You are on page 1of 250

CBSE Code 402

Information
Technology
Class 10
Skill Subject Level- 2
Based on OpenOffice/LibreOffice
(Suitable for Windows & Ubuntu)

CONCEPT:
Gagan Agarwal
Founder & M.D.
COMPOSED BY:
David Singh
CLDP, MCA
25 yrs experience in IT
REVIEW PANEL
Vinita Sharma (HOD- CS)
St. Teresa School, Indirapuram
MCA, B.Ed & PGT
20 yrs experience in IT

Ranjana Gandhi (HOD- CS)


Vishwa Bharati Public School,
Dwarka, Delhi
MCA & B.Ed
27 yrs experience in IT

Zeba Ayaz (HOD- CS)


Rabea Girls’ Public School, Delhi,
Branch Humdard Public School
B. Com (Hons.), MCA, MBA(IT)
21 yrs experience in IT
EDITED BY:
Hitesh Saini
8 yrs experience in IT
DESIGNED BY:
Gareema Balwani
10 yrs experience in Designing
Contents X
of an Entrepreneur 68
PART A: EMPLOYABILITY SKILLS
Session-3 : Myths Related to
Term 1
Entrepreneurship 69
Unit-1: Communication Skills - II Session-4 : Entrepreneurship as a
Session-1 : Various Methods of Career Option 70
Communication 5
Unit-5: Green Skills - II
Session-2 : Providing and Receiving
Session-1 : Understanding Sustainable
Feedback 12
Development 73
Session-3 : Communication Barriers and
Session-2 : Importance of Sustainable
Its Measures 16
Development 74
Session-4 : Principles of Effective
Session-3 : Sustainable Development:
Communication 19
Challenges and Solutions 75
Session-5 : Basic Writing Skills 21

PART B: SUBJECT SPECIFIC SKILLS


Unit-2: Self-Management Skills - II Term 1
Session-1 : Stress and Its Effects 30
Unit-1: Digital Documentation ( Advanced )
Session-2 : Stress Management
Session-1 : Document Styles 80
Techniques 33
Session-2 : Working with shapes and
Session-3 : Ability to Work
Images 82
Independently 36
Session-3 : Document Template 89
Session-4 : Creating Table of Contents 94
Unit-3: Information and Communication
Session-5 : Mail Merge and Labels 96
Technology Skills-II
Session-1 : Operating System & Basic
File Operations 42 Unit-2: Electronic Spreadsheet ( Advanced )
Supplement : Ubuntu Operating System 47 Session-1 : Subtotals, Data Consolidation,
What-if-Analysis (Scenario,
Session-2 : Apply Basic Skills for Goal Seek & Solver) 107
Care and Maintenance Session-2 : Referencing and Linking
of Computer 53 Sheets 113
Supplement : Computer Maintenance in Session-3 : Share and Review Sheets 119
Ubuntu 56 Session-4 : Working with Macros 124
Session-3 : Computer Security and
Viruses 57
Unit-3: Database Management System
Supplement : Antivirus in Ubuntu 63
Session-1 : Database Concepts 138
Term 2 Term 2
Unit-4: Entrepreneurial Skills - II Session-2 : Data Storage 141
Session-1 : Characteristics of an Session-3 : Manipulating Data 145
Entrepreneur 65 Session-4 : Creating a Database
Session-2 : Role and Significance Object 146
Session-5 : Creating and Working with Session-4 : Chatting with a Contact-
Tables 147 Google Talk (Hangout) 202
Session-6 : Relationships and Session-5 : Creating and Publishing
Referential Integrity 158 Web Pages-Blog 203
Session-7 : Create and Manage Session-6 : Using Offline Blog
Queries 160
Editors 207
Session-8 : Structured Query
Session-7 : Online Transactions 212
Language 168
Session-8 : Internet Security 216
Session-9 : Building Forms 174
Session-9 : Workplace Safety 220
Session-10 : Design Reports 181
Session-10 : Maintain Workplace
Safety 223
Unit-4: Web Applications and Security
Session-11 : Prevent Accidents and
Session-1 : Accessibility Options in Emergencies 226
Windows 190
Session-12 : Various Workplace
Supplement : Accessibility Options in Emergencies 231
Ubuntu 192
Projects 242
Session-2 : Networking
Sample Questions Term-I 243
Fundamentals 195
Sample Questions Term-II 245
Session-3 : Introduction to Instant
Shortcut Keys 247
Messaging 200
CLASS – X SESSION 2021-2022
Total Marks: 100 (Theory-50+Practical-50)

INFORMATION TECHNOLOGY (402) Class X


(Session 2021- 22)
NO. OF HOURS MAX. MARKS
TERM UNITS for Theory and for Theory and
Practical 200 Practical 100
Employability Skills
Unit 1 : Communication Skills-II 10
Unit 2 : Self-Management Skills-II 10
TERM I Unit 3 : Information and 5
Communication Technology 10
Skills-II
Unit 4 : Entrepreneurial Skills-II 15 5
TERM II
Unit 5 : Green Skills-II 05
Total 50 10
Subject Specific Skills Theory Practical
Marks
(In Hours) (In Hours)
Unit 1: Digital Documentation
12 18 8
(Advanced)
Unit 2: Electronic Spreadsheet
TERM I 15 23 10
(Advanced)
Unit 3: Database Management 04 07 02
System
Unit 3: Database Management 14 20 10
System
TERM II
Unit 4: Web Applications and 15 22 10
Security
Total 60 90 40
Practical Work
Practical Examination 20
Advanced Documentation: 5
Marks
Advanced Spreadsheets: 5
Marks
Databases : 10 Mark
Viva Voce 10
Total 30

Project Work/Field Visit 10

PORTFOLIO/ PRACTICAL FILE 10

Total 20

GRAND TOTAL 200 100


PART A: Employability Skills
Unit
Communication
1 Skills- II

Session-1 Various Methods of Communication


Communication is the very basic need of the living beings to live and survive. All living beings
communicate. Human beings have even developed numerous languages over the period of vast
history that helps them communicate with other fellow beings.
Communication is a process to give to and receive information from others. Interacting with others
while exchanging information is called Communication.
Every communication has a purpose. If that purpose needs to be met, right skills need to be
exercised. The way you communicate decides the course and progress of the communication
further whether it will reach the desired purpose or not.
Process of Communication
Communication process involves the following elements:
Sender: Primary source of originating information or idea is sender. This could be an individual or
a group which conveys their message across to the intended receiver.
Message: The actual content communicated by the sender is the message.
Encoding: The way message is communicated to the receiver is called encoding. Encoding relies
on 3 key features: Clear, Complete and Correct. A message encoded in simplest of the form,
covering all details and correct information is considered as a well encoded message.
Communication Channel: The medium of communication is called communication channel. It
could be as simple as two individuals conversing with each other in person or as advanced as two
groups interacting across the globe through a sophisticated communication technology like video
conferencing. Various possible communication channels are: oral face-to-face, written and
technology-based through telephone, email, chat, video conferencing etc.
Receiver: Individual or party that receives the sent message is called receiver of the message.
Receiver is supposed to decode the received message.
Decoding: Interpretation of the received message and deriving the intent of the message is called
decoding. It directly depends upon how well the message has been encoded earlier by the sender.
Parts of Communication Process
Communication process relies on following 3 functional parts:
Transmission: Transmission of the message to be communicated is taken care of by the sender
and it is sender’s responsibility to determine the suitable mode and channel for communication.
The purpose is to transmit the message across to meet the purpose of the intended communication
without any interruption.

5
5
Receiving: The transmitted message id received by the recipient of the message. Receiving
depends on the mode and channel. It may be in the form of listening (oral communication),
reading (written communication) or watching and listening.
Feedback: Response to the received message is called feedback. If the response is as desired that
means receiver has decoded the message correctly and responded accordingly otherwise there
could be a need of resending the message with better encoding.

Communication Methods
Communication is something we do even when we think we are not communicating.
Speaking, writing and gesturing only is not communication. We communicate even when we do
not speak, write or gesture. Sitting quiet and still is also a mean of communicating message to
others that probably you need to spend some time with yourself welcoming no external
interventions.
Good communication involves suitable choice of the means of
communication. Depending on the requirement, we resort to different
methods of communication. 55% of entire communication occurs in the
form of body language, 38% through voice and tone while 7%
communication is done using words. The basic methods of
communication are:
¤ Verbal
¤ Non-verbal
¤ Visual
Verbal Communication
The tools of verbal communication are words and grammar of the language used in
communication. Verbal communication has 2 forms:
Oral Communication
This kind of communication occurs face-to-face while words are spoken. It is the easiest and
effective way of communication. The message travels fastest to the receivers, encoded quickly and
feedback is given almost in real time. A fundamental protocol of speaking and listening in turns is
followed by the sender and receiver. Factors that determince effective oral communication are:
Proficiency of language: The senders and receivers need to have workable command over the
language for smooth decoding/ encoding of the messages exchanged. This also includes correct
pronunciation, desired vocabulary and knowledge of basic grammar of the language.
Accent, pace and clarity: People from different regions have different ways of speaking which is
called accent. How fast or slow the person speaks makes the pace for speaking and how clearly
the words are delivered makes for the clarity of the speech.
Volume, mood and emotions: What is the pitch of the speech, harsh delivery or higher volume
may affect the communication negatively. Fundamental set of emotions during the communication
makes for the mood of the sender and receiver. Right kind of emotions steer the communication in
the right direction.
Duration of communication: For how long the communication must and is going on affects the
interest level of the participants. Too long a duration of oral communication will leave the receiver
disinterested. Oral communication should be clear, simple and short.

6
5
Advantages of Oral Communication
¤ It involves no or least expenses.
¤ Saves a lot of time.
¤ Immediate feedback is collected, and messages can be encoded accordingly.
¤ Interpersonal nature develops relations.
¤ Most effective in resolving conflicts or difficult situations.
¤ Promotes cooperation and team work.
¤ Helps in making decisions and persuasive.
¤ Useful for all kinds of audience.
Disadvantages of Oral Communication
¤ It has no legal value. It has no importance in the court of law.
¤ No liability, accountability and reference value on what has been agreed upon during the
communication.
¤ Greater scope for errors due to poor comprehension and forgetfulness.
¤ Not useful for longer duration.
Written Communication
This type of communication involves written word. Most of such communication is formal. Letters,
reports, notices, newsletters, resume etc. are the examples of written communication. Email, SMS
and chat are other modes of written communication. Written communication needs to be clear,
to-the-point and correct in order to convey its right meaning and intent to the receiver.
Advantages of Written Communication
¤ Writing has the advantage of having time for the choice of suitable vocabulary and tone of the
message. Message can be reviewed and revised before sending.
¤ It is legally acceptable in the court of law if executed in proper way.
¤ Longer messages can be conveyed in written form.
¤ Written messages can be saved for later reference.
¤ Written messages can be duplicated and distributed.
¤ Written messages help building up goodwill and image of the sender.
¤ With written messages comes accountability.
Disadvantages of Written Communication
¤ Written communication is time taking.
¤ Takes long for taking decisions.
¤ Sometimes they can be misinterpreted due to lack of emotion and personal touch.
¤ May involve costs in drafting and sending the messages.
¤ It is unsuitable for illiterate people.
¤ Confidentiality can be compromised with written communication.

7
5
Effective Verbal Communication
Active Listening: Oral communication demands listening attentively
and sincerely. This directly helps us to understand the communicated
message as desired. When we listen sincerely, we can ask correct
questions for better understanding. Listening better minimizes the
chance of misinterpreting the message and avoiding misunderstanding
and conflict later.
Clarity on the background and purpose of communication: For
a smooth and successful verbal communication, sender/ speaker and
receiver/ listener should be clear on the agenda and purpose of the communication. They should
share common understanding as to why the communication is taking place. This also ensures
mutual understanding between the sender/ speaker and the receiver/ listener. What receiver/
listener needs to know is very important.
Concise, clear and direct message: The speaker/ sender of the message should ensure that the
message sent should avoid unnecessary details. It should be suitably short. It should be direct
without complicated inferences. It should not leave any room for confusion for receiver/ listener.
Language and vocabulary: Command over the language and choice of appropriate words that
justify the context is very important. Both sender/ speaker and receiver/ listener should share
common understanding of the language being used as medium of communication.
So, it is important to keep in mind certain important points before communicating or responding
to the message such as:
¤ Be prepared before communicating.
¤ Anticipate responses for better communication.
¤ Ensure that everyone involved in the communication process has the background of what
needs to be discussed.
¤ Avoid out-of-context references.

Activity
Activity 1: Importance of context knowledge in communication
Activity Conduction: Ask a few students to speak for 3 minutes on an entirely strange
and difficult topic about which they are not likely to know much.
Debriefing: Debrief the students about the importance of knowledge and background
awareness of the context of communication.
Activity 2: Oral vs Written Communication
Activity Conduction: Think of a topic like Reminder for upcoming practice exam.
Ask 2 students how will they announce this reminder going into each class room? Let
others observe when they stand up and speak to show how they would do it. Then ask the
students to write the same reminder or notification as a formal note to be rotated in all the
classes.
Debriefing: Ask the students about their observation about two kinds of communication –
oral and written. Discuss the comparison of both with the students.

8
5
Non-Verbal Communication
Non-verbal communication occurs along with non-written verbal communication (oral,
telephonic, video meeting) and greatly affects the verbal communication. Verbal communication
refers to what is said while non-verbal communication is how it has been said. The factors that
constitute non-verbal communication are in general referred to as body language that includes
our posture, gestures, expressions, tone and quality of voice, and our movements etc.
Body Language
The factors that constitute non-verbal communication are in general referred to as body language.
They are discussed below:
Voice or Paralinguistics: Unknowingly or subconsciously our voice affects our communication
negatively or positively. Our emotions govern the tone of our voice. Our accent (the way we
speak) determines the clarity of what we speak. Pitch, speed (pace), pauses and intonation
determine how sincerely we are involved in the communication and how we develop a
connection with the other people.
Eye contact: Eyes are the window to the soul – we have heard this often. Eye contact reflects
sincerity or lack of it. Direct, frank eye contact reflects confidence, truth and sincerity. Eye contact
engages others in your conversation. Looking away reflects insincerity, falsehood and carelessness.
Posture and Gestures (Kinesics): The way we sit, stand and walk tells others about our mood,
attitude and interest. Erect stance reflects confidence. If you are really interested, you will lean in
the direction of the person speaking. Looking away, changing posture quite often, leaning away -
this all indicates your disinterest in the conversation. Gestures that we do subconsciously give us
away. Pointing finger seems aggressive. Fidgeting (making small movements with fingers or feet)
shows disinterest or getting bored. Shoulder shrug seems careless or aloof. Folded arms mean
defensive or disagreeing. Sitting slump shows lack of interest. Gazing into space reflects total lack
of attention and interest. Relaxed, straight posture, attentive eye contact, sincere nod with the face,
sitting with open hands, straight shoulders are signs of positive postures and gestures.
Facial Expressions: Frown, grimace, tense facial muscle, sad eyes, lack of smile are some
negative facial expressions. Suitable smile, understanding, sincere eyes, composed and calm face
make for positive facial expression and encourage people to connect with you subconsciously.
Physical space or Proxemics: We make use of an invisible boundary of space around us while
communicating. The span of this space varies from culture to culture. Approximately 7 inches from
us is intimate zone meant for people who are really close to us like spouses or mothers and their
infant child. Up to 1 meter is friend zone that we maintain in public gatherings. Up to 12 feet is
Social zone and Audience zone. Breaching or moving into these spaces makes the person
uncomfortable. Being respectful to other people's personal space creates a good impression and
people open with you quickly. Reverse of this leads to people becoming wary of you and become
less receptive of what you must communicate.

9
5
Activity
Activity 1: Nothing Emotional About This!
The Activity: Ask 2 students to participate in this activity. Ask the first participant to speak
about his/ her hobby for a few minutes without smiling or showing any emotions or
expressions and a plain voice. Then ask the second participant to do so in a natural way.
Debriefing: Discuss with class what did they observe in the two speeches. Which one was
interesting and why?
Activity 2: Our School and Proxemics
Ask the students to come up and share their
observation about sense of space or kinesics in
various places of school.

Touch or Haptics: Friends touch each other casually in a way which is


different from formal. Formal touches are very few such as, handshake
and pat on the shoulder or back or on the side of upper arm.

Firm handshake reflects confidence and positive energy. Loose, clumsy


handshake is called dead-fish handshake reflects lack of confidence and
disrespect. Touch plays major role in certain fields like sports and performing arts like theatre,
dance and acting. Affectionate hug by mother or friend, a casual peck on the cheek, friendly pat
on the back, high-five etc. are examples of touch.
Advantages of Body Language
¤ Positive body language supports and reinforces oral communication.
¤ Suitable body language helps develop conducive relationship among the communicators.
¤ It helps during the noise or any other barriers in communication.
¤ Many times it becomes a mean of visual communication (traffic policeman signals).
¤ It complements the verbal message and helps communicate clear and correct intent.
¤ It helps in dealing with language and cultural boundaries.
¤ It helps in quicker transmission of the message.
¤ It helps people with physical challenges or literacy issues.
¤ It saves time and easily helps in repetition of the message.
Disadvantages of Body language
¤ Body language alone cannot be used to transmit message.
¤ It is prone to be misunderstood and misinterpreted.
¤ It conveys different meaning in different cultures and regions hence difficult to master.
¤ It is a continuous process and cannot be stopped.
¤ Body language is vague and imprecise.
¤ All signals sent through body language cannot be caught due to several distractions.
¤ It does not follow any precise set of rules.

10
5
Visual communication
Visual communication involves visual symbols,
pictures, graphics, signs and charts etc. Traffic
signs and public signs are the most common
examples of this. Some other instances are:
¤ Your teacher often uses visual aids to explain
certain concepts.
¤ Use of presentation software with graphics
and charts during a meeting.
¤ Signs in the hospitals.
¤ Icons and symbols In media and on
computer, social platforms and other web
sites.
¤ Icons, symbols, gifs and emoticons in smart
phones.
¤ Symbols on public places.
¤ Company logos, trademarks and signs.

As you can figure out from these


examples, visual communication is
instant, specific, clear and with zero
ambiguity. Visual symbols support what
we communicate such as teaching
learning aids support the explanation of
the concept and help in learning, visual
presentation conveys more content
clearly and saves a lot of time, people
follow visual communication easily,
quickly and with least chance of
misinterpretation. It serves the purpose of
a quick, brief message top be
communicated. For example, school
ahead, left turn, do not smoke etc. Visual communication engages our interest easily and quickly. The
creativity of symbols, charts and graphics make the communication interesting and break the
monotony of speech and written word.
However, visual communication has its limitation in that:
¤ It has its usefulness up to some extent.
¤ It cannot replace the content of speech and written word completely.
¤ It plays supporting role in communicating our ideas.
¤ Symbols which are not accepted as standard are difficult to understand or may be
misinterpreted, like, everyone knows that red light means stop and wait while an insignia of a
company or a vehicle might be difficult to understand and remember.

11
5
EXERCISE
Answer the following questions in brief:
1. What do you mean by oral communication?
2. List the things we should keep in mind while communicating orally.
3. How does body language influence our communication positively?
4. How does body language influence our communication negatively?
5. Explain the role of non-verbal communication in our day to communication.
6. What are the importance and limitations of visual communication?
7. List the meaning of any 10 signs and symbols you have seen around in public places.

Session-2 Providing and Receiving Feedback


Feedback in Communication Cycle
We have already learnt about communication process and its elements. Let us have a quick look at
them again.
Sender: Primary source of originating information or idea is sender.
Message: The actual content communicated by the sender is the message.
Encoding: The way message is communicated to the receiver is called encoding.
Communication Channel: The medium of communication is called communication channel.
Receiver: Individual or party that receives the sent message is called receiver of the message.
Decoding: Interpretation of the received message and deriving the intent of the message is called
decoding.
Feedback: Response to the received message is called feedback. If the response is as desired that
means receiver has decoded the message correctly and responded accordingly otherwise there could
be a need of resending the message with better encoding.
Response from the receiver tells the sender if his/ her message has been understood as desired and
accordingly sender gives the response next. Similarly, receiver also observes how his/ her response has
been received. This process goes on until the communication cycle ends.
Meaning and Importance of Feedback
In addition to the dynamic feedback that helps in progression of a communication cycle there is
another kind of feedback which makes a major and formal part of communication. This kind of
feedback is different from that used in communication cycle.
The feedback that is given to people has one common purpose an that is to help the person improve
his/ her performance, productivity or output. Some examples of providing feedback are:
¤ Teachers discuss student's performance with his/ her parents in school meeting.
¤ Team lead giving feedback to the team mate about what went wrong, what could have been
better and what went well.

12
5
¤ Coach feeding the players back on the observations he made after watching their game in the
previous match.
¤ Employer giving feedback to the employee and establishing expectations of the company and
how employee can contribute in it.
¤ Parents advising children about pros and cons about something out of their experience.
In certain cases, feedback is collected to gauge the understanding of the listener. For example
¤ Teacher asking specific (to a particular student) and broadcast (open to all) questions after
explaining a concept in the classroom to gauge the understanding of the students.
¤ A restaurant floor manager gathering experience of the guests after the dinner.
¤ Views of all the participants are collected in a review meeting about a new product.
¤ A TV channel collecting viewers' feedback through SMS about their channel content.
¤ A doctor enquiring with the patient asking specific questions to decide further course of treatment.
¤ An army commander asking the troops – “Koi Shaq?” (Any doubts?) after briefing them about the
mission they are going to embark upon.
So, what do you mean by feedback?
A feedback completes the communication cycle. Feedback also helps communicators adapt to the
changes in communication. Feedback helps communicators devise their next response and ensure
that actual purpose of communication is met. Feedback brings about the fruitful end of the
communication. Feedback enriches the quality of communication, productivity of the people and
creates a conducive environment for performance and achieving the goals.
Positive Feedback
Some characteristics of a positive or good feedback are:
¤ Feedback should be multi-dimensional. It should give enough data to the person receiving the
feedback so that he may understand it correctly. For example, teacher gives different feedback
through class tests and preparation exams.
¤ Feedback should be non-evaluative. It should not tell how person has been compared or j u d g e d .
It should simply tell what the candidate should do to do even better. For example, teacher does not
compare one student with the other. All are individually performing according to their capacity.
¤ Feedback should be supportive. Recipient of the feedback should not feel criticized and bad about
it. For example, a coach tells the player exactly how to deliver a service or make a throw or kick the
ball or finish the run or what to do to build stamina.
¤ Feedback should be consistent. Feedback should be related to the details concerning candidate's
performance. It should not be out of context. If multiple feedbacks are given then they should not
contradict each other. For example, current feedback is related with the previous feedback and
previous performance so that a progress can be evaluated.
¤ Feedback should be constructive. They should help the candidate feel confident and determined
to do even better instead of feeling disheartened or discouraged. Teacher encourages you and
motivates you to do better and gives you certain helping tips.
¤ Feedback should be timely. Timely feedback helps candidate correct the performance timely and
with lesser efforts. For example, teacher gives you the feedback right after the test or coach does
not wait for ten more matches before giving the feedback on the first game of the player.
¤ Feedback should be specific. It should not mix details and data of any other related performance
or activity. For example, feedback is given in very short, precise sentences or even phrases. It is not
unnecessarily elaborate like a story. It is clear, precise and compact.

13
5
Negative Feedback and its Impact
Negative feedback is the process of conveying what should not have been done and how it should be
corrected. It depends a lot on from whom the negative feedback is coming from. If it is coming from a
respected individual such as elderly person, parents, effective team leader or admired senior then it
will be welcomed but in many cases, negative feedback does not serve the purpose.
¤ Negative feedback is useful where corrective actions are needed to be conveyed.
¤ Negative feedback is also useful where processes are running in strict discipline such as medical
operations, defence operations and very formal setups.
¤ In general communication, negative feedback needs to be given very carefully and should be
supported with the suggestions and solutions to resolve the negative aspect.
¤ The attitude and the receptivity of the feedback taker determines whether negative feedback suits
him/her or not. Negative feedback is useful for emotionally mature people.
¤ In cases where non-performance is a big issue, negative feedback is a must.
¤ Negative feedback should be given in private and respecting receiver’s privacy.
¤ Avoid comparisons in a negative feedback. This will only put a negative impact on the receiver. No
one likes to be compared with others in such situations.
¤ Do not criticise. Structure the negative feedback with a constructive approach, useful suggestions
and effective examples.
¤ If possible, combine negative feedback tactfully wih a positive feedback to ease down the receiver.
Some examples of negative feedback are given here.
¤ ”Would that be fine with you to take up multiple projects or should you focus on one project at a
time? What do you say?”
¤ You accomplished these targets as desired, let us see what were the barriers in achieving these
targets which were left out. Let’s discuss.”
¤ ”Its not that you cannon accomplish this task but there are certain things you need o keep in mind.....”
¤ ”There are certain performance standards we need to meet to make this project acceptable by the
clients since it is theior requirements. We do not have the liberty to compromise with them.”
¤ ”This the third time we are discussing on this issue and as we look deep into it , we come across
same corrective actions needed to be taken. So, its necessary to not miss these actions and work
with all determination in this direction. We might not get more chances to make it right again.”
Descriptive Feedback – Oral and Written
In certain cases, there is a mechanism of descriptive feedback which is a detailed exercise to train and
improve the candidate or participant. This feedback is not very frequent but they are given at certain
important time intervals.
¤ Descriptive feedback is the result of keen, objective observation and evaluation. For example,
your teacher gives you feedback on you performance in the previous test so that you do better in
you exams. The purpose of the feedback is to help the individual improve on what he/ she has
already been doing. Hence, providing feedback is a very sensitive and delicate job. It should not
sound like criticism or accusation.
Tips for Providing Feedback
¤ First emphasise on positive feedback.
¤ Feedback should be about behaviour and attitude not the personality.
¤ Present the negatives tactfully and suggestions for improvement.

14
5
¤ Do not make personal comments.
¤ Provide solution to each negative finding.
¤ For detailed feedback, chose a calm, closed place where no one should disturb.
¤ Receive the response to feedback with an open mind.
Tips for Receiving Feedback
¤ Do not interrupt the feedback giver.
¤ Listen to the feedback attentively, if possible make quick notes for later reference.
¤ Keep positive body language - posture, eye contact, facial expressions and voice.
¤ Understand that purpose of feedback is not criticism but help in further improvement.
¤ Be self-aware and in self-contro (emotional intelligence). Do not let emotions spoil the process.
¤ Ask short, specific questions if you have doubt in understanding some thing.
If needed and possible, ask time to prepare for your response.
Non-specific and Specific feedback
Feedbacks are given in two modes: non-specific or general and specific feedback. General feedback is
given at short terms or durations for quicker improvements. General feedback is also given to a group
of candidates instead of individual (this could be done for specific feedback too sometimes). General
feedback covers only the details which help you in improving and adapting quickly to what is required
to perform better. For example, sports teacher says: You need to practice a little more about your
backhand. Here, teacher has not specifically told you what is wrong with your backhand (when ball or
shuttle comes at the hand with which you are not holding the bat or racket) but feedback told you to
play more shots at backhand.
Specific feedback is usually given to an individual or a small group of candidates. It specifies the
information in detail and provides solutions for improvement. Specific feedback is suggestive also,
that means, with the feedback you get the advise and suggestion to eliminate the problem and
improve better. For example, teacher says: Bring your hand a little down with wrist bent upwards while
playing backhand. Here, with the problem, a solution is provided too. Another example is when
teacher says: If you revise the answer sheet before submitting, you can secure at least 10 more marks.

Activity
Give and receive feedback: A few students should prepare and present a topic in
classroom for 5 minutes. Rest of the class will note down their observations to provide some
positive and negative feedback to the speaker after presentation. Students must use the
feedback giving skills in doing so. Teacher must intervene where ever required. Presenter
must show feedback receiving a skills and questions to the feedback givers to clarify any
doubts.
Debriefing: After the above activity, teacher will again reinforce about feedback giving and
taking skills as well as how the activity went.

EXERCISE
Answer the following questions in brief:
1. What is the role of feedback in communication cycle?
2. How should we perform feedback gathering during communication cycle?

15
5
3. List 4 examples of providing feedback.
4. List the advantages of feedback in brief.
5. List 4 major skills of giving and receiving feedback.
6. What is the basic difference between specific and general feedback?

Session-3 Communication Barriers and Its Measures


Communication Barriers
We have learnt about barriers to effective communication earlier. To quickly summarise it, let us
do a short recap.
There are several factors that constantly function as barriers for better communication.
Physical conditions constitute the environment of communication. Hot or cold room, bad seating,
poor light, defective communication medium, slow speed of internet while interacting online are
environmental barriers in communication. These can be anticipated and taken care of in most of
the cases.
Noise, distractions of any sort, distance, undesired turn of events during the communication
process are situational barriers which are sometimes difficult to anticipate and need to be handled
deftly as they occur.
We tend to jump to conclusions. Mind wanders while listening. Emotional state, patience level,
temperament, liking and disliking of the communicators are some barriers in effective listening.
Unprejudiced, fair and attentive listening is a skill that can be developed slowly for successful
receiving and decoding of the message.
The parties or groups involved in the process of communication may exhibit following behavioural
or personal traits which act as barriers to effective communication:
¤ Behaviour due to age difference, attitude, gender, cultural difference, professional and social
differences etc.
¤ How proficient are the sender and receiver in the language in which communication is being done?
¤ Ailments, disappointments due to some other reasons, personal grudges against people,
hidden intentions, hostile agendas.
Where Do Communication Barriers Come From?
No matter what kind of communication is taking place, there are always certain barriers which
arise. Let us understand the reasons that cause these barriers.
Language: Not using simple, non-ambiguous, clear and relevant language. Think of a doctor
briefing a patient in pure medical terms or a lawyer doing so in legal terms with his client? Why do
we need teachers when we have books already? Teacher explains the concepts in simple manner
so that when you read the book, you understand what is written.
Inappropriate emotions: Think of explaining your point to your angry friend. Would he/ or she
understand? No. He/ she is not in the state of mind to understand reason so wiat for the things to
calm down.

16
5
Lack of attention: We get distracted easily. As a listener it is our duty to listen to what is being
told attentively. Do you remember a instance where you were distracted by something happening
outside the window of your classroom and could not get what teacher had been saying?
Perceptions and prejudice: The image and impression of the other person makes us prejudiced
towards him and we judge according to it what he/ she says. If we think that the other person is
dishonest or liar, we shall not trust what he/ she says. Prejudice towards race, religion, region,
gender, age and castes are greatest barriers of communication and should be avoided.
Physical challenges: Disability in hearing or challenge in speech are physical condition barriers.
Body language and non-verbal cues: Many times we avoid or misinterpret posture, gesture,
expressions and voice intonations. A person looking dull may be ill or not well but still be
interested in what you have to say. A person giving cold handshake may still be prepared for
meeting and confident.
Cultural and language differences: Difference in accent, pronunciations, customs, use of
idioms and phrases, use of figures of speech and differences in body language create barriers in
encoding and decoding the messages during communication.
Over expectations: Sometimes we expect more than what is required from the communicator. If
teacher says Tomorrow we will have little fun. then we expect that he/ she will not teach tomorrow
while actually he/ she planned to do an interesting activity to teach a new concept.
Noise: This refers to the physical noise as well as any reason that creates difficulty in getting the
message clearly such as bad handwriting, incomplete message, difficult language or vocabulary,
poor telephone connection, misprints, torn or old papers bad internet connection etc.
Physical barriers: Distance, location and physical setup of the place where communication is
taking place make communication difficult. Sometimes teacher needs to shout at the din created
by the students in the class. In a big hall, it becomes difficult sometimes for the audience sitting at
the back to hear what is said by the speaker.
Overcoming Barriers to Communication
If you understand the reasons that cause communication barriers, you can easily overcome them.
Let us see how we can overcome communication barriers:
Be prepared always: Every performance needs preparation and practice. Effective
communication is no less than a performance and you need to be very clear what should be
discussed about. All participants of a communication cycle need to be clear on the agenda and
objectives of communication. Lack of preparation leads to misinterpretations, misunderstandings,
lack of self-confidence and incomplete messages.
Language competency and usage: Communicate in clear and simple language. With suitable
language we connect with others easily and people understand us easily. This builds better trust
among people and the environment of communication becomes comfortable and conducive for
successful communication.
Right mood, attitude and behaviour: Every kind of communication requires a particular
mood and attitude. Our emotions should not spoil the communication process. We should show
emotional intelligence during communication and avoid being to emotional or showing negative
attitude. Think of an attentive class. It will always be more receptive of what teacher is explaining
than a class which is not ready to listen.
Drop prejudices and assumptions: Do not let earlier impressions and unnecessary assumption
affect the communication. Come above the differences of caste, region, religion, gender and age
while communicating.

17
5
Careful handling of cultural differences: While communicating with the people from different
culture, country or region, if possible, do some homework on their customs and general etiquettes
before beginning with the communication. Be very polite and humble. Respect and humility are
the major qualities people seek in such scenarios. Knowledge of local customs and preferences
help a lot in cross-cultural communication.
Handling physical challenges: Be wary of the physical conditions of the participants like
challenges in hearing and speaking. This also needs careful and polite handling. Make good use of
your speaking skills, suitable pauses and clear pronunciation of keywords. Pace of the speech and
volume can be adjusted according to the need of the receiver. Show patience to such participants.
Setting up expectations and agenda: Before starting with the communication, establish the
reason and purpose of communication so that people should not over or under expect. Doing this
helps in smooth communication and easy understanding of the messages exchanged. For example,
teacher lets us know the learning outcomes of the topic to be learnt so that we know what we are
going to achieve after the topic is over.
Body Language: While observing the body language of others, take care of your own body
language too. Is you posture right as you sit, walk or stand? Is your eye contact reflecting
confidence? Are you expressions complimenting your speech? Are your gestures polite, confident,
open, comforting, supporting or going against what you are speaking? Is your voice commanding,
too demanding, too polite, rude, reflecting lack of confidence, too loud? Overall, your body should
not betray what you communicate.
Condition and use of medium of communication: Ensure that communication medium is
suitable and works well. In oral, in-person communication there should not be distraction and
audible noise. In other kind of communications the equipment, connection medium, technology,
and network should work as desired otherwise they spoil the purpose of communication.

Activity
Activity 1: Language as Communication Barrier
Prepare a topic so that you present using toughest and rarest of keywords, terms and
examples. After explaining, ask the students if they have understood it. Those who have not,
ask them the reason. Then explain the same topic in a simple language. Ask the difference
and elaborate on the importance of language in communication.
Activity 2: Unpreparedness as Communication Barrier
Display on the board certain tasks to be done by the students. Keep the details of the tasks
incomplete or missing. Let the students come up with natural questions to understand the
tasks. Later explain them drawbacks of unprepared communication and importance of asking
questions.

EXERCISE
Answer the following questions in brief:
1. Is it true that every communication may have certain barriers? How?
2. How do communication barriers adversely affect communication cycle?
3. List certain major communication barriers in day to day communication.
4. List major ways to overcome common communication barriers.
5. List some day-to-day real life communication barriers you have observed.
6. How does body language pose barriers in communication? How can we take care of it?

18
5
Session-4 Principles of Effective Communication
Effective Communication
Ability to express ideas in the most effective way to bring out desired results is the core of
communication skills. Effective communication promotes understanding, aids in decision making
and developing good relationships with others. Do the following for effective communication:
¤ A communication code is mutually agreed. How and in which manner the communication
should proceed is very much important. The language, environment and mode of
communication also constitute the code of communication.
¤ When the message is encoded well. Clear, complete and correct message is the strength of
communication. This ensures right intention and purpose of the message is communicated.
¤ Receiver of the message is responsible for how well message is being received and
interpreted. Better listening, suitable attention, understanding of the purpose of the
communication and a considerate temperament are the keys to correctly decode the message
and avoid jumping to conclusions or falling prey to misinterpretations.
¤ How suitable is receiver's response to the communicated message? This decides further
progress of successful communication.
Characteristics of Effective Communication
¤ Communication should be clear in content and purpose.
¤ Communication should be complete with least scope of questions.
¤ Communication should be based on right facts and should not be vague.
¤ Written communication should be concise and to-the-point.
¤ Good communication develops relationships, promotes confidence and creates goodwill.
¤ Effective communication leads to desired output and achievements.
¤ Effective communication establishes responsibility and accountability.
¤ It provides right kind of persuasion, guidance and consultation.
7 Cs of Effective Communication
In the vast sea of wisdom about communication let us find out the pearls of 7 Cs of effectively
communication. An effectively communicated idea or message has following qualities:
Complete Message (avoids confusion, ensures desired response)
What could happen if communication is incomplete? How do you determine that message is
complete?
it sounds difficult but, in fact, it is fairly simple. If you can answer following questions regarding
your message, you will never encode an incomplete message:
Who this message is meant for and who all will be affected by it? - Recipients/ audience
What exactly do you need to convey through your message? - Agenda or objectives
When is the right time to communicate the message? - Time and duration
Where are the participants of this communication cycle? - Location and availability
Why do you need to do this communication? - Purpose
How are you going to communicate? - Method

19
5
Concise Message (saves time, promotes understanding)
Concise means to-the-point, appropriately sized. Depending on the kind of communication, the
duration and contents of the messages need to be determined. A too long message leads to
confusion and misunderstanding. A too short message leaves doubts and questions. Concise
message contains necessary and relevant information.
Considerate Message (promotes good relationships, develops good rapport)
Consideration is an important quality for a good communicator. Keep the recipient of the message
in mind when you communicate. When we convey a message to someone, we keep the kind of
person and audience in mind. Your message should be encoded in such a way that it meets the
requirements of the recipient.
Clear Message (promotes understanding, avoids repeat messaging)
A clear message has simple language and it avoids ambiguous, confusing terms. Sentences are
short and simple. Facts are informed in a language easily understood by all. If there are
instructions, they are in right logical order. A clear message leaves less room for doubts and any
questions to be asked.
Concrete Message (prevent misinterpretations, promotes clarity)
A concrete message mentions expected outcomes of the communication. Concrete message
focuses on the central idea and purpose of the communication and avoids unnecessary details to
prevent distractions.
Courteous Message (develops good relationships, promotes mutual benefits)
Regard and respect for others is the inherent quality of being a human. Politeness, humility, regard
and respect in communication promote healthy relationships and mutually beneficial outcomes. A
courteous message many times wins over the situation and leaves a lasting good impression on the
recipients.
Correct Message (promotes trust, enriches relationships)
All the above Cs fail if message is incorrect. Incorrect message is considered as a lie told and may
lead to serious implications. In personal life it leads to misunderstandings and mistrust. In
professional lives it may lead to lawsuits and loss of goodwill and business. Before communicating,
check the facts. Confirm the data before sending it across. If a message is conveyed incorrectly and
you discover it later, your immediate corrective action should be to broadcast an apology to all
and place the correct message. In first place, this should be avoided by ensuring that correct
message is being communicated.

Activity
Group discussion on Qualities of a good communicator.
After discussing the 7 Cs of effective communication with the students, create groups of 4-5
students and let them discuss the above topic. Later the group leader should present the
main facts and findings of the discussion.
Teacher must play the role of the facilitator in this activity.

20
5
EXERCISE
Answer the following questions in brief:
1. How can you say that a communication done is effective? Take a small example.
2. What factors determine an effective communication?
3. List any 5 characteristics of effective communication.
4. List 7 Cs of effective communication.

Session-5 Basic Writing Skills


Verbal communicating in written form is one of the most effective ways to convey your message.
Written communication requires time to shape your message before sending. This makes written
communication formal in nature. Writing messages needs care since they can be used as evidence
and are the proof of any commitments we make. An effective written communication needs
suitable vocabulary, suitable sequence of ideas, right flow of language and cohesion in overall
message. Basic writing skills can be developed by working on a basic idea first. The command on
the language of communication is a must. If it is not there, we must learn it.
Basic writing skills involve ability to:
¤ Understand and use basic grammar.
¤ Describe people, situations, experiences, weather, incidents etc.
¤ Framing simple, short sentences.
¤ Expressing feelings, ideas. likes, dislikes etc.
¤ Beginning or opening the piece of writing.
¤ Ending or concluding the piece of writing.
Phrase
A set of words that indicates some object or action but does not makes complete sense is called a
phrase while a group of words that makes complete sense is called a sentence.
A phrase is a part of a sentence. For example:
Phrase: a red bicycle Sentence: Lata is riding a red bicycle.
Phrase: is sitting Sentence: The monkey is sitting on the tree.
Phrase: has composed Sentence: Rita has composed a poetry.
Phrase: Planning a trip Sentence: They are planning a trip to Goa.
Types of Phrase
Phrases can be noun phrase, verb phrase, adjective phrase, adverbial and prepositional.
Noun phrase: Indicates a noun. E.g. The child is playing with his toy car.
Verb phrase: Indicates main and helping verbs. E.g. He is eating his lunch.
Adjective phrase: Includes adjectives and/or articles. E.g. Keep this red hat on the metal chair.
Adverbial phrase: Indicates adverbs. E.g. The thief jumped through the window very quietly.
Prepositional phrase: Includes a preposition followed by a noun. E.g. The cat is under the hat.
Understanding Parts of Speech in English
Consider this paragraph: Ravi looked intently at the red book kept on the wooden table. He quickly
picked it up but thought of reading it later.
Noun, verb, adjective, adverb and preposition etc. are called class or part of speech.

21
5
There are 8 parts of speech explained here:
Noun: Name of a person, place, thing, event, animal or idea. For example, in the above sentence,
Ravi, book and table are nouns. Names and titles are usually proper nouns. Rest are called
common nouns.
Pronoun: Pronoun is used in the place of a noun. For example, in the above sentence, he and it
are pronouns as they refer to the book and the table respectively.
Verb: An action or state of being is called verb. Like, looked, kept, picked, thought and reading are
verbs in the above sentence.
Adjective: It describes a noun or pronoun. In above sentence, red and wooden are adjectives.
Adverb: It describes a verb, another adverb or adjective. Intently and quickly are adverbs in the
above sentence.
Preposition: It shows the relationship of one noun, pronoun or noun phrase with other. In the
above sentence, at and on are prepositions.
Conjunction: It connects two words, phrases or sentences. In the above sentence, but is a
conjunction. And, or are also examples of conjunction.
Interjection: It reflects strong emotions, followed by exclamation sign (!). Like, Oh!, Hey!, Wow!

EXERCISE
A. Identify the types of phrase in the following paragraph:
Lata was pleasantly surprised on meeting her friend Anu at the airport. Anu had been
sitting in the waiting lounge when Lata spotted her. They both shared a lot of experiences of
their exciting lives after marriage. Anu said that time flied very fast. They boarded the same
flight bound to Mumbai.
B. Identify the parts of speech in the following paragraph:
There was a girl named Anna who lived with her poor mother. On the occasion of new
year, her mother thought of buying Anna a set of colourful ribbons since Anna had
beautiful, long hair. Anna loved her mother very much. She was also thinking of buying a
beautiful gift for her mother. Her mother used to sew clothes for the villagers. She had a set
of needles and threads which was too old. Anna wished to buy a new set of needles and
threads encased in a shining new glass box for her mother but she did not have enough
money. Suddenly, she got an idea. On the eve of new year, Anna’s mother called her and
said, “Look Anna, what have I got for you, a set of hair ribbons!” Anna said, “Wow! mother,
they are really beautiful but alas!” Saying this she removed her cap and showed her short
hair and said, “Mother, I bought this set of new needles and threads for you by selling my
long hair to the barber.”

Sentence
When a group of words are arranged in such a way that it conveys the complete meaning of an
idea then such group of words is called a sentence.
Examples: 1. Bird flies. 2. What is your name? 3. I am going to the market.
4. Please give me a glass of water. 5. We have made it to the finals!
Kinds of sentences
Sentences are basically categorised into 4:
Assertive sentence state the fact. They are also called declarative sentences.
E.g. His name is Ravi. Sun rises in the East.

22
5
Interrogative sentence asks a question or enquires about something. Such sentences end
with a question mark. E.g. What do you want? In which class do you study?
Imperative sentence makes a request or issues instructions or command.
E.g. Please get aside. Submit the assignment by end if this week.
Exclamatory sentence expresses strong emotions. Such sentence end with an exclamatory mark.
E.g. I am so excited about tomorrow’s match! You did just great!
Kinds of sentences - on the basis of their structure
On basis of their structure, sentences are of following 4 types:
Simple sentence talks about one particular thing. It has only one main clause.
E.g. i. Goa is a beautiful travel destination. ii. I study in class tenth. iii. Chandigarh is a union territory.
Note: An independent clause provides complete meaning of an idea and stands out as a complete
sentence while a subordinate clause does not fully express an idea.
Compound sentence has at least two main, independent clauses and may have subordinate
clauses. All clauses are separated by conjunctions (like and, but, while, when, which, whereas,
therefore etc.)
E.g. I would like to have a coke or a cold coffee. (two main clauses joint.)
I own the hotel which in the center of the main market.
Here, own the hotel is main clause and is in the center is subordinate clause. Both are
joined by the conjunction which.
Some other examples are:
I will try to finish the meal but I am not feeling hungry.
We reached the restaurant but it was already closed so we went to a highway dhaba.
[first clause is independent, second is subordinate and third is independent]
Though he prepared well for the exam he could not appear in it as he fell ill.
[first clause is independent, second is subordinate and third is independent]
Complex sentence has only one main clause and at least one subordinate clause.. E.g. She was
not happy with Ravi because he was late for work.
[first clause is main and second one is subordinate]
Because Ravi was late for work she was not happy with him.
[first clause is subordinate and second one is main]
Note: If a complex sentence has only one main clause then it is called principal clause. Some other
examples with main clause italicised are:
He did not get the book issued after he noticed it was damaged.
Trees are a boon for us because they release carbon dioxide.
As he was hard working he was quickly promoted to next rank.
Compound-complex sentence: A compound-complex sentence is a combination of a
compound and complex sentence. It has two or more independent clauses and at least one
dependent clause.
E.g. i. My car broke down so I took a taxi because I was getting late.
Here, my car broke down is dependent clause and I took a taxi and I was getting
late are independent clauses.
ii. Although I got late but I kept running, in fact, I caught the bus just in time.

23
5
Subject and Predicate
A sentence is composed of two main parts: subject and predicate. Subject is usually the noun about
which sentence is talking about and rest of the part is called predicate.
For example, Dogs bark Here, dogs is subject and bark is predicate.
The sun rises in the East. The sun - subject, rest is predeicate.
A subject can be elaborated using a qualifying word like a noun or adjective.
E.g. The red chair is kept in the lawn. Here, chairs are described red.
A predicate can also be elaborated using a qualifying word called extension.
E.g. He ran disparately to catch the leaving bus.

EXERCISE
A. Identify main clause and conjunctions in following Complex Sentences:
1. The science show was very interesting, as I expected.
2. Now that he's rich and famous, people like even his idiosyncrasies.
3. Even though he trained thoroughly, he still could not win the race.
4. Since winter is coming, I think I'll knit a warm sweater, because I'm always cold.
5. When she was younger, she believed in fairy tales.
B. How can you say that following sentences are compound sentences:
1. She walked to class, but Ravi ran.
2. I like pizza, but my brother likes green vegetables.
3. The nurse held up a doll, and the little girl giggled.

Articles
Articles modify a noun. Articles could be indefinite and definite.
Indefinite articles: A and an are indefinite articles which are used with singular noun. They
signify a noun generally not in particular or specifically.
For example, There bought a book. I saw an aeroplane.
Note: Article an is used before vowel sounds and a is used before a consonant sound.
For example, He eats an apple daily. Butterfly is an insect.
Definite Article: The is definite article. It is used before a specific or known noun. It is also used
before the names of non-living things, religious books, newspapers and magazines etc.
For example, Ram is riding a bicycle. The bicycle is red in colour. (specific noun bicycle).
Anu is the head girl of her school. (specifically Anu).
Washington, D.C. is the capital of the United States of America.
Note: The is generally not used before abstract nouns, plural nouns, proper nouns, names of
metals, colours, games etc. Examples:
Diamonds are precious than gold. Both Ravi and Raj went on a picnic today.
I like to play tennis on the weekends. She is wearing blue jeans.

24
5
EXERCISE
A. Fill in the blanks with the suitable article:
1. He picked up ________ book kept on the table.
2. ____ Indian Ocean is a huge water body.
3. My uncle is ___ MP.
4. My father gave me ____ hundred rupees note.
5. I am staying in ____ Taj Hotel.
B. Is there anything wrong with these sentences? Why?/ Why not?
1. My brother plays cricket. 2. She likes chocolates. 3. Everything that glitters is not gold.
4. I returned the book to Ram. 5. Breakfast is ready. 6. My favourite colour is blue.

Capitalisation
Capitalisation usually means keeping the first letter of the first word in a sentence capital. As the
basic rules of English, you know that first letter of a new sentence is capitalised and proper nouns
are also capitlised. Let us see capitalisation rules in a little more detail.
1. Names and proper nouns are capitalised. E.g. We visited the Taj Mahal at Agra.
2. Capitalise the first word if text is enclosed in quotation marks. This is applicable if whole text is
a quote.
3. Capitalise pronoun “I”.
4. Capitalise relationships when used with proper nouns. E.g. Uncle Raj visited us yesterday.
5. Salutations and titles (only before names) are capitalised. E.g. President Kovind, Prime
Minister Sri. Narendra Modi.
6. Capitalise directions.
7. Seasons are not proper nouns hence should not be capitalised.
8. The words except articles, conjunctions and prepositions, are capitalised in a title. E.g.
Fundamentals of Paragraph Writing in a Nutshell.
9. Time periods and events should be capitalised. E.g. The impact of World War II was drastic.
10. After colon, capitalisation is not necessary.
Punctuations
Punctuations make the text readable. Even a basic, simple text needs a punctuation. Examples of
punctuation marks are full stop or period (.), comma (,), questions mark (?), exclamation marks (!),
colon (:), semi-colon (;), hyphen (-), en dash (double the length of hyphen), em dash (slightly
bigger than en dash, various types of brackets (square brackets - [], braces - {}, parentheses - ()),
apostrohe (’), single quotes (‘’), double quotes (“”).
Some common rules of punctuations are discussed here.
1. Full stops mark the end of a sentence (long pause while reading).
2. Commas and semi-colons are used to separate pieces of text or items. (Short pause while
reading).
E.g. I visited New Delhi, Lucknow, Mumbai and Nainital.

25
5
I visited Jantar Mantar, New Delhi; Hazratganj, Lucknow; Juhu beach, Mumbai and
Bhimtal, Nainital.
E.g. Marks of both the exams, Term-1 and Term-2, will be counted.
3. Main clause can be followed by a colon.
E.g. You have to choices here: Chocolate milk or Banana smoothie.
4. Parentheses complete the information or sentence in certain cases.
E.g. Programming languages (Python, C++) and Operating Systems (Windows, Linux)
form major part of this course.
5. Possession and omissions are indicated by apostrophe.
E.g. This is entirely Ramesh’s responsibility to finish this task.
She visted her parents’ house last week.
This doesn’t seem to be a good idea to stay out late in rainy season.
Brief Introduction to Direct and Indirect Speech
When we report the message in the words of the speaker then it is called direct speech and when
we do so in our own words then, it is called indirect speech.
E.g. Direct: Ravi said, “I am reading.”
Indirect: Ravi said that he was reading.
Converting Direct to Indirect Speech
1. Convert all present tenses into past if reporting verb of the speech is in past.
E.g. Mother said, “I am having dinner.”
Mother said that she was having dinner.
2. Do not change the speech if it is a universal truth or accepted practice.
 E.g. The teacher told us, “Sun rises in the east.”
  The teacher told us that the sun rises in the east.
3. Change present perfect tense to past perfect, simple present to simple past, simple past to past
perfect, past continuous to past perfect, future to present conditional.
 E.g. i. The peon informed me, “The file has been missing.”
   I was informed by the peon that the file had been lost.
  ii. She told me, “I am going to the market.”
   She told me that she was going to the market.
  iii. The carpenter said, “I have painted the door.”
   The carpenter said that he had painted the door.
  iv. He said, “I was playing chess.”
   He said that je had been playing chess.
  v. “I will be reaching the town by sunset”, she informed us.
   We were informed by her that she would be reaching the town by sunset.
4. Change can to could, may to might and must to had to or would have to.
 E.g. i. I said, “I can create a website.”
   I said that I could create a website.
  ii. Raj said to Anita, “I may consider your proposal.”
   Raj told Anita that he could consider her proposal.
  iii. Ajit said, “I must speak to mother.”
   Ajit said that he had to speak to mother.

26
5
5. Do not convert could, would, should, might, ought to.
 E.g.Anu said, “I should get up early tomorrow.”
  Anu said that she should get up early tomorrow.
6. Some other conversions:
i. “Which class you are in?”, uncle asked me.
  Uncle enquired which class I was in.
ii. She said, “Are you free on this weekend?
  She asked whether I was free this weekend.
iii. Raj says, “Anu paints well.”
Raj says that Anu paints well.
iv. He said to the students, “Submit the answer sheets.”
He asked the students to submit the answer sheets.
v. The counsel said to the witness, “Stand up.”
The counsel ordered the witness to stand up.
vi. He said, “Hurrah! We won the match.”
He exclaimed cheerfully (or happily) that they won the match.
Some conversion tips are – Now > then, Here > there, Ago > before, Thus > so, Today > that
day, Tomorrow > the next day, This > that, Yesterday> the day before, These > those, Hither >
thither, Hence > thence, Next week > following week (same for month or year)
Rules for converting Indirect to Direct Speech
· Use comma before the statement and the first letter of the statement should be capitalised.
· Ensure to use the reporting verb in its correct tense.
· Where ever required, remove the conjunctions.
· Change past tense of reporting verb to present tense.
· Change the past perfect tense either into present perfect tense or past tense.
· Use question mark, quotation marks, exclamation mark and full stop suitably.
Brief Introduction to Active Voice and Passive Voice
The voice of a verb in a sentence denotes whether or not a subject has performed some action or
any action is performed on the verb.
E.g. i. Sarla cooks food.
  ii. Food is cooked by Sarla.
Active Voice: When the subject in a sentence performs some action then it is called active voice.
Here, the focus is more on the subject.
E.g.  i. The cat drank all the milk.
  ii. The children are making a lot of noise.
Passive Voice: When the subject in a sentence receives some action by the verb then it is called
passive voice. Here, the focus is more on verb (action).
E.g. i. All the milk was drunk by the cat.
  ii. A lot of noise is being made by the children.
Some more examples are:
· Raj sent an email. (Subject + Verb + Object)
An email was sent by Raj. (Object) + (auxiliary verb) + (past participle) + (by subject).

27
5
·She plants a tree. (Subject + Verb + Object)
The tree is planted by her. (Object) + (auxiliary verb) + (past participle) + (by subject).
Converting Active to Passive Voice
1. Interchange subject and object.
 E.g.  Ramaa (subject) sings a song (object).
  The song is sung by Ramaa.
2. If it is obvious or if the doer is not important then doer can be omitted.
 E.g. We should follow the traffic rules.
  The traffic rules should be followed.
3. Use “to” or “with” besides “by”
 E.g. I know Mr. Verma from my school days.
  Mr. Sharma is known to me from my school days.
4. Change the pronouns usually like this: I > Me, We > Us, He > Him, She > Her, They >
Them. “You” and “It” will remain unchanged.
5. Use suitable auxiliary verbs.
 E.g.  i. He was riding the bicycle.
  The bicycle was being ridden by him.
  ii. He watches a movie.
  The movie is watched by him.
  iii. They both kicked the ball together.
  The ball was kicked by them together.
  iv. Has Ravi finished the homework?
  Has the homework been finished by Ravi?
  v. Have they taken the dinner?
  Has the dinner been taken by them?
  vi. We had asked him to stay calm.
  He had been asked by us to stay calm.
  vii. They will board the bus in a while.
  The bus will be boarded by them in a while.
  viii. Father will have taken medicine.
   The medicine will have been taken by father.  

Paragraph Writing
Paragraph is the fundamental unit of composition. A paragraph is a set of sentences arranged in a
logical sequence. A paragraph describes a topic or a subject.
While writing a paragraph we must consider the following:
Topic of the paragraph: The topic on which the paragraph needs to be written should be clear.
Opening sentence: A paragraph should begin with the main or topic sentence that clears about
the title of the paragraph.
Expansion or explanation: This part includes the sentences which elaborate on the topic more.
Conclusion: Paragraph should end properly with a closing sentence or conclusion.
Here, the first sentence is topic sentence and last one is the concluding sentence.

28
5
Rules for Writing A Paragraph
¤ Arrange the sentence in a logical sequence. ¤ Keep the paragraph focused on the topic.
¤ Avoid repeating sentences. ¤ Avoid longer paragraphs.
¤ Concluding paragraph should cover the ¤ Topic sentence should be relevant.
central idea of the topic.

Activity
Write a short paragraph about Importance of English language in modern world.

EXERCISE
Write a paragraph with a topic on the following hints:
traveling... a good hobby... opportunity to visit new places.... make friends in far places... to
learn about various cultures.... good for health.... can write about places travelled.... blog...
articles.... develops understanding.... inculcates good habits... patience... care.... love and
concern... improves personality....expensive hobby... needs a lot of time...

1. Describe briefly how we can ensure effective verbal communication.


2. How is active listening important in verbal communication?
3. How does body language affects our non-verbal communication?
4. List some positive body language signs concerning body posture, gestures, expressions, eye
contact, touch, personal space and voice.
5. How is visual communication different from general communication we do day-to-day?
6. What important role does feedback play in effective communication?
7. List certain ways of giving and receiving feedback.
8. How are general and specific feedback different? What is the advantage of specific feedback?
9. What do you mean by communication barriers? How can we overcome these barriers?
10. Describe some important principles of effective communication.
11. Describe any 7 Cs of effective communication.
12. What do you mean by complete, concise and concrete message?
13. How is a phrase different from a sentence? Give 2 examples.
14. Giving 2 example each, explain compound and complex sentence.
15. How does articles differ in usage for consonants and vowels? Explain with 2 examples.

Download MCQs and more questions from


https://www.eduitspl.com/teachers-corner-2

29
5
Unit
Self-Management
2 Skills - II

Session-1 Stress and Its Effects


In last class, we have already discovered about the importance of self-management, its key
elements and self-confidence. Now we know that managing oneself in order to achieve desired
goals and targets is called self-management.
Understanding Stress
A person practicing self-management is actually following a highly disciplined regime which needs
a great deal of will power, determination and positive outlook. In this highly competitive world and
strenous life style, even students are not spared from the negative influence of stress in their lives.
Day to day stress is the outcome of many reasons such as covering the curriculum to study, co-
curricular activities, preparation for exams and competitions. On professional front too, if you
observe your elders, they go through a lot of stress.
How Stress Management Helps Us?
If you learn to manage your stress well it would be beneficial in many ways. Managing stress can
help you in following ways:
¤ Sleep is necessary for health. Managing stress helps in having good sleep.
¤ Stress leads to unhealthy eating habits and the problems that accompany it such as weight
gain. Managing stress in a proper way helps in controlling weight through improved eating
habits.
¤ Healthier mind and body can be gained with stress management.
¤ Good health and good sleep brings confidence and energy to do better.
¤ Lesser physical stress leads to improved productivity in everything you do.
¤ Personality becomes cheerful, happy and attractive.
¤ Person gets along better with family and friends.
Types of Stress
Stress is always bad is not true. There is something called good or positive stress is also there which
is known as eustress while negative form of stress is called distress.
Response to stress differs from person to person. Eustress is identified by excitement, elation and
charging up of emotions. How did you feel when you got promoted to the higher class?

30
5
Happy, excited, elated. That was eustress. When we achieve something, say, promotion, winning a
match, passing an exam, meeting an old friend, buying new possession, receiving a surprise gift,
getting a new job etc. lead to eustress. Eustress promots positive feelings like motivation, positive
energy, excitement. But eustress is generally short term.
The negative stress i.e. distress takes a nasty form if it is not identified in time. We shall be
discussing distress in detail in coming sections.

Activity
Let students recall when last they were distressed and let them write down the possible
reasons behind it. If some students wish to share their list they can. Then teacher should
elaborate and explain on the findings.

Common Effects of Stress


Positive feelings from eustress lead to positive consequences like increased performance, good
focus on the tasks at hand, feeling rejuvinated, eagerness to do better. This increases productivity
and chances of bigger achievements.
Distress is the reaction of our body to the harmfull situations. These situations could be real or they
could be out of our imagination only. Distress affects us physically as well as psychologically.
Common physical effects of distress: Headache, Muscular tension, Fartigue, Chest pain, Upset
stomach, Disturbed sleep and Low energy.
Common psychological effects of distress: Anxiety, Feeling demotivated, Loss of attention
Depression and frustration, Angry outbursts, Drug and alcohol abuse, Social withdrawal, Over reaction.
Consequences of Long Term Distress
Impact of stress depends from person to person. Some people are able to handle good amount of
stress while others are not. It depends on age, profession, living conditions, health and will power.
Stress steps in very silently in our life style. What we take as the normal routine of our daily life is
actually the invitation to stress. A little distress is of little concern. It goes as easily as it comes. Long
term distress, however, affects us adversly. Long term distress is also called chronic distress.
Distress Due to Work
The kind of profession you are in determines the amount of stress you experience. Similarly, for
students, the amount of study and tasks at hand determines stress for them. As children grow up
and as responsibilites and discipline step in, some sort of distress steps in too. The number and
depth of the subjects increase, performance expectations go up, so does the competition. A
growing up child has a lot to cope up with physically and mentally. But most of this stress is not
long term. Anxiety for stress remains for a few days. Pressure of studies is balanced by school
timetable and self-study timetable. Other activities are planned accordingly and the overall stress
situation can be handled. But, certain unfortunate events like death of a loved one, cyberbullying
or bullying at school, ragging in hostels, accident, fatal disease,
emotional distress sometimes cause long term distress and spoil
child's mental and physical health.
For professionals, stress goes hand- in-hand. Some common reasons
for work related distress are higher performance expectations at
work, closer deadlines, insecurity of job, internal team conflicts,
relationship and differences with supervisor, travel conditons, lack of
competency in doing the job at hand, delayed or held up salary,

31
5
nature of job like touring, longer or odd hours, concerns related to job
satisfaction.
Stress for working mothers is more. Taking care of domestic front - children
and home making becomes challenging. Balacing with relations, friends and
work causes a great deal of stress. That does not mean that there is no distress
casued to the women who do not work outside. Daily domestic chores
demand a lot of physical stamina.
Internal Distress
Anxiety, fear of impending disaster such as huge financial loss like bankruptsy, repeated and
overflowing thoughts of worry and concern, unrealistic or irrelevant expectations, worries related
to future happennings such as a diagnosis of a fatal desease. Internal distress is dangerous as it
keeps building up inside and slowly, it takes the form of a sort of habit. If not taken care of timely, it
goes beyond control and leads to physical conditions like head, heart ache, insomnia, memory
loss, chronic anxiety, high blood pressure and loss of focus.
Stress Due to Surroundings
Our surroundings and environment can be the cause of eustress or distress. It depends on the
quality of environment. When we talk about environment, there are following two aspects:
Quality of surroundings:
¤ Noisy/ Quiet - whether you stay in a noisy place like market, main road etc. or not.
¤ Clean/ Dirty - how clean or dirty is the place.
¤ Polluted/ Clean - air and water quality of the place. Especially air (near or far than any
industrial area etc.).
¤ Crowded/ Organised - whether you live in a well organised colony of houses or not.
¤ Quality of life (food, water, electricity and other amenities).
Work and living conditions:
¤ Quiet/ Distractions - you work among distractions or on a suitably placed seat.
¤ Congested work place/ Spacious or Ergonmically desgined.
¤ Interaction and relationship with people (coworkers/ family members/ neighbours).
¤ Tidy/ Shabby - place is well kept or how tidy are you yourself.
Stress Due to Sudden Need of Survival
In certain cases, disaster strikes suddenly. For instance, accident, earthquake or any life threatening
situation. In such emergent situations, our nervous system instantly kicks into action as an
autonomous fight (face), flight (defence) or freeze (surrender) response. One part of our autonomic
nervous system - sympathetic nervous system takes control of fight-or-flight response by activating
the release of a hormone epinephrine (pro: epi-nef-reen). This prepares
the body for violent response. Body energy boosts up and body muscles
prepare for the action. Entire body is influenced by this - limbs shake,
heart beat increases, muscles become tense, mouth gets dry, liver
function boosts up, blood vessels constrict, eye pupils dilate and reflexes
become sharp. After the response is through, parasympathetic nervous
system helps body to return to normal condition called homeostasis by
activating the release of acetylcholine (pro: aset-il-kolin).

32
5
In freeze response, body is unable to respond for certain duration until the danger passes or the
victim succumbs to the danger. This response triggers when impending danger seems too much to
deal with. It also triggers during certain very normal situations too such as public speaking, and
answering questions orally during tests.

EXERCISE
Answer the following question:
1. What do you mean by stress? What is the difference between eustress and distress?
2. List some common symptoms of physical and psycological stress.
3. List some distress symptoms due to over-work or over-study.
4. How does stress affect working women?
5. What do you mean by internal stress?
6. What is fight-flight-freeze response?

Session-2 Stress Management Techniques


Stress is a phenomenon which cannot be eradicated. We need to learn how to manage it. Certain
professions such as police, defense forces, fire fighting etc. train the individuals to deal with all kind
of stress. School time table and schedule is prepared in such a way that various kinds of periods in
a day include classroom activities, laboratory, outdoor activities. Movie shows, science exhibitions,
story reading sessions, contests and competitions, sports events, performing arts (singing, drama,
dance) events are the examples of stress busting activities which also help in personality
development and creativity promotion for students.
The ABC of Stress
According to Dr. Martin Seligman's (professor, University of Pennsylvania and former president of
the American Psychological Association) book, "Learned Optimism." Stress management involves
3 aspects summed up as ABC, which stands for:
Adversity: It is any scenario or event we face. Such events activate our nervous system to
respond to the stress caused by them.
Beliefs: How we deal with the adversities and hardships and how we think about them develops
our belief system.
Consequences: This belief system influences our actions in near future and due course of life.
Pessimistic people deal with adversities taking them as temporary phases and plan to counter them
methodically while optimistic people take adversity as a permanent phase and lose confidence.
With proper focus on the achievable goal, critical analysis of the situation and by dealing with
each adversity specifically as per its nature helps develop positive attitude and confidence in
dealing with the stress caused.

33
6 5
Understand the Origins of Stress
Now, you know a lot about stress - what it is and where does it originate
from in different scenarios.
Identify the source of stress: This is the first steps to deal with stress.
Ask these simple questions to yourself:
¤ What are the real reasons of my anxiety? (Are they real or imaginary?)
¤ Am I working under pressure for long? (Do I need a break?)
¤ Do I really feel right? (Am I not well or need to take medical advise?)
¤ Am I emotionally upset at something or someone? (Do I need to talk to someone?)
¤ Are my activities time-wasting? (Do I need to review my working or study plans?)
For the imaginary threats, you yourself are responsible so it will be easier to handle. For real
threats, you need to devise appropriate stress management techniques.
Healthier Lifestyle
Combination of positive habits and discipline prevents or reduces stress. In addition to this,
indulgence of anything is harmful too. What are some common negative habits?
¤ Avoid smoking/ alcohol/ drugs. Ask yourself - is it very frequent or occasional? Smoking, drugs
and alcohol should be quit. It is a myth that a quick smoke or a small peg or one shot of drug
will provide relaxation. These are not medicines.
¤ Good eating habits. Do you overeat or undereat and when? What is the food quality?
¤ Develop good sleeping Habit. How much do you sleep? Is there a balance between being
online, watching TV and sleeping? Are you ensuring at least 7 hours of sleep?
¤ Inculcate healthy hobbies. Pick up some creative hobbies that boost health and activate
mind. Painting, creative arts, joining gym or any sports activity, yoga, laughter clubs, even
spending quality time with your family and friends help relieve your stress.
¤ Keep good company. Try keeping away as much as you can from the people with negative
thoughts, who always discourage or talk low-esteem.
Healthier Working/ Study Habits
¤ Bring discipline in work and study. As yourself - am I planned? Is there a study time table? Am
I on schedule? Time-bound goals and avoiding procrastination (not prioritising the tasks
according to their importance) need to be practiced.
¤ Do not try to please everyone. Leant to say no if you really cannot help something.
¤ Plan to keep a work-family balance. For scholars, keep a study-recreation balance.
¤ Plan your breaks and holidays.
¤ Stick to your delivery deadlines or self-study timetable.
¤ Do not over-work or over-study.
Exercise Eustress Against Distress
¤ Utilise your positive stress that is eustress to counterbalance distress. For instance, if your are
depressed for sometime die to some reason and suddenly get a chance to go out with
friends then do that to distract yourself from the negative stress.
¤ Celebrate even the small good news. If you achieved something small, share it with your
friends and feel proud and good about it.

34
5
¤ Enjoy every small-term eustress to the maximum.
Managing Environmental Stress
In most of the cases, it is not possible or it is difficult to change your surroundings, environment,
working conditions, school or college. We can still do certain things to adapt well in such case.
¤ Take nature walks or early morning walks to relax your mind and re-energise your body.
¤ Go for vacations for a change of place and climate and return with boosted energy.
¤ Adopt yoga, fitness training, activity club to boost your eustress.
¤ Participate in community activities that help in improving environment and surroundings like
anti-pollution drive, swachhta abhiyaan activities etc.
Managing Internal Stress
Most of the internal stress is due to our own doings and our unreal fears and imagined threats. If
you have read the section: Understand the origins of stress then you know how to identify imagined
fear. Here are some tips to deal with internal stress:
¤ Keep the positive attitude because your unreal fears survive on your negativity attitude.
¤ You cannot control everything. Learn to adapt to the changing situations as much possible.
¤ Learn to distinguish between being angry, being aggressive and being firm.
¤ Keep fit. Fit body fights stress better.
¤ Keep track of your time. Learn to distinguish between relaxation and wasting time.
¤ Do not cut on sleep, laughter, hobbies, good meal.
¤ Quit smoking, alcohol and any such vice.
¤ For physical symptoms of stress (long headaches, body pains etc.) seek medical advice.

Activity
Stress Consultants: Teacher should think of certain stress scenarios of different types and
note them somewhere.
Activity conduction: Present the scenarios one-by-one in the class an let the student come
up with the stress management techniques for that scenario. This way students are playing the
role of Stress Consultants.
Debriefing: Explain the students how this activity has helped them explore various stress
management techniques suitable for various types of stress.

EXERCISE
Answer the following question:
1. Being a student, list some common stress symptoms you feel.
2. List the sources of this stress.
3. List some good working or study habits.
4. How will you manage internal stress?
5. How does going on vacations, morning walks and following a hobby help in reducing stress?

35
5
Session-3 Ability to Work Independently
Importance of ability to work independently
Most of the tasks are accomplished through teamwork or combined efforts of more than one
person such as sports like tennis, football, cricket. But there are many cases where your ability to
work independently plays important role in achieving goals. Working independently is often
mistaken as working alone.
This is not correct. Being able to work independently means accomplishing the tasks assigned to
you without unnecessarily claiming the time of other people. For example, if you are a part of the
Green Club team in your school which has planned to plant certain tress in a locality. You are
assigned to collect funds for procuring seeds for 20 tress by next Sunday then no other team
member should help you in this. It is something you need to do independently.
What Does Being Independent Mean?
You are able to work independently shows when you:
¤ are aware of your strengths and weaknesses.
¤ are able to prioritise your tasks.
¤ deliver your best always.
¤ are able to adapt to the working pace of the team.
¤ own your task and take responsibility of any mistakes.
¤ carry a positive attitude towards what you do.
Skills to Work Independently
Following are the skills needed in an individual to work independently.
Organisational skills: Ability to understand the
requirements of what you need to deliver, organise your
work accordingly as the needs arise or requirements
change.
Personal Character: An honest approach to do the
things, maintaining integrity and trust and meeting the
commitments as required.
Multitasking: Ability to handle multiple tasks, prioritise
them according the change in situation and finishing all
the tasks at hand successfully.
Knowing oneself: Knowing what and how much you are
able to do. Being aware of both, your abilities and your
limitations.
Self-discipline and self-regulation: Ability of self-
management. Able to identify time-wasting activities.
Knowing how to regulate yourself to utilise the time at hand for completing tasks timely.
Communication and negotiating skills: Command over the verbal communication and ability
to argue and negotiate without any aid or intervention.
Agility: Able to adapt to the changing situations and managing time accordingly. Delivering with
short time lines and knowing how to utilise time effectively.

36
5
Handing failures and setbacks: Ability to look at the failures as great source of learning and in
the form of feedback, not letting setbacks like rejections and criticism discourage you. Ability to
take responsibility of failures.
Interest vs Ability
We generally tend to do the things often that interest us. The interest on makes us things do better but
sometimes focusing only in the things that interest us makes us procrastinators. We tend do ignore
more important things. Many important things or tasks do not interest us but we need to accomplish
them. For this, we need to develop the ability and right skill set.
To be able to do something we need our strengths and awareness of our weaknesses. Being aware of
weakness helps us overcome them by developing our ability to do perform.

Self Awareness and Its Type


Knowing your strengths, weaknesses, beliefs, abilities, limitations, likes, dislike etc. is called self
awareness. Self awareness helps you in staying happy, productive and confident. When we turn
inwards, focusing on self, we identify our values, behaviour and standards. Depending on our self
analysis we either feel proud or feel not very good. Self awareness brings self motivation and self
control. Let us look at 2 major types of self awareness.
Internal self awareness: Our values, beliefs, passions and standards are revealed when we do
internal self awareness. Also that way these traits help us in interacting with our surroundings and
environment. Internal self awareness tells you your favourite subject, your favourite sports, what
you aspire to become, what you do not like doing or achieving, how you look at other people,
how your attitude is built up on your values.
External self awareness: Ability to assess or see how other people view you is called external
self awareness. External self awareness brings self-improvement, good leadership skills, better
understanding of people and it determines people’s liking/ disliking you in one way or other.
External self awareness helps you deliver tasks in a better way.
Self Awareness Assessment
Being self aware is a high level of intelligence. Knowing oneself is half the battle won. Most people
do not know what they want or need. Most of us are blind to our strengths and weaknesses.
Ask these questions with yourself to assess how self aware you are:
1. Am I able to create an image of myself in my mind?
2. How much am I in control of my feelings especially when angry, emotional or sad?
3. What triggers my passion of doing what I like?
4. What sets me off?
5. Can I list my personal life values and beliefs?
6. Can I list what I cannot do?
7. What do I think of this world around me?
8. Can I list my inner conflicts/ confusions?
9. Can I list some of my negative traits that come in my way to success?
10. Can I list the traits I inherited from my parents?
11. Can I list some details which I think people have about me are correct?
12. Can I list some details which I think people have about me are incorrect?

37
5
Activity
Do your self assessment
Students are supposed to answer the above 12 questions in very specific terms. Teacher
should facilitate by explaining the meaning of the question if required. Students are
prohibited to interact during this activity.

How To Become Self Aware?


Spare some time and travel within yourself by applying following tips:
¤ Find out some quiet time with yourself. Reflect on your thoughts. Retrospect what you have
been doing in past days.
¤ Practice good listening and become a good listener to what people speak to you without
interrupting them.
¤ Ask for feedback from others about yourself, about your work and what you do. Make notes
of feedback in your personal diary.
¤ Think in terms of “what” instead of “why”. For example, What could be the possible reasons
that prevented me from getting good marks in last test? What was the situation that made me
fight with my best friend? What are the reasons that make me reach college late often?
Knowing Your Strengths and Weaknesses
Analyse your work, outputs of what you do, speak to your parents and reliable friends and
teachers, pay attention when you perform a task. This will show you how well or not you do the
things. Feedback from teachers and parents will let you list down your strengths and weaknesses.
Ask yourself too. What motivates you and what does not? What are your common fears? What are
you good at? What are your qualities or their lack?
Weaknesses could be related to your personality, the way you work or study, in interacting with
pthers, in organising yourself and regarding your emotional-self. How emotionally stable you are is
the question you must ask yourself or reflect on any past incidences where you overreacted in any
situation.
Self Motivation and Self Regulation
Motivation is the ability to move - from an idea to practically implementing it, from plan to action,
from thinking to doing.
Self-motivation is your inner ability to do move from thought to action. Your strengths trigger your
self-motivation but some of your weaknesses may dampen your passion. That is why, for self-
motivation, self-awareness is necessary.
Right kind of self-awareness motivates you to take action on your thoughts but how do you
complete this difficult journey from thought to action? The answer is self regulation. Your
weaknesses are obstacles. When you look at a task we think it is too challenging to take up but
when you analyse it keeping your self awareness in mind, you see the light. One example is
preparation for your final examination. How do you manage to prepare entire book? At first it
seems too difficult. Then you command all your strengths to help you. You begin working on your
weaknesses (getting up early, eating right, sleeping timely, utilising time, cutting down on TV and
time with friends). This automatically brings in self regulation. Self study timetable, a planned daily
routine, working on your emotional intelligence (keeping calm in irritating situations), thinking
straight, anticipating obstacle and working to overcome them to reach the set goal.
Your self awareness, self motivation and self regulation create a self realisation and self acceptance.
This makes you capable to work independently.

38
5
Working Independently and S.M.A.R.T. Goals
At the core of working independently is setting up your goals. Set the goal by writing it down.
Keep it specific and concise. For example, I shall gain more marks than earlier in all the subjects in
the coming exams. Split your goal into monthly, weekly or daily targets. Targets are the milestones
to achieve one at a time in a systematic way.
S.M.A.R.T. Targets
Plan out what will you do to achieve daily target. On real grounds, many unanticipated barriers
arise in your plan like illness, guests at home, vacations, marriage in family, urgent travel etc. How
will you measure your progress? You can only manage what you can measure. Your goals should
have following characteristics which make them S.M.A.R.T. goals:
Specific: Target should mention what are you going to finish precisely. For example, I will prepare
4 main topics of Chapter 4 in Biology on Jun 13th.
Measurable: A specific target itself will tell you how it should be measured. Consider the above
target. It tells you that if your prepare 4 main topics of 4th chapter in Biology, your target is met on
June 13th.
Achievable: Targets should be made considering your ability and circumstances that allow to
achieve them. Preparing more than 4 topics in a subject may not be possible. Set a target which
you can achieve with hard work but it should be in the range of your achievement. Setting up
achievable targets encourages us to do more.
Realistic: This related to the previous point but here the focus is on your ability considering the
available time limit. Think about the target if it is really achievable in the available time and
circumstances. For example, I will prepare 4 main topics of 5 chapters in Biology on Jun 13th. –
this could be an unrealistic target. It may not be possible to prepare 20 topics in a day given that
you need to go to school and do others chores besides studies.
Time-bound: Setting up a deadline brings you in discipline to work towards your goals. It also
helps you in measuring your progress. After a week's time you can easily calculate how many
topics in which subjects you have prepared in just 7 days. What was the original target and what is
achieved? How to modify your plan for improved progress? How much time is needed to cover
the gap if you are falling behind your targets?
After reaching each target, analysing your achievements at set intervals (weekly, fortnightly),
looking for gaps and delays, thinking to refine the plan, finding out better ways to achieve the
goals, incorporating new ideas, ensuring self-discipline, handling distractions and temptations,
motivating yourself and keeping up the self-encouragement are certain actions that you need to do
to keep the things in control.
Compare the outcomes of your efforts with the set targets. Since targets are specific and
measurable, the comparison will clearly show you the positive or negative difference. In case of
negative difference, you shall look for what went wrong, where did you lack in your efforts, where
is the gap needed to fill, how much time you have left, how can you improve the strategy to cover
the gap. Positive difference will motivate you into thinking how you can do better, how you can
raise the bar of performance, what little more can you do to make it even big and bigger.
Time Management and Its Importance
No one would command you for self-management. It comes from within. Self-realisation is the
initial step leading to self-motivation and suggesting yourself that you should begin managing
yourself. The purpose of this chapter is exactly this. It will tell you all you need to learn about self-
management and inspire you to do it. How far you can take this is your own initiative.

39
5
Effective Time management
Time is of the essence in any effort for achievement. Every goal needs to be achieved in a
predefined time span. Time management involves deciding deadlines for achieving targets and
then managing the decided time so that all the required tasks are accomplished as planned. Time
management needs the understanding of importance of time, avoiding activities that waste the
time, deciding a time table or schedule for all important activities considering all the other
liabilities and responsibilities. The time bound targets help you in measuring and managing the
time easily. Following are the main ingredients of successful time management recipe:
Prioritise: You should know what is more important at what is least. In what sequence the tasks
need to be done.
Time allocation: How much time each task should be given? Which are the time-wasting
activities and who are such people to avoid? All these questions need to be answered. A time table
needs to be in place preferably in writing.
Self-discipline: It is directly related to time management. Self-discipline takes care of time
management. If your efforts are sincere and your concerns are genuine about your goal, self-
discipline will prevail. A self-disciplined person always takes care of time and punctuality.
Time Management and Responsibility
Sense of responsibility and constant reminder that you have to do this to achieve your goals is a
must. Share your plan and desire of self-management with your parents or elder siblings who will
guide, help and support you in your efforts. This will motivate you in staying responsible. Many a
times we tend to keep on doing the tasks we like and ignore the other important ones. This is
called procrastination. This unknowingly leads to wastage of time and irresponsible behaviour.
Keep provision for recreational activities and hobbies in your plan so that your regime of self-
management does not get dull, monotonous and too challenging to follow. Find time to spend
with friends, family and entertainment. A right kind of balance in all these makes your efforts
easier, relaxed, more natural and stress-free.

EXERCISE
Answer the following question:
1. What do you mean by working independently?
2. List the skills required to work independently.
3. What do you mean by multi-tasking, self discipline and agility?
4. Can you cite any failure which became a learning experience for you?
5. What are internal and external self awareness?
6. List some ways to become self aware.
7. How self motivation and self regulation help you achieve your goals?

40
5
1. What do you mean by the term self-management?
2. Why is self-management important for us?
3. Differentiate between eustress and distress with example.
4. Discuss how stress affects us physically and psychologically.
5. What is chronic distress? Discuss stress in professionals due to work.
6. What do you mean by internal distress? How will you manage it to reduce its adverse effects?
7. Explain the distress effects due to environment and surroundings.
8. Explain fight-fight-freeze response during mortal danger. How does our nervous system handle
this response?
9. How can we identify the source of stress?
10. How can healthier life style help us manage stress well?
11. What are the healthier working or study habits that help reduce stress?
12. How can you say that sometimes eustress helps in counterbalancing distress?
13. List some tips to manage environmental stress.
14. Despite the importance of team work, how does the ability to work independently helps an
individual? Give example.
15. List some major traits of an individual able to work independently.
16. Write a note on personal skills discussing their benefits.
17. How can we say that one is self-aware? Explain two types of self awareness.
18. What will you do to become self aware?
19. What benefit do you draw by knowing your weaknesses and strengths?
20. How does self awareness help in achieving self motivation and self regulation?

Download MCQs and more questions from


https://www.eduitspl.com/teachers-corner-2

41
5
Unit
Information and Communication
3 Technology Skills - II

Session-1 Operating System & Basic File Operations


Operating system manages the functioning of entire computer system including hardware and
software. It also works as an interface between the computer system and the user.
Functions of Operating System
There are 3 main functions of an operating system:
¤ Managing applications and giving them access to hardware services. For example, if you give a
print command to print your document, operating system manages the printable data to be
sent to the desired printer.
¤ Managing data and system resources. For example, you create folders and save files, install
new software and hardware and access files and devices over a network.
¤ Providing user interface to work with the computer system. For example, opening programs,
deleting files, searching on the computer are done by the help of operating system.
Important tasks of an operating system
1. Managing applications running in the computer.
2. Handling input and output.
3. Handling data and signal transfer among the devices and software.
4. Managing memory – allocating/ deallocating memory to programs to run.
5. File system management – keeping track of all the files and folders.
6. Network management – communicating with other computers and devices over a network.
7. Computer system security.
8. User interface.
Types of Operating System
Single-tasking OS: A single tasking operating system executes one task at a time. It does not
allow launching a new task until the task at hand is not finished. Examples of such operating
system is Disk Operating System (DOS) from IBM and Microsoft, Windows 95 (in 80s and early
90s) and PalmOS for mobile devices. An instance of such functionality is, if you have given print
command in DOS, then until the printing is over, you will have to wait to issue the next command
to do another task.
Multi-tasking OS: A multi-tasking operating system handles more than one task at a time. User
can perform multiple tasks simultaneously. All modern operating systems are multi-tasking OS.
Examples are Microsoft Windows family (Win XP, Win 7, Win 8, Win 10, Win 11 etc.); Unix; Linux;
Apple MacOS and iOS; and Google Android. An instance of such functionality is you are listening

42
5
to a streaming song and at the same time given a print command for a multipage document yet
chatting online with a friend while still a file is being uploaded. All these four tasks are occurring at
the same time.
Single User OS: Operating system that allows only one user to work at a time is called single user
operating system.
Examples: MS-DOS, IBM-DOS, Windows 95, Windows 98, Windows ME, Classic MacOS (1 to 9),
PalmOS for handheld devices.
Multi-user OS: Operating system that allows multiple users to work at the same time is called multi-user
operating system.
Examples: Unix, Linux, Windows NT, X-Window system and MVS Operating System for
Mainframe computers. Such operating systems are installed on a main powerful computer system
and other computers connect with it over a network. Users log on to the main computer and its
operating system manages all the users. User terminals are called clients or workstations.
Other Types of OS
Real-Time OS: Such operating systems are used to control the activities which need to be done
precisely at a given specific time. For example, launching a satellite in the designated orbit at a
precise time interval or an aircraft control system. RTOS are normally found embedded in the
devices themselves. They are not like general operating systems which need to be installed on the
computer. Some RTOS are VxWorks, FreeRTOS, Integrity, Ecos, Cocoon etc.

Mobile OS: Operating systems that runs on handheld devices like cellphones and tablet Pcs.
Examples: iPhone OS, Android OS, Windows Phone OS.

43
5
Distributed Operating System: This OS manages multiple computers over a network and
manages users and resources on them.
Examples: Windows Server, Linux Server, Ubuntu, Amoeba.
Windows Desktop
Once the computer is started, the screen which appears on the monitor is called the Desktop.
Various components of a desktop are:
1. Wallpaper 2. Icons 3. Gadgets 4. Taskbar
Let us discuss about these parts one by one.
Wallpaper: The wallpaper is the background picture on the desktop.
Icons: The small pictures on the screen are called the icons.

Gadgets: Gadgets are the small and helpful objects in a computer. They have their specific
functions. They are used to watch time, calender, weather, world time, etc. on a computer.

Taskbar: This is a horizontal bar at the bottom of the desktop. Now, let us learn about the various
parts of the taskbar.

Start Button: The Start button is found on the left side of the taskbar. When we click on the
Start button, a menu appears which is known as the Start menu. We can find and open all the
programs from the Start menu.
Middle Section: The middle section shows the programs and files we have opened and allows us
to quickly switch between them.
Quick Launch toolbar: The Quick Launch toolbar provides a fast and easy access to our
favourite programs. These programs can be opened in single-click.
System Tray: The system tray is used to show the date, time and various other notifications.

Files & Folders


A file stores our work in the computer.
Each file is given a file name, which is useful to identify it. Every file name has 1. Primary name
which is the first name of a file given by the user and 2. Secondary name which is the extension
of the file like ‘.docx', ‘.jpg', etc. It is given by the program (where it is created). Primary and

44
5
secondary names are separated by a dot (.). Folder or directory stores files and other folders. A
folder within a folder is called a sub-folder.

Sub
Folder

Files

Folder

Computer Window
Whatever files or folders you store in your computer, they are accessible from the Computer
window. It is also used to access and manage the files and folders stored in various external memory
devices. For example, CD, DVD, Pen Drive, etc.
To open the Computer window, click on the Start button → Computer or double-click on the
Computer icon on the Desktop.
Left/navigation Pane: It is located on the left side of the computer window. Here, storage drives
and directory tree can be seen. It contains the list of storage drives (hard disk, DVD drive), folders
and sub-folders that you have on the computer. It does not show/lists the files.
Right Pane: It is located on the right side of the window and it shows the content of the folder
which is selected at the left side.

Computer Window

45
5
Creating a File or Folder
1. Open the Computer window.
2. Open the location/drive (or folder) where you want to create a file or folder.
3. Right- click on the blank area, the context menu appears.
4. Select the New option. A submenu appears.
5. Click on the File or Folder option. A new file or folder is created and appears. Type a name
for the file or folder and press the Enter key. This way, various types of files can be created
like LibreOffice Calc, Writer, MS Excel, MS Word or Notepad etc.
1

2
5

3
Right-click on
4 the blank area.

Creating a new file or folder using a right-click

Opening a File or Folder


1. Open the location in the Computer window (where the file or folder is located).
2. Place the mouse pointer on the required file/folder and double-click on it. It will be opened
and you can view its contents.
Renaming a File or Folder
1. Select the file or folder that has to be renamed.
2. Right-click on it, a context menu appears.
3. Select the Rename option.
4. Type the new name and press Enter. (You can also use F2 function key to rename files or
folders).
Deleting a File or Folder
1. Select the file or folder that has to be deleted.
2. Right-click on the required file/folder and select the Delete option.
Or
Press the Delete key on the keyboard.
The Operating system (Windows) confirms before deleting the file or folder by displaying a
dialog box.
3. The Delete File or Folder dialog box appears. Click on the Yes button to delete or No to
cancel deleting.

46
5
Note: Shortcut
Deleted file or folder move to the Recycle Bin. To delete a file/folder permanently: Shift+Delete

Restoring the Deleted File or Folder


1. Open the Recycle Bin window (by double-clicking on the Recycle Bin icon on the
Desktop). It displays the list of deleted files and folders.
2. Select the file or folder that has to be restored.
3. Click on the Restore this item button on the toolbar.
The selected file or folder moves back to the place from where it was deleted.
Copying and Moving a File or Folder
1. Open the Computer window and select the file/folder that has to be copied or moved.
2. Click Organize list box on the toolbar and select Copy/ Cut (to move) option.
Or
Right- click on the file or folder and select the Copy or Cut (to move) option.
3. Select the destination (drive/folder) from the left/navigation pane.
4. Click on the Organize list box on the toolbar and select the Paste option.
Or
Right-click on the blank space and select the Paste option in the context menu.

Shortcut
Copy : Ctrl + C Cut : Ctrl + X Paste : Ctrl + V

LAB EXERCISE
1. Start Your computer and find out which operating system is installed on it.
2. Locate the icons of Computer and Recycle bin. Open them and observe how
different they look. Write any 3 major observations.
3. Locate the Taskbar. Using mouse try to move it to other corners of the
desktop.
4. Open notepad from Start menu, type some data. Save the file on the desktop.
Now delete and restore the file using Recycle bin. Then, permanently delete
the file.
5. Create a folder on drive D: by some name. Now, using notepad create and save
a file in this folder. Now, create another folder on desktop. Copy the file in the
desktop folder.

Supplement: Ubuntu Operating System


Ubuntu Desktop (Gnome)
Ubuntu is an open-source variant (distribution) of Linux. It is developed by a UK-based private
software development firm named Canonical and it is supported by a community of developers.

47
5
The Desktop
Ubuntu desktop is called GNOME 3 desktop. GNOME is an open-source standard desktop
environment for consistent look across various versions of operating system.

The desktop has following major components:


The Top Bar: The top bar provides access to windows and applications, calendar and
appointments, and system menu. System menu helps in setting up properties such as sound,
networking, and power. In the system menu in the top bar, you can change the volume or screen
brightness, edit your Wi-Fi connection details, check your battery status, log out or switch users,
turn off your computer and lock the computer.

48
5
Activities Overview Button: Activities overview allows to type names to search applications,
files and online resources.
Below Activities, there is a bar called dash. It lists the icons of frequent applications and the
currently running applications (with a dot below the icon). Clicking on the icon launches the
corresponding application.
At the bottom of the dash, there is a grid icon. Clicking on this icon displays all the applications on
the screen.

Application Menu: This menu displays the names of


currently active applications. It is located just next to the
Activities button at the top.

Useful Keyboard shortcuts to work with Ubuntu Desktop


Note: The Operating System Key (that has operating system logo icon) is called Super key. For
example, in Windows, it is called Windows key.

Alt+F1 or the Switch between the Activities overview and desktop. In the
Super key overview, start typing to instantly search your applications,
contacts, and documents.
Alt+F2 Pop up command window (for quickly running commands).
Use the arrow keys to quickly access previously run commands.

49
5
Super+Tab Quickly switch between windows. Hold down Shift for reverse
order.

Super+` Switch between windows from the same application, or from the
selected application after Super+Tab.
This shortcut uses ` on US keyboards, where the ` key is above
Tab. On all other keyboards, the shortcut is Super plus the key
above Tab.

Alt+Esc Switch between windows in the current workspace. Hold down


Shift for reverse order.

Ctrl+Alt+Tab Give keyboard focus to the top bar. In the Activities overview,
switch keyboard focus between the top bar, dash, windows
overview, applications list, and search field. Use the arrow keys to
navigate.

Super+A Show the list of applications.

Super+Page Up Switch between workspaces.


and
Super+Page Down

Shift+Super+Page Up Move the current window to a different workspace.


and
Shift+Super+Page Down

Shift+Super+← Move the current window one monitor to the left.

Shift+Super+→ Move the current window one monitor to the right.

Ctrl+Alt+Delete Log Out.

Super+L Lock the screen.

Super+V Show the notification list. Press Super+V again or Esc to close.

Files & Folders


A file stores our work in the computer.
Each file is given a file name, which is useful to identify it. Every file name has 1. Primary name
which is the first name of a file given by the user and 2. Secondary name which is the extension
of the file like ‘.docx', ‘.jpg', etc. It is given by the program (where it is created). Primary and
secondary names are separated by a dot (.). Folder or directory stores files and other folders. A
folder within a folder is called a sub-folder.

50
5
Managing Data Using The file manager
To start the file manager,
click on Files icon in the
Activities overview.
When the file manager
opens, you can double-click
any folder to view its
contents. You can also right-
click a folder to open it in a
new tab or new window.
You can quickly preview
each file by pressing the
space bar.

The Path bar above the list of files and folders shows you the location of the folder.

If you want to search for a file, in the folder, click on the search icon at the top of the window and
start typing name of the file in the search bar. The files that match the search string entered will be
listed. Press Escape key to come out of the search feature.

Sidebar helps in quickly


accessing common locations. If
Sidebar is not visible, press the
menu button in the top-right
corner of the window and
select Sidebar option.

51
6 5
Note: Shortcut
Deleted file or folder move to the Trash Bin. To delete a file/folder permanently: Shift+Delete

Copy or move files and folders


A file or folder can be copied or moved to a new location by dragging and dropping with the
mouse, using the copy and paste commands, or by using keyboard shortcuts Ctrl + C (copy) >
Ctrl + V (paste), Ctrl +X (cut)> Ctrl + V (paste). Same options are available in shortcut
menu when you right click on the desired file and then in the blak space of the target location.
Restore a file from the Trash
Deleted files are moved to the Trash. It is usually located on the Desktop. Trash can used to restore
the deleted files. To restore a file from the Trash:
1. Open the file manager.
2. Click Trash in the sidebar. (You can also open Trash from the Desktop).
3. If your deleted file is there, right click on it and select Restore. It will be restored to the folder
from where it was deleted.
Files deleted permanently (Shift+Delete) cannot be recovered.

Shortcut
Copy : Ctrl + C Cut : Ctrl + X Paste : Ctrl + V

Creating a File or Folder


To create a new folder, go to the desired location
and right click in the blank area. Select New
Folder option. Then, type the desired name of
the new folder and press Enter.
For creating a new document, you can select
New Document option.
Opening a File or Folder
Right click on the desired file or folder and select Open option or simply
double-click on it with mouse.
Renaming a File or Folder
Right-click on the desired file or folder and select Rename option. Type
the new name and press Enter. (You can also use F2 function key to
rename files or folders).
Deleting a File or Folder
Right-click on the desired file or folder and select the Move to Trash
option.
You can also press Delete key after selecting the desired file or folder to
delete it.
The Delete File or Folder dialog box appears. Click on the Yes button
to delete or No to cancel deleting.

52
5
LAB EXERCISE
1. Start Your computer and find out which operating system is installed on it.
2. Locate the icons of File Manager and Trash. Open them and observe how
different they look. Write any 3 major observations.
3. Locate the Top menu, Sidebar and Application Menu.
4. Open notepad from Start menu, type some data. Save the file on the desktop.
Now delete and restore the file using Recycle bin. Then, permanently delete
the file.
5. Create a folder on drive D: by some name. Now, using notepad create and save
a file in this folder. Now, create another folder on desktop. Copy the file in the
desktop folder.

Session-2 Apply Basic Skills for Care and Maintenance of


Computer
Importance and need of care and maintenance of computer
Computer systems need proper care and maintenance for efficient working and durability. Regular
care helps in preventing any problems with the computer system. Regular use of antiviruses and
system upgrades keep the computers safe from viruses and other harmful programs. Using
computer tools like defragmenter etc. keep the computer files well organised. Regular backups are
useful in case of sudden data loss.
In addition to the computer storage and programs, computer hardware also needs care and
maintenance. Some of the important tips are:
1. Keep the computer safe from dust. Use proper cotton cloth cover or plastic covers for system when
they are not used.
2. Avoid eating/ drinking while working on the computer. Any spillage may spoil the parts such
as keyboard.
3. Always keep the parts clean especially keyboard and mouse for smooth functioning.
4. Handle the storage media like CDs and pend drives carefully since these are very delicate
devices. Scratch on disk can corrupt the data.
Cleaning the computer components
Keeping the computer clean keeps it functioning well for a longer time. Some useful tips are:
1. Keep a watch on damaged cables and parts and replace them timely.
2. Check for any unusual noises a computer may make while working such as CPU fan. In such
case, get it cleaned. This will prevent CPU from overheating.
3. General precautions to be takes while cleaning the computer components.
4. Always ensure that computer is shutdown properly. Use a UPS with the mains supply for
enough time to shutdown during sudden power failure.
5. Be careful while cleaning. Liquids and sprays are harmful for computer machinery. Use a soft
cloth damp with cleaning liquid to wipe the computer parts.

53
5
6. Use safety devices like anti-static wrist band to prevent static electricity shocks harmful for
electronic device.
Computer maintenance schedule
1. Regularly scan computer with antivirus to check viruses.
2. Replace damaged cables, parts and hardware immediately.
3. Keep cables untangled.
4. Never use pirated or any software from unknown source.
5. Keep the operating system and anti-virus updated regularly.
6. Upgrade computer hardware if needed for optimum performance and data storage.
7. Take regular data backup using backup utility installed with the operating system.
8. At an interval of a few months, run a disk maintenance utility such as disk defragmenter to
optimise the storage for faster file access from the computer disk.
To create a backup of your system
1. Start > Control Panel > System and Security > Backup and Restore.
2. At the Back up or restore your files screen, click Set up backup.
3. Select where you want to save the backup and click Next.
4. Choose Let Windows choose (recommended).
5. Click Next and Verify the backup details.
6. Click Save settings and run backup.

To restore a backup
1. Start > Control Panel > System and Security > Backup and Restore.
2. At the Back up or restore your files screen, click Restore my files.
3. Browse to locate the backup file.
4. Click Next and select a location where you want to restore the backup file.
5. Click Restore.
6. When the process is complete, click Finish.

54
5
To defrag a hard disk
1. Open the Computer window and right-click the desired disk.
2. Select Properties. In the Properties dialog box, click the Tools tab.
3. Click the Defragment Now button.
4. Click the Analyze Disk button.
Wait while Windows checks the defragmentation on the media.
5. Click the Defragment Disk button.

To delete temporary files


1. In the search box on the taskbar, type
disk cleanup, and select Disk Cleanup.
2. Select the desired drive and click OK.
3. Under Files to delete, select the desired
file types and click OK.
To delete system files
1. In Disk Cleanup, select Clean up
system files.
2. Select the desired file types and click OK.

55
5
Supplement: Computer Maintenance in Ubuntu
Backup and Restore
Ubuntu provides a backup-restore utility called Déjà Dup. It may be pre-
installed on Ubuntu otherwise you may install it. It is a free utility. Using Déjà
Dup, backups can be taken on local drives, remote drives over a network or on
cloud drives such as Google and Microsoft drives.
¤ To start backup, go to Activities and type backup in search bar. Click on
Backups icon. Backup pop-up will open.

1. Go to Folders to save section and use +


button to add folders to backup.
You can include folders not to be backed up in
Folders to ignore section.

2. In Storage location section select the drive/


network location/ cloud drive on which backup
3. You can schedule automatic backups in
should be taken.
Scheduling section by specifying when to run
backup in Every drop-down and duration in
Restore Keep drop-down to keep the backup.
To restore files when needed, click on Restore
button in Overview section.

4. Go to Overview section and click on Back


Up Now button to start back up. Set an
encryption password when asked. Backup of
files will begin.

56
5
Disk Cleanup
Ubuntu provides a disk clean up utility called Bleach Bit. It may be pre-installed on Ubuntu
otherwise you may install it. It is a free utility. Using Bleach Bit unnecessary files can be removed to
free disk space, temporary files and cache files can be removed. Temporary files are created by
various applications when you work with them. Cache files and cookies are used by browsers.
¤ Go to Activities and type Bleach in
search bar. It will list Bleach Bit. Click
on it. If it prompts to install, then click
Install button. Bleach Bit will install.
¤ Select your preferences to delete
(folders, clipboard, cache, temporary
files etc.).
¤ Click on Clean button.
¤ Finally, confirm delete in Delete
confirmation pop-up.

Session-3 Computer Security & Viruses


What is a Computer Virus?
A computer virus is a harmful program which attaches itself with the computer files and infects
them. It is capable of making its copies. The ability to copy itself makes virus capable of spreading
from one file to other and even to other computers over a network.
Types of Virus
Depending on the way they function, viruses are of following types:
Boot Sector Virus
Boot sector is that part of the hard disk which contains the boot sector program. This program
loads the operating system in the computer’s memory. If boot sector program is corrupted then
operating system will not load and computer will not be started.
Boot sector virus replaces the boot sector program with its own program and activates as the
computer is switched on. Modern operating systems are capable of stopping the boot sector virus
and boot the computer properly however it is recommended to take care that virus does not infect
your computer in the first place. Some boot sector viruses are Form, Parity boot, Disk killer,
Cascade, Whale, Proud.
File Virus
File virus hides its code in a file and when user runs or opens that file it also loads in the memory.
Then, it infects other files which load in the memory. Some file viruses are Jerusalem, Invader,
Flip.

57
5
Stealth Virus
These viruses apply some way to avoid detection. For example, reducing the actual file size so that
anti-virus does not get suspicious. Some viruses change their program structure every time they
make a new copy. This makes them hard to detect. Such stealth viruses are also called
polymorphic viruses. Whale, Frodo, Joshi etc. work in stealth way.
Macro Virus
Modern word processors and spreadsheets allow us to write short programs which are the part of
the file. These programs are called macro programs. Macro virus is in the form of a macro
program and it hides itself in the document or spreadsheet as a macro. When the file is opened, it
gets activated. For example, Melissa, Wazzu, Crown.
Virus Symptoms
How will you figure out if your computer is infected with a virus? Look for following symptoms
while switching on and working on your computer:
¤ Your computer is starting up slowly and/or works slower than earlier.
¤ Computer suddenly hangs or crashes so that you need to restart it abnormally.
¤ Unwanted pop-ups and notifications appear which were not there earlier.
¤ Computer restarts suddenly on its own.
¤ Hard disk indicator on your computer shows disk activity even if you are not using any
program or opening/saving any file.
¤ Computer shows lesser hard disk space and memory usage is too high in Task Manager.
¤ Unwanted files are created.
¤ Files are not opening or crashing after opening.
¤ Programs taking too long to load and run.
¤ Strange error messages and dialog boxes.
Other Malware Programs
Viruses are not the only threat today. There are other malware programs also which infect
computers and user data in different ways. Let us learn about them.
Worm
Worms are another form of virus which copy themselves independently without the need of any
file to infect. They spread across computers over a computer and make the data transfer slow.
Some worms are capable of using email service to spread to other mail boxes. Examples:
MSBlast, ILOVEYOU.
Trojan Horse
This computer virus looks like a useful program and once installed or downloaded, it harms the
computer. User will install them thinking as a utility and when it runs the intended damage is done.
For example, Zelu, Rootkit, Exploit.
Spyware or Adware
Spyware installs itself on the computer without user's knowledge and monitors keystrokes, takes
screenshots, reads chat, collects device and user information and forwards it to the malicious
owners of such program. Loss of confidential information and identity theft are the threats posed
by spywares.
Protection from Spyware or Adware
¤ Install an effective spyware detecting software.
¤ Keep your operating system and browser updated.
¤ Check if any unnecessary software is being installed. It is often during the installation steps and
in the User Agreement.

58
5
¤ Carefully read and close any warning boxes that look like important messages.
¤ Be careful while installing free programs, games or shareware. Free programs may contain
spyware.
Preventive Measures Against Viruses
Basic Internet Discipline
1. Don’t open unwanted email and their attachments if source is strange or unknown.
2. Use spam blocking or filtering tools to block unsolicited emails, instant messages and pop-ups.
3. Avoid easy and obvious passwords and change them regularly. Keep passwords safe.
4. Avoid downloading files and programs from untrustworthy web sites.
Protect Your Computer
1. Take regular backup of your important data on a separate external disk.
2. Avoid keeping sensitive data like passwords, credit card details etc. on your computer.
3. Do not let everyone to use your computer.
Use Anti-virus Software
1. Install and use a good anti-virus for regular scanning of your computer.
2. Keep the anti-virus updated regularly to safeguard against new viruses.
Anti-virus Software
An anti-virus software detects the virus threats, scans files for viral infection and removes the
viruses. An anti-virus needs to be installed on the computer to prevent, detect and remove viruses.
It is necessary to update anti-virus at regular intervals of weeks or months to keep it aware of new
threats.
How Anti-virus Works?
An anti-virus detects viruses by their signature or behaviour. A virus signature is the unique
structure of a virus program which anti-viruses are aware of. Anti-viruses have a list of known virus
signatures with which they can identify the possible virus. That is why anti-viruses need regular
updates.
Anti-viruses also detect behaviour of the programs on the computer to detect any unusual action
such as accessing a file which is not meant for them. In case of any suspicious activity, it scans the
program for virus.
Some popular anti-viruses are given here:

59
5
Using an Anti-virus
Let us see how to use one of the popular and powerful anti-viruses -
McAfee.
Scan the Computer for Virus
1. Open McAfee Security Scan Plus from Start menu.
2. Click on Scan. button.
3. Select the type of scan you want to run.

The scan options are:


A. Full - Scans your entire computer for known threats.
B. Quick - Scans only the most susceptible parts of your computer for known threats.
C. Custom - Allows you to manually select the drives, folders, and other locations you want to scan.
To see the results for any suspicious files, click View Results. If View Results is not available that
means Virus Scan did not detect any threats.
Click OK.
Scheduling and Updating Antivirus
¤ Click on Settings.
¤ Make your choices for next scan date
and daily, weekly or monthly scan
schedule.
¤ Select the checkbox for auto-update.
¤ Click on Apply button.

60
5
Spyware or Adware
Spyware installs itself on the computer without user's
knowledge and monitors keystrokes, takes screenshots, reads
chat, collects device and user information and forwards it to
the malicious owners of such program. Loss of confidential
information and identity theft are the threats posed by
spywares.

Protection
¤ Install an effective spyware detecting software.
¤ Keep your operating system and browser updated.
¤ Check if any unnecessary software is being installed. It is often during the installation steps and
in the User Agreement.
¤ Carefully read and close any warning boxes that look like important messages.
¤ Be careful while installing free programs, games or shareware. Free programs may contain
spyware.
Spam
Spam is unsolicited or undesired junk email usually a
promotional material. Senders of such emails are called
spammers. Spams have a link that lures the user into clicking it.
This confirms user's email ID and that brings in more spam in
future.
Protection
¤ Use spam filtering settings in the email service.
¤ Share your personal email ID only with those you trust.
¤ Do not display your email ID online for everyone to access.
¤ Create separate email accounts for public use.
¤ Look out for spelling mistakes and bad grammar in the mail. These mistakes are done by
spammers to pass through the spam filter.

Phishing and Pharming


Phishing
Fraudulently acquiring sensitive information from the users by impersonating trusted websites like
banks and e-commerce merchants etc. is called Phishing. Phishers target the details like pins,
passwords and answers to security questions. Phishing occurs generally in the form of an email or
through a legitimate sounding phone call.
Pharming
When website's traffic is redirected to another unauthorized fake
URL then it is called pharming. Hackers somehow get access to the
website's servers and manipulate the configuration files which
identify the server as host website on Internet.

61
5
Protection
¤ Install anti-phishing software.
¤ Never give away any sensitive information related to finance and security like pins, passwords,
bank balance, transaction details, identification numbers etc. in reply to undesired emails and
never on phone.
¤ Always cross check the source of email and phone call with the concerned agency.
¤ Today, all authentic agencies like banks and
merchants have their own secured apps for
transactions. Download and use them on your mobile
phones instead of unknown third- party apps.
¤ Phishers address their targets with fancy terms like
“valued customer” but genuine agency will address
you by your correct name, username, customer ID
etc.
¤ Regularly check your financial statements and account details.
¤ Secured Socket Layer Certification is done for web sites by authorised Certification Authorities
(CA). CAs do not issue SSL certificates to any agency that is not properly identified and
cleared. Check the website's certificate icon of a padlock in the address bar. All secured web
sites have SSL certificates. If padlock icon is of open lock then web site is not secured and must
be left immediately.
¤ Never ignore operating system, anti-virus and browser upgrades. Do them as and when
prompted or required.
¤ Web sites should deploy effective firewalls with suitable settings to keep away unauthorized
access and intrusion. Let us understand what a firewall is and what does it do.

Firewall
A firewall is a security combination of hardware and software that is used to protect a server and
network resources from unauthorized access and intrusion. Firewall checks the incoming data
packets over the networks and filters out which do not have suitable and sufficient permission to
access the network. This way an extra level of protection is created right at the gates of the
network.

62
5
Internet Frauds and Scams
Today we virtually live and shop on Internet. Scammers send
the users tempting newsletters and prompts of getting rich
quick through online gambling, lottery or games alluring them
to click the link. Once you accept the offer they attempt to take
sensitive information like credit card numbers, pins etc.
Protection
¤ Ignore and do not fall for online offers that seem too
exciting to be true.
¤ Ask yourself: Do I really need it? Does it really concern me?
¤ Avoid individuals asking for donations.
¤ Avoid accepting or vouching for any financial transaction with online friends whom you have
never met especially those in known notorious regions of the world.
¤ Avoid charity involvement offers, placement schemes with instant visas, medical claims of
quacks to cure certain disease instantly.

Supplement: Antivirus in Ubuntu


Clam Tk Antivirus
Ubuntu provides an antivirus application called Clam Tk. It is a GUI version of ClamAV command.
It may be pre-installed on Ubuntu otherwise you may install it. It is a free utility.
¤ Go to Activities and type Clam in
search bar. It will list Clam Tk. Click on
it. If it prompts to install, then click
Install button. Clam Tk will install.

After installation, launch Clam Tk.


¤ You can click on Scheduler button to
schedule scanning of system by setting a time
in Schedul dialog box.
¤ Here, you can also schedule time for update
of details about new viruses.
¤ Click on Scan a file button to scan individual
file.
¤ To scan entire folder, click on Scan a
Directory button.
¤ Quarantine button shows infected files
confined as a result of scan.

63
5
1. Define the term operating system. List its 3 major functions.
2. List some major operating systems of different types.
3. What do you mean by the terms Icons, Desktop and Taskbar?
4. What is the use of Computer icon and Recycle Bin.
5. How do you move or copy a computer file from one location to another?
6. How is a file different from a folder?
7. What is the difference between moving and copying a folder?
8. Why is it necessary to maintain your computer system regularly?
9. What is the use of disk defragmenter and disk clean up utilities?
10. Why are regular backups of data important?
11. What preventive measures should we take against computer viruses?
12. List any 5 symptoms of a computer virus.
13. List any 4 practices to keep your computer work smoothly for a longer time.
14. List 3 types of viruses.
15. How can you say that a computer is infected by some virus without running any anti-virus?

Download MCQs and more questions from


https://www.eduitspl.com/teachers-corner-2

64
5
Unit
Entrepreneurial
4 Skills - II

Session-1 Characteristics of an Entrepreneur


Entrepreneurship means creating a business and gradually scaling it to generate a profit. An
entrepreneur is one who sets up a the business this way. Entrepreneurs are some of the world's most
powerful transformers. Elon Musk, Bill Gates, Steve Jobs are entrepreneurs who imagine the world
differently.
Qualities of An Entrepreneur
Planners and Confident: Entrepreneurs know what they wish to achieve and they have a plan
(anticipating risks, threats, opportunities, resources, infrastructure required) to achieve it. This brings
confidence in what they do. Confidence is a trait that can be developed. So, if someone aspires to be
an entrepreneur, can develop self-confidence.
Creative: Right from identifying a problem and then devising a solution for it, creativity entrepreneurs
works in the background. Creativity causes innovations. Innovative ideas come out of the box thinking
and the base of it is creativity.
Risk-takers: Introducing an innovative solution among masses and then promoting it to be accepted
is a challenging task. It is difficult to predict whether it will be liked by the targeted customers or
rejected. Meanwhile, competition also works on the same ideas which makes it all a risky proposition
to begin something new.
Professional: While dealing with team members, service providers and other stake holders,
entrepreneurs follow a code of profession. Being highly professional is very much necessary to
become and entrepreneur. Professionalism is the combination of major traits like self-management,
discipline and keeping your commitments.
Skillful in Social Interactions: Entrepreneurs must be good at interpersonal skills to develop
rapport and longer, fruitful relationships with all the people involved on the business processes like
hiring the team, arranging resources, developing relationship with prospective clients, developing
goodwill with vendors etc.
Open to knowledge, learning and failures: Entrepreneurs must be aware of advances occurring
in the field and how market dynamics is changing. They also carry an attitude of facing the failures,
taking responsibility to own the outcomes if any plan falls flat. They analyse their failures to take
learning out of it for further improvements in strategies.
Empathetic: Entrepreneurs like to work with democratic teams. There is, of course, hierarchy in the
team but that serves the purpose of monitoring and controlling the deadlines. On practical grounds
teams work in unison. Entrepreneurs resolve conflicts and recognise the good achievements in the
team and reward them to boost the morale of the team.

65
5
Customer oriented: Customer is the source of revenue. Customer can only pass the verdict of
rejection or selection of the innovative product. On a slight deviation from the commitment made to
the customers, they can go to the competitor. Entire plan made by entrepreneurs is customer focused.
Passionate: No matter how rosy or dark the things are, an entrepreneur’s passion never dampens.
They look into the eyes of the challenge and with great passion, set on to win over it. If they meet the
failures, they look for what had gone wrong and how it could be corrected. Then, they set on with
even more passion to retry.
Excellent communicators: Entrepreneurs connect with people using their verbal and non-verbal
communication skills. Inculcating trust among customers, good relationships with the vendors and
service providers and making a good team work for them needs high level of communication skills.
These skills help them deal with people and situations in adequate manner.
Leaders: People look at entrepreneurs as an innovative solution provider. They admire his/ her
position. An entrepreneur is in the clear view of his/ her team and the customers so he must
demonstrate his/ her leadership skills where ever persuasion and motivation is required. For team, an
entrepreneur leads by example and for customers he demonstrates a code of ethics which are qualities
of a leader.
Functions of An Entrepreneur
An entrepreneur is more than what meets the
eye. He/ she works in following major areas: this
area, an entrepreneur exhibits all the functions
that map his/ her main characteristics we have
seen above especially taking risks, innovation,
planning and organising.
Management: Predicting, planning, organising,
coordinating and controlling the team, functions
and interactions is also looked into by an
entrepreneur. Major managerial activities are:
1. Planning at every level including initiating the processes, anticipating the risks and identifying
resources.
2. Organising by providing a process to ensure that everything works as planned. Managing team
functions, interactions with external entities like vendors and organising promotional activities.
3. Recruitments and team building to have right kind of talent and professionals to convert the vision
into desired product or service.
4. Giving directions and guidance where ever needed by the team to keep the progress on track.
5. Controlling the proceedings to keep them going as planned and improvising in strategy wherever
needed.
Sales and Promotion: This is the most curious and interesting area for an entrepreneur since this
influences the processes of bringing in revenues and developing business relations. Addressing the
customer segment and promoting the innovative product, devising promotional strategy and
activities are one of the prime concerns of an entrepreneur.
Finance and Commerce: Funds are the fuel of entire entrepreneur project. Identifying sources of
funding, getting prospective investors interested in the project and mobilising the funds are the
activities which entrepreneurs manage. Commercial functions include looking into production and
manufacturing process or the processes related to service delivery. Involving into financial
transactions, analysing the financial figures and plan ahead.

66
5
Some Inspiring Entrepreneurs
John Paul DeJoria: John Paul DeJoria has accomplished feats of
entrepreneurship and business management such as starting as a newspaper
courier, and working as a janitor and tow truck driver. He finally started working
at a hair care company, where he met Paul Mitchell. With a loan of just $700, the
two of them started a business that turned into the conglomerate now known as
John Paul Mitchell Systems. DeJoria also co-founded Patron Spirits, and was a
founding partner of the House of Blues chain. Today, he's worth more than $3.1
billion.
Kevin Plank: The CEO of the fitness apparel company Under Armour, he was almost
broke when he started selling signature clothing under the Under Armour brand. He
saved, about $20,000, and took loan of $40,000 to fund the company. Soon after, he
made a landmark sale of $17,000 to Georgia Tech University, and in a wave of
momentum, made sales to two dozen NFL teams. Today, Under Armour does nearly $2
billion in retail sales, and has 5,900 employees.
Jan Koum: He is the founder of WhatsApp. He was born in a small village near
Kiev in Ukraine. Koum's family emigrated to California, and he started learning
about computers in his spare time. By the time he was 18, he had developed
impressive skills, and in 1997, he was hired by Yahoo! as an infrastructure
engineer. He spent a decade in that industry and then in 2009 he set on to start
WhatsApp Inc. By 2014, WhatsApp had become enormously popular.
Facebook bought the app for a staggering $19 billion.
Sam Walton: Sam Walton, Walmart's founder, had almost nothing to his name himself
when he started his first general store back in 1945. He relied on a $25,000 loan from his
father-in-law to fund that initial purchase, and was an instant success in the retail
industry. The first official Walmart was opened in 1962, in Rogers, Ark.; and by 1976,
Walmart was worth more than $176 million. At one point, Walton was considered the
wealthiest man in the United States.
George Soros: There are few better rags-to-riches stories than that of George
Soros. When Soros was a teenager in Hungary in 1947, he fled Nazi persecution to
live in England. Despite having little money to fund his efforts, he attended the
London School of Economics, working his way through university to obtain his
degree. He then moved to the United States in the 1950s, and became an
investment manager for a number of major firms, eventually starting his own
hedge fund and building his own company. His most famous move was shorting
the British pound in the early 1990s, which made him $1 billion in a single day.

Note:
The above details are taken from the article at: https://www.entrepreneur.com/article/305990.

Some other known


entrepreneurs are: Mark
Zukerberg (Facebook), Jeff Bezoz
(Amazon), Elon Musk (SpaceX),
Shiv Nader (HCL), Bhavish
Aggarwal (OLA), Binny Bansal,
Sachit Bansal (Flipkart).

67
5
EXERCISE
Answer the following questions:
1. How entrepreneurs positively contribute to society?
2. List main characteristics of an entrepreneur.
3. What are the main functions of an entrepreneur?

Session-2 Role and Significance of an Entrepreneur


Entrepreneurs contribute in economic growth of
the nation. They bring together best skills and ideas
to create innovative product and services to
revolutionise the lives of the people. They help in
empployment generation and growth of the people.
Let us see some significant roles played by
entrepreneurs:
Mobilisation of public wealth: By establishing the business entity, entrepreneurs invest their own
resources and arrange for capital and investments. The source of funding may be investors, lenders
and the public. This mobilizes public wealth and benefits people as well as all stakeholders in the form
of the success of the growing business. This kind of contribution of funds from different sources makes
the foundation on which the business entity is erected.
Creation of employment opportunities: By their nature and motivation entrepreneurs are job
creators rather than being to job seekers. When someone decides to become self employed, he/ she is
no more a job seeker in the economy, he/ she provides employment to multiple other job seekers. This
kind of job creation by new businesses is very rewarding for nation’s economy as it addresses problem
of unemployment up to some extent.
Contribution to Industrial Development: Entrepreneurs setting up new businesses and industrial
units help with regional development by locating in less developed and backward areas. The growth
of industries and business in these areas leads to infrastructure improvements like better roads and rail
links, airports, stable electricity and water supply, schools, hospitals, shopping malls and other public
and private services that would not otherwise be available.
Contribution in economical growth: India's MSME sector, accounts for over 35% of the country's
GDP by making use of resources like land, labor and capital that add to the national income, national
product and per capita income of the country.
Enhancing living standard of people: Entrepreneurs play a key role in increasing the standard of
living in a community. They create jobs and also develop and adopt innovations leading to improved
quality of life of their employees, customers, and other stakeholders in the community.
Entrepreneurs create jobs: Entrepreneurs, create opportunities for jobs. They take risks of self
employment. As their business grows, opportunities for more jobs are created. This greatly contributes
to the eradication of unemployment problem in the nation.
Entrepreneurs create change: Entrepreneurs always look for the ideas to transform the world
around us. They look at the problems with different perspective and come up with revolutionary ideas

68
5
which triggers remarkable positive changes in the society and in the lives of people. They explore new
vistas to do better and in innovative ways to create products and services which address some burning
problem.
Entrepreneurs give to society: Entrepreneurs often do more for the greater good than the average
person. They make honest money with great struggle and pay for taxes and public services thereby
contributing and returning to the economy. Many of them take green initiatives for environment and
contribute to the charities for social causes.
What does Society Give to an Entrepreneur?
Entrepreneurs belong to the same society they serve. The view of society about entrepreneurship is
crucial since it makes a conducive environment for this idea to grow. Many problems addressed by
entrepreneurs can successfully be done so through society’s initiatives. Social awareness creates a
positive view about entrepreneurs and youth are influenced by it. Social ecosystem has great youth
power which can encourage youth to take up entrepreneurship as a career option. Social awareness
can sensitise people in buying and using products and solutions provided bu local entrepreneurs thus
encouraging them in their efforts. Rural areas and extreme interior regions of the country are
welcoming entrepreneurship initiatives by government and social organisations. This improves local
employment, makes people self-reliant and strengthens the social fabric. People involving in
entrepreneurship drive improves the local economy. Prosperous people become happier and
confident. Educational institutes can play a key role in encouraging and supporting entrepreneurship.
Crowd funding is one such example. Groups of people can come together to encourage
entrepreneurship drive.

EXERCISE
Answer the following questions:
1. How do entrepreneurs enhance living stavdard of people and create jobs?
2. How do entrepreneurs contribute to industrial development and economical growth?
3. How do entrepreneurs mobilise public wealth and contribute to society?
4. How can society contribute to entrepreneurship drive?

Session-3 Myths Related to Entrepreneurship


Now we know that entrepreneurship demands a great deal of skills. An entrepreneur is more than a
businessmen as far as versatility is concerned. An entrepreneur is a leader, innovator, risk-taker and
enerprising person. Let us have a look at certain assumptions people do while considering
entrepreneurship as a career option.
Myth: Entrepreneurship is easy to do
Fact: Entrepreneurship involves greater risks. Conceiving an innovative service or product is
challenging in itself. Then convincing people of your idea and mobilising funds also needs a lot of
efforts. Making the service/ product reach the masses and get accepted is another barrier to scale. At
every step there are new kind of challenges.

69
5
Myth: You have more freedom in entrepreneurship
Fact: An entrepreneur walks, talks, eats and sleeps his/her dream. They do not have the time-bound
schedule of an employee. They also do not have luxury to hire a big team that works for them. They are
actively involved in all processes of their venture so there is no time-bound schedule for them. They
have luxury of flexibility but idea of freedom is a big myth.
Myth: You need to create an entirely new product or service to sell.
Fact: Entrepreneurs do the things differently or innovatively. Uber, Ola are taxi services but they have
revolutionised the way these services are provided. Innovative part is that they do not own the
vehicles and drivers still people associated with them have flexibility of working and chances of
earning handsomely. As an entrepreneur if you have a new product to offer, ut is good but most start-
ups have found innovative and creative ways in offering the same products and services. This is called
disruption. Paytm, Uber, Ola, Netflix, Savn, Olx etc. are disruptions.
Myth: Lot of funding is required to start the business
Fact: One aspect of innovation is thinking of an idea which can be launched at a smaller scale that can
start with a small amount. At later stages, it can be scaled up to bigger product and using more funds as
it would be easier to do so once brand is established in the market. Most of the start ups begin at small
scale, home based ventures. Google had begun in a garage. So did other current giants like Apple and Disney.
Myth: It is difficult to get loans for a start-up from banks
Fact: It is not difficult at all, rather, it is easier now. Make in India initiative of the government and
various other loan schemes for small and medium enterprises (SME) are there. All the public sector
banks and most of the private banks provide SME loans at very attractive interest rates. Government is
still doing amendments in making the funding process for start-ups easier and more flexible.
Myth: Success is quick if we start small
Fact: Size of the start-up in the beginning may make a difference in managing the business but it has
nothing to do with success directly. Success depends on the acceptance of the product in the market
and how it is promoted among masses. The kind of hard work put into this process will also make a big
difference but many small start-ups fail too not because of their size or finance but due to the flaws in
the vision of the start-up.

EXERCISE
Answer the following questions:
1. Do you think entrepreneurship is easy? Why/ Why not?
2. Entrepreneurs have a time-bound schedule. Do you think this statement is true? Why/
Why not?
3. Is it a myth that every start-up should begin with a new product or service?
4. Do start-ups need a huge amount of funds to begin? Explain.

Session-4 Entrepreneurship As A Career Option


Entrepreneurship is a vast field providing several opportunities and choices to make from. You can
begin your own start-up with an innovative idea or your can associate with an existing start-up and
contribute to its growth.

70
5
As a career it is suitable for people who work independently. They do not want to spend life as 9 hours
job cycle. They are passionate and ambitious. They want to win the rewards hidden behind the
challenging rocks of risks and challenges. They believe in their ability to generate wealth for self and
opportunities to earn and grow for others. They want to enjoy the success carved by themselves.
Learning Entrepreneurship: Today various short-term and ful time entrepreneurship courses are
available which can be pursued to prepare yourself before actually starting with a start-up. Universities
and private management institutes provide a range of diploma, certificate, professional,
undergraduate, post graduate and management courses to choose from. These courses prepare you
with necessary skills and knowledge required to become an entrepreneurship.
Becoming a Franchisee: Many business follow up franchising framework to grow their business.
Advantages of taking a franchisee of a business that you save a lot of time and effort in establishing the
business. As a franchisee you get a ready setup with facilities like training, sales support, branding and
guidance with flexible payment options.
Buying a Business: Instead of thinking and deploying a new idea, an existing business can be bought
which has growth potential in future and then innovations can be added to it to give it a new shape.

Pros and Cons of Entrepreneurship As a Career


If you are passionate enough to work on risk-reward model then entrepreneurship is your domain.
Some common advantages of having entrepreneurship as career are:
1. Control: You plan, chose and design the things the way you need or like.
2. Excitement: Each day brings its own challenges, opportunities, risks and rewards.
3. Flexibility: Working hours can be planned as per the required work and commitments.
4. Freedom: In terms of location, timings and team building there is comparatively more freedom.
5. Recognition: Once business grows, people begin to recognise you and get inspired by you.
6. Growth: You can determine the pace of start-up’s growth as you require.
Some common disadvantages of having entrepreneurship as career are:
1. Competition: You need to be on constant lookout to update yourself on the competition in market.
2. Lone struggling: Entrepreneurs are normally a small team. Struggle is not contributed by many
stakeholders. Mostly risk taking lies on the entrepreneur him or herself.
3. No regular income: Income in business is not predictable. It directly relates to your efforts and
revenues earned.
4. Greater responsibilities: As an entrepreneur you own everything so you shoulder the bigger
responsibility of all the processes and functions in your business.
5. Longer working hours: There are no fixed hours and days for an entrepreneur. He/ she eats and
sleeps the business. They always think what new can be added for further growth.
6. Funding and finances: If business goes down, managing new finances could be difficult.

EXERCISE
Answer the following questions:
1. Find some good entrepreneurship course on internet. Make a small write up about
them and the institutes that provide these course.
2. Go to entrepreneur.com, business.com and franchise.com and spend some time there
to find out what sorts of business opportunities are there for youth.
3. List a few advantages of entrepreneurship.
4. List a few disadvantages of entrepreneurship.

71
5
1. Describe any 4 characteristics of an entrepreneur.
2. How can you say that ‘innovation’ sets the entrepreneurs apart from businessmen?
3. List the functions of an entrepreneur.
4. Discuss in brief any 3 major functions of entrepreneur.
5. How does entrepreneurship influence society and nation’s growth?
6. List any 4 major myths about entrepreneurship.
7. Discuss about any 3 myths related to entrepreneurship.
8. Write a brief note on how entrepreneurship can be a good career option.

Download MCQs and more questions from


https://www.eduitspl.com/teachers-corner-2

72
5
Unit
Green Skills - II
5

Session-1 Understanding Sustainable Development


In simple terms, sustainable development means the economic development that is achieved without
harming and depleting natural resources. Looking more closely into the term “sustainable”, it is
defined as something that is “able to be upheld or defended” (New Oxford American Dictionary,
2005). Sustainability is development that takes care of the needs of the present while being concerned
about future generations, balancing between economic growth, care for the environment and social
well-being.
Today, sustainable development is not an option but necessity. It is
necessary due to the concerns for preserving and enhancing the
environment and its biodiversity to ensure a healthy and productive
world. Growth and environmental maintenance are simultaneously
possible and we are capable of achieving it. Thus, sustainable
development demands growth that is environmentally sound to
reduce poverty and promote shared prosperity for all and meet the
needs of future generations.
The three fundamental components to sustainable development are
Economic development, Social development and Environmental
protection. Economic development is about providing incentives for businesses and other
organizations to adhere to sustainability guidelines. Social development is about awareness and
protection of the health of people from pollution and other harmful activities of business.
Environmental protection is the need to protect the environment, whether the concept of 4 Rs
(reduce, recycle, recover, and reuse) are being achieved or not. Sustainable development
encompasses 4 Ps: People who represent the socio-cultural issues. Planet which represents the
environmental issues. Profit that represents the economic issues. Policy which refers to visionary
political leadership and implementation of policies needed to make sustainable development a reality.
Today, countries are agreeing to the importance of conserving natural resources. Process is slow but
has begun. People are adopting to greener ways that will improve their health, farmers are practicing
smart agriculture and industries are realizing as to how much they can save through energy efficiency.
Sustainable Development and The World
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) of the 2030 Agenda for
Sustainable Development — adopted by world leaders in September 2015 at an historic UN Summit
— officially came into force. Eradicating poverty in all its forms and dimensions is an indispensable
requirement for sustainable development. There must be promotion of sustainable, inclusive and

73
5
equitable economic growth, creating greater opportunities for all, reducing inequalities, raising basic
standards of living, fostering equitable social development and inclusion, and promoting integrated
and sustainable management of natural resources and ecosystems. The 17 SDGs are:
1. Complete poverty eradication 9. Industry, innovation and infrastructure
2. Zero hunger 10. Reduces inequalities
3. Good health and well-being 11. Sustainable cities and communities

4. Quality education 12. Responsible consumption and production

5. Gender equality 13. Climate action


14. Life below water
6. C lean water and sanitation
15. Life ion land
7. Affordable and clean energy
16. Peace, justice and strong institutions
8. Decent work and economic growth
17. Partnerships for the goals

EXERCISE
Answer the following questions:
1. Define the term sustainable development.
2. What are the 3 fundamental components or pillars of sustainable development?
3. What are the 4 Ps of sustainable development? Explain them briefly.
4. What is UN’s sustainability development program 2030?
5. Go to https://www.un.org/sustainabledevelopment/sustainable-development-
goals/ and read more about UN’s SDGs.

Session-2 Importance of Sustainable Development


The concept of sustainable development, although had appeared in the 1970s, was widely
disseminated in the early 1980s by the ‘World Conservation Strategy’ (IUCN, UNE’P and WWF, 1980),
which called for the maintenance of essential ecological processes; the preservation of biodiversity;
and sustainable use of species and ecosystems.

74
5
The Brundtland Report titled: Our Common Future (World Commission on Environment and
Development, 1987), brought the sustainability issues to the world political platform to raise global
interest in the environment.
The importance of sustainable development can be summarised as below. Sustainable development
is necessary because it will:
Provide for essential human needs: The growing population compels people to struggle for the
limited life essentials like food, shelter, and water. Sustainable development only promises to reduce
this struggle by providing essential infrastructure. If governments insist on utilizing fossil fuel based
sources of energy instead of renewable and sustainable options, the cost and environmental effects of
supplying these basic needs would be very huge.
Address agricultural requirement: Growing population means agriculture must be as much
productive to meet the demand for natural food. Sustainable development focuses on sustainable
agricultural methods such as effective seeding techniques and crop rotation to promote high yields
while maintaining the integrity of the soil, which produces food for a large population.
Help in managing climate change: Climate change can be mitigated by sustainable development
practices. Sustainable development practices discourage the use of fossil-based sources of fuel like oil,
natural gas, and coal. Renewable energy sources like solar energy and nuclear energy are the better
options and developments are occurring rapidly in that direction.
Help nation in being economically stable: Sustainable development practices have the ability to
create more financially sustainable economies. Developing countries that cannot access fossil fuels
can opt for renewable forms of energy to power their economies.
Help in sustaining biodiversity: Life ecosystem is designed in such a way that species depend on
one another for survival. Unsustainable development practices like emission of greenhouse gasses in
the atmosphere and pollution of air, water and land kill many plant species resulting in reduction of
atmospheric oxygen. Sustainable development practices encourage the use of renewable energy
resources, and organic farming practices that are environment friendly.

EXERCISE
Answer the following questions:
1. Why sustainable development is necessary?
2. Discuss some examples of sustainable development.

Session-3 Sustainable Development: Challenges and Solutions


Challenges in Sustainable Development
We are facing challenges in all three dimensions of sustainable development—economic, social and
environmental. In entire world, more than 1 billion people are still living in extreme poverty, and
income inequality. Achieving sustainable development requires global as well as local actions. The
common challenges in the way of sustainable development are:

75
5
Climate change: Global warming, floods, droughts in several countries are a big concern today.
Extreme winters and summers have been experienced in many parts of the world recently. A
drastically changing climate poses social problem and creates a barrier in achieving goals associated
with sustainable development.
Hunger and malnutrition: Many developing countries have managed the problem of food
inequality and malnutrition but still many countries are struggling to overcome this challenge. For
them, the priority id not sustainable development.
War and border conflicts: A country which is not at peace with neighbours cannot focus on the
need of sustainable development. The focus will obviously shift to the sudden crisis arisen due to the
war and conflicts. Common crisis due to war is inflation and social unrest.
Rapid urbanisation: To accommodate the growing population due to decreased death rates, more
and more agricultural lands and forests are converted into urban areas and cities challenging the main
aim of sustainable development.
Energy usage: Use of fossil fuel and coal needs to be minimised. People who are already used to these
need to be persuaded to switch to adopt greener ways like solar energy and electricity.
Lack of financial resources: Many countries struggling with their economical crises find it difficult
to mobilise funds for sustainable development. For them, priority is to provide money for basic needs
of their people.
Conflict between the priority of policies: In certain countries, governments give priority to other
important development programs for the development of their people due to financial, investement
and overall profit reasons and find sustainable development too difficult to merge in their ongoing
programs. In the conflict of necessary development programs, sustainable development approach
takes a backseat.
Corruption: This is the biggest impediment in the way to achieve sustainable development.
Businesses and industries, for their vested interests, resort to every unfair mean to carry on with their
profit programs which are hazard to environment. Impact of development programs fails to reach the
end beneficiary.
Lack of will power by authorities: Many times municipal authorities and the government bodies
responsible to execute and manage sustainable development programs do not carry out their duties
with full conviction. The programs either born and die in papers only or are implemented in a very
poor manner defeating the entire purpose of the program.
Lack of strategic vision: Certain small, underdeveloped countries do not know how to approach
towards gaining sustainable development. They look forward to other developing and developed
countries for all kind of help. This gap in the vision delays the development process and more damage
is done meanwhile.
Overcoming the Challenges in Sustainable Development
Integration of economical, social and ecological dimensions brings in sustainable development. Let us
look at the ways to overcome the challenges in sustainable development.
Building strong institutions of governance: A stable, dedicated and fair government is a must for
paving the ground for sustainable development programs. Strong government institutions will have
suitable authority to implement the such development programs effectively. People will also be
encouraged and motivated to cooperate with and participate in such programs. With good
governance behind, such programs would impact positively and hugely in lesser time.
Industrial and social innovations: Entrepreneurs working for the betterment of society and
coming up with innovative ideas which are socially and financially viable should be promoted and
supported. Government should financially support innovation research programs.

76
5
Equal opportunities for employment: People who seek employment expect equality in income,
wages and facilities. Equal employment opportunities for all segments of society makes fertile ground
for rapid sustainable development programs.
Renewable energy consumption: Promotion of renewable and alternative sources of energy like
solar and electricity is gaining popularity. Such means of power are given subsidy by governments and
in long run they are almost free due to higher margins of savings. This helps infighting with climate
change too.
Control of environmental abuse: Pollution due to industrial actions and emissions, e-waste and
abuse of natural resources needs heavy penalty provisions. Strict and stringent laws and their strict
implementation against poaching, illegal mining, exploitation of forests and rivers, oil spillage in
oceans and harvest stubble burning etc.
Community drive: Community mobilisation through awareness programs using mass
communication, involvement of people at grassroot level and participation of social bodies needs to
be planned, focused and more organised to make people aware and interested in the government
initiatives. Such mobilisation can bring bigger change in very small time.
Reforms in education sector: Education is the greatest tool to influence the psyche of the people
and make them aware of their welfare. Reforms on educational initiatives and programs for masses
and remote areas will greatly help in implementing sustainable development programs in all parts of
the country.
Eradicating and controlling diseases and malnutrition: These are the major problems that shift
focus from sustainable development. These problems need to be addressed with a stable solution so
that funds and attentions could be utilised for sustainable development.
Learning from other countries: Countries like Singapore, Sweden, Netherlands and South Korea
have done remarkable innovations in these areas and they are way ahead of many countries in
sustainable development. Their achievements can be studied and adopted suitably to achieve the
same success.
Gender equality and poor women upliftment: Gender equality is not only a fundamental human
right, but a necessary foundation for a peaceful, prosperous and sustainable world. There has been
progress over the last decades: More girls are going to school, fewer girls are forced into early
marriage, more women are serving in parliament and positions of leadership, and laws are being
reformed to advance gender equality. Despite these gains, many challenges remain: discriminatory
laws and social norms remain pervasive, women continue to be under represented at all levels of
political leadership, and 1 in 5 women and girls between the ages of 15 and 49 report experiencing
physical or sexual violence by an intimate partner within a 12-month period. Everyone benefits from
gender equality. It helps prevent violence against women, is good for the economy, and makes our
communities safer and healthier.
UN Women has developed a rapid and targeted response to mitigate the impact of the COVID-19
crisis on women and girls and to ensure that the long-term recovery benefits them, focused on five
priorities:
1. Gender-based violence, including domestic violence, is mitigated and reduced.
2. Social protection and economic stimulus packages serve women and girls.
3. People support and practise equal sharing of care work.
4. Women and girls lead and participate in COVID-19 response planning and decision-making.
5. Data and coordination mechanisms include gender perspectives.

77
5
Women make a major percentage of entire population and women from the weaker sections of
society need specialised upliftment programs so that they come in the mainstream as economical
participants. Equality of women and welfare of poor women is a must in making sustainable
development a reality.
Individual’s Role in Sustainable Development
Society is a big hope in saving environment, economy and itself. There are many ways in which we can
contribute to sustainable development drives and initiatives. Some small initiatives we can take is
judicial use of essential resources like power, water and land. Following energy saving practices helps
greatly in nation’s economy such as use of electricity, appliances, taking lesser printouts, recycling,
using environment friendly products and going green, saving water, not littering and avoid dumping
hazardous garbage etc. We can bring discipline in life like avoiding drunk driving, not defacing or
abusing public facilities and property, save fuel, keeping personal hygiene and contributing in public
green initiatives. Avoiding drug abuse and living a healthier life. Encourage others to do so can save a
lots of lives. Other ways of helping are, keeping a check on spending habits, avoid overbuying,
responsible consumption of consumables. Taking active part in our society’s green initiatives such as
plantation, awareness programs, cleanliness drives etc. As entrepreneurs or businessmen, we can
encourage youth work, social service contribution and creating job and career opportunities for
others. We can contribute to child education, women empowerment programs and poor upliftment
intitiatives going around us or we can begin one.

India and Sustainable Development


The world’s governments, including India, have agreed on an ambitious agenda to transform our
world by 2030, on the 2030 Agenda for Sustainable Development, adopting the Sustainable
Development Goals (SDGs) that aim to ensure no one is left behind, and everyone benefits from
development efforts.
India as a responsible country has never backed on environmental friendly initiatives.
Kyoto and Paris agreement: India earlier followed Kyoto protocol to fight climate changes and
recently it has signed Paris agreement focusing on bringing down global temperatures.
The Clean Development Mechanism projects: India is second highest in the world , after China,
in running 1593 projects in energy efficiency, fuel switching and solid waste management.
State Action Plans for climate change: Climate change programs focusing on water, agriculture,
tourism, transport and forestry etc. are run in 32 states and union territories.
Coal cess and National Clean Energy fund: India levies carbon tax on industrial coal usage in the
form of coal cess. Clean energy initiatives and research is funded under National Clean Energy fund
that is created by this tax.
National Adaptation Fund for climate change: A more than 1000 crores fund has been
provisioned for this initiative to take care of the areas which are vulnerable to the adverse effects of
climate and environmental changes.
Other initiatives are: NITI Aayog has developed a composite index of states to track progress towards
each SDG. Kerala, Himachal Pradesh, Chandigarh and Puducherry are leading in this progress.
Sewerage infrastructure, sewage project management and urban sanitisation under Namami
Gange project. Identification of Grossly Polluting Industries (GPIs), water quality monitoring stations,
ensure sustainable consumption and production patterns under SDGs - 2, 6, 7, 8, 9, 11, 14 and 15.

78
5
EXERCISE
Answer the following questions:
1. List some common challenges in sustainable development.
2. Discuss briefly why sustainable development is a challenge for developing countries?
3. What are the ways to overcome the challenges in the way of sustainable development?
4. What are some initiatives by India towards sustainable development in the country?

1. What do you mean by environment?


2. Which compnents is our envirnoment made of?
3. What is Ecosystem?
4. Give an example of an ecosystem and briefly explain it.
5. List any 5 disastrous effects on environment caused by human activities.
6. What is the importancd of green economy in the modern world?
7. What is sustainable development? How is it different from traditional way of development?
8. Describe the 3 fundamental components or pillars on which sustainable development is based.
9. What do the 4 Ps represent in sustainable development?
10. Write a note on the 2030 Agenda for Sustainable Development of UN Summit discussing briefly
about its 17 sustainable development goals.
11. How is sustainable development beneficial for the economy, society and environment of a
nation? Discuss briefly.
12. How the problems of climate change, hunger and degrading biodiversity addressed by
sustainable development approach?
13. What re the common modern problems which stand as a challenge in the way of sustainable
development?
14. Suggest a few ways to meet the common challenges of sustainable development.

Download MCQs and more questions from


https://www.eduitspl.com/teachers-corner-2

Watch & Learn


www.eduitspl.com
www.youtube.com/edusoftknowledgeverse

79
5
PART B: Subject Specific Skills
Unit
Digital Documentation
1 (Advanced)

Session-1 Document Styles


Styles are a pre-designed set of font, font-size, colour and other formatting which can be applied
on the document at once without having to format various parts of the content individually. A
standard word processor provides a library of pre-defined styles to apply on the document in order
to give it a professional look with least efforts.
Benefits of Styles
Styles bring uniformity and consistency in the design of the document. They save time and effort as
we can create and save our own defined styles. This makes the document formatting more
efficient. Document gets a formal look as all the headings, sub-headings and other parts of the text
get a well-defined, balanced look. Changing the style applies to all the parts of the document
which have that style applied. This saves time which is wasted otherwise in reformatting and
making corrections. It becomes easier for the word processor application to read the style-based
document structure and documents load faster in computer memory.
How styles are different from templates?
Styles keep the look and design of the text within a document. If you need to use exact styles you
created in a document into another document then you need to save the document as a template and
create the document based on that template. This way, templates are used to apply consistent styles
and formatting across different document. Every new document can be based on a template. With
templates, we can reuse the settings of a document.
Different types of style
LibreOffice Writer has 6 types of styles:
¤ Paragraph styles affect an entire paragraph.
¤ Character styles affect a block of text inside a paragraph.
¤ Page styles affect page formatting (page size, margin, and the like).
¤ Frame styles affect frames and graphics.
¤ List styles affect numbered lists and bulleted lists.
¤ Table styles affect the look and formatting of tables.

80
5 Digital Documentation (Advanced)
These styles can be seen in Styles and Formatting
window which can be displayed by clicking Style and
Formatting icon on the Sidebar.

Shortcut
To display Styles pane in Sidebar: F11

In this pane, the buttons for each of the style types are
displayed. Click on anyone to list the available styles.
They appear in the same sequence as their names are
listed earlier.

Applying Styles
To apply any style, select the part of the text (heading or paragraph or any text) and double click on the
desired style in the list under corresponding style type. For example, if you have to apply Example style
on some text, then select that text, click on Character style button and double click on Example style.

Apply styles using Fill Format Mode


Next to the Style types button is found Fill Format button. If you want to apply a selected style on
multiple parts of text quickly, one-by-one then click on Fill Format Mode button and then
click on the desired text parts to apply the style one by one.
Finally, press Escape to come out of Fill Format Mode.
Creating a New Style
You can format some text as you like or need and then save that formatting as a new style for later use.
To do so, do any of the following:
¤ Click on New Style from Selection button on the Formatting toolbar.
¤ Styles menu > New Style from Selection option.
¤ Click on Styles actions drop-down in the Styles pane of Sidebar and select New Style
from Selection option.
Create Style popup appears.
Mention a relevant name of your style and click OK.

Shortcut
New Style from Selection:
Shift + F11

81
Digital Documentation (Advanced) 5
Create a New Style Using Drag and Drop
Formatting of a text can be save as a new style using simple drag-drop method. Click on the
desired Style type button on the Style pane in Sidebar. Select the pre-formatted text and drag-
drop it into the pane. Create Style popup appears.
Mention a relevant name of your style and click OK.

Updating Existing Styles


Once you select the text and apply a style to it. you can add
some more changes in the style and update the selected style.
To do so, follow any of these:
¤ Click on Update Selected Style button on the
Formatting toolbar.
¤ Style menu > Update Selected Style option.
¤ Click on Style Action drop-down in the Styles pane of Sidebar
and select Update Selected Style option.

Shortcut
Updated Selected Style:
Ctrl + Shift + F11

Loading Styles from a Template


To load an external style from a document template do any of the
following;
¤ In Styles menu, select Load Styles options.
The selected style will be listed in the Style sidebar.
¤ Click on Styles actions drop-down in the Styles
pane of Sidebar and select Load Styles
option.
In Load Styles popup, select the desired style under
various Categories and click OK.

Session-2 Working with Shapes and Images


Mostly documents such as various reports, flyers, newsletters, books, etc. contain images and
shapes, etc. along with the text. Many operations are common on images and shapes such as
special effects, text wrapping and grouping/ungrouping, etc.
¤ Shapes can be insereted using Insert menu > Shape submenu.
¤ To insert an image in the document, go to the Insert menu > Image option. In the Insert
Image dialog box, locate the desired image and click on Open button.

82
5 Digital Documentation (Advanced)
Inserting Shapes Inserting Images

Drawing Toolbar
Shapes can be drawn and managed using Drawing toolbar in Toolbars under View menu.

Drawing toolbar provides a rich library of a variety of shapes arranged in various categories.
Shapes range from simple forms like Lines, Arrows, Rectangle, Circle to Curves and Polygons, Basic
Shapes (Diamond, Ring, Hexagon, etc.), Symbol shapes (Smiley, Cloud, Flower, etc.), Block Arrows,
Stars and Banners, Callouts, Flowchart, Text Box and FontWork Text.

Curves and Polygons Basic Shapes Symbol Shapes Callouts

Stars and Banners

Block Arrows
Flowchart Fontwork Gallery

83
Digital Documentation (Advanced) 5
Various Ways of Inserting Images
In Writer, images can be inserted in following ways:
1. Import graphics files using Insert menu > Picture > From
File option. (7.1.2.2 & higher versions: Insert > Image)
2. Link image by Insert menu > Picture > Link option or
embed image by breaking the link as Edit menu > Links
option and clicking Break Link button in the Edit Links
dialog box.
3. Scan the image by Insert menu > Picture > Scan option >
Select Source > OK. Then insert the scanned image using
Insert menu > Picture > Scan > Request option.
(7.1.2.2 & higher versions: Insert > Media > Scan >
Request)
4. Insert any copied image from the clipboard by using Edit
menu > Paste Special option.
5. Drag-dropping images in the document with Ctrl key ( images
are embedded in the document as its part.) or, Ctrl+Shift key (a link to the image is inserted
in the document. Actual image is not inserted.)

Object Properties Panel


While working with any shape and image, the properties of the
selected object can be viewed and changed in the Properties
panel in the Sidebar (Ctrl+F5). Some common properties of
the shapes are:
¤ Area, Shadow and Transparency
¤ Glow and Soft Edge
¤ Line, Line Styles, Arrow Styles
¤ Wrap and Spacing
¤ Position and Size

84
5 Digital Documentation (Advanced)
Drawing Object Properties Toolbar
When a shape or image is selected, the Drawing Object Properties Toolbar can be used to
manage the drawing object in following ways:
¤ Text wrapping: These options determine how the text around the inserted shape or object
should be arranged. There are following ways a text is wrapped around an object:
i. None: The text remains as it is above and below the object.
ii. Parallel: The text flows around the object.
iii. Optimal: Optimal Page Wrap prevents text from being placed to the side of the image if
the spacing between the image and the margin is less than 2 cm.
iv. Before: The object is placed to the right side of the text.
v. After: The object is place to the left side of the text.
vi. Through: The object floats over the text and hides the text.

¤ Align Object: Object can be aligned Left, Right, Center (horizontal),


Center (vertical), Top and Bottom.
¤ Arrange Object: Object can be arranged
above all other objects, behind all the other
objects below it, behind the object just below
it or over the object just above it.
¤ Object can also be placed above the text and behind the text.
¤ Arrow style: These can be selected for arrow heads and tails.
Changing line colour, line style, fill colour and fill style of a shape
¤ Line style: This can be selected for lines and outline of a shape.
¤ Area style/Filling: This is a list of various styles in which a colour or pattern can be filled in
the shape.
¤ Line width and line colour can be set using Line width and Line Color buttons.
¤ Colour can be filled in the object using Fill Color colour box.

Line Width and Line Color

Fill Color

Area
Style/Filling Note:
When we use the term object, we refer to an
image or shape inserted in the document.
Arrow Style Line Style

85
Digital Documentation (Advanced) 5
¤ Resizing object: To resize an object, select it. 8 handles will appear
around it. Grab any handle with the left mouse click and drag to resize
the object.

¤ Rotating object: The Rotate button on the Drawing Object Toolbar helps in rotarting
and skewing the object. Rotation means turning around the object on its central axis by
holding it with corner handles. Skewing means changing the shape of the object by stretching
it across horizontally or vertically by holding the handles on its margins.

Rotation Horizontal Skew

¤ Grouping objects: Multiple shapes and images can be grouped together and ungrouped. To
do so, first select the first object, then pressing and holding down Shift key, select other
objects. This way all the desired objects will be selected. Then click on Group button on
the Drawing Object Properties toolbar.

To ungroup the objects, select the grouped objects and click on Ungroup button on the
Drawing Object Properties toolbar.

Note:
To edit any object which is a part of
an object group, use Enter group
button and to exit, use Exit
Group button on the Drawing
Object Properties tooolbar.

Some more operations specific to images using Image Toolbar


Operations such as rotating and resizing the shapes are applied on the images also in the same
manner. Following are some more operations and setting that can be applied on images using
View menu > Toolbars > Image:

86
5 Digital Documentation (Advanced)
¤ Cropping Image: Cropping is the way to remove unwanted part of the image starting from its
outer edges. To crop the image, select it and click Crop button on the Image toolbar. 8
handles will appear around it. Grab any handle with the left mouse click and drag to inwards
to crop the image.

¤ Image Color Settings: Image colour settings such as brightness, contrast, colour channels can
be changed using Color button in the Image toolbar. In the Color pop-up, apply the
changes as required.

¤ Image Transparency: Image transparency can be set


by changing transparency value in the Transparency
counter in the Image toolbar.

¤ Image Mode: Image can be displayed in modes such as Grayscale, Black


and White and Watermark. Click on Image Mode drop-down on the
Drawing toolbar and select the desired mode.

87
Digital Documentation (Advanced) 5
¤ Image Filters: Filters are certain special effects that can be applied on an
image to give it a completely different look. Filter button on the Drawing
toolbar provides various filters

Image filters are summarised here:


Invert: Inverts the image color values, or the brightness values of a grayscale image.
Smooth: Reduces pixel contrast.
Sharpen: Increases pixel contrast.
Remove noise: Compares and adjusts extreme intensities of pixels.
Solarisation: Adjusts pixel brightness up to only a set threshold.
Aging: Gives image an old, vintage look.
Posterize: Reduces number of colours in the image.
Pop Art: Makes the image look like images in advertisements.
Charcoal Sketch: Gives look of a charcoal drawn image.
Relief: Detects edges in the image and makes it look like exposed to extreme light.
Mosaic: Makes image look like composed of small rectangular tiles.

EXERCISE
1. You own a multimedia design company. Write a small introduction of the
company then do the following:
a) Insert a picture depicting about your company.
b) Rotate and Resize the picture.
c) Click on the picture and try Cropping some of its part.
d) Save the file.
2. Create visiting cards of various post holders in your IT Club or school activity
club.
3. Open the document saved in the previous question and do the following:
a) Insert a picture of your school's building in the document.
b) Set its Layout Option to Parallel.
c) Set/move the picture to the right side of the document.
d) Save the file.
4. Make a poster to spread awareness about personal hygiene or environmental care.
5. Collect some images of any occasion or your friends and make a collage.
Finally, group all the images.
6. Create an invitation letter for teachers to a Stage Play students going to
present on teachers' day. Use various shapes in decorating the card.

88
5 Digital Documentation (Advanced)
Session-3 Document Template
A template is a pre-designed and pre-formatted document which can be used to fill in the content as
you need. Template saves time and effort that otherwise goes in designing and formatting the
document manually.
A template saves you time and effort as it contains all the formatting and design already applied in
it. You just need to enter your content and arrange it as you require.
Writer provides a rich library of templates like resume, CV, Modrn, MediaWiki, Simple, etc. Some of
the templates are installed when you install LibreOffice and many more templates can be accessed
online.
Open LibreOffice and select Writer Templates in the Templates drop-down in the left
Options Pane.
A variety of document templates will be listed which can picked up depending on the
requirement.

Creating a Template
You can create your own pre-formatted templates which you can pick and use later to save time
and hard work.
First, create a well formatted document
which you need frequently. For example,
a colourful newsletter.
Then, click on File tab> Save As option.
In the dialog box, enter the name by
which you wish to save the template.

89
Digital Documentation (Advanced) 5
Click on Save as type: drop
down list and select ODF Text
Document template. Finally,
click on Save button.
The Writer template document
will be saved as .ott file.
You can save your template
anywhere or in application
template folder. You can find
the path to the templates by
going to Tools menu >
Options option > LibreOffice
> Paths category.

Setting Default Template


To replace default settings for the document, you need to replace the default template with a new
one. You can set any template displayed in the Templates dialog box to be the default for that
document type:
1. Go to File menu > Templates > Manage Templates option.
2. In the Templates dialog
box, open the category
containing the template
that you want to set as the
default, then select the
template.
3. Right-click on the
selected template and
click the Set as default
option.
Next time the document will
be created from this template.
Shortcut
To Manage Template :
Ctrl + Shift + N

Note:
To reset back to the default template, click on the Wheel icon at
the left bottom of the Templates dialog box and select Reset
Default Template > Text Document.

90
5 Digital Documentation (Advanced)
Importing a Template
One way is to select a template while creating a new document which we have learnt earlier. The
other way is to import a template of our choice. This can be done by clicking on
Import button at the bottom of the Templates dialog box.
User created template must be saved in one of the folders listed in Tools menu> Options option
> LibreOffice > Paths.
1. In the Templates dialog, click the Import button. The Select Category dialog appears.
2. Select the category where you want to import the template and click OK.
3. In Open dialog box, locate and select the template that you want to import and click Open.
The template appears in the selected category.
Editing template
In the Templates dialog, right-click on the desired template and select Edit. The template opens in
Writer. Edit the template as you need and save it as .ott file.
Updating a document from a changed template
If you have changed a template and if you open a document that was based on that template
earlier then a confirmation message is displayed. You can select Update Styles to apply the
changed styles in the template to the document or Keep Old Styles if you do not want to apply
the changed styles in
the template to the
document.
As shown here, earlier
Sample_Template1.ott
file had blue text and
Sample_Doc1.odt was
based on it. Then
Sample_Template1.ott
was changed to Red
and Green text. Later
when Sample_Doc1.odt
was opened, the
confirmation to update
template styles is
displayed.
Instaliing Online Templates using Extensions
You can install online templates by clicking Extensions button at the bottom of Templates dialog
box. In the popup, click on the link website bedise the desired template. It will take you to the
download page of that template. Download and save the template to use it.

91
Digital Documentation (Advanced) 5
Changing Template Using Template-Changer Extension
Go to
https://extensions.libreoffice.org/en/extensions/show/tem
plate-changer and download the Template Changer
extension. It is a .oxt file. Open it by File > Open in Writer.
The Extension Manager dialog box will appear to install it.
After installation close the dialog box and restart LibreOffice
application.
After that, you can open the document and use File >
Templates > Change template (current document).
Remember that changes made to the templates using Template
Changer are permanent and cannot be undone once saved.

Using Template Changer, you can:


Ÿ Set a template to replace the earlier template on which your document is based.
Ÿ Deactivate link to template so that template remains linked with the document but any changes in it
will not affect the document.
Ÿ Reactivate link to template to revert deactivation.
Ÿ Cut link to template completely so that your document is not based on any template.

92
5 Digital Documentation (Advanced)
Manually Changing a Template
1. In the Templates dialog, double-click the template you want to use.
2. Delete any unwanted content from it and save the document but keep it opened.
3. Open the document you want to change, select everything (Ctrl+A or Edit > Select All) in
this document and copy (Edit > Copy or Ctrl+C) the contents.
4. Go to the new document created in step 2. Paste (Edit > Paste or Ctrl+V) the contents into
this new document.
5. Save the new document (File > Save).
Now you can discard the old document.
Deleting a Template
Right click on the desired template in Templates dialog box and select Delete.

LAB EXERCISE
1. Using Writer create the document containing following text:
<<Your Name Here>>
INVITE YOU TO
<<name of the event>>
On
<<date>>
At
<<time>>
Venue: <<venue address>>
Looking forward to welcome you at the event.
Thank you.
Now, save the document as template by the name my_invite_template.ott.
2. Using Templates dialog box, import your template in My Templates category.
3. Open this template, create an invitation letter and save it as .odt document.
4. Open your template my_invite_template.ott to edit and make changes in the text
formatting and save it as a different name such as my_invite_template2.ott. Close
LibreOffice then open it again.
5. Now, open your document and confirm if you want to apply new styles or keep the old.
6. Try deactivating and activating the link between your document and the template using
Template Changer extension.
7. Try permanently unlinking the template from your document. (Now, if you make
changes in the template, document will not ask for applying any new styles.)

93
Digital Documentation (Advanced) 5
Session-4 Creating Table of Contents
A table of contents (ToC) contains the numbered list of topics in a document and the page number
on which they are located. In the soft copy of the document, each entry in the ToC functions as an
internal hyperlink to the topic content. User can use Ctrl+Mouse click to jump to the linked topic.
A ToC can be created automatically in any word processor. However, it is always advisable to
update ToC after major changes in the document.

ToC and Character Styles


An efficient way of creating a ToC is to apply styles on the headings in the documents which are
needed to include in the ToC. For example, the document has a chapter title, topic headings and
sub-headings then Chapter title can be given the style Heading 1, topic headings can be applied
with the style Heading 2 and sub-headings can be of style Heading 3. Then, it is easier to create a
ToC automatically.

Creating a ToC
The table of content depends on the headings in the document. It is necessary that document
contains adequately defined standard headings such as Heading 1, Heading 2, Heading 3, etc.
To create a quick ToC in the document, first place the cursor where you need the ToC to appear.
Then do the following:
l Go to Insert menu > Table of Contents and Index > Table of Contents, Index or
Bibliography option.
l In the dialog box of similar name,
in Title tab, specify the title of the
table, specify the number of levels
of headings as required.
l Protect against manual
changes checkbox keeps the
table from being modifed like
common text.
l Click OK.
The ToC will be inserted.

94
5 Digital Documentation (Advanced)
Customising a ToC
To customise a ToC, right click on it and select Edit
Index option.
Ÿ In the dialog box, go to Styles tab.
Ÿ Select level in Levels list and a style in
Paragraph Styles list.
Ÿ To change the style, click on Edit button below
the Paragraph Styles list.
Ÿ In Paragraph Styles dialog box, change style such as font colour and click OK.
Ÿ Click on Assign button.
Ÿ Click OK.

Character Style using Entries Tab


This tab helps formatting each part of the ToC. Select the desired level in the Level column as per
the structure of your ToC. The Structure section contains the elements of the table for the selected
level. The active buttons below the Structure section are those elements which can be added to
the ToC.
The LS icon represents the start of a hyperlink. The E# icon represents the “chapter number”. The
E icon represents the chapter (or sub-chapter) text. The T icon represents a tab stop. The # icon
represents the page number. The LE icon represents the end of a hyperlink. Each white field on
the Structure line represents a blank space where you can add custom text or another element.
Applying character styles: In the Structure section, click the button representing the element
needed to be modified. Then, select the desired character style in the Character Style drop-
down You can click on Edit button to change the selected character style.

95
Digital Documentation (Advanced) 5
Updating a ToC
Table of Content is not updated automatically by Writer if any changes are done in the document.
The ToC needs to be updated manually. To do so, right-click anywhere in the TOC and select
Update Index.
Deleting a ToC
To delete the TOC from a document, right-click anywhere in the TOC and choose Delete Index
Remember that Writer will not confirm the deletion.

EXERCISE
Create a multipage document describing about your school. Keep main title as
My School and some sub headings such as About My School, Academics, Sports,
Staff etc. Apply some styles to all the headings and create a well formatted table
of contents for the document.

Session-5 Mail Merge and Labels


Mail merge is a very powerful and useful feature of a word processor. It allows to generate mulitple
mail document with same content and variable values such as names, address, cities, department,
class, section, country, etc. For instance, if you need to create 50 copies of a letter for each of the
50 recipients then using the mail merge feature, you can create as many copies as the number of
recipients. In each copy the letter content would be same but the name and address of the
recipient would be different.
Mail Merge feature involves 3 documents:

96
5 Digital Documentation (Advanced)
Main document: It is the document that contains the content which is common across all the
copies. This is the document whose multiple copies are generated.
Data source: This document contains the variable data such as names of the recipients, address,
city, state, pincode, country, designation, department, etc. These values are arranged as rows or
records in a tabular format and the first row contains the headings of each column. During the
mail merge process, these values are merged with the main document and as many copies as the
number of records merged, are created.
Merged document: This is generated as the output of the mail merge. The values in the Data
source are merged with the Main document to create merged document. User just has to specify
where the merged values should appear in the merged document. The location of merged values
are specified by the help of merged fields. Merged fields are the placeholders which indicate
where the merged values must appear.

Data
source

Main document

Final merged documents Merged fields inserted in the main document

Creating a Data Source


A data source contains the values to be used for merging with the main document. It is a tabular
document that contains records (rows) of data values. First row is considered to be the header row
that contains column headings called fields. Data source can be simple document or a spreadsheet
or the values may come from a database through a data connection. Here, we shall learn how to
use a document-based data source. For example, to create a notice for the apartment owners of a
building to pay their maintenance dues. The data source contains following details. There are
seven fields namely Salutation, First Name, Surname, Apartment Number, Service Start Date,
Amount Pending and Pending Since.

97
Digital Documentation (Advanced) 5
The Main Document
Main document is the main letter that can be drafted and saved beforehand or it can be created
new during the process of mail merge. Main document of notice reminder looks like this.

Notice, the missing values after the words To, since, Rs. and the second since. Here, the values will
be inserted (merged) from the data source.

Setting up Data Source


After creating and saving the data source, we need
to access the data source in the main document.
Open the main document and follow the steps given
here:
1. Go to File menu > Wizards submenu >
Address Data Source option.
2. In the Address Book Data Source Wizard
dialog box, select Other external data source
radio button. Click Next.

98
5 Digital Documentation (Advanced)
3. Click on Settings button.

4. Select Database type as Writer Document.


Click Next.

5. Click Browse and select the data


source document. Click Next.
6. Go to the section Data Source
Title and give a relevant name to
the data source. Click Finish.
Notice that the name given here is
ApartmentOwners.
7. Go to View menu > Toolbars >
Mail Merge.
8. Go to View menu > Data Sources.

Shortcut
View Data Sources: Ctrl+Shift+F4

9. In the Explorer, open the table under the name of your data source. The records of the data
source will be displayed. Click on the fields in the data source and drag-drop them in the
main document where ever required as shown here.

99
Digital Documentation (Advanced) 5
10. In the Mail Merge toolbar, click on
Next Mail Merge Entry button to
see the first merged letter.

¤ Click on Edit Individual Document button to display the merged document.

¤ Click Save Merged Document button to save it.

¤ Click Print Merged Document button to print the merged document.

LAB EXERCISE
Your school is going to organize annual sports meet. Use mail merge feature as
specified here:
1. Create an invitation letter to invite all the schools of your zone/district to participate in
this event.
2. Create a list of 10 schools that you want to invite.
The fields should be: PRINCIPAL_NAME
SCHOOL_NAME
SCHOOL_ADDRESS
3. Perform mail merge to generate individual letters for each school.

Address Labels
Labels contain the addresses
which can be printed for
mailing purpose. All the labels
may contain same address on
all of them or different address.
Once you have the data source
for labels is ready and
registered with LibreOffice like
you did earlier, you can begin
creating a document containing labels out of it. We are going to use a Writer document
addresses.odt as data source that contains all the data for labels as shown here.

100
5 Digital Documentation (Advanced)
Creating Label Document
1. Go to File menu > New > Labels options. In the
Labels dialog box, do all the settings for the labels. We
shall create multiple labels with different addresses.
2. In Labels tab, selected your registered data source in
Database drop-down and Table 1 as the data table.

3. One-by-one add the fields from


Database field drop-down using
Insert button.
4. Arrange the fields in the Label
Text box as you need.

5. Go to Format tab and define the page


dimensions that will contain the labels,
number of labels in terms of rows and
columns, dimensions of the labels and
distance between them.

6. Go to Options tab and check the


Synchronize content checkbox so that
if you format one label then other labels
are formatted automatically.
7. Click on New Document button. A new
document with label placeholders will
appear. Each placeholder shows the fields
in the label.

101
Digital Documentation (Advanced) 5
At this time if you change the format of any
label and click on Synchronize Labels button
in the Synchronize popup, the format will be
applied to all other labels.
8. Click on Next Mail Merge Entry button
to preview the labels.
9. Click on Edit Individual Document
button. The document with labels will be
displayed.

Note:
Try making the name of one
recipient bold and colourful then
click on Synchronize Labels
button in the Synchronize
popup. Notice that same format is
applied to all the other labels.

LAB EXERCISE
1. Create labels of dimension 4 X 5 inches to paste on the notebooks. Label should
contain your school name and space to write Name, Class, Section and Subject.
2. Create multiple visiting cards on single page for your friend containing a fictitious
company name, Address and Contact Number.

102
5 Digital Documentation (Advanced)
A. Select the correct option to answer the following questions – 1 mark each.
1. Ravi has drafted his office annual report. He wants to quickly format the contents and give
them a professional, formal look. Which of the following should help him?
a. Templates b. Styles
c. Themes d. None of these
2. Which of the following features is best suited to make a formatted document reusable
multiple time?
a. Save it as Template b. Apply styles
c. Apply themes d. Mail merge
3. Graphics styles can be applied using which type of styles?
a. List b. Frame
c. Paragraph d. Page
4. Which of the following styles affect the formatting of a block of text in a paragraph?
a. Character b. Frame
c. Paragraph d. Page
5. Renu wants to apply formatting of a text piece to multiple other text pieces. Which of the
following must help her in doing so?
a. New style from selection b. Fill format mode
c. Update selected style d. None of these
6. Rajat is a computer programmer and he needs to create graphical representations of his
program logic. Which shape category is most useful for him?
a. Basic shapes b. Block arrows
c. Callouts d. Flowchart
7. Anu has an old family picture. She wants it to insert in her document. Which is the best way
to do this?
a. Insert > Picture from file
b. Click picture with cell phone camera, copy it on computer then insert it
c. Paste special
d. Insert > picture scan
8. An embedded image is a linked image whose link option is removed.
a. True b. False
9. A consistent look to the document formatting can be given by the help of which of the
following?
a. Styles b. Text alignment
c. Section breaks d. Shapes

103
Digital Documentation (Advanced) 5
10. The flow of text around a shape or image is termed as which of the following?
a. Text align b. Text arrangement
c. Text wrap d. Text box
11. Which of the following actions changes the dimensions of an image inserted in a
document?
a. Skew b. Rotate
c. Crop d. Symbol shapes
12. Grayscale is an example of which of the following?
a. Image filter b. Image mode
c. Image transparency d. None of these
13. One point place to work with templates is which of the following?
a. Manage Templates b. Edit Template
c. Template library d. Install template
14. Which of the following components help in installing online templates?
a. Extensions b. Online Templates
c. Update Templates d. All of these
15. Cut link to a template means which of the following?
a. Changes in template will not be applied to the document
b. Changes in the template will not be applied to a section of the document
c. Document does not remain to be based on any template.
d. Deactivated link to the template cannot be undone.
16. Table of Content is based on which of the following?
a. Document templates b. Heading styles
c. Page styles d. Document outline
17. Which of the following contains the merge field names in the top row?
a. Main document b. Data source
c. Merged document d. None of these
18. The variable values inserted in the main document from the data source are indicated by
______________.
a. Merged fields b. Merged document
c. Data d. Main document
19. Rajat has created some labels. He changed the text colour in one of the labels. How can he
cascade same changes to all the other labels?
a. Styles b. Label templates
c. Synchronise content d. Apply to all
20. Contents of the labels are inserted from which of the following?
a. Label database b. Label templates
c. Data source d. Typed manually

104
5 Digital Documentation (Advanced)
B. Answer the following questions – 2 marks each.
1. Briefly discuss the benefits of document styles.
2. How are styles different from templates?
3. List any 4 types of styles.
4. Write the steps to apply a paragraph style to a part of text.
5. How will you apply formatting of some text to other multiple pieces of text quickly and
easily?
6. Anita designs school magazine. She has formatted some nice text samples. She wants them
to be available as new styles in her document. Help her with the steps.
7. How will you load a style from a template?
8. How do shapes and images help in enhancing the content?
9. List any four distinct categories of shapes in a word processor.
10. List any 4 common ways of inserting images in a document (do not write the steps).
11. List any four common operations which can be done on an image.
12. What is test wrapping?
13. Which common properties of a line can you set?
14. Name various Area style filling options for a shape.
15. How is skew shape different from rotate shape?
16. How will you group and ungroup graphical objects?
17. List the names of four image modes.
18. Wat is an image filter? List the names and functions of any four image filters.
19. What do you mean by a template? What is a default template?
20. What is a ToC? What is its significance?
21. What does Synchronise content option do while working with labels?
22. What do you mean by mail merge? What is the role of a data source in mail merge?
23. What is the advantage of mail merge?
C. Answer the following questions – 3 marks each.
1. Discuss briefly any two document style types.
2. How will you do the following?
a. Create a new style.
b. Load style from a template.
c. Scan and insert an image in the document.
d. Apply a bitmap fill in a shape.
e. Make an image 50% transparent.
f. Turn an image into a watermark.
g. Sharpen the pixels of an image.
h. Create a new template and then set as default template.

105
Digital Documentation (Advanced) 5
i. Install a template from internet.
j. Change a template manually.
k. Create a table of content and apply a style on it.
3. Discuss the different ways in which text can be wrapped around an image or a shape.
4. Sumit has created some of his own templates saved on his computer. How can he bring
them in his document?
5. What does a Template Changer do?
6. Explain the terms – Main document, data sources, merged fields, merged document.
D. Answer the following questions – 5 marks each.
1. What is a style? How is it different from a template? Discuss any 3 types of styles.
2. How will you create a new style and update an existing style with new changes.
3. What are the various ways if inserting image in a document?
4. Discuss various text wrapping options around an image.
5. What do you mean by image modes? How is it different from image filter? Discuss with
example.
6. How will you apply basic formatting on a shape (line and fill)?
7. What do you mean by rotating, cropping and resizing an image?
8. What is the significance of a template? How will you create a new template?
9. Describe the process of updating a document with a changed template.
10. How will you set, deactivate, reactivate and cut link from a template with the document?
11. How will you create a table of content with 3 levels of headings with impact font, light blue
fill area colour?
12. Taking a small example, explain the standard process of mail merge briefly.
13. You are given the task to create label sized ID cards for all the students in the school with
the details – Name, Class, Section, House and Date of Birth. The data is stored in a
document table. Briefly discuss the process of creating these labels.

106
5 Digital Documentation (Advanced)
Unit
Electronic Spreadsheet
2 (Advanced)

Session-1 Calculating Subtotals


Subtotals feature is a quick way to calculate automatic subtotals, averages and other numeric summary
on a group of data. Subtotals works better on the sorted data. For subtotals, you need to have at least
one column in the data-set as numeric to calculate the subtotal on. To calculate subtotals, first select the
data-set and then click on Subtotals option in Data menu.

In the Subtotals dialog box, specify the following:


The field at whose change you need the subtotal in Group by drop-down.
Select the fields for which calculation needs to be done in Calculate subtotals for list.
The function you need to apply (by default, it is SUM) in Use function list.
Then, click on OK button.
The example shown here is calculating subtotals of QUANTITY at each change of TYPE of the
garment.
You can add more groups for sub-totals by going other group tabs in the dialog box.

107
Electronic Spreadsheet (Advanced) 5
LAB EXERCISE
Mr. Rajan has a sheet containing the names of the students, their houses (Red, Green,
Blue, Orange) at school and their score in sports. He wants to calculate number of
students for each house and average score of each house. Help Mr. Rajan.

Data Consolidation
This feature allows you to bring together data from different spreadsheets and workbooks into a
consolidated form where sum or average or other calculations are done on the data values. Let us
see a simple example. Sheets named East Sale and West Sale need to be consolidated as their
average in sheet Average Sale.

Ÿ Go to the blank sheet and desired cell where you


need to display the consolidated data.
Ÿ Data menu > Consolidate option.
Ÿ In the Consolidate dialog box, select the desired
function to perform on the values. Click the
Shrink/Expand button of Source Data Ranges
and select the data range in first sheet and click
on Add button. The select data range will be
added in the list. Repeat this step for all other
sheets to be consolidated. Finally, click on OK button.

LAB EXERCISE
Mrs. Sengupta has English marks of some students for exams Term1, Term2 and PreBoard
in separate sheets by the same names. Help her to consolidate the average marks of the
three exams into a fourth sheet in the same workbook.

What-if Analysis
What-if analysis is a way to do forecast on the basis of assumed but realistic figures. It is the process
that allows to see “what” changes would happen “if ” the data values are changed in a particular
manner. For example. “What” should be the commission “if ” the sale is increased? There are
various ways to perform what-if analysis in electronic spreadsheets such as applying scenarios,
goal-seek etc.
What-if Analysis with Scenario
Scenario is a way to perform what-if analysis. A scenario is defined by a set of values which can be
applied on an existing data-set. The original data-set is substituted by the scenario data-set and user

108
5 Electronic Spreadsheet (Advanced)
can analyse the changes. Various scenarios
can be created and applied on the original
data-set to analysis different situations
predicted in the scenario. This way, user can
analyse different business scenarios by using
Scenario feature.
Creating Scenarios
Let us understand it with the example shown
here. In this example, we shall apply different
scenarios of prices to see the change in the
commissions. The new set of prices are
labelled as NEW PRICE 1 and NEW PRICE 2.
These will be applied to the origirnal prices in
column C.
First, select all the original price values in
range C2:C10.
Go to Tools menu > Scenarios option. In the Create
Scenarios dialog box, mention the name of the scenario
(ORIGINAL PRICE) and click OK.
Repeat this step once more but this time save the scenario
with different name (NEW PRICE 1).
Now, copy-paste the values of NEW PRICE 1 i.e.
A13:A21 on the original range i.e. C2:C10. Now the
second scenario has different values.
Again, select all the values in range C2:C10 and create
yet another scenario (NEW PRICE 2)
Now, copy-paste the values of NEW PRICE 2 i.e.
B13:B21 on the range C2:C10. Now the third scenario
has different values.

Applying Scenarios
As you select different scenarios form the drop-down, you
can observe and analyse the changing values of
Commission.

109
Electronic Spreadsheet (Advanced) 5
LAB EXERCISE
Mr. Ben is investing Rs. 12000 per month with a guaranteed return of 13% on the annual
amount (i.e. 12 * 12000). Create a scenario to help Mr. Ben see the amount he should get
in return after 15 years if he invests Rs. 15000 per month. Also, prepare a scenario to
check what will be the return after 10 years on investing Rs. 12000 per month but at a rate
of 15%. Assume the layout of the data.

What-if Analysis with Goal Seek


When we need to assess the impact on any data value due to any change in another data value,
we use Goal Seek feature. In simple terms, goal seek allows us to determine the input for a
desired output. For example, how many more students should have scored 70% to make class
average 75%? Or, how many more five stars were needed for a web site to have its rating above 8?
In goal seek, you need to specify 3 items – which cell you want changed, by which value (expected
output) and which cell has the input value. To apply goal seek, go to Tools menu > Goal Seek
option. Let us understand this with a small example. In the example shown here, the merchant
wants to know how many sofas should be sold to achieve total commission of 20 lakh?
Commision is calculated as 12% of Price * Sale Qty for both the items.
Open Goal Seek tool and then do the following:
¤ In Formula cell, select the cell D4 since it contains the formula to calculate total commission.
¤ In Target value, mention 2000000 since that is the expected total commission.
¤ In Variable cell, select the cell C2 that has sale quantity to be estimated.
On clicking OK, Goal Seek tool will confirm whether you want to apply the new changes on the
data. You can click Yes or No as per your choice.

So, 98 more sofas (total 298) need to be sold to achieve the goal
of Rs. 2000000 commission.

110
5 Electronic Spreadsheet (Advanced)
LAB EXERCISE
Ravi wants to apply the “cause and effect” on his studies. His exams are approaching and
he has to prepare for 7 subjects. Each subject has 12 chapters to be prepared. He takes 4
hours to prepare one chapter. He studies 6 hours daily. He needs to know, how many
hours does he need to study daily to complete the preparation of all the 7 subjects.

What-if Analysis with Solver


Solver is a more advanced tool than Goal Seek. It is used to find out best optimised results from
the data by considering certain constraints. For example, maximizing the profits, minimising the
expenses, estimating optimum budget etc. Solver analyses the values and constraints to provide
the best possible solution.
In order to use the Solver to solve a mathematical programming problem, you must formulate the
problem as follows:
• Decision variables – one or more non-negative values.
• Constraints – conditions to be satisfied depending on the business requirement.
• Objective function – the maximised, minimised or a fixed value to achieve after calculation.

Let us understand Solver with the following scenario:


A publication company publishes books in 4 subjects namely Windows 10, Windows 7, LibreOffice and
MS Office. The billing of books is done on credit (no payment at the time of selling the books) and
details of billing amount are recorded.
T h e n , a n e s t i m a t e o f ex p e c t e d
amount to be collected is taken as 60%
of the billing amount. The publisher
wants to know - How much billing of
each book is needed to collect
expected amount of Rs. 40000000
but for each subject, the billing amount should be at least Rs. 10000000?
Here,
· Target cell is D8 which needs to have calculated value 40000000.
· Optimisation result is the fixed value of 40000000.
· The changing cells are C4:C7.
· Limiting conditions for each of the billing cells is 10000000.
Let us setup solver with the above values and criteria by going to Tools menu > Solver option.
Ÿ Select cell D8 for Target cell field.
Ÿ Enter 40000000 in Value of option of the field Optimize result to.
Ÿ Select cells C4:C7 for By changing cells field.

111
Electronic Spreadsheet (Advanced) 5
Ÿ In Limiting Conditions section, one-by-
one select cells C4, C5, C6 and C7 and for
each of them select the Operator as >=
and specify Values as 10000000.
Finally, click on Solve button.
Solver Status popup will show the
calculation being done. You can click on
Continue button to recalculate new figures.
Once satisfied, click on OK.
You can save (Keep Result button) or
discard (Restore Previous button) the
result in Solving Result popup.

Note:
To calculate values as integers you can click on Options
button on Solver dialog box and select Solver engine as
LibreOffice Linear Solver and select Assume variable as
integer option.

Solver engines
Solver engines are based on following algorithms:
DEPS – Evolutionary algorithm best suited for calculating closest approximate result.
SCO – Evolutionary algorithm based on social cognitive optimisation techniques.
In above two, a group of solutions is generated. The best solution is selected by evaluating it against the
input values (changing cells) and output values (objective cell). This is used for complex calculations.
LibreOffice Linear Solver - Good for optimising linear equations.
LibreOffice Swarm Non-Linear Solver - Good for optimising non-linear equations.

112
5 Electronic Spreadsheet (Advanced)
LAB EXERCISE
Consider the sales sheet given here.
The objective is to achieve the
profit of 100000. You need to
manipulate 3 variables: number of
burgers needed to sell (C2), the
price per burger (C3), the cost of
one burger (C6).
The constraints to consider are:
1. The number of burgers sold (C2) should be a whole number (integer).
2. The price of one burger (C3) should not exceed 65.

Session-2 Referencing and Linking Sheets


You have learned how to refer to the cell addresses while applying various formulae and functions
in a worksheet. Calc allows referring to the cells in another worksheet or workbook from your
active worksheet. Within the active worksheet, cells are referred to simply by their cell addresses
but if you need to refer to a cell which is in another worksheet of the same workbook then the cell
address needs to be preceded by
worksheet name with an ! sign in
between the worksheet name and
the cell address.
For example, =mysheet2!B5 *
mysheet3!B5
Here, cell addresses B5 belong to
the worksheets named mysheet2
and mysheet3.
Remember that this approach of
calculation across the sheets works
where consistent formats are used
by the team members and every
sheet has a fixed format.
Let us understand it with the
following example. Consider the
four sheets in a workbook here:

Notice that cell B3 contains the sales figures of North region in all the sheets names JAN, FEB
and MAR. To calculate the total of these 3 values, you need to mention the name of the sheet,
followed by ! sign and then the cell address B3 in the formula as shown in the sheet QRT1.
=JAN!B3+FEB!B3+MAR!B3

113
Electronic Spreadsheet (Advanced) 5
Referring to Sheets as a Range
If the worksheets are in sequence then they can be referred to as a range of sheets which includes
the name of the first sheet in the range and the name of the last sheet in the range, both separated
by a :
Consider the sheets JAN, FEB and MAR in the previous example. The formula to calculate total
sale of Quarter1 can also be calculated by the formula as shown here: =SUM(JAN:MAR!B3)

Note:
If sequence of first or last sheet is changed then the formula will consider only the sheets in the new range.
For instance, if there are 10 sheets named from sheet1 till sheet10 and formula is:
=SUM(sheet1:sheet10!B3) and if sheet10 is moved before sheet5 then the sequence of sheets
would be sheet1, sheet2, sheet4, sheet10, sheet5, sheet6, sheet7, sheet8, sheet9. In this case,
SUM function will refer to only the sheets sheet1, sheet2, sheet4 and sheet10.

Creating references to other worksheets with mouse


We can refer to the cells in the other worksheets. To do so, first go
to the cell in which you need to apply the reference of a cell in
another sheet and type = sign (See the example sheet named
TOTAL). Then, click on the name of the desired sheet. In that sheet,
click on the desired cell and press Enter key. Apply the same steps
for other cells.
Finally, drag with the fill
handle to apply the same
references to other cells.
To refer to the cells in a sheet
in another workbook, follow
the same steps. You just need
to keep the other workbook
opened first.

Referring to Sheets in Separate Workbooks


The processes of referring to the cells of other sheets in separate
workbooks is same as explained earlier except that you need to open
the desire workbook, go the desired sheet and select the cell you need
to refer to. The path to the workbook will be included in the cell
reference. One example is shown here as in a worksheet following
reference is created:

Here, cell range B2:b12 of Sheet1 in workbook Ex-session 3.ods on


the local path H:/ is referred to in SUM(). Here, file: is a protocol that
refers to a local storage such as disk drive H.

114
5 Electronic Spreadsheet (Advanced)
LAB EXERCISE
1. There are 5 sheets named Class1, Class2, Class3 and Class4. Each sheet contains
average marks of English in cell A1, average marks of Hindi in cell B1 and average
marks of Math in cell C1. Calculate overall average marks in a sheet Class5 of all three
subjects by referring to above cell addresses using + arithmetic operator.
2. Calculate the above using SUM().
3. Create a new worksheet Sheet1 with the names of some countries and their
populations in columns A and B. In column C type the percentage rate at which their
population is increasing (e.g. 5, 3, 10 etc).
In Sheet 2, in column A, display the populations of those countries after 3 years. The
formula for calculating this is: ((Population * Percentage Increase) / 100) * 3.

Absolute and relative hyperlinks


Hyperlinks connect one document with another. A piece of text or image works as hyperlink,
clicking on which fetches the linked document. Imagine that a file summary.ods is on the following
path: D:\myprojects\project20\reports\summaries\summary.ods
summary.ods has a text: Click for details which is hyperlinked to another file details.ods on path:
D:\myprojects\project20\reports\details\details.ods
This is absolute hyperlinking wherein entire path to the linked document is mentioned. If you send
reports folder to someone who copies it on his computer in drive E: so, the path to these files on
his computer will be - for summary.ods: E:\reports and for details.ods: E:\reports\details
Can you see the problem? When he will click on the hyperlink, the application will look for
D:\myprojects\project20\reports\details\details.ods, instead of E:\reports\details. To prevent
such situations when you need to distribute linked documents to others, relative hyperlinking is
useful. Now, let us understand relative hyperlinking.

Notice the common path to both the files: D:\myprojects\project20\reports. This is called Base
address. So, if the source file (that contains the hyperlink) and the linked file are sharing a
common path, then hyperlink can be created by omitting the base (common) path. This is called
relative hyperlinking. Therefore, in above example, relative hyperlink address in summary.ods will
be details\details.ods. When user clicks on a relative hyperlink, application looks for the path
from the current folder onwards and not from the very beginning (root) of the path. In this case,
folder details is always going to be under folder reports so, no matter where you copy folder
reports on any computer the relative path is not going to change.

115
Electronic Spreadsheet (Advanced) 5
Setting up and inserting hyperlinks
¤ G o t o t h e To o l s m e n u >
Options option. In the Options
dialog box, go to Load/Save >
General and check Save URLs
relative to file system and
Save URLs relative to internet
check boxes. Click OK.
¤ To insert a hyperlink into the
spreadsheet do any of these:
¤ Go to the desired cell or select
the desired text. Then, Insert
menu > Hyperlink option,
Or
¤ Click the Insert Hyperlink button on the Standard toolbar.
¤ Drag-drop an item from the Navigator to the desired cell.
¤ Type the target web address or URL or Shortcut
path to the target document at the point To display Insert Hyperlink dialog box : Ctrl + K
where you want to insert the hyperlink.
Hyperlink Dialog Box
Ÿ Internet section: It allows to mention the web (http/https) or file (ftp) url and hyperlink text. For ftp
links, you need to provide username and password to access the ftp service.
Ÿ Document section: It allows to set the path to the target document or part of that document.
You can also insert the mail reference to a mail recipient in Mail section or create a new hyperlinked
document by going to New Document section.
The hyperlink can be inserted as a form button if you select Button option in Form drop-down.
Finally click on Apply or OK button.

Hyperlink to the target sheet named SCENARIO in the


worksheet Unit 2Examples.ods
Button Hyperlink to a URL

116
5 Electronic Spreadsheet (Advanced)
Editing a Hyperlink
To edit a hyperlink, go to the cell that contains the hyperlink and do any of the following:
Ÿ Right click on the hyperlink text and select Edit Hyperlink option in the popup menu.
Ÿ Insert menu > Hyperlink option.
Ÿ Press Ctrl + K.
Removing a Hyperlink
To remove a hyperlink, right click on it and select Remove
Hyperlink option in the popup menu.
Opening a Hyperlink
To open or follow a hyperlink, right click on it and select Open
Hyperlink option in the popup menu. Or, left click with Ctrl
key down.

LAB EXERCISE
Ankita has created a sheet for her team to be filled individually. She created the data
format in Sheet2 of the workbook and mentioned the instructions in Sheet1. In cell A1 of
Sheet1, she needs to create an internal hyperlink to the instructions in Sheet1. Help
Ankita.

Linking to External Data


You can link HTML tables in web pages, csv files and data on other worksheets to another
worksheet.
To insert the linked data from an external worksheet, place the cursor where
you need to insert the linked data and go to
Sheet menu > Link to External Data
option.
l In the External Data dialog box, click
on Browse button to locate the file
which contains the desired data to be
linked. The named ranges in that sheet
will be listed.
l Select the named ranges you want to
link using Ctrl key and click OK.
You can also link data range in a sheet by drag-
dropping it onto the other sheet from Navigator
pane. Do not forget to right click on the range
name and select Drag Mode > Insert as Link
option to insert the range as a link.
To view a list of all external data links in the
spreadsheet, select Edit menu > Links to
External Files option.
In Edit Links dialog box all the links are listed. You
can modify, break or update the links.

117
Electronic Spreadsheet (Advanced) 5
Note:
Use Data menu > Define
Range option to name a
selected data range.

Linking to Registered Data Source


Registered data source means any file which contains the data required to be accessed through
your document or spreadsheet and your application is aware about it. Aware means, your
application knows about its file type (spreadsheet, csv file, database, website etc.) and able to
establish connection with it (compatibility).
l Tools menu > Options. In the Options dialog box, go to LibreOffice Base > Databases.
l Registered databases
will be listed.
l Click on New button
to locate the database
to be registered and
click OK on Create
Database Link
popup.
l Finally click OK in
Options dialog box.

Linking the registered database: Go to View menu > Data Sources option. Registered data
sources will be listed in the Data Source Window. Navigate to the desired database and table in it.
Select the whole table by clicking in top-left blank gray cell. Then, drag-drop the table to the sheet or
click on Data to Text button in the Table Data toolbar.
Update any changes in the data in datasource by selecting the data range in the sheet and using Data
menu > Refresh Range option.

118
5 Electronic Spreadsheet (Advanced)
LAB EXERCISE
A. Open a new worksheet and insert two hyperlinks - one to a document saved on your
computer and the other to a web url.
B. Get a database StudentDB made by your teacher that contains a table named
Student. The table should store First Name, Surname, Date of Birth, Class, Section,
House and Percentage Marks. Import this data in a spreadsheet.

Session-3 Share and Review Sheets


Modern businesses work in a shared environment where information and resources are shared
over a network. Concurrency is the main factor while sharing files on the network. It refers to the
ability of the software application or operating system to allow multiple users access the same file
to facilitate collaborative data sharing. In such scenario, multiple users can view the data of the file
and can make edits in the same file simultaneously. The worksheet can be shared over local
network as well as across the world over internet. For a local network (LAN), the spreadsheet file
can be shared by saving it on a shared drive on any computer with rights given to the concerned
users by network administrator to access it.
Sharing of file has following major advantages:
¤ Faster data entry.
¤ Real-time data updates.
¤ Decreased data redundancy (multiple copies of same data set).
¤ Collaborative work environment.
For any worksheet to be shared, first ensure that it is saved on a shared drive where it can be
accessed by multiple users. If you have not saved the file then Calc will prompt to save it while you
share it. To share the worksheet, go to Tools menu > Share Spreadsheet option. In the Share
Document dialog box, check Share this spreadsheet with other users check box and click
OK button.

119
Electronic Spreadsheet (Advanced) 5
When you change and save a shared
worksheet, there are following possible
scenarios:
1. If no other user has modified the
sheet meanwhile then it will be
saved.
2. If another user has modified the
sheet then Calc will prompt you to
choose other changes (Keep
Other/ Keep All Others) or your
changes (Keep Mine/Keep All
Mine) in Resolve Conflict dialog
box.
3. If you have already opened the
sheet, the other user will be
displayed the message that the file
is locked for changes and he/she
may save the file later.

LAB EXERCISE
If your lab has computers networked with each other, ask your teacher to have a worksheet
copied on a shared drive which you can access then try editing the sheet at the same time
along with some of your classmates.

Review changes in spreadsheet


Spreadsheets, like other documents, can be reviewed either before sharing them with the
intended recipients or after receiving from them to review the changes made by others. We know
how to review sheets by the tools such as Spelling and Grammar and Thesaurus. Now, let us see
how to review sheets when they are shared among multiple users.

120
5 Electronic Spreadsheet (Advanced)
Preparing a sheet before sharing
When multiple users are likely to make changes in a sheet, it is a
good practice to switch on the tracking of changes. This way, the
changes made by anyone in the sheet are visible clearly for
review by others.
To do so, go to Edit menu > Track Changes > Record option.

You can also go to File menu > Properties option >


In Properties dialog box, Security tab > Record
changes > OK.

Shortcut
Switch on Recording Changes: Ctrl + Shift + C

Once the recording of changes in the sheet is on, any changes made in the sheet are recorded.
Changed cells are indicated by red border
with a red dot in top-left corner of the cell.
Cells B4, B6 and C5 are shown as changed
here. As you bring the mouse pointer over
any changed cell, the information appears
in a yellow pop-up.
Reviewing Changes in the Sheet
To review the changes, open the sheet. Go to Edit menu >
Track Changes > Manage option.

In the Manage Changes dialog box, all the


changes are listed. Select them one by one and
click on Accept or Reject button. Or, to accept/
reject all changes at once click on Accept All or
Reject Changes buttons respectively.

121
Electronic Spreadsheet (Advanced) 5
Adding and Reviewing Comments
Instead of making specific changes, users can also suggest changes by adding popup comments to
the cells in the sheet. Calc provides two types of comments - comments on changes and general
comments. Track changes comments are added to the changed cells and appear in the Manage
Changes dialog box while reviewing the sheet but general changes do not.
¤ To add/edit comments on changes in the selected cell, go to Edit menu > Track Changes
> Comment. A comment pop-up appears for the user to enter the comment.

You can click on Next and


Previous buttons to jump to
other changed cells.

¤ To add general Comments, right click on the cell > Insert


Comment option or go to Insert menu > Comment option.

Shortcut
Insert general comments: Ctrl + Alt + C

General comments are indicated by a


red dot in the top-right corner of the cell.

Formatting Comments
General comments can be formatted like
text and graphics. To format the
comment:
¤ Right click on the cell that contains
the comment and select Show Comment option.
¤ Using buttons in Text Formatting toolbar and Drawing Object
Properties toolbar comment text and comment box can be formatted.
¤ After formatting, right click on the cell and select Hide Comment
option.

122
5 Electronic Spreadsheet (Advanced)
Editing and Deleting Comments
General comments can be edited and deleted by right clicking on the cell
that contains the comment and selecting Edit Comment and Delete
Comment options respectively.

LAB EXERCISE
Practice adding certain changes and comments in a spreadsheet using Track Changes.
Then, exchange spreadsheets with your classmate. Practice accepting/rejecting changes in
the sheet.

Merge and Compare Sheets


If there are multiple copies of same worksheet modified by multiple users then all of them need to
be merged into the original sheet. Sometimes users forget to enable tracking of changes and
changes made by them are not recorded. In such a case, you can compare the original document
and changed document.
Merging Sheets
To merge the worksheets, first open the original worksheet. Then, go
to Edit menu > Track Changes > Merge Document option.
In the Merge With dialog box, select the other file whose data needs
to be merged and click on Open button. The sheet will be merged.

In the Merge With dialog box,


select the other file whose data
needs to be merged and click
on Open button.

Manage Changes dialog box will appear. Accept/Reject


changes as you need and click Close. The sheet will be merged.
Comparing Sheets
Go to Edit menu > Track Changes > Compare Document
option > In the Compare to dialog box, select the desired file >
Open button.
Manage Changes dialog box will appear. Accept/Reject changes
as you need and click Close.

123
Electronic Spreadsheet (Advanced) 5
LAB EXERCISE
Create a sheet to store 5 records of your friends names with their marks in 3 subjects. Make a
copy of this sheet. Make some changes in the copy. Also, delete a record so that the copy
has only 4 records. Now, merge the copy to the original sheet. Discuss your observations
with the teacher.
Do not forget to switch on recording of changes in the original file before making its copy.

Session-4 Working with Macros


Macros are a great way to automate routine tasks in an application like spreadsheet. For example,
Mr. Sen heads a team of 200 salesmen in various cities who send him sales data by day end daily.
That is 200 records which Mr. Sen needs to sort on the basis of city, sales target and salesman
name. Since he needs to do it every day, he can have a macro created for the same to execute this
task automatically in a few seconds.
Macros are the named set of recorded steps which can be run anytime later as and when required.
Macro feature allows the user to record the steps he/she does. The steps are saved in the
workbook by a unique name given by the user. User also sets a shortcut key to run the macro later.
Macros usually work well with a standard, fixed layout of data. In real life, people perform a lot of routine
tasks on a fixed layout of data-set. In such scenarios, macros help in saving a lot of time and effort.
Macros can be created by recording the steps as you perform a task or they can be created using
LibreOffice Basic programming language.

Recording a Macro
A macro can be recorded by running the macro recorder and performing the desired task to be
automated. Macro recorder records all the steps. Once done, macro recorder is stopped and
macro is saved.
Enabling Macro Recorder: Go to Tools menu > Options option > In Options dialog box,
LibreOffice > Advanced and select Enable macro recording (may be limited) checkbox.
Then, click OK.

Now, go to Tools menu > Macros > Record Macro option.


The macro will begin recording with a popup containing Stop
Recording button to stop macro recording once you are done.

124
5 Electronic Spreadsheet (Advanced)
Example: Creating a New Macro to Sort Data
First, open a sheet with some data to sort. Begin macro recording by following the steps explained
before. Select the data and go to Data menu > Sort option. Select the desired field on sort in the
Data Sort dialog box and click OK. After sorting, click on Stop Recording button. Now follow
the steps below to save the macro:
¤ When you stop the macro recording, Basic Macros dialog box opens. Macros are organised
under modules and modules under libraries. By default macros are saved in Module1.
¤ You can create your own module by clicking on New Module button.
¤ In New Module pop-up, enter the relevant name of the module (e.g. Routine_Tasks) and click
OK button.
¤ Mention a relevant name of the macro (e.g. Sort_BallsPlayed) in Macro Name field and click
on Save button.

Assigning Shortcut Key to the Macro


¤ To see and organise macros, go to Tools menu
> Macros > Organise Macros > Basic
option.

¤ In Basic Macros dialog box, select your macro


and click on Assign button.

125
Electronic Spreadsheet (Advanced) 5
¤ Here, go to Keyboard tab and in
Shortcut Keys section, scroll and
select a combination of shortcut keys
e.g., Ctrl+Alt+Shift+B.
¤ In Category tree, expand the tree to
locate and select the module name.
¤ In Functions section, select the desired
macro.
¤ In Keys section, select the shortcut key
displayed
¤ Click OK button.
Now, when you get new data to be sorted,
copy-paste it in the sheet at exact location
of the older data and press the shortcut key
for the macro. Data will be sorted.
Alternatively, you can run the macro by
pressing Run button in Basic Macros
dialog box.

LAB EXERCISE
Assume a blank colourful, formatted layout and record the macro to create it. The fields
are Serial No., Name, Address, Street, City, Pincode, State, Landline No., Mobile Phone
No., WhatsApp No., Email ID, School Name, School Address, School Phone and School
Email ID.
After recording the macro, test it by the help of the shortcut key.

Using Macros as a Function and Pass Arguments


Macros can be implemented as built-in functions also. A function is an independent executable unit
of code which is identified by its unique name. A function performs a specific task and returns the
result of the task done. For example, SUM() returns the total of the given values. Many functions
need input values to process. The values input to a function are called arguments. For example,
in =SUM(A1:A10), range A1:A10 is argument. You need to have basic knowledge of Basic
programming language to create functions. Here, concept is explained with a simple example.
A function body begins with the keyword Function followed by its name and any arguments and
ends with End Function.
Creating a function: Let us create a function DA under our module created earlier by the name
Routine_Macros.
In this example, function DA is taking 2 arguments – basic_salary and da_perc and returns the
dearness allowance calculated.
¤ Go to Tools menu > Macros > Organize Macros > Basic option.
¤ In the Basic Macros dialog box, click on the Organiser button.
¤ In the Basic Macro Organiser dialog box, select your module and click on Edit button.

126
5 Electronic Spreadsheet (Advanced)
This will open up the macro program editor window. If you
have recorded any macro earlier in your selected module
then the code of that macro will be displayed by the name of
the macro preceded by the keyword Sub. Sub denotes a
sub-procedure or in simple terms, a macro. A sub block ends with keyword End Sub. Scroll down
in the program editor until cursor comes to end sub. Press Enter key to take a new line. Here, we
shall insert the code for our function named DA as shown here. After completing the code, close
the editor’s window.

Using a function: Once a function is created, it can be used as any other


functions you have been using in spreadsheets. Go to any blank cell and
type =DA(3500, 180) and press Enter key. You will see that function DA
has returned the dearness allowance as 180% of 3500 i.e. 6300.

127
Electronic Spreadsheet (Advanced) 5
Structure and working of a function: A function must have a unique, relevant, short name in
a module such as DA. The function name is preceded by the keyword Function. A function block
ends by the keyowords End Function.
Any function arguments are mentioned after the function name within parentheses, separated by
comma. E.g., Function DA(basic_salary, da_perc). These arguments hold the values passed to
the function when it is called later. These values are used in the function for processing.
Once all the calculations are done by the function, the result is returned by it. To return the result
of the processing, the result value is assigned to the function name.

Accessing Worksheets and Cells Using Macros


Modern programs deal with objects. The objects have properties and methods. Properties give us
some information about the object. For example, the number or text or a formula in a cell is its
property. Objects also have functions which help us in manipulating their properties as we need.
Functions associated with objects are called methods. For example, getValue() method is
associated with cells of the worksheet and returns the number stored in the cell. Similarly,
setValue(number) method takes a number and puts it into the corresponding cell.
ThisComponent object: ThisComponent object of LibreOffice Basic refers to the currently
opened worksheet in which macro is running. This object has method getSheets() which returns
a collection of all the sheets in the workbook.
Sheets object: This object refers to all the sheets in the workbook. It has method getCount() that
returns the number of sheets in the workbook; method getByIndex(number) which returns the
reference to the sheet at the given index. Index is zero-based that means getByIndex(0) will
return reference to the first sheet. If there are n sheets in the workbook, then you can pass n-1 into
the method getByIndex() to refer to the last sheet.

Note:
Zero-based indexing is a way to locate items in a collection. Here, first item has index 0,
second has 1 and so on. So, if there are 10 items in a collection then, the index of the last item
will be 9. Hence, by formula it is n - 1 where n is the total count of items in the collection.

Sheets object also has another method getByName(string) which takes the name of the sheet
and returns its reference.
Sheet object: This object refers to the single sheet out of all the sheets in the Sheets object. It has
method getCellByPosition(col, row) that returns the reference to the cell at given column
number and row number. Remember that here also, the column position and row numbers are
zero-based indices. For example,
ThisComponent.Sheets(1).getCellByPosition(0,0)
This is referring to first column, first row i.e. cell A1 in the second sheet (Sheets(1)) in the current
workbook.

128
5 Electronic Spreadsheet (Advanced)
You can also access a cell range by using the method getCellRangeByName(“starting
cell:ending cell”) which returns the reference to the given cell range. For example,
ThisComponent.Sheets(1).getCellRangeByName(“A1:B5”)
Cell Range object: This object refers to a cell range. It has method getData() that returns all the
rows in a range.
Cell object: This object refers to a particular cell in a sheet. It has methods getValue() to retrieve
a number in it; getString() to retrieve text stored in it and getFormula() that returns any formula
stored in the cell.
Functions LBound() and Ubound(): These functions return the index position of the first item
and index of last item in a collection respectively. For example, LBound(Sheets) will return the
position of the first sheet in a collection of sheets while UBound(Sheets) will return the index
position of the last sheet.

Example 1

Here, object ThisComponent is storing reference to the current sheet in user defined object
workbook. It has the collection Sheets which is taken into user defined object sheets. Its index
0 is mentioned to access the first sheet i.e. Sheet1. It is taken into user defined object sheet.
Now, on this sheet object, method getCellByPosition(0,1) is called to access first column i.e. A
and second row i.e. 2 (A2). Reference to cell A2 is created in user defined object cell. On this
object, method getString() is called because this cell contains text value i.e. APPLE. Method
getString() returns string APPLE in user defined variable cell_value. Finally, a function
MsgBox(cell_value) is used to display it in a popup message box.

Example 2

Here, object ThisComponent.Sheet(0).getCellRangeByName(“B2:B6”) returns cell range


B2:B6 (quantities of all fruits) in Sheet1 in the current workbook. Note how reference opererator .
(dot) is used to access the objects within an object.

129
Electronic Spreadsheet (Advanced) 5
The returned cell range is stored in user defined reference range. Its method getData() returns
the rows in the range i.e. rows 2, 3, 4, 5 and 6. These rows are stored in user defined collection
rows.
In collection rows, the rows are arranged on zero-based index i.e. row 2 is at
index 0, row 3 at index 1 and so on.
This range has only one column so the column index is 0. Thus, first cell in the
range can be accessed as rows(0)(0), second cell as rows(1)(0) and so on.
Here, first index is row and second index is column. So, all the values are
accessed and their sum is stored in user defined variable total. Its value is
1319. Next, ThisComponent.Sheet(0).getCellByPosition(1,6) returns the
cell B7 (column B at index 1 and row 7 at index 6) into user defined reference
cell. Finally, cell.setValue(total) is storing the value of variable total i.e.
1319 in the cell B7.

For Loop
Loop is a way to execute program statements muliple times as long as we need. When all the
statements within a loop are executed, it runs again and again as long as a condition allows or on
the basis of a counter. For loop is one such loop that runs on the basis of available counts. It is
denoted by For - Next keywords. With For, a counter variable is associated which is set to count
from a lower value to a higher value using the keyword to. Keyword Next increases the value of
counter variable by 1 by default (or, mention the numbers to skip. E.g., Next 3). The syntax of For
loop is:
For counter_variable = start value to end value
statement
statement
statement
statement
Next

130
5 Electronic Spreadsheet (Advanced)
As shown in the example function for_demo(). Here, loop counter is variable
x which is set to start value 0 till the end value 10. This means, the loop will
run 11 times. This loop has two statements which will execute 11 times. In first
iteration of the loop, statement
cell = ThisComponent.Sheets(0).getCellByPosition(5,x)
will access cell F1 (i.e. 5, 0) since value of variable x is 0. Second statement
cell.setValue(x) will store 0 in cell F1. Next, the value of variable x will be 1.
So, its value 1 will be stored in cell F2, then 2 in cell F3 and so on. Finally, cell
F11 will have value 10 and the loop will terminate.

Example 2 revised with For Loop


Notice lines 5, 6 and 7. In line 5 , LBound(rows) returns 0 and
UBound(rows) returns the index of last cell in the range i.e. 4. So,
the loop will run 5 times (0 to 4).
In line 6, rows(x)(0) refers to indices 0,0. Then, in next iteration 1,0
and so on. This way, one by one, variable total will accumulate sum
of all the 5 values. When the loop is over, finally, the value of variable
total is displayed in cell B7.

5 rows in cell range B2:B6


returned by getData()

Note:
With for loop, Step keyword can be used to specify a number by which the loop counter
should skip. E.g. For x = 1 to 5 Step 2 means x will count 1, 3 and 5 (skipping by 2).

Sorting the columns using macro


Let us now learn how to create a macro code to sort the data on the basis of multiple columns.
Consider the dataset shown
here of Classes and Sections
which is not sorted. Let us
create a macro to sort the
column Class in ascending
order and within it the column
Section in descending order.
Column SNo will remain
unchanged obviously.

131
Electronic Spreadsheet (Advanced) 5
¤ Go to Tools menu > Macros > Organize Macros > Basic option.
¤ Select the module under which you need to create macro and click on Edit button.
¤ Type the following code in the macro editor.

LibreOffice Basic language provides two main objects that help in sorting:
SortField object: This object has property Field to specify the field on which the sorting should
be done in the selected range. Field 0 means first column in the selected range and so on. For
sorting on multiple fields, we need to create an array of this object. This object is defined in a
package util which is part of package star under package sun under com. See how it is accessed in
line 3. New keyword is used to create an object of the specified type. Dim keyword is used to
declare a variable or object. So, here, array of 2 objects of SortField by the name sortfields(1) is
created. This array has 2 elements - element 0 and element 1 - one for each of the two fields on
which we have to do sorting. Element 0 will be used for column Class and element 1 for column
Section.
PropertyValue object: This object just needs the reference of SortFields object to apply sorting.
See line 4 how a new array sortdesc(0) of type PropertyValue is created.
Let us now understand rest of the program.
Lines 6 and 7 are familiar. They are used to create an object range_to_sort which refers to the
range B2:C13 in the sheet named Data1.
In Line 8, method select() is passed with the range object range_to_sort to select the range in
the sheet.

132
5 Electronic Spreadsheet (Advanced)
In Lines 10 and 11, properties Field and SortAscending of element 0 of array sortfields are
being set to 0 and TRUE respectively. Value of property Field is 0 that refers to the first column in
the selected range i.e. Class. Property SortAscending is boolean type that can be either set to
TRUE or FALSE - TRUE means sort in ascending order otherwise descending. So, lines 10 and
11 means sort on column Class in ascending order. Similarly, in lines 12 and 13, element 1 refers
to the second column of the selected range i.e. Section and sorting order is set to descending by
setting property SortAscending to FALSE. So, lines 12 and 13 means sort on column Section in
descending order.
Now, the specified sorting settings need to be loaded into object sortdesc of type PropertyValue.
Line 15 has property Name of sortdesc(0) is set to a string “SortFields”. So, lines 10 and 11
means sort on column Class in ascending order. In line 18, finally, the sorting is applied by passing
object array sortdesc() into the method Sort of range object range_to_sort as argument.

LAB EXERCISE
1. Write a macro function SortNames() to sort the names of 10
cities and their population in descending order of cities and
ascending order of population.
2. Consider the given data set. Write macro CalcAvg() to
calculate average marks for each subject in correspoinding
coloured cells.

133
Electronic Spreadsheet (Advanced) 5
A. Select the correct option to answer the following questions – 1 mark each.
1. Ravi has Science marks of students of class IX and X. He wants to calculate the average
marks class-wise. Which of the following is best suited for this?
 a. Goal seek    b. Solver
 c. Sub-total    d. User defined formula
2. Varun has got marks of 500 students of Term1 and Term 2 of class X in separate sheets. He
needs to create a third sheet that contains total of Term1 and Term2 of all the students.
Which of the following is best suited for this?
 a. Goal seek    b. Sheet linking
 c. Data consolidation   d. Scenario
3. Which of the following is not a “what-if ” analysis tool in a spreadsheet?
 a. Goal seek    b. Sub-total
 c. Solver    d. Scenario
4. Applying a set of values on a data set to analyse changes in the calculations and result is
achieved by which of the following tools?
 a. Goal seek    b. Sub-total
 c. Solver    d. Scenario
5. “How many months would it take to pay the loan is monthly instalment paid is increased by
25%?” – this question can be answered most suitably by which of the following tools?
 a. Goal seek    b. Sub-total
 c. Solver    d. Scenario
6. “What should be the maximum performance of the class if all the students appear for the
exam and all of them secure at least 65%?” – this can be answered by which of the following
tools?
 a. Goal seek    b. Sub-total
 c. Solver    d. Scenario
7. In the formula: rep1:A3 * rep5*A5 + D5, the cell D5 belongs to which of the following?
 a. Different workbook   b. Current sheet
 c. Different sheet   d. Current workbook
8. To keep the hyperlinks intact while distributing documents to others, which of the following
must be used?
 a. Absolute hyperlinking  b. Relative hyperlinking
 c. Both a) and b)   d. None of these
9. An application knows how to establish connection with a ______________ data source
 a. Registered    b. Installed
 c. Embedded    d. All of these

134
5 Electronic Spreadsheet (Advanced)
10. To decrease data redundancy and collaborative editing of a document, the best way of the
following is?
 a. Relative hyperlinking  b. Sharing document
 c. Review document   d. Comments in the document
11. If multiple users are using the same sheet, then which of the following is a good practice to?
 a. Protect sheet   b. Encrypt sheet
 c. Apply track changes  d. All of these
12. Which of the following can be deleted and edited any time?
 a. General comments   b. Comments on changes
 c. Both a) and b)   d. None of these
13. While editing a shared sheet, if tracking of changes is not on, then which of the following is
useful to examine which changes have been done?
 a. Merge sheets b. Review sheets c. Compare sheets d. Any of these
14. A set of macros is called which of the following?
 a. Module b. Library c. Program d. Function
15. A set of modules is called which of the following?
 a. Module b. Library c. Program d. Function
16. An independent executable unit of code having a unique name is called ____?
 a. Function b. Program  c. Module d. Library
17. Macros can be implemented by using which of the following keywords?
 a. Sub b. Function c. Both a) and b) d. None of these
18. To return value 10 from a function myfunction, which of the following statements is correct?
 a. myfunction(10) b. myfunction = 10 c. 10 = myfunction() d. myfunction 10
19. If certain values are stored in a collection, then the position of the first value in that
collection will be denoted by which of the following?
 a. 1 b.0 c. total number of values - 1 d. None of hese
20. If certain values are stored in a collection, then the position of the last value in that
collection will be denoted by which of the following?
 a. 1 b. 0 c. total number of values - 1 d. None of these
21. Which of the following is the correct sequence of containership.
 a. workbook.sheet.cell.range b. workbook.sheet.range.cell
 c. sheet.workbook.range.cell d. sheet.workbook.cell.range
22. In the statement: for z = 10 to 100, z is which of the following?
 a. Loop counter   b. Variable
 c. Both a) and b)   d. None of these
23. Which of the following keywords creates a new instance of any object?
 a. Dim     b. New
 c. Var     d. None of these

135
Electronic Spreadsheet (Advanced) 5
B. Answer the following questions – 2 marks each.
1.What is the significance of sub-total feature in a spreadsheet?
2. Briefly describe a scenario/example where data consolidation is useful.
3. Anu has two sets of 10 marks each which she wants to apply on a dataset to analyse the
output to improve students' performance in next exam. Write steps to help Anu apply these 2
sets of scenarios one by one.
4. What do you mean by Formula cell, Target value and Variable cell in Goal Seek?
5. How can you say that Solver is an advanced form of Goal Seek tool?
6. Why do we need the data sorted before applying sub-total feature on it?
7. How is Scenario feature different from Goal-seek? Explain with a small example each.
8. Ajit has 3 sets of sales data which he wants to apply on the actual data to see how much
earning his company will do in the end of the month. Which “what-if ” analysis feature will be
suitable for him and why?
9. Ajit wants to know how much savings are needed to be done in current month to keep his
expenses at Rs. 100000 by month end. Which “what-if ” analysis feature will be suitable for
him and why?
10. How is relative path different from absolute path?
11. What is the advantage of relative hyperlinking?
12. In a formula, how will you refer to a cell B5 in a sheet named mysheet1?
13. In a formula, how will you refer to a cell B5 in a sheet named mysheet1 in a workbook
named myworkbook?
14. What do you mean by registered data source?
15. Why do we need to share documents?
16. What is the advantage of tracking changes in a shared document?
17. What actions can you take on the changes done by other users in a shared document?
18. What is the basic difference between track changes comments and general comments?
19. How is a function different from a sub-procedure?
20. How does a function return a value? Give example.
21. What is function argument? Give example.
22. Write the statement to store value 10 in cell A1.
23. Write a macro to copy value of one cell to another.
24. Implement a loop to display values 1 to 20 in reverse.
C. Answer the following questions – 3 marks each.
1. With a small example, explain how Solver is a better tool than Goal Seek in certain scenarios.
2. What is the advantage of data consolidation?
3. Describe the syntax of referring to a cell in another worksheet.
4. What do you mean by base path in hyperlinking? What is the limitation of absolute linking?
5. How is relative linking a better way than absolute linking?

136
5 Electronic Spreadsheet (Advanced)
6. Roma has saved Index.doc on path D:\my stories\fiction\2020. Index.doc contains relative
hyperlinks, one for each of the chapter in the story. All the chapters are in separate files
named as Chapter_x.doc, where x is the number of chapter. All the chapters are on path
D:\my stories\fiction\2020\pdf\draft. Which folder should she send to the publisher so
that all the links work fine on publisher's computer too and why?
7. How will you link a worksheet to a defined name in another sheet in the same workbook?
8. What are the advantages of sharing a file over a cloud location?
9. Atul has 4 worksheets of data from different branches of his company. All have identical
layout. He needs to merge them into one sheet, How will he do that?
10. What is the benefit of macros? How will you create and run a macro in an spreadsheet
application?
D. Answer the following questions – 5 marks each.
1. Briefly describe the different ways of what-if analysis using a spreadsheet.
2. How is data consolidation different from sheet comparison?
3. Describe a scenario where Solver is the best choice to apply.
4. How will you ensure that documents hyperlinked with the sheet are linked relatively?
5. Manoj has details of employees in a table Employee_MasteR in a database named
CompanyDB.odb. How will he link the data in his worksheet?
6. Write a brief note on various types of comment in spreadsheet.
7. Anuj has a worksheet in a particular format. A copy of same sheet is with his assistant. They
both made certain changes in their copies. How will Anuj keep his changes as well as
accommodate assistant's changes also in his sheet? Write detailed steps.
8. Consider this sheet named Employee
and write macro to sort the data on the
basis of department in ascending order.
9. Referring to the sheet Employee, write
macro to sort data on department in
ascending order and basic salary in
descending order under it.
10. Referring to the sheet Employee, write
a function to return average of all basic
salary values.
11. A worksheet has some values with font colour blue and cell fill colour yellow. Write steps to
create a macro to copy-paste only the values of these cells to another location in the same
sheet. (Hint: Use paste-special while pasting the data).

Watch & Learn


www.eduitspl.com
www.youtube.com/edusoftknowledgeverse

137
Electronic Spreadsheet (Advanced) 5
Unit
Database
3 Management System

Session-1 Database Concepts


Storing data and retrieving information has been a necessity of all businesses. Data can be
anything such as, name of a person, a number, images, sound, etc.
For example, Ravi, 4, student, etc. When the data is processed and converted into a meaningful
and useful form, it is known as information.
For example, Ravi is 4 years old and he is a student.
is information.
Earlier, the data was stored manually in the form of
files, books and ledgers. Storing data and retrieving
information from them is a time-consuming task.
With computers, this problem has been resolved.
Computers have replaced paper, files and ledgers as
the principal media for storing important
information. Computers help manage and organize
the data so that useful information can be accessed
easily and efficiently.
A database is a collection of related data from which users can efficiently retrieve the desired
information. A database can be a simple collection of text data in a simple tabular form to a
complex collection of images, audio or video.
DBMS is a collection of programs that enables users to create, maintain database and control all
the access to the database. The primary goal of the DBMS is to provide an environment that is
both convenient and efficient for user to retrieve and store information.
The basic concepts behind a DBMS are:
a) Specification of data types, structures and constraints to be considered.
b) Storing the data and manipulating it as required.
c) Querying the database to retrieve desired data.
d) Updating the content of the database.
Need for Database Management System
Database approach came into existence due to the drawbacks and limitations of file processing
system. In file processing systems; updating, deleting and maintaining the data is difficult. A
number of application programs are written by programmers to maintain the data. In the database

138
5 Database Management System
approach, the data is stored at a central location and is shared among multiple users. Thus, the
main advantage of DBMS is centralization of data.
Advantages of Database Management System
a) The ability to update and retrieve data: This is the fundamental feature of a DBMS.
Without the ability to view or manipulate data, there would be no point to using a database
system. Updating data in a database includes adding new records, deleting existing records
and changing information within a record.
b) Support Concurrent Updates: Concurrent updates occur when multiple users make
updates to the database simultaneously. Supporting concurrent updates is also crucial to
database management as this ensures that updates are made correctly. Otherwise it would
lead to the loss of important data and/or inaccurate data stored.
c) Recovery of Data: DBMS provides ways to backup and recover database. There are times
computers may crash, a fire or other natural disaster may occur, or a user may enter incorrect
information invalidating or making records inconsistent.
d) Security: To prevent unauthorized access to the database, DBMS uses features like
encryption, authentication, authorization and views to provide security to the database.
e) Data Integrity: Data integrity is a set of rules that DBMS provides to see that data incorrect
or inconsistent data is not stored.
f) Controlled data redundancy: During database design, various files are integrated and each
logical data item is stored at central location. This removes replicating the data item in
different files, and ensures consistency and saves the storage space.
g) Data sharing: The data stored in the database can be shared among multiple users or
application programs. Due to shared data, it is possible to integrate new applications without
having to create any additional data or with minimal modification.
h) Ease of application development: The application programmer needs to develop the
application programs according to the users' needs. The other issues like concurrent access,
security, data integrity, etc., are handled by the DBMS itself. This makes the application
development an easier task.
Application Areas of Database System
Database systems support businesses of almost every nature now a days. Some of the most
common database applications are listed here.
Travel Industry: Airlines, railways, hotels and cab industry use online databases for reservation,
room bookings and for displaying the schedule information.
Banking & Finance: Databases are used for storing information such as sales, purchases of stocks
and bonds or data useful for online trading, customers, accounts, loans, and other transactions.
Education: Schools and colleges use databases for course registration, result, and other
information.
E-commerce: Integration of heterogeneous information sources (for example, catalogues) for
business activity such as online shopping, booking of holiday package, consulting a doctor, etc.
Health Care Industry: Databases are used for maintaining the patient health care details.
Digital libraries & publishing: Databases manage bulk text & multimedia data.
Human resources: Organizations use databases for storing information about their employees,
salaries, benefits, taxes, and for generating salary cheques.

139
Database Management System 5
Components of Database Management System
User: Any person who can access the data by using a DBMS is called database user.
Database Administrator: A database administrator is a person who directs or performs all
activities related to maintaining a successful database environment. Responsibilities include
designing, implementing and maintaining the database system, and providing security & training
to employees in database management system.
Application Program: An application program is any program designed to perform a specific
function directly for the user or, in some cases, for another application program or operating system.
Relational Data Model (RDM)
The relational data model is both flexible and natural. This model depicts the storage of data in
symmetrical layouts of tables. tables are the simplest form of organised data. A table stores the data
in rows. Details about any object or event constitute one row. Each data value in a row is identified
a unique label or name. This way, similar data values are found in a single vertical column called
field with a unique name. More than one table together store the data about entire enterprise or
business. These tables are called relations hence the term relational data model. To locate complete
information from the tables, they are linked with each other through common fields.
Properties of relational data model:
Types of Database
Databases are essential for record keeping. You can set up databases with database software
packages, or even spreadsheet applications. Either way, both include options for database tables.
Establishing database tables are a big part of database design, and the number of database tables is
the main contrast between flat file and relational databases.
1. Flat File Database: Flat file is a database with one database table. One single database table
can include all the database's fields.
A single table flat file database can be okay if the database is only a small one with a few
fields. However, some require much larger and more extensive databases with lots of fields.
With lots of multiple fields, some record details can then become duplicated within a single
database table. As such, flat file databases are not ideal for larger database models.

2. Relational Database: Relational databases are more widespread than the flat file database
alternatives. Relational databases break up the single table of flat file database mode.
Relational databases are based on relational data model explained earlier. Links between the
tables are established with primary and foreign keys which are unique identifiers for the
database tables. These links between the database tables are known as relationships and can
be one-to-one, many-to-one or one-to-many. We shall learn about primary and foreign keys in
coming sessions.

140
5 Database Management System
Database Servers
Database servers are dedicated computers that hold the actual databases and run onlythe DBMS
and related software. Typically databases available on the database servers are accessed through
command line or graphic user interface tools referred to as Frontends; database servers are
referred to as Back-ends. Such type of data access is referred to as a client-server model.

LAB EXERCISE
1. Your school library runs on the database of books. Try to find out how your librarian
uses that database.
2. Design the structure of a table BOOK with fields namely: Book_No, Book_Title, Author.
3. Design another table BOOK_ISSUE with the fields namely: Book_No,
Student_Registration_No, Issue_Date, Return_Date.
4. Decide the primary key and foreign key in the above tables and mention the reasons.
Why?

Session-2 Data Storage


Data in a relational database management system (RDBMS) is organized in the form of tables. You
will now quickly recap what you learnt in the last session and assimilate more concepts.
Table
A Table is a collection of data related to a single topic and a database is a collection of tables. A
table organizes the information about a single topic into rows and columns.
Parts of a Table
a. Columns: The columns of a table are also called attributes. The column is the vertical part of
a table. For example, table STUDENT given below has 6 columns.
b. Rows: This is the horizontal part of the table. One row represents one record of the table.
The row of a table is also called tuple. For example, table STUDENT given below has 8 tuples
or rows.
c. Cell: Cell is a small rectangular box that contains a value in the table. It is an intersection
point of row and column.
d. Degree: The number of attributes (columns) in a table is called the degree of the table. For
example, table STUDENT given below has degree 6 (number of columns) columns.

141
Database Management System 5
e. Cardinality: The number of
rows in the table is called its
cardinality. For example, table
STUDENT given below has
cardinality 8 (number of rows).

Query
The purpose of a database is not only to store and accumulate information, but also to ensure
information retrieval according to specific criteria. A query can be used for selection of
information in one or several tables. The result of a query can be displayed in data table, form and
report views; it is possible to specify the table fields to be included.
Form
In databases, it is possible to use forms for
the creation, display and modification of
records. Data entry in a form is visually
easier to understand than in a table, and
is simpler for the user. Forms may contain
fields for data entry, field descriptions
(names), action buttons, menus, pictures,
and design elements.
Report
Reports are formal presentation of data in a particular design and layout. Reports are created using
query or table data. Creating database reports is ideal when you want to:
¤ Reports help in analysing data and take decisions for future plans.
¤ Provide hard-copy printouts for review at a meeting.
¤ Include data from your site in a printed publication.
¤ Mark up the information in your database that needs updating.

142
5 Database Management System
Data types
Data types are used to identify which type of data (value) we are going to store in the database.
Fields themselves can be of different types depending on the data they contain. Data types in
Open Office base is broadly classified into five categories listed below.
• Numeric Types.
• Alphanumeric Types.
• Binary Types.
• Date time.
• Other Variable Types.
Numeric Types
Numeric data types are used for describing numeric values for the field used in the table of a
database. Numeric data types in a database can be using for storing information such as mobile
number, roll number, door number, year of school admission, true or false statements, statistical
values, etc. The different types of numeric data types available are listed here.
¤ BOOLEAN (yes / no): Values as 0 or 1. Example: True or False, Yes or No.
¤ TINYINT (tiny integer): Integer range between 0 and 255
-1
¤ SMALLINT (small integer): Integer range between -215 to +215
-1
¤ INTEGER: Integer range between -231 and + 231
-1
¤ BIGINT (big integer): Range between -263 to + 263
¤ NUMERIC: Maximum precision of e(+/-)231
¤ DECIMAL: Maximum precision of e(+/-)231
-1074 -52 1023
¤ REAL: 2 to (2-2 )* 2
-1074 -52 1023
¤ FLOAT: 2 to (2-2 )* 2
-1074
¤ DOUBLE: 2 to (2-2-52)* 21023
Alphanumeric Types
¤ LONGVARCHAR or memo: Stores up to the max length or number indicated by user. It
accepts any UTF 8 character.
¤ CHAR text (fix): Stores exactly the length specified by user. Pads with trailing spaces for
shorter strings. Accepts any UTF 8 Character.
¤ VARCHAR (text): Stores up to the specified length. No padding (Same as long var char).
¤ VARCHAR_IGNORECASE (text): Stores up the specified length. Comparisons are not case
sensitive but stores capitals as you type them.
Binary Types
Binary data types are used for storing data in binary formats. Binary data types in a database can
be using for storing photos, music files, etc. In general, files of any format can be stored using the
binary data type. The different types of binary data types available are listed here.
¤ LONGVARBINARY (image): Stores any array of bytes (images, sounds, etc.). No validation
required.
¤ BINARY (fix): Stores any array of bytes. No validation required.
¤ VARBINARY: Stores any array of bytes. No validation required.

143
Database Management System 5
Date time
Date time data types are used for describing date and time values for the field used in the table of
a database. Date time data types in a database can be using for storing information such as date of
birth, date of admission, date of product sale, etc. The different types of date time data types
available are listed here.
¤ Date stores month, day and year information 1/1/99 to 1/1/9999.
¤ Time stores hour, minute and second info Seconds since 1/1/1970.
¤ Timestamp stores date and time information.

Database Keys
Each table has a set of attributes and values of each attribute are different from each other in the
form of data types. Each table has a number of rows that represent to a single record. So how do
databases keep all of these records straight? It's through the use of keys.
Primary Key
Primary key uniquely identifies each record in the table. Primary key consists of a single attribute or
multiple attributes in a combination.
Properties of Primary Key
a) It must have a non-null value for each instance of the entity.
b) The value must be unique for each instance of the entity.
c) The value must not change or become null during the life of each entity.

Foreign Key
The foreign key refers to a referencing
key present in child table to a matching
value in a column in another table
(parent). It cannot contain the values
other than that column. It can contain the
duplicate values also.
Candidate Key
In some instances, an entity will have more than one attribute that can serve as a primary key. Any
key or minimum set of keys that could be a primary key is called a candidate key. Once candidate
keys are identified, choose one and only one primary key for each entity.
Let's assume that for each employee in an organization there are three candidate keys: Employee's
ID, Social Security Number and Insurance Policy No. So you can choose only one column as a
primary key.
Properties of Candidate Key are same as of Primary Key.

144
5 Database Management System
Alternate Key
The Candidate Key, which is not chosen as a Primary Key is known as Alternate Key.
Let's assume that for each employee in an organization there are three candidate keys:
“Employee's ID”, “Social Security Number” and “Insurance Policy No. that serve as unique
identifiers in the given table.
If for example “Emp_Id” was chosen as Primary Key then “Social_Security_No” and
“Insurance_Policy_No” would become the alternate key.
Combination of “Emp_Id”, “Social_Security_No” and “Insurance_Policy_No” is known as Candidate Key.
Composite primary key
There are certain cases where a single field may not qualify to become a primary key then unique
combination of more than one key can be considered as a primary key. Such fields which together
function as primary key are called composite primary key fields.

LAB EXERCISE
1. Go to a grocery shop in your neighbourhood and analyse that if you create a table to
store the details of all the items in that shop then what will be the data types of each
field in the table. Justify your choice of data type.
2. Which type of data should be suitable for the fields Phone_Number and Pin_Code?
Justify your answer.
3. Why does database have a variety of data types?
4. How is a form different from a report? Give example.
5. Why table is the most important object of a database?
6. List 2 basic differences between primary key and foreign key.

Session-3 Manipulating Data


Database applications provide graphical interface to work with the database and manage the data.
Besides this, they provide a common high level language called structured query language to work
with the database.
Structured Query Language
Structured Query Language (SQL) [pro: sequel] is the industry standard to work with databases
and usually follows the similar basic syntax for easier operation of all kinds of database
applications. SQL allows working with a relational database in two aspects - defining and modify
the structure of the database and manipulating and managing the data stored in the database. The
part of SQL that lets us define and modify the structure of the database is called Data Definition
Language and the part that allows manipulating and managing the data is called Data
Manipulation Language.
Data Definition Language (DDL)
Data definition language or data description language (DDL) includes database commands that
define, modify and remove the structure of various objects like tables, indexes, users, etc. in a
database. Common DDL statements are CREATE, ALTER, and DROP.
145
Database Management System 5
Data Manipulation Language (DML)
Data manipulation language (DML) includes the commands that allows to access and manipulate
data in a database in the following ways:
¤ Retrieval of information from the database- SELECT statement.
¤ Insertion of new information into the database - INSERT statementDeletion of information in
the database - DELETE statement.
¤ Modification of information in the database - UPDATE statement.

Session-4 Creating a Database Object


There are several popular RDBMS applications like Microsoft Access, OpenOffice Base, LibreOffice
Base, IBM DB2 etc. Here, we shall use LibreOffice Base open source database application.
Opening LibreOffice
1. Start > All Programs > LibreOffice.
OR
Click on the desktop shortcut of LibreOffice.
Creating a Database
To open LibreOffice Base, do any of the following:
¤ Start > All Programs > LibreOffice > LibreOffice Base.
¤ Open LibreOffice and select Base Database from the side bar.
¤ Open LibreOffice > File menu > New > Database option.
2. In the pop-up window, click on Database.
3. In the Database Wizard dialog box, select Create a new
database option.

146
5 Database Management System
4. Click Next.
5. Keep the option to Yes, register the database
for me and Open the database for editing
selected.
6. Click Finish.
7. In the Save As dialog box, select the desired
location for the database and enter the name of
the database file. Note that, LibreOffice database
file has the extension ODB.
8. Click on Save button.

LAB EXERCISE
Create a database in LibreOffice Base by the name Library.

Session-5 Creating and Working with Tables


Table is the primary object of a database, which is used to store data in tabular format. While
creating a table you need to decide the field or column names you need and their data types.
Master Table
What is a master table? A master table contains the main and primary data about any object in any
enterprise or any business. Such table is not modified after every transaction. For example, a table
containing details like codes, names, description, type and unit prices of items.
Master table ideally contains a primary key field. Master table is also referred to as parent table.
Transaction Table
A transaction table contains the details of every transaction that occurs in any enterprise or
business. For example, daily sales details like Sale Date and quantity sold for each item that is sold.
Transaction table usually has a field common with the primary key field of Master table. Such field
logically relates transaction table to the master table. Such field in transaction table is called
Foreign Key. Transaction table is also referred to as child table.

147
Database Management System 5
Transaction Table : Sales

Master Table : Item


Working with Tables
After creating the database, you will see the database interface which lists the four database object
types – Tables, Queries, Forms and Reports in the Database pane.
Click on the category Tables. The Tasks pane will list the choices to create a new table.
Table Design View
Design View provides full control to the user to create or design a database object by defining every
small detail. For example, Table Design View allows you to mention each field you need to keep in
the table and define the type of data it should store along with various constraints on the fields which
ensures valid data storage in the field. You can specify which field should be primary key field.
Click on Create Table in Design View… option in the Tasks pane.
As you chose to create a table using Design View, the Design View window opens up.
Under Field Name, specify the names of the fields that make the table. For each field, define the
data type under Field Type. Description is optional and is for documentation or reference
purpose.
Before designing a table, the basic requirements regarding that table should be determined.
Let us create table Item considering following structure requirements:
Maximum
Size or Decimal Other
Field Name Field Type
Length Places Requirements

ITEM_CODE Text of variable 4 None Primary Key


number of
characters
ITEM_NAME Text of variable 100 None
number of
characters
ITEM_SIZE Text of variable 5 None
number of
characters
ITEM_TYPE Text of variable 100 None
number of
characters
PRICE Text of variable 6 2
number of
characters

As shown here, one by one, type the name of the field, select the field type. For currently selected
field, properties of that field are displayed in the Field Properties pane at the bottom.
Some common field properties are as below:

148
5 Database Management System
Entry required: If Yes, it means that data entry in this field is mandatory. Such fields cannot be
left blank. For example, in the Item table above, all fields are mandatory for data entry.
Length: Refers to maximum number of letters allowed in a text field. For numeric field, the length
refers to the number of digits entered. E.g., 6 means values from 0 to 999999.
Default value: A value can be defined in this property which will be taken if user does not enter
any value. For example, in the garments shop, mostly the size is 32. So, a default value of 32 can
be set for the field that is going to store the size (E.g., Item_Size).
Decimal places: Number of places after decimal for numeric and monitory values.
Format example: Specifies formats of dates, time, currencies etc. You will learn about them in a
later session.

The field property settings for each field are given below:
Field Name Property Settings

ITEM_CODE

ITEM_NAME

ITEM_SIZE

ITEM_TYPE

PRICE

149
Database Management System 5
Setting the Primary Key
We know that primary key uniquely identifies a record on a table. If none of the fields (alone or
combined) qualify for primary key then you can provide an additional field to do so. Here, such
primary key field id ITEM_CODE. To set a field as Primary Key, in the Design View, right click on
the left hand side gray area showing a green arrow beside the desired field and select Primary
Key option from the context menu.

Notice that an icon of a key is displayed beside the primary key field now where you had right clicked.

Note:
If you try saving the table without setting any primary key, database will
display a prompt warning you of the same and lets you decide what
action you would like to take further.

Editing Table Design


After saving the table, if you need to make any more Note:
changes in the design of the table, right click on the When you close the table Data View, records
table name in the list of tables and select Edit option entered so far are saved automatically
from the context menu or you can select the table however you can press Ctrl+S or select
and click Edit… option in Edit menu. Save Current Record option in File menu
to save the currently entered record.
Table Data View
Once the table is created, it is ready to store the
desired data. Double click on the name of the
desired table. It will open up in Data View which
allows you to key in the data on the table. Data
View displays table contents in the form of rows of
records. Each record stores the data in the
corresponding field which are displayed as named
columns. While entering the data, be careful in
entering the values as they are, avoid typing any
leading or trailing spaces unless they are really
there in values. Database will consider any extra
spaces and letters as part of the value and that
might not give you desired results when you try to
find records through a query. Item table Data
View is shown here.

150
5 Database Management System
LAB EXERCISE
Create database FLORAL GARMENTS and create table Item. Then, create table Sales as
shown here. TRANSACTION_ID is primary key in Sales table.

Create table using Table Wizard


Following are the steps to create table
using Table Wizard:
1. Click on Table object > Select Use
Wizard to Create Table in Tasks
pane.

151
Database Management System 5
2. In the Table Wizard, select a sample
table and add desired fields. Click Next
button.

3. Specify desired field properties. E.g.


EventID is Integer type and Auto
Increment value. User needs not to enter
the values for it. Click Next button.

4. Specify for automatic primary key


field or select a field to be a Primary
key. You may uncheck the checkbox
to skip creating any primary key.
Click Next button.

5. Specify a relevant, unique name to the table.


Click Finish button.

152
5 Database Management System
After the table is created, you can right click on its name and select Edit option to open it in
Design View. Here, select the field BeginTime and click on the browse (...) button of the property
Format example. In the Field Format dialog box, select Category Time and select desired time
format. Click OK. This way, you can change the formats of other fields too such as StartDate,
EndDate and EndTime etc.

LAB EXERCISE
Open database Library created earlier and create table Book with following
fields:
Field Name Field Type Size Decimal Places Other details
BookID Number 4 None Primary Key
Title Varchar 100 None
Author Varchar 100 None
Publisher Varchar 100 None
Price Decimal 4 2
Copies Number 3

Creating table using SQL Command


Besides design view and wizard, there is another powerful way of creating table which is called
SQL (pronounce “sequel”) – Structured Query Language. An SQL statement is a simple English
like set of commands and clauses which help in creating databasee objects, querying desired data
from the database, deleting data, updating data and carrying out many other tasks related with
data management and user management. You will learn about SQL in more detail in coming
sessions. SQL statement Create is used to create table by mentioning table keyword. It is used to
define the table name, field names along with their types and other constraints.
The syntax of Create Table statement is given here:

153
Database Management System 5
CREATE TABLE <table name>
(
<field name> <data type> <constraint>,
<field name> <data type> <constraint>,
<field name> <data type> <constraint>,
<field name> <data type> <constraint>
);

To open SQL Command window, go to Tool


menu > SQL option. Type the command and
click on Execute button. Any errors in the
statement will be reported in the Status textbox
otherwise the result of the statement will be
displayed in the Output text box.

CREATE TABLE “Invitation”


(
InvitationID integer primary key,
EventID integer not null,
Guest_Name Varchar(100) not null,
Donation decimal default 1000.00
)
Here, table Invitation has 4 fields. InvitationID will store unique numbers since it is declared as
primary key field. EventID will store numbers and not null means that it cannot be empty. Same is
for Guest_Name which stores strings of variable character length maximum 100. Donation will
store currency value or decimal value. If data entry in it is skipped then by default it will store
1000.00. This is ensured by using default constraint.
What is a constraint?
A constraint is a way to decide the behaviour of the fields in different ways. For example, a field
which should behave like a primary key is declared so by using primary key constraint.
Constraints are also applied to check that a valid data value is stored in a field. This way, for
various purposes, constraints can be applied on the fields to ensure that they function in a
particular way or they store valid data as specified.
Notice in the above example how the field InvitationID is declared primary key, how the fields
EventID and Guest_Name are declared not to be blank (not null) and how the field Donation must
store the value 1000.00 if user skips to enter any value in it (default value 1000.00).

154
5 Database Management System
Some common examples of field definitions with constraints in SQL
GuestID int GENERATED BY DEFAULT AS This is an auto-increment field with
IDENTITY unique values.
Refund BOOLEAN default ‘Yes’ This will store either Yes (or 1) or,
No (or 0).
Create table Invitation (EventID integer foreign key EventID of table Invitation points to
(EventID) references "School_Events"("EventID") the primary key field EventID of
table School_Events.
Create table Voter(age int, check(age >=18)) Check constraint validating applies
if age of the voter is 18 or more.

Employee_age int Check(Employee_age between 18 Checking Employee_age is in the


and 65) range of 18 and 65.

age int not null, unique(age)) Unique constraint is applied on age


to suppress duplicate values in it.

Examples of modifying table definition (ALTER TABLE Command)


Sometimes requirements change after creating the table. The table definition can be changed such
as adding/removing a field or applying/removing a constraint. This is called altering the table.
Adding new fields: Syntax : Alter table “table name” add “new field” “type” before “existing field
name”
E.g., alter table item add item_type varchar(50) before “price”.
Here, a new field item_type is added to the table item before the field price
Dropping existing fields: Syntax : Alter table “table name” drop “existing field name”.
E.g., alter table item drop sale_value
Renaming fields: Syntax: Alter table “table name” alter column “field name” rename to “new
field name”
E.g., alter table item alter column “qty” rename to “QOH”
Setting default value: Example: alter table item alter column qty set default 100
Setting NULL/NOT NULL: Example: alter table item alter column price set not null
Adding constraint: Syntax: Alter table “table name” add [CONSTRAINT “constraint name”]
constraint definition Here, giving constraint name is optional. Constraint name is useful in
dropping the constraints.
E.g., alter table item constraint “chk_qty” add check(qty > 0)
Dropping constraint: Syntax: Alter table “table name” drop CONSTRAINT “constraint name”
E.g., alter table item drop constraint “chk_qty”
Renaming table: Example: alter table “item” rename to “item_master”
Dropping table: Example: drop table item

155
Database Management System 5
LAB EXERCISE
A. Delete the table Book created earlier and create it by giving SQL command.
Then, fill the following data in it as shown here.
BookID Title Author Publisher Price Copies
------------------------------------------------------------------------------------------------------------------------------
100 Eye of the Needle Ken Follet Rupa 545 5
101 The Firm John Grisham DigiMedia 399 2
102 The Third Twin Ken Follet Rupa 400 2
103 Clear and Present Danger Tom Clancy Rupa 760 1
104 The Innocent Man John Grisham DigiMedia 324 3
105 The Hunt for Red October Tom Clancy DigiMedia 575 2
Apply following constraints:
¤ Book ID is primary key.
¤ Title should be unique.
¤ Title, author and publisher cannot be blank.
¤ Price should not be 0.
¤ Copies should be by default 2.
B. Create a table Employee to store Employee code (PK), Employee Name, Date
of birth, date of joining, basic salary, gender and city of posting.
¤ Add a field Contact_Number Varchar(15).
¤ Rename the fields for Employee code and employee name to emp_code and
emp_name.
¤ Add a constraint to basic salary to check that it should be at least 1000.
¤ Set default date of joining as today’s date.
¤ Rename the table to Employee_Master.

Edit, delete, sort data in table


For editing data in the table, open it in Data view and insert data as shown here.

156
5 Database Management System
To sort the data on the basis of any field, select the field and click on Sort Ascending or Sort
Descending buttons on Table Data toolbar.

Note that data is sorted in ascending order of BeginDate field values.

To delete a record, simply select it and select Delete Record option in Edit menu.

157
Database Management System 5
Session-6 Relationships and Referential Integrity
Real life databases store the data in more than one table for easier management of data. The tables
are related on the basis of primary key fields and foreign keys to retrieve the data from them.
Managing data in multiple tables raises the need of maintaining accurate and consistent data. For
example, if a business deals in selling 5 items then in sales table no record for a non-existent item
should be accepted or if a record in parent table is deleted then the related records in child tables
should also be deleted. This concept is called referential integrity.
Referential Integrity
Referential integrity is the concept to ensure that accurate and consistent data is maintained in the
database tables which are related.
In Base, referential integrity addresses following 3 aspects:
a. Value entered in foreign key in child table must match a primary key value in the parent table.
b. Any update in the key of the parent table will automatically update the matching values in
child table. This is called Update cascade.
c. Any delete operation on a record in the parent table will automatically delete the matching
records in child table. This is called Delete cascade.
Types of Relationship
Relationships between the two tables can be of 3 types:
1. One to many 2. One to one 3. Many to many
One to Many Relationship: This means one record in one table has many matching records in the
other related table. One is denoted by number 1 and Many is denoted by infinite (∞) sign.
For example, an author can write many books.

Author
1
writes ∞ Book

One to One Relationship: This means one record in one table has exactly one matching record
in the other related table. For example, in a school library, one book can be issued to a student at
a time.

1 can be 1
Book issued to Student

Many to Many Relationship: This means multiple records in one table have many matching
records in the other related table. For example, in a college, many students are pursuing many
courses.

∞ can ∞
Student pursue Course

158
5 Database Management System
Steps to Set up Relationship Between the Tables
1. In Tools menu, click Relationships option.
2. In the Add Tables popup, select the tables and click Add
button one-by-one to add desired tables to Relationship
Design View.

3. In the table structures, drag desired matching field from one table and drop it to the matching
field of the other. The relationship is established and denoted by a thread.

4. Right click on the relationship


thread and select Delete to
remove the relationship or
Edit to make further changes
in the relationship.

159
Database Management System 5
5. In Relations popup, specify desired update and
delete options and click OK. Here, Update cascade
and Delete cascade are selected.

Let us check the relationship. Below is master table Item.

Below, in the table Sales, Item_Code J015 does not exist in related table Item, so an Integrity
constraint violation error is displayed indicating J015 is not found in parent table.

LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Relate the two tables so that for any update and delete in table Furniture, update
cascade and Delete cascade occur in Sales table.
Test the relationship by entering sample data and performing updates and deletions.

Session-7 Create and Manage Queries


Basically, queries are used to access conditional data from tables. It is very difficult to extract data
from the table without a query.
Using query, we can request for data of our choice. It is also used to answer questions to perform
calculations, combine data from different tables, or to add, change or delete table data.

160
5 Database Management System
Create query using Query Wizard
To create query using Query Wizard, following are the steps by example.

1. Select Query object and click on Use Wizard to


Create Query option in Tasks pane.

2. Select the desired table in


first step of Query Wizard
and add desired fields in
the query. Click Next
button.

3. Select the fields on


which you may want to
get the data sorted. For
example, sort ascending
on item type and sort
descending on item
price. Click Next button.

161
Database Management System 5
4. Specify the search conditions
such as price smaller than
1000.
Match all of the following
option filters records that
satisfy all of the multiple
conditions.
Match any of the following
option filters records that
satisfy any of the multiple
conditions.
Click Next button.

5. Specify if you need to display


all the records filtered out by
query or only the summary of
the data. Summary is created
by selecting the aggregate
function to apply on the
selected field. E.g., average of
price.
Here, we shall select Detailed
query radio button.
Click Next button.

6. Enter the names of the fields which


should be displayed in your query.
Here, field names are taken as alias
names. Click Next button.

162
5 Database Management System
7. Specify a relevant name to the query.
Click Finish button.
The query will be created by the
specified name. You can double click
on the name to run the query and
display the output of the query.
Fo example, the result of the query
Item_with_price_1K_or_less is sown
here.

LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Create a query to display the names of those furniture items whose quantity more than
100 is sold before January 1. Enter some sample data that matches the criteria.

Create query using Query Design View

Design View gives better control over designing a query.


1. Click on Queries object and select Create Query in Design View option in Tasks pane and
add desired table.

163
Database Management System 5
2. From the table structure (field list),
drag-drop desired fields which
you need to show in the query
output into the Field section.
Alias is display name of the field
which can be changed optionally.
Specify sort order in the Sort
section exactly below the desired
field.
In Visible section, uncheck the
boxes for the fields you do not
need to show on the query result.
In Criterion section, specify the
record filter criteria.
Once done, close query design
and save the query with a relevant
name.

Criteria on multiple fields


For multiple criteria, mention the
desired criteria in Criterion section
below desired field. To specify if all the
conditions should be true then keep the
criteria in the Criterion section. For
having any of the conditions to be true,
put them in Or sections as shown here.
For example, this query design view
shows query that should display details
of the jackets of sizes ‘L’, ‘XL’ or ‘32' and
whose price id 1000 or more. The
output is given here.

Note:
It is possible sometimes that none of the records in the table satisfy any of the criteria given in
the query. In this case, query will show zero records or blank output.

BETWEEN Operator
Between operator is used to specify a range of numeric or date values. For example, for a field
named age the range of age from 25 to 60 can be specified as Between 25 and 60.

164
5 Database Management System
LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Create a query to display the names and SaleDate of those furniture items whose quantity
between 10 and 50 is sold on Feb 5. Enter some sample data that matches the criteria.

Wildcards
Wildcards are a shortcut way to specify value patterns that are shared by multiple values in a table.
For example, you may need to display the records of all the students whose names begin with
letter 'R' or those having letters 'sh' in their names. Or, you may need to list records of those student
whose names have exactly 5 letters.
To specify wildcard patterns, LIKE operator is used. There are 2 wildcards: * and ?.
* : This symbol means any number of occurrences of any letter.
? : This symbol means exactly one letter.

As shown here, LIKE 'J????' means values in field


ITEM_NAME beginning with letter 'J' followed by
exactly 4 letters. This matches with values JEANS.

In this example, LIKE '*L*' means values in


field ITEM_PRICE having letter anywhere.
This matches with the values PARALLEL,
WOOLEN and LEATHER.

Other example are LIKE 'D*' means values starting with letter D, LIKE ‘*N’ means values ending
with letter N.

165
Database Management System 5
LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Create a query to display the following:
i. All the details of furniture items who have exactly 5 letters in their name.
ii. All the details of furniture items whose names contain letter ‘A’.
iii. All the details of furniture items whose names begin with letter ‘T’ and letter ‘E’.
iv. All the details of furniture items whose names either contain letter ‘H’ or ‘P’.

Perform calculations
Queries can store formulas based on the fields to perform calculations. When query executes, the
formula is executed and displayed as an additional field but it is not saved in the table. Such fields are
called calculated fields. To perform calculations in a query, in Design View, these are the steps:
In the Field section, specify the formula. Enter an Alias name for the formula. For example, if
table Item has field PRICE and table Sales has field QTY_SOLD then the sale_value can be
calculated as PRICE * QTY_SOLD in Field section. Another example is to calculate discount of
10% on PRICE as PRICE * 0.10.
Let us calculate sale_value as Item.PRICE * Sales.QTY_SOLD.

.One more scenario could be where we wish to know how many days before an item was sold. To
calculate differences between dates, DateDiff() is used. It takes 3 arguments:
First argument is a defined value for taking difference on the basis of year, month or day.
Smaller or earlier date.
Larger or later date.
For example,
DATEDIFF(‘DAY’, SALE_DATE, TODAY) takes difference of ‘days’ between current system
date and sale_date values. Note that in Alias section, the name of the calculated field is
mentioned as DAYS_SOLD_BEFORE. If we assume that current system date is October 30, 2022
then the output of the query is given here.

166
5 Database Management System
Difference of days taken on 30/10/22 between TODAY and
SALE_DATE displayed as alias DAYS_SOLD_BEFORE

LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Create a query to calculate and display Sale Amount by multiplying SaleQuantity with
Furniture Price. [Hint: Precede field name with table name such as Furniture.Price *
Sales.SaleQuantity]

Grouping data
Many times it is required that calculations are done on the basis of a data group. For example,
calculating total price of JEANS and JACKETS separately, or calculating average price sale qualityt
of all items, or calculating total of sale made in each region, or counting how may employees are
there in each department.
To do so, in query design, we need to select keyword Group in the
Function section of that field which is used for grouping. Then, we
select suitable aggregate function in the Function section of that
field on which calculation needs to be done. COUNT, SUM,
AVERAGE etc. are aggregate functions because they perform
calculation on a group of multiple values.
In the example given here, garments are grouped on the basis of
item names (JACKET, JEANS) and SUM function is applied on the
field PRICE. Thus, total prices of jeans and jackets will be
displayed. Compare the output with table data. TOTAL_VALUE is
the Alias name given to the calculated field.

SUM of PRICE (alias TOTAL_VALUE)


Actual data in the table Item grouped by ITEM_NAME

167
Database Management System 5
LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name, Furniture Material
and Furniture Price. Furniture Material can be Wood, Plastic or Metal. Create another
table Sales table to store FurnitureID, SaleDate and SaleQuantity.
i. Create a query to display total furniture price Furniture-Material-wise.
ii. Create a query to display total sale amount (price * sale quantity) Furniture-Material-
wise.

Editing query
To edit the query, right click on it and select Edit option.

Session-8 Structured Query Language


Some RDBMS like MS Access, Base etc. provide graphical interface to design a query while others
do not. Besides design view, there is another powerful way of querying for data from the database
and that is called SQL (pronounce “sequel”) – Structured Query Language. An SQL statement is a
simple English like set of commands and clauses which help in querying desired data from the
database.
SQL Command: It is a keyword that denotes the action to be performed on the desired table like
CREATE (to create database objects like tables), SELECT (to query data), UPDATE (for data
modification) and DELETE (to remove data)
SQL Clause: It is a keyword that is used along with SQL command to define the scope of the SQL
Command and to determine in which order the data should be displayed in output. E.g., where (to
filter records on the basis of condition(s), order by (to sort the output) group by etc.
Example of SELECT command without any clause:
SELECT ITEM_CODE, ITEM_NAME, PRICE from Item;
Here, item code, name and price of all the items will be displayed.
SELECT * from Item where price > 100;
Here, where is a clause that mentions a condition for the records.
Creating Query in SQL View Using SELECT Note:
The structural syntax of SELECT command is as follows: An SQL statement can be written without
Select<comma separated fields list> any line breaks. Here, line breaks are
given easier clarity of the concept and
from<comma separated table names>
make the SQL statement easily readable.
where<condition> and/or <condition>....
order by<field name on which output to be sorted><ASC/ DESC>
where and order by clauses are optional unless you need them.

Select Create query in SQL view option in the tasks of Query object. In SQL View, type:
SELECT *from Item;. Press F5 or Run SQL command directly button in SQL toolbar.

168
5 Database Management System
The interface with the SQL
statement and with the output
will look like this:

Note:
SQL is not case sensitive in typing the commands but field
names should be typed in exact the case they have been
created in the table.

Let us try some more SQL statements:


Display selective fields from the table
This statement displays, item code, name and
price of all the records in the table.
Select ITEM_CODE, ITEM_NAME, PRICE
from Item;

Display selective fields on the basis of a


criteria (condition)

Let us display item names, size, type and price


of those items whose price is more than 800.
Select ITEM_NAME, ITEM_SIZE,
ITEM_TYPE, PRICE
from Item
where PRICE > 800;

Let us display the size and type of all the jeans in


our store.
Select ITEM_NAME, ITEM_SIZE, ITEM_TYPE
from Item
where ITEM_NAME='JEANS'

Note:
1. Text values in condition should be enclosed in single quote, not double quotes.
2. Data value are compared with case sensitivity. Here, JEANS will not match with 'jeans' or 'Jeans' etc.

169
Database Management System 5
Sorting Output
Output of the query result can be sorted in ascending or descending order,on the basis of one or
more fields.
Let us display the output of above SQL
statement in the descending order of price.
Select ITEM_NAME, ITEM_SIZE,
ITEM_TYPE, PRICE
from Item
where PRICE > 800
order by PRICE Desc

Note:
Default sort order is ascending (keyword Asc)

Performing Calculations on Fields


It is a usual practice to not to store those values in the tables which can be calculated. For
example, percentage of some amount. The reason behind such practice is that SQL allows creating
simple formulas and apply some aggregate functions on the fields to calculate values.
Let us understand this with an example. In the table Item, calculations can be performed on the
field PRICE. Let us calculate 10% discount on the price for all the items.
Select ITEM_NAME, PRICE, PRICE * 0.1
from Item
Here, PRICE * 0.1 is the calculation done on the
field PRICE.
Notice that title of the calculation is showing the
formula in the query output. We can give it an alias
name by modifying the statement by using as
keyword followed by the alias name.
Select ITEM_NAME, PRICE, PRICE * 0.1 as
DISCOUNT
from Item
DISCOUNT is just an alias name or calculated field.
It does not exist in the table actually.

170
5 Database Management System
Following SQL statement displays price after discount along with all item details.
Select Item.*, PRICE * 0.1 as DISCOUNT, PRICE - (PRICE * 0.1) as
PRICE_AFTER_DISCOUNT
from Item
Here, notice Item.* in select command. Here, dot (.) is used as an operator to specify * as all the
fields in the table named Item. This is necessary here because * is also used as arithmetic operator
for multiplication in the formulas. Item.* tells the application that this * is not arithmetic operator.

Following SQL statement displays


projected price next year for only
jackets as 12.5% more.
Select Item.*, PRICE + (PRICE *
0.125) as PROJECTED_PRICE
from Item
where ITEM_NAME = ‘JACKET’

Assuming that a table Marks has fields eng, math and IT which store marks in the corresponding
subjects out of 100. Then total marks can be calculated using + operator with field names to be added:
Select (eng + math + IT) as total
from Marks
This way, using arithmetic operators, calculations can be performed on the fields by creating a formula
depending on the requirements.
Applying Aggregate Functions on the Fields
Sometimes we need to perform calculations on a
set of values in a field. For example, calculating total
price of all the items. This is done by using built-in
aggregate functions. They are called aggregate
functions because they perform calculations on a
set of values at a time. See these examples. SUM() applied on field PRICE

171
Database Management System 5
Here, SUM() is returning the total of all values in the field PRICE. Aggregate functions have a set of
parentheses in which the name of the field is passed.
Here, group by clause is used to
calculate SUM of PRICE on unique
values in the field ITEM_NAME (i.e.
JEANS and JACKET).
Some common aggregate
functions are SUM, AVG, MAX,
MIN and COUNT
SUM of PRICE grouped on ITEM_NAME

Ÿ SUM() returns the total of the set of given values.


Ÿ AVG() returns the average of the set of given values.
Ÿ MAX() and MIN() return greatest and smallest value of the set of given values respectively.
Ÿ COUNT() applies to non-numeric fields also to return their count.

Inserting and Modifying Data in the Table


Using SQL, you can insert new records in the table, delete and update (modify) the existing
records in the table.
To modify data in the table, you need SQL Statement Execution tool. To open it, select SQL
option in Tools menu. Execute SQL Statement dialog box will popup.
Type the statement in Command to Execute box and click on Execute button.
Inserting New Records
SQL syntax for inserting new records in the table is:
Insert into “<table name>” (comma separated list of fields)
Values (comma separated list of values)

Note:
1. The table name should be in double quotes.
2. The sequence of fields and that of values should
be same.
3. Non numeric values need to be enclosed in
single quotes.

Let us add details of a new woolen jacket in the table


Item.
Insert into "Item" (ITEM_CODE, ITEM_NAME,
ITEM_SIZE, ITEM_TYPE, PRICE)
values('J012','JACKET','28','WOOLEN',8500);

Deleting Records
Deleting records is a very sensitive issue and should be dealt with care. Always consider before hitting
Execute button if you really need to delete the intended records. Delete statement should generally have
some condition associated with it otherwise all the records in the table will be deleted.

172
5 Database Management System
The syntax of Delete statement is:
Delete from <table name>
Where <criteria>
Let us delete all the items which have price less than 700.
Delete from “Item” where PRICE < 700;
Updating Records
Updating records is a also very sensitive issue and should be dealt with care. Always consider before
hitting Execute button if you really need to update the intended records. Update statement should
generally have some condition associated with it otherwise all the records in the table will be
updated with the given same value.
Update is used to make changes in the data values of existing records.
The syntax for update statement is:
Update “<table name>”
Set “<field_name>” = '<value> or <formula>'
Where <criteria>
Let us increase the price of STRETCH type jeans by 5%.
update "Item"
set "PRICE" = PRICE + (PRICE * 0.05)
where "ITEM_TYPE"='STRETCH';

LAB EXERCISE
A. Table Book is given here.
Book ID Title Author Publisher Price Copies
------------------------------------------------------------------------------------------------------------------------------------
100 Eye of the Needle Ken Follet Rupa 545 5
101 The Firm John Grisham DigiMedia 399 2
102 The Third Twin Ken Follet Rupa 400 2
103 Clear and Present Danger Tom Clancy Rupa 760 1
104 The Innocent Man John Grisham DigiMedia 324 3
105 The Hunt for Red October Tom Clancy DigiMedia 575 2
To work on the table Book issue SQL commands to find out the following:
1. List all the details of all the books.

173
Database Management System 5
2. Display title, publisher and price of all the books.
3. Display title, author and price of all the books whose price is less than 400.
4. Who are the authors whom 'Rupa' publication has published?
5. What are the prices of the books written by ‘Tom Clancy’?
6. List details of all the books in descending order of Price.
7. Display the names of the authors with book titles in ascending order of Price.
8. Refer to question 4 and display the output sorted on Book Title.
9. Which books and their authors are published by 'DigiMedia'?
10.What are the titles and prices of books whose more than 2 copies are there in
library.
11. Who has written which books cheaper than 300.
12. Here, BookID is primary key. Why not any other field is considered as primary
key? Explain briefly.
B. Change the price of Book number 5 to 430.
C. Delete the all the book which are priced higher than 400.
D. Deleted the books which have just 1 copy in the library.
E. Write the SQL Statement to create the table Tea as described below.
Tea_Code A number to identify each tea flavour
Tea_Flavour Stores name of the flavour such as Ginger, Lemon, Honey etc.
Size Size is Large, Medium, Small
Sugar_Type Sugar, Sugar free
Price A value with two decimal places
In the above table, which field should be the primary key and why?
F. Write the SQL Statement to create the table Flight as described below.
Sector For example, KOL-DEL, DEL-BAN, CHN-DEL etc.
Date Date of flight
Day1 3 letter weekday name
Day2 3 letter weekday name
Day3 3 letter weekday name
Capacity number of seats
In the above table, which field should be the primary key? Why?/Why not? Suggest a
remedy also if why not.

Session-9 Building Forms


A Form is a database object that can be used to create a user interface for the database. With the
help of 'forms', you can enter, view and change data in an easy manner. A form is an interface
between the user and the underlying table whose layout is defined by the user for working
conveniently with the data stored on the table. A Form is a collection of buttons, text boxes and
labels. These are also known as controls. Let us create a Form for the table Item.

174
5 Database Management System
Creating Form with Form Wizard
A form can be created in two ways - Using Form Design
View and Using Form Wizard.
Here, we shall learn to use Form Wizard.

1. Click on the category Forms in Database pane


and then select Use Wizard to Create Form…
option in the Tasks pane.

2. In the Form Wizard dialog


box, do the following:
a. i.) Select the desired table
from the Table or
queries drop-down.
Using Shift key, select
all the fields in the
table that you need to
add to the form.
ii.) T h e n c l i c k o n >
button. You can click
also on >> button to
add all the fields at
once in the form.
Then, click Next.

b) Next step allows you to


insert an already existing
form in the form being
created. We do not need
this step here, so simply
click Next.
c) Select the arrangement
of the controls in the
Form and click Next.

175
Database Management System 5
d) Select the data entry mode either to
enter only new records and not to
display the records already entered in
the table or to display all the records.
Here, you can also select to disallow
modification and deletion of existing
data and entry of new data. Let us
select to display all data with every
action allowed. Then, click Next.

e) Select any display style for the


Form and click Next.

3. Specify a name for the form. In our


example, it can be named as
Item_Form. You can decide to use
the form as it is created or to format
the look of the form in the form
editor. Let us select Work with the
form option and click Finish.

176
5 Database Management System
Navigating Form and Searching Records
Once form is opened in the working mode, you can use the Previous/ Next/ First/ Last Record buttons
in the Form Navigation toolbar. If it is not visible, select it from Toolbars submenu under View
menu.

Short cut
Previous Record: Ctrl + Alt + Left arrow Next Record: Ctrl + Alt + Right arrow
First Record: Ctrl + Alt + Home Last Record: Ctrl + Alt + End
To skip to a blank record for entering new data values, click on New Record button on this
toolbar.

Enter a new record in the table through this


form as shown here.
Close the form. Closing it will automatically save
the changes and newly added records in the
underlying table. You can also click on Save
record button in the toolbar.
Open the table Item and you will find the newly
added record in it.

LAB EXERCISE
A. For table Book created in previous session create:
1. A form named View_Books only to view the records.
2. A form named Add_Books only to add records of new books in the table. Delete
and update should not be allowed through this form.
3. A form named Modify_Books only to modify existing records of books in the
table. New entry and delete should not be allowed through this form.
B. Open these three forms and test if they are working as desired.

Delete records using Forms


To delete the current record, click on Delete Record button on the Navigation bar of the form.

177
Database Management System 5
Editing Form
Once a form is created using wizard, to edit it, right click on it and select Edit. The form will open
in Form Design View. Using design view, a new form can also be created from scratch. Form
contains 3 types of controls:
Data Controls: These controls are bound with a field in the concerned table and they
display the data value of that field.
Calculated Controls: These controls store formulas and functions for calculations. They
are not bound with any field in the table.
Design Controls: These controls are used in giving desired
look to the form and to organise controls over the form. For
example, line, rectangle, group box etc.
To open a form for editing, right click on the name of the form and select
Edit option.

Understanding Form Properties


If you right click on any form control and
select Form Properties
o p t i o n , t h e n Fo r m
Properties pane is
displayed. It shows the
properties related to the
data in the table such as
Content type, Content,
Sort, etc., event handling properties useful for
programming and macros. It also shows general form
properties such as Name of the form.
Understanding Control Properties
Once form is opened in the Design View, you can
display the properties of a control by double clicking
on it or by clicking Control button on the Control
toolbar. Usually, when you edit a form created by
wizard, the label and text box are grouped together. You
can right click on them and select Ungroup. Now,
their properties can be displayed separately. In the
following example, properties of a Textbox control
txtITEM_CODE are displayed such as Enabled
property is set to Yes means, value in this control can
be edited or clicked by user, Label Field property is
bound with the field ITEM_CODE in the Item table.
So, it is a bound control.

178
5 Database Management System
Setting Properties of the Controls
Binding a control with a field in a table
¤ In the Form Properties box, Content property of a control allows to select the desired table,
query or SQL command whose data that control should display. To select the desired table,
you must select Table in its Content type property.
¤ Once table is selected, right click on the control and select Control Properties. Here, go to
Data tab and select the desired field in the Data field property drop-down.

Creating a Lookup List


Many times, in a child table we need to enter a value which must present in the master (parent) table.
For example, when an item is sold then, in Sales table we must enter item code that is present in Item
table. For this purpose we can create a list in the Form created for child table in which values come
from the parent table. Such list is called lookup list. Here, the Form is created for Sales table and for its
field ITEM_CODE, the values are listed from Item table. To achieve this, first draw a List Box control
from the Control Toolbox then set the properties like this:
¤ Form properties:
Content type: Table
Content: Sales
¤ Control properties (Data tab):
Data Field: ITEM_CODE
Type of list contents: Table
List content: Item
When you save and open this form,
notice the 5th record shows J003
highlighted because that is the code
stored in Sales table in 5th record but
all 13 item codes are listed from Item
table. So, the user can only select item
code from these codes while adding a
new record. This ensures data
integrity as no non-existent item code
will be entered in Sales table.

179
Database Management System 5
General Control Properties
Right click on the desired control and select Control Properties. In the properties box, various
properties are there.
General Properties
¤ Name: Unique name given to the control.
¤ Enabled (Yes/No): If no, disables the control.
¤ Visible (Yes/No): If no, hides the control.
¤ Background color: Sets backgorund colour of the control.
¤ Border: Sets border to flat or 3D look.
¤ Max text length: Sets maximum number of characters to enter in a Text Box.
¤ Text type: Single or multi-line text.
¤ Password character: Character to display in place of letters in a password text box.
Changing a Label Background
Right click on the Label control and select
Control Properties. In the properties box, go
to General tab. Scroll down to Background
color property drop-down and select the
desired colour from the colour box as shown
here.

Form Controls Bar


Form Controls Bar contains the
common controls which can be
added on the form or can be used to design the form as desired.
Here, common form controls are shown.

180
5 Database Management System
LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name, Furniture Material,
Furniture Price and Out of Stock. Furniture Material can be Wood, Plastic or Metal. Design
a new Form using Form Design View. Keep FurnitureID non editable assuming that it is an
autoincrement value. Furniture Material should be a List Box. Out of Stock should be a
Check Box, checked means Yes otherwise No.
At the top of the form display a big title: FURNITURE DATA ENTRY SCREEN
Perform some colour and font settings also on the controls to make the form look formally
appealing.

Session-10 Design Reports


A report isused to present the data formally and can be used to print. It is a logical combination of
all the raw facts of the database and presents the result with a visual meaning. Reports present a
comprehensive summary of the data stored in the database. Reports help in analysing the data and
making decisions.
Different Sections of Report
The Header Section is the top most section of the report. Report headers usually contain titles and
logos. Page headers usually contain column headings.
The Details Section is the body of the report which contains the main data. All reports must have a
detail section.
The Footer Section can appear in several places. You can create page footers that appear at the
bottom of each report page and display elements such as page numbers.
The header and footer sections are optional.
Sample report shown here is grouped on ITEM_NAME and ITEM_TYPE. It is made on a query that
calculates SALES AMOUNT as PRICE * QTY_SOLD

181
Database Management System 5
If you don't want to group the data, you don't need to group headers or footers. However, make
sure that your reports contain enough information to make them meaningful and easy to
understand.
Creating Report
1. Click on the category Reports in Database pane and select
Use Wizard to Create Report… option in the Tasks pane.

In the Report Wizard:


2. From Tables or queries drop-
down, select the desired table or
query (In our example, let us select
query Sales Query1), add the desired
fields to the Fields in report list and
click Next.

3. If you wish, change the labels of the fields


into more readable forms as shown here.
Then click Next.

4. Select the fields to group the records on


it by selecting the desired fields and
clicking on > button. Here, ITEM_NAME
and ITEM_TYPE are taken for grouping.
Click Next.

182
5 Database Management System
5. You can sort the report output on
the basis of one or more fields.
Select the fields on which report
data should be sorted in ascending
or descending order. Here, data is
sorted in ascending order of
ITEM_NAME, ITEM_TYPE and
PRICE. Click Next.

6. Choose a report layout and page


orientation. Then, click Next.

7. Specify the Title of report as shown


here along with Dynamic Report
option under which, select Create
report now option. Finally, click
Finish.
Dynamic report means every time the
report is generated, it will be refreshed with
updated data from the source table/query.

Another sample report is shown here. Its header has title, details section has report data. The
report is grouped on item type and sorted on item name, size and price.

183
Database Management System 5
LAB EXERCISE
A. Create a report named FURNITURE SALES listing FurnitureID, Furniture
Name, Furniture Material, Furniture Price, Sale Quantity and Sale Amount
as Price * Quantity. You need to create a query on which report must be
created. Give the alias name SALE AMOUNT to the calculated field Price *
Quantity.
B. Practice creating various reports on the tables created in earlier sessions.
C. Practice Section D of Assessment in lab.

184
5 Database Management System
A. Select the correct option to answer the following questions – 1 mark each.
1. Employee code E00009 has joined the company on 10/10/1990 – in this statement, identify
the data from the following:
 a. Employee code   b. Date of joining
 c. Both a) and b)   d. Company
2. Which of the following is retrieved from the data stored in a database?
 a. Data     b. Information
 c. Query    d. Table
3. In a flat file system, which of the following is difficult to perform?
 a. updates    b. deletes
 c. Manage data   d. All of these
4. Which of the following is not an advantage of a DBMS?
 a. Data redundancy   b. Data integrity
 c. Data sharing   d. None of these
5. Databases reduce multiple copies of data. Such multiple copies are called which of the
following?
 a. Redundant values   b. Foreign key
 c. Information    d. Queries
6. Which of the following component of a database stores the data?
 a. Form     b. Table
 c. Report    d. Query
7. Alternate term for the tables in an RDBMS is ________________.
 a. Relationship    b. Index
 c. Relation    d. Application
8. Which of the following is referred to as tuples in a database table?
 a. Columns    b. Fields
 c. Rows     d. All of these
9. Which of the following is referred to as attributes in a database table?
 a. Columns    b. Fields
 c. Rows     d. All of these
10. Which of the following is the formal presentation of data?
 a. Form     b. Query
 c. Table     d. Report

185
Database Management System 5
11. Columns eligible to be primary keys are called which of the following?
 a. Foreign keys    b. Keyset
 c. Composite keys   d. Alternate keys
12. There can be duplicate values in a foreign key field.
 a. True     b. False
13. Foreign key cannot store null values.
 a. True     b. False
14. Which of the following SQL commands are part of DDL?
 a. CREATE    b. ALTER
 c. DROP    d. All of these
15. Which of the following SQL commands are part of DML?
 a. SELECT    b. INSERT
 c. DELETE    d. All of these
16. Which of the following is true about primary key and foreign key.
 a. Foreign key in a child table points to a primary key in the parent table.
 b. Foreign key in a parent table points to a primary key in the child table.
c. Primary key in a child table points to a foreign key in the parent table. 
d. None of the above.
17. In which of the following views do you see the field properties?
 a. Table design view   b. Form design view
 c. Query design view   d. Table data view
18. Using a database form which of the following actions can be performed?
 a. Data entry    b. Data delete
 c. Data modification   d. All of these
19. What is the correct syntax of creating a field Student_Name in table Student as primary key?
 a. create table Student(Student_Name, primary key, 100, varchar)
 b. create table Student(Student_Name, 100, varchar, primary key)
 c. create table Student(Student_Name, varchar, primary key, 100)
 d. create table Student(Student_Name, varchar(100), primary key)
20. Which of the following constraints ensures a pre-set value is entered in the field if user does
not enter any value?
a. by default b. default c. primary key  d. not null
21. Which of the following constraints ensures that a field should not be left blank?
 a. by default b. default c. primary key  d. not null
22. ALTER TABLE command is used to do which of the following?
 a. Add new field   b. Delete a field
 c. Add a constraint   d. All of these

186
5 Database Management System
23. Delete cascade refers to which of the following statements?
 a. Delete on parent table will delete matching records in child table.
 b. Delete on child table will delete matching records in parent table.
 c. Delete on parent table will delete all the records in child table.
 d. Delete on child table will delete all the records in parent table.
24. Teacher teaches students is which type of relationship?
 a. One-to-one    b. Many-to-many
 c. One-to-many   d. Many-to-one
25. Teachers teach students is which type of relationship?
 a. One-to-one    b. Many-to-many
 c. One-to-many   d. Many-to-one
26. A passenger is allocated one seat in the flight is which type of relationship?
 a. One-to-one    b. Many-to-many
 c. One-to-many   d. Many-to-one
27. What can we mention in the Field section of Query design view?
 a. Field name    b. Formula
 c. Both a) and b)   d.  Alias name
28. Between 10 and 25 – this will check which of the following range?
 a. Between 9 and 24   b. Between 10 and 25
 c. Between 11 and 26   d. None of these
29. Find the odd one out:
 a. * b. ? c. ( d. None of these
30. LIKE 'P?P' refers to which of the following?
 a. PPP b. POP c. Both a) and b) d. PP
31. LIKE 'P*P' refers to which of the following?
 a. PPP b. POP c. PP d. All of these
32. In which of the following calculated fields are saved?
 a. Table b. Form c. Both a) and b) d. None of these
33. Which of them is not a clause of SQL command?
 a. Where b. Select c. Order by d. None of these
34. Which of the following clauses will sort the output in ascending order?
 a. Order by price asc b. Order by price c. Both a) and b) d.None of these
35. Where clause can be used with which of the following SQL commands?
 a. SELECT b. UPDATE c. DELETE d. All of these
36. You cannot interact with a control whose ____________________.
 a. Enabled = False   b. Visible = True
 c. Both a) and b)   d. Input required = No

187
Database Management System 5
B. Answer the following questions – 2 marks each.
1. What is data?
2. What is information?
3. What do you mean by the terms database and DBMS?
4. List any 2 advantages of a database.
5. In two lines, explain how databases help businesses.
6. What is RDBMS?
7. What is relation in a database?
8. What is the use of database forms?
9. What is the significance of database reports?
10. How query helps in retrieving information from the data stored in the database?
11. How is VARCHAR is different from CHAR data type in a database?
12. What is the relation between a foreign key and a primary key?
13. List any two commands of DDL and DML each.
14. Why do we need a transaction or child table?
15. Mention the use of any two field properties of a table.
16. How will you set a primary key in a table?
17. Give two basic differences between table data view and table design view.
18. Write SQL statement to create a table Person to store Full Name, Birth Date, email ID and City.
Email ID is primary key.
19. How will you sort data in a database table?
20. What do you mean by referential integrity?
21. List one example of 3 types of relationship each.
22. What is a wildcard? Mention 2 examples of wildcard.
23. How will you group data on a field in query design view?
24. What do you mean by control properties?

C. Answer the following questions – 3 marks each.


1. What is the significance of a database?
2. Briefly discuss any 2 major advantages of a database.
3. How database can help a school like yours?
4. What is the basic difference between the structure of a flat file system and relational database?
5. In one line, define the terms table, query, form and report.
6. What is the significance of foreign key and primary key in a database?
7. Briefly describe the two logical types of SQL.
8. List the steps to design a table using table wizard?
9. How will you add a new field and a new constraint in a table? Explain with an example.

188
5 Database Management System
D. Answer the following questions – 5 marks each.
1. Consider the following table and write SQL statements to answer the questions that follow:
SubscriberID Name Connection Pending_Amount
------------------------------------------------------------------------------------------------------------------------------
S0001 Anand Kumar Broadband 2200
S0002 Dinesh Verma Postpaid 3310
S0003 Minal Sen Postpaid 1200
S0004 Suman Kumari Broadband 0
S0005 Ravi Kumar Broadband 900
S0006 Atul Om Postpaid 0
i. Create table Billing with Subscriber ID as primary key, name should not be blank,
default connection is Prepaid.
ii. Display all the names starting with letter ‘A’.
iii. Display the connection type of those who have letter ‘u’ in their name anywhere.
iv. Whose names are ending with letter ‘r’?
v. Display the interest on non-zero pending amounts as 8% along with total amount.
vi. Display total pending amount connection type-wise.
vii. Increase non-zero pending amounts by 8%
viii. Delete all records having non-zero pending amount.
ix. Who is having no pending amount on broadband connection?
x. Insert a new record for subscriber code S0007 with suitable assumed values.

2. Perform following alterations in the above table:


i. Add a field Connection_Date
ii. Add a constraint on pending_amount to check if it is 0 or more.
iii. Rename the field ‘Name’ to Subscriber_Name.
iv. Rename the table to ‘Pending_Billings’..

Watch & Learn


www.eduitspl.com
www.youtube.com/edusoftknowledgeverse

189
Database Management System 5
Unit
Web Applications
4 and Security

Session-1 Accessibility Options in Windows


Computer Accessibility refers to the user friendliness of a computer system for all, regardless of
their disability. This is mainly a software issue. How ever, when a combination of hardware and
software, it enables a person with a disability or impairment to use a computer. It is known as
Assistive Technology.
In this session, you will learn about the basic accessibility options available on your computer.
There are numerous types of impairment that impact computer usage. These include:
¤ Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-hyperactivity
disorder (ADHD) or autism.
¤ Visual impairment such as low- vision, complete or partial blindness, and color blindness.
¤ Hearing impairment including deafness.
¤ Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and
repetitive strain injury.
Windows 7 includes accessibility options and programs that make it easier to see, hear, and use
your computer.
Launching Accessibility Options
Steps to launch accessibility options in Windows 7 are as below:
¤ Click on Start.
¤ Click on Control Panel.
¤ Click the Ease of Access link.
¤ Click Ease of Access Center link.

Setting up Keyboard Access


Click Make the keyboard easier to use in the Ease of Access
Center.
Turn on Mouse Keys checkbox to allow the user make use of arrow
keys on the numeric keypad to move the keys on screen and Enter key
to click. For example, user can press top arrow and left arrow key to
move mouse pointer diagonally upwards towards left side.
Turn on Sticky Keys checkbox allows user to keep the key active when
it is pressed once and when any other key is pressed then it is processed

190
5 Web Applications and Security
by the computer with the currently active key. For example, if user has pressed Window key on the
keyboard then it will remain active. Now, if user clicks only letter E then it will ne interpreted as
Windows+E and Windows Explorer will open up.
Once enabled, sticky keys icon will appear in the system tray.
Turn on Toggle Keys checkbox allows user to hear an alert sound every time a key like caps lock,
num lock etc. is pressed.
Turn on Filter Keys check box, when selected, makes keyboard ignore rapidly repeated or long
pressed key to avoid repeated typing of the same key thereby helping people who type with
trembling hand.
Text or Visual Alternatives to Sound
People with hearing impairment have great use to this feature where they can see the visual
feedback or cues on the screen instead of sound.
Click on Use text or visual alternatives for sounds in Ease of Access Center.
or Turn on visual notifications for
sounds (Sound Sentry) option replaces
system sounds with visual warnings like
flashing caption bar of active window,
flashing the active window itself and flash
desktop. Select the desired visual warning.
Any sound that reads the screen can be
turned into text caption that appear on the
screen by checking Turn on text
captions for spoken dialog checkbox.
Make the Computer Easier to See
In Ease of Access Center, click Make the computer easier to see link.
Choose a High Contrast Theme: Select the option to turn high contrast on/ off by pressing left
Shift + left Alt and Print Screen keys. This lets visually challenged people see screen
comparatively clearly.
Turn on Narrator option allows read aloud of any text on
the screen and Turn on Audio Description option lets
visually impaired person hear descriptions of what is
happening in any videos.
Turn on Magnifier option lets user move mouse pointer
on the screen and see the objects larger in size. This mode is
called lens mode. In docked mode a portion of the screen
can be left magnified and rest of the screen remains normal.
This portion can be changed as required. Full screen
mode magnifies whole screen. Lens size, focus area, zoom
level etc. can be set by the user.
Set the thickness of the blinking cursor option makes
blinking cursor thicker and larger to see them easily.

191
Web Applications and Security 5
Make the Mouse Easier to Use
In Ease of Access Center, click Make the mouse keys
easier to use link.
Here, you can change the colour and size of mouse
pointers. You can turn on mouse keys of numeric keypad.
You can set option to activate any window just by bringing
mouse pointer over it instead of having to click it.

LAB EXERCISE
1. Enable mouse keys on numeric keypad and test them to move mouse pointer on
screen. Try opening a file using it.
2. Enable sticky keys then open any word processor and type some text. Now press Ctrl
key and leave it. Then press other keys like A, C followed by V, P and observe what
happens. These letters must make combination of command shortcuts Ctrl+A,
Ctrl+C, Ctrl+V and Ctrl+P.
3. Open notepad and turn on Filter Key option. Now practice typing letters with brief
pauses. Observe how the repeated strokes of same letter are ignored.
4. Enable toggle keys option and test them by pressing them on the keyboard.
5. Turn on Sound Sentry and open notepad. In notepad open Print dialog box and then
try clicking in the notepad. Observe how it gives visual warning.
6. Try out various settings of Magnifier and see how screen looks like in various modes
of magnifier.
7. Try out mouse ease of access options by changing cursor colours and size.

Supplement: Accessibility Options in Ubuntu


The Universal Access icon of a man in the Top
bar refers to the accessibility options in Ubuntu. You
can click on System Settings in Side bar to go to
Universal Access.
Universal Access has 4 tabs namely:
¤ Seeing
¤ Hearing
¤ Typing
¤ Pointing and Clicking

192
5 Web Applications and Security
Note:
Universal Access can also be opened by pressing Super key to switch to Activities Overview mode
and typing Accessibility.

Seeing
This section provides visual settings such as
contrast settings, text size, zoom, enabling screen
reader and sounds for keys like Num and Caps
lock. User can set the screen contrast and text size
as needed. User can enable/disable zoom feature.

Hearing
This section allows the user to set up a visual
indicator on the screen when system produces a
sound alert. Users with hearing impairment may
not hear the sound so they can see the flashing
Title bar of the opened window or entire screen
flashes. User can select a suitable option.
Typing
This section allows the user to
enable/disable onscreen keyboard
Typing Assistant for touch screens,
Sticky keys that allow user to keep the
modifier key (Shift, Ctrl etc.) active
when it is pressed, Slow keys which
allow setting up a time delay between
the key press and its acceptance by the
computer. This is good for elderly
person or anyone who tends to have
slower typing speed and Bounce keys
that set up the delay between the
repeated press of a key to avoid
accidental duplicate typing of a key.
Pointing and Clicking
This section allows user to enable keyboard arrow keys on the numeric keypad to be used as
Mouse Keys and move the mouse pointer on the screen. Simulated Secondary Click can be
enabled to set a time delay for how long the left mouse button should be pressed to be accepted
as right click. Hover Click option can be enabled to trigger mouse click just by bringing the
mouse pointer over the desired option or object. The time delay and motion threshold can be set
for this.

193
Web Applications and Security 5
Accessibility feature refers to the assistance in the following impairments:
Visual impairments: Poor or low vision and blindness are assisted by the screen readers,
contrast settings, changing text size, magnifying or zooming parts of screen and by blinking the
cursor while typing.
Hearing impairments: These is assisted by visuals on the screen by flashing window Title bar or
the whole screen.
Mobility impairments: These are assisted by mouse speed, using keyboard as mouse, adjusting
click speed, simulating right click with left button, click by hovering, setting slow keys, bounce keys
and sticky keys, setting repeated key press delay, on-screen keyboard and navigating applications
by keyboard.

Orca Screen Reader Brief Overview


Orca is a free. open source screen reader utility. Orca provides access to the graphical interface
through speech synthesis and braille for visually impaired.
Orca can read aloud the user interface.
To enable/disable Orca, press Super + Alt + S.
To access Orca Preferences, press Insert + Spacebar. Orca preferences
window will open up. You can also click on Preferences button on Orca
Screen Reader main window.

Orca Preferences
Orca preferences dialog box can be used to setup Orca utility. In the Speech tab you can enable
speech by selecting Speech system as GNOME speech services, Speech synthesizer, Voice settings
and Human voices. You can also set the Rate, Pitch and Volume of the speech. To enable/disable
speech you can also press Insert + S after Orca is enabled.

194
5 Web Applications and Security
If you need to display the Orca preferences for any currently opened application then press Ctrl +
Insert + Spacebar.
To learn the commands to use Orca, first enable Orca and then enter the learning mode by
pressing Insert + H. Now, press keys on the keyboard, Orca will read aloud the key name and the
commands associated with that key. To come out of learning mode, press Esc key.
You can refer to https://help.gnome.org/users/orca/stable/commands_reading.html.en to explore
about Orca reading commands.
Go to https://help.gnome.org/users/orca/stable/commands_structural_navigation.html.en to explore
Orca navigation commands.

LAB EXERCISE
Try out the lab activities given in the previous lab exercise for Windows. Explore
Ubuntu features to do them.

Session-2 Networking Fundamentals


Computers, when connected with each other, through a communication medium form a network.
The purpose of connecting computers to form a network is to share the data, services and various
resources. For instance, one printer connected with a computer can be accessed for printing by
other computers on the network or a file can be copied from one computer to another without
having the need of sharable media like disks or pen drives. Communication medium can be as
simple as cables or advanced as wireless and satellites.
On the basis of architecture, networks are of 2 types- Peer-to-peer and Client-Server.
In peer-to-peer network, computers are equipped with similar processing power and share
information and resources with each other. There is no specifically designated computer that is the
source of all data and services.

195
Web Applications and Security 5
In Client-Server network computers which are
dedicated to provided services and access to resources
are called Servers and computers that access these
services and resources over the network from the
servers are called Clients. Depending on the service
they provide, servers are called file server, print server,
database server, internet access server (proxy server)
etc.
Servers are equipped with powerful processors and
larger storage as compared to clients. In certain
networks, clients even rely on server for their data
processing. Such clients are called dumb clients.

Types of Networks on the Basis of Span


On the basis of their span or space occupied, networks are classified into following types:

Personal Area Network (PAN)


A Personal Area Network (PAN) is a computer network
which is used by a single person for communication among
the computer devices. For example, printers, fax machines,
telephones, or scanners are the computer devices used with
a PAN.
The reach of a PAN is few metres only. Typically, this is used
at home or in a small office. The devices are commonly
connected here through wire or Bluetooth, Infrared
technology.

Local Area Network (LAN)


A Local Area Network (LAN) covers a small
geographic area, such as home, office or any building.
These are used within smaller geographic range and
have limited communication lines. LANs have higher
data transfer rate. It is useful for sharing resources like
files, printers and other applications. A LAN can be set
up using wireless media also.

Metropolitan Area Network (MAN)


A Metropolitan Area Network (MAN) is a large network
that usually spans a city, but does not extend the boundaries
of the immediate town, city, or metropolitan area. Data
transfer rate in Metropolitan Area Network is little slower
than the Local Area Network. The distance covered by this
kind of network enables a large number of users to
communicate with each other in the network. For example,
network set up by MTNL in Delhi and Mumbai, cable TV
network in a city.

196
5 Web Applications and Security
Wide Area Network (WAN)
A Wide Area Network (WAN) is a geographically
independent communication network. It covers a large
geographical area. For example, network between two
or more countries. A Wide Area Network may be
privately owned or rented. It has lower data
transmission rate. For example, mobile network set up
by BSNL

Internet
Networks all over the world are globally inter connected to form Internet. This is the reason why
internet is called 'network of networks'. Today, almost every computer and handheld
communication device is part of Internet. Computers over internet communicate through
communication protocols.
Internet is one of the most useful technologies of modern times which help us in our daily,
personal and professional life. Internet is widely used by students, educational institutes; scientist
and professionals to gather information for research and general information. Businesses use the
Internet to access complex databases such as financial database. The Internet is the largest
encyclopedia for all age groups. The Internet helps in maintaining contact with friends and
relatives who live across different locations via Internet chatting systems and email software.
Internet is also becoming a major source of entertainment for the general public.
The first workable form of internet came in 1969 with the creation of Advanced Research Projects
Agency NETwork (ARPANET) in USA under the U.S. Department of Defense. ARPANET allowed
multiple computers to communicate on a single network. In 1990s, Internet came in wider use
when computer scientist Tim Berners-Lee invented the World Wide Web.
World Wide Web
World Wide Web (www) is the largest information system on internet. It contains millions of web
sites that provide information in the form of text, animations, pictures and videos. Thus, it is like a
library that contains millions of books or information in the form of web pages.
What is the difference between Internet and World Wide Web? Internet is a massive network of
computer networks. It connects millions of computers together globally, forming a network in
which any computer can communicate with any other computer (as long as they are connected to
the Internet).
The World Wide Web, or simply Web, is a way of accessing information over the medium of the
Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the
HTTP/HTTPS protocol to transmit data.
The Web also utilizes browsers, such as Internet Explorer or Mozilla Firefox, to access Web
documents called Web pages that are linked to each other via hyperlinks.
Advantages of networking
Data Sharing: One of the most important uses of networking is to allow the sharing of data. User
scan send text files, spread sheets, documents, presentations, audio files, video files, etc. to other
users.
Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared.
For example, instead of purchasing 10 printers for each user, one printer can be purchased and
shared among multiple users thus saving cost.

197
Web Applications and Security 5
Internet Access Sharing: You can purchase a single Internet connection and share it among
other computers in a network instead of purchasing multiple Internet connection for each
computer. This is very commonly found in Internet café (browsing centres), schools, colleges,
companies, etc.
Usage of network based applications such as web browsers, email clients, chat application,
audio & video calling, remote desktop applications etc. is another advantage.
Getting Access to Internet
To connect your computer with internet you need some additional hardware and software. These
are as follows:
¤ A telephone or cable line or a dongle (internet data card) for internet connection by the
Internet Service Provider.
¤ A modem: Modem is a device that enables a computer to transmit the data through telephone
or cable lines. A modem modulates outgoing digital signals from a computer to analog signals
for a conventional copper twisted pair telephone line and demodulates the incoming analog
signal and converts it to a digital signal for the digital device. Modem can be wired (Digital
Subscriber Line, dial-up, cables) or wireless (Wi-Fi, 3G/4G etc.).
¤ Software (browser): A browser/web browser is an application software that is used to access
the information (web sites) on the web. Mozilla Firefox, Internet Explorer, Google Chrome,
Safari, Opera are some commonly used browsers.
Internet Service Provider
A company or organisation that provides the access to internet. Access is provided through a cable
and a modem that connects your computer with the service providers internet server. Connectivity
provides a wide choice of data transfer speed and other services along with internet access. The
kind of connectivity available to you depends connectivity facilities in your area.
Types of Common Internet Connectivity
Connectivity to internet can be broadly categorised into wired and wireless. There are different
types of Internet Connectivity available today; it can be widely categorized into wired and wireless
access. Following table is a summary of different types of Internet connectivity categorized into
wired and wireless:

Technology Type of Connectivity Speed

Dial-Up Wired 56 Kbps approx.


DSL Wired 5-35 Mbps
Cable Internet Access Wired 100-300 Mbps
3G/4G/5G Wireless 8/28/280 Mbps approx respectively.
WiMAX Wireless Up to 75 Mbps
Wi-Fi Wireless 50-2000 Mbps
Some of the commonly used Internet connectivity are:
Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities of the public
switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP)
via telephone lines using a device called MODEM. Users dial a particular number provided by the
ISP and gain access to the Internet.

198
5 Web Applications and Security
Dial-up connections are extremely slow and in most cases, it is replaced by a high speed
connection such as DSL or Cable Modem.
DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires of
a local telephone network. DSL service is delivered along with wired telephone service on the
same telephone line. On the customer premises, a DSL filter removes the high frequency
interference, enabling simultaneous use of the telephone and data transmission. For using a DSL
connection, you need a DSL modem and a subscription.
Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses
the cable television in frastructure. Cable Internet Access is provided through existing cable TV
networks; this is similar to DSL that is provided over existing telephone lines.
3G/4G/5G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile
telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G
mobile telephony communications protocol that allows higher data transfer speeds and capacity.
3G can transfer multimedia at very high speed rate. Advanced forms of 3G are 4G and 5G.
While 3G speed is 8 Mbps, that of 4G is 28 Mbps. 5G promises to be 10 times faster than 4G. If your
mobile device supports any of these, you can subscribe for them with your ISP in order to get high
speed Internet connection on your phone.
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless
communications standard designed to provide mobile broadband connectivity across cities and
countries through a variety of devices. WiMAX is a long range system, covering many kilometres
and is typically used where DSL or Cable Internet Access cannot be used; this could be difficulty in
laying out cables for home or offices located in remote locations but need access to the Internet.
WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or
mobile phones to exchange data wirelessly over a network, including high-speed Internet
connections. Wi-Fi devices such as personal computer, smart phones, video game console, etc.
can connect to a network resource such as Internet through a device called the Wireless Access
Point (WAP). Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas)to
provide network and Internet access. Wi-Fi can also be used where users require mobile
connectivity. Wi-Fi connectivity is used in home & offices, hotels, college & school campus
typically for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi
access to the Internet for their customers.
Data transfer on the Internet
Let us see how a piece of data, say a Web page, when it is transferred over the Internet:
¤ The data is broken up into bits of same sized pieces called packets.
¤ A header is added to each packet explaining where the data has come from, where it should
end up and where it fits in with the rest of the packets.
¤ Each packet is sent from computer to computer until it finds its destination. Each computer on
the way decides where next to send the packet. All packets may not take the same route.
¤ At the destination, the packets are examined. If any packets are missing or damaged, a message
is sent as king for them to be re-sent. This continues until all packets have been received intact.
¤ The packets are now reassembled into their original form. All this is done in seconds!
To access the Internet, you need an active internet connection. You need to gather and
understand your requirement carefully before subscribing to an internet connection plan. In this
exercise, you will learn how to choose an Internet connection.

199
Web Applications and Security 5
Some of the common questions that help you in your decision are:
¤ What is the purpose of getting this connection?
¤ Will you use the connection regularly?
¤ How much data will be downloaded on an
average per month?
¤ How much speed do you need?
¤ What technology is available in your
particular area?
¤ What are the different plans available from
the ISP?
¤ Is there any limitation or catch for the
selected plan?
Use the following table to compare different
subscription plans to get an estimate and
analyse if that would suit your requirement.
To access Wi-Fi, you need an access point with an active Internet
connection. Usually when you subscribe to an Internet connection,
the ISP provides options to purchase or rent a Wi-Fi router that can
act as both an internet connectivity device and an access point for
Wi-Fi connectivity. Setting up a Wi-Fi network requires technical
expertise; how ever, you can access the Wi-Fi network by
connecting to an access point that is already setup for use. On
computers that run Windows, you can view the list of wireless
networks available by using the following procedure:
Windows will display the list of available Wi-Fi networks; you can
choose any of the connection from the list. Select by Double-
clicking on the name displayed in the list.

EXERCISE
1. How is internet different from the network in a closed, small area like your computer
lab?
2. How WWW is different from internet?
3. What is a modem?
4. What is the role of internet service provider in accessing internet?
5. How does data travel on internet?

Session-3 Introduction to Instant Messaging


Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.

200
5 Web Applications and Security
Most instant messaging software include the option for performing file transfers, audio chat, video
calling and conferencing, sharing desktops, etc. a part from standard text chat. Instant messaging
software is widely used for personal and commercial use. In this session, you will be introduced to
the concept of instant messaging, the steps to create an instant messaging account and also work
with instant messaging software.
Unlike email, instant messaging happens in real-time and the response from participants can be
spontaneous. Some instant messaging software allows users to view messages received when they
are not logged on. These are called “Offline Messages”.
For utilizing audio and video chat or conferencing, you need to have microphones and headsets
or speakers and web cameras so that users can talk or see each other.
Key features of an instant messaging are as follows:
¤ Text Messages can be sent to one or more person (Similar to SMS).
¤ Audio calling and conferencing.
¤ Video calling and conferencing.
¤ File transfers (Not limited to documents, spreadsheets, audio files, video files, etc.).
¤ Message history (Save messages for future reference).
Instant Messaging Account
Participants messaging to each other need to be signed in to the same instant messaging software.
To use instant messaging software, a user must have a valid instant messaging account.
Instant messaging accounts differ in formats; some instant messaging software such as Windows
Live Messenger use email addresses for managing the account and software such as Skype use
standard names.
Instant Messaging Services
There are two kinds of instant messaging software – application based and Web based.
¤ Application based instant messaging software is downloaded and installed on user's computer.
Some of the popular instant messaging software are:
l Google Talk – Now known as Google Hangout.
l Yahoo! Messenger (now discontinued).
l Skype.
l Windows Live Messenger.
l RediffBol, etc.
¤ Web based instant messaging software is accessed using browsers such as Internet Explorer,
Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging
software are:
l Meebo.
l MSN Web Messenger.
l IMO, etc.
Instant Messaging with Google Hangout
Google Hangout was earlier available as an installable application GTalk. Hangout provides
chatting, voice calls and video calls for free over Internet.
This facility comes along with the e-mail account. Besides Google Hangout, Facebook Instant

201
Web Applications and Security 5
Messaging,WhatsApp, Skype provide this facility on different interfaces.
To use Hangout, login to your Gmail account. You will see your hangout connections on the right
hand side as shown here.

To begin conversation follow the steps below:


1. Click on Search button to search and send the
chatting request to someone, who is online.
2. Type the name or email address of the person and
press Enter key.

3. If the person or email address is found, the name


and profile image appear on the left pane and
chatting window appears on the right of the
window. Here you can start text chatting.

LAB EXERCISE
Go to Gmail and create an account if you do not have already.

Session-4 Chatting with a Contact - Google Talk (Hangout)


To chat with someone, the person needs to be online. When
you see the person online, you will see a green dot beside the
name of the person.

202
5 Web Applications and Security
To begin chatting, double click on the contact
name. A chat window will popup where
messages can be typed, sent and seen.

Chat Etiquettes
1. Messages should be short and to the point.
2. Always introduce yourself by name if your
screen name doesn't reflect it.
3. Always ask if the other person has time to
chat first-regardless of how important you
think what you have to say is, it's not going
to be well received if the recipient is busy.
4. In a business environment, know exactly
what you want to discuss.
5. TYPING YOUR MESSAGES IN UPPER
CASE is extremely rude-it's considered
shouting and very aggressive.
6. Give people time to respond - Multiple
questions sent to a recipient before they've
had a chance to answer can seem more
like an interrogation rather than a
conversation.
7. Wherever possible, give the person you are communicating with your undivided attention. It's
not just a sign of respect, but if you have multiple conversations happening or are allowing
other issues to distract you, you may miss an important point in the other person's messages
or lose the gist of the conversation.
8. It's important to properly end an IM conversation - you may think the chat is over, but the
other person may not. While you're off doing other things, they may be sitting there staring at
the screen waiting for further communication from you!!

LAB EXERCISE
Go to Gmail and practice instant messaging with some of your classmates with teacher's
permission.

Session-5 Creating and Publishing Web Pages - Blog


A blog is a discussion style site used by non-technical (and technical users) users for creating
personal web pages. Blogs are similar to an online personal diary and simple to use.
You can use a blog to convey messages about events, announcements, news, reviews, etc. Blogs
are usually managed using a web browser and this requires active internet connection. You can

203
Web Applications and Security 5
also use off line blog software to create content first and later publish the content when an active
internet connection is available.
There are hundreds of websites that offer blog service for free. Some of the popular blogs include:
• www.WordPress.com
• www.blogger.com
• www.blog.com
• www.weebly.com
• www.blogsome.com
Creating a Blog Account
Let us learn how to create a blog account on WordPress.
1. Open the browser and go to https://wordpress.com/
2. Click on Get Started on top right corner.

3. Fill the simple registration form mentioning your email


id, username and password. Then, click Continue.

4. You email inbox will receive


an activation mail from
WordPress which you need
to confirm by clicking Click
here to Confirm Now.

204
5 Web Applications and Security
5. Fill in Create Site form and click on Continue.

6. Enter blog address for your site and click on Create for free account.

7. Click on Start with


Free choice.

205
Web Applications and Security 5
Starting with New Blog Post
1. In your account page, click on Add beside Blog Posts.

2. This will take you to the post


editor where you mention the
title of the post and the content.

You can format the content


using various controls given on
the top toolbar.
You can preview you post before
publishing to have an idea how
it would look like finally.
You can click on + Add to insert
audio, video, images and other
controls in your page.

3. Once you finish writing your post, click Preview


to see how your post looks like and whether you
need further edits in it. Once finalised, click on
Publish… to publish the post on the web.

You can decide to publish immediately or any future date. Click on green colured Publish!
button. It will show your published page. Click on Visit Site.

4. Your final published post


will be displayed which
you can share with
others.

206
5 Web Applications and Security
Posting Comments on Other Posts
When you visit other blogs and read posts,
you can post comments on the post. The
options for posting comments are usually
given at the end of the post which you
might find after scrolling down the post
page.
Key in your comments and details and click
on Post Comment.

LAB EXERCISE
1. Go to WordPress or Blogger.com to create a blog account and create a small blog
post about your school.
2. After publishing blogs share it with your classmates online through Facebook. Post
comments on each other's blog posts.

Session-6 Using Offline Blog Editors


Offline blog editors can be used that can be
installed on your computer and you can use them
to draft your blog posts without having to connect
with internet. When your post is finalised, you can
connect with internet and publish your final post.
Some popular offline blog editors are Windows
Live Writer from Microsoft, Qumana, BlogDesk,
Blog Jet and Weblog. Weblog extrension can be
installed in Writer for blog publishing but here we
shall see how to use MS Word to create a blog
post. You should have an online blog account
already before starting with offline blog editor.
Publishing Blog from MS Word.
¤ Open MS Word 2013.
¤ Go to File tab >New option.
¤ Select Blog Post template.

207
Web Applications and Security 5
Click on Create in the popup.

MS Word will ask you to register


your online blog. Click on
Register Now.

In New Blog Account dialog box,


select WordPress.

In New WordPress Account dialog box, enter


your blog post URL and login credentials of
your blog site.
Working with Blog
You can create a new blog post just like you
create any Word document with pictures,
SmartArts, Shapes, ClipArts, etc. or you can
open existing post to edit from your blog site.

Publishing a New Blog Post


Once your blog is ready to publish. Click Publish option in Publish
drop-down in Blog group of Blog Post tab.

208
5 Web Applications and Security
The post will be published and an
update will be displayed on the page.

Clicking on Home Page option in


Blog group of Blog Post tab will take
you to the online home page of your
blog in the browser.

Editing an Existing Blog Post from Blog Site


1. In Blog group under Blog Post tab, click on Open
Existing option.

2. In Open Existing Post dialog


box, your online posts will be
listed. Select the desire post and
click OK.

3. Selected post will be opened for editing.


Make changes and publish it again.

209
Web Applications and Security 5
Working with Qumana
Qumana can be downloaded and installed from https://www.softpedia.com/get/Internet/News-
Newsgroups-Blog-Tools/Qumana.shtml
Qumana makes blogging very easy. You can add pictures, audio, video and images to your blog.
You can easily manage you blog and publish it online.
Once installed, open Qumana by clicking Start > All Programs > Qumana > Qumana or by
clicking Qumana shortcut on the desktop.
Connecting with Online Blog

1. On first start, mention your


blog's address in Add Blog
Wizard and click Next. It will
automatically locate your blog.

2. Enter login credential of your


blog site and click Next.

3. Blogs on your site will be listed.


Select the blog you need to
work with and click Finish.

210
5 Web Applications and Security
Qumana interface will open up listing your blog posts.

Editing Blog Posts


1. In the list of your blog posts, double click on the one you wish to edit. It will open up in the
editor.

2. Make changes in your post in the editor. You can use formatting toolbar. If you have basic
knowledge of HTML, you can insert content with HTML using Insert HTML button at the
top. Insert Ad button lets you insert advertisement in your post page. Once changes are
done, click on Save button to save your post offline on your computer.
Publishing the Blog Post
1. To publish changes to your blog site, click on Update Post button.

211
Web Applications and Security 5
2. Qumana will take a while and publish the changes to your online post.

LAB EXERCISE
1. Go to WordPress, register yourself and create a simple blog.
2. Publish a post using MS Word.
3. Download and install Qumana.
4. Use the editor to connect with your online blog.
5. Edit the online blog created in previous session using offline editor and publish the
changes.

Session-7 Online Transactions


Online shopping is a form of electronic commerce where customers can buy or sell goods over the
Internet. Customers need to have an active internet connection for viewing goods or services
offered by a seller; customers can pay online using a credit, debit card.
Online shopping could be useful in situations when:
¤ A customer does not have sufficient time to visit stores.
¤ Visiting a store is more expensive than purchasing a product online.
¤ A product or service that is not available in the local market is available online.
Some of the popular online transaction websites are:
¤ IRCTC, an online portal for booking flight and train tickets.
¤ Flipkart, an online shopping portal for buying consumer products.
¤ eBay, an online portal for buying and selling goods.
¤ Redbus, an online portal for booking bus tickets.
To perform an online transaction, all you need is a web browser and an active internet connection.
In some cases where purchasing is involved, you will need a valid credit card, debit card or online
banking support referred to as Net Banking Subscription. Some websites even allow COD (Cash
on delivery) where the users can pay once they receive the product or service.
A Basic Online Shopping Process
All online shopping websites follow following standard shopping process:

212
5 Web Applications and Security
1. User registers on the website.
2. User searches for products and browses through product catalogues.
3. User selects, reviews and adds the products in online shopping cart.
4. User reviews the cart and finalises the products in the cart.
5. User fills in the shipping address.
6. User fills in the online payment details.
7. User furnishes the payment and checks out.
8. Website sends SMS and Email to the user, acknowledging the payment received and
regarding the dispatch of the products purchased.
9. Finally, products are delivered to the dispatch address.
Let us understand this process with Amazon.in.
Online Transaction Using Amazon
Amazon is one of the premiere online stores where you can purchase a variety of consumer goods,
books, apparels, mobile phones, groceries, toys, sports goods and several other goods.
Amazon offers multiple payment methods like credit card, debit card, net banking, e-gift voucher,
and Cash on Delivery.
You can make purchase and transactions on Amazon without registering but every time you make
payments you will have to enter all your details again hence otos recommended that your create
an account on Amazon.in and log into it to make online purchase.
Shopping on Amazon.in
1. Open any browser and go to www.amazon.in.
2. Bring the mouse pointer over Your Orders and click on Sign In to login to
your account.
3. On next page enter your email ID, click Continue, enter your password and
click Continue.
Amazon home page will provide you a wide variety of products organised into
various categories. Page also displays various deals.

You can also search for the products from the search bar at the top which
provides choice for product categories.

213
Web Applications and Security 5
Browsing Product Catalogue
Products in a catalogue can be sorted according price, reviews and popularity. You can narrow
down your search on the basis of manufacturer, product price range, discounts, availability etc.
The catalogue interface is seamlessly provided with search, links and category choices that your
can easily look around.
Shopping Cart and Wish List
When you click on a product or its image, its features, any technical details, discount schemes,
customer reviews and payment options are displayed on a new page.
It is not necessary to buy the products immediately. You can add the product into a wish list to
review it later. If you like the product, you can add it to your shopping cart and continue shopping.
Finally, you can decide which products you really need to buy and delete rest from the cart. Once
your shopping cart contents are finalised, you can proceed to payment.

Viewing Shopping Cart and Purchasing


To visit your cart, click on Cart link at the top right corner.
This will take you to your shopping cart listing your items.

With each item, there is Delete link to remove the item from the cart.
Once finalised, click on Proceed to Checkout button.
Enter your Delivery address and Shipping preferences. Amazon will
save it for future use. Click Continue.

Select Payment options through all standard credit and debit cards,
Netbanking, EMI (if applicable), Cash on Delivery, Gift Cards, Vouchers
etc. Select the suitable method and click Continue.

214
5 Web Applications and Security
Fill on your payment details like card details, login credentials etc. Click
Continue. On next page, click on Place Your Order and Pay. This will
take you to the payment gateway and once the payment is successful you
will receive an acknowledgment mail regarding product, payment and
delivery details.
Online Transaction for Booking Rail Tickets
Let us see how we can use an online ticketing service for booking train
tickets. Here we shall use IRCTC website for this purpose.
Open the browser and go to IRCTC website: https://www.irctc.co.in
On website's home page, fill in the details of your journey like cities to
travel from and to, date of journey and preferred travel class. Then, click
on Find trains. You can login into IRCTC account which you may have
created earlier. Registering on IRCTC is the same standard process as on
any other public services website. To login, click Login option in the drop-
down menu on top right corner.
The trains will be listed. Click on Check
Availability to check the seats available. You can
change the travel class to check seats for other
classes. Once you decide to book a seat, click on
Book Now.

215
Web Applications and Security 5
On the next screen,
fill the passenger
details as shown
here. If you have
passenger details
already saved in the
website then you
can pick up details by clicking My Saved Passenger(s) List. To add more passenger details, click
on Add Passenger.

Scroll down, fill in mobile number and captcha details and click Continue Booking. Review
booking page will appear. When sure, click on Continue Booking.
On payments page, select the suitable payment
option for example Net banking, select the Bank
and click on Make Payment.
This will take to the payment portal. Furnish the
payment and your ticket will be displayed to
download and print.

Viewing Transactions
In the main menu, click on
MY ACCOUNT and hover
mouse pointer on My Transactions. You will see choices namely Booked
Ticket History, Failed Transaction History, Ticket Cancellation
History. You can select the desired choice.

LAB EXERCISE
1. Create an account on any online shopping site of your choice with teacher's
permission. Add some items in shopping cart, go upto payment option and then
logout without buying the items.
2. Register yourself on IRCTC website and practice booking a ticket. (Do not book
actual ticket. Stop when payment page appears.)
3. Check you email ID of there is any mail from shopping website and IRCTC.

Session-8 Internet Security


Internet security refers to computer security especially when we are
online on Internet. It often involves browser security but also
network security. Internet security is to establish preventive
measures against attacks from hackers, phishers and online

216
5 Web Applications and Security
scammers. The Internet is as secured as safely we use it. Exchanging information may often
involves high risk of intrusion.
Though Internet is a valuable and vast source of information. It is also the most preferred source
and virtual place of entertainment. But it makes your computer prone to many online threats.
Ensuring security of our login credentials on various sites like bank sites, our credit card and online
banking information from unauthorized users is a must. Some web sites can also install Malware
on the computer without user consent thereby leaving the computer damaged or insecure.
Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of
users getting compromised.You can reduce the risks by using best practices such as using Antivirus
Software, Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading
awareness of the best practices.
Best Practices for Security
Use strong passwords, with combination of letters in both cases, numbers, and special characters
which makes a password difficult to crack or guessed by others. Do not keep easy-to-guess obvious
passwords like your birth date, birth place, friend's name, relative's birth date, mobile number etc.
Change your pass word frequently at least monthly or fortnightly.
Most web sites like Gmail, Facebook, bank web sites and important transactional web sites check
for password effectiveness when you register for the first time or change the password.
Following is a general guideline for managing strong passwords.
¤ Password length should be at least 10-15 characters if possible or allowed by the website or
software.
¤ Do not repeat password while changing them. Many bank web sites do not allow this.
¤ Pass words should be a complex combination of numbers, letters and symbols.
¤ Avoid using same password for multiple sites.
Example of a strong password is k3xP%,7Ym[}
Web sites such as www.strongpasswordgenerator.com help generate random strong pass
words. Go to www.strongpasswordgenerator.com and click Generate strong password. The pass
word will be displayed.
Regular Data Backup: Regularly backup your data on an offline storage like external drive, disc
or tape drive etc. You can restore it in case of data loss or computer hard drive crash. Keep the
back up in a secured place away from unauthorized users.
Encrypt Data by using a good encryption software. Some operating systems provide this feature
also.
Secure your user name and password: Never save your security credentials in a place or
location, which is shared among others such as cybercafé, shared drive etc. Do not set your
browser to automatically login to your bank sites for automatic logon. Every time you visit such
site, type the password always.
Do not share personal data; web sites require you to fill out forms containing fields such as name,
gender, age, email address, school, etc. Be cautious when filling out such forms; research and
verify if it's a trustable web site. Your email addressed could be used by unauthorized users to send
you fake or unwanted emails; think twice or thrice before providing information to any website
and decide if it is really necessary.
Secure transactions: If you are using online shopping or transactions, web sites even store your
credit card or online banking personal information such as your credit card number, account

217
Web Applications and Security 5
details, etc. This information can be tracked and used by un-authorized users often known as
hackers to misuse this information.
Again, ensure the web site is legitimate and uses secure practices for performing and maintaining
online transactions. Since information such as credit card details or personal information is sent
over the network, it is always recommended to use only secure web sites for such transactions.
Verify if the web site uses secure transaction; usually it is indicated through a digital certificate
represented as a golden lock in the web browser's address bar.
Use antivirus and antispyware software, computers are prone
to attacks from software known as Malware that could har my our
computer. Malware track browsing be havior or transmit personal
data from your computer; programs such as key loggers could be
in stalled on your computer track and transmit every key that is
pressed on akey board (keystrokes) to unauthorized users.

Antivirus and Antispyware programs also offer real-time protection


monitoring your computer for any changes by malware software.
Keep your Antivirus an Antispy ware software always up to date, this
can help in protecting your computer from recent threats.

Do not immediately respond to mails from unknown users, it may be a


fake mail trying to gather personal information such as your bank
account details, home address, etc. Some mails could promise you jobs
or announce lottery results which in turn could compromise the user.
And in some cases, virus or scripts that are dangerous could be attached
to the mail; NEVER open the attachment from an unknown source.
Clear browser cookies frequently, cookies are programs that are created on your local computer
when you visit web sites. Though cookies are meant for storing data based on your activity
performed during your earlier visit such as logon details, details of as hopping cart, visited pages in
a website, etc. they could also be tracked by unauthorized users and possibly gain access to your
personal information.
Keep the operating system and software applications up to date; though
operating systems and applications are designed, tested and distributed,
sometimes they may have security holes through which a hacker can take
advantage; they may track and gather information or even damage the
whole computer. In general, most vendors notify the users whenever a
security hole is identified and an update is available to address that
particular issue. You can also visit respective vendor's website to check if
there are any updates available, download and keep your operating system
and software applications up to date, free from security holes.
Install Firewalls: Firewalls could be software or hardware and can assist in keeping a computer
and a network secure. Firewalls analyze the network traffic and determine if the traffic should be
allowed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall
software as a part of operating system thus keeping the computer secure. In rare cases, you may
need to configure your firewall for additional security.

218
5 Web Applications and Security
Never install software from unknown sources as they might not be
trust worthy; download only from well-knownorreputed web sites.
Verify the source if it is legitimate by searching the internet or referring
to comments from other users before downloading them; understand
the nature and the purpose of the software before attempting to
download and install them.
Secured Socket Layer Certification is done for web sites by known
authorised Certification Authorities (CA). CAs do not issue SSL certificates to phishers, spammers
or any agency that is not properly identified and cleared. Check the website's certificate icon of a
padlock in the address bar. All secured web sites have SSL (Secured Socket Layer) certificates. If
padlock icon is of open lock then website is not secured and must be left immediately.
Remove unwanted or unknown software applications; these might have got installed without your
knowledge when you have visited some web sites. Unwanted software could get installed as they might
have been bundled along with necessary software. Some programs such as toolbars get installed usually
through bundled software and are programmed to send personal data without your consent.
Cyber Bullying
Any sort of threat or harassment over internet is the act of cyber bullying. Messages in bad taste
and intentions, online mockery in friend groups or circles, stalking someone's online profile and
trying to post unwanted updates, sending unsolicited private messages, videos, and pictures are
considered as Cyber bullying that affects young minds intensely even up to the threats of death.
Protection from Cyber Bullying
¤ Children must know that their parents and teachers are always available for them when they
face such problem.
¤ Children must know that no matters what, parents and teachers are their first support.
¤ Children should inform their elders about any incident that sounds nasty even remotely.
¤ Children must know the fact that cyber bullies are not capable to do any harm and they can
never carry out their claims of harming someone.
¤ Children are advised to block such intruders immediately and never entertain them.
¤ In case of cyber bully attack, save all his/ her messages offline as evidence for later use.
Malicious Smartphone Applications
Many smart phone applications seem attractive but in fact contain malicious code that
steals information stored in the smart phone, such as the address book data without
the owner's knowledge. The personal information stolen this way is forwarded to the
hackers who abuse it to commit cyber crimes such as spam operations, billing frauds
and cyber scams. Every trending app is not worth downloading.
Smartphone Safety Measures
¤ Set up emergency numbers for instant calling.
¤ Do not use cell phone everywhere – keep your senses free to perceive other stimuli like while
crossing road, driving, using escalators, crowded areas etc.
¤ Get rid of unwanted data as soon as possible – keep your phone data tidy.
¤ Protect your phone from physical theft. Make it a habit to check while leaving any place.
¤ Keep good password and pattern protection.
¤ Keep the antivirus and software updated.

219
Web Applications and Security 5
¤ Sign out of and close the apps that are used.
¤ Avoid automatic download settings.
¤ Keep your wireless access secured.
¤ Do not install just any app impulsively or in peer pressure.
¤ Keep a regular backup of your phone data.
Clearing Data Stored In Browsers
Web browsers have built-in password management designed
to store passwords used informs on web sites.
Browser soften prompt to save user name sand
passwords when users attempt to logon to web
sites. This facility is offered to users, so that they
can logon to their frequently used web sites
without having to type the user names or
passwords. However it is not advisable to leave
the web browser store this data particularly on
public or shared computers.
To clear personal data from a web browser such
as Google Chrome, launch the browser.
Click Tools Menu > More Tools > Clear Browsing data…
The next window will show various options to clear Browsing History, Cookies and Cache.
You can make changes in Privacy settings according to your preferences.

LAB EXERCISE
Visit security options of Internet Explorer and note down your observations in notebook
like how history settings are changed, how cookies settings are changes and how other
security levels are setup in Internet Explorer.

Session-9 Workplace Safety


People on a workplace are important asset of the company they work for. In addition to this,
workplaces may have other people also involved such as students in schools, patients in hospitals,
customers in a bank and clients in other working places. So, workplace safety is not an issue
concerning only the people who work in a particular place but everyone who is present at the
workplace due to one reason or other.
Why Workplace Safety is Important?
Safety is always an important issue in every aspect of life owing to the reason that it concerns the
living beings directly. A safe environment is what everyone looks for and wants to be in. Workplaces
are very dynamic in nature and depending on that they can be very crowded too. So, a place that
involves dynamic interaction of people at work needs to be safer for all people concerned.
A safe working environment ensures better work performance and efficient workforce. It is the
responsibility of every organisation to provide as much as it is the right of every working person to
have a safe and healthful working environment.

220
5 Web Applications and Security
Safety Issues and Workplace
As we learnt that workplaces are mostly dynamic in nature and depending on that, their
environment varies. Think of a small stationery shop manned by two people at one hand and on
the other a busy railway platform buzzing with the crowd of passengers arriving and leaving, along
with vendors, staff and security personnel around. Quite a contrast! Isn't it? So, you can now figure
out that certain workplaces could be quiet like, offices and libraries while some workplaces are
moderately noisy and crowded such as shops and restaurants, yet some workplaces like hospitals,
public transport stations, factories, mines, construction sites, packaging units, ware houses etc.
work under stringent safety controls.
What is of importance is the safety of each and every individual directly or indirectly related to the
place of work. For instance, hospitals have responsibility of safety not only for their staff but also
for the patients and the visitors. So does for airports, railways and bus stations for passengers,
shopping malls for shoppers, restaurants for customers, schools for students, recreation parks for
children and the likes.
Safety Hazards
Preventing and protecting against a threat or hazard needs the knowledge of kind and nature of
the threat. Knowledge helps in devising effective safety measures and rules. Nature of workplace is
the prime factor that decides the kind of threats to the safety of the people present there. In highly
sophisticated workplaces such as laboratories, construction sites, mines and manufacturing expert
guidance and vigil are needed to ensure safety and a strict code of conduct is followed in
complying with the safety rules and regulations. In certain specialised cases, breaching such rules
may be considered as criminal offence. Comparatively common workplace areas such as schools,
offices and shops need not to have such extensive safety measures but they do need to follow
certain basic and mandatory safety practices on regular basis. Some common workplace safety
hazards are related to the following items or factors:
Fire: Fire has the most devastating effect. In absence of appropriate safety measures, it is like
inviting the trouble knowingly. Fire safety must be the prime concern for every domestic and
commercial place. Protection against fire is the part of basic rules and guidelines of safety. A
sudden outbreak of fire catches the people off-guard and by the time they react, it spreads. In
certain areas like mines, paper and garment go-downs, confined places like elevators, theatres and
washrooms, oil-rigs, fuel stations, chemical laboratories are most prone to complete devastation by
fire. If fire breaks out in such places and adequate means of safety are absent then such places
succumb completely to the raging fire in no time.
Electricity: We tend to take this silent monster very lightly and in most of the cases, victims hardly
survived. Today, quality electrical equipment and fittings are installed which make us little inadvertent
in using them. This makes us overlook certain trivial danger signs such as broken sockets or wire-
casings, water leakage near the electrical fittings, wires exposed due to rodent-bites, wear and tear of
the old fitting and wirings etc. Other reasons behind a safety hazard due to electricity are misuse of
allocated power (using high voltage equipment over a low voltage line) leading to short-circuits,
equipment and fittings in the reach of children, deployment of untrained personnel for repairs and
poor fitting layout design. Careless handling of equipment. For instance, using a hair-drier casually in
the bathroom or handling electrical fittings barefoot standing on the naked ground. Electricity
accidents, like short-circuits, may cause fire, leading to more destruction and loss of life.
Unsafe places: An unsafe place could be as ordinary as a narrow passage cluttered with a stack
of heavy cartons or as dangerous as several feet below the ground in a coal mine. A construction

221
Web Applications and Security 5
site is a life-threatening place for untrained, unequipped and casual individuals. Like construction
sites, factories and warehouses have two major threats – heavy objects and moving objects. For
example, heavy containers and fork lifts. Confined places like narrow passages, operation theatres,
air-locked rooms, bank safes, freezers and cold storages, driver's cabin, cockpit, soundproof cabins
and basements – parking, go-downs, mines – all such places turn out to be hell holes when
disaster strikes. Certain places are unsafe due to hazardous nature of the work such as virus
medical research centre, nuclear plants and machinery, blast furnaces, refineries, work involving
dust, smoke and other particles in the air, work involving high decibel noise due to heavy
equipment like drilling machines and hammers, life threatening sites such as underwater, space
research, outer space missions, extreme heights and extreme weather conditions (desert, north
pole etc.), places which bring workers in contact with harmful diseases – people working for
patients during a pandemic such as recent Covid-19 virus etc.
Tools and Machinery: Various trades use different kinds of tools, machines, gadgets and
instruments. Using certain tools and operating specific machines needs right kind of training and
methods. Tools pose a threat if they are not used in the adequate manner, machines can create havoc
if they are not worked with adequate skills. Mishandling of these leads to the dangers for the people
on the workplace. Certain examples are heavy drills, cranes, trolleys, furnaces, medical equipment,
forklifts, indoor carriage cars, push carts, carpentry tools etc. Working with a tool or a machine is as
safe as the level of skill and knowhow of its operator. Proper placement and location of the
equipment is also necessary. Distractions while operating them may also lead to accidents sometimes.
Ergonomics: There are certain ways to operate equipment and right kind of postures to assume
while working. A person merely sitting in a chair, typing on a computer is exposed to the effects of not
using the equipment properly and not assuming the right posture. The correct posture of working on
a computer, correct posture to man a vehicle, correct pose to handle an equipment come under
ergonomics. The quality of a product is also determined by its ergonomic design. A chair meant for
sitting for longer hours by a data entry operator will be different than that meant for a person working
on a loom. Ergonomics involves both – the right product design and the right posture to work.
Slippery and unsafe passages: A simple slip may cause a broken hip or elbow. Businesses
involved in show and display such as hotels, malls, restaurants and other such places have more
reasons for accidents due to a sudden slip. Imagine a slip and topple from the third floor of a mall
down to the ground floor or a slip over the moving escalator. Passages partially blocked by
discarded stuff like broken furniture or wooden cartons. Untidy narrow pathways due to poor
housekeeping. This is the reason that in certain professions, personnel are trained into handling
equipment in narrow passages like the passage in aeroplanes, crowded places like restaurants,
moving trains. All such workplaces made of slippery floors need extra care and caution for the
people who work there and the visitors.
Crowd: Overcrowded workplaces may cause different kind of threats but they are more of a big
disaster in other kinds of threats such as fire breakout or stampede. Crowd makes an emergency
situation worse. Law enforcement professionals and workers many times deal with crowd.
Crowded hospitals are a common example. Such places need discipline and a code of conduct for
restricted movement as well as authorised access to specific areas. Crowds on railway platforms
and over bridges many time lead to accidents.
Hygiene and health: People in healthcare, medical profession and scientific research are
exposed to infections, radiations and other similar threats depending on where they work. A strict
regime of discipline and safety measures are needed to be followed in such places. People not
trained into working at such places pose greater threat.

222
5 Web Applications and Security
Training and capability of staff: Certain businesses sometimes compromise on the adequate
training, capacity and skills of the working staff due to budget constraints or short-sighted business
decisions. This leads to accidents. In certain businesses it is more of a mortal threat such as public
transport and commutation services (taxi, school van etc.). There had been a few news of school
van accidents. Capability refers to the physical and mental state of the worker or operator of the
machine. A drunk driver kills self and many others. Lack of adequate staff results in untrained
persons handling the equipment. We have heard cases where an untrained support staff was
caught administering an injection to a patient. All professions involving handing of equipment,
tools and machines need adequate expertise level and certified, trained and skilful personnel to
work. Anything less than this is an open invitation to an accident in waiting.

EXERCISE
1. Imagine a public place which you visited recently. Which safety hazards did you
notice there?
2. What are the common safety hazards likely at a school?

Session-10 Maintain Workplace Safety


As we discovered earlier, workplaces are exposed to different kinds of threats depending on their
nature of business and location. It is imperative to ensure safety of workers and to do so, adequate
safety norms and discipline are followed at workplaces. The safety rules and measures should be
clearly communicated through formal ways and displayed for everyone to see on the workplace.
Let us have a look at some common workplace safety measures.
Suitable safety gear: Certain specialised professions need specific uniforms and safety gears. It's
not only for sportspersons to wear safety gear. Personal protection equipment (PPE), helmets,
goggles, anti-glare specs, thermal safety wear, anti-slip shoes, overalls, anti-radiation suits,
protective boots and gloves, bulletproof and fireproof jackets are necessarily used in various work
fields. For doctors, construction workers, mine workers, engineers, mechanics, housekeeping staff,
computer operators, security personnel, vehicle handlers, packagers, assembly line operators and
factory workers it is necessary by rule to wear adequate safety gear to ensure workplace safety.
Fire safety: It is important to have suitable and adequate fire safety measures. These include the
workplace design and environment as well as safety equipment.
Fire-safe work environment includes:
1. Proper ventilation at workplace.
2. Emergency exits.
3. Safe electrical, LPG and water supply fittings.
4. Suitable safety against any inflammable material.
5. Means to check and handle overcrowding.
6. Practice of safety rules by all at workplace.
Fire safety equipment includes:
1. Fire extinguishing equipment. 2. Fire alarm.
In addition to the above, the staff should be trained through mock drills and regulations to practice

223
Web Applications and Security 5
safety. People at workplace should know what to do during a fire breakout. Evacuation drills,
demo and practice sessions for using fire extinguishers, instant access to fire fighting services and
medical help, self-management and helping others during the emergent situation etc., equip staff
to handle the emergency adequately instead of panicking and losing control.
General health and ergonomic safety: Nature of work and workplace environment affect the
health of the workers. A conducive work environment is conscious of workers' general health and
its ergonomic aspects. Due to work-specific environment workers may get exposed to different
kinds of health hazards. For instance, coalmine labourers are exposed to poisonous gases, harmful
radiations, inflammable materials etc., sewage cleaners lose their lives due to poisonous gases and
deep running smudge. Such workers need adequate equipment and gear to work.
Hospitals are a dangerous place for the staff who come in direct contact of the patients with infectious
diseases, people working in refineries, chemical plants and dye industry tend to get their respiratory
system infected with hazardous chemical, tiny dust particles and general air contamination, extreme
temperatures may cause discomfort or danger to physical health, Such workers should follow the safety
guidelines such as wearing right kind of PPE, gear and obey the prescribed health measures. People
working behind desks with least or zero physical movement are prone to ailments related to heart,
backbone and neck. Suitable breaks, fitness regime and discipline must be followed by them. Many big
corporates provide gym facility for the employees. Minimised physical activity takes a toll on the physical
fitness. Long durations of standing (shopping mall, food joint), too much physical movements such as by
salespersons, traffic policemen, hotel kitchens, waiters, security guards etc. Suitable breaks, arrangements
for little recreation and physical fitness must be in place for such professions.
First Aid Kit is a mandatory requirement at all workplaces irrespective of their nature and kind
however, it should be equipped with suitable tools and medicines. FAK helps in minimising the risk
of life until the help arrives. It enables the victim to hang on for a little longer time until the real
help is reached. A standard FAK contains the following:
plasters in different sizes and shapes sterile gauze dressings
bandages of different size/shape safety pins
tweezers and/or small scissors alcohol-free cleansing wipes
sticky tape digital thermometer
skin rash cream antiseptic cream/ liquid
painkillers cough medicine
antihistamine cream or tablets small torch
FAKs need to be checked regularly to replace any expired material or to add any new item
depending on the requirements.
Providing first aid: Every individual should know how to provide basic first aid to a victim.
Usually, first aid is a matter of trained persons but a basic training from the right source such as
redcross.org etc. equip a person to become useful during emergency. Depending on the cause of
harm, the patient or victim should be treated properly for the quick comfort and safety. Taking care
of proper air flow (ventilation), comfortable lying down of the patient, applying suitable medicine,
suppressing any bleeding, aiding in respiration, supporting a broken bone, least distressing
movement of the patient are certain basic know-hows that may save a life. The main purpose of
the first aid is to keep the victim or patient alive and comfortable until the adequate health arrives.
Visit www.redcross.org to learn more about providing first aid.
Ergonomic safety refers to the correct way of working with an equipment. It involves body posture,

224
5 Web Applications and Security
duration of working, safety of sensitive organs such as eyes and right skill. For example, to type for
longer duration on a keyboard, one must be trained in the typing skills of specific language
keyboard, the right posture of the body, kind of chair, position of knees and elbows, position of
wrists while typing and using mouse, distance from the monitor, intensity of the monitor glare etc.
need to be considered.
Keyboard
¥ Your neck and shoulders should be relaxed.
¥ Your upper arms & elbows should make a little
more than 900 angle.
¥ Your wrists should be straight.

Mouse
¥ Mouse should not cause pressure on the wrist.
¥ Avoid bulky mouse.
¥ Keep mouse closer to the keyboard.
¥ Elbows should be bent and closer to the body.

Monitor
¥ Monitor should be placed at a distance anywhere between 18 and 30 inches.
¥ You should be able to focus on the screen while still using the back of the
chair and keep your arms parallel to your upper body.
¥ Your eyes should be level with the top of the screen.
¥ Turn the screen brightness down to a comfortable level.

Sitting and Posture


¥ Chair height should be adjustable.
¥ Chair should swivel (rotate on centre) easily and
0
completely (360 )
¥ Chair should have good back support.
¥ You should be able to sit with your feet flat on the
floor (or a footstool) and knees approximately 900.
Mild Exercises (Do not over stretch and do not do with jerk)
þ It is a good idea to take a break of a few minutes for every hour.
þ One by one, gently lower your ears to your shoulders. Repeat a few times.
þ Turn head slowly & look over left shoulder (10 sec) then right shoulder. Repeat a few times.
þ Tilt the head slowly backwards then bring slowly forward to tuck the chin in the neck. Hold for 10
seconds and repeat a few times.
þ Circle shoulders forward several times, then backwards. Repeat 3-5 times.
þ Stretch arms above head, pull elbows behind the head. Hold for 10 seconds and repeat.
þ Go to an open area, swing arms one by one forward & backwards like a windmill. Repeat.
þ Interlace fingers, palms outwards and straighten arms in front. Hold for 10 sec & repeat.
þ Rotate wrists clockwise for 30 seconds than rotate them anti clockwise.
þ Every 20 minutes, look away from the screen at a distant object for 10 seconds.

Safety equipment: It is the responsibility of the concerned business and authorised persons to
ensure that safety equipment required for the work is worn by the workers. Through guidelines,
trainings and checks must be there to ensure the compliance in using the safety equipment. In

225
Web Applications and Security 5
sensitive areas like hospitals, construction sites etc., government regulations need to by applied
and followed. There must be detailed guidelines and stringent discipline to ensure everyone's
safety. People must be educated in realising that safety equipment may slow them down but
prolongs their life span. To stay alive and physically safe are the prerequisites to be of any use to a
workplace. No business would like to have a crippled worker or a worker lost.
Lighting: Workplaces involving late working hours or places like mines, go-downs and basements
need suitable amount of lights for workers to see and carry out their tasks. Improper lighting leads
to visual health issues and low productivity. A well lit room, a mine fitted with moving flash lights,
operation theatre with bright overhead flash lights, a classroom with proper light arrangements are
examples of well-lit workplaces.
Cleanliness and hygiene: Clean and tidy workplaces is a prerequisite for better working
environment. Workplace should be free of rodents and other insects. Regular cleaning of the
floors, working areas, desks and other parts of the building should be carried out. Occasional but
regular sanitisation and disinfection is needed depending on the nature of the workplace.
Cleanliness of the washrooms and other areas is necessary. Adequate arrangements must be there
to ensure that employees could manage hygiene properly. Maintaining a clean and healthy
environment is the responsibility of both the employer and the workers. Suitable guidelines and
rules should be communicated regarding this and management should ensure that they are
obeyed strictly.
Controlled access: Certain organisations and enterprises need to ensure authorised access to
certain parts of the workplace. For example, everyone cannot go inside an operation theatre.
Places like electrical control rooms, centralised machine control rooms, server rooms and specific
floors are kept out of reach from the unauthorised personnel to ensure that entire system runs
smoothly. Large organisations even practice authorised security card-based access into the
working site besides having a detail of security personnel. These measures ensure that untrained,
hostile and unwanted persons should not get in.
Training the workforce: All the measures for ensuring workplace safety fall flat if workers are
not properly aware of them, understand them and acknowledge them. Workers should be
informed, educated and trained into following the safety measures laid out by the organisation.
Formal means of communication, quarterly safety measures quiz and mock drills, evacuation plans
are effective ways to ensure that workers understand and comply with the safety policy and safety
rules of the workplace.

EXERCISE
1. What is the use of First Aid Kit?
2. Discuss in brief the ergonomics related with working on computer.

Session-11 Prevent Accidents and Emergencies


Prevention is better than correction. Safety rules and guidelines, if followed by the word, help in

226
5 Web Applications and Security
preventing major accidents at workplace. That is why mock drills and reminder quizzes are
important. Let us understand some common types of accidents.
Slipping: Wet floors, slippery surfaces, edges of the stairs etc. are common places where a person
may slip and hurt badly. Anti-slip strips and big warning displays prevent such accidents. The grips
on the stairs should be anti-slip. Cleaning staff should clean the floor by putting up warning boards
on every possible entrance of the area being cleaned.
Tripping over: One must be careful while moving in a cluttered place like maintenance rooms
strewn with wires or place with loose rugs. Tripping over sometimes may cause serious accidents
as it leads to falling objects and further damage and threat to life. For instance, tripping over the
wire of a stand-alone fan causing it to fall down may lead to short circuit. Tripping over can only
be prevented through informing all in advance, cordoned off areas, restricted access and suitable
warning signs and most importantly being careful ourselves.
Falling: Falling down from the ladder, edge, roofing and other such unprotected areas may lead
to serious injuries or even deaths in case of dangerous heights. Construction sites, factories,
warehouses, go-downs, mining and digging operations are the sites prone to accidents and deaths
due to fall. People working at heights should be trained and skilled in doing so, they should be
equipped with adequate gears such as safety ropes, helmets, anti-slip gloves and shoes, climbing gear,
anti-slip ladders, walkie-talkie, catching nets and arrangements of instant first aid of advanced level.
Hit by vehicle or falling objects: People should be careful in places like car parking, moving
trucks in a warehouse, loaded truck backing up, fork-lifts moving inside a large warehouse or
store, heavy objects kept at height, rail-carts, carriages and even people carrying some heavy
object. Warning signs placed at conspicuous points, restricted access, localised, in-house traffic
rules, signal controls, suitable announcements on loudspeakers, controlled movement, automatic
warning sirens such as backing up warning callout can prevent such accidents.
Other common workplace accidents are due to electrocution, tools and machine handling, lifting
accidents, common physical injuries and strains, overexertion, inhaling toxic material, crashes,
collision and harms due to high decibel noise, dust, smoke and dirt.
Major accidents include explosions, fire breakout, leakage of hazardous material, electrical surge
and high voltage accidents, mine collapse and underground avalanche, flooding of closed,
congested areas, building collapse and machine-related accidents etc.
Preventing Accidents
Some common preventive measures against accidents at workplaces are listed here.
Safety guidelines, rules and their communication: Workplace should be governed by
standard as well as specific safety rules. Staff should be communicated formally about them and
should also be educated and trained in certain cases through draft policy, email literature, quizzes
and mock drills.
Workplaces should be displayed with conspicuous warning signs, directions, safety tips and
indicators for any diversions during maintenance. For cases where danger can be anticipated,
timely warning should be conveyed to all concerned through most effective channel. One such
example is sending an email to all, informing that staff buses will leave early through alternate
route due to sudden heavy rainfall and water-clogged roads.
Efficient housekeeping should be ensured through trained and skilled staff. Carelessness during
cleaning and maintenance are causes of most common accidents. Housekeeping should have
clear guidelines for standard tasks and rules for safety. Storage of materials, movement and lifting
of heavy objects and use of cleaning equipment should be done in the safest possible manner.

227
Web Applications and Security 5
Preventing unauthorised access through restricted entry with the help of ID cards,
security checks, digital swipe cards, fingerprint scanners, CCTV cameras, alarm systems and
classified, secured areas greatly helps in most of the accidents because it keeps untrained and
unwanted hands at bay. Only required and skilled persons access the place who are aware of
importance of safety for everyone.
Safety guidelines during operations at production floors installed with machines should be
followed strictly. Movements around the machines (slow, vigilant and cautious), proper uniform
(no loose clothing), adequate gear (helmet, eye guards) and careful operation of the equipment
can prevent many accidents.
Risk assessment should be done regularly to understand who are at risk, potential dangers and
possible losses. Such assessments provide clear picture of the safety quality of the workplace and
help in devising effective preventive measures. Identifying safety exits and devising effective
evacuation plans are helped by thorough risk assessment.
Employing trained and skilful personnel ensures that major safety guidelines are taken care
of. Skilled and trained hands are educated in observing safety measures. Regular training of new
staff ensures that everyone at workplace knows how to keep self and others safe and what to do
when emergency occurs.
Discipline, alertness and care are the three basic qualities which help every individual in
maintaining common security. Attitude of the people is of importance here. If everyone is
motivated and encouraged to follow safety guidelines, observe carefulness in daily operations and
show care and concern for others then many mishaps can be avoided. A feeling of responsibility
and professionalism needs to be there in working personnel to cooperate in observing safety at
workplace. Such attitude strengthens the preventive measures otherwise all kinds of safety
measures are not enough to help.

EXERCISE
List any 4 different workplaces you might have seen and suggest how common accidents
can be prevented there.

Buddy System for Workplace Safety


This is an industry standard in workplace safety wherein two co-workers are paired as part of safety
management practice with the responsibility to ensure mutual safety at work place.
The practice of grouping employees so that each member of the work group is observed by at least one
other employee in the work group. The primary purpose of the buddy system is to provide instant aid to
employees in any emergent situation at workplace.
Buddy system is considered an important risk control measure by both government and non-
government organisations.
Pairing is done among the team members working on a same project or work site. In certain cases, one
person is given only the role of ensuring safety. This person is not supposed to carry out the task at hand
as it is done by the other partner. This arrangement is mostly used in the work that involves higher risks
such as working in hazardous environment and dangerous setup. Generally, both the partners carry
out the assigned task while ensuring each other's safety.
This system helps in the orientation of a new joiner in the team. The experienced employee guides the

228
5 Web Applications and Security
newcomer until s/he gets acclimatised with the work environment and risks involved. Later, the
newcomer can also play the role of safety-buddy with the same partner. This arrangement gives an
opportunity to the experienced employee to test his/her skills in doing the role of the buddy.
Buddy system is useful in:
l Reducing risk through safety assistance.
l Helps in monitoring for possible workplace risks and dangers.
l Advising to keep safe from potential exposure to hazards.
l Providing rescue assistance during emergency situations
l Providing instant help such as first aid, evacuation to safety if the partner is injured.
l Raising an alert or alarm to summon help in case of any accident.
Emergency Evacuation
In the event of any emergency such as fire, flood or any such disaster, an emergency evacuation
procedure is a must to ensure that everyone at the workplace is evacuated to safety with least harm
possible. Workplaces should set their own standard policies for handling
workplace emergencies. Employees should be made aware of the policy
and procedures of emergency evacuation. Suitable training, if needed, and
regular drills should be scheduled to assess how effective the emergency
plans are. Regular drills and training helps in preventing as well as handling
an emergency in time. It reduces panic among the people and helps them
use their heads instead of adding to chaos. Evacuation plan also helps in
eliminating or minimising the risks to injury and life.
General Emergency Evacuation Procedure
l Alert everyone by activating the nearest alarm and shout the alert clear and loud. Use any other
procedure set by the safety policy of the workplace.
l In response to the alarm or emergency call/shout out employees should immediately stop all
the work and collect personal valuables.
l Ensuring one's own safety, one should assist others who might be in immediate danger or need
any immediate aid.
l Ensuring one's own safety and if necessary, then check or curb any activity that may pose threat,
become hazardous or cause damage if left unattended during evacuation.
l Comply to the emergency instruction issued by designated control personnel until you reach to
the safety.
l Assist with the general evacuation if directed to do so by emergency control personnel.
l Follow emergency procedures and instruction to provide assistance to disabled, physically
challenged, elderly people.
l In case of fire, avoid taking elevator to evacuate a building. Use emergency staircase or any
stairs for that matter.
l Maintain strict discipline, keep calm and stay alert with your mind fully present on the current
situation until you reach the evacuation assembly area.
l Stay in the evacuation assembly area until the signal of all clear is conveyed by the authority.

229
Web Applications and Security 5
Emergency Evacuation Plan
Emergency evacuation plan includes:
l Floor plans of the building or workplace.
l Maps of emergency exit paths.
l Location of emergency equipment.
l System map of electricity connections, generator sites and exits (stairs, doorways etc.)

A Sample Evacuation Diagram

Emergency and Evacuation Policy


An evacuation policy should be in place depending on the type of workplace and nature or work
being carried out there. For instance, evacuation policy of a cola mine will be completely different
from that of a construction site or a hospital.
A standard emergency and evacuation policy:
l Clearly states the objectives and commitment regarding ensuring safety of everyone present on
the workplace.
l Describes any legislative requirement of the policy to address compliance to the local laws and
rules regarding safety of the employees.
l Includes detailed emergency and evacuation procedures, floor plans, escape route diagrams
and evacuation procedures.
l Describes the preparation plans, training procedures and general information system in place
to educate employees in handling emergencies and be part of evacuation process.

230
5 Web Applications and Security
l Lists the findings of the risk assessments and countermeasures of any risks.
l Includes the training and drill calendar for regular awareness on the workplace hazards,
emergencies and safety procedures.
l It states for whom the policy is meant for in what way. (E.g. children, elderly, disabled, patients,
management etc.)
l Includes work health safety measure observed by the workplace.
l Clearly defines specific procedures against each potential emergency.
l Describes the control hierarchy of individuals and designated chain of command for
emergency procedures to execute along with their duties and powers in such situations.
l Includes policy review plan to ensure that policy remains updated over the period of since it is
drafted or renewed last.

Session-12 Various Workplace Emergencies


Work-specific emergencies such as blasts, explosions, spills of hazardous material, breakdown,
crash etc.
Equipment or machine-related emergencies like sudden injury, cuts or bruises; body-part or
cloth stuck in the machinery, accidents related to turbines, boilers and chemical plants; crashes
and accidents by moving objects – vehicles, lifts, trolleys and carts etc.
Natural calamities also add to emergencies sometimes or increase the chances of accidents, for
instance, heavy rainfall at a construction or mining site, earthquakes, extreme temperature conditions
(too hot regions, too cold regions) and extreme weather conditions (hurricanes, storms).
Civil or behavioural emergencies such as conflict and violence at workplace, strike or hostile
crowd, unauthorised access to restricted area, rogue or disgruntled employee, sabotage by
competitor or adversaries are some major causes that pose threat to the safety of the work-force.

231
Web Applications and Security 5
Health related emergencies can occur at common workplaces like a desk and chair as well as
dangerous work environments like chemical plants, mines, oil-rigs and medical research labs etc.
Workers in factories may be exposed to smoke, poisonous gases, extreme heat, extreme cold,
radiations, intense lighting, high decibel noise and extreme physical exertion. Careful, efficient and
regular safety measures can only protect workers from the impending harm.
Workspaces during a pandemic: Due to the recent COVID-19 pandemic, the entire world had
almost come to a halt. Still, as of this writing, the threat still looms and we are forced to practice
strict safety measures since no definite cure has been devised. The workplaces need to be kept safe
during this pandemic as the lockdown has been relaxed and world business and economy are
resuming back to normal. During this time, safety measures mandated by the government
agencies need to be observed strictly such as social distancing, using masks, regular sanitising and
following other related safety measures to keep infection at bay. Workplaces need to ensure that
employees follow the safety rules strictly and if not there should be suitable penalties to set serious
examples. While commuting between our residence and workplace, we need to follow safety
guidelines as we move on crowded places and closed places such as buses and other means of
public transport.

Protect Health and Safety at Work


Health is one of the prime concerns for an efficient and productive work-force. Employees with
sound health and fitness can give desired output from the assigned tasks and projects. Workplaces
that are prone to obvious health-related emergencies need specialised measures of safety. We have
discovered earlier some common health related emergencies are smoke, poisonous gases, extreme
heat, extreme cold, radiations, intense lighting, high decibel noise and extreme physical exertion etc.
Hazards and their sources: Hazards cause physical damage and health related emergencies for
the workers. Certain hazards do not seem harmful initially until their prolonged exposure results
into evident damages. For instance, prolonged working hours at a desktop computer may lead to
physical stress, muscle strain, vision-related ailments and bone-joints related problems. Another
instance is exposure of mine workers to a colourless and odourless poisonous gas which slowly
damages the lungs or skins causing skin and respiratory disorders. A lung disease called
pneumonoultramicroscopicsilicovolcanokoniosis (pro: new-mono-ultra-my-kro-skopic…siliko-
volkano-ko-neo-sys) is caused by inhaling fine silica particles of ash or dust in the workers involved
in areas like thermal plants, furnaces or places affected by dust-storms and volcano ashes. Some
hazards types and sources are listed here:
Ergonomic: Incorrect posture, prolonged work hours, improper use of equipment, careless usage
and sometimes poor product design lead to damages caused in muscles and body joints.
Work environment: Noisy workplaces, poor lighting, inadequate setup of work area, over-
crowded places, longer than usual working hours, poor work ethics, work-floor politics,
exploitation, bullying, poor work policies and underpaid jobs are the examples of non-conducive
work environment which causes distress, physical ailments, poor health, and psychological
disorders.
Chemical and physical: Exposure to hazardous chemicals in the form of liquids, gases and
radiations leads to poisoning, skin diseases, respiratory disorders, vision-related ailments and
sometime mortal diseases like cancer and even sudden death. Physical dangers include places that
are dangerous for human life which are prone to collapse of walls, sudden fall, crushing under
heavy objects, vehicular accidents, electrocution, fire outbreaks, flooding etc.

232
5 Web Applications and Security
Countermeasures to Hazards
Risk assessment: Analysing and assessing risk factors to identify possible risks and potential
dangers help in devising effective safety measures.
Emergency plans: Emergency exits and general evacuation procedures should be in place to
ensure safety when sudden emergency strikes. Trained personnel and educated staff make the
emergency plan execution efficient.
Regular checks and tests: Regular monitoring of workplaces, mock drills, quizzes and awareness
sessions empower the workers in managing themselves and help others during emergency.
Healthy Living
Workplace safety is the combined responsibility of the organisation and workers. But, as an
individual one should take care of one's health and physical wellbeing. A working person should
follow some sort of health discipline and fitness regime. Depending on the nature of work, daily
routine and available time, one should devise a plan related to diet, physical health and mental
strength. Some common ways to healthy living are listed here:
Mild exercises: They help in keeping fit and get rid of physical stress.
Yoga, good reading and meditation: These are the ways to keep mental stress at bay and develop
a positive mind set. A strong and positive mind develops impressive physical appearance too.
Sports, jogging and gym: Some people play some sports, go for jogging or visit gym regularly as
a hobby to keep fit. Playing a sport that involves physical exercise, running and any game like
chess, sodoku etc. that tweaks one's mental faculties are best practices to stay healthy.
Healthy eating: Eating almost everything one likes but in right measure and frequency is the key
to healthy eating. Having some sort of discipline in eating brings out good physical results and add
to the impressive personality. Avoiding temptations like indulgence in drinking and smoking is
good. An occasional cheers is no harm but smoke and joints should be a big and strict no-no!
Basic human values: Observing basic human values such as humility, respectfulness, respecting
other's perspectives, avoiding fruitless conflicts, being considerate, developing civic sense, clean
and good habits make you strong from inside and develop an effective and positive outlook.

EXERCISE
1. How do you ensure a healthy living being a student?
2. What is the importance of safety at workplace?
3. Describe some safety issues at school and how to prevent them?
4. Describe some common safety hazards.
5. What is a first aid kit? What is its significance? What are the contents of a standard
FAK?
6. Describe computer related ergonomics?
7. How can we prevent common accidents at workplace?
8. What are various types of workplace emergencies? Describe any 2.
9. What are some health hazards at workplaces?
10. How do sports and basic human values help in healthy living?

233
Web Applications and Security 5
A. Select the correct option to answer the following questions – 1 mark each.
1. User friendliness of a computer software for all regardless of their disability is called:
a. GUI     b. Computer Accessibility
c. User assistance   d. All of these
2. When a combination of computer software and hardware provides computer accessibility
to the disabled users then it is called:
a. Computer accessibility b. Assistive technology
c. Supportive technology  d. Hard-soft computer support
3. Dyslexia and attention-deficit are which of the following impairments?
a. Cognitive    b. Visual
c. Hearing    d. Motor
4. Colour blindness is which of the following impairments?
a. Cognitive    b. Visual
c. Hearing    d. Motor
5. Accessibility features are mainly the part of a/an:
a. Utility     b. Operating system
c. Application software   d. Customised software
6. Turning on mouse keys enables ______________ keys to move mouse pointer.
a. Arrow keys    b. Arrow keys on numeric key pad
c. Both a) and b)    d. Numeric keys 1, 2, 3, and 4
7. Raj needs to use only single finger to paste the copied text, which accessibility feature
should he use?
a. Sticky keys    b. Toggle keys
c. Both a) and b)    d. Filter keys
8. Raj needs to use only single finger to paste the copied text, which key should he make an
sticky key?
a. Ctrl     b. V
c. Both a) and b)    d. C
9. Anwar's granddad is 70 years. He types a letter in a word processor with trembling hands.
Which feature makes the operating system ignore his multiple presses of the same key due
to this?
a. Toggle     b. Sticky
c. Filter     d. Any of these
10. Anish suffers with hearing impairment, what should he do to deal with system sounds while
working on the computer?
a. Use filter key feature   b. Turn on visual notification for sounds
c. Choose a high contrast theme d. Use visual notifier for system alerts

234
5 Web Applications and Security
11. Too see entire screen clearly for visually impaired persons, which of the following features
must be used?
a. Magnifier    b. High contrast theme
c. Both a) and b)  d. None of these
12. To see the objects or a part of the screen in comparatively larger size, which of the following
features is most suited?
a. Magnifier    b. High contrast theme
c. Zoom into screen   d. Setting display to higher resolution
13. Which of the following features are not the part of making mouse easier to use?
a. Change the colour and size of mouse pointer.
b. Activate a window by hovering mouse over it without having to click it.
c. Use enter key to click the mouse.
d. None of these.
14. Which of the following client computers rely on the server for data processing?
a. Smart clients     b. Dumb clients
c. Remote clients  d. Virtual clients
15. Arjun has several computers in his office. He needs a cost-effective solution for printing the
documents. Which of the following solution is best suited?
a. Procure printers in bulk. 
b. Network the computers and install a printer on one of them making it a file server.
c. Network the computers together and install a printer on each computer.
d. Network the computers and install a printer on one of them making it a print server.
16. Railway reservation system allows reservation and cancellation of tickets by millions of users
at the same time. What kind of network is it?
a. Client-server     b. Peer-to-peer
c. Both a) and b)  d. Internet
17. For the devices at a distance of a few meters, which of the following network types is most
suited?
a. PAN      b. MAN
c. LAN      d. WAN
18. Find the odd one out:
a. Cable TV network   b. Computer network in a city
c. Telephone network in a metro city d. Wireless network running on Bluetooth
19. Which is the largest information system on Internet today?
a. WWW b. Twitter
c. Google      d. All of these
20. _____________ is the massive network of computers world over, ______________ is the
medium or means to access information over it.
a. www, internet     b. internet, www
c. ISP, www     d. www, ISP

235
Web Applications and Security 5
21. Find the odd one out:
a. Telephone line  b. Google
c. Modem   d. Browser
22. Which of the following protocol enables use of 3G network?
a. HSDPA    b. WAP
c. TCP/IP     d. WiMax
23. Details of data transmitted over a network are found in:
a. Packet     b. Packet header
c. Database    d. Protocol
24. Find the odd one out on the basis of real time online communication:
a. Email     b. Chat
c. Instant Messaging   d. Video call
25. For web-based instant messaging, you need which of the following applications?
a. Google hangout   b. Skype
c. Browser   d. Any of these
26. Which of the following messages are considered rude over live chat?
a. I want the details as soon as possible otherwise consequences would be very harsh.
b. I WANT THE DETAILS AS SOON AS POSSIBLE.
c. Both a) and b).
d. Hi, I want the details asap.
27. For an instant but formal message which of the following is the most suitable medium?
a. Instant messaging
 b. SMS
c. Email
 d. Handwritten letter dispatched through courier
28. Personal web pages created by people are also called _____________.
a. Channel   b. Blog
c. Timeline   d. Home page
29. Which of the following URL example is correct to connect with our blog post through an
offline editor?
a. https://www.myblog.home.blog/xmlrpc.php
b. https://www.myblog.home.blog
c. Both a) and b)
d. None of these
30. An online shopping cart contains which of the following?
a. Items selected by you.  b. Items purchased by you.
c. Items returned by you.   d. Items liked by you.
31. Checkout is the process of ______________________.
a. Completing purchase of the items in the cart.
b. Logging off the online web store.
c. Emptying the shopping cart and leave the web store.
d. All of these.

236
5 Web Applications and Security
32. Refund on cancellation of online tickets is done on the basis of __________________.
a. Web service provider's cancellation policy.
b. Government's cancellation policy.
c. Number of passengers.
d. No refund is allowed for a confirmed booked ticket.
33. Internet security addresses which of the following?
a. Internet security   b. Browser security
c. Both a) and b)  d. None of these
34. Complex combination of numbers, letters and symbols is the sign of a __________________.
a. Digital signature   b. Complex password
c. Strong password   d. Encryption
35. Having same strong, hard to crack password for all our online accounts helps maintain
security and remember just one password easily. This is a/an __________________.
a. Good practice    b. Foolish practice
c. Efficient way of saving time and effort d. Easy practice
36. A spyware infects the sensitive files in our system and send their details to the concerned
hackers.
a. True    b. False
37. A website saves details of our shopping cart on our own computer. Which of the following
statement is correct regarding this phenomenon?
a. Website has created a cookie.
b. This is dangerous and must not be allowed at all.
c. A Hacker may discover my shopping list and will get those items mailed at his address.
d. This is harmless and we can let the details there as long as browser doesn't delete it.
38. The best way to ensure a secured environment on our computer is:
a. Always keep the operating system updated.
b. Always install the best hardware lock for the system.
c. Always purchase best operating system in the market.
d. Always keep the newest version of operating system on the computer.
39. A closed padlock icon beside the URL of the website in the browser's address bar denotes:
a. SSL certification of that website.
b. Website is running over https protocol.
c. Website is registered with a known certification authority.
d. All of these.
40. Visiting someone's profile without one's knowledge is a mild form of ________________.
a. Cyber-bullying  b. Cyber-attack
c. Hacking   d. Blackmailing
41. Which of the following is not the part of a first aid kit?
a. sterile gauze dressing  b. digital thermometer
c. bandages    d. Mini oxygen cylinder

237
Web Applications and Security 5
42. First aid can only be given by _______________.
 a. An expert    b. Anyone trained in it
 c. Nurse     d. Victim
43. What is the correct position of the elbows while working on a computer?
 a. Closer to the body   b. Bent at a comfortable angle
 c. Both a) and b)  d. Straight
44. Usually, the comfortable distance between the computer monitor and eyes should be
______________.
a. 6 inches   b. 20 inches
c. 60 inches    d. Any of these
45. Two co-workers paired on workplace as part of safety management practice is called
_______________.
a. Backup    b. Force-2
 c. Buddy system   d. Safety pair
46. During any emergency at workplace, which of the following ensures that everyone knows
how to reach to safety easily.
 a. Safety drill     b. Company safety policy
 c. Emergency evacuation procedure  d. Floor plan
47. Which of the following is an example of civil or behavioural emergency?
 a. riots     b. violent conflict
 c. fight     d. All of these
48. Which of the following is not a natural calamity?
a. Earthquake b. Explosion
c. Avalanche d. Hurricane
49. Social distancing and mask are effective to prevent which of the following?
a. Any likely pandemic b. Spreading of infection of any kind
c. Virus d. Bacteria
50. Incorrect posture and prolonged working relate to which kind of hazards?
a. Ergonomic b. Psychological
c. Chemical d. Physical

Ubuntu Specific Questions.


1. Which of the following is not an Accessibility option?
a. Seeing b. Hearing
c. Recording d. Typing
2. Ravi's grandfather has a poor vision, which of the following accessibility features must help
him using computer?
a. Screen reader b. Setting Text size and contrast
c. Both a) and b) d. Hover click

238
5 Web Applications and Security
3. Which of the following is the suitable alert for visually impaired?
a. Flashing of mouse pointer. b. Flashing of the desktop.
c. Both a) and b) d. Flashing of the window Title bar.
4. Which of the following allow user to keep the modifier key active when it is pressed?
a. Sticky keys b. Slow keys
c. Bounce keys d. Mouse keys
5. Setting up a time delay between the key presses can be done using which of the following?
a. Sticky keys b. Slow keys
c. Bounce keys d. Mouse keys
6. Which of the following help avoid the acceptance of repeated or duplicate key press?
a. Sticky keys b. Slow keys
c. Bounce keys d. Mouse keys
7. Typing assistant is suitable for people with which kind of impairment?
a. Hearing b. Seeing
c. Listening d. None of these
8. Simulated Secondary Click allows which of the following?
a. Set a time delay for left click to be accepted as right click.
b. Set a time delay for right click to be accepted as left click.
c. Both a) and b)
d. None of these
9. Arrow keys on the Numeric key pad can be used as which of the following?
a. Sticky keys b. Slow keys
c. Bounce keys d. Mouse keys
10. Activating left mouse click just by bringing the mouse pointer over the desired option is
referred to as which of the following:
a. Simulated Secondary Click
b. Hover Click
c. Right click
d. Mouse Keys
B. Answer the following questions – 2 marks each.
1. How will you open 'Ease of Access Center' in Windows 7 or ‘Universal Access’ in Linux?
2. What do you mean by accessibility feature?
3. What do you mean by mouse keys?
4. What do you mean by sticky keys?
5. What do you mean by filter keys (Windows) or bounce keys (Linux)?
6. What is the use of Narrator (Windows) or Orca or any screen reader in Linux?
7. What is Navigator used for in Windows?
8. How is a LAN different from PAN?
9. How is a WAN different from MAN?

239
Web Applications and Security 5
10. What is internet?
11. What do you mean by computer networking?
12. What is WiFi connectivity?
13. Briefly explain instant messaging.
14. What do you mean by a blog?
15. What do you mean by the term E-commerce?
16. List any 4 best practices about internet security.
17. What is a cookie?
18. Give some examples of crowded and potentially dangerous workplaces.
19. List some workplace safety hazards.
20. What is first aid?
21. What are some common types of accident that may occur in workplaces?
22. List some countermeasures to hazards at workplaces.
C. Answer the following questions – 3 marks each.
1. What is the significance of Accessibility options in a computer?
2. How will you setup mouse key?
3. How will you setup sticky key?
4. How will you setup filter key (Windows) or bounce key (Linux)?
5. How will you setup the mouse pointer so that it hovers on a window and that window
activates.
6. Briefly explain the advantages of networking.
7. What limitations of LAN are overcome in WAN?
8. What is a browser?
9. List various types of internet connectivity.
10. What is the standard process of online shopping? Explain in brief.
11. How will you setup privacy options in a browser?
12. How will you clear your browsing history?
13. What is the significance of first aid?
14. What is the significance of a browser on WWW?
15. How will you open, modify and republish your blog post in MS Word?
16. What is the importance of safety at workplace?
17. What is a first aid kit? What is its significance? What are the contents of a standard FAK?
18. Describe computer related ergonomics?
19. List the 8 preventive measures of accidents (do not describe them).
20. How should you follow healthy living as a growing teenager?
21. How do sports and basic human values help in healthy living?

240
5 Web Applications and Security
D. Answer the following questions – 3 marks each.
1. How will you setup visual feedbacks to appear on the screen instead of sound?
2. Explain the use of read aloud feature and Magnifier or Zoom for a visual impairment.
3. Why do we need to network computers together? How a LAN different from MAN?
4. Write short note on types of internet connectivity.
5. What are the advantages of instant messaging? How will you begin chatting on an online
instant chatting website or service? Hat is a blog? List some popular blog sites.
6. How will you open, modify and republish your blog post in an offline blog editor?
7. How will you book a train ticket from your city to another using IRCTC website? How will
you check the booking history of your ticket?
8. What are the best practices about internet security?
9. How will you clear your browsing history and cookies?
10. What are various types of workplace emergencies? Describe any 2.
11. How can we prevent common accidents at workplace?
12. As an individual how can we take care of our health to stay fit?
13. Describe some safety issues at school and how to prevent them?
14. Describe some common safety hazards.
15. What are some health hazards at workplaces?
16. Describe the 3 countermeasures to hazards.
17. What is the significance of evacuation procedure?
18. Write brief note on proper use of keyboard, mouse and monitor.

Watch & Learn


www.eduitspl.com
www.youtube.com/edusoftknowledgeverse

241
Web Applications and Security 5
Projects
Documentation
Project 1: School has assigned you the job of a 4 page quarterly school magazine titled - YOUNG
INSPIRERS.
The magazine describes the achievements of the school. teachers and students every quarter.
Design two magazine templates considering different colour themes and designs. Template should
allow to insert text, headings, images and various shapes.
Think of a few sections and divide the magazine into section breaks accordingly. Each page should
have attractive page border. Footers should contain stylish page numbers and header should
contain magazine name (except the cover page). Cover page will have a the magazine title in big
stylish fonts and text effect.
The first page of the magazine is its cover which should look attractive.
Project 2: Design a visiting card for your friend mentioning his/ her name, address, designation,
company, contact details and a company logo assuming that your friend works in that company as
Regional Sales Manager.
Spreadsheet
You are assigned the task to maintain the following details of all the students in your class.
¤ Academic Performance in percentage in Mid Term and Final Term Exams.
¤ Co-curricular activities performance in terms of grades out of 10 (passing is 4).
¤ Grades out of 20 in sports (passing is 16).
Calculate the overall total performance in percentage for all the students.Now, do the following:
¤ Conditional formatting for the cells containing percentage marks so that cells with passing
marks or more are displayed in light blue fill colour otherwise light red fill colour.
¤ Create 4 well formatted graphs to show the following:
1. Column chart to show Academic performance of all the students.
2. Line chart to show Co-curricular performance of all the students.
3. Bar chart to show sports performance of all the students.
4. Pie chart to show the overall performance of all the students in all activities.

Database Development
Assume that you own a bicycle store and deal in bicycles for the following categories: Girl kids,
Boy kids, Girl Teens, Boy Teens, Ladies, Gents.
Create a database to store the stock details of the bicycles in your shop for the months of January
and February as: Bicycle category, month, quantity sold, quantity in stock, sale value. Create a
report grouped on the basis of months showing all the details about bicyles.
Write queries to display:
1. Details of all the bicycles sorted on the basis of categories.
2. Details of all the Ladies and Gents bicycles sorted in the basis of month.
3. Increase the stock and quantity sold bu 5% for Girl Teens bicycles.

Projects 242 Information Technology NSQF Level-2


SAMPLE QUESTION Term 1
Download more question papers from https://www.eduitspl.com/teachers-corner-2

Maximum Marks: 25
Part A: EMPLOYABILITY SKILLS (5 X 1 = 5)
1. Which of the following is/are the characteristics of effective communication?
a. It should be concise and to the point.
b. Should be clear in content and purpose.
c. Both a & b
d. It should not be complete with vast scope of questions.
2. Which of the following is/are healthier lifestyle habits?
a. Avoid smoking and sports b. Good eating and taking drugs.
c. Joining gym and taking Alcohol d. All of these
3. How to manage internal stress?
a. Keeping positive attitude b. Try to adapt changing situation
c. Better utilisation of your time d. All of these
4. Ctrl + S is used to:
a. Print whole Pages b. Print current page
c. Save Document d. None of these
5. which of the following helps to create short words that expand into actual longer words/phrase?
a. Ctrl +V b. Bullet & Numbering
c. Ctrl + X d. Autocorrect

Part B: SUBJECT SPECIFIC SKILLS (20 X 1 = 20)


1. Which of the following features is best suited to make a formatted document reusable multiple time?
a. Save it as Template b. Apply styles
c. Apply themes d. Mail merge
2. To return value 10 from a function myfunction, which of the following statements is correct?
a. myfunction(10) b. myfunction = 10
c. 10 = myfunction() d. myfunction 10
3. The variable values inserted in the main document from the data source are indicated by ______________.
a. Merged fields b. Merged document
c. Data d. Main document
4. Databases reduce multiple copies of data. Such multiple copies are called which of the following?
a. Redundant values b. Foreign key
c. Information d. Queries
5. Rajat has created some labels. He changed the text colour in one of the labels. How can he cascade same changes
to all the other labels?
a. Styles b. Label templates
c. Synchronise content d. Apply to all
6. Graphics styles can be applied using which type of styles?
a. List b. Frame
c. Paragraph d. Page
7. Ravi has drafted his office annual report. He wants to quickly format the contents and give them a professional,
formal look. Which of the following should help him?
a. Templates b. Styles
c. Themes d. None of these

Sample Question Paper 243 Information Technology NSQF Level-2


8. Employee code E00009 has joined the company on 10/10/1990 – in this statement, identify the data.
a. Employee code b. Date of joining
c. Both a) and b) d. Company
9. If certain values are stored in a collection, then the position of the first value in that collection will be denoted by
which of the following?
a. 1 b. 0 c. total number of values - 1 d. None of these
10. Which of the following styles affect the formatting of a block of text in a paragraph?
a. Character b. Frame
c. Paragraph d. Page
11. Contents of the labels are inserted from which of the following?
a. Label database b. Label templates
c. Data source d. Typed manually
12. Ravi has Science marks of students of class IX and X. He wants to calculate the average marks class-wise. Which of
the following is best suited for this?
a. Goal seek b. Solver
c. Sub-total d. User defined formula
13. Varun has got marks of 500 students of Term1 and Term 2 of class X in separate sheets. He needs to create a third
sheet that contains total of Term1 and Term2 of all the students. Which of the following is best suited for this?
a. Goal seek b. Sheet linking
c. Data consolidation d. Scenario
14. Which of the following is not a “what-if ” analysis tool in a spreadsheet?
a. Goal seek b. Sub-total
c. Solver d. Scenario
15. Applying a set of values on a data set to analyse changes in the calculations and result is achieved by which of the
following tools?
a. Goal seek b. Sub-total
c. Solver d. Scenario
16. If certain values are stored in a collection, then the position of the last value in that collection will be denoted by
which of the following?
a. 1 b. 0 c. total number of values – 1 d. None of these
17.Renu wants to apply formatting of a text piece to multiple other text pieces. Which of the following must help her in
doing so?
a. New style from selection b. Format Painter
c. Update selected styled. d. None of these
18.“How many months would it take to pay the loan if monthly instalment paid is increased by 25%?” – this question
can be answered most suitably by which of the following tools?
a. Goal seek b. Sub-total
c. Solver d. Scenario
19. Which of the following is the correct sequence of containership.
a. workbook.sheet.cell.range b. workbook.sheet.range.cell
c. sheet.workbook.range.cell d. sheet.workbook.cell.range
20. In the statement: for z = 10 to 100, z is which of the following?
a. Loop counter b. Variable
c. Both a) and b) d. None of these

Sample Question Paper 244 Information Technology NSQF Level-2


SAMPLE QUESTION Term 2
Download more question papers from https://www.eduitspl.com/teachers-corner-2

Maximum Marks: 25
Part A: EMPLOYABILITY SKILLS (5 X 1 = 5)
1. What is common among Elon Musk, Bill Gates, Jeff Bezoz & Steve Jobs?
a. They all are among the richest businessmen on earth. b. They all belong to global IT industry.
c. They all are entrepreneurs. d. They all are technology giants of 21st century.
2. It is difficult to predict if an innovative product will be accepted in the market by the customers. - This fact refers to
which of the following qualities of entrepreneurs?
a. Innovators b. Risk takers
c. Leaders d. Empathetic
3. Planning, organising and controlling - these activities belong to which of the following functions of an entrepreneur?
a. Management b. Sales and Promotion
c. Finance and commerce d. All of these
4. Which of the Ps of sustainable development refers to the economy of a nation?
a. People b. Planet
c. Policy d. Profit
5. As an individual, how can we contribute to the sustainable development of our country?
a. Following general public rules b. Responsible power consumption
c. Contribute to green initiatives d. All of these

Part B: SUBJECT SPECIFIC SKILLS (20 X 1 = 20)


1. LIKE 'P*P' refers to which of the following?
 a. PPP     b. POP
c. PP d. All of these
2. In which of the following calculated fields are saved?
 a. Table b. Form
c. Both a) and b) d. None of these
3. A passenger is allocated one seat in the flight is which type of relationship?
a. One-to-one    b. Many-to-many
 c. One-to-many   d. Many-to-one
4. What can we mention in the Field section of Query design view?
 a. Field name    b. Formula
 c. Both a) and b)   d. Alias name
5. Between 10 and 25 – this will check which of the following range?
 a. Between 9 and 24   b. Between 10 and 25
 c. Between 11 and 26   d. None of these
6. Which of the following clauses will sort the output in ascending order?
 a. Order by price asc b. Order by price
c. Both a) and b) d.None of these
7. Where clause can be used with which of the following SQL commands?
 a. SELECT    b. UPDATE
c. DELETE d. All of these

Sample Question Paper 245 Information Technology NSQF Level-2


8. You cannot interact with a control whose ____________________.
 a. Enabled = False   b. Visible = True
 c. Both a) and b)   d. Input required = No
9. In which of the following views do you see the field properties?
 a. Table design view   b. Form design view
 c. Query design view   d. Table data view
10. In a flat file system, which of the following is difficult to perform?
 a. updates    b. deletes
 c. Manage data   d. All of these
11. Anish suffers with hearing impairment, what should he do to deal with system sounds while working on the
computer?
a. Use filter key feature   b. Turn on visual notification for sounds
c. Choose a high contrast theme d. Use visual notifier for system alerts
12. Which of the following features are not the part of making mouse easier to use?
a. Change the colour and size of mouse pointer
b. Activate a window by hovering mouse over it without having to click it
c. Use enter key to click the mouse
d. None of these
13. Arjun has several computers in his office. He needs a cost-effective solution for printing the documents. Which of
the following solution is best suited?
a. Procure printers in bulk. 
b. Network the computers and install a printer on one of them making it a file server.
c. Network the computers together and install a printer on each computer.
d. Network the computers and install a printer on one of them making it a print server.
14. Railway reservation system allows reservation and cancellation of tickets by millions of users at the same time.
What kind of network is it?
a. Client-server     b. Peer-to-peer
c. Both a) and b)   d. Internet
15. For web-based instant messaging, you need which of the following applications?
a. Google hangout   b. Skype
c. Browser    d. Any of these
16. Having same strong, hard to crack password for all our online accounts helps maintain security and remember just
one password easily. This is a/an __________________.
a. Good practice    b. Foolish practice
c. Efficient way of saving time and effort d. Easy practice
17. First aid can only be given by _______________.
 a. An expert   b. Anyone trained in it
 c. Nurse     d. Victim
18. During any emergency at workplace, which of the following ensures that everyone knows how to reach to safety
easily.
 a. Safety drill     b. Company safety policy
 c. Emergency evacuation procedure  d. Floor plan
19. Social distancing and mask are effective to prevent which of the following?
a. Any likely pandemic b. Spreading of infection of any kind
c. Virus d. Bacteria
20. Visiting someone's profile without one's knowledge is a mild form of ________________.
a. Cyber-bullying   b. Cyber-attack
c. Hacking    d. Blackmailing

Sample Question Paper 246 Information Technology NSQF Level-2


WRITER: Shortcut Keys for Moving and Resizing Frames,
Graphics and Objects
Keyboard
Function
Shortcut

Esc Cursor is inside a text frame and no text


is selected: Escape selects the text frame.
Text frame is selected: Escape clears the
cursor from the text frame.

F2 or Enter or any key that produces If a text frame is selected: positions the
a character on screen cursor to the end of the text in the text
frame. If you press any key that produces
a character on screen, and the
document is in edit mode, the character
is appended to the text.
Alt+Arrow Keys Move object.
Alt+Ctrl+Arrow Keys Resizes by moving lower right corner.
Alt+Ctrl+Shift+Arrow Keys Resizes by moving top left corner.
Ctrl+Tab Selects the anchor of an object (in Edit
Points mode).

Shortcut Keys for Paragraphs and Heading Levels LibreOffice Writer

Keyboard
Function
Shortcut
Ctrl+Alt+Up Arrow Move the active paragraph or selected
paragraphs up one paragraph.
Ctrl+Alt+Down Arrow Move the active paragraph or selected
paragraphs down one paragraph.
Tab The heading in format "Heading X" (X = 1-9)
is moved down one level in the outline.
Shift+Tab The heading in format "Heading X" (X = 2-10)
is moved up one level in the outline.
Ctrl+Tab
At the start of a heading: Inserts a tab stop. Depending on the Window Manager in use,
Alt+Tab may be used instead.
To change the heading level with the keyboard, first position the cursor in front of the
heading.

Shortcuts 247 Information Technology NSQF Level-2


CALC: Common Keyboard Shortcuts
Keyboard
Function
Shortcut
Ctrl + N Create a new workbook
Ctrl + O Open an existing workbook.
Ctrl + S Save the active workbook.
Ctrl + Shift + S Open Save as dialog box.
Ctrl + Q Quit Calc.
Ctrl + C Copy the contents of the selected cells to Clipboard.
Ctrl + X Cut the contents of the selected cells to Clipboard.
Ctrl + V Insert the contents of the Clipboard into the selected cell(s).
Ctrl + Z Undo your last action. Panic button :)
Ctrl + P Open the "Print" dialog.
Shift + F3 Cycle case for selected text.
Ctrl + F5 Show/Hide Side bar.
Tab Autocomplete any function name. Example: Enter = and start typing av, press
Tab and you will get =average(
Ctrl + ` Toggle between displaying cell values and formulas.

Ctrl + F1 Show/hide the Excel Ribbon. Hide the ribbon to view more than 4 rows of data.
Ctrl + Tab Switch to the next open Excel workbook.
Ctrl + PgDown Switch to the next worksheet. Press Ctrl+PgUp to switch to the previous sheet.
Ctrl + H Display “Find and Replace” dialog box.
Ctrl + F Display the "Find" dialog box.
Ctrl + Home Move to the beginning of a worksheet (A1 cell).
Ctrl + End Move to the last used cell of the current worksheet, i.e. the lowest row of the
rightmost column.
F2 Edit the current cell.
Ctrl + Enter In cell editing mode, enter a new line (carriage return) into a cell.
Ctrl + ; Enter the current date. Press Ctrl + Shift + ; to enter the current time.
Ctrl + Shift + V Open the "Paste Special" dialog when clipboard is not empty.
Ctrl + Y Repeat (Redo) the last action, if possible.
Ctrl + A Select the entire worksheet.
Ctrl + Space Select the entire column.
Shift + Space Select the entire row.

Shortcuts 248 Information Technology NSQF Level-2

You might also like