Professional Documents
Culture Documents
Portfolio: Project Submission On I-T By:-Deepanshu Pandey Class 10
Portfolio: Project Submission On I-T By:-Deepanshu Pandey Class 10
CLASS 10th
INDEX
1. RESUME 1
3. COMPUTER 3
4. GENERATIONS OF COMPUTER 6
6. KEYBOARD 8
PERSONAL DETAILS
CAREER OBJECTIVES
➢ To be excited about opportunities that come my way and make a place in an organization
which challenges me as well as fuels my curiosity and quest for knowing more.
➢ I wish to have a pleasant personality and be helpful and kind to my peers and friends and
family.
➢ To contribute to the wellbeing of my society and use my talents in upliftment of people
from there struggles
➢ To inculcate values of a leadership within myself to help achieve my ambitions and
goals.
ACADEMIC QUALIFICATION
Art Enthusiast;- Love to play musical instuments like Piano, Drums etc, Painting and
Sketching. I also like Reading books and Stories.
1
BEST GUEST LECTURE ON I-T
With the efforts of our school administration, all students had the privilege of many eminent
lectures on IT (Information Technology) and its importance and relevance in modern times.
The best lecture was of MADAN MOHAN MISHRA from AKS University Satna.
The Guest lecture was conducted by Mr. Abhishek Pandey our school faculty.
Mr Madan Mohan Mishra talked about HTML which is used to create a webpage and CSS
programming language were taught by him. He elaborately explained the uses and relevance of
these programming languages and how the play a significant role in solving making modern day
problems with the help of technology, be in standardization of data or easy accessibility
Hon’ble Sir, was very friendly with the students and in his interactive lecture he solved many
doubts raised by students. His personality was pleasant and impressive.
❖ HTML is abbreviated form of Hypertext Markup Language. Which used to make web-
page.
❖ Webpage is consisting of text, images, audio, video and animation
❖ Web page mark up a document for display by a computer program known as a
Web browser. The browser interprets the tags, displaying the headings, paragraphs, and
tables in a layout that is adapted to the screen size and fonts available to it.
2
BEST INDUSTRY VISIT OF I-T
On 2nd November 2019 we went to AKS University for our industry visit on IT as a part of our
curriculam with our classmates and IT teacher, Mr. Abhishek Pandey Sir.
As we went in the auditorium the teachers and professors told us about their goals and action
plans and a teacher and that all of them were inspired by the works of Mr, Madan Mohan Mishra
who was there mentor and leader.
Later, they inspired us through telling us about the students who got successful in their careers
after studing from their university. Mr Madan Mohan Mishra told us about HTML and new
programme CSS. We showed us many types of machinery and computer systems that were
present in the university and explained their usefulness to the young students.
We also saw the library of the university were there were many hardworking students studying
books and some working on their assignments in computers. The library had books on all major
disciplines of science, computer engineering and social sciences.
With my other friends I enjoyed the day, took pictures and selfies and ate snacks at theuniversity
canteen. It was a wonderful experience and we got familier with many computer devices and
system software.
3
COMPUTER
A computer is an electronic device that manipulates information, or data. It has the ability
to store, retrieve, and process data. You may already know that you can use a computer to type
documents, send email, play games, and browse the Web. You can also use it to edit or
create spreadsheets, presentations, and even videos.
Before we talk about different types of computers, let's talk about two things all computers have
in common: hardware and software.
• Hardware is any part of your computer that has a physical structure, such as the
keyboard or mouse. It also includes all of the computer's internal parts.
• Software is any set of instructions that tells the hardware what to do and how
to do it. Examples of software include web browsers, games, and word
processors.
4
TYPES OF COMPUTER
When most people hear the word computer, they think of a personal computer such as
a desktop or laptop. However, computers come in many shapes and sizes, and they perform
many different functions in our daily lives. When you withdraw cash from an ATM, scan
groceries at the store, or use a calculator, you're using a type of computer. Some most common
types are:-
• Desktop Computer
• Laptop Computer
• PCs /Mac Computers
• Smartphone
5
GENERATIONS OF COMPUTERS
6
CENTRAL PROCESSING UNIT (CPU)
Stands for "Central Processing Unit." The CPU is the primary component of a computer that
processes instructions. It runs the operating system and applications, constantly
receiving input from the user or active software programs. It processes the data and
produces output, which may stored by an application or displayed on the screen.
• The CPU contains at least one processor, which is the actual chip inside the CPU that
performs calculations. For many years, most CPUs only had one processor, but now it is
common for a single CPU to have at least two processors or "processing cores." A CPU
with two processing cores is called a dual-core CPU and models with four cores are
called quad-core CPUs. High-end CPUs may have six (hexa-core) or even eight (octo-
core) processors. A computer may also have more than one CPU, which each have
multiple cores. For example, a server with two hexa-core CPUs has a total of 12
processors.
• While processor architectures differ between models, each processor within a CPU
typically has its own ALU, FPU, register, and L1 cache. In some cases, individual
processing cores may have their own L2 cache, though they can also share the same L2
cache. A single frontside bus routes data between the CPU and the system memory.
The terms "CPU" and "processor" are often used interchangeably. Some technical diagrams
even label individual processors as CPUs. While this verbiage is not incorrect, it is more
accurate (and less confusing) to describe each processing unit as a CPU, while each
processor within a CPU is a processing core.
7
KEYBOARD
Below is a close-up image of a QWERTY computer keyboard with each of the keys selectable.
One may hover your mouse cursor over any of the keys to see a description. Clicking any of the
keys opens a new page with full details.
8
DATABASED MANAGEMENT SYSTEM
The core of any database management system is the data itself. Another important aspect
regarding DBMS is the difference between data and information.
Data: It is the unorganised facts which need to be compiled to form meaningful information
Information: Once the data is processed and made into a structured context, it is called
information.
A collection of information which is managed such that it can be updated and easily accessed is
called a database. A software package which can be used to manipulate, validate and retrieve this
database is called a Database Management System.
For example, Airlines use this software package to book tickets and confirm reservations which
are then managed to keep a track of the schedule.
• Network Database: When the details of multiple members can be linked to the files of
multiple owners and vice versa, it is called a network database.
• Hierarchical Database: When the data stored in the form of records and is connected to
each other through links is called hierarchical database. Each record comprises fields and
each field comprises only one value.
• Relational Database: When the data is organised as a set of tables comprising rows and
columns with a pre-defined relationship with one another, it is called a relational
database.
There four main components on which the working of a DBMS depends. This includes:
9
• Data: The main component is the data. The entire database is set based on the data and
the information processed based on it. This data acts as a bridge between the software and
hardware components of DBMS. This can further be divided into three varieties:
• User Data – The actual data based on which the work is done
• Metadata – This is the data of the data, i.e., managing the data required to enter
the information
To simplify it, in a table, the information given in each table is the User Data, the number of
tables, rows and columns is the MetaData the structure we choose is the Application MetaData.
• Hardware: These are the general hardware devices which help us save and enter the data
like hard disks, magnetic tapes, etc.
• Software: The software acts as a medium of communication between the user and the
database. Based on the user’s requirement, the database can be modified and updated. To
perform operations on the data, query languages like SQL are used.
• Users: No function can be performed without the Users. Thus, they form the fourth most
important component of DBMS. The information entered into a database is used by the
User or the administrator to perform their business operations and responsibilities.
10
BASIC CONCEPTS OF OFFICE SUITE SOFTWARE
A word processor is used to manipulate text. It is able to edit, revise, store, format and print
any document(letters, reports, manuscripts etc.). Any text in a word processor can be
manipulated and formatted selectively using „selective blocks‟ via mouse/keyboard. Usually
the selected blocks are blue in color. Words can also be found and replaced in the entire
document/selection at once. Images, Diagrams and Charts can be inserted accordingly.
Examples - Microsoft Word, LibreOffice Writer, Google Docs etc.
Uses Of MS Word Following Are Some Of The Uses Of Word Processors In Education
11
• E-contents are often uploaded in hardware software independent formats such as
PDF. It allows anyone to read formatting correctly on any computer system with a
PDF reader available. This is creating a electronic self-learning environment for
students.
• The write-ups for Group interactive Sessions and learning sheets for Group
Discussion involving Team Work can be easily generated via a Word Processor.
• Using a word processor allows storage of a digital version and easy printing.
c) Other Miscellaneous Uses
• Preparation of question papers for exams in schools, colleges. Question papers for
huge central exams are not created using a word processor. Instead, they use a
type setting software. Document creation for majority of educational
administration, at any level is done using word processors
• Like educators, now-a-days students also use customized word processors for
storing their notes.
12
2. SPREADSHEET SOFTWARE(MS EXCEL)
Processing, analysis and visualization of numerical data in tabular grid is done by Excel
Educational Administration and Management Entire management workflow of an institution is
backed up by spreadsheets.
• Schedules and Time Management Spreadsheet software facilitates creation of large time
management schedules and routines. Routines for Group Controlled Instruction methods can
be easily managed using spreadsheet software.
13
3. PRESENTATION SOFTWARE(MS POWERPOINT)
• Analytical graphics such as pie charts, bar graphs etc. can also be inserted into a slide.
• Animations can also be applied to all media accordingly.
• Graphics used to display/present data to others
• Graphics used to represent numerical data Designed and stored slides can be printed or
displayed on a projector.
1. In classroom environment many modern institutions have image projectors integrated using a
white-board as a screen. Some screens are touch-enabled. Presentation slides with brief bullet
points(short and precise key phrase) , concept charts, images etc. are compiled by the educator to
14
facilitate teaching in classroom. All Presentation Software have “Slide Show” feature to display
all the slides in series with animations, audio, video etc. Students learn by visual understanding
and revise by bullet representation of data. Slides can also be made appealing to middle school
students via use of animations.
2. Any educational presentation must. Have bullet points explain key concept/sub concept in
around 10 words. Contain 15-20 slides for 50-60 minutes of presentation.
• Use text colors and formatting to represent ideas. Example - Positive and Negative.
• Other Miscellaneous uses Flashcards slide shows are used to create and display flashcard
quizzes for a classroom. A flashcard in real life is a card bearing information on both sides.
• Flashcard slide-shows can be used to create a group activity or conduct revision of topic(s) in
a classroom via Question and Answer Sessions.
INTERNET :- It is the global system of interconnected computer networks that use the Internet
protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of
private, public, academic, business, and government networks of local to global scope, linked by
a broad array of electronic, wireless, and optical networking technologies. The Internet carries an
extensive range of information resources and services, such as the inter-linked hypertext
documents and applications of the World Wide Web (WWW), electronic mail, telephony, and
peer-to-peer networks for file sharing
WORLD WIDE WEB:- (abbreviated www or the Web) is an information space where
documents and other web resources are identified by Uniform Resource Locators (URLs),
interlinked by hypertext links, and can be accessed via the Internet. English scientist Tim
Berners-Lee invented the World Wide Web in 1989. He wrote the first web browser computer
program in 1990 while employed at CERN in Switzerland. The Web browser was released
15
outside of CERN in 1991, first to other research institutions starting in January 1991 and to the
general public on the Internet in August 1991.
So the web is only one part of the internet. It happens to be a highly visible part of the internet,
though.
Web pages are primarily text documents formatted and annotated with Hypertext Markup
Language (HTML). In addition to formatted text, web pages may contain images, video, audio,
and software components that are rendered in the user's web browser as coherent pages of
multimedia content. Embedded hyperlinks permit users to navigate between web pages. Multiple
web pages with a common theme, a common domain name, or both, make up a website. Website
content can largely be provided by the publisher, or interactive where users contribute content or
the content depends upon the user or their actions. Websites may be mostly informative,
primarily for entertainment, or largely for commercial, governmental, or non-governmental
organizational purposes.
CYBER SECURITY
Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks. It's also known as information technology
security or electronic information security. The term applies in a variety of contexts, from
business to mobile computing, and can be divided into a few common categories.
· Network security is the practice of securing a computer network from intruders, whether
targeted attackers or opportunistic malware.
· Application security focuses on keeping software and devices free of threats. A compromised
application could provide access to the data its designed to protect. Successful security begins in
the design stage, well before a program or device is deployed.
· Information security protects the integrity and privacy of data, both in storage and in transit.
· Operational security includes the processes and decisions for handling and protecting data
assets. The permissions users have when accessing a network and the procedures that determine
how and where data may be stored or shared all fall under this umbrella.
· Disaster recovery and business continuity define how an organization responds to a cyber-
security incident or any other event that causes the loss of operations or data. Disaster recovery
16
policies dictate how the organization restores its operations and information to return to the same
operating capacity as before the event. Business continuity is the plan the organization falls back
on while trying to operate without certain resources.
· End-user education addresses the most unpredictable cyber-security factor: people. Anyone can
accidentally introduce a virus to an otherwise secure system by failing to follow good security
practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB
drives, and various other important lessons is vital for the security of any organization.
(A)
17
(B)
18