internet.
 Networking devices are :
MODEM
MODEM stands for Modulator Demodulator. It is the device that converts digital data to analog form and vice versa. It is a device used to transfer the data of one computer to another using telephone lines.

Repeater
The signals transmitted become weak due to some problem in the transmission mediums or the distance between the two locations. A repeater is a device that amplifies the incoming signals, creates a new copy of it and transmits the signals on the network. Repeaters are required in the network where computers are a part of each other.

Hub
A hub is a hardware device that relays communication data. A hub sends data packets to all devices on a network, regardless of any MAC addresses contained in the data pocket. It is a device with multiple ports that allows network devices to be connected together. It acts as a central networking device in the star topology.
 COMPUTER VIRUS
A computer virus is a type of computer program that can replicate itself by making copies of itself by making copies of itself without the user's knowledge or consent.

Computer virus spread from following ways
i. Opening the infected email attachment.
ii. By downloading infected programs from the internet.
iii. By using infected floppy disk, pen drives and CDs.
iv. By transferring an infected program over a network and executing it.

Type of computer virus
i) Boot Sector Virus
Boot Sector virus is regarded as one of the most hostile types of virus, a boot sector virus infects the boot record of a hard or a floppy disk. The virus moves the boot sector data to a different part of a disk. This virus allows the actual boot sector data to be read as though a normal start up were occurring.
ii) File Infecting Virus
This type of virus infects program files on a disk. When infected program is launched, the virus code is also launched. After the virus code has been launched, it will normal load and execute the program that has been infected.
iii) Multipartite Virus
This virus is the combination of parasitic and boot sector virus and due to this, it is able to infect both the files or boot sector of a disk. They infect program files and when it is executed, these viruses affect the boot record.
iv) Macro Virus
These viruses infect the Microsoft Office programs such as Excel, Word, Access and PowerPoint. When we open the Microsoft program then the virus is loaded and it affects the normal template or document. Since it is attached in the document, if the infected document is opened on other computer, it affects the computer too.
v) Script Virus
Script Virus is written in script programming languages, such as VBScript and JavaScript. It can infect a computer through various scripting environments, such as Windows Help, Windows installation files and Windows registry files.

The symptoms of computer viruses
i. Programs take long time to load.
ii. Renaming all the files with different names.
iii. Shows unusual error messages on the screen frequently.
iv. Corrupt or deletes system data and programs.\

Anti-virus software
Anti-virus software is a computer program designed to detect and remove viruses from the computer system. 

Avoid the virus attacks
i. Scanning the email attachment before executing them.
ii. Use of a good anti-virus program to scan for viruses.
iii. Scanning the disk frequently for viruses.
iv. Not installing the pirated software, especially computer games.
MS Access
Data and Information
Data consists or raw facts and figures, Data consists of letter, sound, image or video within the computer.
Processed data is known as information. Using a data base program or software, they are converted into the meaningful result called information.

Database 
A database is a collection of interrelated data. It refers to an organized collection of data stored on a computer in such a way that its content can easily be accessed, updated and queried upon with the help of a software program.
Example = Banks must have systems for keeping track of customers and their accounts.

Advantages of database
i. Database saves the data.
ii. Data can be stored in a small area or space in computerized database.
iii. Database protects from unauthorized access and use of data.
iv. It saves data from being lost.

Objects of MS Access
a. Table = Table are the core database object, used to store information. The tables are the containers for all the data in a database. In a table, data are arranged in a columns and rows.
b. Queries = Queries means to ask question about the data presented in the table. BY using queries, we can view records or data, modify the content of table and a lot more. It is a way of retrieving and editing information according to the condition asked. It is a strong tool using in searching of desired data from database.
c. Forms = A form is a database object used to enter and edit data in a table. Form can be used to edit the records of underlying tables or to enter new records.
d. Reports = A report is especially formatted collections of data organized according to our specification for summarizing and printing. They are the means to present the information as a printed document.
e. Macros = When macro is executed, it executes one or more database commands automatically. They are meant for automating the task that is done over and over again.
f. Modules = Modules are pieces of code used to impose particular behaviors to your application programmatically. They are more flexible and extensive than macros, although they are usually written for various and particular circumstances.

Attributes  and  Record 
Attributes refer to a single data item related to a database object. The database schema associates one or more attributes with each database entity.
Record is a row of table in Microsoft Access. It contains information about a particular item stored in a table.

Database management system and it's software
A database management system is a collection of programs that enables you to store, modify, and extract information from database.
Any four database management systems are as follows:
i. Relational Database Management System
ii. Hierarchical Database Management System
iii. Network Database Management System
iv. Object Oriented Database Management System

Field Data Type
A characteristic of a field that determines what kind of data it can store is known as Field Data Type.

Data types used in Ms-Access
a. Text = A text field contains up to 255 characters or it can set the length in the field size, text data type can include numbers letters and symbols.
b. Memo = This type of field holds an unlimited amount of text. It can accommodate 65, 535 characters.
c. Number = This type of field allows only the numbers to be entered.
d. Date/Time = This field type only allows date and time to be entered. It occupies 8 bytes.
e. Currency = This field allows to enter currency.
f. AutoNumber = This type automatically generates and insert the unique number in the new row.
g. Yes/No = It allows the user to select Yes or No when completing the field.
h. OLE object = It allows to link to binary data or files.
i. Hyperlink = It allows to create a hyperlink. It stores up to 64,000 characters.
j. Lookup Wizard = The lookup wizard creates a field that allows the user to choose a value from a list of values by using a list box or combo box.


Rules for naming field
a. It can be up to 64 characters long.
b. The naming cannot include control characters.
c. It cannot begin with leading spaces.
d. It can include any combination of letters, numbers, spaces and special characters except a period (.), an exclamation mark (!), an accent grave (`) and brackets ([ ]).

Primary Key
The primary key is a special column or group of columns in the table whose value must be unique in the table.
We can set the primary key by creating a table relationship. To relate tables a field is required which should be common to all the related tables. The common field of main table is known as primary key field.

The differences between primary key and foreign key
Primary Key
Foreign Key
It is a column or a set of column that can be used to uniquely identify a row in a table.
It is a column or a set of column that refer to a primary key or a candidate key of another table.
A table can have a single primary key that can reference different tables.
A table can have multiple foreign key that can reference different tables.


Field property:  A field property that controls what can be put into a field and how it can be placed there is known as field properties.

Validatation Rule: Validation rule is a property of Date/time field.

Input Mask: An input mask refers to a string expression that governs what a user is allowed to enter in as input in a text box.

Relational Database management system: A relational Database management system is a database system that is based on relation model. It is a database management system designed to manage a relational database.
 
Sorting records: Sorting records is the arrangement of records on the basis of a field or fields of a table either in ascending order or in descending order.

Filtering records
Filtering records is the process of viewing required data of a table that specify the specified criteria.
The different techniques for filtering records are as follows:
i. Filter by selection
ii. Filter by form

iii. Advanced filter
DATABASE DEVELOPMENT

    What is SQL ?

It is Structure Query Language. It is a standard that every database  user uses to communicate with and perform specific task .
1. Give names of any two RDBMS.
MYSQL, MS-ACCESS

2   2. What are different types of  SQL commands available.
a.       DDL-DATA DEFINATION LANGUAGE                         Eg.- CREATE ,ALTER,DROP
b.      DML-DATA MANIPULATION LANGUAGUE   Eg.. UPDATE,DELETE
c.       TCL-TRANSCATION CONTROL LANGUAGE Eg. COMMIT,ROLLBACK
d.      DCL-DATA CONTROL LANGUAGE                   Eg. GRANT,REVOKE

     3. What is the difference between DDL and DML Commands?
DDL statements are used for creating and defining the Database structure. DML statements are used for managing data within Database.

     4. What is a Primary key in a table ?
A  Primary key is a column in a table which consists of unique values i.e. it cannot have duplicate values or null values. (null – no value). For example in a table school admission number can be a primary key as it is must and unique for all students.
6    5. What is Foreign key in a database?
In the context of relational databases, a foreign keys a field (or collection of fields) in one table that uniquely identifies a row of another table or the same table. In simpler words, the foreign key is defined in a second table, but it refers to the primary key or a unique key in the first table

     6.  What do you mean by Queries , table and Reports in respect to database.
a.       Queries – query is a request for data or information from a database table or combination of
                tables.
b.      Table- It consists of columns, and rows.It is also called as relation in database.
c.       Report- Reports are a great way to organize and present data from your database. The data in a preview or in a printed report is static. Reports merely present the data; they do not alter the underlying data in the tables. Each time a report is opened, database access displays the most recent data.
d.      Forms-a form is a window or screen that contains numerous fields, or spaces to enter data. Each field holds a field label so that any user who views the form gets an idea of its contents. A form is more user friendly than generating queries to create tables and insert data into fields.
e.       Macros- they are mini-programs that automate custom tasks.Macros are a simple way to get custom results without becoming a programmer.
     7.  What are the components of database?
a.       Table-also called as relation
b.      Column-also called as attribute/field/ degree
c.       Row- also called as tuple/record/cardinality
d.      Data also called as value.
   8.  What are two ways for creating Query?
Query can be created in two ways – Query Wizard or Query Design method.

1 9.   How can you define criteria while creating Queries ?
This holds the conditions on the basis of which the records will be filtered in the query output. For example >50 is a criteria condition.

1  10.  How can we generate the report in Ms –access database ?
There are two ways for this – Use of Report command and use of report wizard.

1  11.  Which type of data  type is used to holds the combination of text and numbers as hyperlink address?
Hyperlink datatype.

1  12.   Which data type accepts only two values?
Yes/ No
  13. .  Do we need to save the data in database ?
No it is automatically save in the database when we enter data.

  14.    How many Autonumber datatype can appear in a table in database?
Only one Autonumber datatype is allowed.

   15.  What do you mean by the default view ?
Default value refers to the preexisting value for a particular column. If a user forgets or skip the value of some column than default value will be presented in that particularr column. (if default defined)

   16.    What is the difference between char and varchar datatype of SQL?
A CHAR field is a fixed length, and VARCHAR is a variable length field. This means that the storage requirements are different - a CHAR always takes the same amount of space regardless of what you store, whereas the storage requirements for a VARCHAR vary depending on the specific string stored.

FOR WRITING SQL QUERIES :     
•SQL statements are not case sensitive.        
•Place a semicolon (;) at the end of the last clause.
 •SQL statements can be on one or more lines.
 •Keywords cannot be abbreviated or split across lines.
 •Clauses are usually placed on separate lines.
 •Tabs and indents are used to enhance readability.

The general form is  :
SELECT COLUMN NAME….
FROM TABLE NAME
WHERE CONDITION;

EXAMPLE :   TABLE NAME IS STUDENT
ROLLNO
NAME
MARKS1
MARKS2
1
RAJ
54
66
2
RAM
44
77
3
ROSHNI
77
79
4
ROHAN
23
98
Write MYSQL Queries for the following :
1.      To create the given table.
2.      To display all the data from table.
3.      To display only name and marks 1 from table.
4.      To display marks1 and marks2 from the table whose Rollno is greater than 2.
5.      To insert one more row as (5,”resham”,55,76)
6.      To delete the record of those students who are having marks1 less than30.
7.      To update the marks1 as 49 of those students who secured marks less than 30.
Answers :
1.      CREATE TABLE STUDENT
(     ROLLNO       INTEGER(20),
      NAME            CHAR(20),
      MARKS1        INTEGER(4),
      MARKS2        INTEGER(4));
2.      SELECT * FROM STUDENT;
3.      SELECT NAME,MARKS1 FROM STUDENT;
4.      SELECT MARKS1,MARKS2 FROM STUDENT WHERE ROLLNO >2;
5.      INSERT INTO STUDENT VALUES(5,RESHAM,55,76);
6.      DELETE FROM STUDENT WHERE MARKS1<30;
7.      UPDATE STUDENT
SET MARKS1=49
WHERE MARKS<30;




PREVIOUS YEAR SOLVED QUESTIONS
1- We really enjoyed ourselves on the trip to Manali last month.
2- My house is a spacious two-bedroom flat in Mayur Lok.
3- Sound Sentry is designed to help user with auditory impairments.
4- ISP stands for Internet Service Providers
5- Paragraphs can be used to break continuous text to one or more sentences.
6- Headers can be used for inserting information at the top of each page automatically.
7- On selecting Capitalize Each Word the first character in all the words of the selected sentences will be converted to Capital Letter.
8- Conditional formatting is available under Styles group in home tab.
9- Chat option is available in Charts group under the insert tab.
10- A Calendaring Software provides the user an electronic version of a calendar.
11- Print option is available under File menu.
12- Calendar software allows the user to respond to other users meeting request.

Very short answer type questions (2 marks each). Answer any 5 questions.

13- What do you mean by P2P?
Answer - Networks in which all computers have an equal status are called P2P or peer to peer  networks. Generally in such a network each terminal has an equally competent CPU.

14- What do you understand by Documents Template?
Answer - Templates or document templates refer to a sample fill-in-the-blank document that can help in saving time. Usually templates are customized documents that may have sample content, themes, etc.
For example, if you want to create a resume you can use a resume template and modify only the sections that require changes.

To view sample templates available with your word processor

Go to File > New. You will be displayed with different types of templates
For example, if you would like to create a letter, you can select the Letters option under Office.com Templates section.

15- What do you understand by Styles?
Answer - Styles or Style sets are pre-defined or customized options used for creating good looking professional documents with least efforts. You can find a number of styles available within word processor that can be applied to a document. In this exercise, you will learn to apply and manage styles.

To work with styles, open a new word document in word processor, to view list of styles, locate the Style group under Home tab

16- What do you mean by Freeze in Spreadsheet?
Answer - Freezing rows and columns is helpful feature in a spreadsheet. When you are dealing with a huge amount of data that spans several rows or columns, you may want the headers to remain constant (frozen) while you scroll through the data so that you can see the identifying names of the rows/columns.

Open a new spreadsheet. To hide a row or column, do the following:
1. In order to hide any row or column you can either select the particular row or column that is to hidden or just one cell in the corresponding row or column
2. Click on Format option available under Cells group in the Home tab
3. A drop-down list appears as shown below.
4. Click on Hide & Unhide > Hide Rows.

17- How can you insert audio clip in a presentation?
Answer - We can include audio clips to a presentation similar to that of videos. For example, you can play mild background music while making your presentation. In this exercise you will learn how to insert an audio clip in slides.
Open a new file using presentation software. Click on Sound option under Media clips group in the Insert tab, a drop down appears.
You can select the Sound from File option to insert the sound clip. A dialog box appears.
We can locate the audio clip and click OK to insert the same in the slide.

18-What do you mean by grouping object?
Answer - Grouping can help when you want to move, rotate or re-size multiple objects in a presentation. We can group objects such as pictures, clip art, shapes and text box; once grouped they appear as a single object.
To group the objects select the Group option available under Arrange group in the Format tab.

19- What do you understand by Task in Microsoft Outlook?
Answer - Tasks refers to actions that can be performed by an user, tasks may include action items such as booking a conference room, booking tickets, reminder for a task completion itself, etc.
We can create tasks in email calendar application software.
Go to File > New > Task

Short answer type questions (3 marks each). Answer any 5 questions.

20- What do you mean by prepositions ? Write any two examples of prepositions.
Answer - 
Prepositions - A preposition is a word that links a noun and pronoun to other words in a sentence. For example:
1. We went to the market.
2. The market is just around the corner.

3. Many kinds of stores can be found at the market.

21- Define the following
a) Paying guest
b) Landlord
c) Notice
Answer - a) Paying guest - Someone who lives on rent in the owner’s house.
E.g. Paying guest accommodations are easily available these days.

b) Landlord - A man who provides rooms for rent.
E.g. Our landlord allows us to stay out till 10 p.m. only.

c) Notice - A formal announcement that you have to make if you want to move out/ask a tenant to leave.
E.g. The landlord has a simple rule - every tenant must give a month’s notice if they want their security back.

22- Write down the process for inserting Page Break?
Answer - Page and Section breaks can be used to separate a document into sections. If you need another fresh page, choose the page break option in the Page Layout tab.
a) Click on the Page Layout tab on the Ribbon.
b) Click on the option Breaks in the Page Setup group.
c) A drop down list with options for different types of breaks appears. An explanation is given for each type of page or section break.

23- Write short notes on the following
a) Upper Case
b) Sentence Case
c) Strikethrough
Answer - If we are creating a textbook with scientific content, you need to use special formatting for some characters. Character formatting can be applied to a single character or word.
a) Upper Case: - On selecting this option from the dropdown list, the selected text will be converted to Capital Letters (UPPERCASE).

b) Sentence Case: - On selecting this option from the dropdown list, the first character in the first word of the selected sentence will be converted to Capital Letter (Uppercase).

c) Strikethrough: - After selecting the text you need to click the icon abc in the Font group to make a strike through the middle of the selected text.


24- What do you understand by Slide Transition?

25- What do you mean by Speaker Notes?
26- What is RDBMS?


Section – B
Long answer/ Essay type questions (5 marks each). Answer any 3 questions.

27- Write down the process for transferring data on the Internet.
28- Write short notes on the following
a) Web server
b) Dial up
c) WiFi
29- Explain different types of Charts.
30- Write down the steps for creating a tables in Open Office application.
31- What is database server ? Explain Primary and Foreign key.


Some links of videos:
1) Web application - https://www.youtube.com/watch?v=vJgjv38Ufiw
2) Word processing - https://www.youtube.com/watch?v=Z6bpHzJ9IeE&t=278s
3) Spreadsheets - https://www.youtube.com/watch?v=R4jDUD7Al7Q&t=2s
4) Email messaging  - https://www.youtube.com/watch?v=sQX8fM7d8uk




Comments

  1. What is difference between client server and centralised server?

    ReplyDelete
  2. Client server network is a type of computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server.

    Whereas
    Centralised network is a type of type of network where all users connect to a central server, which is the acting agent for all communications. This server would store both the communications and the user account information.


    Both looks same but differences is that client requests from server in client server module but in centralised networking all the clients are already active like you do Login in Facebook download any file...these all are centralised

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete

Post a Comment

Popular posts from this blog

Unit 1: Digital Documentation (Advanced)

Unit 1: Digital Documentation (Advanced) 1. What are Styles? What are the advantages of using styles? Answer –   Styles  are pre-defined formatting attributes in digital document processing that can be used to apply consistent formatting to text and other elements. The advantages of using styles include – Consistency throughout the document Efficiency in formatting the document Flexibility in making changes to the document Improved accessibility for users with assistive technologies. 2. What are the different categories of style in LibreOffice writer document? The writer  provides six style categories, which are as follows: Page :  –  All document in Writer are based on pages; page style is used to define basic page layout, like page size, its margin, placement of header and footer, footnote, borders, and background. Paragraph:  A paragraph begins and ends by pressing the Enter key. Paragraph ...

Maintain Healthy Safe and Secure Working Environment Class 10 Notes

Health Health of an employee is most important in the workplace and every organization must provide a healthy and safe working environment for their employees. Safe environment provides employees physical, mental and social well being.  Cleanliness at the workplace A proper air conditioning system A proper filtered water facility must be available for the employees A fresh food cafeteria and good quality food for the employees Clean washroom facility should be given to employee Safety The work environment of the organization must be safe and it must be free from hazards and risk.  Organization should maintain following Safety rules in workplace – A proper safety guidelines be prepared by the organization Regular drills should be conducted Smoke alarms must be placed Safety equipment maintenance must be taken care regularly Fire escape plans must be installed Security Every employee should feel that they are secured in the company campus. Security helps to ensure the safety of ...