Domestic CRM Voice English Class 12
Domestic CRM Voice English Class 12
Domestic CRM Voice English Class 12
Preface
Vocational Education is a dynamic and evolving field, and ensuring that every
student has access to quality learning materials is of paramount importance. The
journey of the PSS Central Institute of Vocational Education (PSSCIVE) toward
producing comprehensive and inclusive study material is rigorous and time-
consuming, requiring thorough research, expert consultation, and publication by
the National Council of Educational Research and Training (NCERT). However, the
absence of finalized study material should not impede the educational progress of
our students. In response to this necessity, we present the draft study material, a
provisional yet comprehensive guide, designed to bridge the gap between teaching
and learning, until the official version of the study material is made available by
the NCERT. The draft study material provides a structured and accessible set of
materials for teachers and students to utilize in the interim period. The content is
aligned with the prescribed curriculum to ensure that students remain on track
with their learning objectives.
The contents of the modules are curated to provide continuity in education and
maintain the momentum of teaching-learning in vocational education. It
encompasses essential concepts and skills aligned with the curriculum and
educational standards. We extend our gratitude to the academicians, vocational
educators, subject matter experts, industry experts, academic consultants, and all
other people who contributed their expertise and insights to the creation of the
draft study material.
Teachers are encouraged to use the draft modules of the study material as a guide
and supplement their teaching with additional resources and activities that cater
to their students' unique learning styles and needs. Collaboration and feedback are
vital; therefore, we welcome suggestions for improvement, especially by the
teachers, in improving upon the content of the study material.
This material is copyrighted and should not be printed without the permission of
the NCERT-PSSCIVE.
Deepak Paliwal
(Joint Director)
PSSCIVE, Bhopal
Date: 10 September, 2024
Members
Deepak D. Shudhalwar, Professor (CSE), Head, Department of Engineering and
Technology, PSSCIVE, NCERT, Bhopal, Madhya Pradesh
Jaynat Mishra, Assistant Professor in IT-ITeS (Contractual), Department of Engineering
and Technology, PSSCIVE, NCERT, Bhopal
Ganesh Kumar Dixit, Assistant Professor in IT-ITeS (Contractual), Department of
Engineering and Technology, PSSCIVE, NCERT, Bhopal
Monika Sharma, Assistant Professor in IT-ITeS (Contractual), Department of Engineering
and Technology, PSSCIVE, NCERT, Bhopal
Prakash Khanale, Head, Department of Computer Science, DSM College, Parbhani,
Maharashtra
Member Coordinator
Deepak D. Shudhalwar, Professor (CSE), Head, Department of Engineering and
Technology, PSSCIVE, NCERT, Bhopal, Madhya Pradesh
Table of Contents
Module Overview
In this Module, you will understand the various data models and various concepts
associated with RDBMS. There are various database management software available in
the market. Popular examples of RDBMSs include MySQL, Oracle, and SQL Server. The
RDBMS concepts using MySQL is covered in this unit.
SQL stands for Structured Query Language, is a special-purpose programming language
designed to manage data in a relational database management system (RDBMS) or
stream processing in a relational data stream management system (RDSMS). SQL is
used to search, store, modify records in database management system. SQL queries are
used to retrieve the data needed for specific job functions. It is a standardized way to
request information from relational databases. In this unit, you will be able to create
database objects, insert data in database and use various types of commands to retrieve
the required data from the database.
SQL function is used to perform particular tasks and it returns zero or more values as
a result. Functions are useful while writing SQL queries. Functions can be applied to
work on single or multiple records (rows) of a table. There are various readily available
functions in SQL that can be used in queries. It includes single row functions, multiple
row functions, group records based on some criteria. The use of these functions is
illustrated in this Module.
Learning Outcomes
After completing this module, you will be able to:
Module Structure
Session 1: RDBMS Concepts
Session 2: Structured Query Language (SQL)
Session 3: Functions In SQL
can easily give the certificate to the student. This is how the schools are maintaining the student
data in the register.
The office staff also manually maintain student details who are presently learning. Their
Admission number, Name, Date of Birth, Address, Contact Number are stored in the school
register.
There are two major types of databases – relational and non-relational. Relational databases are
the most commonly used databases today. The following are several types of databases in use.
Flat file databases – Stores data in permanent files that mostly are in text form;
Hierarchical databases – Arranges data in a tree-like structure;
Network databases – Arranges data in network-like structure;
Relational databases – Contains a set of tables in which data are related;
Object databases – Represents information in the form of objects as used in object-oriented
programming;
1.2 FILE SYSTEM
Now you must have noticed that maintaining such type of records manually does not allow to
correct, modify or delete the data in the register. Also searching the details of the student is
difficult. To overcome the hassles faced in manual record keeping, this data can be stored in
computer. The student details are stored in computer in the form of separate file.
In computer, any contents are stored in the form of file, which is opened and viewed in the
respective software. In computer, file is a container to store data or information. These files are
stored on the storage device of computer, such as hard disk drive or pen drive.
The student data can be stored in the document file or spreadsheet file. These files stored on
computer can be accessed quickly. To process or manipulate this data, it is required to write the
program in computer programming languages. The various operations can be performed through
computer programming. It includes searching, sorting, computing the percentage of marks,
number of days attendance, retrieving the data.
1.2.1 Limitations of a File System
There are certain limitations to maintain and manipulate such type of data when there are
several hundreds or thousands of students. It also becomes difficult to maintain the number of
files as it increases the volume when data grows. There are certain limitations of file system to
maintain such type of data. The limitations of file system are,
Difficulty in Access – Files themselves do not provide any mechanism to retrieve data. Data
maintained in a file system are accessed through application programs. While writing such
programs, the developer may not anticipate all the possible ways in which data may be accessed.
So, sometimes it is difficult to access data in the required format and one has to write application
program to access data.
Data Redundancy – Redundancy means same data are duplicated in different files. For
example, if we are maintaining students data for the various purpose then data such as student
names are maintained in different files. The common data in all such files are required to be
maintained number of times. This may cause the data redundancy which is difficult to avoid in
a file system. Redundancy leads to excess storage use and may cause data inconsistency also.
Data Inconsistency – Data inconsistency occurs when same data maintained in different places
do not match. If a student wants to get changed the spelling in name, it needs to be changed in
the number of files where it appears. Likewise, if a student leaves school, the details need to be
deleted from these files. As the files are being maintained by different people, the changes may
not happen in one of the files. In that case, the student name will be different (inconsistent) in
both the files.
Data Isolation – Although these files are maintained for the students of the same class, but
there is no link or mapping between these files. The school will have to write separate programs
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 4
to access these files. This is because data mapping is not supported in file system. In a more
complex system where data files are generated by different person at different times, files being
created in isolation may be of different formats. In such case, it is difficult to write new
application programs to retrieve data from different files.
Data Dependence – Data are stored in a specific format or structure in a file. If the structure or
format itself is changed, all the existing application programs accessing that file also need to be
changed. Otherwise, the programs may not work correctly. This is data dependency. Hence,
updating the structure of a data file requires modification in all the application programs
accessing that file.
Controlled Data Sharing – There can be different category of users like teacher, office staff and
parents. Ideally, not every user should be able to access all the data. It means different types of
users should be given different types of access, such as read only. It is very difficult to enforce
this kind of access control in a file system while accessing files through application programs.
1.3 DATABASE MANAGEMENT SYSTEM
Limitations faced in file system can be overcome by storing the data in a database where data
are logically related. A database management systems (DBMSs) is used as an interface to manage
databases.
A database is an organized collection of data, generally stored and accessed electronically from a
computer system. It supports the storage and manipulation of data. In other words, databases
are used by an organization as a method of storing, managing and retrieving information. It is
possible to store and organise related data in a database so that it can be managed in an efficient
and easy way.
A DBMS is a collection of software components designed to create and maintain databases and
control all access to them. DBMS allows to create a database, store, manage, update/modify and
retrieve data from that database by users or application programs. DBMS is used to provide an
effective method of performing database operations, troubleshooting database issues, and
restricting data access. Relational Database Management System (RDBMS), which is still popular
today, is an advanced version of a DBMS system. Dr. E. F. Codd defined the criterias to determine
whether a DBMS is a relational database management system or not. These criteria are knowing
as twelve rules Codd’s (E. F. Codd, 1985).
Some examples of open source and commercial DBMS include MySQL, Oracle, PostgreSQL, SQL
Server, Microsoft Access, MongoDB as presented in Table 1.1.
Table 1.1 Popular DBMS
DBMS Primary Database Model License
Oracle RDBMS Commercial (restricted free
version is available)
MySQL RDBMS Open Source
Microsoft SQL Server RDBMS Commercial (restricted free
version is available)
PostgreSQL RDBMS Open Source
MangoDB Document store Open Source
4. It is used in the Banking system for Customer information, account activities, Payments,
deposits, loans etc.
5. Insurance management system
6. DBMS system also used by universities to keep all records
7. Finance for storing information about stock, sales, and purchases of financial
instruments like stocks and bonds.
1.3.2 Advantages of DBMS system
The advantages of DBMS system are:
1. DBMS offers a variety of techniques to store & retrieve data.
2. Uniform administration procedures for data storage and retrieval.
3. Application programmers never exposed to details of data representation and Storage.
4. A DBMS uses various powerful functions to store and retrieve data efficiently.
5. Offers Data independence, Data Integrity and Data Security and reduce data
redundancy.
6. The DBMS implies integrity constraints to get a high level of protection against prohibited
access to data.
7. Reduced Application Development Time and occupy lesser space
1.3.4 Disadvantages of the DBMS system
The disadvantages of DBMS system are:
1. Cost of Hardware and Software of a DBMS is quite high, which increases the budget of
your organization.
2. Most database management systems are often complex systems, so the training for users
to use the DBMS is required.
3. The use of the same program at a time by many users sometimes lead to the loss of some
data.
4. DBMS can't perform sophisticated calculations
5. Data-sets begins to grow large as it provides a more predictable query response time.
6. It required a processor with the high speed of data processing.
7. The database can fail because or power failure or the whole system stops.
8. The cost of DBMS is depended on the environment, function, or recurrent annual
maintenance cost.
1.3.5 Comparison of Database Management System (DBMS) with File System
The comparative points of DBMS) with File System are given in Table 1.3.
Table 1.3: Comparison of DBMS with File System
File System DBMS
A file system is a software that manages and DBMS or Database Management System is a
organizes the files in a storage medium. It software application. It is used for accessing,
controls how data is stored and retrieved. creating, and managing databases.
The file system provides the details of data DBMS gives an abstract view of data that hides
representation and storage of data. the details
Storing and retrieving of data can't be done DBMS is efficient to use as there are a wide
efficiently in a file system. variety of methods to store and retrieve data.
It does not offer data recovery processes. There is a backup recovery for data in DBMS.
The file system doesn't have a crash recovery DBMS provides a crash recovery mechanism
mechanism.
Protecting a file system is very difficult. DBMS offers good protection mechanism.
In a file management system, the redundancy The redundancy of data is low in the DBMS
of data is greater. system.
Data inconsistency is higher in the file system. Data inconsistency is low in a database
management system.
The file system offers lesser security. Database Management System offers high
security.
File System allows you to stores the data as Database Management System stores data as
isolated data files and entities. well as defined constraints and interrelation.
Not provide support for complicated Easy to implement complicated transactions.
transactions.
The centralization process is hard in File Centralization is easy to achieve in the DBMS
Management System. system.
It doesn't offer backup and recovery of data if it DBMS system provides backup and recovery of
is lost. data even if it is lost.
There is no efficient query processing in the file You can easily query data in a database using
system. the SQL language.
This system doesn't offer concurrency. DBMS system provides a concurrency facility.
1.4 Key Concepts in DBMS
It is important to understand the following concepts to efficiently manage data using a DBMS.
1.4.1 Database schema
A database schema is a set of schema for a database's relations. It consists of table with all
attributes with their data types and constraints if any. It also represents the relationships among
the tables. It is also used to visualize the logical architecture of database and how the data are
organized in a database. It is shown in Figure 1.3. The schema of a relation may not change,
but the relation, which is a variable, changes over time.
attributes are not there in appropriate relations, it will not be possible to keep the database in
correct state and retrieve valid information from the database.
Table 1.4 Relation schema along with its description of Student Attendance database
Relation Schema Description of attributes
StudentRecord Stu_RollNo : unique id of the student
(Stu_RollNo, Stu_FName : First name of the student
Stu_FName, Stu_LName : Last name of the student
Stu_LName, Stu_DOB, Stu_DOB : Student’s date of birth
Stu_Address, Stu_Address : Home address of the student
Par_ID ) Par_ID : unique id of the parent of the student
Fig 1.5 Relation ParentRecord with its attributes (Columns) and tuples (Rows)
Attribute – Characteristic or parameters for which data are to be stored in a relation. Simply
stated, the columns of a relation are the attributes which are also referred as fields. For example,
Par_ID, Par_Name, Par_Phone and Par_Address are attributes of relation ParentRecord.
Tuple – Each row of data in a relation (table) is called a tuple. In a table with n columns, a tuple
is a relationship between the n related values.
Domain – It is a set of values from which an attribute can take a value in each row. Usually, a
data type is used to specify domain for an attribute. For example, in StudentRecord relation,
the attribute Stu_RollNo takes integer values and hence its domain is a set of integer values.
Similarly, the set of character strings constitutes the domain of the attribute Stu_Fname.
Degree – The number of attributes in a relation is called the Degree of the relation. For example,
relation ParentRecord with four attributes is a relation of degree 5.
Cardinality – The number of tuples in a relation is called the Cardinality of the relation. For
example, the cardinality of relation ParentRecord is 10 as there are 10 tuples in the table.
1.5.2 Three Important Properties of a Relation
In relational data model, following three properties are observed with respect to a relation which
makes a relation different from a data file or a simple table.
Property 1: imposes following rules on an attribute of the relation.
• Each attribute in a relation has a unique name.
• Sequence of attributes in a relation is immaterial.
Property 2: governs following rules on a tuple of a relation.
• Each tuple in a relation is distinct. For example, data values in no two tuples of relation
AttendanceRecord can be identical for all the attributes. Thus, each tuple of a relation
must be uniquely identified by its contents.
• Sequence of tuples in a relation is immaterial. The tuples are not considered to be ordered,
even though they appear to be in tabular form.
Property 3: imposes following rules on the state of a relation.
• All data values in an attribute must be from the same domain (same data type).
• Each data value associated with an attribute must be atomic (cannot be further divisible
into meaningful subparts). For example, Par_Phone of relation ParentRecord has ten digits
numbers which is indivisible.
• No attribute can have many data values in one tuple. For example, any Parent cannot specify
multiple contact numbers under Par_Phone attribute.
• A special value “NULL” is used to represent values that are unknown or non-applicable to
certain attributes. For example, if a parent does not share his or her contact number with
the school authorities, then Par_Phone is set to NULL (data unknown).
1.6 KEYS IN A RELATIONAL DATABASE
The tuples within a relation must be distinct. It means no two tuples in a table should have same
value for all attributes. That is, there should be at least one attribute in which data are distinct
(unique) and not NULL. That way, we can uniquely distinguish each tuple of a relation. So,
relational data model imposes some restrictions or constraints on the values of the attributes
and how the contents of one relation be referred through another relation. These restrictions are
specified at the time of defining the database through different types of keys as given below:
1.6.1 Candidate Key
A relation can have one or more attributes that takes distinct values. Any of these attributes can
be used to uniquely identify the tuples in the relation. Such attributes are called candidate keys
as each of them are candidates for the primary key.
As shown in Figure 1.5, the relation ParentRecord has five attributes out of which Par_ID and
Par_Phone always take unique values. No two parents will have same phone number or same
Par_ID. Hence, these two attributes are the candidate keys as they both are candidates for
primary key.
1.6.2 Primary Key
Out of one or more candidate keys, the attribute chosen by the database designer to uniquely
identify the tuples in a relation is called the primary key of that relation. The remaining attributes
in the list of candidate keys are called the alternate keys.
In the relation ParentRecord, suppose Par_ID is chosen as primary key, then Par_Phone will be
called the alternate key.
1.6.3 Composite Primary Key
If no single attribute in a relation is able to uniquely distinguish the tuples, then more than one
attributes are taken together as primary key. Such primary key consisting of more than one
attribute is called Composite Primary key. In relation AttendanceRecord, Roll Number cannot
be used as primary key as roll number of same students will appear in another row for a different
date. Similarly, in relation AttendanceRecord, Att_Date cannot be used as primary key because
same date is repeated for each roll number.
However, combination of these two attributes Stu_RollNo and Att_Date together would always
have unique value in AttendanceRecord table as on any working day, of a student would be
marked attendance only once. Hence {Stu_RollNo, Att_Date} will combine to make the of
AttendanceRecord relation composite primary key.
1.6.4 Foreign Key
A foreign key is used to represent the relationship between two relations. A foreign key is an
attribute whose value is derived from the primary key of another relation. This means that any
attribute of a relation (referencing), which is used to refer contents from another (referenced)
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 12
relation, becomes foreign key if it refers to the primary key of referenced relation. The referencing
relation is called Foreign Relation. In some cases, foreign key can take NULL value if it is not the
part of primary key of the foreign table.
The relation in which the referenced primary key is defined is called primary relation or master
relation. In Figure 1.6, two foreign keys in STUDENTATTENDANCE database are shown using
schema diagram where the foreign key is displayed as a directed arc (arrow) originating from it
and ending at the corresponding attribute of the primary key of the referenced table. The
underlined attributes make the primary key of that table.
Fig. 1.6 StudentAttendance database with the Primary and Foreign keys
Summary
• A file in a file system is a container to store data in a computer.
• File system suffers from Data Redundancy, Data Inconsistency, Data Isolation, Data
Dependence and Controlled Data sharing.
• Database Management System (DBMS) is a software to create and manage databases. A
database is a collection of tables.
• Database schema is the design of a database
• A database constraint is a restriction on the type of data that that can be inserted into the
table.
• Database schema and database constraints are stored in database Catalog. Whereas the
snapshot of the database at any given time is the database instance.
• A query is a request to a database for information retrieval and data manipulation
(insertion, deletion or update). It is written in Structured Query Language (SQL).
• Relational DBMS (RDBMS) is used to store data in related tables. Rows and columns of a
table are called tuples and attributed respectively. A table is referred to as a relation.
• Restrictions on data stored in a RDBMS is applied by use of keys such as Candidate Key,
Primary Key, Composite Primary Key, Foreign Key.
• Primary key in a relation is used for unique identification of tuples.
• Foreign key is used to relate two tables or relations.
• Each column in a table represents a feature (attribute) of a record. Table stores the
information for an entity whereas a row represents a record.
• Each row in a table represents a record. A tuple is a collection of attribute values that
makes a record unique.
• A tuple is a unique entity whereas attribute values can be duplicate in the table.
Table: PROJECT_ASSIGNED
Regi_ID Project_No
IP-101-15 101
IP-104-15 102
CS-103-14 103
CS-101-14 104
CS-101-10 105
Table: PROJECT
Proj_No Project_Name Sub_Date
101 Airline Reservation System 12-01-22
102 Library Automation System 12-01-22
103 Employee Management System 15-01-22
104 Student Management System 12-01-22
105 Inventory Management System 15-01-22
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 16
Once the result date is declared, Shyam was eager to see the result on website. (Figure 2.1) He
opened the website to enter his Roll number to see the result. After entering Roll number, he
pressed the OK button. Immediately score card of Shyam got displayed on the screen and passed
with first division marks. Shyam was very happy and also surprised, how a computer searches
the Roll number so fast among approximately 5 lacs students records. Later on, Shyam
understand that it was possible because of the database query language which is also known as
Structured Query Language (SQL). SQL is used to search, store, modify records in data base
management system. In this chapter, you will understand to create database objects, insert data
in database and various types of commands used to retrieve the required data from the database.
defining the structure of data, manipulating data in the database, declaring constraints and
retrieving data from the database in various ways, depending on requirement.
2.1.1 Installing MySQL
MySQL is an open source RDBMS software which can be easily downloaded from its official
website https://dev.mysql.com/downloads. After installing MySQL, start MySQL service. It is
shown in Figure 2.2. The appearance of mysql> prompt as shown below. MySQL is ready to
accept SQL statements on this prompt.
CHAR (n) Specifies character type data of length n where n could be any value from 0 to
255. CHAR is of fixed length, means, declaring CHAR (10) implies to reserve
spaces for 10 characters. If data does not have 10 characters (for example, ‘city’
has four characters), MySQL fills the remaining 6 characters with spaces padded
on the right.
VARCHAR (n) Specifies character type data of length ‘n’ where n could be any value from 0 to
65535. But unlike CHAR, VARCHAR is a variable-length data type. That is,
declaring VARCHAR (30) means a maximum of 30 characters can be stored but
the actual allocated bytes will depend on the length of entered string. So ‘city’ in
VARCHAR (30) will occupy the space needed to store 4 characters only.
INT INT specifies an integer value. Each INT value occupies 4 bytes of storage. The
range of values allowed in integer type are -2147483648 to 2147483647. For
values larger than that, we have to use BIGINT, which occupies 8 bytes.
FLOAT Holds numbers with decimal points. Each FLOAT value occupies 4 bytes.
DATE The DATE type is used for dates in 'YYYY-MM-DD' format. YYYY is the 4 digits
year, MM is the 2 digits month and DD is the 2 digits date. The supported range
is '1000-01-01' to '9999-12-31'.
2.2.2 Constraints
Constraints are the certain types of restrictions on the data values that an attribute can have.
Table 2.2 lists some of the commonly used constraints in SQL. They are used to ensure
correctness of data. However, it is not mandatory to define constraints for each attribute of a
table.
Table 2.2 Commonly used SQL Constraints
Constraint Description
Ensures that a column cannot have NULL values where NULL means missing/
NOT NULL
unknown/not applicable value.
UNIQUE Ensures that all the values in a column are distinct/unique.
DEFAULT A default value specified for the column if no value is provided.
PRIMARY
The column which can uniquely identify each row or record in a table.
KEY
FOREIGN The column which refers to value of an attribute defined as primary key in another
KEY table.
2.2.3 Types of Structured Query Language (SQL)
SQL is a standardized language used for making communication with relational databases and
performing various operations on it. According to ANSI (American National Standards Institute),
it is the standard language for relational database management systems. SQL statements are
used to perform tasks such as insert, update delete data in any database. On the basis of
different types of operation, SQL commands are divided into five categories.
1. Data Definition Language (DDL)
2. Data Manipulation Language (DML)
3. Data Query Language (DQL)
4. Transaction Control Language (TCL)
5. Data Control Language (DCL)
Note: In any RDBMS, it is possible to manage multiple databases on a single computer. USE
command is used to select the specific database. After selecting the database, it is possible to
create tables or querying data from this database.
To select the database SchoolRecord, issue the “USE” command followed by database name.
Note/Tip: In LINUX OS environment, names for database and tables are case-sensitive whereas
in WINDOWS OS, there is no such differentiation. However, as a good practice, it is suggested to
write database or table name in the same letter cases that were used at the time of their creation.
2.3.2 CREATE Table
After creating database SchoolRecord, it is required to define relations (create tables) in this
database. In each relation specify attribute (column name) for each attribute with their required
data types. The syntax for CREATE TABLE statement is as follows.
Syntax:
CREATE TABLE tablename (
Col_name1 datatype constraint,
Col_name2 datatype constraint,
:
Col_nameN datatype constraint );
Let us understand how to choose attribute names and their respected data types. First identify
data types of the attributes in table “StudentRecord” along with their constraint, if any. Let us
assume that there are total 100 students in a class and values of Roll number are in a sequence
from 1 to 100. Since the data values of attribute “Stu_RollNo” is stored in digits, the data type
integer (INT) is appropriate for this attribute. In the same way total number of characters in
student First name and Last name can be upto 20 characters. Since the number of characters
can vary for different students, the data type VARCHAR is used for these columns. In the same
the data type VARCHAR is used for student address upto 50 characters in length. The specific
data type DATE is used for specifying any type of date. So DATE data type is used for attribute
“Date of Birth”. For student's parent id, Aadhaar number is used which is a 12 digit number.
Since Aadhaar number is of fixed length and it is not required to perform any mathematical
operation, the character data type with fixed length of 12 character, CHAR (12) is used for this
attribute.
Table 2.3 Data types and constraints for the attributes of relation StudentRecord
Attribute Data expected to be stored Data type Constraint
Stu_RollNo Numeric value consisting of maximum 3 digits Int Primary Key
Variable length string of maximum 20
Stu_FName Varchar (20) Not Null
characters
Variable length string of maximum 20
Stu_LName Varchar (20) Not Null
characters
Stu_DOB Date value Date Not Null
Variable length string of maximum 50
Stu_Address Varchar (50) Not Null
characters
Fixed length string of 12 digits for Aadhaar
Par_ID Char (12) Foreign Key
Number
Table 2.4 Data types and constraints for the attributes of relation ParentRecord
Attribute Data expected to be stored Data type Constraint
Fixed length string of 12 digits Aadhaar
Par_ID Char (12) Primary Key
number
Variable length string of maximum 20
Par_Name Varchar (20) Not Null
characters
Par_Phone Numeric value consisting of 10 digits Char (10) Null Unique
Par_Address Variable length string of size 30 characters Varchar (30) Not Null
Par_Email Variable length string of size 30 characters Varchar (30)
Table 2.5 Data types and constraints for the attributes of relation AttendanceRecord
Attribute Data expected to be stored Data type Constraint
Att_Date Date value Date Primary Key*
Numeric value consisting of maximum 3 Primary Key*
Stu_RollNo Int
digits Foreign Key
Att_Status ‘P’ for present and ‘A’ for absent Char(1) Not Null
Table 2.3, 2.4 and 2.5 show the chosen data type and constraint for each attribute of the relations
StudentRecord, ParentRecord and AttendanceRecord respectively.
Example 2.2: The following command is used to create table StudentRecord. To create the
table in SchoolRecord database, first open the database with USE SchoolRecord command. Then
create the table under StudentRecord database by using the CREATE TABLE command.
Note: “,” is used to separate two attributes and each statement terminates with a semi-colon (;).
The arrow (->) is an interactive continuation prompt. If we enter an unfinished statement, the
SQL shell will wait for us to enter the rest of the statement.
The SHOW TABLES statement is used to display all the table in database. We have created three
tables in the database SchoolRecord.
Example 2.6: The following SQL command is used to display the tables created in the database
SchoolRecord. It shows all the three tables created so far.
A composite primary key is made up of two attributes. The primary key to the “AttendanceRecord” relation
will be composite primary key of two attributes. “AttendanceDate” and “Stu_RollNo”.
Example 2.8: The following SQL command is used to add the composite primary key to the relation
“AttendanceRecord”.
The newly added attribute “income” with data type INT in the table “ParentRecord” can be viewed
using DESC command as follows.
When creating a table, by default each attribute takes null value except for the attribute
defined as primary key. It is possible to change an attribute’s constraint from NULL to NOT
NULL using ALTER statement.
Syntax:
ALTER TABLE table_name MODIFY attribute DATATYPE NOT NULL;
Note: It is required to specify the data type of the attribute along with constraint NOT NULL
while using MODIFY.
Example 2.13: The following command is used to associate NOT NULL constraint with attribute
“Stu_FName” of table “StudentRecord”.
Note: It is required to specify the data type of the attribute along with DEFAULT while using
MODIFY.
(h) Remove an attribute
It is possible to remove attributes from a table using ALTER.
Syntax:
ALTER TABLE table_name DROP attribute;
Example 2.14: The following command is used to remove the attribute income from the table
“ParentRecord”.
Example 2.15: The following command is used to remove primary key of table “ParentRecord”
Note: The primary key is dropped from StudentRecord table, but each table should have a
primary key to maintain uniqueness. Hence, to use ADD command to specify primary key for
the StudentRecord table as shown in earlier examples
2.3.5 DROP TABLE Command
Sometimes it may require to remove a table in a database or the database itself. DROP statement
is used to remove a database or a table permanently from the system. Since this command will
delete the table or database permanently, you have to be cautious while using this statement as
it cannot be undone. Let us assume that you have created a table with name “ParantRecord”
instead of “ParentRecord”. DROP command can be used to delete the table created with wrong
name.
Syntax:
DROP TABLE table_name;
It is also possible to drop the entire database.
Syntax:
DROP DATABASE database_name;
Example 2.16: The following command is used to delete the table name “ParantRecord” from the
current database.
Cautions:
• Using the Drop statement to remove a database will ultimately remove all the tables
within it.
• DROP statement will remove the tables or database created by you. Hence you may apply
DROP statement at the end of the chapter.
It will create a new table named as “NewStudentRecord” with only 5 attributes and all the records
which are inserted in this table earlier.
It is possible to create a new table with all attributes and all records available in the existing
table.
Example 2.19: The following command is used to create a new table “StudentRecord1” with all
attributes and all records available in the existing table “StudentRecord”.
Now the view named EMP_VIEW will be created with only those employee records who have
salary more than 10000. You can use this view similar to Employee table to see all records using
SELECT command. To see all records from EMP_VEW, use the SELECT command as under.
Activity 1
Practical Activity 2.1 – Create the table “Employee” and “Department” in MySQL with
the following attributes specification.
Employee Table
Attribute Data expected to be stored Data type Constraint
empno Numeric value consisting of 4 digits Int Primary Key
ename Variable length string of max 30 characters Varchar (30) Not Null
job Variable length string of max 15 characters Varchar (15) Not Null
mgr Numeric value consisting of 4 digits Int Not Null
hiredate Date of joining the company Date Not Null
sal Numeric value consisting of 6 digits Int Not Null
comm Numeric value consisting of 4 digits Int Not Null
Dept no which is Numeric type consisting of
Deptno Int
maximum 2 digits
Department Table
Attribute Data expected to be stored Data type Constraint
deptno Numeric value consisting of 4 digits Int Primary Key
dname Variant length string of max 20 characters Varchar (20) Not Null
loc Variant length string of max 25 characters Varchar (25) Not Null
Caution: While populating records in a table with foreign key, ensure that records in referenced
tables are already populated.
Let us insert some records in the SchoolRecord database. First insert the records in
ParentRecord table first as it does not have any foreign key. A set of sample records for
ParentRecord table is shown in Table 2.6.
Table 2.6 Records to be inserted into the ParentRecord Table
Par_ID Par_Name Par_Phone Par_Address Par_Email
452695874564 Manu P Singh 9834567890 203, Khandari, Agra, UP mpsingh@gmail.com
252154687451 Ashok K Sharma 9845678910 144 Gr Kailash, New Delhi aksharmaji@mail.com
686113652987
Gurmeet Singh 9635214789 Shahid Nagar, Amritsar, PB gurmeet.007@ymail.com
954891122475 Michal DeSousa 8554658958 Guindy, Chennai, TN michal.don@gmail.com
Example 2.23: The following command is used to insert the record in the “ParentRecord” table.
We can use the SQL statement “SELECT * from table_ name;” to view the inserted record
after any statement to see the current changes in table.
It is also possible to provide values only for some of the attributes in a table by just specifying
the attribute name alongside each data value as per the following syntax.
Syntax:
INSERT INTO tablename (column1, column2, ...)
VALUES (value1, value2, ...);
Suppose to insert the sixth record in “ParentRecord” table (Table 2.6) keeping the value of
“Par_Phone” to NULL. Then it is required to insert the values for other four fields. In this case,
specify the names of attributes in which the values are to be inserted. The values must be given
in the same order in which attributes are written in INSERT command.
Example 2.24: The following command is used to insert the record in “ParentRecord” table by specifying the field
name and corresponding values.
Now observe that all the four values has been inserted in the table ParentRecord except
“Par_Phone” which is being set to NULL at the time of creating a table.
Activities
Practical Activity 2.2 – Insert the records in the ParentRecord table using INSERT command
and check the records inserted in ParentRecord as below.
Practical Activity 2.3 – Insert the records in StudentRecord table (Table 2.7).
Table 2.7 Records to be inserted into the StudentRecord table
Stu_
Stu_FName Stu_LName Stu_DOB Stu_Address Par_ID
RollNo
1 Rajvardhan Singh 5/15/2003 203, Khandari, Agra UP 452695874564
2 Trilok Sharma 8/15/2004 144 Gr Kailash, New Delhi 252154687451
3 Aditi Gaur 4/6/2005 JP Greens, Noida, UP 362115264625
4 Anshika Agrawal 5/17/2003 Kanda, Bagheshwar, UK 602125125261
5 Nandini Roy 12/29/2003 Fortune Somya, Bhopal, MP 225423344657
6 Pawani Dixit 11/12/2004 Lajpat Nagar, Mathura, UP 268953264578
7 Hiba Rizwan 12/3/2006 Deep Nagar, Sahrsa, Bihar 485466192343
8 Riddhi Gupta 1/11/2005 T Nagar, Hyderabad, Telangana 521556651761
9 Manpreet Singh 9/8/2005 Shahid Nagar, Amritsar, Punjab 686113652987
10 John DeSousa 8/17/2005 Guindy, Chennai, TN 954891122475
Example 2.25: The following command is used to insert the first record in table “StudentRecord”.
When column names are not mentioned in the INSERT command, then it is necessary to mention
the values for all the columns. So if there is no “ParentID” for Trilok, then mention the NULL value
for the “Par_ID”.
Example 2.26: The following command inserts the second record with “Par_ID” value as NULL.
mysql>INSERT INTO StudentRecord VALUES (2,'Trilok','Sharma','8/15/2004', '144 Gr
Kailash','New Delhi' NULL);
Note/Tip: Please be careful while entering date in INSERT command. Use the ‘YYYY-MM-DD’
format to write date.
Practical Activity 2.4 – Use INSERT command
Insert the records in employee table using INSERT command and display it after inserting all
record using SELECT statement.
Insert the records in Department table using INSERT command and display it after inserting all
record using SELECT statement.
Suppose, the ParentRecord with Par_ID 485466192343 has requested to change Address to
'WZ - 68, Azad Avenue, Boriwali, Mumbai’ and Phone number to '9988776644'.
Example 2.28: The following SQL statement will update this record.
mysql> UPDATE ParentRecord SET Par_Address = 'WZ - 68, Azad Avenue, Boriwali, Mumbai’,
Par_Phone = 9988776644 WHERE Par_ID = 485466192343;
The changes affected can be verified by using the SELECT statement as below.
Caution: The WHERE clause should be used in the UPDATE and DELETE statement, otherwise it will apply
on all the records.
In the above query, observe that the Student Roll Number and Date of birth of the of the student
whose roll number is 1 is retrieved using WHERE clause.
2.5.2 Querying using database OFFICE
Let us consider an EMP table of employee database with the following fields. The “empno” is a
primary key and “deptno” as foreign key. Table 3.1 shows the data entered in the Emp table.
Table 2.8 Records available in EMP table
empno ename job mgr hiredate sal comm deptno
7019 Smita Clerk 7552 12/14/1994 8800 NULL 20
7049 Alam Salesman 7348 02/17/1995 9600 1800 30
7171 Wasim Salesman 7348 02/19/1995 9250 2000 30
7216 Jawahar Manager 7489 03/30/1995 10975 NULL 20
7304 Manoj Salesman 7348 09/25/1995 9250 2900 30
7348 Balwinder Manager 7489 04/28/1995 10850 NULL 30
7432 Chetana Manager 7489 06/06/1995 10450 NULL 10
7438 Sachin Analyst 7216 12/05/1996 11000 NULL 20
7489 Kushaal President NULL 11/14/1995 13000 NULL 10
7494 Tarun Salesman 7348 09/05/1995 9500 0 30
7526 Amar Clerk 7438 01/08/1997 9100 NULL 20
7550 Jyoti Clerk 7348 11/30/1995 8950 NULL 30
7552 Farhan Analyst 7216 10/27/1995 11000 NULL 20
7584 Mohan Clerk 7432 01/20/1996 9300 NULL 10
7984 Lalitha Clerk 7432 05/23/1998 10300 NULL 10
Now if you wish to retrieve the desired data from the table, let us see how to apply the SELECT
clause to retrieve the data.
(a) Retrieve selected columns – It is possible to retrieve the data of one column of table.
Example 2.31: The following SQL query statement is used to retrieve employee number of all employees in the
table.
Observe that the above query retrieve empno of all the employee from Emp table as only one
column is specified to retrieve.
Let us see another query that select two columns such as emp no and corresponding employee
name. Modify the same query by specifying two fields of table as “empno” and “ename”. and
observe the desired output as below.
Example 2.32: The following SQL query statement will retrieve the data of employee number and name in two
columns.
(b) Renaming of columns – There is specific naming conventions of the fields in table. It is possible
to rename any column while displaying the output by using the alias 'AS'.
Example 2.33: The following SQL query statement selects Employee name as “Name” in the output for
all the employees.
Example 2.34: The following SQL query statement will calculate and to display the annual salary of
employee. Annual salary is calculated as “sal*12”.
Now it doesn’t look nice to display the caption as “sal*12” in the table. It is possible to display it
with new caption as “Annual Salary” for “sal*12”. The revised query and its output is given below.
Observe that “ename” is shown with the caption as “Name” and “sal*12” is shown with the
caption as “Annual Income”.
Note – Annual Income is just the caption to display. It will not add as a new column in the
database table. It is just for displaying the output of the query. If an aliased column name has
space as in the case of Annual Income, it should be enclosed in quotes as ‘Annual Income’.
(c) Distinct Clause – The SELECT clause retrieves all the data through query as output. There may
be a chance of duplicate values such as 2 persons with the same name working in the
department. The DISTINCT clause has provision to retrieve the unique records by omitting the
duplicate records. The DISTINCT clause is used for this purpose.
Example 2.35: The following SQL query statement shows the different departments available in the
“emp” table.
Let us understand, how to retrieve different types of jobs available using DISTINCT clause in the
following example.
Example 2.36: The following SQL query statement will use DISTINCT clause to retrieve different types
of jobs available in the “emp” table.
Observe that there are 5 different job titles although more number of records exists.
(d) WHERE Clause – It retrieves data that meet some specified conditions. In our OFFICE database,
more than one employee can have the same salary.
Example 2.37: The following SQL query statement will give distinct salaries of the employees working in
the department number 10.
Observe in the output that all the records of employee working in dept no. 10 and having the
distinct salary are retrieved.
In the above example, = operator is used in the WHERE clause. Other relational operators like
(<, <=, >, >=, !=) can also be used to specify conditions as per your requirement. The logical
operators AND, OR, and NOT are used to combine multiple conditions.
Let us see, how to compare columns/fields value/s to specific required records or columns.
Example 2.38: The following SQL query statement will display all the details of those employees of 30
departments who earn more than 5000.
Note: Observe the output, two different conditions are being tested separately. First condition
tested for Salary is greater than 5000 and second condition is for department number is 10. AND
operator used to join both conditions.
Let us make a comparison of salary like who is getting more then 8000 and less than 11000.
Example 2.39: The following SQL query statement will select the name and department number of all
those employees who are earning salary between 8000 and 11000 inclusive of both values.
The query in example 2.39 defines a range of salary between 8000 and 11000 that can also be
achieved using a comparison operator BETWEEN, in the query as below. The output of this query
will be same as above.
Note: The BETWEEN operator defines the range of values in which the column value must fall
into, to make the condition true.
Example 2.40: The following SQL query statement will select details of all the employees who work in
any of the department number 10, 20, or 40.
Note: Here NOT operator is used in combination with IN to retrieve all records except with deptno
10 and 20.
(F) ORDER BY Clause – It is used to display data in an ordered form with respect to a specified
column. By default, ORDER BY displays records in ascending order of the specified column
values. The DESC keyword is used to display the records in descending.
Let us arrange the records in ascending or descending order using the ORDER BY clause with
DESC clause example 2.42.
Example 2.42: The following SQL query statement selects details of all the employees in ascending order
of their salaries.
Observe that the records are displayed in ascending order of Salary of each employee. To arrange
records in descending order, use DESC clause with ORDER BY as in example 2.43.
Example 2.43: The following SQL query statement selects details of all the employees in descending
order of their salaries.
Note: DESC clause used after the column name on which the records to be displayed in
descending order.
(G) Handling NULL Values – SQL supports a special value called NULL to represent a missing or
unknown value. For example, the “Par_Phone” column in the table “ParentRecord” can have
missing value for certain records. Hence, NULL is used to represent such unknown values. It is
important to note that NULL is different from value 0 (zero). Also, any arithmetic operation
performed with NULL value gives NULL. For example, 5 + NULL = NULL because NULL is
unknown hence the result is also unknown. In order to check for NULL value in a column, use
IS NULL operator in particular statement. Example 2.44 illustrates the use of NULL clause.
Example 2.44: The following SQL query statement selects details of all employees who have not been
given a bonus. This implies that the bonus column will be blank.
Observe the output and see column mgr and comm where NULL is present.
It is also possible to join NULL statement with any other condition. Example 3.11 shows how to
use it in statement.
Example 2.45: The following SQL query statement selects selects emp number, employee names and job
of all those employees who have been given a comm (i.e., comm is not null) and works in the
department 30.
(H) Having clause – It is used in SELECT statement to make group with certain condition in result
of query.
Syntax:
SELECT expression1, expression2, ... expression_n,
aggregate_function (expression)
FROM tables
[WHERE conditions]
GROUP BY expression1, expression2, ... expression_n
HAVING condition;
Example 2.45 shows how to use Group by and Having clause jointly. The HAVING clause must
follow the GROUP BY clause in any SELECT query and must also preceded by ORDER BY clause
if used.
Example 2.45: The following SQL query statement selects jobs, number of employees in that job, their
total salary and department number wise list where minimum 3 employee of same type of job
are working.
(I) Substring pattern matching – Many times it may require that the query should not retrieve that
exact text or value, rather it should retrieve the matching of few characters or values. For
example, to find out names starting with “M” or to find out pin codes starting with “11”, is called
substring pattern matching. Such patterns cannot match using = operator. SQL provides a LIKE
operator that can be used with the WHERE clause to search for specified pattern in a column.
The LIKE operator makes use of the following two wild card characters - (%) and (-). The percent
(%) is used to represent zero, one, or multiple characters. The underscore (_) is used to represent
exactly a single character.
There are several situations when we search data records for some pattern matching. A very
common situation when you search any contacts in your smart phone, you just start typing first
few characters of the name, then immediately list appears with these characters and you tap on
the required name to call. Example 3.46 to 3.51 demonstrates such situations to search some
patterns in text values of records using LIKE clause.
Example 2.46: The following SQL query statement selects details of all those employees whose name
starts with 'K'.
Example 2.47: The following SQL query statement selects details of all those employees whose name
whose name ends with 'a', and gets a salary more than 8500.
Example 2.48: The following SQL query statement selects details of all those employees whose name
consists of exactly 5 letters and starts with any letter but has ‘mita’ after that.
You can also match a particular character or string in between the text simply by using wild card
character as shown in example 2.49.
Example 2.49: The following SQL query statement selects all columns of all employees containing 'ma'
as a substring in name.
Example 2.50: The following SQL query statement selects all columns of employees containing 'a' as the
second character in their names.
Example 2.51: The following SQL query statement selects records of all the employees except Alam.
2.6 SQL FOR DATA CONTROL LANGUAGE (DCL)
Data Control Language is the part of SQL, which have commands to manage users for their work
permission. The user will be able to work as per the permissions granted to them by DBA
(Database Administrator). DCL includes the commands GRANT and REVOKE, which are used to
provide rights & permissions to user.
GRANT statement – The GRANT statement is used to give access privileges to a specific user to
work with any selected database only.
Syntax:
GRANT SELECT, UPDATE ON Test_Table TO NewUser1, NewUser2;
Example:
GRANT SELECT, UPDATE, DELETE ON carshowroom TO 'WebUser';
Here the user 'WebUser' will be able to use only three SELECT, UPDATE and DELETE SQL
statements when working on carshowroom database.
REVOKE statement – The REVOKE statement is used to withdraw privileges from a specific user
so that specific user could not use specific statement on selected database. In other words it is
useful to take back the given permission/s from the user.
Syntax:
REVOKE Privilege_Name ON Object_Name FROM User_Name.
Example:
REVOKE DELETE ON carshowroom FROM WebUser;
2.7 SQL FOR TRANSACTION CONTROL LANGUAGE (TCL)
Transaction control language (TCL) is the part of SQL commands that allows to permanently
change the databases or undo the databases transactions. It is similar to save the database or
undo the current changes. The COMMIT, ROLLBACK and SAVEPOINT statements comes under
this category.
COMMIT – Commit command is used to save all the transactions to the database. After
completing any operation or SQL statement, you can simply write COMMIT as the next statement
to permanently save data in the database.
Syntax:
Commit;
Example: DELETE FROM ClassStudents WHERE RollNo =25;
Commit;
Here, after DELETE statement, the COMMIT statement is used. It means the student record
whose RollNo is 25 is permanently deleted. Now after COMMIT statement, it is not possible to
rollback the record of that student.
ROLLBACK – ROLLBACK command allows to undo transactions that have not already been
saved to the database. This statement is useful to restore the database to the state where last
commit statement was used. Rollback statement is also used with SAVEPOINT statement to
jump to specific Savepoint in the database transactions.
Syntax:
ROLLBACK;
SAVEPOINT – This command helps to sets a Savepoint within a transaction. Basically
SAVEPOINT statement is used to save a transaction temporarily so that user can rollback to that
point as and when required.
Syntax: SAVEPOINT Savepoint_Name;
SUMMARY
• SQL is a domain-specific language that is used to manage relational databases.
• Currently almost all RDBMS such as MySQL, Oracle, Informix, SQL server, MS Access, and
Sybase uses SQL as their standard database language.
2. ALTER clause is used to add a Primary key constraint after table is created.
3. DROP command is used to delete the structure of a table from the database.
4. Updation and deletion of records are part of DDL.
5. Insert into statement is useful to insert a new field in any table.
6. Aggregate functions are used to perform calculations on multiple values and returns a
single value.
7. Aggregate functions are mostly used with the SELECT statement.
8. DML is used to create a new database objects like table and view.
9. A new table can be created from existing table(s).
10. The name of any tables once its created and records are inserted cannot be change.
D. Short answers questions
1. What do you understand by SQL?
2. SQL Statements are classified in how many ways?
3. Differentiate between DDL and DML?
4. Differentiate between DCL and TCL?
5. What is the difference between ALTER and UPDATE command.
6. Differentiate between DELETE and DROP command
7. What is create statement? How many database objects can be created using this?
8. Write the CREATE statement to create the following relations with given constraints.
Book(ISBN (Text), Title (Text), Author (Text), PubID(Text), Price (Numeric), Pages
(Numeric)).
Here ISBN is Primary Key field and remaining all are Not Null.
9. Modify the Book table in previous question and add one more new field Discount
(Numeric).
10. Shyam has created one database name Mycontacts but he is not able to create
new table in this database. What command should Shyam be used before creating
the table?
11. Mr. Sachin Agrawal created two tables with Course as Primary Key in Table1 and
Foreign key in Table2 while inserting new row in second Table2 Mr Agrawal is
not able to insert new value in the column City. What could be the possible
reason for this?
E. Practical Exercises
1. Based on employee table, write SQL queries to –
• display the list of employee belonging to the department 30.
• display the list of employee number and name of mangers.
• display the list of clerks working in department 10
• display the detailed list of those employees who have joined before the July 1995
• display the the names of employees who are not mangers.
• display the List of employees whose employees numbers are 7438, 7216, 7019 and
7984
• display the employee name and salary whose salary is between 9000 and 10500.
• display the employee name who have joined after 30 June 1995.
• display the List of different job available in the emp table
• display the List of employee who are not getting/eligible commission.
• display the list of employee whose name start with “M”
• display the list of employee whose name has 6 characters.
• display the List of employee having 'a' as second character.
• display the List of all employee in descending order of salary.
There are various readily available functions in SQL that can be used in queries. It includes
single row functions, multiple row functions, group records based on some criteria, and working
on multiple tables using SQL.
A function is used to perform some particular tasks and it returns zero or more values as a
result. Functions are useful while writing SQL queries also. Functions can be applied to work on
single or multiple records (rows) of a table.
3.1 SQL functions
SQL functions are categorized as Single Row functions and Aggregate functions, depending on
their application in one or multiple rows.
Single Row Functions are also known as Scalar functions. Single row functions are applied on a
single value and return a single value. These are used in SELECT, WHERE, and ORDER BY
clause. MATH, STRING and DATE functions are examples of single row functions.
Aggregate functions are also called Multiple Row functions. These functions work on a set of
records as a whole and return a single value for each column of the records on which the function
is applied. These are used with SELECT clause only. MAX ( ), MIN ( ), AVG ( ), SUM ( ), COUNT
( ) and COUNT (*) are examples of multiple row fun.
To demonstrate the use of SQL function, let us create database called CARSHOWROOM having
the schema with four relations as shown in Figure 3.1.
Insert the records in tables Inventory, Customer, Sale and Employee using INSERT command.
The records of these four relations can be viewed using the SELECT command.
Execute the following query to view the records of “inventory” table. After successful execution
of the query, the records entered in the “inventory” table will be displayed.
Execute the following query to view the records of “customer” table. After successful execution of
the query, the records entered in the “customer” table will be displayed.
Execute the following query to view the records of “sale” table. After successful execution of the
query, the records entered in the “sale” table will be displayed.
Execute the following query to view the records of “employee” table. After successful execution
of the query, the records entered in the “employee” table will be displayed.
2. ROUND (N, D) – Rounds off number N to D number of decimal places. If D=0, then it rounds
off the number to the nearest integer.
Step 2. Add a new column “FinalPrice” to the table “inventory”. Update the table “inventory” with
“FinalPrice” as the sum of Price and 12 percent of the GST. Apply the ROUND function to round
off the GST to one decimal place. Execute the following query to do this.
Display the values of “FinalPrice” for all the record by using the SELECT command.
Step 3. Calculate and display the amount to be paid each month in multiples of 1000, which is
calculated after dividing the FinalPrice of the car into 10 installments. After dividing the amount
into EMIs, find out the remaining amount to be paid immediately, by performing modular
division. Use SELECT command to display the result. Execute the following query to do this.
Step 4. Execute the following query to display the “InvoiceNo” and “Commission” value rounded
off to zero decimal places.
Step 5. Execute the following query to display the details of “sale” table where payment mode
is credit card.
Step 6. Execute the query to add a new column “Commission” with total length of 7 with 2
decimal places to the “sale” table.
Step 7. Execute the query to calculate commission for sales agents as 12% of “SalePrice”.
Step 8. Execute the following query to insert the values to the newly added column “Commission”
and then display all records of the “sale” table where Commission > 73000.
Step 9. Execute the following query to display InvoiceNo, EmpID, SalePrice and Commission
such that commission value is rounded off to 0.
3. MID (string, pos, n) OR SUBSTRING (string, pos, n) OR SUBSTR (string, pos, n) – Returns a
substring of size n starting from the specified position (pos) of the string. If n is not specified, it
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 58
returns the substring from the position pos till end of the string.
5. LEFT (string, N) – Returns N number of characters from the left side of the string.
8. LTRIM (string) – Returns the given string after removing leading white space characters.
9. RTRIM (string) – Returns the given string after removing trailing white space characters.
10. TRIM (string) – Returns the given string after removing both leading and trailing white
space characters.
i.
Practical Activity 3.2 – Demonstrate to use string function
Let us use Customer relation to understand the working of various string functions.
Step 1. Execute the following query to display customer name in lower case and customer email
in upper case from “customer” table.
Step 2. Execute the following query to display the length of email and part of the email from
the email id before the character ‘@’.
The function INSTR will return the position of “@” in the email address. So, to print email id
without “@” position -1 is used.
Let us assume that four-digit area code is reflected in the mobile number starting from position
number 3. For example, 1851 is the area code of mobile number 9818511338.
Step 3. Execute the following query to display the area code of the customer living in Rohini.
Step 4. Execute the following query to display emails after removing the domain name extension
“.com” from emails of the customers.
Step 5. Execute the following query to display details of all the customers having yahoo emails
only.
Now let us use the table “inventory” from CARSHOWROOM database, write SQL queries for the
following:
Step 6. Execute the following query to convert the “CarMake” to uppercase if its value starts
with the letter ‘B’.
Step 7. If the length of the car model is greater than 4 then Execute the following query to
fetch the substring starting from position 3 till the end from attribute Model.
and year), displaying day of the week and so on. Some of the date and time functions with
examples are given below.
1. NOW() – It returns the current system date and time.
2. DATE() – It returns the date part from the given date/time expression.
Step 1. Execute the following query to display the date in the format "Wednesday, 26,
November, 1979", if the date of joining is not Sunday.
Step 2. Execute the following query to list the Employee Name, date of birth and Salary for all
employees whose salary is more than 25000, in “emp” table.
Step 3. Execute the following query to list the invoice number, customer id and date of sale
those payment are done using bank finance in “Sale” table.
Step 4. Execute the following query to list all the employee without peon whose salary is more
than 30000 in “emp” table.
Step 5. Execute the following query to list all the records without LXI and VXI models in the
table “inventory”.
2. MIN (column) – Returns the smallest value from the specified column.
3. AVG (column) – Returns the average of the values in the specified column.
4. SUM (column) – Returns the sum of the values for the specified column.
5. COUNT (*) – Returns number of records in a table. COUNT (*) is used with WHERE clause to
display the number of records that matches some particular criteria in the table.
Step 2. Execute the following SQL query to display the total number of different types of models
available from table “inventory”.
Step 3. Execute the following SQL query to display the average price of all the cars with model
LXI from table “inventory”.
the same values in a specified column. The aggregate functions (COUNT, MAX, MIN, AVG and
SUM) can be used with GROUP BY clause. HAVING Clause in SQL is used to specify conditions
on the rows with GROUP BY clause.
Practical Activity 3.5 – Demonstrate to use GROUP BY and HAVING clause in
SQL
Consider the “sale” table from the CARSHOWROOM database. Display the number of records in
the “sale” table using the following SQL statement.
In these records, it is observed that, the columns, CarID, CustID, SaleDate, PaymentMode,
EmpID, SalePrice can have rows with the same values in it. So, GROUP BY clause can be used
in these columns to find the number of records of a particular type (column), or to calculate the
sum of the price of each car type.
Step 1. Execute the following SQL query to display the number of Cars purchased by each
Customer from SALE table.
Step 2. Execute the following SQL query to display the Customer Id and number of cars
purchased if the customer purchased more than 1 car from SALE table.
Step 3. Execute the following SQL query to display the number of people in each category of
payment mode from the table SALE.
Step 4. Execute the following SQL query to display the PaymentMode and number of payments
made using that mode more than once.
5 Abhay 8A
Execute the following query to view the records of “music” table. After successful execution of the
query, the records entered in the “music” table will be displayed.
Step 1. Execute the following SQL query to find the list of students participating in either of
events by using UNION operation on relations DANCE and MUSIC. After execution it will display
the union of DANCE and MUSIC relations.
specify conditions on the related attributes of two tables within the FROM clause. Usually, such
attribute is the primary key in one table and foreign key in another table.
Let us create two tables UNIFORM (UCode, UName, UColor) and COST (UCode, Size, Price) in
the SchoolUniform database. “UCode” is primary key in table UNIFORM. “UCode” and “Size” is
the composite key in table COST. Therefore, UCode is a common attribute between the two tables
which can be used to fetch the common data from both tables. Define UCode as foreign key in
the “Cost” table while creating this table. Enter the records in these tables as shown in Table
3.13 and 3.14.
Table 3.13 Uniform table
UCode Uname UColor
1 Shirt White
2 Pant Grey
3 Tie Blue
Table 3.14 Cost table
UCode Size Price
1 L 580
1 M 500
2 L 890
1 M 810
Practical Activity 3.6 – Demonstrate to join two tables in SQL
Let us consider two tables created, UNIFORM and COST to demonstrate the joining of two tables.
The joining of two tables can be done in three different ways – using WHERE clause, JOIN clause
and NATURAL JOIN clause
Step 1. Execute the following query to join the two tables using WHERE clause.
As the attribute “UCode” appears in both “uniform” and “cost” tables. Hence alias is used to
remove ambiguity by specifying qualifier U with attribute UCode in SELECT and FROM clauses
to indicate its scope.
Step 2. Execute the following query to join the two tables using JOIN clause.
The output of the query is same as that of step 1. In this query the JOIN clause is used explicitly
along with condition in FROM clause. Hence no condition is required in WHERE clause.
The output of queries in step 1 and 2 has a repetitive column UCode having exactly the same
values. This redundant column provides no additional information. SQL provides the extension
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 70
of JOIN operation called as NATURAL JOIN, which works similar to JOIN clause in SQL to remove
the redundant attribute. This operator can be used to join the contents of two tables if there is
one common attribute in both the tables.
Step 3. Execute the following query to join the two tables using NATURAL JOIN clause.
It is clear from the output that the result of this query is same as above in step 1 and 2, except
that the attribute UCode appears only once.
It is important to note the following points while applying JOIN operations on two or more
relations.
• If two tables are to be joined on equality condition on the common attribute, then one may
use JOIN with ON clause or NATURAL JOIN in FROM clause. If three tables are to be joined
on equality condition, then two JOIN or NATURAL JOIN are required.
• In general, N-1 joins are needed to combine N tables on equality condition.
• Any relational operators can be used with JOIN clause to combine tuples of two tables.
SUMMARY
• A Function is used to perform a particular task and return a value as a result.
• Single Row functions work on a single row of the table and return a single value.
• Multiple Row functions work on a set of records as a whole and return a single value.
Examples include COUNT, MAX, MIN, AVG and SUM.
• GROUP BY function is used to group rows of a table that contain the same values in a
specified column.
• Join is an operation which is used to combine rows from two or more tables based on one
or more common fields between them.
8. Which of the following SQL operation cannot be performed on relations (a) Union, (b)
Intersection (c) Difference (d) Merge
9. Which of the following is used to join two tables on equality condition on the common
attribute (a) JOIN with ON clause (b) NATURAL JOIN in FROM clause (c) Any of a or b (d)
NATURAL JOIN
10. What will be the Cartesian product of the two relations having 4 rows and 3 columns for
first relation and 3 rows and 4 columns in second relation. (a) degree 7 cardinality 12 (b)
degree 6 cardinality 16 (c) degree 7 cardinality 16 (d) degree 9 cardinality 16
B. Fill in the blanks
1. Single row functions are applied on a single ______ and return a single value.
2. Aggregate functions work on a ________ as a whole and return a single value.)
3. Math Functions accept numeric value as input and return a ______ value as a result.
4. MONTH (date) returns the month in ________ form from the date.
5. By default, the order by clause lists items in ______ order.
6. INSTR (string, substring) returns the position of the _________ of the substring in the
given string.)
7. MID (string, pos, n) returns a substring of size ___ starting from the specified position
______ of the string. (n, pos).
8. LTRIM (string) returns the given string after removing ________ white space characters.
9. TRIM (string) returns the given string after removing both ________ and _________ white
space characters.
10. The _________ operation is used to get common tuples from two tables.
C. State True or False
1. Aggregate functions are also called Scalar functions.
2. A function always returns a single value.
3. Functions can be applied to work on single or multiple records of a table.
4. INSTR (string, substring) returns 0, if the substring is not present in the string.
5. If n is not specified MID (string, pos, n), it returns the substring from the position 1 till
end of the string.
6. RTRIM (string) returns the given string after removing leading white space characters.
7. NOW() returns the current system date and time.
8. Union operation eliminates the duplicate rows.
9. Cartesian product operation combines tuples from two relations.
10. Join statement is used to combine two tables on a specified condition.
C. Short answer questions
1. Differentiate between single row functions and aggregate functions.
2. List the single row functions with example.
3. Differentiate between TRIM( ), LTRIM( ) and RTRIM( ) functions.
4. Demonstrate the use of LCASE( ) and UCASE( ) function with example.
5. List the date functions with example.
6. What is the difference between NOW( ) and DATE( ) function?
7. Demonstrate the difference between SUM( ) and AVG( ) function?
8. A table Student has 4 rows and 2 column and another table has 3 rows and 4 columns.
How many rows and columns will be there if we obtain the Cartesian product of these
two tables?
9. What will be the output of following SQL functions.
a) Select pow (3,2);
b) Select round (342.9234, 2);
c) Select length (‘Vocational Education’);
Module Overview
Customer Query Management is the method used by the customer to communicate
directly with the company. This process has been facilitated by the software
application known as Customer Relationship Management (CRM) software. The CRM
system allows the customers to send their queries and enquiries. The Query
Management System is one of the most important features of CRM. Organisation can
customize their CRM as per the requirements. A centralized cloud-based Query
Management can provide the best view to see Customer queries from multiple areas
of the portal that can be then assigned to the concerned department to be resolved.
This unit equips you with essential knowledge and skills in Customer Query
Management.
In this unit, you will understand the concept of Query Management. You will learn
about attending customer queries, the role and importance of Customer Service
Associate, steps to take a call, and principles of active listening. We will also discover
the Case Study: How to show proper empathy and acknowledgement. In the process
of Query Management, we will focus on Tools for Query Management, Service Level
Agreements (SLAs), and Case Study: Techniques for conveying concern and
commitment. Then, we discuss “Documentation Process for Customer Queries”,
emphasizing Reference Guides or Support Materials to Resolve Queries, and Case
Study: How to Refer to the Supporting Material Case Study: How to Refer to the
Supporting Material. Lastly, we will discuss how to manage Query Resolution, by
covering types of customers, Design templates to record a query, discuss different
techniques used to obtain data/information and technologies used in a voice process.
Learning Outcomes
After completing this module, you will be able to:
• Understand how to effectively receive, interpret, and categorize customer queries
for efficient handling and resolution.
• Learn to prioritize and manage customer queries using systematic approaches,
ensuring timely responses and accurate solutions.
• Develop skills to accurately document customer queries, maintaining detailed
records for tracking and improving customer service.
• Implement best practices for resolving customer queries, ensuring clear
communication, effective solutions, and customer satisfaction.
Module Structure
Session 1. Customer Queries
Session 2. Query Management
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 74
2. Address each customer as if he/ she is the most important caller. Greet your 100 th
caller with the same pleasant personality as the first call of the day.
3. Welcome the customer with a friendly, branded greeting. Greet them with something
like “Welcome to ......... How much will I help you?” or “Good morning, .......” Provide the
customer with an inviting greeting but don’t go overboard, as this could make them
uncomfortable.
1. Make sure that your tone of voice matches the pleasant words. Pay attention to your
tone and pitch to ensure they reflect a person who is willing to help and serve the
customer.
5. Give the full attention to the customer. Stop doing other work while answering the
customer.
6. Speak clearly and professionally. Avoid using slang words or company jargon. Begin
by speaking at a moderate pace and adjust your pace to the customer’s pace once the
conversation begins.
The following are some of the greeting scripts to start with:
Hello, [Customer Name]! Thank you for contacting [Business Name]. How can I help?
Hey there! We appreciate you using [Service Name]. We’re happy to help you with any
questions you have.
Hi, [Customer Name]! Thanks for reaching out. Give me just a moment to read your
message and I’ll do my best to help.
Welcome back, [Customer Name]! It’s great to see you again. How can I assist you
today?
Hi, [Customer Name]! Welcome back to [Business Name]. Did you manage to resolve
[the previous issue]?
Stand up when you meet someone – This shows that you respect that person. It also
helps you get to the point where you can make eye contact.
Introduce yourself immediately – When initiating contact, introduce yourself
courteously by saying your name.
For instance, "Hello, I am Suresh.
Pleasure to meet you," for in-person conversations, or "Hello, I am Suresh calling from
Global7 Telecom," during phone calls.
Handshake – When you say hello, offer your hand for a handshake. It shows you are
friendly and confident.
Smile – Your facial expression can say a lot. A smile when meeting someone shows you
are glad to see them, no matter how you feel.
Greet others by name – Addressing someone by their first name and consistently using
it throughout the conversation helps them feel valued and shows your interest in them.
For instance, "Hi, Hari. Is this a good time to chat?"
Focus on the customer, not yourself – When calling a customer, prioritize their needs
and minimize background noise. Let them share their thoughts and concerns without
interruptions from your end.
Do not be too casual when greeting – Instead of casual greetings like "Hi" or "What's
up," maintain a professional tone when addressing customers or superiors. This shows
respect and professionalism, avoiding any confusion between friendly conversations and
professional interactions.
Thank you – Always express gratitude before ending a call by saying "Thank you for
reaching out." Adjust the level of gratitude based on the situation, whether it's with
supervisors, friends, or customers.
Asking customers, "How can I assist you?" demonstrates your genuine concern for their
needs as a customer service representative (CSR).
1.2.4 Steps to take a call
Let's follow Ravi, a customer service representative (CSR), as he begins his shift and
takes a call.
Step 1. Ravi starts by logging into his computer using his user ID.
Following that, he enters his password to gain access.
Depending on the login credentials, different applications open up. For those handling
orders, the CRM script appears, while customer service representatives are greeted with
a screen featuring various search fields to access customer data.
Step 2. Next, he logs onto the Automatic Call Distributor or the 'hard phone'.
At this point, Ravi is logged into both the application and the phone system.
Step 3. Now Ravi puts on his headset.
Step 1. Now Ravi is prepared to take calls.
He recognizes an incoming call when his headset beeps or the hard phone blinks.
Ravi begins conversing with the customer.
Step 5. After concluding the conversation with the customer:
Ravi expresses gratitude to the customer before ending the call.
He records the details of the call in the application.
• Let me just make sure I understand you right. You’d like to [rephrase the
customer’s question]. Is that accurate?
• If my understanding is correct, you’re looking for a way to [do this]?
• Sorry to hear you ran into that issue. The good news is: We can fix it! Here’s
how.
• Let me check that I have this right. You need help with [restated problem],
correct?
• I can totally understand how frustrating that was. Would you mind waiting a
couple of minutes while I look into that for you?
• I hear you, and I’m sorry to hear that didn’t work as expected. Give me a
second to look into it on my end and see what I can do.
• It looks like I can’t reproduce this on my end. Would you mind sending me [a
screenshot or video] so I can make sure I’m looking in the right place?
• Ah, I understand what you’re trying to do. We don’t offer this as a current
feature but I do have a workaround. You can [do this instead].
1.3.2 Empathy
Successful customer service relies on empathy, the ability to perceive situations from
the customer's viewpoint. It extends beyond just resolving issues; acknowledging a
customer's emotions is crucial before presenting solutions.
Empathy involves grasping and validating a customer's feelings and requirements before
providing a fitting solution.
1.3.3 Sympathy
Sympathy involves feeling pity or compassion for another person's misfortune.
Expressing empathy for another's hardships or misfortunes.
Compassionate understanding towards someone's negative emotions or situation.
An essential phase in social and moral growth and understanding.
Assignment 1.1.
• List and practice the principles of active listening.
• List and practice the steps to take a call as a customer service
representative.
Customer: "Hello, I am Ashok Sharma, a credit card holder from your bank. Yesterday
at the shopping mall, my card declined. Is there an issue? I Do not think there's a
problem on my end."
CRM: ”I completely understand your concern, Mr. Sharma. Please allow me to check
and resolve the issue for you. Before we proceed, could you kindly provide me with your
ID number and your card number?"
Customer: ”Certainly. My ID number is 1234, and my card number is 433677224455.”
CRM: ”Please stay on the line for about 2 minutes while I investigate this matter for
you.”
After 2 minutes
CRM: ”Thank you for waiting, Sir. I regret to inform you that the last payment was
declined due to insufficient funds in your bank account.”
Customer: (Shocked) "Oh no! What am I going to do? The bill is substantial, and I just
switched jobs. My salary won't arrive until the end of next month. I am in a tough spot
here."
CRM: (Calmly) “Please Do not worry, Sir. I understand your predicament. I have been in
a similar situation before. I will assist you by initiating a request on your behalf. Our
company will cover the outstanding amount, and once your account has enough funds,
the company will deduct it. However, during this period, your card will remain inactive.
Once the amount is settled, your card will be reactivated."
Customer: ”Thank you so much! Your help means a lot.”
CRM: ”Is there anything else I can assist you with?”
Customer: ”No, that’s all. Thank you again.”
CRM: ”Thank you for choosing ABC Ltd. Have a wonderful day.”
The practical activity 1.1 illustrates the Empathy to be practiced in customer service
using Role-Play
Activity 1
Practical Activity 1.1. Empathy in Customer Service Role-Play
Step 1. Divide students into pairs, with one as the customer and the other as the
customer service representative (CRM).
Step 2. Provide each pair with a scenario or description (given below).
Step 3. Give pairs time to read and understand their scenario. Then, start the role-play
sessions, encouraging authentic engagement.
Step 1. After each role-play, gather participants to discuss how effectively empathy was
shown and how the situation was handled.
Solution: Scenario Script
CRM: (Sounding sympathetic) I understand Sir, but then you should have saved some
money. Savings matters during this type of situation. You must be in such trouble now.
Customer: I do not need any advice from you. Just do your work.
CRM: I will go ahead and submit a requisition in your name, where our company will
pay your last due amount and once you have sufficient balance in your account, the
company will deduct the amount. However, till then your card will remain inactive, as
soon as the amount is retrieved by the company, the card will be activated.
Customer: Good, now that’s your job. Stop advising people. Bye
CRM: Is there anything else…
(The phone gets disconnected)
Summary
• Role of voice customer service associates: Establishing positive impressions and
rapport through engaging calls and clear introductions.
• Effective call openings: Utilizing tailored greetings, professional tone, and precise
introductions.
• Steps in handling calls: Logging in, headset setup, conversation, gratitude, call
documentation, and readiness for the next call.
• Active listening: Discerning verbal/non-verbal cues and differentiating between
hearing and understanding.
• Principles of active listening: Emphasizing listening over speaking, empathy,
patience, objectivity, and understanding tone.
• Importance of empathy in customer service: Acknowledging and addressing
customer emotions for effective solutions.
• Sympathy's role: Demonstrating compassionate understanding in social and moral
growth.
Check Your Progress
A. Multiple Choice Questions
1. What is the primary purpose of an effective call opening? (a) To end the call promptly
(b) To establish a positive tone and rapport (c) To rush through the conversation (d)
To avoid greeting the customer
2. Which step is NOT part of handling a call? (a) Expressing gratitude (b) Recording
call details (c) Making personal notes (d) Readiness for the next call
3. What does active listening involve? (a) Only hearing spoken words (b) Observing
verbal cues (c) Concentrating on what's being said and unspoken cues (d) Ignoring
body language
4. Which principle is essential in active listening? (a) Interrupting the speaker (b)
Prioritizing speaking over listening (c) Focusing on larger perspectives (d) Showing
impatience
5. What is the significance of empathy in customer service? (a) Ignoring customer
emotions (b) Acknowledging and addressing customer feelings for better solutions
(c) Focusing solely on company policies (d) Being indifferent to customer issues
6. What is the primary purpose of introducing yourself and mentioning the company
you represent at the beginning of a call? (a) To confuse the customer (b) To establish
a connection and context (c) To avoid interaction (d) To rush through the
conversation
7. What is a crucial step for a customer service representative before ending a call? (a)
Expressing gratitude (b) Interrupting the customer (c) Making personal remarks (d)
Avoiding any further conversation
8. Which factor does NOT contribute to effective listening? (a) Concentration (b) Bias
(c) Patience (d) Interpretation of verbal and non-verbal cues
9. What does 'INCOME calls' typically refer to in a call center? (a) Outgoing calls made
by CSRs (b) Calls received by CSRs from customers (c) Internal meetings (d) Call
recordings
10. What does active listening primarily involve? (a) Hearing only the words spoken (b)
Observing body language (c) Focusing on multitasking (d) Concentrating on both
verbal and non-verbal cues
B. Fill in the Blanks
1. The initial moments of a conversation are crucial for forming a favorable first
_______________.
2. Effective call openings involve tailored greetings and maintaining a _______________
tone.
3. Handling calls includes logging in, headset setup, expressing gratitude, and
_______________ for the next call.
4. Active listening involves discerning _______________ cues.
5. Principles of active listening include empathy, patience, and understanding
_______________.
6. Creating a positive _______________ is important.
7. Effective listening involves interpreting _______________ cues.
8. Empathy involves understanding and acknowledging a customer's _______________.
C. State whether the following statements are True or False
1. Effective call openings are relevant in customer interactions.
2. Active listening involves only focusing on spoken words.
3. Empathy in customer service disregards customer emotions.
4. Active listening involves interrupting the speaker to show engagement.
5. Sympathy and empathy hold the same significance in customer interactions.
6. Active listening only involves paying attention to verbal messages.
7. Expressing gratitude is necessary in customer interactions.
8. Sympathy and empathy have the same meaning in customer service.
9. Empathy in customer service focuses solely on resolving issues.
10. Call openings have minimal impact on customer interactions.
D. Answer the following questions in short
1. What role do voice customer service associates play in call centers?
2. Why are the initial moments of a conversation crucial in customer interactions?
3. What are some effective opening lines for a CRM Domestic (Voice) call?
4. List three ways to greet a customer effectively.
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 84
5. What are the steps involved in handling a call, as outlined in the chapter?
6. Explain the difference between hearing and active listening.
7. Name three principles of active listening discussed in the chapter.
8. Why is empathy considered crucial in customer service?
9. Define sympathy in the context of customer interactions.
10. How do CSRs typically recognize an incoming call?
Restating important details to the customer with a phrase like "Let me recap to ensure
I have got this right" helps assure them that you are attentive to their needs.
Refer queries outside your area of competence or authority promptly to appropriate
people.
Call forwarding involves more than pressing buttons on your phone. It's about
transparently explaining to the customer why their call needs to be redirected.
Potential reasons for call redirection may include:
• The customer received the incorrect service.
• Queries that necessitate the expertise of other services.
• Inability to authorize the decision the customer seeks.
Examples
Transferring the call – “May I please place your call on hold while I transfer this call.”
(Wait for their response) If Yes; “Thank you. Please hold while the call is being
transferred”.
Retention / Service Cancellation
Situation – The customer is upset because Technical Support can't replace her out-of-
warranty DSL Modem/Router. She's expressing frustration about the cost of the modem
and is considering switching to a different Internet Service Provider.
Customer's Profile – Female, Age is 75 years old, and very irate.
Goal – Pacify the irate caller, and save the customer from cancelling her Internet Service.
2.2. Resolve Queries within Your Area of Competence or Authority
2.2.1. Service Level Agreements (SLAs)
Service Level Agreements (SLAs) are the part of a service contract in which the service
is formally defined.
In practice, the term SLA is occasionally used to refer to the agreed-upon service or
performance delivery time in contracts. For instance, Internet Service Providers
commonly incorporate a Service Level Agreement into their contracts with customers to
outline the specific service levels being offered.
In this scenario, the SLA typically includes technical specifics like mean time between
failures (MTBF), mean time to repair or recover (MTTR), various data rates, debit, jitter,
or similar measurable details.
In simpler terms, a service level agreement is like a negotiated deal between two or more
parties, where one party is the customer and the other is the service provider.
Customer based SLA – Collective agreements covering various services used by a group
of individual customers.
For instance, SLAs between an IT service provider and a large organization's finance
department, encompassing services like financial systems, payroll, invoicing, and
procurement systems.
Service-based SLA – The agreement is accessible to all customers using the service
offered by the service provider. For example:
An auto service station provides routine services to all customers and includes certain
maintenance services within a comprehensive fee plan.
A mobile carrier extends ongoing service to all customers and includes some
maintenance within a plan utilizing a shared payment method.
A single messaging system for the entire office presents challenges in its SLA as the
service level provided can vary among different users. For instance, front office staff
might require high-speed LAN connections, while local offices might rely on slower
leased lines, leading to discrepancies in service levels.
Multilevel SLAs – SLAs are segmented into tiers, each serving specific customer groups
but covering the same services within the overarching SLA.
Enterprise-Level SLA – Encompasses all Service Level Management (SLM) concerns
pertinent to individual customers throughout the organization. These issues might be
less prone to change and hence demand fewer frequent updates (SLA reviews).
Customer-level SLA – Includes all SLM issues related to a specific customer group,
regardless of the service used.
Service Level SLA – Covers all minor issues related to specific services, relevant to this
particular group of customers.
2.3. Obtain confirmation that queries have been satisfactorily resolved
Customer retention is a strategic effort by an organization to minimize customer loss. It
starts from the initial interaction and extends throughout the customer-company
relationship. The capability to both attract and maintain new customers is tightly
connected to the quality of products or services offered by the company.
Customer retention surpasses meeting customer expectations; it's about exceeding
them to foster brand loyalty. It focuses on delivering customer value over solely pursuing
maximum profits, shaping a business strategy that prioritizes the customer's
experience. Consistently providing top-notch customer service often stands out as a
critical factor in a competitive market.
Customer satisfaction, a common marketing metric, gauges how well a company's
offerings meet or surpass customer expectations. It's quantified as "the count or
percentage of customers whose reported experience with a company, product, or service
exceeds a specified satisfaction target." A survey of approximately 200 senior marketing
executives revealed that 71% found measuring customer satisfaction highly beneficial
for managing and monitoring their business.
2.4. Examine the objection handling skills to buy time for gauging the correct
resolution
Case Study: Techniques for conveying concern and commitment
CCE: Thank you for choosing ABC Internet. I am Neha. How may I assist you today?
Customer: I was talking to Rahul earlier, and he mentioned that my modem might be
malfunctioning. As a retired teacher, I cannot afford a new modem. I am considering
canceling my Internet Service and switching to another provider. Can you transfer me
to the cancellation department?
CCE: I am really sorry to hear about your experience, ma'am. We truly value you as a
customer and I am here to assist you. Let's start by confirming your account number.
Is that alright with you?
Customer: I have already provided my number before, but here it is again: 860-995-
****. My name is Rajshree Basu.
Manager: Your Free Modem Replacement Order Number is WN 893-7873. You will
receive it by tomorrow. In case you need help with setup, we have our 24/7 Technical
Support hotline available to guide you through it. Anything else I can help you with?
Customer: I am speechless, Sanjukta, all I can say now is THANK YOU!
Manager: You are most welcome, Mrs. Basu. I am glad I could assist you!
Customer: Yes, Sanjukta, you did, sweetie! Goodbye!
Manager: Thank you, Mrs. Basu, and once again, I am Sanjukta. Thank you for
choosing ABC Internet! Have a great day!
Manager: Thanks again, and goodbye!
Activity 1
Practical Activity 2.1. Visit a customer care center and observe its working.
Step 1. Go to any nearby customer care center.
Step 4. Ask them the challenges they face while handling the customer.
Summary
• Each company employs a query-management system that helps customer care
executives categorize and organize customer inquiries for quicker and more efficient
issue resolution.
• Confirming crucial details back to the customer through phrases like "Okay, just to
recap," assures them of your attentive approach.
• A service-level agreement (SLA) is a formal definition of services within a service
contract.
• Agreements with specific customer groups encompassing the range of services they
utilize.
• User Guide
• Knowledge Base
• Issues and workarounds
Moderators should consistently refer to and review supporting documents before
proposing solutions. Although a leader might believe certain steps can resolve a client's
issue, it is prudent to consult the supporting documents every time to minimize the
margin of error. Let's see a case study to illustrate this concept more effectively.
3.2. Case Study: How to Refer to the Supporting Material Case Study: How to Refer
to the Supporting Material
Your organization's knowledge base and how to use this to identify solutions.
Mrs. Kapoor, a doctor, has been encountering issues with her XYZ Company laptop for
the past two days. The laptop fails to boot, leaving her frustrated, prompting her to
contact the customer care representative for assistance.
CCE: Good morning and welcome to XYZ Laptops. How can I assist you today?
Mrs. Kapoor: Good morning. I have been using an XYZ laptop for the last six months.
Unfortunately, it stopped working a couple of days ago. Can you please fix it as soon as
possible? It's urgent.
CCE: I apologize for the inconvenience you are facing with your XYZ laptop. Rest
assured, we will do everything possible to resolve this issue urgently. We understand
the urgency and frustration you are experiencing.
Mrs. Kapoor: Yes, I have not been able to boot it up since the day before yesterday.
CCE: I am truly sorry for the trouble. Could you provide more details about the exact
issue so that we can resolve it promptly?
Mrs. Kapoor: I have already mentioned it is not booting up.
CCE: Ma'am, could you let me know if the laptop isn't turning on at all, or if it is powering
up but not reaching the user interface?
Mrs. Kapoor: I do not understand all the technical terms. When I turn it on, the logo
appears, then the screen goes black.
CCE: Just to clarify, when you power on the laptop, it shows the initial logo, but then
the screen goes blank.
Mrs. Kapoor: Yes, exactly. What should I do now? Should I take it to a service center
and pay for repairs?
CCE: No, ma'am. This seems to be an issue with the operating system and the laptop
not fully booting up. We can resolve this over the call, and there won't be any charges.
Mrs. Kapoor: Really? Please do that.
CCE: Ma'am, I would like to go through the problem in detail to provide the best solution.
Give me 2 minutes to check my resources and fix this issue for you.
Mrs. Kapoor: Sure, but please be quick. I am in a hurry.
CCE: Absolutely, I will return in a couple of minutes.
Mrs. Kapoor: Okay.
The executive should use the time given by the customer to check helpful information
for fixing the laptop issue. If the executive tries to solve the problem without looking at
this info, mistakes might happen. So, it is important for the executive to use this time
wisely to find the right solution.
Now, the CCE looks for the solution in the knowledge base and is back to the customer.
CCE: Thanks for waiting, ma'am. After checking, I am confident we can fix this.
Mrs Kapoor: Yes, please hurry. I am in a rush.
CCE: It is an issue with the operating system. It might be damaged, preventing the
laptop from starting. We will reload the operating system to solve it.
Mrs Kapoor: How do I do that? I am not good with tech stuff.
CCE: Do not worry. I will guide you through the steps. They are straightforward and
would not take long.
Mrs Kapoor: What should I do?
CCE: When you got the laptop, did you receive a CD with the operating system?
Mrs Kapoor: Yes, I did, but a friend helped set it up. I Do not know much about it.
CCE: I understand. Could you get the CD you got when you bought the laptop?
Mrs Kapoor: Sure, it's here. Should I put it in the laptop?
CCE: Perfect. Insert the CD into the laptop's CD drive and turn it on.
Mrs Kapoor: Okay, give me a moment, please.
CCE: Of course, take your time.
(After a few seconds…)
Mrs Kapoor: I have put in the CD and turned it on. What's next?
CCE: Do you see a menu asking how you'd like to start the laptop—HDD, CD, USB
drive?
Mrs Kapoor: Yes, it is asking to choose the boot option. Should I pick a CD/DVD?
CCE: Yes, exactly. Select that option and press enter.
Mrs Kapoor: Got it. Wait, it is asking if I want to install the OS. Yes or No?
CCE: Please click Yes. It will reload the operating system since the previous one is
corrupted.
Mrs Kapoor: Alright, it's reloading now. Will it work again?
CCE: Yes, it should. Sometimes downloading corrupt files can damage the OS, but this
should fix it.
Mrs Kapoor: Will I lose my files?
CCE: No worries. Your files would not be affected.
Mrs Kapoor: It's restarting. Should I stop it?
CCE: Let it restart. We will see if the issue is resolved.
Mrs Kapoor: It's working! That's a relief. Thank you so much.
CCE: Happy to help! Can you confirm if your files are still there?
Mrs Kapoor: Yes, they are all here. Thank you!
CCE: You are welcome. Anything else I can assist you with?
Mrs Kapoor: No, that's all.
CCE: Thank you for choosing XYZ Laptops. Have a great day!
Standard procedures often involve leveraging support materials, such as case studies,
to illustrate various actions or tasks. These documents serve as guides and should be
referenced regularly when carrying out specific actions or tasks.
When accessing support documents, it's crucial to note that they may contain multiple
updates about a specific product or service. Being familiar with recent updates is
essential. Therefore, revisiting the knowledge base regularly proves useful and
necessary for employees to stay informed about these changes.
3.3. Raising service tickets
A service request typically involves a user seeking information, advice, or assistance
related to a standard change or accessing a computer science service. An example of
such a standard requirement is a password reset. These requests are typically managed
by the Service Department and Do not necessitate the submission of an RFC (Request
for Change). The process, starting from receiving a customer's call to generating a
service request, involves multiple systems.
The process remains consistent:
Answer calls and welcome customers.
Listen attentively to customer concerns and document them.
Reassure customers that problems will promptly be addressed and resolved.
If the problem exceeds the designated scope, create a service request for review by the
relevant individuals.
Inform the customer that the service request has been registered and provide the service
request numbers for future reference.
When sharing information with customers about progress, like the status of a
settlement, ensure it's factual. For example, if a customer reports a problem with their
satellite dish and initial checks reveal technical issues requiring field technicians,
inform the customer accordingly. Create a service request for the issue, check for
available field technicians in the area, and gather all relevant details. Once you have a
complete update, share the settlement progress with the customer without giving false
expectations, as illustrated in Figure 3.2.
Fig. 3.2: Raise service ticket and share the exact information with the customer
Table 3.1: Essential fields of a service request
Field Description
Summary A short description of the request.
Reporter The person who submitted the request
Urgency The time available before the business feels the service request's impact.
Pending A short description or code that indicates why the service request is not
reason progressing.
Product
A category of IT asset or system that the request effects.
categorization
Operational
A category of action or function required to fulfil the request.
categorization
Activity 1
Practical Activity 3.1. Handling Objections and Conveying Concern
Step 1. Divide students into pairs, assigning one as the Customer Service
Representative (CSR) and the other as the Customer.
Step 2. Provide each pair with the following role-play scenario to enact.
Role-Play Scenario:
Role 1: Customer Service Representative (CSR)
Role 2: Customer
CSR: "Thank you for choosing XYZ Internet. I am Neha. How can I assist you today?"
Customer: "I have been facing internet issues and want to cancel."
CSR: "I understand. Let's confirm your details first. Can you provide your account
number?"
Customer: "Sure, it's 123-456-7890."
CSR: "Thank you. And the last four digits of your SSN?"
Customer: "It's ****."
CSR: "I'll connect you with a senior rep to resolve this. Please hold on."
Manager (Joining the Call): "Hello, I am Sanjukta, the Customer Service Manager.
What issues are you facing?"
Customer: "I've had recurring problems and thought of canceling."
Manager: "I apologize. Let's upgrade your modem and offer faster speeds for free.
Would that help?"
Customer: "That's amazing! Thank you!"
Manager: "Here's your order number. Anything else?"
Customer: "I'm speechless, thank you!"
Manager: "Thank you for choosing XYZ Internet! Have a great day!"
Manager: "You're welcome! Your Free Modem Replacement Order Number is WN 893-
7873. In case you need help with setup, our 24/7 Technical Support is available.
Anything else I can assist you with?"
Customer: "I am speechless, thank you!"
Manager: "Thank you for choosing XYZ Internet! Have a great day!"
Summary
• Support materials may come in various forms. Those are:
• Users’ Manual
• Knowledge Base
• Issues and Resolutions
• Executives should refer to supporting materials before offering resolutions.
• A Service Request involves a user seeking information, advice, a standard change
(pre-approved and low-risk), or access to an IT service.
• The process from receiving a customer call to raising a service request involves
multiple systems.
2. Service requests typically involve users seeking information related to major system
overhauls.
3. The process of handling a service request starts with listening attentively to
customer concerns and documenting them.
4. A service request's priority indicates its urgency and impact on business needs and
goals.
5. Referencing the knowledge base regularly is not necessary for staying informed
about recent updates.
6. The Impact field in a service request refers to the time available before the business
feels the request's impact.
7. The Reporter in a service request is the service desk agent assigned to fulfill the
request.
8. Labels in a service request are used for categorizing or querying records.
9. Service Level Agreements (SLAs) are not affected by the urgency of a service request.
10. Service tickets are primarily raised to prioritize customer requests.
D. Answer the following questions in short
1. Why is it essential for customer service representatives to refer to support
documents regularly?
2. How can referencing case studies or support materials benefit the resolution of
customer issues?
3. What steps can be taken to ensure accurate understanding of a customer's query
during an interaction?
4. In what ways does revisiting the knowledge base regularly prove beneficial for
employees?
5. What are the key fields in a service request, and why are they crucial?
6. How does summarizing a customer's query help in effective query management?
7. Why is it important to accurately document customer concerns during service
interactions?
8. What role does a service ticket play in the customer query resolution process?
9. How can service tickets aid in organizing and prioritizing customer inquiries?
10. What are the strategies to streamline the documentation process for customer
queries?
11. Amount to be calculated as Price * Qty.
Customer Query are the request received for information regarding the products,
services or related processes, or to carry out a transaction or action in relation to any
such product or service. A query can give you an answer to a simple question, perform
calculations, combine data from different tables, add, change, or delete data from a
database. There are different types of customer and the CRM representative need to
understand their query and apply the appropriate technique to resolve their queries. It
is shown in Figure 4.1. There are standard types of procedures available to resolve the
customer queries.
simply rescuing them from a mistaken purchase is not sufficient if they buy something
without understanding it.
Angry customers – Having a clear strategy for upset customers is crucial, avoiding any
sense of uncertainty that might worsen their frustration. Stay composed and articulate
while explaining the steps to resolve their issue. When facing rudeness, try not to take
it personally; the customer might view you as part of a system that causes them trouble.
It is valuable to gather feedback from unhappy customers as it could highlight areas for
enhancing their overall experience in the future.
Insistent customers – When handling a self-righteous customer, it is vital to
demonstrate a more effective solution to their problem. Having readily available
knowledge bases or informative content can significantly enhance this process.
Being nice and helpful to self-righteous customers is really important because they like
feeling important. If they think the support is talking down to them, they might get upset
and unhappy. Being respectful keeps them happier.
Loyal customers – Loyal customers bring immense joy to sales because they have been
around for a long time. But this also means the support team faces extra pressure to
know and handle all their particular needs.
When loyal customers share their experiences on social media, it can boost organic
marketing for your business since they are already interested. But for this to happen,
their support experience must be positive. Even if the issue is not entirely your
company's fault, offering discounts or loyalty rewards can satisfy them and boost sales.
This increases the chances of them recommending your business to potential
customers.
4.2. Design various problem-solving approaches in different situations
Field Description
Summary A short description of the request.
Reporter The person who submitted the request
Segments of your IT infrastructure that relate to the request.
Component/s For example, "Billing services" or "VPN server". These are used
for labelling, categorization, and reporting.
Attachment Files or images added to the request.
Description A long, detailed description of the request.
A list of other requests that affect or are effected by the request.
Linked Issues If your business uses other multiple products, this list may
include linked development issues.
Assignee The service desk agent assigned to fulfil the request.
The importance of the request's resolution to the service desk.
Priority Usually in regards to your business needs and goals.
Sometimes calculated by impact and urgency.
A list of additional custom labels used for categorizing or
Labels
querying records.
Focus Groups – This method of data collection relies on thorough group discussions
covering various topics, such as marketing strategies, the evolution of data, sources and
searches, coding, programming languages, or even debugging.
Assignment 4.2.
• List down the different techniques used to obtain data/information.
• List down the advantages of creating and maintaining templates.
• List down the different types of customers.
4.6. Rule-Based Analysis on the Data/Information
Rule-based analysis essentially entails a decision-making process or conditional
branching. It's a methodological production design grounded in software elements,
analyzing techniques to make informed decisions for a new project.
This rule typically involves three or more conditions, resembling pseudo-code or if
statements. The aim is to meet performance requirements through the application of a
rule engine solution.
4.6.1. Process of Application
Select the input variables – When dealing with various variables in a new project, it is
important to create a matrix that correlates methodologies with factors. This helps
identify how factors are present within different methodologies.
Bad Sub Rules – Some types of factors cannot be linked to other types. Combining them
might create ineffective sub-rules. This situation identifies two distinct rule categories.
They are:
System rules with high stability requirements, low complexity, and small system size.
System rules with low stability requirements, medium complexity, and system size.
Variable Reduction – Identifying these factors is important, but removing them does
not usually have a significant impact. These factors typically involve the application
domain and project type.
Category Merge – To identify the methodology, various categories are formed, often
based on the project type as their foundational element.
Hypothetical Examples – By examining extreme cases, we can observe the inception
of hypothetical example sets. Rule-based analysis acknowledges factors such as lower
complexity, high requirement stability, and smaller size as key components.
4.6.2. Check the Event of Inaccurate Data/Information
In most large organizations, a hierarchical structure prevails, characterized by a single
or a group holding top power, followed by successive levels of authority. This setup is
common among corporations, governments, and organized religions, establishing
different tiers of management and power.
4.6.3. Check the accuracy of work, involving colleagues and the formats in which
you need to provide it
Each project operates within a set timeline. It kicks off by establishing a goal and
proceeds through stages such as development, testing, quality analysis, and ultimately,
deployment.
4.6.4. Set-up Goals
Each stage requires a specific format for accurate information entry. A project goal
template should be consistently used, and details need to be regularly updated. Here is
an example format: As illustrated in Figure 4.2.
Customer service covers every interaction, even when a company representative meets
the customer face-to-face. For instance, a business might send its sales or support team
to meet customers directly, and how well they handle customer problems becomes really
important for good service.
Companies are giving their field teams mobile devices that connect to the internet
wirelessly. This helps the team access up-to-date information and customer data from
anywhere they work.
4.4.3. Technology: Text Messaging
Text messaging, once seen as something just for teens, is now a tool for customer
service. Lots of businesses and even colleges use it to talk to customers. For instance,
colleges have text systems for quick alerts about emergencies or weather problems on
campus.
4.4.4. Technology: Internet Phone Support
Even with the Internet available for customer queries, many people still prefer talking
directly to someone on the phone or through a chat. To handle this, businesses use
Voice over Internet Protocol (VoIP), which sends phone calls over the Internet. Multiple
phones share the same connection, making calls cheaper. Although the call quality
might not be as perfect as regular phones, recent improvements have made it hard for
most customers to notice a difference.
4.4.5. Technology: Smart Call Routing
Technology for phone support has evolved to identify and sort incoming calls. Software
can recognize the caller based on their phone number and then direct the call to the
right service. For instance, an appliance company can separate callers who purchased
a refrigerator from those who bought a microwave oven, guiding them to the relevant
support team.
4.8. ACD Phone
The ACD phone, or Automatic Call Distributor phone, is more than just an ordinary
phone. It is equipped with specific features to manage and route incoming calls
effectively. As illustrated in Figure 4.3.
Module Overview
Customer relationship management (CRM) is a technology for managing company’s
interactions with customers. CRM technology helps companies stay connected to
customers, streamline processes, and improve profitability. CRM Software is designed
to help businesses and customers for interaction. CRM software helps to track each
interaction happened with a customer. It can include sales calls, customer service
interactions, marketing emails, and more.
CRM tools can unify customer and company data from many sources and even use AI
(artificial intelligence) to help better manage relationships across the entire customer
life cycle, spanning departments like marketing, sales, digital commerce, and customer
service interactions.
This software falls in three main types of CRM systems – collaborative, analytical, and
operational. There are various examples of CRM software. It depends on the requirement
of company to choose a best suitable CRM software. Many CRM software providers offer
free trials, too, so you can test a free CRM and if it’s right for your business.
Zoho Corporation is an Indian multinational technology company that makes computer
software and web-based business tools. Zoho is a CRM software system that helps
businesses with customer engagement, revenue generation and converting more leads.
It is fully cloud-based, integrated, and offers a variety of features including lead
management and scoring, workflow automation.
In this unit, you will learn about the most popular CRM software, “Zoho Desk”. It covers
introduction to Zoho Desk, Essential Functionalities of Zoho Desk, Specifications in
Zoho CRM. We will also Creating a Zoho Sign account. Then, we move to Managing
Data, focusing on Manage Data, Manage Data Storage Space, and Manage File Storage.
Then, we discuss "Importing and Exporting Data," emphasizing Importing Data to Zoho
CRM, and Export CRM Data. Lastly, we discuss " Creating Contacts” covering Creating
Contacts, Create Contact Individually, and discussed about Work with the Contacts
details page. This unit equips you with essential knowledge and skills in ZOHO CRM
SOFTWARE.
Learning Outcomes
After completing this module, you will be able to:
• Understand the basic features and functionalities of Zoho Desk, including ticket
management, customer interactions, and workflow automation.
• Learn how to efficiently organize, update, and manage customer data within Zoho
Desk to streamline support processes.
• Demonstrate the process of importing and exporting data in Zoho Desk, ensuring
seamless data integration and backup.
• Acquire skills in creating and managing contacts within Zoho Desk, ensuring
accurate and up-to-date customer information.
Module Structure
Session 1: Zoho Desk
Session 2: Managing Data
Session 3: Importing and Exporting Data
Session 4: Creating Contacts
Czech Czech
1.3.3. System Requirements
Zoho CRM operates as a cloud-based application, meaning the software and data aren't
stored on your local computer's memory. Because it relies on remote servers,
continuous internet connectivity is necessary to access Zoho CRM. No file downloads or
installations are needed on your computer to utilize the CRM.
Zoho CRM is designed to be compatible with standard system configurations as per the
following details.
System Configurations
Operating System Windows, Linux and Mac OS X
Safari 13
Google Chrome 73
Web Browser Mozilla Firefox 69
Edge 79
Opera 60
Enable JavaScript
Enable Cookies
Other requirements Install Acrobat reader (optional)
Install Spreadsheet viewer
(optional)
Note: You may not be able to access Zoho CRM if you have enabled the Compatibility
mode in Internet Explorer.
1.3.4. Storage Space
In Zoho CRM, storage space is categorized into two sections: Data and File, providing a
clearer breakdown. These categories are then subdivided into storage and usage details
for better organization.
Data storage – Data storage encompasses the total space utilized by records within
both standard and custom modules, inclusive of notes attached to these records. This
measurement also accounts for the space occupied by data stored in your recycle bin.
File storage – File storage covers the space used by images, attachments (both in
records and emails), email templates, and documents linked to specific records. Within
file storage, you can view a breakdown of storage usage based on features such as mail-
merge and documents. Additionally, this storage accounts for data and files stored in
the recycle bin.
1.4. Creating a Zoho Sign account
To access Zoho Sign and other Zoho services as a new user, creating a Zoho account is
necessary.
Step 1. Visit the website of Zoho Homepage as shown in Figure 1.2.
Note: This option is used to configure the default settings. These settings can be
edited for individual documents while sending.
1.7.3 Recipient Authentication
Configure recipient authentication settings in this section. Additionally, choose the
mode of OTP delivery.
To set the delivery mode for authentication:
Step 1. Activate the “Enforce Authentication” checkbox.
Step 2. Select the preferred authentication code delivery mode as illustrated in Figure
1.18.
3. Note that only custom domains (e.g., zylker.com) can be verified. Domains like
gmail.com and zoho.com cannot undergo verification.
Summary
1. Zoho Desk – Provides efficient customer support via multiple touchpoints, agent
productivity tools, a Help Center, automation, reports, and secure data
management.
2. Zoho CRM – Offers five editions, supports various languages, operates as a
cloud-based system, and manages storage categorically.
3. Zoho Sign allows users to set up an electronic signature using three methods:
___________, ___________, and ___________.
4. To access Zoho Sign as a new user, creating a Zoho account using an email or using
___________, ___________, or ___________ account is necessary.
5. Recipient authentication settings in Zoho Sign help configure the mode of
___________ delivery.
6. Zoho Desk allows gathering customer inquiries from various sources like ________,
email, social media, or web forms.
7. Data storage in Zoho CRM encompasses the total space utilized by records within
both ________ and custom modules.
8. Zoho Sign provides three methods to set up an e-signature: ________, Draw, Upload.
9. Zoho CRM is a ___________ application.
10. Zoho CRM supports multiple operating systems including _____________.
C. State whether the following statements are True or False
1. Zoho Desk primarily focuses on sales automation.
2. Zoho CRM supports 28 different languages.
3. Zoho Sign administrators cannot modify organization details.
4. Zoho CRM requires file downloads for local storage.
5. Zoho Sign offers recipient authentication settings but doesn't provide email delivery
configuration options.
6. Zoho Desk requires file downloads and installations on the local computer to utilize
the software.
7. Zoho CRM offers support for 25 languages.
8. Automatic Reminders and Send in Order are options available within Request
Defaults in Zoho Sign.
9. Continuous internet connectivity is not necessary to access Zoho CRM.
10. Zoho Sign allows users to create, edit, and oversee document folders and document
types.
D. Answer the following question in short
1. What are the core functionalities of Zoho Desk?
2. How does Zoho Desk facilitate customer inquiries from various sources?
3. Name two ways Zoho Desk enhances agent productivity.
4. Explain the purpose of the Help Center in Zoho Desk.
5. What tasks can be automated within Zoho Desk?
6. How does Zoho Desk enable assessment of help desk operations?
7. What are the editions offered by Zoho CRM?
8. What system configurations are compatible with Zoho CRM?
9. How is storage space categorized in Zoho CRM?
10. What are the key functionalities of setting up a Zoho Sign account?
2.1.2. Export
You have the option to export data in CSV format from individual CRM modules within
your CRM account. You can manually export records or request a data backup for
convenience as illustrated in Figure 2.2.
Free 1GB -
Assignment 9.1.
List down the steps to view the file storage.
List down the space occupied by data and files in the recycle bin.
Summary
• Efficient CRM management involves importing and exporting data, deduplicating
records, and using advanced filters for sorting.
• Navigation at page and record levels aids in data access, while bulk actions
streamline operations and the CRM calendar organizes events.
• Data storage includes categorized space for records, notes, and emails, while file
storage covers images, attachments, and templates.
• Various editions of Zoho CRM offer different file storage capacities, and the
system segregates storage and usage details for user oversight.
in the CRM's drop-down list. If values don't match, either adjust the source file values
or have the administrator add the new values to the CRM.
If values are not included in the drop-down list, you can still import data. However, if
you alter the field value post-import to a value not in the list, you won't be able to revert
to the old value as it won't be available in the list.
Field Names: Ensure that the initial row of data in the source file includes column
headings or field names rather than the actual data values. These heading field names
aid in identifying the data when mapping new information to existing fields in Zoho
CRM.
Export CRM Data: Exporting data from your CRM can serve various purposes based
on your requirements. Common needs for exporting data include segmenting
customers, collaborating by sharing data, fulfilling compliance-related requirements,
generating reports, and archiving your data.
3.1.2 Options Available
There are three export-related options in Zoho CRM:
1. Export module data
2. Take a complete backup
3. Export reports
1. Export module data
You are allowed to export a maximum of 200,000 records from a single module at a
time. These will be the oldest 200,000 records meeting your export criteria. The exported
records, in CSV format, will be compressed into a zip file. The download link for the
export will be accessible for 7 days.
Limits for number of exports per day will vary based your CRM's edition:
1. Free - 10
2. Starter - 50
3. Standard - 100
4. Professional - 250
5. Enterprise - 500
6. Ultimate – 1000
Note: If you need to download more than 200,000 records from an individual module,
you can: Set criteria based on Created Time to create and download multiple exports
To export data
1. Click on Setup (located near the top-right corner).
2. Proceed to the Data Administration section and select Export.
3. Within the Export Data page, click on "Start an Export." As illustrated in Figure 3.1.
If you want to quickly export a custom view, you can initiate it from the Actions menu
in a module page. To do this, you should:
1. Select a custom view in a module page.
2. Click the Actions button and select Export Contacts, as illustrated in Figure 3.8.
Assignment
List down the three export-related options in Zoho CRM.
List down the Limits for number of exports per day will vary based CRM's edition.
Summary
• Importing Data: Crucial for lead creation, allows import from individual modules or
other CRM systems via the Data Migration wizard, with a checklist for proper
formatting and field mapping.
• Exporting CRM Data: Offers three options—module data export, complete backup,
and export reports—with varying daily export limits based on CRM editions, using
specific steps for exporting chosen data criteria.
Assignment 4.1.
List down the steps to view the contacts details page.
List down the steps to clone contacts.
List down the ways to create contacts individually.
1. _______ is the method where visitors can submit their contact details directly on a
website.
2. Cloning contacts allows for the _______ creation of similar contacts based on existing
details.
3. The Contact Details page in Zoho CRM provides a comprehensive view of a contact's
_______ within your CRM.
4. ____ synchronization enables contacts from Microsoft Outlook to sync with Zoho
CRM.
5. Lead Conversion in Zoho CRM involves converting _______ into contacts.
6. The "Send Mail" button in the Contacts Home Page allows users to send _______ to
selected contacts.
7. The "Timeline" view on the contact's details page shows a history of actions in the
last _______ months.
8. The "Action" button on the Contacts Home Page allows for mass _______ or transfer
of records.
9. The "Advanced filters" in Zoho CRM help in sorting contacts according to _______
priorities.
10. Predefined system list views such as "My Contacts" or "New This Week" are available
for use in the _______ section.
C. State whether the following statements are True or False
1. The Web Form Capture method in Zoho CRM is used for importing contacts from
external databases.
2. The process of cloning contacts allows for the creation of entirely new contacts from
scratch.
3. The Contact Details page in Zoho CRM displays only basic contact information.
4. Outlook Contact Sync allows synchronization of contacts from Google Gmail to Zoho
CRM.
5. Contacts cannot be associated with any other records in Zoho CRM.
6. The "Timeline" view on the contact's details page displays actions performed in the
last six months.
7. The "Action" button on the Contacts Home Page in Zoho CRM allows customization
of contact details.
8. Lead Conversion involves converting potential sales leads into contacts, accounts,
and deals if required.
9. The "Send Mail" button in Contacts Home Page allows for sending mass emails to
selected contacts.
10. The "Advanced filters" in Zoho CRM are only used for searching contacts
alphabetically.
D. Answers the following questions in short
1. What are the various methods available to create contacts in Zoho CRM?
2. How can contacts be created through the manual entry method?
3. What is the purpose of web form capture in Zoho CRM?
4. Explain the process of creating contacts through lead conversion.
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 149
5. What is the advantage of using the Outlook Contact Sync feature in Zoho CRM?
6. How many ways are there to create contacts individually, and what are they?
7. Describe the steps to create a contact individually in Zoho CRM.
8. How can you clone existing contacts in Zoho CRM?
9. What information is accessible on the contact's details page in Zoho CRM?
10. How can contacts be associated with other records in Zoho CRM for a
comprehensive view of engagements?
Module Overview
The work culture in IT industry is different from routine office work, where working
hours are also not fixed. Continuously working in front of the computer creates health
problems especially in your eyes. Adopting the safe work practice in the work place, the
productivity can be increased.
This Unit deals with the concept of working environment in IT industry. It focuses on
safe working practices at work place. It explains about health-related problem caused
by the wrong practices and its solution. It also gives the knowledge about resources
required in workplace for smooth working. Further it explains how to deal with computer
component and problem related to electrical hazards. It also explains workplace safety
guidelines, workplace hazard and its control. The medical emergency situations and its
solution is illustrated.
Learning Outcomes
After completing this module, you will be able to:
• Understand the essential health, safety, and security measures necessary to
maintain a safe work environment and protect employees.
• Learn to identify and implement quality measures in the workplace to enhance
productivity, efficiency, and overall service standards.
• Develop skills to respond effectively to workplace accidents and emergencies,
including prevention strategies and emergency response protocols.
Module Structure
Session 1: Health, Safety and Security at Work Place
Session 2: Workplace Quality Measures
Session 3: Accidents and Emergencies
risks, and carry on the essential improvements within the organization. Because of such
reports, companies can recognize long-term risks and short-term risks and achieve
remedial actions for those risks. In case of security-related issues or health-related
issues, it is always a better choice to inform your supervisor or seniors.
A company can function in a systematic, smooth and successful way if it looks after the
satisfaction of its employees. OH & S is one of the safety platforms where every
corporation has to meet the safety guidelines.
Government Agencies for Safety at Workplace
As per Indian constitution there are the specific articles to ensure occupational safety
and health for workers are: 42, 39 (e, f), and 24. Some government agencies that look
into the safety and security of individuals at the workplace are follows:
• Labour Departments (for both UT and State)
• Ministry of Labour
• Government of India
• NSCI (National Safety Council of India)
• National APELL (Awareness and Preparedness for Emergencies at Local Level)
1.3 Workplace Safety Hazards
The most common definition of hazard is ‘a danger or risk’ that is associated with
something. Something can even be considered a hazard if it would be a trigger for
causing another hazard to become present, which could hurt someone or something in
the area. Workplace hazards pose potential harm to people at work, and that can cause
damage to the work environment and everything else in it. Hazards could cause adverse
health effects and losses of property and equipment for organizations.
There is a common way to classify hazards, and not all these are present in all
workplaces. In some industries like manufacturing and pharmaceuticals, there are
biological and chemical risks that pose risks to the workers. Physical dangers are
present as well in many industries where there is exposure to electricity, radiation,
extreme pressures, noises and magnetic fields. On the other hand, ergonomic hazards
are present in facilities where there are repetitive movements and where workstations
are set up haphazardly. But it can be generalized that in all these classifications, there
are always safety hazards that come up along with the highlighted workplace dangers.
Physical hazards – It is the risks arising from the physical work environment – floors,
facilities, walls, and ceilings. Physical hazards could also mean working with machinery
and electricity-operated machines. Work processes or specific assignments could also
qualify as areas where physical hazards are present. There is a vast list of physical
hazards across all industries, but when we look at one specific sector, these dangers
are also particular to the work setting.
Falling off heights, slipping and tripping – The reasons for falling are attributed to
faulty scaffolding and ladders, as a result of contact with electricity, and slipping or
crashing into anything that throws the worker off balance. On the other hand, trips and
slips happen right on lower levels, particularly the floor, on ramps and any uneven
surface in the workplace. Various injuries result from simply tripping over things at
work, while many more accidents take place when employees slip on the floor, from
motorized vehicles or from scaffolding or ladders.
To avoid falls and slips, all things must be arranged properly. Any spilt liquid, food or
other items such as paints must be immediately cleaned to avoid any accidents. Make
sure there is proper lighting and all damaged equipment, stairways and light fixtures
are repaired immediately.
aware of the organisation's policies to fight against all the given hazards related to a
working environment.
Hazard Control
Hazards that have been identified and assessed as priorities are required to implement
adequate control measures. Control measures should follow the hierarchy with a strong
emphasis on eliminating hazards at the source, whenever possible.
• Take all feasible measures to eliminate the hazard, for example, by substituting
or modifying the process.
• If elimination is impractical or remains incomplete, take all feasible measures to
isolate the hazard, for example, instituting engineering controls such as
insulating noise.
• If it is totally impossible to eliminate or isolate the hazard, its likelihood to cause
injury should be minimized. Ensure that effective control measures are being
applied, such as installing proper exhaust ventilation and providing personal
protective clothing and equipment that is properly used and maintained.
Safety Guidelines Checklist
1. Store all cleaning chemicals in tightly closed containers in separate cupboards.
2. Throw rubbish daily.
3. Make sure all areas have proper lighting.
4. Do not wear loose clothing or jewellery when working with machines.
5. Never distract the attention of people who are working near a fire or with some
machinery, tools or equipment.
6. Shut down all machines before leaving for the day.
7. Do not play with electrical controls or switches.
8. Do not operate machines or equipment until you have been properly trained
and allowed to do so by your supervisor.
9. Repair torn wires or broken plugs before using any electrical equipment.
10. Do not use equipment if it smokes, sparks or looks unsafe.
11. Cover all food with a lid, plastic wrap or aluminium foil.
12. Do not smoke in ‘No Smoking’ areas.
13. Report any unsafe condition or acts to your supervisor.
Summary
• Safety breaches in the designated premises are “Incidents” that need to be
reported and duly responded to.
• The full form of EHS is Environmental Health and Safety.
• The first rescuers will make the vic m sit reach under their armpits and grab their
wrist.
• Informa on based on organizational meetings with the Area Health and Safety
Committee.
• One must rationally and critically think and assess the severity of the emergency
and determine what requires to be done on an immediate basis.
• First Aid is an emergency care or treatment given to an ill or injured person before
regular medical aid can be acquired.
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 157
5. Bright light sources behind the display screen can create contrast problems
6. Exposure to bright lights and toxic fumes and vapour could damage the mouth
and ears.
7. The use of personal protective clothing and equipment can control the hazards
at the workplace.
8. Do not throw rubbish daily.
9. Proper handling of office equipment can result in injuries.
10. Stress at the workplace can cause hazards in today’s organisation.
D. Short Answer Questions
1. Briefly explain the concept of health, safety and security at the workplace.
2. State the most important reasons for health, safety and security programs in
workplace
3. List out the various workplace safety hazards.
4. List out the potential sources of hazards in an organization.
5. List some of the IT workplace hazards.
6. What are the examples of potential hazards?
7. Describe information technology workplace hazards?
8. What are the workplace safety rules?
9. List out different safety guidelines?
10. Describe the type of emergency with an example?
1. Air pollution is mostly caused by production of the dust, a mixture of solid particles
and gases in the surrounding air. So avoid dust production, generation of solid
particles and gases in the air.
2. Extensive use of automobile vehicles in the campus can lead to air pollution. So
organisations must use a limited number of vehicles to avoid air pollution. Practice
a no vehicle day every week.
3. Ozone produced in the air can pollute the air. Many times it is called smog. The
generation of ozone gas must be kept at low level by the organisation.
4. Most of the human activities make the surrounding water polluted. The sewage or
the wastewater can also cause water pollution. Take care that their waste is not
mixed with the surrounding water.
5. Extensive use of fertilizers and pesticide must be avoided as it can make the ground
water polluted.
2.2 Importance of cleanliness at workplace
It is always safe to keep your workplace clean to avoid hazardous work. The poor
handling and storage practices result in damages. A clean work station makes your job
easier and more pleasant. Common areas should be cleaned up by all personnel, when
necessary.
• All areas must be kept neat and clean. Each employee is responsible for the
cleanliness of their work area and all tools and equipment used.
• Spills and breakage are to be cleaned up immediately.
• Spaces around machines and equipment should be kept clear and clean at all times
to permit free movement.
• Floors should be kept clean and clear to prevent slipping and collision.
• Lighting fixtures are to be checked regularly to permit clear vision. Faulty lights
should be reported to administration, so that building maintenance/ facilities can be
contacted to rectify the situation.
2.3 OFFICE ERGONOMICS
Ergonomics is the science concerned with designing and arranging things so that people
can use them easily and safely. Applying ergonomics can reduce the potential for
accidents, injury to improve performance and productivity. In an office setting, the
repetition of a seemingly innocuous task over a period of time can cause an injury. The
resulting injuries can be physically painful and rehabilitation can be difficult and time
consuming. The following office ergonomics emphasize the identification of early
warning signs.
Early Warning Potential Cause Try This
Signs
Sore lower back No lumbar support Use backrest of chair, put small
pillow or lumbar support on
backrest of chair
Burning in the No upper back support from Put document holder or prop up
upper back chair so you can see without leaning
forward
Stiff neck Working with head turned to Move or raise monitor to centre
side tilting head forward of desk check if headset is
holding telephone between the available
ear and shoulder
Sore shoulders Reaching forward for long Move closer to the keyboard,
periods or reaching forward Bring mouse down to level of
frequently keyboard or 1” higher
Arching wrists Working with wrists extended Add a wrist rest to the front of
too much repetition keyboard and mouse pad rest
thumbs on front edge of
keyboard so wrists can’t drop.
Dry eyes Forget to blink Rest eyes periodically and do
simple eye exercises
Eye strain and Glares from overhead lights or Re-orient your desk and
sore eyes windows eye glasses not computer so light is not directly
correct need vision check behind or in front of you.
Computer Health & Safety Tips
With the increased use of computers, several health and safety issues related to vision,
musculoskeletal issues, body aches and pains may occur. Many of these issues are
preventable and if incurred are temporary. They can be resolved by adopting simple
corrective action.
Musculoskeletal Problems
This problem includes different areas of your body such as neck, back, chests, arms,
shoulders and feet. It occurs because of your wrong posture, uncomfortable chair for
sitting that is not ergonomically correct while working on the computer.
• Place the keyboard at a slight negative tilt if you are sitting upright.
• While typing, keep your hands slightly lower than elbows, with fingers pointing
downwards at the floor.
• Minimize any twisting of your wrists from side to side or up and down.
• Use a keyboard palm rest as needed only when you are not typing. Do not rest
your wrists when typing. It leads to wrist strain.
• Always take small breaks while working on the computer to stretch your muscles,
keep your blood flowing, and to rest your eyes.
Occupational Overuse Syndrome
Occupational overuse syndrome, also known as repetitive strain injury (RSI), is a
collective term for a range of conditions, characterized by discomfort or persistent pain
in muscles, tendons and other soft tissues, with or without physical manifestations. It
is usually caused or aggravated by work, and is associated with repetitive movement,
sustained or constrained postures and/or forceful movements. Psycho-social factors,
including stress in the working environment, may be important in the development of
occupational overuse syndrome.
Repetitive use of muscle may feel pain in your neck, shoulder, wrist or fingers. One of
the most common conditions related to repetitive use of muscles when using the
computer is carpal tunnel syndrome. It causes pain, numbness, and tingling in the hand
and arm as shown in Figure 2.3.
Artificial lighting from computer screens can trick your brain and suppress its release
of melatonin substance that assists your sleeping patterns. To tackle this, refrain from
using a computer right before going to bed.
Health and safety requirements for Computer workplace
The minimum health and safety requirements for computers including Desktop
computers, Laptops, Tablets, Smart phones, Television screens and Video monitors are
as follows:
Display Screen (Monitor) – Use the modern LED monitors of legible size and with
adequate spacing between the characters and lines. The image on the screen should be
stable, with no flickering or other forms of instability. The screen must be free of
reflective glare and reflections liable to cause discomfort to the user.
Keyboard – The keyboard should tilt and separate from the screen to find a comfortable
working position and avoid fatigue in the arms or hands. The space in front of the
keyboard must be sufficient to provide support for the hands and arms of the user. The
keyboard should have a matt surface to avoid reflective glare. The symbols on the keys
must be adequately contrasted and legible from the design working position.
Work Surface – The work desk should be sufficiently large, low-reflectance surface and
allow a flexible arrangement of the screen, keyboard, documents and related equipment.
The document holder shall be stable and adjustable so as to minimise the need for
uncomfortable head and eye movements.
Work Chair – The work chair must be stable and allow the user to move easily and find
a comfortable position. It should be adjustable in height. The user’s feet must be placed
flat on the floor or a footrest should be used.
Space Requirements – The workstation should be designed to provide sufficient space
for the user to change position and vary movements. The user should have enough desk
space for the equipment they use.
Lighting – There must be satisfactory lighting conditions with appropriate contrast
between the screen and background environment. Possible disturbing glare and
reflections on the screen or other equipment should be prevented.
Reflections and Glare – Workstations should be designed so that sources of light, such
as windows and other openings, transparent or translucent walls, and brightly coloured
fixtures or walls cause no direct glare and no distracting reflections on the screen.
Windows shall be fitted with a suitable system of adjustable covering to attenuate the
daylight that falls on the workstation.
Noise and Heat – Noise emitted by equipment should not distract the attention. Noise
cancelling earphones may provide a solution if some noise is unavoidable. The
equipment may not produce excess heat which could cause discomfort to users.
Cautions while working on the computer
It is important to work safely on the computer. The static electricity generated just by
walking on the carpet can damage computer components. So use a surge protector when
you plug in the system. A battery backup system is the best way to protect against a
power outage, as it provides the system with constant voltage.
Remove rings, watches and necklaces while working on the computer. These ornaments
are made of conductive metals which can damage computer components by striking
them with static electricity.
Unplug all power sources and cables from the computer. It is shown in Figure 2.4. If
you are working with a plugged in computer then it might damage your hardware.
Modern processors will overheat within 7 sec if the heat sink is not attached.
Each organization has procedures and practices to handle and report accidents and to
take care of emergencies. Although most of these procedures and practices are common
across the industry, some procedures might be modified to fit a particular type of
business within the industry. For example, procedures to handle accidents caused by
slipping or falling will be similar across the industry. You need to be aware of the general
procedures and practices as well as specific to your organization.
The following are some of the guidelines for identifying and reporting an accident or
emergency:
Notice and correctly identify accidents and emergencies – You need to be aware of
what constitutes an emergency and what constitutes an accident in an organization.
The organization’s policies and guidelines will be the best guide in this matter. You
should be able to identify such incidents in your organization, and be aware of the
procedures to tackle each form of accident and emergency.
Get help promptly and in the most suitable way – Follow the procedure for handling
a particular type of accident and emergency. Promptly act as per the guidelines. Ensure
that you provide the required help and support as laid down in the policies. Do not act
outside the guidelines and policies laid down even if your actions are motivated by the
best intention. Only properly trained and certified professionals may be authorized to
take decisions beyond the organization’s policies and guidelines, if the situation
requires.
Follow company policies and procedures for preventing further injury while
waiting for help to arrive – If someone is injured, do not act as per your impulse or
gut feeling. Go as per the procedures laid down by your organization’s policy for tackling
injuries. You need to stay calm and follow the prescribed procedures.
Act within the limits of your responsibility and authority when accidents and
emergencies arise – Provide help and support within your authorized limit. Provide
medical help to the injured only if you are certified to provide the necessary aid.
Otherwise, wait for the professionals to arrive and give necessary help.
Promptly follow instructions given by senior staff and the emergency services –
Provide necessary services as described by the organization’s policy. Also, follow the
instructions of senior staff who are trained to handle particular situations. Work under
their supervision when handling accidents and emergencies.
Types of Accidents
The following are some of commonly occurring accidents in organizations:
Trip and fall – Customers or employees can trip on carelessly left loose material and
fall down, such as tripping on loose wires, goods left on aisles, elevated threshold. This
type of accident may result in simple bruises to serious fractures.
Slip and fall – Slips are mainly due to wet floors, spilling of liquids or throwing of other
slip-causing material on floors. Slip and fall is generally caused by negligence. It can
also be due to broken or uneven walking surfaces, such as broken or loose floor tile.
People should be properly cautioned against tripping and slipping. For example, a “wet
floor” sign will warn people to walk carefully on freshly mopped floors. Similarly, “watch
your steps” signs can prevent accidents on a staircase with a sharp bent or warn against
a loose floor tile.
Injuries caused due to escalators or elevators (or lifts) – Although such injuries are
uncommon, they mainly happen to children, ladies, and elderly. Injuries can be caused
by falling on escalators and getting hurt. People may be injured in elevators by falling
down due to sudden, jerking movement of elevators or by tripping on elevators’
threshold. They may also get stuck in elevators resulting in panic and trauma.
Escalators and elevators should be checked regularly for proper and safe functioning by
the right person or department. If you notice any sign of malfunctioning of escalators or
elevators, immediately inform the right people. If an organization's procedures are not
being followed properly for checking and maintaining these, escalate to appropriate
authorities in the organization.
Accidents due to falling of goods – Goods can fall on people from shelves or wall
hangings and injure them. This typically happens if pieces of goods have been piled
improperly or kept in an inappropriate manner. Always check that pieces of goods are
placed properly and securely.
Accidents due to moving objects – Moving objects, such as trolleys, can also injure
people in the organization. In addition, improperly kept props and lighting fixtures can
result in accidents. For example, nails coming out dangerously from props can cause
cuts. Loosely plugged in lighting fixtures can result in electric shocks.
3.2 Handling Accidents
Try to avoid accidents in your organization by finding out all potential hazards and
eliminating them. In case of an injury to a colleague due to an accident, do the following.
• Attend to the injured person immediately depending on the level and seriousness of
the injury, see that the injured person receives first aid or medical help at the earliest.
• Inform your supervisor about the accident giving details about the probable cause of
the accident and a description of the injury.
• Assist your supervisor in investigating and finding out the actual cause of the
accident. Help your supervisor to take appropriate actions to prevent occurrences of
similar accidents in future.
3.3 Types of Emergencies
It is important to have policies and procedures to tackle the given categories of
emergencies. You should be aware of at least the basic procedures to handle
emergencies. Here are some general emergency handling procedures to follow:
First Aid – First-aid kits should be quickly accessible to the employees. It should
contain all the important items for first aid required to deal with common problems such
as cuts, burns, headaches and muscle cramps.
Electrical Safety – Employees must be provided instructions about electrical safety
such as keeping water and food items away from electrical equipment. Electrical staff
and engineers should carry out routine inspections of all wiring to make sure there are
no damaged or broken wires.
Keep a list of numbers to call during an emergency, such as those of police, fire brigade,
security, and ambulance.
Regularly check that all emergency handling equipment such as the fire extinguisher
and fire alarm system are in working condition.
Ensure that emergency exits are not obstructed and keys to such exits are easily
accessible. Never place any objects near the emergency doors or windows.
Emergency Procedure and Reporting Accident
Follow the organization’s emergency procedures quickly, efficiently and calmly
Evaluating the Emergency
• One must rationally and critically think and assess the severity of the emergency and
determine what requires to be done on an immediate basis.
• One must remain calm and composed during an emergency situation since stress
during an emergency complicates things and may confuse a person.
• The emergency dispatcher aims at providing instant and appropriate help based on
the nature and degree of emergency.
• One must look for additional help by calling up the emergency toll-free number,
which would help the caller reach an official or ‘dispatcher’.
• One must help the dispatcher by answering his/her questions and providing the
dispatcher with the precise location and nature of the emergency.
• It is suggested that one should call from a GPS equipped phone so that the dispatcher
is able to track the location, even if the caller is unable to speak.
• One must be aware of the nature of the emergency, i.e. whether it is a medical, mental
health or behavioral emergency.
• One must evaluate the immediate threats, for example, in case a person is severely
injured from a running machine, the machine must be turned off instantly to prevent
others from getting hurt as well.
Handling the Emergency
• Extremely high casualties must be informed to the Occupational Health and Safety
Committee (OHSC).
• One must move from the emergency spot and help others follow the same.
• Secondary Hazards must be removed or mitigated, at least. For example, a car
accident comprises the risk of a violent explosion and fire outbreak resulting from
spilled fuel.
• One must not feel guilty if nothing can be done to help the others.
• In case nothing can be done to lessen the severity of the situation, one must provide
support to others by uplifting them mentally, inquiring about their medical history,
noting events as they occur. This information may prove vital for the emergency
response team.
• One must help the other victims and take suitable measures to assist the specially
abled ones.
• One must refrain from moving a severely injured victim and provide only the basic
first aid.
• Once the emergency team arrives, assist them with all required and relevant
information.
• A First Aid kit must be used if required.
• One must try reviving a seemingly unconscious victim by rubbing the chest, pinching
the earlobes, providing Cardiopulmonary Resuscitation (combination of chest
compression and artificial respiration).
Sample form of Reporting Accidents
1. Work safely complying with health and safety legislation, regulations and
guidelines
• Ensure that all emergency route maps are displayed in the accessible places on
all floors of the building.
• Ensure that appropriate Fire Extinguishers are present on all the floors of the
workplace.
• Learn and abide by company policy and procedures for dealing with security risks
in the establishment.
• Ask your supervisor how you may retrieve PPE and its maintenance and storage.
• Stay aware that confined spaces must bear suitable signs, to restrict
claustrophobic people from accessing them.
2. Ensure that health and safety instructions applicable to the workplace are being
followed
• Lighting should be satisfactory in all areas and additional bulbs should be kept
handy.
• While using cutting tools, the direction of cutting should always be away from
your body.
• Arrange for frequent Safety Drills and Trainings to employees for safety
awareness.
PSS Central Institute of Vocational Education, NCERT, Bhopal
Domestic CRM Voice, Grade XII 171
• Ensure that all manual cutting tools must be honed in advance because blunt
tools may slip and lead to deep cuts.
• Have a clear idea of how much authority and accountability you have to deal with
security risks, including your legal rights and duties.
• Learn and abide by company policies and procedures for maintaining security.
3. Check the worksite for any possible health and safety hazards
• Employ a Safety Supervisor in the workshop.
• Have your employer develop a daily checklist for all areas delegated to suitable
employees.
• This Safety Supervisor will stay accountable for checking the worksite for
potential health and safety hazards.
4. Follow manufacturer’s instructions and job specifications relating to safe use
of materials specifically chemicals and power equipment
• Ensure that all Chemical Solutions used on display shelves or for Housekeeping
purposes must be used only after mentioning to the relevant MSDS (Material
Safety Data Sheets) or Instruction Manuals.
• Loosely fitted clothes must be totally avoided because the loose ends may get
caught in powered machinery and tools and may be lethal.
• Ensure that you read the Instruction Manual thoroughly before using powered
tools and equipment.
5. Follow electrical safety measures while working with electrically powered tools
& equipment
• Powered tools and equipment must be reviewed for any damage, before and after
every use.
• Damaged switches must be reported to the supervisor and repaired with
immediate effect.
• Plugs must be checked for missing or faulty prongs / pins.
• The power cord must be assessed carefully for any fraying, faults, cracks or loss
of insulation.
6. Ensure safe handling and disposal of waste and debris
• All walkways should be free of clutter and debris, to avoid trips and falls.
• Any spill should be cleared off instantly and ‘Wet Floor’ or ‘Work in Progress’ signs
should be used in suitable places.
• Store equipment, Tools and Chemicals should be stored correctly, abiding by all
instructions provided in the Instruction Manual and ‘Directions for Use’.
7. Ensure electrical safety compliances and EMI/EMC hygiene requirements are
met as per the guidelines
The risks associated with the use of electrical equipment are extended to both the user
and the workplace. Few of such risks are mentioned below:
• Lethal Electrocution accidents.
• Non-fatal electric shocks leading to serious burn injuries.
• Non-fatal severe shocks leading to damages caused to the internal tissues and
vital organs like the brain and the heart.
• Non-fatal yet painful static electric shocks.
• Falls from cranes, ladders, and scaffolding and resulting mechanical injuries due
to electric shocks.
• Explosions and fire outbreaks caused by the sudden ignition of flammable
materials.
• Health issues like nausea, muscle spasms, unconsciousness, and palpitations.
3.4 Evacuation
Environmental Health and Safety (EHS) studies and deploys the practical aspects of
environmental protection and safety at work. Simply, it is what organizations and
workshops must do to ensure that their actions do not cause harm to anyone. The EHS
commands that there must be specific escape routes or safety evacuation points. This
includes thorough plans or blueprint of the building which is understandable to anyone.
Each floor of the workshop or building must have the Safety Evacuation Map as shown
in Figure 3.1
• Leave the premises immediately and start moving towards the nearest emergency
exit.
• Guide your customers to the emergency exits.
• If possible, assist the person with disability to move towards the emergency exit.
• You may carry your hand-held belongings, as you move towards the emergency
exit. Do not come back to pick up your belongings unless the area is declared
safe.
• Do not use the escalators or elevators (lifts) to avoid overcrowding and getting
trapped, in case there is a power failure. Use the stairs instead.
• Go to the emergency assembly area. Check if any of your colleagues are missing
and immediately inform the person concerned.
Safety Signs
During the Bomb Threat, don't panic and try to keep calm. Open the emergency exit
gate so as to propagate the evacuation process. (Figure 3.3) Think ahead and consider
places where a bomb can be planted.
Don’t assemble in the common assembly area because terrorists want to kill as many
people as possible. The common assembly area is the place where the evacuees
assemble and therefore the possibility of killing a maximum number of people is in the
common assembly area. Always assemble at a place which is not premeditated.
Inform the local police immediately. Evacuate immediately after receiving a bomb threat
and don’t wait until something is found after investigation. Document everything and
submit the documentation to the concerned authority. If anything suspicious comes
into sight, barricade it with red ribbon maintaining a diameter of 100 meters. Ensure
that no one comes within the boundary. Bring sandbags and put them around the
barricade to minimize the effect of the blast. Don’t try to touch any suspicious object
and wait for the police to arrive at the spot to diffuse it.
Activity
• Check and examine the site, to gather as much information as possible, so that
the same can be provided to the emergency team, once it arrives.
• One must extend help and assistance to others.
• If possible, workers may treat themselves to first aid or ask colleagues to do so.
5. The general steps involved in carrying out an evacuation are
• Stop your work and move out without spreading panic.
• Gather and carry only the most important items like cell phones.
• Report to the designated Assembly Area.
• Leave the workplace through the nearest door bearing an “Exit” sign.
• Await instructions from the Safety Committee.
• Incorporate first aid treatment to anyone in need.
6. Evacuation and emergency procedures for the specially abled
With Impaired Hearing, Turn lights on/off to gain the person’s a en on, or specify
directions with gestures, or write a note with evacuation directions. The Visually
Impaired, Announce the type of emergency, Offer your arm for help.
People with Prosthetic Limbs, Crutches, Canes, Walkers, Evacuate these individuals
along a route specially designated as injured persons. Accompany and assist the
evacuation site if possible. Notify emergency crew of their location. Use a sturdy chair,
or a wheeled one, to move the person to an enclosed stairwell.
Activity 2
Raising Alarm – Fire Alarms may either have a “Break Glass” or a “Pull / Push”
mechanism. In case of the break glass system, the glass sheet must be forcefully hit
with a clenched fist. One must continue repeating the process until the glass breaks. In
case of the “Pull / Push” systems, one must break the glass first and then either pull
down or push up the lever to raise the alarm.
Correct Assembly Point – Proper instructions must be given to the workers about the
site of and the directions to the correct assembly point in the workplace. Information
about this must be given during mock evacuation drills and training sessions as well.
Safe and efficient evacuation – Suitable evacuation procedures must be adopted for
the common public and for specially abled persons. Specially-abled persons must be
helped to evacuate the place by giving them access to Wheelchairs and other aids.
Roll call – Once everybody has evacuated the building / workshop and arrived at the
Assembly Point, Roll call or Head Count must be done to ensure that nobody is left
behind in the affected area. This must be done mandatorily to ensure that everybody on
the premises is safe.
Correct return to work – Evacuation must be conducted in a very streamlined,
organized, and noiseless manner. Likewise, everybody, who had evacuated the
workplace, must return to their respective locations/positions/seats, following normal
or emergency routes, depending on whether the situation has been re-established to
normal or not. Once everybody is back in place, another Roll call is taken.
Electrical Emergencies
Electrical accidents cause countless injuries. Electrocution is injury or death caused
due to electric shock. It is shown in Figure 3.6. Injury could be minimised and many
lives can be saved if proper rescue techniques and treatment are used. Electrical
accidents may occur at any time or place. Timely response and treatment of victims is
a major concern. When an electrical accident occurs, due to the effect of muscle
cramping, a victim is often incapable of moving or releasing the electrical conductor.
There should always be an emergency response plan for scheduled electrical
maintenance or work.
Fig. 3.7:
Fig 3.7 Approach the Victim and Inspect the Accident from a Safe Distance
Step 2. Examining the scene
• Visually examine victims to determine if they are in contact with energised
conductors. It is shown in Figure 3.8
• Metal surfaces, objects near the victim itself may be energised.
• Do not touch the victim or conductive surfaces while they are energised.
• Touch the victim only if all power sources have been deactivated.
• Switch off the electrical circuits if possible.
• Detach the main power supply of the area.
• Dodge any electrical conductors in the surroundings.
• Fast/irregular breathing;
• Anxiousness;
• Cyanosis (bluish skin colour);
• Nostrils flaring with each breath.
Procedure to assist someone suffering from an asthma attack:
Keep the person in a comfortable upright position leaning slightly forward. This is
known as the 'tripod' position. Generally, the person will dictate what position is most
tolerable to them. Usually, sitting up makes it easier to breathe. Check with the person
first about the most comfortable position for him or her.
a) Try to calm and reassure the person.
b) Administer warm fluids if possible.
c) Ask the person about any asthma medication he or she may be using. Usually,
the person will have an inhaler nearby.
d) If the person does not respond to his or her medication, cannot speak or cannot
breathe, seek medical attention immediately.
10. Animal Bites
Procedure to assist someone who has been bitten by an animal:
1. Wash the bite area with mild soap and warm water for five minutes to remove
saliva and any other foreign matter.
2. Use direct pressure or pressure point bleeding control to stop any bleeding.
3. If the wound is swollen, apply ice wrapped in a towel for 10 minutes.
4. Cover the wound with a clean dressing or bandage.
5. Seek medical assistance if the person showcases any severe symptom.
11. Nose Bleeds
Precautions to take while assisting someone with a nose bleed:
• It often occurs when a person has been breathing dry air.
• Seek professional help if they occur often.
• Do not tilt the person's head back. This could cause them to choke as the blood
runs down their throat.
12. Object in the Eye
Procedure to assist someone who has a foreign object in their eye:
• Do not rub the eye.
• Wash your hands, clean the person's eye using water.
SUMMARY
1. EHS (Environmental Health and Safety) encompasses measures for workplace
safety and environmental protection.
2. Safety Evacuation Maps are vital for clear pathways during emergencies like fire
outbreaks or natural disasters.
3. Evacuation sequences involve Detection, Decision, Alarm, Reaction, and
movement to safe areas.
4. Avoiding elevators during emergencies, using the "P.A.S.S." technique for fire
extinguishing, and prioritizing higher ground during floods are crucial safety
measures.
5. Proper response to bomb threats involves open emergency exits, avoiding
predetermined assembly points, and promptly informing authorities.
6. After workplace accidents, prompt reporting to supervisors and providing aid
without compromising personal safety is essential.
7. Assistance for visually impaired individuals during evacuation involves clear
verbal instructions or physical guidance.
8. Keeping escape routes clear and avoiding elevators contribute to efficient and
safe evacuations during emergencies.
2. A ___________ sign will warn people to walk carefully on freshly mopped floors.
3. ____________ signs can prevent accidents on a staircase with a sharp bent or warn
against a loose floor tile.
4. The ___________ should be responsible to handle the evacuation process.
5. Workplace fires are commonly caused by improper storage of ______ material or
_____ dust.
6. There should always be an ____________ plan for scheduled electrical
maintenance or work.
7. If the victim is breathing and has a heartbeat, give _______ for injuries and treat
for shock.
8. Fire extinguisher is a _____ containing an agent which can be discharged to
extinguish fire.
C. State True or False
1. The organization’s policies and guidelines are the best guide to handle
emergencies.
2. If someone is injured, act as per your impulse or gut feeling.
3. Keep water and food items away from electrical equipment.
4. Always switch off the electrical circuits.
5. Always wear protective equipment, such as gloves and shoes.
6. A fire extinguisher is a protection device used to extinguish fires.
7. Flammable materials can be placed around a door exit.
8. You can determine possible evacuation routes from floor plan diagrams posted
in your facility.
C. Short Answer Questions
1. What is a workplace emergency?
2. How do you protect yourself, your employees, and your business?
3. What is an emergency action plan?
4. What should your emergency action plan include?
5. How do you develop an evacuation policy and procedures?
6. How do you establish evacuation routes and exits?
7. What are the various types of fire extinguisher and their extinguishing
material?
8. What are the steps for operating a fire extinguisher in case of a fire emergency.
9. Compare the different types of fire extinguishers.
10. List the different classes of fire.
11. List out electrical rescue techniques?
12. What is the first aid for electrical emergencies?
Vocabulary Words
Mock Drill/Fire Drill – Practice how to respond/react in case of an emergency, such
as a fire
Fire Extinguisher – A small container usually filled with special chemicals for putting
out a fire.
Exit – The way to go out of a building or room
First Aid Kit – A container, which has medicines and ointments
Fire Escape Route – The way out in case of a fire
Emergency – A sudden, urgent and unexpected event
Spilt Liquid – Soft drink/water/coffee/tea etc. that has fallen on the floor
Routine inspections – Regular checking
Damaged equipment – Torn wires or broken plugs
Stairways – Staircase/ stairs to go to the next floor
Light fixtures – Bulbs, tube lights etc.
Injury – Getting hurt/bleeding
Kitchen equipment – Vessels used in the kitchen, such as wok, knives, cutting board
etc.
Cleaning Supplies – Liquid soap, dish washing liquid etc.
Answer
1. (T) 2. (F) 3. (F) 4. (F) 5. (F) 6. (F) 7. (T) 8. (F) 9. (F) 10. (F)