You are on page 1of 79

Click https://bit.

ly/FG-Books to download all PDF FG books for FREE 1

COMPUTER
EDUCATION

n
8

io
GRADE

at

National Book Foundation


as
Federal Textbook Board
Islamabad
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 2

on
ti
da
un
Fo
k
oo
lB
na
io
at
N
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 3

Textbook of

COMPUTER
EDUCATION

on
Grade

ti
da
8 Fo
un
k
oo
lB
na
io
at
N

National Book Foundation


as
Federal Textbook Board
Islamabad
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 4

on
ti
da
un
Fo
k
oo
l B
na
io
at
N
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 5

on
ti
da
un
Fo
k
oo
lB
na
io
at
N
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 6

n
io
d at
un
Fo
k
oo
lB
na
io
at
N
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 7

CONTENTS

n
t io
1

da
Networks and
Communication

un
P.6 2
Fo Computer
Abbreviations Security
Threats
P.128 P.24
k
oo

3
lB

Glossary Computer Spreadsheets


Education
na

in Excel
P.126
P.36
io
at

4
N

Unit Problem
Answers Solving
5
P.121 P.76
Computer
Programming

P.92
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 8

6 1 Networks and Communication

1
NETWORKS AND
COMMUNICATION

o
ti
This
his is 20 days
d lesson
After completing this lesson, you will be able to: (period inclu
including homework)

x Define a computer network.


x Recognize and learn the terms
¾ Sending Device
¾ Receiving Device
¾ Communication Devices
¾ Transmission Medium
x Explain the different types of networks: LAN, MAN
AN, MA
M and WAN.
x Define a client and a server.
x Describe communication devices:
¾ Dialup modem
¾ Network card
x Know the types of physical al transmission
cal tra
tr sm medium:
¾ Twisted-pair cable e
¾ Coaxial cable
¾ Fiber optic cableable
x Explain the following cutting
c edge technologies:
¾ Cellular communications
larr commu
comm
¾ Satellite
ellite communications
atellite com
¾ Global Po Positioning System
N

¾ Bluetooth
Blueto in Computer.

Reading

INTRODUCTION
A computer network is a communication system in which more than one
computers are joined in a way that they may share the software and hardware
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 9

1 Networks and Communication 7


resources among each other by using medium like cables, wireless etc. Every
computer in the network can transmit or receive data to and from other computers.
The networks can be placed under different categories based on their size and
geographic locations. Many smaller networks can be joined together to make
larger networks through wired or wireless medium giving birth to Information
Technology (IT) and present day achievements like Global Positioning g System
ng S
(GPS), Bluetooth, Cellular and Satellite Communication Systems.

n
io
1.1 COMPUTER NETWORK
A network is defined as an interconnection of two or more computers
c to

at
facilitate communication and resource sharing. Common resources are printers,
n resourc

nd
disk storage, access to the internet and data resources
rces like files, databases,
ources
programs and software applications. Figure 1.1 shows
ows computer Network.
ws a co

ou
N

Figure 1.1 A Computer Network

1.1.1 Advantages of a Computer Network


The advantages of the network are given as under:
x The computers connected on a network share hardware resources like: Printer,
CD-Writer, DVD-CD Players and Hard Disk etc.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 10

8 1 Networks and Communication


x Through network, one computer can share software from other computers.
x Maintain security and permissions over the network.
x Manage privilege and rights of the users.
x A user can easily share the files, data and can access other computers.

1.1.2 The Components of a Network

on
The following are the basic four components of a network:
x Sender

ti
x Receiver

da
x Communication device
x Transmission medium

un
Sender Fo
o transmit
A sender is a device which is used to transm the data over the network.
Sender may be a computer system, a lapto
laptop,
lap p, a mobile phone etc. as shown in
p
k

figure 1.2.
oo

Receiver
A receiver is a device which accepts
ac
a the data or information transmitted by
lB

the sender over the network.wor A printer, a fax machine and a computer are
etwork
examples of receiver,, ass shown
show in figure 1.2.
na

Communication Device
io

A device
ce that encodes
ice e and transmits data over the physical or wireless
medium is called ccommunication device e.g. Modem and Network Interface Card
at

(NIC).. A mode
modem is shown in figure 1.2.
N

Transmission
mis
miss Medium
A transmission medium is a path used to send and receive data from the
communication device. The transmission medium may be wired (telephone lines)
or wireless (air), over which the data or information is transmitted. Wired
transmission medium is shown in figure 1.2.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 11

1 Networks and Communication 9

Transmission Medium

Modem
Sender
er Receiver
er

on
Figure 1.2 Components of a network

ti
1.1.3 Client and Server

da
Any computer on network can play two roles i.e. a Serverr or a Clie
Client
Server

un
The Server is the computer which offers itss resourc
resources and services to the
other computers on network depending on the e rights a
Fo and privileges assigned by
the network administrator. The server carries
es out the following tasks:
x Ensures the provision of physical and
d data resources to the client computers.
nd
k

x Manages user and computer accounts ounts provide secure access to its resources.
nts to p
oo

x Implementation of rights, privileges


ivileges and restrictions suggested by the
administrator, if any.
lB

Client
The computer which uses the resources of a server is called as client
hich us
na

workstation. The resources


ources of
esources o a client can be shared according to the requirement.
The client and server are connected by a network. Figure 1.1 shows a client server
io

network.
at

1.1.4 Types of
o Networks
A network
netw may vary from one another
N

based on the number of computers attached


to it and the area it covers. Following are the
common types of computer network:
x Local Area Network (LAN)
x Metropolitan Area Network(MAN) Figure 1.3 Networks
x Wide Area Network (WAN)
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 12

10 1 Networks and Communication


Local Area Network (LAN)
The network of computers confined in a building is called a LAN (Local Area
Network). Many business organizations are implementing LAN to obtain the
following benefits.
x File and data sharing
x Physical resource sharing
ing
g

on
x Communication
x Application sharing
ring
ng

ti
x User authentication
tication and
a

da
ment
managementnt
x Implementation
ementatio
mentati of privileges,

un
ermission
mission and restrictions in
permissions
order to ensure controlled access
Fo
Figure 1.4 Local Area Network
an
and security of the computer
resources.
k

ADVANTAGES
oo

x Implementation is simple.
x Remote access and sharing
ng
lB

x Low cost
na

x Reliability and security


ecurity
curity
x Fast communication
nication
cation and
a data transmission
io

x Addition off new co


computer to network is easy.
at

VANTAG
DISADVANTAGES
x If server iis down, all clients are affected.
N

x LAN requires maintenance.


Metropolitan Area Network (MAN)
A Metropolitan Area Network (MAN) is an interconnection of multiple LANs
within a city and sometimes in more than one city as well. A simple example of
MANs is the cable TV network.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 13

1 Networks and Communication 11

n
io
d at
Figure 1.5 Metropolitan Area Network based

un
ased
ed on Ca
C
Cable TV.
Wide Area Network (WAN)
The term Wide Area Network (WAN) is
Fo
s used ini a computer network which
spreads over a vast geographical area, i.e.
i.e across
acro countries or continents. The
acros
distance between computers connecteded
d in WWANA is wider. Thus the transmission
AN
k

mediums used are normally telephone


onee lines, satellite links and other existing data
oo

transmission systems.
PIA (Pakistan International Airline) system is an example of WAN. The network
nal Airline
lB

connects in almost all countries


nt s of tthe world. Arpanet is another example of WAN.
ntr
This Network connected ed more than 40 universities and institutions in USA and
na

Europe.
ADVANTAGES
io

x Twenty four ur hours remote access is required to company’s data resources.


our
x Fast, efficient and cheap means of communication e.g. teleconferencing and
ficient a
at

nett meetings etc.


N

x Reduction
ductio of cost of business management e.g. travelling, stationary, office
keeping.

Teacher’s Points
x Teleconferencing is live exchange of data using telecommunication system.
x Net meeting is communication over the internet using a software.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 14

12 1 Networks and Communication

Figure 1.6 Wide Area


Fo
rea Netwo
Network

DISADVANTAGES
k

x Setting up a WAN is expensive and complicated. The larger the network, the
nd comp
oo

more expensive it is.


x Security is a real threatt when different
d people have the access to use
lB

information from other cocomputers.


mputer
mputers
x Protection from hackers
ers and viruses add more expense.
kers
x Once set up, maintenance
na

tenance of a network is a full-time job which requires network


ntenance
engineers and technicians
d technicia
echnici to be hired.
io

1.1.5 Communication
munica Devices
Communication
mmunicat
munica devices are the devices used to send and receive data and
at

s. A communication
signals. com device is responsible for the conversion of data by
N

sender device into a suitable form for the transmission on network and on receiving
er devic
end it converts it back into digital form that is understood by any electronic device
like computers. Some commonly used communication devices are Dial up Modem,
Network Interface Card (NIC) etc.
Dial up Modem
Dial up modem is a device that allow the users to connect computers using
telephone line, to communicate with other computers over the Internet. The
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 15

1 Networks and Communication 13


communication through modem takes place by transferring digital and analog
signals. The modem converts digital signal into analog signal which is known as
modulation and converts analog signal into digital signal which is called
demodulation, hence the name modem.

Digital Signal Analog Signal

Figure 1.7 Modem (Modulation


(Modulati
odulati and De-Modulation)
oo

The limitations of a Dial-Up Modem


odem are
lB

x Slow Speed
x If telephone line is connecte
connected
onnect with internet, the line cannot be used for phone
na

calls unless internet


et is disconnected.
rnet dis
di
x Telephone cables a are weaker to
io

signal distortion
stortion and noise.
ortion a
at

Network Interface Card


rk Interfa
A Netw
Network Interface Card (NIC) is
N

a computer
ut hardware component that
connects a computer to a network. The
purpose of the Network Interface Card
is to prepare, send, and control data on
the network. It monitors the flow of
data. It also transforms the data coming Figure 1.8 Network Interface Card
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 16

14 1 Networks and Communication


from the network into digital form so that the data can be used by different network
devices such as computers, printers etc. It is also called Network Card, Internet
Card or LAN Card. Nowadays Wireless Network Interface Cards (WNIC) are also
in use. WNIC uses radio waves for transmission of data.
1.1.6 Types of Physical Transmission Media
The physical path over which communication takes place is s called the

on
transm
physical transmission medium. Following types of cables are used as transmission
medium:

ti
x Twisted-pair cable

da
x Coaxial cable
x Fiber Optic cable

un
Twisted Pair Cable Fo
One of the oldest and still in use transmission
mission medium is twisted pair cable.
Twisted pair cable consists of pairs of insulated
ins ated copper wires twisted together.
There are two types of twisted pair cables:
bles:
k

x Shielded Twisted-Pair cable


oo

x Unshielded Twisted-Pair cable


able
lB
na

Figure 1.9 Un-Shielded Twisted Pair Shielded


Cable
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 17

1 Networks and Communication 15


ADVANTAGES
x Twisted-pair cables are cheaper
x They are flexible.
x They are light in weight and easy to install.
Coaxial Cables
A coaxial cable is an insulated copper cable used to carry high
h frequency
igh frequ

n
io
data signals such as voice, images, videos and text. The coaxial
axial cable
cab has a
cabl
conductor placed in center surrounded by multiple protective shields and an outer
hields a

at
jacket that ensure noise and distortion free transmission
n of high frequency data

nd
such as Cable TV transmission. It can also be used computer networks for
d in com
broad-band services like teleconferencing and net meetings
meetings.

ou
na

Figure 1.11 Coaxial Cable


io

ADVANTAGES
AGES
ES
at

x These
ese cable can transmit data much faster than wire pairs and are less prone
se cables
N

to noise.
x Coaxial cables can control multiple frequencies.
Fiber Optics
Fiber Optics cable consists of hair like strands of glass or any transparent material
which can pass light at high quality, to carry light signals. It can also send and
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 18

16 1 Networks and Communication


receive a wider range of data frequencies at a time
at a speed matching to the speed of light. Fiber
Optic cables are made up of three components;
1) A transmitter which transform electrical
signals into light waves.
2) mediu
ediu for
Fiber Optic cable used as a medium

on
Figure 1.12 Fiber Optic Cable carrying light waves.
3) es
s the light
A receiver which receives lig signals

ti
to electric
and converts them into electrical signals.

da
ADVANTAGES
x Fiber Optic cable
ble min
minimizes the sparking

un
risk.
x de high
Provide bandwidth over long
Fo
Figure 1.13 Fiber Optic Cable ta ces.
ces
distances.
k

1.2 CUTTING EDGE


DGE TECHNOLOGIES
T
TE
oo

Cutting edge technologyy refers to all the devices, techniques or


achievements that employ y the m most recent and high-level technology
lB

developments to provide high


hig speed
spee communication and data transmission. Some
of the cutting edge technologies
nologie are:
hnologie
na

x Cellular Communications
unications
cations
x Satellite Communications
mmunica
mmunicat
io

x Global Positionin
Positioning
sitionin System
at

x Bluetooth
etooth
tooth
N

Cellular Communication
ar C
Co
Cellular Communication is based on mobiles or cell phones as sending or
receiving device. This device can be in a basic geographic service area (called a
cell) which is created by network of radio wave transmitters (the radio towers). A

x Bandwidth is the rate of consumed (spent) amount of information.


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 19

1 Networks and Communication 17


cellular communication system uses a large number of low power wireless
transmitters to create cells. As mobile users travel from cell to cell, their
conversation is handed over to the respective cell in order to maintain reliable
communication service.
In wireless communication a network that serves a small area is called a cell. When
raphic
joined together these cells provide radio coverage over a wide geographic phic area

on
communic
mmunic
which is called Cellular Network. Figure 1.14 shows a cellular communication
system.

ti
The key features of Cellular

da
networks are:
x Increase capacity than a single

un
large transmitter.
x Less power consumption at Fo
client side.
x Larger coverage area than a Figure 1
1.14
4 Cellular Communications System
k

Architecture
single transmitter.
oo

Satellite Communication
A Communication Satellite tellite is
i an artificial satellite stationed in space for the
lB

purpose of telecommunications.cation
ation It is launched by a rocket and placed in a specific
orbit around the earth. There are
rth.. Ther
na

hundreds of satellites
ellites
es in o operation
around the world. Communication
orld. Com
io

Satellite receives
eives radio
ceives rad signals from
at

one base e station and


a transmits to the
destination
nation b base station situated
N

thousands
nds of miles away. Figure
1.15 shows a satellite
communication.
These satellites are used for Figure 1.15 Satellite Communication

WAN communications, weather forecasting, television transmission, radio


communications, and internet access in Global Positioning System (GPS).
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 20

18 1 Networks and Communication


Global Positioning System (GPS)
The Global Positioning System (GPS) is a satellite-based navigation system, it has
24 satellites, their base stations and GPS receivers all over the world. GPS is a
satellite based navigation system. A GPS satellite moves twice a day around the
earth. GPS is used for finding
paths it helps the pilotsp
pi in
aviation to monitoror their path.

on
GPS works in n any weather
w
anywher
nywhe
conditions, anywhere in the

ti
world, 24 4 hours a day. GPS

da
es revolve
satellites revo
revol around the
rth in a very
earth ve specific orbit and

un
ansmit signals to earth. GPS
transmit
receiv
receivers
Fo take this information
and calculate the user's location.
GPS used by a car is shown in
figure 1.16.
k
oo

Figure 1.16 GPS Transmission


ssion
on

Bluetooth
B

fo short range wireless interconnection of electronic


Bluetooth is a standard for
devices. This wireless technology
al

helps Bluetooth-enabled devices


to connect to each other within a
short range. Bluetooth creates a
Personal Area Network (PAN) for
its users. Cell phones, for
example, can be paired with
headsets using Bluetooth.
In addition to being attached with
Figure 1.17 Bluetooth phones, short-range Bluetooth
technology is also workable with personal computers, laptops, printers, digital
cameras, telephones, and video game consoles.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 21

1 Networks and Communication 19

Key Points
x A network is defined as an interconnection of two or more computers to facilitate
communication and resource sharing.
x The purpose of network is to share data and resources.
x A receiving device receives the sent or transmitted data.

on
x The device that converts digital signal into analog and analog signals
ignals into digital
is termed as communication device.

ti
x A transmission medium sends the signals from and to communication
communi
communic device.

da
x A server holds all the resources to be shared on the network.
network
etwork
x A client uses the resources provided by the server.

un
ver.
r.
x There are three types of computer networks,, LAN, MA
MAN and WAN.
Fo
x A Local Area Network (LAN) is group of computer
compute joined together in a limited
geographical distance or area.
x A Metropolitan area Network (MAN)
k

spread over a larger area e.g. in a city.


AN)) is spre
oo

x A Wide Area Network (WAN) spreads


preads
eads over
ov area larger than that of MAN i.e. across
cities or continents. A WAN can have many LANs and MANs connected in it.
B

x A Dial up Modem is theedde


device
vice used to connect a computer through telephone
mputer.
puter.
lines to another computer.
x A Network Interface
ce Card is the device used to connect a computer to a network.
face
x There are three types
type of physical transmission medium, twisted pair cable,
ble and fiber optics.
coaxial cable
x Technology
nology at the boundaries of knowledge is termed as cutting edge technology.
x A cellular ccommunication system is based on mobile phones.
x A communication
m satellite is stationed in the space for telecommunication.
x GPS Global Positioning System is a satellite based navigation system.
x Bluetooth technology is wireless and short range technology that connects
devices in nearby distances.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 22

20 1 Networks and Communication

Exercise
Q 1: Choose the correct option.
i. What does two or more computers connected together is called?
a. GPS c. Network

on
b. Modem d. LAN

ii. Which device is used to initiate the transmission of data?

ti
da
a. Receiving Device c. Sending Device
evice
vice
b. Transmission Device d. Communication
unication
nication Device

un
iii. Which is the device used to send and receive information
informati
formati over telephone lines.
a. WAN
Fo
c. Client
b. Modem d
d. Computer
Co
k

iv. The computer that uses the resources


ources
rces of sserver is called a?
oo

a. Switch c. Server
lB

b. WAN d. Client
v. How much area does
es a WA
WAN cover?
na

a. A City c. A Continent
io

b. An Organization
anization d. A Room
vi. Whichh iss the cable
ca that has an insulated copper cable to carry high frequency
at

ta signals
data signals?
N

a. STP
TP c. Coaxial Cable
b. UTP d. Fiber Optics
vii. What material is fiber optics cable made of?
a. Glass Fibers c. Copper Wires
b. Insulator d. Foil
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 23

1 Networks and Communication 21


viii. Which technology is used for weather forecasting?
a. GPS c. Satellite Communication
b. Twisted Pair d. Coaxial Cables

ix. How many times in a day a GPS satellite moves around the earth?
a. Twice c. Four times

on
b. Thrice d. Five times

ti
x. Cellular communication is based on?

da
a. Cables c. Cells
b. Insulator d. Satellite
lite
e

un
Q 2: Fill in the Blanks. Fo
i. ccepts d
ccep
A ______________ is a device which accepts data or information transmitted
to the sender.
k

ii. The ______________ holds all the


he reso
resources required by a network.
oo

wn all clie
iii. If ______________ is down clients are affected.
lB

iv. The network of computers


pute confines in a building is called___________
ute con
v. ____________ is satellite based navigation system.
s a satellit
satelli
na

vi. A _____________
____ is a network that covers a city.
_____
io

vii. NIC is a compute


computer hardware used to connect a computer to a _____________.
at

viii. Twisted
sted Pair Cables are _______________.
ix. A Coaxial
Coaxia Cable is made of a _________ wire.
Coaxi
N

x. ___________ is a standard for short range wireless interconnection of


electronic devices.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 24

22 1 Networks and Communication


Q 3: Match the Column:
Column A Column B Column C
i. LAN Analog & Digital
Signals
ii. GPS Copper Cable
iii. Server Computers Connected

n
in a building

io
iv. Fiber Optic Aviation

at
v. Dial Up Modem Shares its resources

d
vi. Glass Fibers

un
Q 4: Differentiate between the following: Fo
i. Client and Server
ii. LAN and MAN
k

iii. GPS and Bluetooth


oo

iv. Sender and Receiver


v. MAN and WAN
lB

ng:
g:
Q 5: Define the following:
i. e Card
Network Interface
na

ii. on Devic
Communication Device
Transmi
Transmis
iii. Physical Transmission Medium
io

al Cable
iv. Coaxial
at

v. wisted
isted Pair
Twisted Pa Cable
N

b
Q 6: Give brief answers to the following questions:
i. What is Computer Network?
ii. Define Network Components.
iii. What are advantages of LAN?
iv. State some disadvantages of WAN.
v. Write a short note on Bluetooth technology.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 25

1 Networks and Communication 23


Q 7: Give detailed answers to the following questions:
i. What are different types of Computer Networks? Explain any two of them.
ii. Write a detailed note on Dial-up Modem.
iii. Explain satellite communication in detail.
iv. What do you understand by GPS? Explain.
v. Explain the function of cellular communication.

on
Lab Activities
x

ti
Examine the type of network of school computer lab.

da
x Explain the types of cables mentioned, check which
h type of
ich o transmission
medium is used in computer lab at your school.

un
Fo
k
oo
lB
na
io
at
N

x Topics of the networks are to be demonstrated in the computer Lab.


x The students must be taken to the Lab so they get familiar with the environment of
LAN.
x Different cables (Copper cable, coaxial Cable etc.) can be shown to the students.
x Demonstrate the Bluetooth technology using phones and computers.
x Let students transfer data using LAN features under your supervision.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 26

2
COMPUTER
SECURITY THREATS

on
This
is is 2
200 days
day lesson

ti
After completing this lesson, you will be able to: (period
riod including homework)
d includin

x Identify computer security threats


x Define different types of threats: virus, worms, adware
dware
are and hacker
x To understand the cause of spread of virus
x Define anti-virus
x Concept of virus definitions and to apprehend
rehend th
the necessity to update virus
definitions regularly
x Learn how to scan a computer for
or viruses
x Learn about widely used antivirus
virus
rus soft
software
sof
o
lB

Reading
na

INTRODUCTION
ON
N
Computerr security is a field of information technology which deals with data
io

he objective
protection. The object of computer security is to ensure protection of information
uable
ble dat
and valuable data from theft, corruption, or natural disaster, while keeping it
at

ssible to its
accessible it assigned users. The term computer security means the collective
N

sses b
processes by which private and confidential information is protected from the
unauthorized users or programs with malicious intentions.
2.1 COMPUTER SECURITY THREATS
Security, in the context of computer science is the protection of information
and valuable data against unauthorized user’s access, hacker attacks, data
corruption by harmful software & theft. A threat under this context can be defined
as a potential risk to computer security.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 27

2 Computer Security Threats 25

2.1.1 Type of Threats


Threats are the possible ways in which the vulnerability of the computer
security system can be exploited by the malignant users or software. Following are
some common computer security threats:
x Virus
x Worms

on
x Adware
x Hacker

ti
Virus:

da
Virus is a malicious program that has the ability to
o attach itself
iits with any other
program and make changes in the code of its host st which may
m alter its working

un
altogether. As a result the modified program cannot
nnot function properly.
ot funct
functi
A virus can harm the computer in the following
ng ways:
Fo
x It can destroy data stored in the hard disk
sk by either
eit
e formatting it without warning
or by destroying some of its parts.
k

x It can change the boot sector off the ha


har
hard
oo

disk. If the boot sector of a disk dis is


d
lB

ompute cannot
affected, after which the computer
boot.
x The computer viruses
na

iruses
uses are
ar automatically
he main memory of the
loaded into the
io

rema in the memory. This


computer and remain
slows down
own the processing speed of the
at

computer.
mputer.
puter.
N

x A virus can
ca destroy BIOS of the computer. Figure 2.1 Virus
Worms
Worm is a self-replicating program and does not require a host program. A
host program is the one that provides services to smaller or less capable programs
or devices. The program creates a copy of it and causes it to execute; no user
interference is required. Worms are named for the way they move from computer
to computer, using networks. This action gives many worms a high speed in
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 28

26 2 Computer Security Threats


spreading themselves. In general
terms a worm is a program that has
the ability to copy itself from one
computer to another.
A worm can harm the computer in the
following ways:

on
x It reduces the working
workin of
computer.

ti
x By copying itself many
m times it
Figure 2.2 A Worm detected in computer

da
reduces the
e disk sspace.
Adware

un
Adware or advertising-supported software re automatically
autom displays and
downloads advertisements to a computer when use users are connected to the
Fo
Internet.
nternet. These advertisements can be
a pop-up.
po They may also be on a
ok

screen
sc presented to the user during
the installation process. The objective
of the Adware is to generate revenue
for its developer. Adware, by itself, is
harmless; however, some adware may
also come with integrated spyware
which can have negative impacts. A
spyware is software that gathers
information about a particular user or
at

Figure
igure
gure 2.3 Screen
S full of pop-ups organization without their knowledge.
N

Hackerer
Hackers are programmers who use their expertise for malicious purpose.
The term notorious hackers, sometimes called crackers, refer to those who break
into computers without authorization. Mostly hackers break into system because
of their personal satisfaction to learn and explore new outcomes and threats that
they can cause to other systems. Current losses due to hacker attacks are
significantly smaller than the inside theft and sabotage. The hacking problem is
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 29

2 Computer Security Threats 27


widespread and serious. They get access to services without paying for them; they
steal information for crime purposes. Hacker gets unauthorized access to data and
system and damages it.
2.1.2 How Threats Spread
The following are some common ways of spreading viruses, worms and
adware:

n
x Through infected flash drives/USBs

io
x Email attachments

t
x Surfing insecure websites

da
x Installing pirated software

un
Infected flash drives/USBs
USB flash drives are widely used for storingng and transmitting information.
oringFo
When a user inserts a USB disk that has malicious
alicious programs
pr
p in it, it can damage
data stored on the computer and spreadseads the virus to other drives or other
computers on the network. Always scan
ann a flash
flas drive before using it into computer.
k

E-mail Attachments
oo

An Email attachment is a computer


compute file sent along with an Email message.
During early times, the only way
B

user could usually get et a


l

computer virus was by inserting


nsertin
na

an infected floppy disk into


computer. With th the advent
ad of
io

the Internet,, now computer


at

viruses have an easy way to get


into millions of computers at
N

once. One
ne of simplest way for a
computer to get infected is via
an Email attachment. More than
one files can be attached in an
Email. Some viruses usually
come attached to the Emails. Figure 2.4An E-mail Attachment containing Virus
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 30

28 2 Computer Security Threats


As soon as the user clicks on the Email attachment the virus is downloaded and
the computer is infected. The file shown in figure 2.4 is a virus, attached to this
Email.
Surfing Insecure Websites
The World Wide Web contains some insecure websites. These websites
offer downloading links for useful programs installations. When these prog
programs

on
are downloaded they bring with them viruses, worms or adwares.. Opening
Openin such
files infects the computer system. The computer viruses can not only caus
cause serious

ti
damage to machine, they can also steal valuable personal information
formati that could

da
have long-term harmful effects on life and livelihood.
Installing Pirated Software

un
Pirated Software is unauthorized copies of licensed
ensed software.
s It is a crime to
make pirated software. Such software can also affectaffec the computer; they may
Fo
contain viruses or worms in them. Sometimes es the d distributors of pirated software
intentionally infect them with viruses.
k

2.2 MANAGING
GING
NG AN
A ANTIVIRUS
oo

2.2.1 Antivirus
Antivirus is a software which is used to prevent, detect, and remove various
lB

rm,
threats like viruses, worm,m, Trojan
T oja horses, spyware and adware etc.Bernd Fix
ntivirus
virus software
developed the first antivirus so in 1987. Antivirus programs are developed
na

ree environment.
to ensure a virus free env They are designed to detect and remove
viruses from thee infected programs.
io

oftware
ware typically
Antivirus software typ
ty uses two different techniques to accomplish this:
at

1. amining fifiles to look for known viruses by means of a virus database.


Examining
2. dentifyi
dentifyin
Identifying suspicious behavior from any computer program which might
N

ca infection.
indicate
VIRUS DEFINITIONS/UPDATES
What are Virus Definitions?
A virus definition refers to the database of all current virus description files
used by particular antivirus software for virus detection. Virus definitions are
database of information about the viruses maintained by antivirus companies.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 31

2 Computer Security Threats 29


Virus definitions are the primary method of detection for most antivirus software
programs. Antivirus program automatically downloads these definitions when
connected to the internet. If they do not know the latest virus definition then they
cannot detect and remove the viruses from computer systems. Protecting
computer from virus threats requires regular maintenance and keeping security
software up to date. Browsing the Internet, downloading email attachments en and
instant messaging are common ways of infecting a computer with an unwanted unwa

on
virus or spyware. A virus may be hiding in computer if it begins acting
cting strangely
stra or

ti
constantly rebooting.

da
How are Virus Definitions Used?
During a virus scan, antivirus software compares s the con
content on a computer

un
movable
ovable d
(including the hard disk, boot sectors, RAM, and removable drives) against its virus
definition database, to recognize the symptoms s or patte
Fopattern of modified code by a
effecti
effect
likely virus. This enables antivirus software to effectively detect viruses upon the
discovery of any of the code included in thee virus
irus d
definition database.
Why is Virus Definitions Important?
t?
k
oo

For antivirus software to provide


rovide e effective protection, to enjoy effective
protection by an antivirus software,
ware, it is essential that the virus definition database
lB

used is comprehensive and frequently


equent updated. Virus authors are constantly creating
f equentl
new variants and new viruses i attempt to exploit vulnerabilities in user’s systems.
uses in
All it takes is one wormorm virus to wreak havoc and cause major destruction to a
m or vir
vi
na

system or network. rk. In order


orde for antivirus software to provide maximum protection, it
io

should be able detect all known viruses, including the latest threats.
e to detec
dete
2.2.2 Commonly
mmonly Used Antivirus Software
at

The follo
following are some commonly used
N

as antivirus
ivirus software.
Symantec
Symantec Corporation is the
manufacturer of security software for
computers, best known for its Norton brand. It
is a powerful and effective antivirus program.
Figure 2.5 Symantec Logo
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 32

30 2 Computer Security Threats


MacAfee
McAfee is the world's largest famous security company. With their
comprehensive security software McAfee ensure that computers are
protected from the latest threats. They also provide software that makes it
safer for children to be online, with filtering and monitoring options that give
diag
ag
parents greater peace of mind. McAfee Security Scan Plus is a free diagnostic
tool for checking of computer err for right

on
protection and determines if itt is on and
an
a up to
ans,
ns, and potentially
date. It can Malwares, Trojans,

ti
unwanted programs in running
unning p processes and

da
modules loaded by thesehese pr
p
processes. It also
Figure 2.6 McAfee Logo story
ory and cookies.
scans browser history

un
AVG
AVG was founded in 1991 with the main purposepose of protecting
p people around the
Fo
security technologies. AVG has made
world using the latest in cutting edge security
ation
tion in the industry in software
innovation
k

velopmen
lopmen threat detection, threat prevention
development,
oo

and risk analysis. AVG anti-virus is free of cost it


b downloaded from the internet. The former
can be
lB

na
name of AVG was Grisoft. The disadvantage of
AVG is that it also removes the infected file from
na

Figure 2.7AVG Logo


ogo
the computer.
2.2.3 SCANNING
NING A COMPUTER FOR VIRUSES
io

Let’s see
e the use
u of Norton Anti-virus program to scan a disk on computer as
at

mple. To scan a computer for viruses an antivirus must be installed on the


an example.
puter. A
computer. Almost all the antiviruses
N

Do you know!
am function for scanning the
have same
Cookies area small piece of data sent from
computer. To scan a disk for possible a website and stored in a user's web
virus infection, follow these steps: browser while the user is browsing that
website. The settings of Cookies can be
1. Click on the start button.
maintained by the user, the user can allow
2. Go to program menu. different websites to create cookies or user
3. Select Norton Antivirus. can also stop them from doing so.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 33

2 Computer Security Threats 31

Figure 2.8 Welcome


e Screen of
o Norton Anti-Virus
oo

4. The screen will appear as shown


hown
wn in fig
figure 2.8.
5. Click on full system scan.
lB

arr as shown
6. The screen will appear ho in figure 2.9 showing the scanning process.
7. The result of the scan
an will be as shown in figure 2.10
na

Figure 2.9 Scanning Process Figure 2.10 Scan Results


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 34

32 2 Computer Security Threats

Key Points
x Computer security is the protection of information and valuable data security
from theft, corruption, or natural disaster, while allowing the information and
property to remain accessible and productive to its intended users.
x A virus is a malicious program that infects computer programs
ms and make
m

on
changes in program code.
x A worm is a self-replicating program that does not change program

ti
rogram code.
x An adware automatically plays or downloads advertisements

da
ments on
ements o the computer
from internet.

un
x Hackers are programmers who gain access computer system without
s to com
authorization. Fo
x Email attachments are one way of spreading
ding viruses.
viru
x Pirated software is unauthorized copy
py of a licensed
c
ce software.
k

x An anti-virus is software used to prevent


preve and remove computer threats like
preven
oo

viruses, worms etc.


x Virus definition refers to the
he database
databa
datab of all current virus signature files.
lB

x Commonly used antivirus


rus programs
virus p og are Symantec, AVGand McAfee etc.
na

Exercise
io

Q 1: Choose
se
e the correct
cor option.
at

i. ich is the field of information technology which deals with data protection?
Which
a. Hacker c. Threats
N

b. Computer Security d. Virus


ii. Which is a malicious program that infects computer program and make
changes to the computer program?
a. Virus c. Worm
b. Hacker d. Adware
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 35

2 Computer Security Threats 33


iii. Which type of threat may change the boot sector of the hard disk?
a. Worm c. Adware
b. Virus d. Hacker
iv. Which type of program is a pop-up add?
a. Virus c. Adware

on
b. Worm d. Hacker
v. What is widely used for storing and transmitting information
on and data?
d
da

ti
a. Flash drives c. Email

da
b. Software d. Websites
es

un
vi. Which type of threat copy itself many number
ber
er of tim
times to reduce the disk
space? Fo
a. Virus cc. W
Worm
b. Hacker d. Adware
k
oo

vii. What is the place from where


e infected
nfected programs are downloaded?
a. Insecure websites c. Email attachments
lB

b. Secure websites d. All of them


viii. By whom virus definition
efinition database is maintained?
na

a. Virus definition
ition
on dictio
dictionary c. Antivirus companies
io

b. Websites
es d. Email attachments
at

ix. Which
ich anti-virus
anti-v was developed in 1991 for protecting people from viruses?
a. AVG c. Symantec
N

b. Norton d. McAfee
x. What must be installed on computer to scan for viruses?
a. Cookies c. Flash drive
b. Antivirus d. Adware
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 36

34 2 Computer Security Threats


Q 2: Fill in the Blanks.
i. Security means to prevent access to information and valuable data by
___________.
ii. Threats are possible dangers that may exploit the _________ of the system.
iii. ________refers to viruses, worms, or adware software.
ams.
ms.
iv. ______________ is a malicious program that infects other programs.

on
v. __________ collects information about a particular user or organ
organization
without their knowledge.

ti
vi. Adware by itself is _____________.

da
vii. USB flash drives are widely used or
for __
___
___________ and
___________information.

un
etect
ect and _______ various threats.
viii. An anti-virus is software used to prevent, detect
Fo
______.
ix. Norton is the brand of ___________________.
x. he d
Virus definitions typically refer to the da aba of all current virus signature
database
files used by a particular antiviruss software
softwar for_____________.
k
oo

Q 3: Match the Column:


Column A Column
mn B Column C
B

i. AVG Provide
P ovide service to
smaller program
sm
l
na

ii. Virus Compares with


database
io

iii. Host Program Files attached


iv. Email Attach
Attachment Grisoft
at

v. Virus Scan Destroy database on


N

hard disk
Q 4: Differentiate between the following:
i. Virus and worm.
ii. Virus definition and updates.
iii. Email and surfing the internet.
iv. Hacker and Adware.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 37

2 Computer Security Threats 35


Q 5: Define the following:
i. Virus
ii. Email attachments
iii. Infected flash drives.
iv. AVG
Q 6: Give brief answers to the following questions:

on
i. What do you understand by computer security?

ti
ii. Write a short note on security threats.

da
iii. Who is a hacker?
iv. How viruses are spread?

un
v. What do you understand by the term worm?
g questio
Q 7: Give detailed answers to the following questions:Fo
ebsite
ebsites?
i. What happens by surfing the insecure websites?
ii. What is an antivirus? Explain.
k

iii. What is virus definition?


oo

Lab Activities
x Which Antivirus is installed
d in your
you computer lab?
yo
lB

x How a computer is scanned


canned
anned for viruses?
x Scan the computer
na

terr for viru


viruses using the antivirus of your computer.
x Download virus
us
s definiti
definition for the antivirus in your computer and install them.
io
at
N

x Show the students different types of virus in computer.


x Demonstrate the installation and use of an anti-virus program.
x Allow students to Scan and clean computers using anti-virus programs.
x Provide students your assistance in scanning computers for viruses.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 38

36 3 Spreadsheets in Excel

3
SPREADSHEETS
IN EXCEL

o
ti
This
s is 40 days
d
da lesson
After completing this lesson, you will be able to: (period
period includ
incl
including homework)

x Define Spreadsheet
x Know the purpose of spreadsheet
x Recognize spreadsheet software – Excel
x Explain Workbook & Worksheet
x Get familiar with Excel application window
x Identify Columns, Rows, Cells, Cell address
ss
x Manipulate data (numeric and non-numeric)
eric) into a cell/range of cells by: Entering data,
meric)
Editing data, Auto filling data
x Enter a formula
x Insert functions (SUM, PRODUCT,
DUCT, AVERAGE,
AVE POWER, SQRT, MAX, MIN)
x ch a
Create a spreadsheet such resul
resu sheet, monthly expenses, and salary report etc.
as result
x Save a spreadsheet
x Format Worksheett Elements (Fonts, Font style, Font size etc.)
x Apply borders and
d shading
shadin to a cell/range of cells
x Insert new rows/colum
rows/columns
ows/colu
x Insert Charts
harts
rts (Column
(Colu
(Co Chart, Line Chart, Pie Chart)
at
N

Reading
Re

INTRODUCTION
A spreadsheet is software that provides the facility to analyze numerical data
and perform mathematical operations on it. A spreadsheet is made up of table which
contains the data. It can also perform complex computations using built in functions.
Spreadsheet provides the facility of representing data in pictorial form using chart.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 39

3 Spreadsheets in Excel 37
Therefore, the spreadsheet is a multi-purpose tool that works as well for office
activities that involves organizing large quantities of data, as at the strategic and
decisional level by creating graphical representation of synthesized information.
3.1 INTRODUCTION TO SPREADSHEET
A spreadsheet provides the facility to organize data in rows and columns.
Spreadsheet is an application software that allows the user to organize ize
e the data

on
tabular form, manipulate it and plot it. Best examples of spreadsheet readshee
eadshee are
tion
on etc. in this unit
calculating overall grades of student, salary data of an organization

ti
students will learn to create and use of spreadsheet software e MS Exc
Exce
Excel.

da
3.1.1 Spreadsheet
A spreadsheet is defined as a sheet containing information
informatio
formati arranged in rows

un
umbers.
mbers. A spreadsheet is also
and columns. The information can be text or numbers.
ted on computer
known as a worksheet. Spreadsheets are created co
Fo using spreadsheet
software. Microsoft Excel, Lotus 123, Open en Office-Calc
Office and Quattro Pro are
are.
e.
examples of popular spreadsheet software.
3.1.2 The Purpose of Spreadsheet
sheet
heet
k
oo

A spreadsheet provides thee facility to


t organize data in rows and columns so
that it becomes easy to interpret
pret and analyze. For example user can see report
lB

p adshee
pre adshe where marks are arranged in a form of grid
card is an example of a spreadsheet,
ong with
of rows and columns along wi
wit different subjects. Furthermore we can take the
metable
table an
example of daily timetable and date sheet for terminal and annual examinations.
na

lso used
A spreadsheet is also use for the following purposes:
x Spreadsheet
io

eet software
softwa is a program or a set of programs that let the user to
softw
spreadsh
preadsh
create spreadsheets electronically and helps in calculating, analyzing and
at

nipulating
ipulating data.
manipulating
N

sed to:
It is used
x Create charts/graphs
x Create budget sheets
x Create result sheets
x Apply statistical formulae
x Create inventory reports
x Be used for financial analysis in business.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 40

38 3 Spreadsheets in Excel
3.1.3 Spreadsheet software – Excel
Microsoft Excel is very popular and widely used spreadsheet software,
developed by Microsoft. In this chapter we will learn Excel as a tool to learn
spreadsheet software. MS Excel is spreadsheet software included in MS Office suit.
How to start MS Excel application Window

n
l
na

Figure 3.1 Starting Excel


e used to
Following steps are t start MS Excel:
io

tart Butto
1. Click on Start Button on Windows Desktop
2. Select All Progr
Progra
Programs from the Start Menu
at

lect Microsoft
3. Select Micro Office from “All Programs Menu”
N

ck on Microsoft Excel 2007


4. Click
3.1.4 Workbook and Worksheet
Worksheet
Worksheets are a part of workbook. When the user opens MS Excel a whole
workbook opens in front showing worksheet1 to work on. A worksheet is a
collection of rows and columns, that contains data, both text and numbers to be
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 41

3 Spreadsheets in Excel 39
manipulated as required. The interaction point of a vertical column and horizontal
row is called “Cell”
Workbook
An MS Excel file is termed as a workbook. A workbook is made up of many
worksheets. A worksheet is the main working area where data is entered and
calculations are performed. When a user opens MS Excel by default it provides
pr

on
three worksheets for working. However, a user can also insert sert additional
rt addi
addit
worksheets or delete them if no more required.

ti
3.1.5 MS Excel Application Window

da
An electronic worksheet display contains two main components,
ponents,
nents, tthe control panel
and the window.

un

Figure 3.2 MS Excel Sheet


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 42

40 3 Spreadsheets in Excel
Title Bar
The top most bar of MS Excel window is called the Title Bar. There are
control buttons (minimize, restore and close) at the right side of title bar.
Office Button
h iincludes
The left most side of MS Excel window has an Office button which
different functions like Open, Save, Save As, Print and New.

on
Quick Access Toolbar

ti
ently
The Quick Access Toolbar provides access to frequentlytly used commands

da
ons
ns can also
like Save, Undo, Redo and customize buttons. More buttons a be added to
the quick access toolbar depending upon the need of the
he user.

un
Ribbon/Ribbon tabs
ch contai
Just below the title bar is the Ribbon which contains all the command buttons
Fo
grou which contains the commands
in the form of tabs. Each tab has command groups
and dialog box launcher.
k

Name Box (Address Box)


oo

The address box or the Name bo b


box is at the left corner below the ribbon. It
ent or a
contains the address of current ac
active cell.
lB

Formula Bar
na
io
at

Figure 3.3Ribbon
N

The Formula Bar lies below the ribbon. The user can enter
formula/function in the Formula Bar for calculation. When the user enters any
data in the cell it is automatically displayed in the Formula Bar. In figure 3.4 the
active cell is B2 shown on the left of formula bar and its content is 20 shown in
the formula bar.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 43

3 Spreadsheets in Excel 41

ti
Figure 3.4 Formula Bar

da
Worksheet Window

un
Worksheet is the main working area, in which all
al the data is entered.
orksheet
ksheet is divided into rows and
This data can be numbers and text. The worksheet Fo
columns. The top right of this window has the control buttons and help
button.
k

Sheet Tabs
oo

Worksheet tabs are used to switch among the worksheets. At the bottom of
the workbook three sheet tabs abs are llo
located. MS Excel opens with these three
lB

eet shee
eet1
worksheets by default sheet1, sheet2 and sheet3. The user can navigate in these
he
sheets by clicking on thee tabs. The
T name of an active sheet is in bold. The inactive
na

sheets have grey tabs.


abs.
s.
3.1.6 Important
tant Objects
Obj of Worksheet
io

A worksheet
et comprises
compri
compr of rows, columns, cells and cell address.
at

Columns
ns
N

In a spreadsheet
sp Column is the vertical space that is going up and down the
window i.e. from top to bottom on the worksheet. Columns are groups of cells from
top to bottom. Letters are used to designate each Column's location from A to Z
and then the names begin pairs of letters that is AA to AZ and so on. Maximum
number of columns in Excel is 16,384.In figure 3.5 the Column labeled C is
highlighted.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 44

42 3 Spreadsheets in Excel
Rows
In a spreadsheet Row is
the horizontal group of cells
that is going across the
window i.e. from left to right in
the worksheet. Numbers mbe
be are
Column used to designate te each Row's
R

on
ginning
inning from
location beginning f 1
048,576.
8,576.
through1,048,576. For

ti
example le
e in figur
figure 3.6 row 4 is

da
Figure 3.5 Column
cted.
ed.
selected.
Cells
ells

un
Cell is an intersection of
ro and column. Every cell is
row
Fo
assigned a name according to
Row
ow its COLUMN letter and ROW
k

number. Every cell holds data.


A cell is shown in the figure 3.7.
o

A cell can hold values, labels,


B

Figure 3.6
6 Row
ow formulas, or functions.
Cell Address
al

Each cell has a Cell


Address. Cell address
identifies the location of cell.
The cell address is the column
letter and the row number of
Cell that cell for example in figure
3.7, the current cell address is
C4. C is the column and 4 is
the row of this cell. Cell
Figure 3.7 Active Cell address is also called
reference. There are two types of cell references, relative and absolute. By default,
all cell references are relative reference.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 45

3 Spreadsheets in Excel 43

3.1.7 Data Manipulation


Data manipulation is the process of taking data and converting it into
meaningful form by using formulas and functions. Data manipulation contains
entering data, editing data and updating it.
Entering Data
Entering data in Excel sheets is very simple; to enter data in a cell:

on
1. Select the cell by clicking on it.
mula
la bar.
2. Start typing and the user will see data appearing in the formula

ti
3. Press enter when the user has finished typing.

da
Editing Data

un
Modifying or changing already entered data iss called
alled editing
ed data. To edit the
data in some cell: Fo
anged. Th
1. Select the cell in which data has to be changed. T
The contents will appear in the
formula bar.
ell to edit data
2. Double click the contents of the cell d in it or just click the cell to erase
k

the previous content and add new. w.


oo

ess enter
3. After entering new data press enter.
lB

Auto filling Data


The auto fill feature
ure Excel allows
e of Ex
na

the user to enter the e predefined


predefin values in
predefi
a series in cellsells automatically.
autom These
io

values can be e numbers


numbe series, names of
at

days of the week or months of the year.


Dates s can also be entered using auto fill
N

data feature.
eatu Some examples of auto
filling data are given as follows:
Auto Filling of Numeric Data
To create a series of numbers or
serial numbers in sheet, following steps
should be followed:
Figure 3.8 Auto filling data
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 46

44 3 Spreadsheets in Excel
1. Place the pointer in the first cell
from where the series has to
begin.
2. Enter the first value in the cell.
3. Enter the next value in the
adjoining cell i.e. the cell
ell n
next to

on
the first cell.
th
h the ce
4. Now select both cells.

ti
5. Place thee pointer at the right

da
corner on the border of the
ected
ted range,
selected ra the pointer

un
changes
anges tto a “+” sign.
Fo 6. Drag the “+” sign to the area
6
wh
h
where to fill in the whole series.
Figure 3.9 Column A Shows Auto Fill h cells will be filled by the series,
The
k

Numeric Data as shown in figure 3.9:


oo

Auto Filling Text Data


s can be entered for example Sunday, Monday, and
In the same way a text series
lB

Tuesday etc.
To enter text data in a series follow the following steps:
na

1. Place the pointer


er in the first cell from where the series has to begin.
nter
io

2. Enter the
e day of tthe week in the cell; the user can enter abbreviation or the
complete
at

lete
te word.
word
ace the p
3. Place pointer at the right corner on the border of the selected range, the
N

ter changes to a “+” sign.


pointer
4. Drag the “+” sign to the area where the data is to be filled in the whole
series.
5. The “+” sign is called fill handle.
The cells covered will be filled by the series, as shown in figure 3.10.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 47

3 Spreadsheets in Excel 45

oo

Figure 3.10 Column


olumn
mn A Shows
Sh Auto Fill Text Data
lB

3.1.8 Entering a Formula


ula
A formula is an express
expression
xpres used to automatically perform mathematical
calculations on the dataata in Excel.
E The user can perform simple calculations in a
na

sing
worksheet by using ng formu
form
formulae. Whenever the data is updated the calculations
up
upd
automatically gets updated in the worksheet. Every formula starts with an equal
io

efore
ore it. For
(=) sign before Fo
F example = C4+C5+C6
at

Consider
er the following
der fol
fo example for using formulae in Excel:
N

Supposeose the user wants to find the total marks scored by a student in some Exam
in five subjects.
x Enter the name of the students and other details like roll number etc,
x Then enter the five subjects and their marks in the next columns.
x Begin entering from column A for Roll number then column B for Name and so
on till column G for all five subjects, use column H for total marks.
x Type the formula sign ‘=’ in column H
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 48

46 3 Spreadsheets in Excel
x Type the desired formula for totaling for example =75+80 +69+85+70
x Or type formula using cell addresses for example = C1+D1+E1+F1+G1
3.1.9 Inserting Functions
A function is a predefined or prewritten formula that takes a value or values,
performs an operation on a range of cells selected by the user, and returns a value
works
or values. Functions are used to simplify and shorten formulas on a worksheet.

on
Using Excel user can insert their own formulae. Moreover, Excel provides u us with
some predefined functions and formulae. Functions are ready dyy to use formulas

ti
roduct, Average
provided by Excel to perform basic calculations like Sum, Product, A etc.

da
and complex calculations of comparisons etc. Some of themhem
em are a as discussed:
SUM FUNCTION

un
Purpose:
The SUM function takes all of the values in each of the t specified cells and adds
Fo
their values. In other words it adds the numeric values in the cells specifies. Blank
m ric vvalu
cells will return a value of zero to be added
ded to the
t total. Text cells cannot be added
k

to a number and will produce an error. ror.


r.
oo

Syntax:
The syntax is:
B

=SUM (Argument1,
Argument2….Argument N)
For range of cells the syntax will be:
=SUM(Cell1:CellN)
Where: represents range of cells
Example:
=SUM(20, 25, 29, 31)
= SUM(B1, B2, B3, B4)
=SUM(A9:A15)
Figure 3.11 shows the SUM
Figure 3.11 SUM Function of five numbers in Column A, the
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 49

3 Spreadsheets in Excel 47
SUM formula is applied in Cell C1. The formula can be seen appearing in the
formula bar.
PRODUCT FUNCTION:
Similarly user can take product of numbers using the PRODUCT formula.
Purpose:
The PRODUCT function multiplies all the numbers in the selected cells
s or range
ells r

on
of range of cells.
Syntax:

ti
=PRODUCT(Argument1, Argument2…..Argument N)

da
=PRODUCT(B1, B2, B3, B4)

un
=PRODUCT(Cell1: Cell N)
Example: Fo
= PRODUCT(4, 7, 9, 11)
=PRODUCT(A2, A5, C3, D4)
k

=PRODUCT(A1:A12)
oo

Figure 3.12 shows product of numbers


bers from
umbers fro Column A into cell C3.
B
at
N

Figure 3.12 PRODUCT Function


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 50

48 3 Spreadsheets in Excel
AVERAGE FUNCTION
Purpose
The AVERAGE function finds the average of the specified data. Average is
calculation of sum of all indicated cells together and dividing by the total number
of cells. Text fields and blank entries are not included in the calculations of the
AVERAGE Function.

on
Syntax
The syntax is as follows;

ti
=AVERAGE(Argument1, Argument2….Argument N)

da
=AVERAGE(Cell1: Cell N)

un
Examples
=AVERAGE(22, 32, 52, 38) Fo
=AVERAGE(B1:B9)
POWER FUNCTION
k

Purpose
oo

The power or exponent functionon finds tthe exponent of the given number i.e. if a
number is multiplied certain number
numbe of times to itself.
lB

Syntax
na

The syntax of power


er function is:
=POWER(Number,
ber, Power)
er, Powe
io

=POWER(Cell1,
Cell1, Cell2)
ell1, Cell
at

Example
le
=POWER(3,7)
WER(3
WER(3,7
N

The POWER
W function is inserted using following steps:
1. Click the cell in which to see the results of POWER function.
2. Select the Formula Tab from the ribbon tabs.
3. Click on insert function button.
4. The insert function dialog box will appear.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 51

3 Spreadsheets in Excel 49
5. Select the power function from it.
6. Click OK the function argument dialog box will appear.
7. Insert the number or cell address for which power has to be calculated, in
Number1 field.
8. Insert the exponent or cell address in Number 2 Field.
9. Click OK the Power will be calculated.

on
SQRT FUNCTION
Purpose

ti
The square root of the number can be found using SQRT function.
unction.

da
Syntax
The syntax is:

un
=SQRT(number) Fo
=SQRT(Cell1)

Figure 3.13 Insert Function

To insert a SQRT function follow these steps:


1. Click the cell in which to see the results of SQRT function.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 52

50 3 Spreadsheets in Excel
2. Select the Formula Tab form the ribbon tabs.
3. Click on Insert Function button.
4. The insert function dialog box will appear.
5. Select the power function from it.
6. Click OK, the function argument dialog box will appear.
alculat
culat
7. Insert the number or cell address for which square roothas to be calculated, in

on
Number field.
8. Click OK, the square root will be calculated.

ti
MAXFUNCTION

da
Purpose
s the
MAX stands for Maximum. The MAX function returns he large
largest (max) value in the

un
selected range of cells.
x Blank entries are not included in the calculations
ations of
o the MAX Function.
Fo
x Text entries are not included in the calculations
cu ations
ation of the MAX Function.
k

Figure 3.14 SQRT Function


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 53

3 Spreadsheets in Excel 51
Syntax
=MAX(Argument1, Argument2….Argument N)
=MAX(Cell1:CellN)
Example
=MAX(13, 53, 92, 115, 17, 85)
=MAX(C5:C22)

on
To insert a MAX function follow these steps:
1. Click the cell in which to see the results of MAX function.

ti
2. Select the Formula Tab form the ribbon tabs.

da
3. Click on Insert Function button.
4. The insert function dialog box will appear.

un
5. Select the MAX function from it.
appe as shown in figure 3.15.
6. Click OK; the function argument dialog box will appear
Fo

Figure 3.15 MAX Function


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 54

52 3 Spreadsheets in Excel
7. Insert the number or cell address for which maximum has to be calculated, in
Number1 field.
8. Insert more numbers in other number fields.
9. Click OK, the Maximum number will be calculated.
MIN FUNCTION
Purpose

on
MIN stands for minimum, the MIN function will return the smallestt (Min)
Min) va
value in
the selected range of cells.

ti
¾ Blank entries are not included in the calculations of the MIN
IN
N Function.
Functi

da
¾ Text entries are not included in the calculations of the MIN Fun
Function.
Syntax

un
=MIN (Argument1, Argument2….Argument N)
=MIN (Cell1:Cell N) Fo
Example
=MIN (13, 53, 92, 115, 17, 85)
k

=MIN (C5:C22)
oo

hese
se steps:
To insert a MIN function follow these steps
step
B
N

Figure 3.16 MIN Function


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 55

3 Spreadsheets in Excel 53
1. Click the cell in which to see the results of MIN function.
2. Select the Formula Tab form the ribbon tabs.
3. Click on Insert Function button.
4. The insert function dialog box will appear.
5. ea
The MIN function is not given in the dialog box, type MIN in search for
function field, click GO.

on
6. Select the MIN function from the functions appearing in the Select
elect a Function
Fu
Box as shown in figure 3.16.

ti
7. Click OK; the function argument dialog box will appear.
ar.
r.

da
8. Insert the number or cell address for which minimum
um t be calculated, in
m has to
Number1 field.

un
9. Insert more numbers in other number fields,
s, or type the cell addresses.
Fo
10. Click OK, the Minimum number will be calculated
calculated.
3.1.10 Sample Spreadsheets
k

Using Excel user can create many


any type
types of worksheets like a worksheet of
oo

result, monthly expenses, salary report


eport et
etc
etc.
Result Sheet Sample
lB

We would now consider


ide the example
side e of a result sheet and see the steps how
it is created:
na

Step 1: Open a blank


ank worksheet.
k works
Step 2: In column C1 type
io

RESULT SHEET.
HEET.
EET.
at

Step 3:: Combine


Combin the columns
using
g merge ffeature.
N

Step 4: in cell A2 type Roll No.


Step 5: move the cell pointer to
cell B2 and type Name
Step 6: then in Cell C2 to G2 type
names of subjects as shown in
figure 3.17. Figure 3.17 Result Sheet
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 56

54 3 Spreadsheets in Excel
Step 7: In cell H2 type Total.
Now the worksheet will look like this:
Now start entering the Names and marks. The new look of the sheet is shown in
figure 3.18.
After the marks are entered put formula on total column in Cell H3 to sum up the
marks as:

on
io

Figure 3.18 Result Sheet with data


at

=C3+D3+E3+F3+G3
3+E3+F3
Now mmove the pointer to the end of Cell H3 it will turn into a “+” sign, drag
N

the pointer to the column till end the


cells will get the values automatically.
Do You Know
This is how we copy the formula.
Merge Feature in Excel is used to join cells
together to show as one. The final shape of the sheet will
be as shown in Figure 3.19.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 57

3 Spreadsheets in Excel 55

oo

Figure 3.19 Result


sult
ult Sheet
Shee with data and calculations
lB

Salary Report Sample Spreadsheet


pr adshe
pre
Follow these steps to create
eate a Salary Report of employees:
na

1. Collect the required


ed data to be placed in the Salary sheet.
ired
ells in Ro
2. Merge the cells Row 3 and type the title of the Sheet as “Table of Salary and
io

Deduction”.
on
n”..
at

3. Type the Column


Colu Labels of Names Basic Pay as shown in Figure 3.20.
ype the re
4. Type required data.
N

ula the Net Pay using the formula = C5+D5+E5+F5+G5-H5


5. Calculate
6. Drag the formula into the other cells.
Short Cut Keys
7. Format the Cells. F4 Repeats the last command or
8. The Salary Worksheet is ready as action, if possible.
shown in figure 3.20. Ctrl+F4 Closes the selected workbook
window.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 58

56 3 Spreadsheets in Excel

Figure
re 3.20 Sa
Salary
S Sheet
oo

Monthly Expense Sheet


B

m nthl
nth expenses follow these steps:
To create a spreadsheet of monthly
d data to be placed in the Expense sheet.
1. Collect the required
s in
2. Merge the cells n Row 1 and Row 2 and type the title of the Sheet as “Monthly
eport”.
Expense Report”.
e Column
3. Type the Colum Labels of Items and Expenses, as shown in Figure 3.21.
e the req
4. Type requ
required data.
alculate the total expenses using the formula = SUM(C5:C15)
5. Calculate
6. Format the Cells.
Short Cut Keys 7. The Expense sheet is ready as
F7 Displays the Spelling dialog box to shown in figure 3.21.
check spelling in
the active worksheet or selected
range.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 59

3 Spreadsheets in Excel 57

oo

Figure 3.21 Month


Mont
Monthly Expense Sheet
lB

3.1.11 Save a Spreadsheet


sheet
After finishing your work
ork
k you need
ne
n
na

to save your work. In Excel to


n MS Ex
save worksheett follow these
th steps:
io

1. Click on the
he Office Button.
at

2. Select
ct Save As
A Excel Workbook
om it.
from
N

en E
3. When Excel workbook is clicked,
the Save as dialog box appears
as shown in figure 3.22 (a).
4. From Save In(as shown in figure
3.22 (b)) select the location and
Figure 3.22 (a) Saving a Spreadsheet
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 60

58 3 Spreadsheets in Excel
type the name for worksheet in File name and click on Save button and the file
will be saved.

Figure 3.22 (b) Saving a Spreadsheet


oo

3.2 FORMATTING
TING WORKSHEET
W ELEMENTS
lB

Formatting is a process
ocess
ces of cchanging the layout or appearance of the data.
Spreadsheets can be pretty
retty dr
dry, so we need some tools to dress them up a little.
na

We can use most off the tricks


tric
tri from word processor to do the formatting of text.
cs, under
Bold face, italics, underl
underline, change the color, align (left, right, center), font size,
io

n be used
font, etc. can used. It enhances the readability of the document.
at

3.2.1 Selecting a Cell or Range Of Cells for manipulation


To format
forma cell it is necessary to select them. Click on a cell and then drag
N

the pointer
nte till the end position.
nter
Selecting Contagious Cells
1. Select the first cell, hold the mouse button.
2. Drag mouse till the last desired cell, where the formatting is to be applied.
Selecting Non-Contagious Cells
1. For multiple selections of cells, use Ctrl key.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 61

3 Spreadsheets in Excel 59
2. Press and hold Ctrl Key and select the desired cells which are not in order.
Cut/Copy and Paste
Copy commands makes duplicate of the data selected. Cut moves the selected
data from one location to other.
1. For cut/copy right click on the selected cells
2. Click on cut/copy from drop down menu.

on
3. Cut command permanently removes the data from its original position and
nal positi
moves it to the new location.

ti
4. In both cases the data is placed on the clipboard, for pasting ccells select the

da
cells where the data is to be pasted.
5. Right click on cells where to paste the copied data
ta select paste
p from drop down

un
menu, and the data will be pasted.
Formatting Text
Fo
To format the text select the text, right
ht click
ght ick it and select the format cells from
it. Figure 3.23 shows different elements ts of formatting
ents fo the text. The text can be
k

formatted using both options.


oo

Font Fontt Style Font Size


B
na
io
at
N

Text Color
Co Text Alignment

Figure 3.23 Formatting Text Elements

Font
To change Font follow these steps:
1. Font can be changed from the option on home tab as shown in figure 3.23.
2. Select the cells for changing font.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 62

60 3 Spreadsheets in Excel
3. Click the font drop down arrow as shown in figure 3.24

Figure 3.24 Fonts


na

4. Select a Font, on desired font, the Font will be applied.


nt, Click o
io

¾ Font Style
tyle
e
at

nge Font Style follow these steps:


To change
N

1. Select the cells for changing Font Style.


2. Click the font styles from the home tab, the font styles are bold, italic or
underline
3. The selected font style will be applied.
¾ Font Size
To change Font Size follow these steps:
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 63

3 Spreadsheets in Excel 61
1. Font Size can be changed from the options on home tab as shown in
figure 3.25

n
na

Figure 3.25 Font size


2. Select the
e cells for changing font size.
io

3. Click the
he font ssize drop down arrow as shown in figure 3.25.
at

elect a Fo
4. Select Font size, the Font Size will
changed.
be chan
N

Do you know!
¾ Fontt Color
C
Short cut keys for
To apply Font Color follow these Bold is Ctrl + B
steps: Italic is Ctrl + I
1. Font color can be changed from the Underline is Ctrl + U
Increasing Font size is Ctrl + ]
options on home tab as shown in
Decreasing font size is Ctrl + [
figure 3.23.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 64

62 3 Spreadsheets in Excel
2. Select the cells for changing
font color.
3. Selecta font color from the
font color option as
shown in figure 3.26.
4. e applie
Font Color will be applied.

on
Another method od to change
c
escribed
cribed below:
fonts is as described

ti
da
1. Select
ctt the d data on which
Figure 3.26 Font Color rmatting
matting is to be applied.
formatting

un
2. Right C
Click on the text a drop
Fo dow
down menu will appear.
3.
3 From the menu select
Format Cell option.
4. Select the Font tab from
Format cell dialog box as
shown in figure 3.27.
5. Using this tab user can
change the font, font size,
font color, font style; the
preview is available in
preview screen that’s how
at

Figure 3.27 Format Dialog Box the text will look like once the
formatting is applied.
N

¾ Alignment
There are two types of alignments in Excel, horizontal alignment and vertical
alignment.

x Vertical alignment is to align the text in top bottom or middle position.


these are the buttons to change the vertical alignment.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 65

3 Spreadsheets in Excel 63

x Horizontal alignment is to align the


text in left, right, Center position.
are used to change the
horizontal alignment.
Similarly the alignment can be
changed from Alignment tab from the
Format cell option, as shown in figure
3.28.
3.2.2 Applying borders and
shading to cells
The user can give a better
shape to the worksheet by applying
borders and shading to the cells. The
Fo
cells or range of cells can be Figure 3.28 Alignment Tab
F
Fi
formatted and given borders by
k

border button in home tab. Borders are


re the marked
m boundaries around the cells.
oo

User can select the cell or range of


o cells and then select the type of borders
from the border button in home
me tab a as shown in figure 3.29.
B

Figure 3.30 Shading Selected From


Format Tab Figure 3.29 Applying Borders
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 66

64 3 Spreadsheets in Excel
Similarly shading can be applied using format cells’ fill tab.
Shadings can also be applied following these steps:
1. Select the cells.
2. Click on the Fill Color button in the Home Tab.
3. Select a color and click on it the shading will be applied to the selected
ecte cells.

on
3.2.3 Insert new rows/columns
New rows and columns can be inserted in Excel sheets. Suppose the user

ti
co
forgets to enter some data in the sheet and requires to add a new column or row

da
to insert remaining data. Right click on the column wheree the
he new column is to be
inserted; select the insert option, the new column is s inserted to the left of the

un
selected column as shown in figure 3.31.
Similarly right click the row above to insert a new
ew row.
Fo
ok
a

Figure 3
3.31 Inserting Column Figure 3.32 Inserting Row
N

3.3 INSERTING CHARTS


Apart from simple data manipulation in Excel, the user can also represent
data in pictorial form using charts. Charts are pictorial representation of data. They
are easy to read and understand. A document becomes more impressive and
useful if charts are added to it.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 67

3 Spreadsheets in Excel 65
Excel provides with many types of charts. The charts can be inserted using
charts from insert tab.
Charts

o
Figure 3.33 Charts Group

ti
da
Common charts types are Column Chart, Line Chart, Bar Chart, Pi
Pie Chart etc.
Column Chart

un
A column chart represents data in the form of columns or bars vertically. To
draw column chart follow these steps: Fo
s to be drawn.
1. Type the data for which column chart is dr
d
har
a is
2. Select the data for which column chart s to be drawn.
3. Click on insert tab.
ok
N

Figure 3.34 Column Charts


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 68

66 3 Spreadsheets in Excel
4. From Charts Command group click
on Column Chart as shown in figure Short Cut Keys for Charts
3.34. Alt+F1 Insert Chart on Current
Worksheet
5. Select the chart type from the given.
F11 Insert New Chart
6. Column Chart is inserted as shown in
figure 3.35.

n
io

Figure 3.35 Column Charts


at

Line Chart
N

A Line chart represents data in the form of connected lines. The data is
represented in the form of connected series of points of data. To draw Line chart
follow these steps:
1. Type the data for which line chart is to be drawn.
2. Select the data for which line chart is to be drawn.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 69

3 Spreadsheets in Excel 67
3. Click on insert tab.
4. From Charts Command group click on Line Chart as shown in figure 3.36

Fo
Figure 3.36 Line
Lin
in Char
Cha
Charts
k

iven.
5. Select the chart type from the given.
oo

hown
wn in fig
6. Line Chart is inserted as shown fifigure 3.37.
B

Figure 3.37 Line Chart


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 70

68 3 Spreadsheets in Excel
Pie Chart
A Pie chart represents data in circular form divided in sectors. It is mostly used
when percentage of data is required. To draw Pie charts follow these steps:
1. Type the data for which pie chart is to be drawn.
2. Select the data for which pie chart is to be drawn.
3. Click on insert tab.

on
4. From Charts Command group click on Pie Chart as shown in figure 3
3.38
5. Select the chart type from the given.

ti
6. Pie Chart is inserted as shown in figure 3.38.

da

Figure 3.38 Pie Chart


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 71

3 Spreadsheets in Excel 69

Key Points

x Excel is electronic spreadsheet software which allows the user to enter and
manipulate data.
x Spreadsheet/worksheet is a large sheet containing information arranged
ange
nge in a

on
matrix of rows and columns.
x Workbook is a file of MS Excel containing one or more worksheets.
sheets.
heets.

ti
x Title bar is the top most bar in an Excel window.

da
x Office button contains options of new, save, save as,, print
rint etc.
etc
x Formula bar is on the right of address bar. It contains
ns the contents
tains c of active cell.

un
x Formula bar is used to enter or edit formulas and data.
data
Fo
x Cell is the intersection of row and column.
n.
x Cell address is the row number and column
colu
colum number of the cell.
n
k

x Column is the vertical space that


at is g
going up and down the window i.e.
oo

from top to bottom on the workshe


worksheet. Letters are used as the name of
columns.
lB

x Row is the horizontal space


pac that
tha goes from left to right of the window. Numbers
are used as the name
amee of the rows.
na

x Data manipulation
ation
ion is tthe way to convert data into meaningful form using
formulas and function.
nd functio
funct
io

x A formula
ula is a mathematical expression used to perform mathematical
mula
at

operation.
eration.
ation.
N

x A function
unctio is a ready to use formula, provided by Excel by default. The user
can perform calculations without having to type long and complex
calculations.
x Some of the functions are SUM, PRODUCT, AVERAGE, POWER, and SQRT.
x Font refers to a complete collection of characters of one type.
x Font style means making the text bold, italic, or underline.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 72

70 3 Spreadsheets in Excel
x Font size refers to the height of the characters.
x Excel provides the facility of pictorial representation of the data through
charts, some kinds of charts are Column charts, Line charts, Pie Charts etc.

Exercise

on
Q 1: Choose the correct option.
i. What is the intersection of a row and column called?

ti
a. Row c. Cell

da
b. Address Bar d. Column
ii. What is a file called which contain one or more workshee
worksheet?
orkshee

un
a. Workbook c.
Fo Program
ogram
b. Pages d. Software
Softwa
iii. What is the horizontal space in MS Exce
Exc
Excel cal
ca
called?
k

a. Cell c. Column
oo

b. Row d. File
iv. Which function is used to
o multi
multipl
multiply numbers or series of numbers?
lB

a. SUM c. PRODUCT
na

b. AVERAGE d. MIN
v. What is the result
esult of = SQRT(169)?
io

a. 15 c. 13
at

b. 12 d. 9
vi. What is the
t result of =POWER (2,7)?
N

a. 256
6 c. 128
b. 126 d. 254
vii. What is the result of =MIN(1,0,2,3,5,9)?
a. A.1 c. C.2
b. B.3 d. D.0
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 73

3 Spreadsheets in Excel 71
viii. What is the complete set of characters called?

a. Font c. Font style

b. Shading d. Font size

ix. What is the way to convert data into meaningful form using formulas?
a. Formatting Text c. Data manipulation

on
b. Formula insertion d. Formatting text

ti
x. Which is the chart that represents data in the form of columns
olumns
umns an
and bars?

da
a. Line Chart c. Pie Chart

un
b. Bar Chart d. Column
mn
n Chart

Q 2: Fill in the Blanks.


Fo
i. A _____________ is defined as a la large sheet containing any information
e ssh
arranged in a matrix of rows and columns
columns.
olumns
k
oo

ii. A _____________ represent data the form of connected lines.


ata in tth
iii. An Excel file is termed as _________.
s a _____
lB

iv. The top most bar of MS E


Excel
xce window is called the________________.
v. For calculations you
ou will enter
e formula in the __________.
na

vi. The _____________


____ is defined as the horizontal space that is going across
_____
______
io

the window.
ow.
vii. The space where a specified row and column intersect is called
at

______________.
_____
____
_____
__
N

viii. The
e _____________ function takes all of the values in each of the specified
cells and totals their values.
ix. The power function finds the _________ of the given number.
x. _________ are pictorial representation of data.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 74

72 3 Spreadsheets in Excel
Q 3: Match the Column:
Column A Column B Column C

i. A2 Ctrl + X

ii. Fill Handle Cell Address

iii. Function Sectors

on
iv. Copy Cells Auto Filling Data

ti
v. Font Style Ctrl + C

da
vi. Pie Chart AVERAGE

un
Q 4: Differentiate between the following:
i. Workbook and Worksheet. Fo
ii. Cut and Copy
iii. Column and Row
k

iv. Formula and function


oo

v. SUM and AVERAGE Functions


tions
ions
B

Q 5: Define the following:


i. Spreadsheet
ii. Formula
iii. POWER function
nction
tion
nd
d Paste
iv. Copy and
v. Auto
o filling data
da
br answer to the following questions:
b
Q 6: Give brief
i. What is the purpose of using spreadsheet software?
ii. Define SQRT function.
iii. How will you insert a function?
iv. Define a Column and a Row?
v. What do you know about worksheet tabs?
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 75

3 Spreadsheets in Excel 73
vi. What is the purpose of Formula bar?
Q 7: Give detailed answer to the following questions:
i. Write steps to create a spreadsheet in MS Excel.
ii. What are the components of an Excel Window? Explain in detail.
iii. Write the purpose of the function Sum, AVERAGE, MIN and MAX.
iv. How would you apply borders? Write down all the steps involved
d in
n it.

on
v. How would you save a spreadsheet in Excel? Write down
wn all the
tth steps
involved in it.

ti
adsheet.
dsheet.
vi. Write steps to insert new Row and Column in a spreadsheet.

da
vii. Define the purpose of Charts. How to create a Pie
e Chart? Write down all the
steps involved in it.

un
Lab Activities
Fo
¾ The table given shows Roll Number, and marks
mark of students:
k

A B C D
oo

1 Roll Number Marks in


n Math Marks in English Marks in Computer
lB

2 01 90 88 92

3 02 85
8 84 89
na

4 03 93 89 82
io

5 04 87 82 78
at

6 05 88 81 79

7 06 78 84 85
N

Perform the following operations for the data given in table.


x Create a worksheet with the given data.
x Calculate the percentage of each student assuming total marks = 300. Store
the percentage in column E.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 76

74 3 Spreadsheets in Excel
x Find out the highest marks and display the results in cell E10.
¾ A salesman has the following items with him:

A B C

1 Items Quantity Rates per item

2 Booksl3 15 200/-
0/-

on
3 Registers 20 125/-
125/

ti
4 Pencils 24 10/-

da
5 Pens 36 15/-

un
6 Files 12
2 25/-

Carryout the following operations on the data


Fo
a to help the salesman.
x Create a worksheet with the given data.
ata.
k

x Use the worksheet to help the salesman


esman to
alesman t find the amount he is supposed to
oo

recover on selling each of the item.


em.
¾ Create the following worksheets
sheets in MS Excel:
lB

A B C D E F G
na

1 S. No A B C D E F

2 PUBLIC SCHOOL
io

3 RESULT ANALYSIS
at

4 CLASS I DIV II DIV III DIV COMP FAIL


N

5 1 X 125 65 10 16 02

6 2 XII 140 36 12 19 01

x Create a Pie Chart for both classes X and XII.


Click https://bit.ly/FG-Books to download all PDF FG books for FREE 77

3 Spreadsheets in Excel 75
¾ Insert the following data table to make a worksheet and save it:
A B C D
1 SALES ANALYSIS
2 SALESMAN YEAR 2011 YEAR 2012 YEAR 2013
3 1 35000 38000 36500
4 2 41000 45000 43800

on
5 3 39500 37000 35000

ti
6 4 32000 35000 30000
3000

da
7 5 36000 36500 34000
3

x Draw Line chart for the above data.

un
x Draw Column chart for the above data.
ta.. Fo
¾ Create a spreadsheet of salary report for some organization.
¾ Create spreadsheet for the 1st term
m result
rre ult of
o your class.
¾ View and write difference between
k

een
en MS Excel
E 2007 and MS Excel 2003.
oo
B

x The whole unit topics must be demonstrated on the computer and multimedia.
x Divide the students among groups and make sure each student gets access to use
the spreadsheet software.
x Make students perform all Lab activities on Computers.
x Assign additional activates to the students regarding spreadsheets.
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 78

Ms. Nazoora Kiran


Master in Computer Science from the University of Arid Agriculture Rawalpindi. She
completed her M. Phil in Teacher Education from Allama Iqbal Open University and continuing
Ph.D in Computer Education. Her academic record is par-excellence. She has an honour of
paper published on Impact of Project Based Method on Perormance of Students in Language in
Indian Journal, Ms. Nazoora Kiran took trainings in professional Development Training Course,
in Information Technology and in Software Development. She started her career as a teacher
since 2005 and currently working as Assistant Professor in Islamabad Model College ge for Girls

on
(IMCG) I–10/4, Islamabad. She has vast experience to teach to different classes. She has been
r
working as Lab Administrator, Incharge Examination, Incharge of all activities regarding
computer based activities and Practical Examiner in Federal Board off Intermediate
Interm and

ti
Secondary Education (FBISE) Islamabad.

da
Ms. Asma Naseem:

un
MBA in Management Sciences from Common Wealth h Progra
Programme of Allama Iqbal Open
University, Islamabad. She did her master in ComputerFo mputer Scie
Science from University of Arid
Agriculture, Rawalpindi. She started her career as Assistant Manager Networking in Pakistan
Ordnance Factory (POF) and then swatted over to teaching tea profession in 2005. Ms Asma
Naseem did professional Computer Trainingss in Software
So Applications of Development (HND),
k

Action Learning Center of Software (ALCOS) COS) and Microsoft Certified Software Engineer
(MCSE). She participated in Internship Short rt programmes
progr with Faisal Bank and other projects in
oo

aining course
last year. Particularly, she completed a training c on “Poverty Elevation Programme through
Community Development Projects” ts” successfully.
success Ms. Asma Naseem has been serving as a
lB

lamaba Model College for Girls (IMCG) I-10/4, Islamabad.


Lecturer in Computer Science in Islamabad
na
io
at
N
Click https://bit.ly/FG-Books to download all PDF FG books for FREE 79

Approved by the Capital Administration & Development Division


(Curriculum Development & Textbook Production Wing),
Government of Pakistan, Islamabad,
F . 2-1/2011- (BS) Dated: _______________
vide letter No. __________________ 06-03-2015

National Book Foundation


as
Federal Textbook Board
Islamabad

You might also like