IT-Class 10th (Prashant Kirad)
IT-Class 10th (Prashant Kirad)
IT-Class 10th (Prashant Kirad)
PRASHANT KIRAD
PRASHANT KIRAD
SELF-MANAGEMENT SKILLS II
10
Following are some of the skills you must master to succeed in life:
Self-awareness: Seek candid feedback to gain insights into your
&
personality and professional capabilities. Reflect on daily
9
What is Stress?
Stress encompasses our emotional, mental, physical, and social
responses to perceived demands or threats, known as stressors. These
stressors trigger the stress reaction. For instance:
Stress Management:
Effectively handling stress involves creating a strategy to cope with
daily pressures, aiming for a harmonious balance between life, work,
relationships, relaxation, and enjoyment. This approach enables the
proactive management of daily stressors, allowing you to confront
challenges successfully.
10
&
Always bear in mind the ABC of stress management:
9
Management Techniques:
Effective stress management techniques include:
1. Time Management: Prioritize tasks to alleviate stress.
2. Physical Exercise and Fresh Air: Engage in activities like yoga or
meditation for better blood circulation and relaxation. Outdoor
activities provide fresh oxygen, enhancing overall well-being.
3. Healthy Diet: Maintain a balanced diet, incorporating staples like
dal, roti, vegetables, and fruits for sustained energy and efficiency.
4. Positivity: Focus on positive aspects rather than dwelling on
negatives. Adopting a constructive attitude can help overcome
challenges, such as improving performance after a low test score.
5. Adequate Sleep: Ensure a minimum of 7 hours of sleep each night to
recharge both body and mind for optimal functioning.
10
6. Holidays with Family and Friends: Break from routine by spending
quality time with family or friends during vacations, providing a
&
refreshing perspective upon return.
9
Emotional Intelligence:
B
Finding Weaknesses:
1. Identify challenging areas and tasks. and tasks.
2. Pay attention to feedback from others.
3. Embrace feedback openly for self-improvement.
Interests:
1. Pleasurable activities in free time.
2. Curiosity-driven or self-motivated pursuits.
3. Future learning or desired activities.
Abilities (Strengths):
10
&
1. Natural or acquired capacities.
9
Self-Motivation:
U
Types of Motivation:
- Internal Motivation: Driven by personal satisfaction, happiness, and
well-being, such as learning a new skill during an annual function.
- External Motivation: Fueled by external rewards like respect,
recognition, and appreciation, as seen when Suresh's prize in a 100m
race motivates him to practice regularly.
PRASHANT KIRAD
TOP 10 MCQs
1. What is the best way to start our day positively?
(a) Think about all that can go wrong.
(b) Think about the difficult test you will face during the day.
(c) Think about all your accomplishments so far and feel good about
them.
(d) Think about the traffic on the road and feel stressed.
Answer: (c)
2. Do you think people living in hill stations can skip taking a bath for
many days?
(a) No, irrespective of the climate, one should take a bath regularly.
(b) Yes, not taking bath for many days is acceptable for people staying
in cold climate.
10
&
(c) Yes, if they wipe themselves with a wet cloth, then it is fine.
(d) None of the above
9
Answer: (a)
B
U
like _
a. Discipline
EX
b. Timeliness
c. Goal-setting
d. All of the above
Answer: (d)
4. When you are under __________ for a prolonged period, it can cause
health problems and mental troubles as well.
a. Stress
b. Discipline
c. Timeliness
d. Goal – Setting
Answer: (a)
PRASHANT KIRAD
5. If you can become a calm and relaxd person, you will have the ability
to work independently, which means.
a. You are self-aware
b. You are self–monitor
c. You are self–correcting
d. All of the above.
Answer: (d)
about them.
PH
9. High expectations from self can leave one with chronic anxiety and
stress, thus leading to _________ stress
PRASHANT KIRAD
a. Mental
b. Physical
c. Social
d. Financial
Answer: (a)
TOP 10 QUESTIONS 10
&
9
different situations.
EX
10
Q6. What do you mean by Goal and Goal Setting?
Ans. Goals: They are a set of dreams with a deadline to get them, for
&
example, saving pocket money to buy a favorite mobile phone by a
particular date. Goal setting: It is all about finding and listing your goals and
9
10
&
9
B
U
PH
EX
PRASHANT KIRAD
ITC SKILLS II
10
seen and touched, such as the keyboard, monitor, and CPU.
Software - This refers to the intangible components that enable the
hardware to function. Examples include Windows and MS Office.
each software.
5. Organizing files and directories within the computer system.
6. Monitoring disk space utilization for specific files.
7. Enabling file management operations like creation, copying, moving, and
EX
deletion.
10
Taskbar: Positioned along the bottom of the screen, the taskbar is a lengthy
horizontal bar that provides essential functionality. To the left, you'll find the
Start button, while the Date/Time is located to the right. Additionally, the
&
taskbar displays icons representing open programs and several shortcuts.
Start Button: Situated on the left side of the taskbar, the Start button serves
9
as a gateway to the Start menu, offering access to various programs and
features upon clicking.
B
Recycle Bin: Housing deleted files and folders, the Recycle Bin allows users
to restore accidentally removed items. It serves as a temporary storage
U
Creating Files:
1. Right-click on any empty space within the right column.
2. From the shortcut menu, choose "New" and then select the desired file
type you wish to create.
Renaming Folders and Files:
1. Right-click on the file or folder.
2. Select the "Rename" option from the shortcut menu.
3. Input the new name or modify the existing one, then press the Enter
key.
4. Alternatively, simply select the file/folder and press the function key
F2.
5. Right-click on any empty space within the right column.
6. From the shortcut menu, choose "New" and then select the desired file
type you wish to create.
PRASHANT KIRAD
10
6. Enter a desired name for the folder.
Renaming Folders and Files:
1. Right-click on the file or folder.
&
2. From the shortcut menu, choose the "Rename" option.
3. Type the new name or edit the existing one, then press Enter.
4. Alternatively, select the file/folder and press the Function key F2.
9
Deleting Files or Folders:
1. Click on the file or folder.
B
menu.
PH
BASIC SHORTCUTS
CTRL+ z — undo
CTRL+ y — redo
EX
10
the lifespan of these components.
&
Always ensure the computer system is powered off before beginning
the cleaning process.
9
Avoid spraying cleaning fluid directly onto computer components.
Instead, apply the liquid onto a cloth and then use it to wipe the
components.
B
Take care not to allow any cleaning liquid to drip near the circuit
U
board.
It's recommended to use an anti-static wristband to prevent the
PH
CDs and DVDs: Store CDs and DVDs in their proper cases to prevent
damage. Clean any dirt or fingerprints from CDs and DVDs by lightly
rubbing them with a clean, lint-free cotton cloth.
10
monitor.
Replace malfunctioning hardware promptly.
Avoid food near the computer to prevent damage.
Organize cables and cords to prevent tangling.
&
Remove unauthorized software from the system.
Back up data regularly for safety.
9
Periodically verify backup integrity through restoration checks.
Use an external hard drive for data backups.
B
10
Do not permit unauthorized individuals to use your system.
Exercise caution with unknown pen drives or CDs.
Refrain from clicking on pop-up windows while browsing the Internet.
Preparing Computer Against Viruses: &
Maintain active background operation of the anti-virus program.
9
Keep the anti-virus software updated to detect new viruses.
Perform full disk scans periodically.
Removing Temporary Files:
B
menu.
4. The Properties window opens. Click on Disk Cleanup.
5. The Disk Cleanup for C: window will appear.
6. Click the Check box next to Temporary Files, Temporary Internet files,
EX
Firewall:
A computer firewall functions as a network security system, either
through software or a programmable device, overseeing and controlling
incoming and outgoing network traffic based on user-defined security
parameters. Firewalls enhance the security of computers connected to
networks such as LANs or the Internet. Generally, a firewall establishes a
barrier between a trusted internal network and an untrusted external
network, such as the Internet. It scrutinizes each data packet, assessing
whether it should be allowed to pass or halted, regardless of whether it
10
is incoming or outgoing traffic.
Cookies:
When a user visits an internet website, a small file called a cookie is stored
&
on their computer. These files are utilized to retain personalized
information specific to a particular client and website. A cookie is
9
transmitted by a website upon your visit and is stored on your computer
in a file. Only the website that generated the cookie can read it, and this
B
(ii) Screen: Wipe the screen with a soft cloth to remove fingerprints.
(iii) Handle Devices Carefully: Handle and move your laptop carefully to
avoid dropping or banging it against hard surfaces.
(iv) Keep the Computer Cool: Overheating can damage internal parts.
EX
Maintenance Schedule:
(a) Daily Maintenance:
i. Clean up your email inbox.
ii. Download email attachments and save them in proper folders.
(b) Weekly Maintenance:
i. Clean your keyboard.
ii. Clean your monitor.
PRASHANT KIRAD
10
iii. Update your operating system.
iv. Check for expiry of antivirus software and renew.
files and data such as temporary files and images to free up hard
disk space, improving computer performance.
Removing SPAM from your Computer: Sometimes we get emails from
EX
(b) Virus: Viruses are computer programs that can damage the data and
software programs or steal the information stored on a computer. Major
types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all
files once they Information and Communication Technology Skills 81
attack a computer. This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful
software program but once it reaches a computer it starts behaving like
a virus and destroying data.
• Online Predator: Online predators are people who trap you into
inappropriate relationships. They may be older people posing to be your
10
age, bullying you into doing illegal activities online and sometimes face
to face.
• Internet Scams: Sometimes you may receive very attractive offers
saying you have won huge money in a lottery and that you can claim the
&
prize by depositing a certain amount of money. When you deposit the
money using credit card or online banking, you not only lose the deposit
9
money but your card/account information may be misused later. rewrite
everything with same points and format
B
U
TOP 10 MCQs
1. Which software manages all the devices of a computer and keeps track
of the status of the device,
whether it is busy or not?
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
10
2. An ________ manages the computer memory and keeps track of which
memory space is in use by which program and which space is free.
a. operating system
b. application software
c. anti-virus software
d. microsoft word
&
9
Answer: a. operating system
3. 18. GUI stands for __________
B
a. DOS
b. Windows
c. Linux
d. Disk Defragmentor
Answer: d. Disk Defragmentor
5. Which of the following is not a mobile operating system?
a. Android
b. iOS
c. Windows Phone
d. Linux
Answer: d. Linux
PRASHANT KIRAD
10
(b) Multi-user
(c) Single-user, multi-task operating system
(d) Distributed
Answer: (a) Real Time
&
8. ___________ operating system enables multiple users to work on the
9
same computer simultaneously.
(a) Single-user , single-task operating system
B
c. Linux
d. None of these
Answer: c. Linux
TOP 10 QUESTIONS
1. What is ICT?
Information and Communication Technology (ICT) is an acronym for
information and communication technology. ICT helps in the proper
sharing, receiving, and processing of information, and an ICT device is a
device that is used for processing, storing, and delivering information to
others. Examples of ICT devices are – Laptop, Desktop, Tablets and
Smartphones.
10
2. Objectives of Information and communication technology?
Advantages and disadvantages of ICT.
Full form of ICT is Information and communication technology. The goal
&
of ICT is to bridge the gap between parents, educators, and students by
encouraging sustainable, cooperative, and transparent communication
9
methods. Advantages of ICT
a. Enhanced the modes of communication
b. Independent learning platforms Cost – efficient
B
3. What is BIOS?
BIOS stands for Basic Input/ Output System, It helps the computer system
to identify (Self-test) the paraperaphal devices which are connected to
the computer system and helps computers to load Operating System
properly.
PRASHANT KIRAD
10
information. Every file has a file name and extension that identifies the
type of file.
b. Folder – Folder is a collection of files or a group of files.
Daily Maintenance
PH
10
9. How can we protect our data?
To protect our data from theft and viruses we can take the following
measures –
&
a. Use Strong password in your account – Make your passwords difficult to
guess. When creating a new password, attempt to use a combination of
9
Small Character Capital Character Special Character Numbers
b. Install Antivirus and Firewall –Anti-virus software and a firewall protect
B
begins with https://. A website that begins with https:// is a secure website.
10. Difference between Hardware and Software?
EX
ENTREPRENEURIAL SKILLS II
ENTREPRENEUR
An entrepreneur, stemming from the French term "entrepreneur"
meaning to undertake, is an individual who initiates a new business
venture, assuming a majority of the associated risks while also
reaping the majority of the rewards.
A person who establishes one or more businesses, assuming financial
risks with the expectation of achieving profitability.
Alternatively, an entrepreneur can refer to a promoter within the
entertainment industry.
10
Entrepreneurship encompasses the process of conceiving, launching,
and managing a new business endeavor, typically starting as a small-
scale operation. Those who spearhead these ventures are commonly
referred to as entrepreneurs.
&
An entrepreneur epitomizes someone who identifies a challenge
within society and promptly sets out to devise a solution. They are
9
the pioneers who take independent action to foster societal
advancement, whether through job creation or the introduction of
B
innovative products.
U
ENTREPRENEUR SKILLS
PH
There are many skills required to start a business. The most popular
entrepreneur skills are marketing, business development, customer
service, leadership, execution, resilience, focus, determination, talent
EX
10
Innovativeness: Adapting to evolving customer needs and market demands
requires innovative thinking. A successful entrepreneur leverages creative
ideas to meet these requirements. Entrepreneurial ventures are not limited
&
to one type of innovation but can thrive on a combination of innovative
approaches. This could involve introducing new products in novel ways
with unique messaging strategies.
9
Goal-oriented: Effective entrepreneurs maximize their business outcomes
by working towards clear, measurable objectives.
B
alternatives.
PH
10
opportunities, and stimulate various sectors of the economic system.
in industrial development.
Job Creation: Entrepreneurs are pivotal in creating employment
U
10
technology, and shaping consumer preferences. Today, entrepreneurs are
indispensable components of modern production systems, generating
wealth and fostering employment opportunities.
MYTHS OF ENTREPRENEURSHIP
&
9
Entrepreneurship is a set of activities performed by the entrepreneur. It is
the process of identifying opportunities in the market place. It is the
B
ADVANTAGES OF ENTREPRENEURSHIP
The main advantages of adopting entrepreneurship as a career are
discussed below Independence: An entrepreneur is himself a boss or
owner and he can take all the decisions independently.
10
innovative products, services, or technologies, thereby opening up new
markets and avenues for wealth creation.
Flexibility: As an entrepreneur, you have the freedom to tailor your work
hours to accommodate other commitments, including spending quality
time with your family. &
Status: Successful entrepreneurship brings significant recognition and
9
prestige within society, elevating one's standing and reputation.
Ambition Fulfillment: Entrepreneurship enables individuals to realize their
B
DISADVANTAGES OF ENTREPRENEURSHIP
PH
Risk: Entrepreneurship entails significant risk, with the potential for loss of
personal savings if the business fails.
Hard Work: Entrepreneurs must exert considerable effort to ensure the
success of their new ventures, often requiring intense dedication and
perseverance.
Uncertain Income: Entrepreneurs face the reality of fluctuating and
unpredictable income streams, lacking the stability of a regular or fixed
income.
Inexperienced Staff: New entrepreneurs may struggle to hire qualified and
experienced staff, leading to potential incompetence among employees due
to a lack of experience and expertise
PRASHANT KIRAD
10
process. This process is as follows:
&
9
B
U
PH
EX
PRASHANT KIRAD
TOP 10 MCQs
10
2. Ravi’s customer comes to his store and starts shouting at him. He
does not get angry. He listens to what his customer is saying. He is
________.
(a) Hardworking
(b) Confident
(c) Patient
&
9
(d) Trying new ideas
Answer : (c) Patient
B
10
Answer: (a) finding low-cost innovations in farming processes.
10. An enterprise owned and controlled by a woman and giving at least 51 per
EX
TOP 10 QUESTIONS
PRASHANT KIRAD
10
problems that may possibly be faced. Such a blue print of an
enterprise is termed as a business plan or a project report.
3. What is the contribution of the entrepreneurs in the execution of
government policies? &
9
The entrepreneurs provide an important contribution in implementing
government policies and achieving the national goals. They cooperate with
the government for implementations of development plans of the country
B
Entrepreneurs can bring about drastic changes in the very structure of the
PH
economy. They stand beyond challenges and make huge profits in every
economic system. They are an important source of economic development.
They create jobs, wealth and capital in the country. They promote investment,
increase production and bring competitiveness in business, reduce costs of
EX
7. Define an entrepreneur.
10
and reactiveness as they go out of their way to provide all
support to the team.
Decision-making is an important function because it includes
stabilising organisation’s aims and objectives and changes them
according to the changing conditions. &
9
8. Explain the role and significance of an entrepreneur as an
enterprising man and a visionary leader.
B
U
10
10. What are the functions of an entrepreneur? Explain.
&
The functions of an entrepreneur are as follows
(i) New Inventions: Encouraging new inventions and introducing
9
innovations in production, production techniques, sales, marketing,
advertisement etc.
(ii) Establishing Relations with Government: To establish relations
B
are
(a) obtaining licences,
PH
(iii) Size and Scale of Business Unit: To decide about size of business
unit, i.e., he wants to establish one production unit or more etc. which
is dependent upon demand of the product. Similarly, he has to decide
about scale of production, i.e., small scale, middle scale or large scale.
(iv) Organisation and Management: An entrepreneur organises and
manages various economic and human factors through planning,
coordination, control, supervision and direction.
(v) Factors of Production: Another important function of an
entrepreneur is the factors of production i.e. land, labour, capital etc.,
should be in right proportion and to maximise output of these factors
is the responsibility of the entrepreneur.
PRASHANT KIRAD
Advantages of Style:
Provides consistency throughout the document
Saves time and increases efficiency
10
Allows for easy updates and modifications
Makes document management simpler and more organized
&
Enhances accessibility for readers who use assistive technologies.
9
10
Step 2 : Click on the “Fill Format mode” icon in the Style and
Formatting window.
&
Step 3 : Select the element or elements that you want to apply the
9
formatting to.
B
Step 4 : Click on the element that you want to apply the formatting.
U
PH
10
There are two different ways to modify Style in OpenOffice –
Updating a style from a selection •
&
Load or copy styles from another document or template
9
B
Step 3 : In the Styles and Formatting window, select the style you want
to update (single click, not double-click), then long-click on the arrow
next to the New Style from Selection icon and click on Update Style.
10
To drag an image file into a digital document, follow these steps: –
&
Step 1 : Open a File browser window and locate the image you want to
insert.
9
Step 2 : Drag the image into the Writer document and drop it where
B
you want.
U
PH
Step 1: Click in the Open Office document in the first step to place the
image there.
Step 2: From the menu bar, select Insert > Picture > From File.
Step 3: Navigate to the file that needs to be inserted on the Insert
Picture dialogue, select it, and click Open.
10
&
Modifying Image in OpenOffice.org : You might need to edit a new
image you include so that it matches the document. Here, we’ll go
9
through how to use the Picture toolbar, as well as how to resize, crop,
B
Picture Toolbar: The Picture toolbar displays when you insert a picture
or choose one that is already in the page. View > Toolbars > Picture
EX
Filters : The filters are briefly described in the following table, but the
best way to comprehend them is to use them. Try around with the
various filters and their settings.
PRASHANT KIRAD
Transparency:
To adjust transparency, change the percentage value in the
Transparency box on the Picture toolbar, useful for creating
watermarks or background images.
10
Height.
- Thumbnail aids in precise cropping measurements.
&
d. Resizing an Image:
9
- Adjust image size in Writer if it's too big or small to fit on the paper.
B
e. Rotating a Picture:
U
image as needed.
EX
10
- Enter a title in the Title area or edit an automatically entered title.
- Clear the Title field to remove the title.
&
2. Protecting Against Manual Changes:
9
accidental modifications.
U
7. Personalize Documents:
B
TOP 15 MCQs
1. Which of the following is a Mail Merge field?
a. <<Address>>
b. Address
c. {Address}
d. [Address]
Answer: (a)
10
d. Print the merged document.
Answer: (c)
&
3. How is a Table of Contents created in OpenOffice Writer?
9
10
8. Which of the following is not a recommended practice when creating
&
a table of contents in a digital document?
9
document
d. Using a consistent style for all headings in the document
EX
Answer: (b)
10
a. Merge and Split
b. Merge and Protect
&
c. Merge and Format
9
TOP 10 QUESTIONS
1. What do you understand by the terms:
a. Text Wrapping
b. Anchoring
Ans:
a. Text Wrapping – Text wrapping describes the relationship between
graphics and the surrounding text, which may wrap around the
graphic on one or both sides, be overprinted behind or in front of the
graphic, or be overprinted behind or in front of the graphic.
b. Anchoring – The graphics’ reference point is referred to as IT. This
point could represent the object’s location on the page or in the
10
frame. An anchor point is always present in an image.
&
2. Explain different ways of creating a template.
9
use as a template.
2. Fill in the blanks with the content and styles you desire.
EX
3. Select File > Templates > Save from the main menu.
Creating a template using a wizard – Wizards can be used to
construct letters, faxes, agendas, presentations, and Web page
templates. The Fax Wizard, for example, walks you through the
following options:
1. Fax machine type (business or personal)
2. Document components such as the date, topic line (for business
faxes), salutation, and closing
3. Information about the sender and receiver options (business fax)
4. Inclusion of text in the footer (business fax)
PRASHANT KIRAD
document?
PH
7. How can the use of a table of contents benefit the author of a digital
document?
10
Ans: Using a table of contents can be advantageous for the writer of a
digital document in various ways. By presenting a structured and well-
&
organized summary of the document’s content, the writer can ensure
9
mistakes that may arise when the reader has to search for particular
PH
10
10. What are templates? What are the advantages of using templates?
&
Ans: A template is a type of document that you can use to make a
similar type of document. Templates can contain text, graphics, style,
9
and design.
B
10
Time savings through the integration of information from diverse
sources into a single document.
&
Decreases the likelihood of errors associated with manual data
9
efficiency.
Enhances decision-making by providing a holistic view of the data.
EX
10
Advantages of employing Scenarios in OpenOffice electronic
spreadsheets include:
&
Exploration of diverse outcomes or possibilities by adjusting data
9
parameters.
B
decision-making.
PH
crucial.
Comparison and contrast of different data sets, providing insights
into their potential impact.
Time-saving capabilities, allow for the effortless creation and
testing of different scenarios.
PRASHANT KIRAD
10
Goal Seek in an electronic spreadsheet refers to a feature that allows
you to find the input value needed to achieve a specific output value.
&
This can be useful when you know the desired result of a calculation,
9
but you are not sure what input value is needed to achieve that result.
B
For example, you might use Goal Seek to determine what interest rate
U
10
&
9
B
U
Renaming Sheets:
1. Double-click on the current worksheet name.
2. Right-click on an existing worksheet name and select "Rename."
3. Click on the worksheet tab, choose "Sheet" from the Format menu,
and then select "Rename" from the displayed submenu.
Cell Reference:
Referring to specific cells involves a unique identifier called a cell
reference, comprising a column letter and a row number. Two ways to
reference cells in other sheets:
1. Create the reference with the mouse.
2. Create the reference with the keyboard.
10
In Calc, hyperlinks facilitate navigation between cells, files, websites,
or other spreadsheets.
&
a. Relative and Absolute Hyperlinks:
9
the file.
U
resource.
Linking to External Data:
EX
1. Using External Data dialog: Go to "Data" > "External Data," select and
insert data.
2. Using the Navigator: Click on the "Navigator" icon, select a data
source, and drag it into your spreadsheet.
Record Changes: 10
&
Tracking modifications in a spreadsheet, whether made by yourself or
9
users' edits.
Any alterations made to the spreadsheet are documented and
EX
10
beneficial for large spreadsheets.
Comment Filter: Displays changes with comments matching search
&
criteria.
9
accepted.
U
Merging Worksheets:
Merging worksheets in OpenOffice Calc combines two or more
worksheets into a single sheet, useful for consolidating data for
analysis or reporting.
10
its original state. &
1. Go to the "Edit" menu, select Changes," and then choose "Accept or
9
Reject."
B
Comparing Documents:
EX
Advantages of Macros:
Automate repetitive and routine processes.
Save time.
Creating Macros in Spreadsheet:
1. Open the Worksheet.
2. Click on Tools > Macros > Record Macro.
3. Click on Start/Stop recording.
10
&
9
B
U
PH
EX
PRASHANT KIRAD
TOP 15 MCQs
1. _______________series of worksheets or workbooks summarizes it into
a single worksheet
a. Multiple Data
b. Data Consolidation
c. Scenarios
d. Goal Seek Ans: b. Data Consolidation
Answer: (b)
a. Row
PH
b. Column
c. Autosum
EX
d. Cell Reference
Answer: (d)
5. An __________ link will stop working only if the target is moved while
a__________ link will stop working only if the start and target locations
change relative to each other.
a. absolute, fixed
b. Relative, Absolute
c. absolute, relative
d. permanent, absolute
Answer: (c)
7. You can use ________ to combine data from multiple worksheets into
U
a master worksheet.
PH
a. Data Consolidation
b. Goal Seek
EX
c. Solver
d. Total data
Answer: (a)
10. Which feature of Calc helps to see the changes made in the shared
worksheet?
a. Comparing worksheets
b. Duplicating worksheets
c. Checking worksheets
d. None of the above
Answer: (a)
10
&
11. . How can Calc find the changes made to a shared worksheet?
a. Data Consolidation
9
b. Goal Seek
B
c. Solver
U
d. Total data
PH
Answer: (a)
EX
13. What elements are present in the “Insert Sheet” dialog box?
a. After Current Sheet
b. No. of Sheets
c. Before Current Sheet
d. All of the above
PRASHANT KIRAD
TOP 10 QUESTIONS 10
&
9
Q3. Define and Explain the usage of the following terms about
OpenOffice Calc.
(a) Consolidating data
(b) Subtotals
(c) Goal seek
(d) Scenario
(e) Solver
(b) Subtotals:
10
Subtotals in OpenOffice Calc refer to totaling or adding data arranged in an
array. This involves selecting arrays and choosing a statistical function (sum,
&
average, max, min) through the Subtotals dialog. Efficiency is maintained by
9
Goal Seek in OpenOffice Calc, found under the Tools menu, helps discover
PH
what values will produce a desired result. It involves figuring out input
values based on known output values, using a specific operator in a formula.
EX
(d) Scenario:
Scenarios in OpenOffice Calc are tools to test "what-if" questions. Named
and separately editable, scenarios save sets of cell values for calculations.
Users can switch between scenarios using the Navigator or a drop-down list,
efficiently exploring different possibilities and viewing updated results.
(e) Solver:
Solver, available under the Tools menu, is a more advanced version of Goal
Seek. It handles equations with multiple unknown variables and is designed
to minimize or maximize results based on user-defined rules. Constraints
can be set, specifying relationships between variables and adjusting them to
achieve desired outcomes.
PRASHANT KIRAD
10
3. Format Menu: Select the worksheet you wish to rename by clicking on
its tab. Then, choose the "Sheet" option from the Format menu, followed
&
by selecting "Rename" from the displayed submenu.
9
Answer: Calc has the feature to track what data was changed when the
U
change was made, who made the change, and in which cell the change
PH
quickly know which cells were edited. A deleted column or row is marked
by a heavy-colored bar. Example: If you are the sponsor of a youth
baseball team. The coach has submitted a budget to you for the season
and you need to edit the costs and return them to her. You are
concerned that if you just make the changes, then the coach won’t see
the changes you made. You decide to use Calc with the record changes
feature turned on so that the coach can easily see the changes you have
made.
PRASHANT KIRAD
10
and then select the Sheet option from the Format menu. This displays a
submenu from which you should select the Rename option.
&
Q9. How can we record a Macro?
9
a. Use Tools > Macros > Record Macro to start the macro recorder. The
U
d. The Macro dialog appears, in which you can save and run the macro.
10
images, or sound. The data are stored in such a way that they are
independent of the programs used by the people for accessing the
&
data. Database can be created with the help of the following structures
9
Following are some of the skills you must master to succeed in life:
B
2. Relational:
- Data is stored in multiple tables.
- Tables are linked using a common field.
- Suited for managing medium to large amounts of data.
DATABASE SERVERS:
Database servers are dedicated computers that hold the actual
databases and run only the DBMS and related software.
ADVANTAGES OF A DATABASE/DBMS:
The centralized nature of the database system provides several
advantages, which overcome the limitations of the conventional file
processing system. These advantages are as follows
10
processing required to face the data item from a large database. This
also ensures data consistency and saves the storage space.
&
2. Enforcing Data Integrity: It means that, the data contained in the
9
3. Data Sharing: The data stored in the database can be shared among
multiple users or application programs.
EX
Disadvantages of a Database/DBMS:
While databases offer numerous advantages, they also come with some
minor drawbacks:
1. Cost of Hardware and Software:
- Database systems incur additional costs for hardware and software.
2. Complexity:
- The use of a database system introduces additional complexity and
requirements.
3. Database Failures:
- Database corruption due to power failures or storage media issues
can result in data loss or system failures.
4. Lower Efficiency:
- A database system, being multi-user, may be less efficient.
4. Every database table should have one or more key fields for assigning
unique values to differentiate records.
Components of a Database::
A database comprises several components, each playing a crucial role:
Data:
- Raw numbers, characters, or facts represented by values, acting as a
bridge between hardware and software.
Software:
- Programs that control and manage the computerized database,
utilizing software such as MySQL or Oracle.
Hardware:
- The physical aspects of computers, telecommunication, and
databases, including secondary storage devices like magnetic discs.
PRASHANT KIRAD
10
&
9
B
U
PH
EX
Data Integrity:
Data Integrity guarantees the accuracy, reliability, and consistency of
data during any operation. Different types of data integrity include:
Entity Integrity:
- Defines the primary key of a table.
- Prohibits duplicate and null values in the primary key column.
Domain Integrity:
- Defines the type, range, and format of data allowed in a column.
- Requires all values in a column to be of the same type.
Referential Integrity:
- Defines foreign key concepts.
- Ensures that data in related tables remains accurate and consistent
before and after changes.
User-Defined Integrity:
10
- Allows users to create custom integrity rules to meet specific
&
business requirements.
- Offers flexibility for unique data integrity constraints not covered by
9
Key Fields:
PH
3. Alternate Key:
Remaining candidate keys after selecting one as the primary
key.
Example: If StudentId is the primary key, the combination of
FirstName and LastName becomes an alternate key.
4. Foreign Key:
A field referencing the primary key of another table.
Establishes relationships between tables and aids in
reconstructing broken-apart tables.
Example: CourseId in a student table, referencing the primary
key in a course table.
Database Objects:
1. Table:
10
- A table is a collection of data elements organized using vertical columns and
horizontal rows.
&
- It has a defined number of columns and can have any number of rows.
9
- Columns are sets of data values of a particular simple type, one for each row
PH
in the table.
- They provide the structure for composing rows, such as cFirstName or
EX
cLastName.
3. Rows or Records or Tuples:
- A row, also called a record or tuple, represents a single data item in a table.
- Each row in a table represents a set of related data, and all rows in the table
share the same structure.
CREATE TABLES:
Tables are the basic building blocks of a database. You store the data in
the database in the form of tables. There are different ways to create a
table:
a) Use Wizard To Create Table:
The following are the steps to create a table:
1) Click on Tables > Use Wizard to Create Table
2) Click the Select Fields > Choose Category > Select the table > Click on
Next Button.
3) Select the fields as per the requirements. Click on the Next button
4) Set the data types and properties of the selected fields. Click on the
Next Button
5) Set the Primary Key and Click on the Next Button
6) The window to rename the table will open. A user can either go ahead
with the same table name or change it.
10
7) Click on Finish to insert the data in the table.
&
9
5) An alert appears if there is no primary key in the table. 6) Click yes set
the primary key and finally save the table.
Alphanumeric Types: This data type is used to store information which has
alphabets as well as numbers for example address, book summary field, etc.
The different types of Alphanumeric Types available are listed here.
10
&
9
B
U
PH
EX
Binary Types: Binary data types are used for storing data in binary formats.
Binary data types in a database can be using for storing photos, music files, etc.
Date Time: Date time data types in a database can be used for storing
information such as date of birth, date of admission, date of product sale,
PRASHANT KIRAD
10
To edit the data in the table, follow the steps:
1) Select the table > Double-click on it.
&
2) The table will open in Datasheet View.
3) Edit the required record in Datasheet View.
9
3) Select the data > right click on selected data > select the Delete option FIELD
PROPERTIES: To set the field properties: Select the table > Right click > Select the
EX
option Edit > the table will open in Design View. In the design view, there are different
properties of fields according to the data type set for each field.
Sorting Data:
Sorting arranges data in either ascending or descending order.
PRASHANT KIRAD
10
Data Manipulation Language (DML) is a set of commands used to interact
with and manipulate data within a database. It is predominantly utilized in
&
SQL databases, aiming to facilitate efficient human interaction with the
9
1. Procedural DMLs: Users specify both the required data and the steps to
obtain it.
EX
SELECT Statement:
The SELECT statement is a fundamental DML command used to retrieve
rows from one or more tables. It is the most commonly used DML
command. The basic syntax to retrieve all columns from a table is:
`SELECT * FROM <Table Name>;`
PRASHANT KIRAD
10
```
These SQL commands showcase how to perform calculations on the "Salary"
&
column for each employee in the "Employee" table in LibreOffice Base.
9
```SQL
U
```
Creating Forms Using Wizard:
EX
TOP 15 MCQs
1. What does SQL stand for?
a. Structured Query Language
b. Structured Quality Language
c. Structural Query Language
d. None of the above
Answer: (b)
a. Date
B
b. Character
U
c. Numeric
PH
d. Binary
Answer: (c)
EX
4. Which SQL query will retrieve the details of all students whose
favorite color is blue?
a. SELECT all FROM Stud WHERE fav_Color = ‘Blue’;
b. SELECT all FROM Stud WHERE fav_Color is ‘Blue’;
c. SELECT name FROM Stud WHERE fav_Color = ‘Blue’;
d. SELECT * FROM Stud WHERE fav_Color = ‘Blue’;
Answer: (d)
5. Which operators are used to perform simple calculations in Base?
a. Arithmetic Operators
b. Membership Operators
c. Logical Operators
d. Relational Operators
Answer: (a)
PRASHANT KIRAD
Answer: (a)
U
PH
b. Text[Memo]
c. Memo
d. Text[Varchar]
Answer: (d)
10. Which data type is used for storing photos, music files, and other
binary data?
a. Numeric
b. Varchar
c. Binary
d. Alphanumeric
Answer: (c)
PRASHANT KIRAD
11. What is the purpose of the SQL query: “SELECT empname, salary *
3 FROM emp;”?
a. Display only name and salary
b. It will give an error.
c. Display empname and three times the salary of all employees.
d. None of the above
Answer: (c)
12. Which of the following is NOT a function of a database management
system?
a. Data retrieval
b. Data manipulation
c. Data storage
d. Data transmission
Answer: (d)
10
13. Which field property in Base can be used to store data in a specific
format, such as a phone number?
&
a. Auto Value
9
b. Length
B
c. Default Value
U
d. Format
PH
Answer: (d)
EX
14. Which commands are used to add, modify, and delete records in a
database table?
a. Insert, Update, and Remove
b. Insert, Update, and Delete
c. Insert, Modify, and Delete
d. Add, Update, and Delete
Answer: (b)
15. Which data type stores hours, minutes, and second information?
a. Date
b. Time
c. Stamptime
d. Timer
Answer: (b)
PRASHANT KIRAD
TOP 10 QUESTIONS
1. What is a database? Give an example. What does DBMS stand for?
Ans. A collection of related information organized as tables is known
as a database e.g. INGRES, MySQL, etc. DBMS stands for DataBase
Management System. It is a computer-based record-keeping system.
2. Why Memo data type is preferred over the Text data type for a field?
Ans. When the length of the field is more than 255 characters. The text data
type is not capable of storing the project description because its length
cannot be more than 255 characters so the memo data type is preferred
over the Text data type
10
data type of student database. &
Ans:
9
B
U
PH
Ans. CREATE TABLE STUDENT (ID Integer, Name varchar (15), Stream_Id
Integer);
Ans. The SQL command to create a table as per the given structure is as
follows Mysql> CREATE TABLE BANK (ID Number integer (10) PRIMARY
KEY, Name varchar (20), B date Date, Address varchar (50));
10
Ans. Data Control Language is used to create roles, permissions, and
referential integrity as well it is used to control access to the database
&
by securing it. These SQL commands are used for providing security to
9
10
&
9
B
U
PH
EX
PRASHANT KIRAD
Computer Accessibility
The term "user friendliness" of a computer system applies to its accessibility
for individuals with disabilities, enabling them to use it despite their
impairments. This capability is referred to as Assistive Technology. Various
types of impairments can affect computer usage, such as cognitive
impairments, learning disabilities, Attention Deficit Hyperactivity Disorder
(ADHD) or autism, visual impairment, hearing impairment, and motor
impairment.
Cognitive impairments and learning disabilities
10
Attention Deficit Hyperactivity Disorder (ADHD) or autism.
Visual impairment.
Hearing impairment
Motor impairment
&
9
Launching Accessibility Options:
To launch accessibility options in WindowsXP, Click Start > Control Panel
B
displayed
Sticky Keys: The Sticky Keys feature is designed as an accessibility aid for
computer users with physical disabilities. However, it is also utilized by
EX
To activate StickyKeys:
Check the box labeled "Use StickyKeys."
Click on "Apply."
Click on "OK."
Upon activation, the Sticky Keys icon will appear in the system tray.
PRASHANT KIRAD
10
ToggleKeys: ToggleKeys is an accessibility feature intended for
individuals with visual impairments or cognitive disabilities. When
ToggleKeys is enabled, the computer emits auditory cues upon pressing
&
the locking keys (Caps Lock, Num Lock, or Scroll Lock). A high-pitched
sound indicates the keys are activated, while a low-pitched sound
9
indicates deactivation.
To enable ToggleKeys:
B
Click on "Apply."
Click on "OK."
PH
10
To activate High Contrast:
Check the box labeled "Use HighContrast" under the Display Tab.
Click on "Apply."
Click on "OK." &
Cursor Options: Cursor Options is another accessibility feature
9
intended to assist individuals with vision impairment by modifying the
blink rate and width of the cursor.
B
Move the Blink Rate slider to change the speed of the cursor blink,
observing the cursor blinking at different speeds.
PH
Move the Width slider to change the width of the cursor, observing the
cursor's width change accordingly.
EX
General Tab enables you to configure accessibility options for all users.
NETWORKING FUNDAMENTALS
A network can be defined as an interconnected collection of
autonomous computers. A ‘computer network’ or simply a ‘network’
is a collection of computers and other hardware devices,
10
interconnected by communication channels (satellites or cables)
that allow sharing of resources and information. A computer
networking is the practice for exchanging informations/services
between two or more computer devices together for the purpose of
&
sharing data. The speed of a network is measured in Mbps (Megabits
per second).
9
Networks are designed using the following architecture:
B
referred to as clients.
BENEFITS OF NETWORKING
In the modern environment, computer networks offer numerous
benefits, some of which are outlined below:
TYPES OF NETWORK
A network refers to a group of interconnected computers which are
capable of sharing information and communication devices.
On the basis of coverage or geographical spread, a network can be
divided into following types:
10
LAN (Local Area Network):
A LAN refers to a network comprised of a group of computers and
associated devices within a limited geographical area. Users or
&
computers in a LAN can share data, information, software, and common
hardware devices like printers, modems, and hard disks. Typically, LANs
9
primarily utilize wired connections for enhanced speed and security,
although wireless connections may also be integrated. LANs are
B
10
Web Browser:
A web browser is software used to access and view websites,
serving as an interface between the user and the World Wide Web.
Web Server:
&
A web server is a computer that stores websites and their
associated files for viewing on the Internet.
9
Internet Service Provider (ISP):
An ISP is an organization that provides individuals and businesses
B
Dial-up connections are known for their slow speeds and have
largely been replaced by high-speed alternatives like DSL or Cable
Modem connections.
10
Cable Internet Access is a form of broadband internet that utilizes
the cable television infrastructure. Similar to DSL, it is delivered
over existing cable TV networks.
&
3G (3rd Generation) refers to a set of standards used in mobile
9
devices and telecommunication networks, providing higher data
transfer speeds and capacity. HSDPA (High-Speed Downlink Packet
B
INSTANT MESSAGING
Instant messaging (IM) is a form of communication over the Internet
that offers an instantaneous transmission of text-based messages from
sender to receiver.
Types of Instant Messaging Software:
There are two kinds of instant messaging software – application based
and Web based.
10
Rediff Bol, etc.
B) Web-based instant messaging software is accessed through web
browsers like Internet Explorer, Mozilla Firefox, Google Chrome, etc.
Popular web-based options include Meebo, Yahoo! Messenger for the
&
Web, MSN Web Messenger, IMO, etc.
Key Features of Instant Messaging:
9
Sending text messages to one or more recipients (similar to SMS)
Audio calling and conferencing
B
Steps to Chat with a contact that is already added to your contact list.
a) Whenever your friend in the contact list is online you can see the
person along with a green dot.
b) You can start sending text chat message instantly by double-clicking
on a contact the other person will see the text message and respond to
your message.
PRASHANT KIRAD
10
personal diary and simple to use.
Some of the popular websites that offer blog service for free are:
www.wordpress.com
www.blogger.com
www.blog.com
&
9
www.weebly.com
www.blogsome.com
B
WordPress: WordPress is free web service that you can use to create a
beautiful website or blog. WordPress has support for “themes” which
U
5) Once you have finished typing the content, Click Publish Post to
publish your content. This process is called posting content.
10
BlogJet
MarsEdit
Online transactions: Online transactions deals with transfer of
&
money over the internet. There are many benefits of online
transactions like, fast transaction speed, convenience, low risk of
9
theft etc.
Some of the popular online transaction websites are:
B
Flipkart offers multiple payment methods like credit card, debit card,
net banking, e-gift voucher, and Cash on Delivery.
3) EBay, an online portal for buying and selling goods.
4) Redbus, an online portal for booking bus tickets.
EX
10
11) Clear Data Stored In Browsers : It is not advisable to leave the web
browser store data(username, password, credit card detail) particularly on
public or shared computers.
&
Here are general recommendations for managing strong passwords:
9
Ensure the password length is at least 12-14 characters if permitted.
Avoid using repetitive patterns, dictionary words, sequential letters
B
Please note:
Websites like www.strongpasswordgenerator.com can assist in
generating strong passwords.
Examples of online threats include phishing, email spoofing, and
chat spoofing.
Creating a password with a combination of alphanumeric characters
and special symbols enhances security and makes it harder to
crack.
Keyloggers are programs that clandestinely track and transmit
every keystroke entered on a keyboard to unauthorized users.
PRASHANT KIRAD
10
settings to prevent or minimize potential hazards.
Keep floors clean and dry, promptly cleaning up oil spills and dust.
10
Occupational Hazard:
An occupational hazard refers to illnesses that may arise as a result of
one's occupation. Various types of occupational hazards include
&
physical, chemical, biological, behavioral, radiological, and ergonomic
hazards.
9
Accident:
B
TYPES OF EMERGENCIES:
10
Chemical spills
Extreme heat waves
Droughts
Pandemics
Terrorist attacks
&
9
Fires
Floods
B
Thunderstorms
Leakage of hazardous gases or chemicals
U
Explosions
Floods
Earthquakes
EX
Hurricanes
Tornadoes
Releases of toxic materials
Civil disturbances
Workplace violence
Healthy Living:
A healthy living has a lasting impact on an individual which ultimately
10
yields a healthy environment at home as well as at work place. A
healthy lifestyle helps to keep and improve people’s health and well
being.
A healthy lifestyle includes :
healthy eating habits
&
9
physical activities
stress management
B
healthy mind
sound sleep
U
goal setting
PH
EX
PRASHANT KIRAD
TOP 15 MCQs
1. What are the different type of impairments that impact computer usage?
a. Dyslexia
b. Visual Impairment
c. Hearing Impairment
d. All of the above
Ans: d. All of the above
10
a. Setting
b. Control Panel
c. Desktop
d. None of the above
Ans: b. Control Panel
&
9
3. _________ enables the user to hold and release a modifier key, like as Shift,
Ctrl, Alt, or the Windows key, and have it remain active until another key is
B
pressed.
U
a. Filter keys
b. Toggle Keys
PH
c. Sticky Keys
d. None of the above
Ans: c. Sticky Keys
EX
7. Networks in which all computers have an equal status are called __________.
10
a. Peer – to – Peer Network
b. Client – Server Network
c. Both a) and b)
d. None of the above
Ans: a. Peer – to – Peer Network
&
9
8. Networks in which certain computers have special dedicated tasks,
providing services to other computers are called__________.
B
c. Both a) and b)
d. None of the above
PH
11. Á __________ is a device that converts digital computer signals into analog
signals that can travel over phone lines.
a. Router
b. Modem
c. Bridge
d. None of the above
Ans: b. Modem
10
b. Digital Subscriber Link (DSL)
c. 3G
d. WiMax
Ans: b. Digital Subscriber Link (DSL)
&
13. Three types of Wired Internet Connectivity are ___________ , _________ &
9
___________.
a. 3G, DSL, Dial-Up
B
15. _________ are programs that are created on your local computer when you
visit websites.
a. Firewall
b. Cookies
c. History
d. All of the above
Ans: b. Cookies
PRASHANT KIRAD
TOP 10 QUESTIONS
Wi-Fi stands for wireless fidelity. Wi-Fi is a popular technology that allows
an electronic device such as computers or mobile phones to exchange data
wirelessly over a network. Wi-Fi is used where cables cannot be run (such as
old buildings, outdoor areas) to provide network and Internet access
10
&
9
3. Explain P2P Architecture and how it is different from Client Server
Architecture?
B
Networks in which all computers have an equal status are called peer to peer
U
dedicated tasks, providing services to other computers (in the network) are
called client server networks. The computer(s) which provide services are
called servers and the ones that use these services are called clients.
EX
10
your computer for any changes by malware software. Keep your Antivirus
and Antispyware software always up to date, this can help in protecting
your computer from any threats.
Chemical
Biological
U
Mechanical
PH
10. Give any four points of a healthy lifestyle. Healthy lifestyle includes :
(Write any four)