Professional Documents
Culture Documents
Accessibility Options (Ease of Access Center) in Control Panel are used to customize the way
your keyboard, display, or mouse function. Many of these features are useful for people with
disabilities
StickyKeys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or the
Windows key, and have it remain active until any other key is pressed.
It is an accessibility feature to help computer users with physical disabilities, but
it is also used by others as a means to reduce repetitive strain.
FilterKeys is an accessibility function that tells the keyboard to ignore brief or repeated
keystrokes, making typing easier for people with hand tremors. It is a feature of Microsoft
Windows.
ToggleKeys is an accessibility function which is designed for people who have vision impairment
or cognitive disabilities. When ToggleKeys is turned on, computer emits sound cues when the
locking keys (Caps Lock, Num Lock, or Scroll Lock) are pressed. A high sound is emitted when the
keys are switched on and a low sound is emitted when they are switched off. ToggleKeys is also a
feature of Microsoft Windows.
SoundSentry is designed to help users with auditory impairments. SoundSentry generates visual
warnings, such as a blinking title bar or a flashing border, whenever the computer generates a
sound.
High Contrast is an accessibility feature to assist people with vision impairment. You can change
the size and color of fonts and the background for ease of viewing.
Cursor Options is also an accessibility feature that assists people with vision impairment by
changing the blink rate and width of the cursor.
MouseKeys is an accessibility feature that assists people who have difficulty using a mouse. This
option uses the keyboard (especially numeric keypad) as a pointing device instead of a mouse.
SerialKeys is an accessibility feature that assists people that have difficulty using a keyboard or a
mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to provide
input to the computer through Serial Ports.
Client-Server Architecture:
Networks in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks. The computer(s) which provide
services are called servers and the ones that use these services are called clients.
Types of networks
There are two major types of network Local Area Network (LAN) and Wide Area Network
(WAN).
Internet
The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite to serve billions of users worldwide. It is a network of networks that
consists of millions of private, public, academic, business, and government networks.
Internet is widely used by students, educational institutes; scientist and professionals to gather
information for research and general information.
A Web Browser is a software used to view Web sites and acts as an interface between the user
and the World Wide Web. Ex – Mozilla Firefox, Internet Explorer
• Data Sharing: One of the most important uses of networking is to allow the sharing of data.
Users can send text files, spread sheets, documents, presentations, audio files, video files,
etc. to other users.
• Hardware Sharing: Hardware components such as printers, scanners, etc. can also be
shared. For example, instead of purchasing 10 printers for each user, one printer can be
purchased and shared among multiple users thus saving cost.
• Internet Access Sharing: You can purchase a single Internet connection and share it
among other computers in a network instead of purchasing multiple Internet connection for
each computer. This is very commonly found in Internet café (browsing centres), schools,
colleges, companies, etc.
• Usage of network based applications: Such as web browsers, email clients, chat application,
audio & video calling, etc is another advantage.
Backup your data: Always keep copies of personal data in additional media such as compact
discs, pen drives, etc. This could be helpful in situation when there is a loss of data. Keep the data
away from unauthorized users.
Use encryption software: (Usually available within the operating system) to protect your data
from unauthorized users. If encryption software is not available within the operating system, use
a 3rd party software.
Keeping your username and password private: Never save your username or password on
computers that are used in shared environments such as internet café. Browsers may save your
personal data on the local computer that can be used by another user using the same computer.
Registering with websites: Read the privacy statement or policy whenever you register with a
website, the statement or policy will include information about how the website use personal
data.
Do not share personal information: Websites require you to fill out forms containing fields such as
name, gender, age, email address, school, etc. Be cautious when filling out such forms; research
and verify if it’s a trustable website . Your email addressed could be used by unauthorized users to
3|Page MS Vinita Sharma (vinitasharmacs@gmail.com)
send you fake or unwanted emails; think twice or thrice before providing information to any
website and decide if it is really necessary.
Secure transactions: If you are using online shopping or transactions, websites even store your
credit card or online banking personal information such as your credit card number, account
details, etc. This information can be tracked and used by un-authorized users often known as
hackers to misuse this information. Again, ensure the website is legitimate and uses secure
practices for performing and maintaining online transactions. Since information such as credit
card details or personal information is sent over the network, it is always recommended to use
only secure websites for such transactions. Verify if the website uses secure transaction; usually it
is indicated through a digital certificate represented as a golden lock in the web browser’s address
bar.
Use antivirus and antispyware software: Computers are prone to attacks from software known
as Malware that could harm your computer. Malware track browsing behavior or transmit
personal data from your computer; programs such as keyloggers could be installed on your
computer track and transmit every key that is pressed on a keyboard (keystrokes) to
unauthorized users. Antivirus and Antispyware programs also offer real-time protection
monitoring your computer for
any changes by malware software. Keep your Antivirus and Antispyware software always up to
date, this can help in protecting your computer from recent threats.
Do not immediately respond to mails from unknown users: It may be a fake mail trying to
gather personal information such as your bank account details, home address, etc. Some mails
could promise you jobs or announce lottery results which in turn could compromise the user. And
in some cases, virus or scripts that are dangerous could be attached to the mail; NEVER open the
attachment from an unknown source.
Clear browser cookies frequently: Cookies are programs that are created on your local
computer when you visit websites. Though cookies are meant for storing data based on your
activity performed during your earlier visit such as logon details, details of a shopping cart, visited
pages in a website, etc. they could also be tracked by unauthorized users and possibly gain access
to your personal information.
Keep the operating system and software applications up to date, though operating systems and
applications are designed, tested and distributed, sometimes they may have security holes
through which a hacker can take advantage; they may track and gather information or even
damage the whole computer. In general, most vendors notify the users whenever a security hole is
identified and an update is available to address that particular issue. You can also visit respective
vendor’s website to check if there are any updates available, download and keep your operating
system
and software applications up to date, free from security holes.
Install firewalls: Firewalls could be software or hardware and can assist in keeping a computer
and a network secure. Firewalls analyze the network traffic and determine if the traffic should be
allowed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall
software as a part of operating system thus keeping the computer secure. In rare cases, you may
need to configure your firewall for additional security.
Remove unwanted or unknown software applications: These might have got installed without
your knowledge when you have visited some websites. Unwanted software could get installed as
they might have been bundled along with necessary software. Some programs such as toolbars get
installed usually through bundled software and are programmed to send personal data without
your consent.
BLOG:A blog is a discussion style site used by non-technical (and technical users) users for
creating personal web pages. Blogs are similar to an online personal diary and simple to use.
Use of Blog: we can use a blog to convey messages about events, announcements, news, reviews,
etc. Blogs are usually managed using a web browser and this requires active internet connection.
2. List any 5 websites that provide blog service.
Some of the popular blogs include:
• http://www.WordPress.com
• http://www.blogger.com
• http://www.blog.com
5|Page MS Vinita Sharma (vinitasharmacs@gmail.com)
• http://www.weebly.com
• http://www.blogsome.com
3. How to create Blog?
WordPress is free web service that we can use to create a beautiful website or blog. WordPress
has support for “themes” for customizing the design of a blog. Themes can make the blog or the
webpage look attractive.
• Before we start using a blog, a blog account is required. To create one, you need a web browser
and an internet connection.
• Password: Securing your WordPress blog account with a strong password is important. A
combination of uppercase and lowercase letters with some 31 digits along with symbols would be
a strong enough password. You need to enter the password twice.
• Email Address: You must provide your Email Address here. An activation link will be send to you
from WordPress after you click “Create Blog”.
• Language: You can choose your own language for blogging from the list given.
Ans: If you do not have an active internet connection , you can create blogs application and publish
the blog whenever internet connectivity is available.
3. What is Spyware?
Spyware: spyware is a software which is installed on your computer to spy on your activities and
report this data to people willing to pay it.
Adware:adware are the programs that deliver unwanted ads to your computer.
4.What is malware?
Malware:Malware is General term used to refer to virus,worms, spyware, adware.
5. what is spamming?
Spamming: spamming refers to the selling of bulk mail by an identified or unidentified source.
6.What is Phishing?
7|Page MS Vinita Sharma (vinitasharmacs@gmail.com)
Ans: phishing is the practice of sending fraudulent communication that appear to come from a
reputable source.It is usually done through email the goal is to steal sensitive credit card and login
information or to install Malware on the victims machine.
10. List any four types of Tab alignment available in a word processor?
Ans: Four types of Tab alignment available in a word processor are:
Left alignment shortcut key is Control + l.Centre alignment shortcut key is Control + e.Right
alignment shortcut key is Control + r.Justification shortcut key is Control + J.
11. Illustrate the use of header and footer in your word document?
Ans: Headers are text or images included at the top of the page. They usually contain important
information such as company or department name, logo, page numbers, name of the author, etc.
separated from the work or actual document area.
Footers are text or image included at the bottom of the page and may repeat in all pages of the
document. The procedure for creating a footer is similar to that of headers
11. write down the necessary steps to add a footer to your document?
Ans:To insert footer to a document, open a new document in Word processor
1. Click on the Insert tab on the Ribbon.
2. Click on the option Footer in the Header & Footer group.
3. A drop down list appears which lists collection of predefined Footer options.
4. Select any one from that.
8|Page MS Vinita Sharma (vinitasharmacs@gmail.com)
12. What is hacking?
Ans: Hacking generally refers to unauthorized Access into a computer or a network. The person
engaged in hacking activities is known as a hacker.
1. List any three word wrapping options available in a word processing software.
Ans: The three word wrapping options available in a word processing software are:
tight, square and through.
Note: If you would like to edit the embedded document, double-click on it. It will
automatically open it for editing using respective application.
Chapter 4-SPREADSHEET
QUESTION AND ANSWERS
8. How will you hide/Unhide a row and column in a spreadsheet? write steps?
Ans: To hide a row/ column follow the given steps: 1. To hide
Rows/Columns select row/column you want to hide and click on home tab go to cells group click
on format dropdown button then click hide & unhide option then selected rows/columns will be
hidden.
9. why do you need freeze rows and columns? How will you freeze top most row of the
spreadsheet?
14 | P a g e MS Vinita Sharma (vinitasharmacs@gmail.com)
Ans: To freeze the rows or columns do the following.
• Open a new spread sheet.
• In order to freeze rows or columns click on Freeze Panes option available
under Window group in View tab.
• A drop down list appears as shown below. Click on Freeze Panes. Doing so will
freeze all the rows above and all the columns to the left of the selected cell. Scroll
your mouse in the spreadsheet the frozen rows and columns remain constant.
14. How will you insert a horizontal and vertical break in the spreadsheet?
Ans: To insert a page break, select a row (for horizontal page break) or column ( for vertical page
break) and Click on Breaks down arrow under Page Setup group in the Page
Layout tab. Click on Insert Page Break
option.
15. How will you remove a horizontal and vertical break in the spreadsheet?
Ans:Workbook views are used for the purpose of viewing the outcome of the worksheet while
printing. There are five types of views in the spreadsheet:-
1. Bar charts: A bar chart (horizontal bars) emphasizes the comparison between items at a fixed
period of time. This chart type also includes cylinder, cone and pyramid subtypes.
2. Column Charts: A column chart emphasizes variation over a period of time. This chart type also
includes cylinder, cone and pyramid subtypes.
3. Line Charts: A line chart shows the relation of the changes in the data over a period of time.
4. Pie Charts: A Pie chart shows the relationship of the parts to the whole.
5. Area Charts: An area chart shows the relative importance of values over time.
6. XY (Scatter) Charts: Scatter charts are useful for showing a correlation among the data points
that may not be easy to see from data alone.
31. Define the following terms SORT & FILTER DATA?
Sort:- It is a feature that helps you arrange the selected data either in an ascending or descending
order.
Filter:- It is a feature used for extracting particular data using some conditions.
Note:- using this feature, we can use a value of a cell located at one sheet in the another sheet.
Steps :-
1. Open a new spreadsheet workbook.
2. For example, we are using sum formula, type =sum(, while the parenthesis is opened, click on
Switch Windows option under Window group in the View tab. A drop down list appears
containing all the active workbooks names.
3. Click on the other workbook name eg. Book1 and select the desired cells eg. A2:A5
4. Press Enter. After pressing enter, we see that we are back on the previous workbook with the
desired result.
35.What is sharing Worksheet Data in spreadsheet?
Ans:Using this feature of spreadsheet, multiple users can access a single sheet simultaneously in a
network location.
Steps:-
1. Click on Share workbook option under Changes group in the Review tab.
2. A dialog box appears as shown below.
3. Check the option Allow changes by more than one user at the same time. This also allows
workbook merging.
4. Click OK.
1. Given the following spreadsheet, write the appropriate formula/ expression function to be used
for a to e:
a. Write formula to calculate the total points (sum of points+bonus) of each player in cell F2-F6.
b. Write feature used for arranging the rank from highest to lowest.
c. To find the total with maximum total to be written in cell F7.
d. To find average of points to be written in cell C7.
e. To change orientation of the page from landscape to portrait.
Ans: a.to calculate the total points (sum of points+bonus) of each player in cell F2-F6.
in Cell F2 write formula = sum(C2+D2) and press enter result is dispalyed
in Cell F3 write formula = sum(C3+D3) and press enter result is dispalyed
in Cell F4 write formula = sum(C4+D4) and press enter result is dispalyed
in Cell F5 write formula = sum(C5+D5) and press enter result is dispalyed
in Cell F6 write formula = sum(C6+D6) and press enter result is displayed
UNIT 5:
DIGITAL PRESENTATION (INTERMEDIATE)
SESSION 1: INSERTING A MOVIE CLIP
Movie Clips are added to the presentation in order to make the presentation colourful and
meaningful.
A movie clip can be inserted in two ways:-
1. Using Insert Tab
2. Using Title and Content Layout Option
3. Steps to insert a movie in a presentation using Insert Tab are:-
• Click on Movie option under Media clips group in the Insert tab. A drop down appears.
• Select the Movie from File…option to insert the movie clip. A dialog box appears.
• Select a movie clip and click OK to insert the same in the slide.
• A message box appears asking you how do you play the movie, i.e. Automatically or When C
• Click on any of the options available and movie clip will be inserted in the slide.
OR
• Click on Movie from Clip Organizer… option under Media clips group in the Insert tab to insert
the movie clips that are available under Clip organizer.
• Clip Art pane will be displayed on the right side.
• Select any of the movies available and insert it in the slide.
2. Steps to insert a movie in the presentation using Layout option:-
• Click on Layout option available under Slides group in the Home A drop down list appears.
• Click on Title and Content option and a slide will be displayed with the same Layout.
• Insert a movie in the slide by clicking the movie icon in the Layout
• A dialog box will appear. Select a movie clip and click on
• A message box appears asking you how do you play the movie, i.e. Automatically or When C
• Click on any of the options available and movie clip will be inserted in the slide.
SESSION 2:- INSERTING AN AUDIO CLIP
We can include audio clips to a presentation similar to that of videos. For eg. we can play mild
background music while making the presentation.
STEPS TO INSERT AN AUDIO CLIP
1. Click on Sound option under Media clips group in the Insert tab.
2. A drop down appears
3. Select the Sound from File… option to insert the sound clip.
UNIT – 6
EMAIL MESSAGING
SESSION 1: WORKING WITH CALENDAR
Time management is the act of planning to stay organized that will result in increased efficiency
and productivity. Time management can be performed using simple techniques such as a paper
and pen or you can also use calendar software to plan your time.
UNIT – 7
Database Development
Data:data is information that has been translated into a form that is efficient for movement or
processing.
Database – A database is an organized collection of data. For example:- In a stationary shop,
detailed records of the materials available in the shop is database. Similarly in a computerized
system, we need to maintain several files, we would used database programs such as Microsoft
Access, OpenOffice.org Base, and MySQL. These database programs are used to organize the data as
per our needs in the computer system.
Database Management System (DBMS) – A database management system is a software package
with computer programs that controls the creation, maintenance and use of a database. A DBMS
allows different user application programs to concurrently access the same database. Some of the
DBMSs are Oracle, IBM DB2, Microsoft SQL server, Microsoft Access, PostgreSQL, MySQL, FoxPro
and SQLite.
Database Servers – Database servers are dedicated computers that hold the actual databases and
run only the DBMS and related software. Databases on the database servers are accessed through
28 | P a g e MS Vinita Sharma (vinitasharmacs@gmail.com)
command line or graphic user interface tools referred to as Frontends; database servers are
referred to as Back-ends. Such type of data access is referred to as Client-server model.
RDBMS:- A relational database management system (RDBMS) is a database management system
that is based on the relational model. In the relational model of a database, all data is represented
in terms of tuples (rows), grouped into relations (tables). A database organized in terms the
relational model is a relational database.
Database Concepts:- Database contains objects that are used for storing and managing
information.
1. Item : – Item is about which information is stored in the database.
2. Field:- Each question that we ask about our item is a Field.
3. Record:- Record is a set of information (made up of fields) stored in your database about one of the
items.
4. Value:- Value is the actual text or numerical amount or date that you put in while adding
information to your database.
For example,
Database :- Employee
Emp_Cod Emp_Nam Emp_Addres Emp_Designatio Emp_ContactN Emp_Salar
e e s n o y
5. Key Field :- Key Field is a value in a Field that uniquely identifies the record. Eg. E001 which is
unique to every employee.
Important Question :- How data is organized in a RDBMS ?
Ans :- In RDBMS, data is organized in the form of inter linked tables.
TABLE :- A table is a set of data elements that is organized using a model of vertical columns and
horizontal rows. Each row is identified by a unique key index or the key field.
COLUMNS OR FIELD :- A column is a set of data values of a particular simple type, one for each row
of the table. For eg. Emp_Code , Emp_Name , Emp_Address etc.
ROWS OR RECORDS OR TUPLES :– A row represents a single, data items in a table. Each row in a
table represents a set of related data, and every row in the table has the same structure.
DATA TYPES :- Datatypes are used to identify the type of data we are going to store in the database.
Categories of data types:– Data types can be broadly classified into five categories:-
NUMERIC TYPES:– They are used for describing numeric values like mobile number, age, etc.
The different types of numeric data types available are-
1. Boolean (Yes / No) 6. Numeric
2. TinyInt (Tiny Integer) 7. Decimal
3. SmallInt (Small Integer) 8. Real
4. Integer 9. Float
5. BigInt (Big Integer) 10. Double
ALPHANUMERIC TYPES:-
The list of different datatypes available in alphanumeric types are :-
1. LongVarChar (Memo) (Long Text)
2. Char (Text-fix) (Small Text)
3. VarChar (Text) (Text of specified Length)
4. VarChar_IgnoreCase (Text) (Comparisions are not case sensitive)
BINARY TYPES:-
Binary types are used for storing data in binary formats. It can be used for storing photos, music
files or (in general file of any format) etc.
The list of different datatypes available in Binary types are :-
1. LongVarBinary (Image)
2. Binary (Binary (fix) )
3. VarBinary (Binary)
DATE TIME:-
Date time data types are used for describing date and time values for the field used in the table of a
database. It can be used for storing information such as date of birth, date of admission etc.
The list of different data types available in Date Time type are :-
1. Date (Stores month, day and year information)
2. Time (Store hour , minute and second information)
3. Timestamp (Stores date and time information)
PRIMARY KEY:- A primary key is a unique value that identifies a row in a table. These keys are also
indexed in the database, making it faster for the database to search a record.
FOREIGN KEY:– The foreign key identifies a column or set of columns in one (referencing) table
that refers to a column or set of columns in another (referenced) table.
Note:- The “one” side of a relation is always the parent, and provides the PK(Primary Key)
Attributes to be copied. The “many” side of a relation is always the child, into which the FK(Foreign
Key) attributes are copied.
30 | P a g e MS Vinita Sharma (vinitasharmacs@gmail.com)
Memorize it : one, parent, PK (Primary Key) ; many, child , FK (Foreign Key)
SESSION 3
MANIPULATING DATA
In a database we can define the structure of the data and manipulate the data using some
commands.
There are two types of languages:-
1. DDL (Data Definition Language)
2. DML (Data Manipulation Language)
DATA DEFINITION / DESCRIPTION LANGUAGE:- It is a standard for commands that define the
different structures in a database. DDL statements create,modify and remove database objects such
as tables, indexes and users.
There are two types of DML:
• Procedural: The user specifies what data is needed and how to get it
• Nonprocedural: The user only specifies what data is needed. This is easier for the user but
may not generate code as efficient as that produced by procedural languages.
To create a form,
Click on Forms option located under Database section
Click Use Wizard to Create Form… option under Tasks group. The Form Wizard dialog box
appears as shown below.
To get details about the list of students whose favorite color is blue, you can use:
select * from SDetails where Color=’Blue’;
After executing the select query the output will be shown similar to the one displayed below.
To view records in ascending order of RollNo, from the table the select statement will be:
select * from SDetails order by “Rollno” ASC;
UPDATE statement
Update statement is used for modifying records in a database. The general syntax of the
update statement is as follows:
UPDATE <table_name> SET <column_name> = value [, column_name = value …]
[WHERE <condition>]
To update a record using update statement, type the following and click Execute.
update SDetails set Location = ‘Bhubaneswar’ where Rollno = 14;
Execute select query to view the updated table. After execution you should see a window
similar to the one displayed below.
DELETE statement
Delete Statement is used to remove one or more records in a database. The general syntax of
the delete statement is as follows:
DELETE FROM <table_name> [WHERE] <condition>;
Notice the record with the Roll No 8 is deleted from the database.
CREATE Statement
Create statement is used for creating a database or a table in any RDBMS Software. A
commonly used CREATE command is the CREATE TABLE command. The general syntax of the
create statement is shown below.
CREATE TABLE <TABLENAME> ([column definitions]) [table parameters]
Column definitions: A comma-separated list consisting of any of the following
Column definition: [column name] [data type] {NULL | NOT NULL} {column options}
Primary key definition: PRIMARY KEY ([comma separated column list])
For example, if you would like to create a table using the Create statement, type the following
and click Execute.
CREATE TABLE Employee (ID INTEGER, Name VARCHAR (50),
Department VARCHAR (50),
Address VARCHAR (120),
Contact_Number INTEGER);
Ability to work independently can be enhanced by being self-aware, self-motivated and self-
regulated.
Self-Awareness
Environment includes both the living things as well as non living things. The living things
broadly include plants and animals. The non-living things is constituted of three main parts –
1. Lithosphere – it refers to the outer layer of the earth. It includes rocks and soils found on
the surface of earth.
2. Hydrosphere – it refers to water bodies found on the surface of earth. E.g., seas, rivers,
oceans, streams etc.
3. Biosphere – it refers to that part of environment where life exists.
Principles of Communication
Face to Face Communication is most effective:
Communication becomes complex as the number of people we are
communicating with increases:
Communication across cultures differs:
Feedback
What is communication?
The imparting or exchanging of information by speaking, writing or
using some other medium and means of sending or receiving
information.
A communication barrier is thus anything that prevents us from receiving and understanding
the messages others use to convey their information, ideas and thoughts.
Serial Keys is an accessibility feature that assists people that have difficulty using a keyboard or a
mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to provide
input to the computer through Serial Ports.
Kiosk is a computer terminal that features combination of hardware & Software displayed in a
public domain to provide access to information & application for communication, Entertainment,
Education etc.
Environmental pollution
factors causing ecological imbalance
types of natural resources
Conservation
Green economy
Enhancing Ability to Work Independently
Stress Management Techniques
FIND & REPLACE
BULLETS AND NUMBERING
INTRODUCTION TO ENVIRONMENT
Table
Web Application
Impairment
Accessibility
Networking Fundamentals (LAN/WAN)
Networking Components
Advantages of Networking
Internet
Modem
Dial Up Connection
DSL
Wifi
Wimax
3G
Cable internet connection
Networking architecture (P2P/ Client-Server)
Instant Messaging & Types
Blog & Types
Chatting with a contact (Hangout)/Google Talk
Online Transactions + Merits/Demerits
Word
Alignment
Indentation
Character Formatting
Header & Footer
Line Spacing
Page Break & Section Break
Managing Styles
Templates
Clipart
Text Wrapping
Group/Ungroup
Setting Columns
Spelling & Grammar
two ways of checking spelling and grammar in a document:
• Using Auto Spell check
• Using the Spelling and Grammar option
Excel
AutoSum
Conditional Formatting
Freeze/Unfreeze
Hide/Unhide
Types of View- Normal , Page Layout, Page Break Preview, Custom, Full Screen
Sorting
Filter
Linking & Embedding Objects
Chart
Types Of Charts
Page Layout and its different tabs-
• Margins
• Orientation
• Page headers and footers
• Hide or display grid lines
• Size of the page
• Define the print area
• Specify the background
Page Break & Section Break
Apply Cell Name
Range Name
Modifying and Format Charts
Elements of Charts
Kiosk
38 | P a g e MS Vinita Sharma (vinitasharmacs@gmail.com)
Types Of Charts
CALCULATE DATA ACROSS WORKSHEETS
SUM(), AVERAGE(), MIN(), MAX(), COUNT()
Using multiple workbooks and linking cells
Sharing worksheet data
PowerPoint
Audio clips, Movie clips
Tables
Charts
Types of view
Animation & Transitions
Speaker Notes/Notes/Presenter View
Reviewing a presentation
Handouts
Rehearse The slide show along with slide timing to make sure that your presentation gets over a
stipulated time.
Email Messaging
Calendaring Software
Schedule Appointment
Categories Appointment
Share/Print a Calendar
Create & Respond – Meeting, Task, Notes, Journal
View of Calendar (5 types)
Recurring Appointment
Database development
Database & Types of Databases-Flat File, RDBMS
Keys- Primary, Foreign, Alternate, Candidate
Data Types
Ole Object, Look Up Wizard
Creating Tables/Form/Report/Query in Access
DML and its types
DDL
Report—Report Wizard, Report Tools
Query-Design View, Datasheet View, SQL, Pivot Table, Pivot Chart
Form- Form View, Design View, Layout View
Table-Design, Datasheet
SQL- Insert, Select, Update, Alter, Create, Delete, Drop
where, Between, Not Between, order By, >,<=,
Data redundancy, Data inconsistency
Features of MS Access
To create a form