Download as pdf or txt
Download as pdf or txt
You are on page 1of 53

ps Information

Technology
Ki
CLASS - 10

© Kips Learning Pvt. Ltd 2023


Part B

Unit – I

Chapter 1 – Applying Styles in a Document

Assessment Time

A. Select the correct option.


1. b. Style
2. c. Sidebar
3. b. Paragraph Styles
4. a. Shift + F11
5. b. Load Style
B. Write T for True and F for False.
1. F
2. T
3. T ps
4. F
5. T
C. Answer the following questions.
1. A style is a predefined combination of various formatting features, like font style,
colour, and size that is applied to the selected text in a document to quickly change
its appearance.
2. Paragraph Styles are used to change the appearance of a paragraph by making
changes to the text alignment, tab stops, line spacing, and so on. On the other hand,
the Character Styles can be applied block of text inside a paragraph. For example,
Ki
they enable you to set the font and size of text, or apply bold and italic effects.
3. To apply a predefined style using the Styles and Formatting pane, follow these steps:
• Open a document in Writer and type the content.
• Click on the Styles and Formatting icon on the Sidebar. Or
Click on the Format menu and select the Styles and Formatting option. Or
Click on the F11 key.
• A dockable Styles and Formatting menu will open. Click on the Paragraph
Styles icon if it is not selected, by default.
• Select the text on which the style is to be applied. For example, select the
title of the content.
• Now, scroll through the list of styles and double-click on the Title style.
• The selected style will be applied immediately. Similarly, you can apply the
other styles to the selected text.
4. The Fill Format Mode allows you to apply a style to many different areas quickly,
such as you can format many scattered paragraphs, words, or other items with the

© Kips Learning Pvt. Ltd 2023


same style. In other words, the Fill Format Mode copies a style and applies the same
to the other items.
5. In Writer, you can create a new style by using any of the following methods:
• Creating a New Style from a Selection
• Creating a New Style Using Drag and Drop

Ch-2 Adding Graphics in a Document

Assessment Time

A. Select the correct option.


1. a. Insert > Picture > From File
2. b. Gallery
3. c. Drawing Toolbar
4. a. Corner Handles
ps
5. a. Picture
B. Write T for True and F for False.
1. F
2. T
3. T
4. F
5. T
C. Answer the following questions.
1. In Writer, there are several ways to insert images in a text document. Some of them
Ki
are as follows:
• Inserting an image from a file
• Inserting an image using drag and drop method
• Inserting a scanned image
• Inserting an image from the clipboard
• Inserting an image from the Gallery
2. Cropping means to delete the unwanted areas of a photograph or image to improve
its appearance.
3. It is often convenient to group the drawing objects together so that they can be
treated as a single object. Grouping the drawing objects gives you more control over
a set of objects. You can apply the formatting features to all the objects at once.
4. Alignment refers to the vertical or horizontal placement of a graphic in relation to
the chosen anchor point of an image.
5. Gallery is an inbuilt feature of OpenOffice that is available for all its components. It
offers an easy way to group reusable objects such as graphics and sounds that can be
inserted into a document. The Gallery contains ready-to-use objects (Arrows, Bullets,

© Kips Learning Pvt. Ltd 2023


Diagrams, Symbols, and so on). By default, the Gallery is docked above the Writer
workspace.

Ch-3 Working with Templates

Assessment Time

A. Select the correct option.


1. a. New > Templates and Documents
2. b. Template
3. d. My Templates
4. b. Ctrl + Shift + N
5. b. Two
B. Fill in the blanks.
1. Template
2. My Templates
ps
3. Set As Default Template
4. .ott
C. Answer the following questions.
1. A template a is predefined layout that contains sample content, themes, colours,
font styles, background styles, etc., and gives an initial foundation to build a
document.
2. To create a document using a pre-defined template, follow the given steps:
• Click on File > New > Templates and Documents. You will see many pre-defined
templates in the My Templates dialog box.
Ki
• Select the required template and click on Open.
• A new document opens with the selected template.
3. In such a situation, you need to update the document after making changes in the
style of the template. To update a document, follow these steps:
• Click on File > Save As and all changes made to the document will be saved.

Ch-4 Using a Table of Contents

Assessment Time

A. Select the correct option.


1. b. Table of Contents
2. a. Insert
3. a. Title

© Kips Learning Pvt. Ltd 2023


4. b. Chapter Number
B. Fill in the blanks.
1. Headings, Sub-headings
2. Paragraph
3. Title page
4. Grey
C. Answer the following questions.
1. The table of contents (TOC) consists of headings and sub-headings of a book or
document. It is a necessary index, generally available in long documents, books,
drafts, etc. It includes titles or first-level headings, such as chapter names, and
sometimes it even includes second-level headings, and occasionally third-level
headings.
2. A good table of contents has the following characteristics:
• It should be easy to read and simple to use.
• It should be organised and formatted properly.
• It must be accurate and easily accessible.
ps
• It should be given after the title and copyright page.
3. To edit an existing table of contents, follow these steps:
Right-click anywhere in the table of contents. The context menu appears.
From the context menu, choose Edit Index/Table option. The Insert Index/Table
window opens. You can edit and save the table using the five tabs described in the
chapter.
4. The five tabs present on the Insert Index/Table dialog box are: Index/Table, Entries,
Styles, Columns, and Background.
• The Index/Table page helps to set the attributes of the TOC, for example, the
Ki
type of index.
• The Entries and Styles pages are used to format the entries in the TOC.

Ch-5 Mail Merge

Assessment Time

A. Select the correct option.


1. a. Mail Merge
2. c. Both a and b
3. b. Data Source
4. a. Main Document
B. Fill in the blanks.
1. Main

© Kips Learning Pvt. Ltd 2023


2. Mailing Labels
3. Merge
4. Register
C. Answer the following questions.
1. The Mail Merge feature of Writer enables you to quickly create and print multiple
copies of a document, mailing labels, and so on.
2. The Mail Merge feature is used to combine a data source with the main document. It
saves your time and energy to send letters at multiple addresses. It primarily enables
automating the process of sending bulk mail to customers, subscribers, or general
individuals.
3. Main Document is the document that contains the text that you wish to send to all
the recipients. To perform Mail Merge, a Writer document is required. Either you
can create a new document or use an existing one. Data Source consists of a mailing
list. For example, name, address, city, pincode, telephone number, etc. The data is
organised in a tabular form along with the field names.
4. Labels are stickers that may contain information related to a product to advertise, a
ps
warning message, instructions for use, caution in use, environmental advice, batch
number, etc. In the same way, mailing labels are stickers that you over the envelopes
and/or at the top of the letters while sending mails to a group of people.
5. After saving the data source, register it by following the given steps:
• For this, click on the File > New > Database.
• The Database Wizard opens. Select the Connect to an existing database
option and choose Spreadsheet from the drop-down list.
• Click on Next > Browse. Select the file name in which you have added
recipients (Recipient.ods).
Ki
• Now, click on Next and stay with the default settings, and click on Finish. A
dialog box appears. Save the spreadsheet as database by entering an
appropriate name (for example, Employees_List) in the Name field. Click on
Save and after that, exit the spreadsheet application.

Brain Developer

Section 4: Competency Based Questions (Unsolved)

1. To build a custom style in Writer using drag and drop, follow these steps:
• Open the document and format the text (such as a paragraph or title) as per your
requirement.
• Open the Styles and Formatting pane and select a style category under which you
want to create a style.

© Kips Learning Pvt. Ltd 2023


• For example, select Paragraph Styles category.
• Now, select the formatted text (on which you want to base the style) and drag
and drop the selection into the Styles and Formatting pane.
• The Create Style dialog box opens. Type a name for the new style and click on OK.
A
• new style will be added in the Styles and Formatting pane under the selected
category.

2. To copy styles from a template or another document, follow these steps:


• Open the document in which you want to copy the styles.
• In the Styles and Formatting pane, click on the New Style from Selection icon and
select Load Styles.
• The Load Styles dialog box opens. Choose any or all from the options present in
the Load Styles dialog box to select the styles to be copied.
• Find and select the template or document to copy styles from.
• Styles of the selected document or template will be loaded in the current
ps
document.
3. In Writer, there are several ways to insert images in a text document. Two of them
are:
• Inserting an image from a file
• Inserting an image using drag and drop method.
Let us see how to insert an image from a file in a document.
• Position the cursor where you want to insert an image.
• Click on the Insert menu and then select the Picture > From File option.
Ki
• The Insert picture dialog box appears.
• Locate the picture you wish to insert and select it.
• Click on the Open button to add it to your document.
4. Resizing an image:
Follow the given steps to resize an image:
• Click the image that you want to resize. The green resizing handles appear as soon
as you click on the image.
• Take the pointer to any of the handles. You can observe the shape of the pointer
changes to a double headed arrow.
• Drag the arrow to increase or decrease the size of the image.
Rotating an image:
OpenOffice Writer does not provide a tool for rotating a picture; however, you can
follow the given steps to rotate an image:
• Open a new Draw or Impress document (File > New > Drawing or File > New >
Presentation). Insert the image you want to rotate.

© Kips Learning Pvt. Ltd 2023


• Select the image and select the Rotate icon from the Effects tear-off toolbar given
on the Drawing toolbar. The Drawing toolbar is displayed at the bottom of the
window in both Impress and Draw, by default.
• Rotate the image by using the red handles at the corners of the picture and move
the mouse in the direction you wish to rotate.
• Select the rotated picture by pressing Ctrl+A, then copy the image to the
clipboard with Ctrl+C.
• Now, go back to the Writer document where the image is to be inserted and press
Ctrl+V. The rotated image will be inserted in the Writer document.
5. To create a flowchart, Sunita needs to insert several graphic symbols which she can
draw by using the tools present on the Drawing toolbar.
6. To group the drawing objects, follow the given steps:
Draw four or five drawing objects.
Click on the Select tool on the Drawing toolbar.
Drag it over the objects to select them.
Once, all the objects are selected, click on the Group button on the Drawing Object

7.

8.
ps
Properties toolbar. Or
Right-click and select Group from the context menu.
All the selected objects will be grouped.
Anand can use the Text wrapping feature of Writer to adjust the text around the
image. He can use the Wrap command given in the Format menu.
To merge the labels with the letters in the spreadsheet, Rohan can use the mail
merge function. He can select the data source in the spreadsheet, create the letter
with placeholders for the label fields, preview and confirm the merge, and finally
print the merged letters with the corresponding labels.
Ki
Section 5: Short Answer Type Questions (Unsolved)

1. Styles help maintain uniformity in a document. They also make it easy to apply the
main formatting changes. For example, if in a lengthy document, you want to change
the font of all paragraphs or the indentation of all titles, this basic operation can take
a long time. It can be simplified by applying styles.
2. The Fill Format Mode allows you to apply a style to many different areas quickly,
such as you can format many scattered paragraphs, words, or other items with the
same style. In other words, the Fill Format Mode copies a style and applies the same
to the other items.
3. You can press the F11 key to open the Styles and Formatting window.
4. To open the Picture dialog box in Writer, you can right-click on the image and select
the Picture option from the context menu.

© Kips Learning Pvt. Ltd 2023


5. To maintain the height and width ratio of a shape while drawing it, press the shift
key and then drag the mouse.
6. To resize an image:
• Click the image that you want to resize. The green resizing handles appear as
soon as you click on the image.
• Take the pointer to any of the handles. You can observe the shape of the pointer
changes to a double headed arrow.
• Drag the arrow to increase or decrease the size of the image.
7. Steps to perform Mail Merge in Writer:
• Create a mail merge document.
• Create a data source.
• Merge the data source with the main document.

Section 6: Long Answer Type Questions (Unsolved)


ps
1. Creating a New Style from a Selection:
• Open a document and format the text (such as a paragraph or title) as per your
requirement.
• Open the Styles and Formatting pane, and select a style category in which you
want to create a style. For example, select the Paragraph Styles category.
• Click on the New Style from Selection icon available in the Styles and Formatting
pane and select New Style from Selection option from the drop-down menu.
• The Create Style dialog box appears. Enter a name for the style. For example,
type Custom.
Ki
• Click on OK. A new style will be added in the Styles and Formatting pane under
the selected category.
2. To create a template of your document, follow these steps:
• Open the document or create a new document.
• While creating a document, add the content that you want to use further. For
example, company logo, copyright statement, and so on. Also, apply the
required formatting.
• Click on the File menu and select Templates > Save.
• The Templates dialog box appears. All the existing categories of templates are
displayed here.
• Enter a name for the template in the New Template text box, for example,
Template_New.
• Select the template category in the Categories list.
• Click on the OK button. A new template of your document will be saved in the
My Templates folder.

© Kips Learning Pvt. Ltd 2023


To set a custom default template, follow these steps:
• Open the Templates window by clicking on File > Templates > Organize. The
Template Management dialog box opens.
• Scroll through the list of available templates and right-click on the template that
you want to set as a default template.
• Select the Set As Default Template option from the shortcut menu. Or
Click on the Commands button and select Set As Default Template option.
• Now, when you will create a new document, it will open with the custom default
template.
3. To create the table of contents, follow these steps:
• Place the cursor where you want the table of contents to be inserted. Generally,
the table of contents is inserted in the beginning of the document.
• Select Insert > Indexes and Tables > Indexes and Tables. The Insert Index/Table
dialog box appears.
• Click OK to create the table of contents. The TOC will be automatically created
and appears with a grey background colour around the text.
ps
4. Yes, we can edit the table of contents. To edit an existing table of contents, follow
these steps:
• Right-click anywhere in the table of contents. The context menu appears.
• From the context menu, choose Edit Index/Table option. The Insert Index/Table
window opens. You can edit and save the table using the five tabs described in
the chapter.

5. To create labels, follow these steps:


Ki
• In Writer, click on File > New > Labels. The Labels dialog box appears. It has three
tabs: Labels, Format, and Options.
• By default, the Labels tab is selected. Here, choose a database file under
Database. In the Database field, all the registered database files are listed.
• Select the table from which the data is to be fetched under Table.
• Select a field under the Database field and click on the button to add it in Label
text box.
• Choose the brand and type for the label. For example, select Avery A4 in the
Brand list box and J8160 Address in the Type list box.
• You can click on the Format tab if you want to adjust the size of the label
manually by changing its width, height, and other settings.
• Ensure that, on the Options tab, the Synchronize contents option is selected.
• Save your label template if you intend to use it again by clicking on Save.
• The Save Label Format dialog box appears. Enter the names for your label Brand
and Type. Click OK.

© Kips Learning Pvt. Ltd 2023


• Now, click on the New Document button. You will see the mail merge label
document with the fields chosen by you instead of data. Notice that there is a
small floating Synchronize Labels button.
• Apply some formatting to the first label by using the options on the Style and
Formatting toolbar, such as change colour, make the text bold, and so on.
• To apply the same formatting to all the labels, click on the Synchronize Labels
button.
• Now, the mail merge labels are created.

Unit – II

Chapter 6 – Analysing Data in a Spreadsheet

Assessment Time

A. Select the correct option.


ps
1. a. Consolidate
2. c. Subtotals
3. a. Scenarios
4. b. Solver
5. b. Goal Seek
B. Fill in the blanks.
1. Set of values
2. Sorted
3. Consolidation
4. Goal Seek
Ki
5. Solver
C. Answer the following questions.
1. Consolidating data means combining data from different worksheets into one place.
2. The Scenarios is an important feature of Calc that you use to test the ‘what-if’
questions. It enables you to analyse the data by putting different input values.
3. Goal Seek is used to set a goal to find the optimum value for one or more target
variables, given certain conditions. It allows you to try different values in the formula
to arrive at a solution for the input value.
4. The basic difference between Goal Seek and Solver is that Solver deals with
equations that have multiple unknown variables.
5. To create a named range in Calc, follow these steps:
• Select the range of cells from a spreadsheet.
• Click on Data > Define Range.
• The Define Database Range dialog box opens.
• Specify a name for the range in the Name field and click on OK.

© Kips Learning Pvt. Ltd 2023


Chapter 7 – Linking Data and Spreadsheets

Assessment Time

A. Select the correct option.


1. a. Sheet Name
2. b. /Picture.jpg
3. a. Insert
4. b. Insert > Link to External Data
5. d. F4
B. Fill in the blanks.
1. Up-to-date
2. Insert, Sheet
3. Reference
4. Hyperlink
5. Relative
C. Answer the following questions.
1. Linking spreadsheets enables you to keep the information up-to-date without editing
multiple locations every time the data changes. The ability to create links eliminates
ps
the need to have identical data, entered and updated in multiple sheets. This saves
time, reduces errors, and improves data integrity.
2. You can insert as many sheets as you want in a spreadsheet. To insert a new sheet in
a spreadsheet:
• Click on the Insert menu and select the Sheet option from the drop-down list.
• The Insert Sheet dialog box appears.
• Select the Before current sheet or After current sheet option from the Position
section in the dialog box.
• You can also select the New sheet option from the Sheet tab to insert a new
Ki
sheet and No. of sheets option to add more than one sheet.
3. A relative hyperlink contains a partial address, which is relative to the address of the
destination file. Suppose, you have saved a workbook ABC.xlsx and an image file
Capture.jpg in D: drive. To create a relative hyperlink of the image file to the
workbook, the relative path will be \Capture.jpg.Relative linking is only possible
when both the source and destination files are on the same drive or location.
4. An absolute hyperlink is a hyperlink that contains the full address of the destination
file or web page. The following are the examples of absolute hyperlink:
• https://kips.in/index.php/books
• C:\Users\KIPS\Documents
5. To create a named range in Calc, follow these steps:
• Open a spreadsheet (source sheet) from which data is to be retrieved via a link.
• Select the range of cells that contain the data that you want to link to.
• Click on the Data menu and then Define Range option.
• The Define Database Range dialog box opens. Specify a name for the range in
the Name field and then click on OK.

© Kips Learning Pvt. Ltd 2023


Chapter 8 – Sharing and Reviewing a Spreadsheet

Assessment Time

A. Select the correct option.


1. a. Tools
2. d. Changes > Record
3. b. Show Changes
4. a. Changes
5. b. Resolve Conflicts

B. Write T for True and F for False.


1. T
2. F
3. T ps
4. T
5. T

C. Answer the following questions.


1. Calc offers a sharing feature using which you can give access to the other users to
work on the same spreadsheet at the same time. It saves the trouble of keeping
track of multiple versions of the spreadsheet.
2. The Changes feature of Calc enables you to keep track of the changes made by you
or the other users in a spreadsheet.
3. Calc automatically adds comments to the changes made in a spreadsheet. You can
Ki
view this comment by hovering your mouse pointer over the cell where the change
has been made. The authors and reviewers can also add their own comments to the
changes that they have made to the spreadsheet to explain why they have made this
change.
4. Sometimes, there are multiple edited versions of a sheet that reviewers return at the
same time. In such a situation, the different versions of the file have to be reviewed
one by one, which becomes a difficult task. To overcome this problem, Calc provides
the Merge Document feature that enables you to merge the multiple files so that the
user can review all these changes at once, rather than reviewing one at a time.

On the other hand, the Compare Document feature is used to compare the
worksheets. Suppose, you have sent a spreadsheet to a reviewer and asked him/her
to edit it. He/She has made the changes in the spreadsheet without turning on the
Record feature and sent the spreadsheet back. You will not be able to identify the
changes done by him/her. In such a case, Calc provides the 'Compare Document'
feature using which you can compare the spreadsheets.

© Kips Learning Pvt. Ltd 2023


ps
Ki

© Kips Learning Pvt. Ltd 2023


Chapter 9 – Using Macros in a Spreadsheet

Assessment Time

A. Select the correct option.


1. a. Record Macro
2. c. Tools
3. a. Window Switching
4. c. Tools > Macros > Run Macro
5. a. Function
B. Fill in the blanks.
1. Macros
2. Keystrokes
3. Function
4. Name, Parameters
5. Values
C. Answer the following questions.
1. Macros are small programs that record your actions as you perform a task in Calc.
2. To turn on the macro recorder, use Tools > Macro > Record Macro option. You can
ps
observe a small Record Macro dialog box with a Stop Recording button.
3. The following is the syntax to define a simple function without parameters:
Function Function_Name()
Body of Function
Function_Name = Result
End Function
4. By default, the Standard library is located in Calc.
Ki
Brain Developer

Section 4: Competency Based Questions (Unsolved)

1. Ravi can use the Goal Seek feature to calculate how many more votes he has to
secure to win the elections.
2. To open a shared file, follow the given steps:
• Locate the file in the network location and double-click it to open it.
• When you open a shared spreadsheet, a message appears stating that the
spreadsheet is in the shared mode and some features are not available in this
mode. Click on OK. The spreadsheet will open in the shared mode.
3. Follow the given steps to accept or reject the changes done in a worksheet:
• Open the edited spreadsheet on your computer.
• Click on the Edit menu and choose Changes > Accept or Reject.
• The Accept or Reject Changes dialog box opens containing the list of changes.
• Click on the Accept or Reject button to accept or reject a change. Or

© Kips Learning Pvt. Ltd 2023


• Click on the Accept All or Reject All button to accept or reject all the changes at
once.
4. In such a case, Calc provides the 'Compare Document' feature using which you can
compare the spreadsheets. In order to compare the spreadsheets, you must have
the original spreadsheet and the one that is edited.
5. To run an existing macro, follow these steps:
• Select the Tools menu on the menu bar and choose Macros > Run Macro.
• The Macro Selector dialog box opens. Locate your macro in the Library box and
select it.
• Click on Run.
6. Raj should use the Changes feature of Calc that enables him to keep track of the
changes made by the other users in a spreadsheet.

Section 5: Short Answer Type Questions (Unsolved)

1. In case some other user has opened and edited the spreadsheet since you first
opened it, one of the following events will occur:
ps
• The spreadsheet will be saved, if the changes do not conflict.
• If the changes conflict, the Resolve Conflicts dialog box opens and you must
decide which version of the conflicts to keep, by clicking on Keep Mine or Keep
Other. The document is saved after all of the conflicts have been resolved.
Notice that while you are resolving the conflicts, no other user can save the
shared worksheet.
2. The two most important what if analysis tools are: Goal Seek and Solver.
Goal Seek: Goal Seek is a useful tool of Calc that is used to set a goal to find the
optimum value for one or more target variables, given certain conditions. It allows
Ki
you to try different values in the formula to arrive at a solution for the input value.
Solver: Solver follows the Goal Seek method to solve equations. It is an elaborated
form of Goal Seek. The only difference between Goal Seek and Solver is that Solver
deals with equations that have multiple unknown variables.
3. To add a comment in a worksheet, follow the given steps:
• Open the spreadsheet and make the required changes.
• Select the cell where you have made the changes.
• Choose Edit > Changes > Comments from the menu bar. A dialog box will open.
• Here, in the Text textbox, the author or the reviewer can add his/her own
comments to show why the changes have been done.
• After typing the comment, click on OK.
4. Macros are small programs that record your actions as you perform a task in Calc.
When you run the macro later, it repeats your keystrokes and thus actions. The
Macros feature of Calc allows you to record a set of actions that you perform
repeatedly in a spreadsheet.

© Kips Learning Pvt. Ltd 2023


Let us consider an example, where a bookseller Rajneesh creates a report every
month to view the sales and calculate the profit. He colours the names of the
customers with overdue accounts in red and applies bold formatting to them while
creating the report. It means every time, he performs the repetitive task to format
the report, which takes a lot of his time and effort. To speed up this work, he can
create and run a macro to apply these formatting effects quickly to the cells,
whenever required.
5. Calc offers a sharing feature using which you can give access to the other users to
work on the same spreadsheet at the same time. It saves the trouble of keeping
track of multiple versions of the spreadsheet.
To share a spreadsheet, follow the given steps:
• Create a spreadsheet and save it in a network location so that the other users
can access it easily.
• With the spreadsheet document open, click on the Tools menu. Choose Share
Document to activate the collaboration features for this file.
• The Share Document dialog box opens. Select the Share this spreadsheet with
ps
other users checkbox to enable sharing.
• Click on OK. If you have already saved the spreadsheet, a message appears
stating that you must save it in the activated shared mode. Click on Yes to
continue.
• Now, all the users can work together on the same spreadsheet.

Section 6: Long Answer Type Questions (Unsolved)

1. The Subtotals feature of Calc is used for generating subtotals from the subgroups of
data. It helps you to manage, analyse, and extract specific information from rows of
Ki
related data. Let us consider an example where a Senior Sales Manager of a
renowned publication wants to calculate the subtotals of sales of each employee as
well as the total sales.
To obtain the subtotal of sales, follow these steps:
• Open the worksheet containing sales data.
• Select the desired range of cells that you want to use to calculate the subtotals.
• Choose the Data menu and then the Subtotals option. The Subtotals dialog box
appears.
• In the Group by list box, select the column by which you want to group the
subtotals. A subtotal will be calculated for each value in this column.
• In the Calculate subtotals for list box, select the columns containing the values
that you want to use to create the subtotals.
• In the Use function list box, select the function that you want use to calculate
the subtotals.
• Click on OK. The subtotals and grand total of sales will appear in the worksheet.

© Kips Learning Pvt. Ltd 2023


2. Solver follows the Goal Seek method to solve equations. It is an elaborated form of
Goal Seek. The only difference between Goal Seek and Solver is that Solver deals
with equations that have multiple unknown variables.
3. To create a named range in Calc, follow these steps:
• Open a spreadsheet (source sheet) from which data is to be retrieved via a link.
• Select the range of cells that contain the data that you want to link to.
• Click on the Data menu and then Define Range option.
• The Define Database Range dialog box opens. Specify a name for the range in
the Name field and then click on OK.
4. Sometimes, there are multiple edited versions of a sheet that reviewers return at the
same time. In such a situation, the different versions of the file have to be reviewed
one by one, which becomes a difficult task. To overcome this problem, Calc provides
the Merge Document feature that enables you to merge the multiple files so that the
user can review all these changes at once, rather than reviewing one at a time. While
merging sheets, all of the edited documents need to have recorded changes in them.
To merge documents, follow these steps:
ps
• Open the original document.
• Click on the Edit menu and choose Changes > Merge Document.
• The Insert (File Browser) dialog box opens. Select a file that you want to merge
and click on OK.
• The Accept or Reject Changes dialog box opens, showing the changes done by
more than one reviewer.
• If you want to merge more documents, close the Accept or Reject Changes
dialog box and then open other spreadsheets for merging, by repeating the
previous steps.
Ki
• Now, all of the changes are combined into one document, and you can accept or
reject the changes. Note that the changes from the different authors appear in
the cells outlined in the different colours.
5. A macro acts as a function. You can pass arguments (values/parameters) to a macro
when you call it. To allow a macro to accept a value, simply type a name for that
value between the parentheses at the beginning of the macro.
Syntax to define a macro with parameters:
Function Function_Name(Optional Parameter1, Optional Parameter2,...)
Program code
FunctionName = Result
End Function
Syntax to pass parameters to a macro while calling it:
=Function_Name(Parameter1, Parameter2,...)

© Kips Learning Pvt. Ltd 2023


Unit – III

Chapter 10 – Concepts of Database Management System

Assessment Time

A. Select the correct option.


1. a. Database
2. b. Data
3. c. A set of related fields
4. b. Database Management System
5. c. A primary key field can be NULL.
B. Fill in the blanks.
1. Data Redundancy
2. Relational Model
3. Null
4. Composite Key
5. Data Concurrency
ps
C. Answer the following questions.
1. Database is a collection of data, which is stored in a systematic manner, i.e., in the
form of tables so that one can retrieve and manipulate the information quickly and
efficiently from a large set of data.
2. The Database Management System (DBMS) is a computerised record keeping system
or a software that enables you to create, store, modify, and extract information from
a database. The Relational Database Management System (RDBMS) is a type of the
DBMS software that uses the Relational Database (RDB) model for its database. A
Ki
relational model enables the users to store data in several tables.
3. Tuples: All the rows (consists of a set of related information that belongs to a
particular object) in a table/database are called tuples or records.
Attributes: An attribute is a piece of information about an object. All the columns in
a table/database are called attributes.
4. A primary key is a set of one of more fields that uniquely identifies each record in a
table. It does not contain any duplicate data. A table can have only one primary key.
The value in the primary key field is different for every tuple and thus helps in
uniquely identifying the records. A foreign key is a field or set of fields that is used to
establish a relation between the two tables. In other words, it consists of one or
more fields whose value matches with a primary key in another table. Basically, a
foreign key in one table is used to point at a primary key in another table. It acts as a
cross-reference between the tables.
5. A composite key or composite primary key refers to a combination of two or more
attributes (fields) that uniquely identify the records in a table. It may be a candidate
key or primary key. For example, In the Customer table of Dominos database, the

© Kips Learning Pvt. Ltd 2023


CustOrder_ID field alone cannot become a primary key as many products can be
purchased by the same customer, thus the same customer can have multiple entries.
Similarly, column Product_ID alone cannot become a primary key as the same
product can be purchased by different customers. Hence, composite key is
CustOrder_ID and Product_ID, as records can be retrieved uniquely by using both the
fields.

Ch 11 – Creating and using Tables

Assessment Time

A. Select the correct option.


1. b. Handouts
2. c. Query
3. b. Database Wizard
4. b. Date [DATE]
ps
5. a. Float [FLOAT
B. Fill in the blanks.
1. Database
2. Record
3. Tables
4. Form
5. Data Type
C. Answer the following questions.
1. Following are the different database objects:
Ki
• Tables store data items in the form of rows and columns.
• Queries are used to retrieve a specific data from the tables of a database.
• Forms are the user-friendly interfaces that facilitate the process of inserting,
editing, deleting, and updating the data in tables and queries.
• Reports are used to display the selected data in a printable format.
2. Data types determine what type of data you can enter into a field.
3. Text [VARCHAR] data type a variable length field type, which is used to store
character or string values.
4. The Table Data view is the default view of LibreOffice Base. In this view, you can
enter and navigate the records. In Table Design view, you can create a table by
defining the field names and field types. This view also allows you to edit the
structure of the created tables.
5. To edit a table structure,
• Select the table in a database, right-click on it, and select the Edit option.
• The selected table will be opened in the Design View.

© Kips Learning Pvt. Ltd 2023


• Change the field name, field type or properties of the field as per your
requirement.
• After making the required changes, click on the Save button.

Ch 12 – Performing Operations on Tables

Assessment Time

A. Select the correct option.


1. c. Both a and b
2. a. Edit > Edit Data
3. a. Edit > Delete Record
4. d. Sort Order Dialog Box
5. d. All of the above
B. Fill in the blanks.
1. Primary Key
ps
2. Relationships
3. One-to-One
4. Many-to-many
5. Properties
C. Answer the following questions.
1. Tables are the easiest way to store, organise, and present a large amount of
information. They are the building blocks of a database.
2. To sort the records of a table in descending order, first select a field according to
which you want to sort the data. Click on the Sort in Descending Order button on the
Ki
Table Data toolbar. Data will be sorted on the basis of the selected field.
3. Referential Integrity (RI) is a rule in RDBMS. It states that a foreign key must have a
matching primary key, i.e., all its references must be valid and the users cannot
accidentally delete or amend the data. It ensures the accuracy and consistency of the
data within a relationship, and prevents the users to enter the inconsistent data.
4. Following are different types of relationships:
• One-to-One
• One-to-Many
• Many-to-Many
5. Students and Courses tables are best example of a many-to many relationship. A
student can register for many courses, and a same course can be opted by many
students.

© Kips Learning Pvt. Ltd 2023


Ch 13 – Retrieving Data using Queries

Assessment Time

A. Select the correct option.


1. a. Add Table or Query
2. b. Criteria
3. a. Like
4. b. *
5. a. Structured Query Language
B. Fill in the blanks.
1. Query Wizard
2. Alias
3. Where
4. Wildcards
5. SQL
C. Answer the following questions.
ps
1. A query is a database object that enables you to retrieve records from one or more
tables of the database or different databases that meet a specific condition or
criteria.
2. Following are the two queries views:
• Query Design View
• The SQL View
3. The Query Wizard guides you to create a query based on selected table. It is the
easiest method for beginners. The Query Design View gives you more control over a
query. It allows you to create a query from the scratch.
Ki
4. SQL is a language that allows you to make queries to define the data structure and
manipulate the data in the database. A user can create and manipulate (insert new
data, delete data, select and update data) the database anytime by using the
Structured Query Language (SQL) commands.
5. DDL commands are used to define and modify the structure of a database whereas
DML commands allow the users to manipulate data in the database.

Ch 14 – Working with Forms and Reports

Assessment Time

A. Select the correct option.


1. a. Form
2. d. Run Query Buuton
3. d. Report
4. b. Header
5. b. Static

© Kips Learning Pvt. Ltd 2023


B. Write T for True and F for False.
1. T
2. F
3. T
4. T
5. T
C. Answer the following questions.
1. A form holds different fields of a table that you use to enter and modify the data in
the database. Using form, you can add or edit one record at a time. It is a convenient
and an interactive way of entering data, but not an appropriate tool for every data
entry.
2. To launch the Form Wizard, click on the Forms option in the Database Objects pane.
Then, select the Use Wizard to Create Form option in the Tasks pane. The Form
Wizard will open.
3. Yes. To change the name of labels, follow these steps:
• Right-click on the created form and select Edit. You will switch to the Design
ps
Mode of the form.
• Choose a label that you wish to modify and double-click on it.
• The Properties: Label Field dialog box opens. Here, enter a new name in the
Name property. Changes will apply immediately.
4. A report is a summary of your database. It is an effective way to organise and
summarise the data for viewing and printing. It consists of information obtained
from tables or queries, and presented as per the user's requirements.
5. A static report always displays the same data from the time when the static report
was created. A dynamic report generates the result of the report from the current
Ki
table data. This means that if you have some updated data in the table that feeds
the report, then the report will change accordingly.

Brain Developer

Section 4: Competency Based Questions (Unsolved)

1. Launch OpenOffice Base on your computer, the Database Wizard opens. Choose the
Create a new database option and click on Next. Stay with the default settings and
click on Finish. The Save As dialog box opens. Enter a new for the database and click
on OK.
2. To switch to the Table Design View, click on the Create Table in Design View option
in the Tasks Pane. Specify the following field types for the fields:
• EMP_ID: Interger[INTEGER];

© Kips Learning Pvt. Ltd 2023


• Name: Text[VARCHAR];
• Address: Text[VARCHAR];
• City: Text[VARCHAR];
• Contact: Interger[INTEGER];
• Aadhaar _Number: Interger[INTEGER];
• Department: Text[VARCHAR]
3. Query to get the records in descending order, group by city:
SELECT * FROM SALES
Group By City
ORDER BY S_ID DESC;
4. To display the students with grade 'A' or 'E' apply the following criteria:

5. He can use the Reports option in the Database Objects Pane. A report is an effective
way to organise and summarise the data for viewing and printing.
ps
Section 5: Short Answer Type Questions (Unsolved)

1. Tuples: All the rows (consists of a set of related information that belongs to a
particular object) in a table/database are called tuples or records.
Attributes: An attribute is a piece of information about an object. All the columns in
a table/database are called attributes.
2. A composite primary key refers to a combination of two or more attributes (fields)
that uniquely identify the records in a table.
Ki
3. A relational model enables the users to store data in several tables, and whenever
the data is need, it can be retrieved easily by establishing a relationship among
them.
4. A field type determines what type of data you can enter into a field.
5. Data/ Time data type is used to store date and time information in form of
MM/DD/YY HH:MM:SS AM/PM.
6. The Yes/No [BOOLEAN] field type stores value in the form of Yes or No. Since,
Boolean interpretation of Yes and No is 1 and 0, respectively. The field length of this
data type is 1, i.e., it can store either 1 or 0.
7. Using the Table Wizard, one can start with the basic structure of a table.
8. In UIDAI database, each person has only one Aadhaar number, and each Aadhaar
number is assigned to only one person.
9. AutoValue: If set to Yes, the values for this data field is generated by the database
engine.
10. SELECT and INSERT

© Kips Learning Pvt. Ltd 2023


Section 6: Long Answer Type Questions (Unsolved)

1. Following are the advantages of DBMS:


• A database always holds data in a standard format.
• The data of a database can be available anytime and anywhere.
• It has the capability to minimise data duplication and redundancy.
• It also ensures data security.
2. A primary key is a set of one of more fields that uniquely identifies each record in a
table. It does not contain any duplicate data. A table can have only one primary key.
The value in the primary key field is different for every tuple and thus helps in
uniquely identifying the records.
A foreign key is a field or set of fields that is used to establish a relation between the
two tables. In other words, it consists of one or more fields whose value matches
with a primary key in another table. Basically, a foreign key in one table is used to
point at a primary key in another table. It acts as a cross-reference between the
tables.
3. Launch OpenOffice Base on your computer, the Database Wizard opens. Choose the
ps
Create a new database option and click on Next. Stay with the default settings and
click on Finish. The Save As dialog box opens. Enter a new for the database and click
on OK.
4. Tables are the easiest way to store, organise, and present a large amount of
information. They are the building blocks of a database. Tables play an important
role in storing data. All the data is stored in the database in tabular form. A well-
designed table helps the users to retrieve the data from a database easily. You can
create table, by using any of the following methods:
Ki
• Using Table Wizard
• Using Table Design View
5. Structured Query Language (SQL) is a language that allows you to make queries to
define the data structure and manipulate the data in the database. Data
manipulation is the process of editing or modifying the data to keep it updated. A
user can create and manipulate (insert new data, delete data, select and update
data) the database anytime by using SQL commands.
Following are the two DDL commands:
• CREATE: It is used to create a new database or table.
• ALTER: This command modifies the structure of a database or table.
Following are the two DML commands:
• SELECT: It retrieves data from the table.
• INSERT: It inserts data into a table.

© Kips Learning Pvt. Ltd 2023


Unit - IV: Web Applications and Security

CHAPTER 15: Working with Accessibility Options


A. Select the correct option.

1. c. Hearing
2. c. Vision
3. c. Toggle
4. a. Filter
5. b. Eye strain

B. Fill in the blanks.


1. Turning on Filter Keys
2. Hearing
3. Magnifier
4. Turning on Sticky Keys
5. Dexterity

C. Write T for True and F for False.


1. False
2. False
3. False
4. False
5. False
6. False
7. True

D. Answer the following questions.


1. The most common disabilities for which Windows provides solutions are:
VISUAL IMPAIRMENT: This includes the inability to see and read due to blindness, colour
blindness, impaired eyesight, glaucoma, cataract, or other age-related diseases of the eye.

HEARING IMPAIRMENT: This refers to the inability to hear beeps or other warning sounds or even
the audio portion of the video on the computer.

PHYSICAL/MOTOR IMPAIRMENT: This impairment refers to the inability to control the mouse or
keyboard due to injuries or loss of hands or fingers, stiffness in the finger joints, or tremors in hands
due to some diseases.

LEARNING DISABILITIES
The inability to read and comprehend or difficulty in learning and understanding, the written test
is referred to as learning disability.

2. A Magnifier tool is helpful for the people with impaired vision as it enlarges the different parts
of the screen in such a way, that people with visual impairment can easily see the objects on the
screen. To turn on the Magnifier, simply click on the Start Magnifier option.

3.
Toggle Key Sticky Key
Caps Lock, Num Lock, and Scroll Lock keys Sticky Keys can also be turned on or off from
are the Toggle Keys. the keyboard settings.

© Kips Learning Pvt. Ltd 2023


If you press Caps Lock to obtain all capital This feature is useful for those who face
letters then pressing the Caps Lock again will difficulty in pressing more than one key at a
turn it off and now all the lowercase letters time (like Ctrl
will be typed. Click on the check box to turn +Alt+ Del). Turn on Sticky Keys will allow the
the Toggle Keys user to press one key at a time instead of
ON or OFF. pressing all
the keys together.

4.Screen Narrator tool helps in reading the text on the screen aloud. It also describes some
system events, such as error messages, notifications etc., while using the computer. You can
activate the narrator by clicking on the Start Narrator option from the Ease of Access Center
window.

5.
a. Filter keys: Turning on Filter Keys will make the computer recognise multiple key presses as a
single key press. Due to trembling of the hands or stiffness of the finger joints, some people face
difficulty in pressing a key on the keyboard. Instead of a single press of the key, they may press it
more than once. For those people, Filter keys may be used.

b. Setting up high contrast: High contrast amplifies the colour contrast of some text and
images on the computer screen to reduce eye strain and makes the items more distinct and
easier to identify. People with poor vision can see in a much better way if the display is set to
high contrast.

Chapter 16: Networking Fundamentals

A. Select the correct option.


1. b. WAN
2. b. Software
3. a. Internet Protocol
4. c. Modem
5. c. Dial-up
6. c. Packet

B. Fill in the blanks.


1. Virus
2. Security
3. Transmission Control Protocol
4. Hotspot
5. Wireless Fidelity
6. Hub

C. Write T for True and F for False.


1. True
2. False
3. False
4. False
5. False
6. True

D. Answer the following questions.

© Kips Learning Pvt. Ltd 2023


1.Wireless Fidelity is a popular technology through which computers and mobile devices
exchange data wirelessly over the network. Wireless internet connects a home or business
organisation to the internet using a radio link between the customer's location and the service
provider's facility. Wi-Fi is generally used to provide the internet connection to remote places,
where it is difficult to use wires. Wi-Fi is also used within smaller areas, like a home, an
educational institute or a corporate office to provide wireless internet to all the users there.

2.
Repeater Router
A repeater simply copies the information A router is a networking device, which
arriving at its input and retransmits it from routes the information around the
the output. network.
This is required at times when the network It is also used to connect one network with
signal is weakened or distorted over a long the networks.
distance.
This happens if the network passes through an The header of every packet of the
area having strong electromagnetic fields. The information arriving at a router is checked
weakened or distorted signals are regenerated for the destination and using the best
and route, the
then retransmitted by the repeater. message is forwarded to the next device.

3. Data in the internet refers to all the files, e-mails, web pages, etc. that you can see across the
internet. Data travels across the internet in packets. The information in the packet enables a
computer to understand how it assimilates with any other data, the origin or source of the data,
and the data's final destination. This technique is called packet switching and widely used for
optimising data transfer over a computer network.
Let us understand this technique of data transmission.
• When you send a message or an e-mail to another computer connected on the internet,
the data in the message or e-mail is first broken down into small data packets. Once the
packets are ready, the address of the sending and receiving computer is enclosed with the
data packets.
• When the data packets are received by a computer the data packets are again
reassembled in a way that they take the form of the original message. The data packets
reach their destination using different routes. The process is somewhat similar to sending
parcel to your friend using a courier service.

4.The different types of connections for connecting to the internet are discussed as follows:
Dial up connection, Digital Subscriber Line, Cable Internet, Satellite Connection, 3G, 4G, or 5G
Systems, Wireless Fidelity (Wi-Fi), WiMAX, Wi-Fi Hotspot
• Dial up Connection: This type of connection utilises the telephone lines but is not
preferred these days as it is very slow. It allows the user to do one work at a time. One can
either use the phone to call or connect to the internet.
• Digital Subscriber Line (DSL): It is also a type of connection that uses the telephone
lines, but is capable of transferring data at a much higher speed. A DSL filter removes
the high-frequency interference, thus enabling simultaneous use of the telephone and
data transmission.

© Kips Learning Pvt. Ltd 2023


Ch-17: Introduction to Instant Messaging

A. Select the correct option.


1. b. ICQ
2. b. IM
3. b. I Seek You
4. b. Application based
5. a. Web based

B. Write T for True and F for False.


1. True
2. True
3. False
4. True

C. Answer the following questions.


1. Instant Messaging (often called IM) refers to real-time communication with the user at the
other end through an application called Instant Messenger. Most of the instant messengers use
client-server model where messages from a user are sent to the server first and then forwarded
to the intended recipient.
IM usually takes place between two users and follows back-and-forth style of communication, i.e.,
a user can type a short message and send it easily by clicking on the Send button.
Nowadays, a wide variety of IMs (WhatsApp, Google Hangouts, Facebook, and Skype) are
available that provide people with the facility of sending text, audio chat, video calling and
conferencing, and file transfer. For using audio and video call or conferencing, users must have
microphones, headsets or speakers, and web cameras, so that they can talk or see each other.

2. Following are the key features of instant messaging:


• It is faster than any other mode of communication.
• Users can connect to IM regardless of their location.
• Users can communicate with each other as per their suitable time.
• A user can make a group of people to chat with them in one go.
• Users can share the screen using the Screen Sharing feature. This feature is available in
most of the instant messengers.

3.Google Hangouts application is available for installation on both Android and iOS platforms. You
can also use Google Hangouts on your computer or laptop by using a browser, such as Google
Chrome.

4. The four instant messaging applications are:

• Hangouts
• Skype
• WhatsApp
• Hangout

© Kips Learning Pvt. Ltd 2023


Ch-18: Chatting Using Google Hangouts

A. Select the correct option.


1. c. Both a and b
2. b. Emoticons
3. a. Gmail

B. Write T for True and F for False.


1.False
2. True You should follow basic etiquette while chatting with the others.
3. True
4. False

C. Answer the following questions.


1. You can chat with people across the world using an instant messenger like Google Hangouts.

2. To chat with a contact in the Google Hangouts application, follow these steps:

• Open Google Chrome web browser on your computer.


• Type the URL hangouts.google.com in the Address bar and press the Enter key
• Sign in to Google Hangouts by entering valid Email id and Password of Gmail.
• The interface of the Google Hangouts appears. By default, it contains a list of contacts
that you have added in your Gmail.
• You will notice a green dot next to the contacts. The green dot indicates that the
contacts are online.
• To start chatting, click on the contact (visible along with the green dot) you wish to chat with.
• The chat window pops up. It shows all the past conversations with the contact. At the
bottom of the chat window, type a message that you want to send.
• Press the Enter key to send the message. Your message will be delivered instantly. If
the other person also replies on the same time, then you will get his/her message
immediately.

3. Following are the basic etiquette that should be followed while chatting with the others:
• Always introduce yourself by name, if your screen name does not reflect it.
• Always ask if the other person has time to chat first - regardless of how important you
think what you have to say is. Your message is not going to be well received, if the
recipient is busy.
• Always start your message with a short greeting.
• Ensure that your message is short, precise and to the point.
• If you are chatting with a person and he/she is waiting for your response, then do not keep
him/her waiting for a long time.

4. WhatsApp is the most popular instant messenger, nowadays. It is widely used for sending text
and voice messages, and making audio and video calls. It is a free application that can be easily
installed on the mobile phones. You can also use it on your computer by launching WhatsApp
Web.

© Kips Learning Pvt. Ltd 2023


‘BRAIN DEVELOPER

SECTION 4: APPLICATION BASED QUESTIONS (UNSOLVED)


1.Dia should use speech recognition and On-screen if she wants to set the alternatives for input
devices.

2.The commonly used protocols for data transfer over the internet are (Transmission
Control Protocol/Internet Protocol (TCP/IP) and File Transfer Protocol (FTP).

3. LAN

4. Google Hangouts

5. Yes

SECTION 5: SHORT ANSWER TYPE QUESTIONS (UNSOLVED)


1. Sticky Keys can also be turned on or off from the keyboard settings. This feature is useful for
those who face difficulty in pressing more than one key at a time (like Ctrl +Alt+ Del). Turn on
Sticky Keys will allow the user to press one key at a time instead of pressing all the keys
together.

Toggle Keys
Caps Lock, Num Lock, and Scroll Lock keys are the Toggle Keys. If you press Caps Lock to
obtain all capital letters then pressing the Caps Lock again will turn it off and now all the
lowercase letters will be typed. Click on the check box to turn the Toggle Keys ON or OFF.

2. Narrator option is used to activate the narrator by clicking on the Start Narrator option from
the Ease of Access Center window.

3.

Internet WWW
A global interconnection of computer The World Wide Web (WWW) commonly
networks around the world is known as known as the Web, is a way of accessing
the internet. In other words, the internet is information over the internet. It contains
a network of networks. Communication millions of documents called Web Pages.
over the internet is governed by a set of Sir Tim Berners Lee, along with Robert
rules known as protocols. The commonly Cailliau, invented the world wide web
used protocols for data transfer over the while working at CERN (European Council
internet are (Transmission Control for Nuclear Research) in 1990.
Protocol/Internet Protocol (TCP/IP) and
File Transfer Protocol (FTP).

© Kips Learning Pvt. Ltd 2023


4. A computer network may be defined as a group of two or more computer systems or
peripheral devices that are connected together to exchange information and share
resources with each other. TYPES OF NETWORKS
Depending on their size, capabilities, and the geographical distance, computer networks can
be classified as follows:
• Personal Area Network (PAN)
This type of network connection covers a very small area, such as a home or an office
cabin. Desktop computers, laptops, tablets, smartphones, printers, or wireless
headphones make up the nodes of this type of network. It uses Bluetooth, USB
connections, or the increasingly popular Wi-Fi technology for communication. It generally
covers the range of less than 10 metres.

• Local Area Network (LAN)


LAN is used in an office building or educational campus. Ethernet cables and Wi-Fi are
used to set up this type of network. Its range is up to 10 kms. The number of systems
connected in LAN may vary from 2 to 1000. LAN is a useful technology that provides
different ways of sharing the resources between the end users. Resources such as
printers, file servers, scanners, and the internet can be easily shared among the
connected computers.

• Metropolitan Area Network (MAN)


This type of network is geographically larger than LAN and covers a city. They are used by
large organisations, having several branches over a city or local government bodies, like
the Municipal Corporation, or police. This type of network uses microwave transmissions
or fiber optic cables to link the different nodes of the network.

5. Data in the internet refers to all the files, e-mails, web pages, etc. that you can see across the
internet. Data travels across the internet in packets. The information in the packet enables a
computer to understand how it assimilates with any other data, the origin or source of the
data, and the data's final destination. This technique is called packet switching and widely
used for optimising data transfer over a computer network.

6. Instant Messaging (often called IM) refers to real-time communication with the user at the
other end through an application called Instant Messenger. There are two types of Instant
Messaging software — application-based and web-based.
APPLICATION BASED
These are application programs that can be easily downloaded and installed on the user's
devices. Some popular application-based instant messengers are as follows:
• Hangouts
• Skype
• Rediff Bol
• WhatsApp
• Facebook Messenger

WEB BASED
These can be accessed by using a browser application, such as Google Chrome, Internet
Explorer, and so on. Some popular web-based instant messengers are as follows:
• Hangouts
• Skype Online

© Kips Learning Pvt. Ltd 2023


• eBuddy
• MSN Web Messenger
• WhatsApp Web

7. Google Hangouts application is available for installation on both Android and iOS platforms.
You can also use Google Hangouts on your computer or laptop by using a browser, such as
Google Chrome or on mobile phone.
To use Google Hangouts on your computer, follow these steps:
• Open a browser window, such as Google Chrome.
• Type hangouts.google.com in the Address bar and press the Enter key.
• The Home Page of Google Hangouts appears. Click on the Sign in button.
• The Google Sign in page appears. Enter an Email Id of Gmail.
• If your email Id is valid, Google will ask you to type the password. Enter the password and
click on Next.
• If the email id and password matches, then you will login to Google Hangouts.
• The main window of Google Hangouts contains the list of your Gmail contacts, by
default. The contacts that are online at present will be indicated by a green dot.
• You can easily chat through Google Hangouts by clicking on the contact whose green dot
is visible or use other services, such as audio call or video call.

8. An emoticon known as an emote, which are a pictorial representation of a facial


expression using characters—usually punctuation marks, numbers, and letters—to express a
person's feelings or mood, or as a time-saving method.

9. To chat with a contact in the Google Hangouts application, follow these steps:
• Open Google Chrome web browser on your computer.
• Type the URL hangouts.google.com in the Address bar and press the Enter key.
• Sign in to Google Hangouts by entering valid Email id and Password of Gmail.
• The interface of the Google Hangouts appears. By default, it contains a list of contacts
that you have added in your Gmail.
• You will notice a green dot next to the contacts. The green dot indicates that the
contacts are online.
• To start chatting, click on the contact (visible along with the green dot) you wish to chat with.
• The chat window pops up. It shows all the past conversations with the contact. At the
bottom of the chat window, type a message that you want to send.
• Press the Enter key to send the message. Your message will be delivered instantly. If
the other person also replies on the same time, then you will get his/her message
immediately.

SECTION 6: LONG ANSWER TYPE QUESTIONS (UNSOLVED)


1. Some commonly used accessibility tools are discussed as follows:
• MAGNIFIER
A Magnifier tool is helpful for the people with impaired vision as it enlarges the different
parts of the screen in such a way, that people with visual impairment can easily see the
objects on the screen. To turn on the Magnifier, simply click on the Start Magnifier option.
• NARRATOR
Screen Narrator tool, besides reading the text on the screen aloud, also describes some
system events, such as error messages, notifications etc., while using the computer. You

© Kips Learning Pvt. Ltd 2023


can activate the narrator by clicking on the Start Narrator option from the Ease of Access
Center window.
• ON-SCREEN KEYBOARD
The on-screen keyboard displays a visual keyboard with all the standard keys.
To use an on-screen keyboard, simply click on the desired key using the mouse. The
on-screen keyboard does not disable the functioning of a physical keyboard and it is
possible to use both simultaneously.

• SET UP HIGH CONTRAST


High contrast amplifies the colour contrast of some text and images on the computer screen
to reduce eye strain and makes the items more distinct and easier to identify. People with
poor vision can see in a much better way if the display is set to high contrast.

• EXPLORE ALL SETTINGS


This section of Ease of Access Center allows all the settings to be customised. Let us
discuss how these options help a disabled person to use a computer.

• USE THE COMPUTER WITHOUT A DISPLAY


This section helps in optimising the settings for a person who is blind or has severely
impaired vision.
2. Few advantages and disadvantages of computer networks are as follow:

ADVANTAGES OF COMPUTER NETWORKS


• Sharing of Hardware: Sharing of hardware devices, like printers, scanners, or storage
devices such as hard drives help in reducing the cost of the hardware.

• Sharing Files: By using a network, the users can easily share documents with each
other. This feature promotes teamwork and increases productivity.

• Backup: Data can be stored on a central computer or server with a backup system;
ensuring that no data loss can occur.

• Cost Effective: Since hardware, software, and storage systems can be shared; this
results in cost saving.

DISADVANTAGES OF COMPUTER NETWORKS

• Initial Costs: Although the running cost of a network is lower than that of the
individual computers, but the initial cost of setting up a network is higher.
Expensive devices, such as routers, switches, hubs, network interface cards, and
server can add up to the cost.
• Maintenance and Administration: If the network grows too large, various issues
may crop up in the day-to-day operation of the computer network. To work
efficiently and optimally, it requires high technical skills and know-how of its
operations and administration.
• Major Effect of Breakdowns: If a computer network's main server breaks down,
the entire system would become useless. Likewise, in case of problems with the
shared resources, like hardware, software, or storage systems, all the computers
on the network would also come to a standstill.

© Kips Learning Pvt. Ltd 2023


3. A specific computer, more powerful than the others, acts as the server and provides resources
to the other computers on the network. Client-Server networks are usually more expensive
and not so easy to implement. It is easy to take measures to secure the system in a Client-
Server network. Specific computers can be allowed access to specific areas of the server.

4. The various uses of an instant messaging account are as follow:


• To use an instant messenger service, a user must have an account with the IM application
and needs to be signed in the same application to communicate with the others who are
already logged in.
• Every IM application has a different interface and format. For example, the interface or
format of WhatsApp is different from the Google Hangouts or Facebook Messenger.
• Google Hangouts and Facebook Messenger are closely associated with the online
profiles of the users, whereas WhatsApp can be used to chat with the contacts stored
in the mobile phones. However, all these platforms have one thing in common, i.e.,
they are used for communication.

5. To use WhatApp on your computer, follow these steps:


• Open the browser window.
• Type web.whatsapp.com in the Address Bar and press the Enter key.
• Then, open the WhatsApp app on your mobile phone and follow the instruction given on
the web page to scan the code.
• WhatsApp will be activated on your computer. Now, you can chat with a contact in the same
way you do on your mobile phone.

CHAPTER 19: Creating and Publishing Blogs


A. Select the correct option.
1. c. Both
2. c. Customise
3. a. Create
4. c. 3 GB

B. Fill in the blanks.


1. Publish
2. Add
3. Write
4. Host

C. Write T for True and F for False.


1. True
2. True
3. False
4. True

D. Answer the following questions.


1. Three important points that you must keep in mind while writing a blog are:
• Understand your target audience. Have a clear understanding of their interest and what
they want to know about.
• Make sure that the blog is well structured.
• Use social media portals, like Facebook, Instagram, etc. to make your blog popular. This
method of marketing offers a huge potential.

© Kips Learning Pvt. Ltd 2023


2. Select an engaging topic and give an interesting title to it. A prominent headline is the key
to attract people towards your blog.
3. To upload media, click on the Add button, a drop-down list will appear. Then you can add
audio, video, image, and many other types of files to your blog.

Chapter 20: Using Offline Blog Editors


A. Select the correct option.
1. a. Offline
2. c. Both a and b
3. a. Blog's URL
4. b. Manager
5. a. Qumana

B. Write T for True and F for False.


1. False
2. False
3. True
4. True

C. Answer the following questions.


1. Offline blog editors are the application software that helps you to easily write, edit, spell-
check, and manage the content of your blog without being connected to the internet.

2. Offline blogging has a many benefits. Some of them are as follows:


• Offline blog editors are faster than the online blog editors.
• While using an offline editor, you always have a backup copy of your post on the hard drive.
• With a blogging app, all the advanced editing, and formatting features are available, just
like you get in the WordPress editor.
• Offline editors provide the settings for images, videos, and links easily.

3.Qumana is one of the best desktop-based blog editors. It can be downloaded for free on your
Windows, Linux, or Mac-based computer. It has the ability to work with most common blogging
applications, like WordPress, Blogger, LiveJournal, Typepad, and many more. It gives an offline
access to blog posts without any browser. In your default blog editor, it becomes quite difficult to
edit and insert various types of media, whereas, this can be done easily in Qumana, and also for
more than one blog at the same time. There are a number of fee-based blog editors that offer the
same or even less functions than Qumana.

4.Qumana displays all the existing posts available in your blog. To create a new
post, do the following in your blog editing window:
• Click on the New Post button .
• Enter the title of the post in the Title field.
• Enter the content of the post in the Content Area.
• Click on the Publish Post button. The post will get automatically updated on your WordPress
blog.
• To view your published post, open your WordPress blog on the web browser and type
the URL of your blog.

© Kips Learning Pvt. Ltd 2023


Chapter 21: Online Transactions

A. Fill in the Blanks.


1. Online shopping/E-shopping
2. E-commerce
3. www.irctc.co.in
4. Electronic Data Interchange

B. Write T for True and F for False.


1. True
2. True
3. False
4. True

C. Answer the following questions.


1. Nowadays, lots of the internet services are available to promote businesses electronically. The
internet offers you many convenient ways to shop from your homes or offices for almost
everything, such as movies, games, stationery, apparels, health care, personal products, home
appliances, and electronic items. This process of selling and buying products over the internet is
called Online shopping or E-shopping.

2. E-reservation means making a reservation or appointment for a service via the internet. Using
e- reservation, you can check the availability of seats in bus, train, or aircraft anytime, and also
reserve rooms, meeting halls, or tables in restaurants. By making online payment through credit
or debit cards and net banking, you can confirm your reservations also.

3. BENEFITS OF E-RESERVATION
• Accessible Anywhere: Buying an e-ticket or making an online booking is the most
convenient method for booking a hotel, flight or car-on-rent. One can buy an e-ticket
anywhere in the world where an internet connection is available.
• Discounts and Offers: You can check multiple websites to select the best price while
making an online reservation. Many hotel and airline websites provide lucrative offers
to their online customers by offering discounts and attractive schemes to attract more
clients.
• Commission Free: Booking online saves hidden commission fees as there is no third-party
involved.
• Quick System: Booking through e-reservation system is very fast. The users can simply
search, select, and book the tickets either by paying through credit cards or net banking
and get an instant confirmation for services.
• Changes and Cancellations: Changes and cancellations of e-tickets can be done
immediately and the money is refunded almost instantly by just logging onto the
internet.
• Customer Reviews: Customer reviews during e-reservations help in deciding the type of
service that will be provided by the service provider. They help the user in making
decisions and availing the best services.
• Safe and Reliable: E-reservation software provides a secure onIine transaction system
by taking security measures to protect your confidential credit and debit card
information.

© Kips Learning Pvt. Ltd 2023


APPLICATION AREA
E-reservation has changed the reservation process completely in the last few years. More and
more users are now using online reservation facility because of its ease of use and instant
confirmation. It saves both time and money and ensures a stress-free service. It is being used in
areas such as:
• Hotel reservation
• Travel ticket reservation
• Movie ticket reservation
• Event reservation

4. You register at various sites for online transactions during which you have to enter a username
and password. If you lose the password to your e-mail, bank, or credit card accounts, you could be
facing severe monetary losses. You should therefore, take special care to protect your passwords.
The following points list some of the measures that you can take to protect your password:
• Use strong passwords that have a combination of lower and upper case letters, numbers,
and also special characters. Keep the length of the password to at least 12-14 characters.
• Do not use easy-to-guess passwords. Avoid using passwords, such as your name or
surname, username, names of your family members like mother, father, children,
pets or even friends, birthdates, dictionary words, or part of your address.
• If you decide to use a simple password, add a number or special character to the password
either at the beginning or at the end or even in both the places!
• Never write your password anywhere so that nobody can misuse it.

Chapter 22: Internet Security

A. Fill in the blanks.


1. History
2. Phishing
3. Antivirus
4. Firewall
5. Backups

B. Write T for True and F for False.


1. False
2. True
3. True
4. False
5. True

C. Answer the following questions.


1. With the rapid growth of the internet and its applications in diverse fields, security risks have
also increased. People tend to put their personal information, like name and address, passwords
for the email accounts, banking, or even credit card details over the internet. This information
can be easily intercepted by some people with bad intentions (crackers). They may misuse this
information for their own benefit. Virus like the Ransomware virus attacks have made people
realise how vulnerable their information is and has increased the need for Internet Security.

2. Phishing is an act of sending an e-mail to a user; misleading him to believe that it is from a
trusted person or organisation. The user is asked to visit a website in which he is supposed to
update or validate his personal details, such as user name, password, credit card details, etc. In
this way the operators of the fake website steal the person's identity and commit crimes in his
name. This could damage the person's reputation and cause him heavy financial losses.

© Kips Learning Pvt. Ltd 2023


3.
Email Spoofing Chat Spoofing
Email spoofing is one of the most common Chat spoofing is quite similar to email
security threats these days. This process spoofing. The only difference between the
involves sending emails to the two is that in chat spoofing, the
targeted recipients to make them believe spoofing happens when the target is
that these emails originate from trusted engaged in a chat process. The target
resources. perceives that he or she is chatting with
someone known, but in fact, it is a cyber
attack.

The purpose of spoofing is The purpose of chat spoofing, also, is to gain


to gain access to the recipient’s personal access to some important
information. It can be usernames, personal information.
passwords, banking details, etc.

4.
• Use a Firewall: Some programs might try to access your computer remotely without your
permission. To prevent such a situation, you should install a firewall on your computer. A
firewall is a software that can help in preventing unauthorised access to your computer by
blocking unsolicited communications.

• Do not Open Attachments from Unknown Sources: One of the most common ways
through which viruses spread is email. So, always ignore unsolicited e-mails. Avoid opening
attachments, links, and forms in e-mails that come from people you do not know, or which
seem "phishy". Also, avoid untrustworthy downloads.

• Scan all Portable Storage Devices before Use: Pen drives are one of the most popular
storage devices in use today due to their convenience and portability. It has been found
that they are also the most common sources of infection in computers. Set up your
antivirus software to automatically scan every portable device plugged into the computer
to ensure that your system remains safe.

• Restrict the Number of users on the Computer: Although this may not be possible in
places where computers are shared, but having some control over the usage will greatly
reduce the risk of infection. So, the number of users should be restricted especially when
the users are allowed to bring and use their own portable storage devices.

• Update all Software Regularly: Very often software companies discover that there are
certain vulnerable areas in the software they have designed. They will try to develop a
patch for this problem and release it to all the registered users by an update. If your
software is not updated, then this will leave your computer open to a security threat. To
avoid this, try to set all software to update automatically on a regular basis.

• Do not use Pirated Software: Though using a pirated and unlicenced software may seem
financially attractive, yet the possibility of picking up a virus infection from such sources is
very high. Always use software from well-known companies that can be downloaded from
their official site.

© Kips Learning Pvt. Ltd 2023


BRAIN DEVELOPER

SECTION 4: APPLICATION BASED QUESTIONS (UNSOLVED)

1. After creating a blog, you need to create a post. To create your first blog post, do the following:
• On your Homepage, click on the Write button to start making your first blog post.
• Give a Title to your blog, and start writing the content. The text formatting tools appear as
you type the text. You can choose them to format your text as you do while working on
any word processor.
• You can also add images to your blog. Copy an image and paste it on your blog page .
• Using the free plan from WordPress, you can store up to 3 GB of media in your gallery.
To upload media, click on the Add button, a drop-down list appears.
• You can add audio, video, image, and many other types of files to your blog.

PUBLISHING A BLOG
• After finishing up with the content, publish your blog to make it live.
• Click on Publish from the top-right corner of the window.
• Check the visibility of your blog. You can choose to make it Public, Private, or Password
Protected.
• Click on Publish button, and your blog goes live. You can view your blog online and/or copy
the blog link.

2. Rajan has to follow the given steps to insert image in his blog:
• Click on the image button on the toolbar.
• The Insert Image dialog box opens.
• Click on the Browse button and locate the image that is to be added.
• Now, choose a wrapping style for the image in the Wrapping Style section.
• Click on the Upload & Insert button to insert the selected image in your blog.
• Click on the Publish Post button.
• Open your WordPress blog in the web browser to view the published blog.

3. Anita can easily book her own train ticket for travelling from some of the popular websites that
provide the reservation facility are:
www.irctc.co.in, www.makemytrip.com, www.bookmyshow.com, www.yatra.com, etc.

4. Rohan should always use a strong password in order to avoid facing severe monetary losses. Use
strong passwords that have a combination of lower and upper case letters, numbers, and also
special characters. Keep the length of the password to at least 12-14 characters. If you decide to
use a simple password, add a number or special character to the password either at the beginning
or at the end or even in both the places.

5. Chat spoofing is quite similar to email spoofing. The only difference between the two is that in
chat spoofing, the spoofing happens when the target is engaged in a chat process. The target
perceives that he or she is chatting with someone known, but in fact, it is a cyber-attack. The
purpose of chat spoofing, also, is to gain access to some important personal information.

© Kips Learning Pvt. Ltd 2023


SECTION 5: SHORT ANSWER TYPE QUESTIONS (UNSOLVED)
1. A blog is a combination of the words web and log. It is a frequently updated, online,
personal journal or diary where a person can log (write or post) information related to his
interests or activities, express his ideas or opinions or share his knowledge through writing.

2. An internet connection is required to publish an online blog, whereas in offline blogging,


one can write a blog when he/she is not connected to the internet. Offline blog editors
are faster than the online blog editors.
3. Due to following reasons users are moving towards e-reservations.
• Accessible Anywhere: Buying an e-ticket or making an online booking is the
most convenient method for booking a hotel, flight or car-on-rent. One can buy
an e-ticket anywhere in the world where an internet connection is available.

• Discounts and Offers: You can check multiple websites to select the best price while
making an online reservation. Many hotel and airline websites provide lucrative offers
to their online customers by offering discounts and attractive schemes to attract more
clients.

• Commission Free: Booking online saves hidden commission fees as there is no third-
party involved.

• Quick System: Booking through e-reservation system is very fast. The users can simply
search, select, and book the tickets either by paying through credit cards or net
banking and get an instant confirmation for services.

• Changes and Cancellations: Changes and cancellations of e-tickets can be done


immediately and the money is refunded almost instantly by just logging onto the
internet.

• Customer Reviews: Customer reviews during e-reservations help in deciding the type
of service that will be provided by the service provider. They help the user in making
decisions and availing the best services.

• Safe and Reliable: E-reservation software provides a secure online transaction


system by taking security measures to protect your confidential credit and debit card
information.

4. Some popular websites that provide e-reservations are:


www.irctc.co.in, www.makemytrip.com, www.bookmyshow.com, www.yatra.com, etc.

5. When the shipping cost does not gets added to the cost of the product, then it is
known as free shipping.

6. A firewall is a software that can help in preventing unauthorised access to your


computer by blocking unsolicited communications.
7. Data encryption is a security method by which information is encoded in such a way
that only an authorised user can read it. Data is encrypted using encryption
software.

© Kips Learning Pvt. Ltd 2023


8. Install Antivirus Software: Viruses threaten your computer security, especially when on
the internet. Daily, unscrupulous elements create new viruses and until these threats are
detected and countered by the antivirus software manufacturers, you are always at risk
from these viruses. It is therefore necessary to have strong antivirus software installed on
your computer.
Use a Firewall: Some programs might try to access your computer remotely without your
permission. To prevent such a situation, you should install a firewall on your computer. A
firewall is a software that can help in preventing unauthorised access to your computer by
blocking unsolicited communications.

9. To avoid an unfortunate eventuality of your computer being infected by a virus, it is


important to have a backup of all of your important data.

10. A padlock sign or https: instead of http: in your browser address bar as this indicates
a secure connection.

SECTION 6: LONG ANSWER TYPE QUESTIONS (UNSOLVED)

1. Some important features of a blog are:


• An internet connection is required to publish a blog; however, a blog can also be
written offline and uploaded on the internet when the connection is available.
• A blogger can interact with the readers by answering their questions and regularly
updating the contents after the readers have given comments related to the blog. This
enables him/her to establish trust with his/her readers.
• To write a blog, you need a blogging tool. There are many such tools available on the
internet, i.e., weebly.com, sitebuilder.com, etc. However, WordPress is an online, and
one of the most popular open source website/blog creation tool, which is versatile
and quite simple to use. It offers both paid and free services. It allows you to make a
website or a blog in the shortest possible time.
• Blogs can be written on any topic. They could be related to business, education,
legal, travel, marketing, advertising, health, sports, etc.
2. Offline blogging has a many benefits. Some of them are as follows:
• Offline blog editors are faster than the online blog editors.
• While using an offline editor, you always have a backup copy of your post on the hard
drive.
• With a blogging app, all the advanced editing, and formatting features are available, just
like you get in the WordPress editor.
• Offline editors provide the settings for images, videos, and links easily.
• These editors provide facility to add tags and categories directly.
• These editors help to publish multiple blogs quickly as it is easier to switch from one
blog to another.
• Offline editors let you post your article directly to your blog or post as a draft.

3. E-reservation means making a reservation or appointment for a service via the internet.
Using e- reservation, you can check the availability of seats in bus, train, or aircraft
anytime, and also reserve rooms, meeting halls, or tables in restaurants. By making online
payment through credit or debit cards and net banking, you can confirm your reservations
also.

© Kips Learning Pvt. Ltd 2023


BENEFITS OF E-RESERVATION
• Accessible Anywhere: Buying an e-ticket or making an online booking is the most
convenient method for booking a hotel, flight or car-on-rent. One can buy an e-ticket
anywhere in the world where an internet connection is available.
• Discounts and Offers: You can check multiple websites to select the best price while
making an online reservation. Many hotel and airline websites provide lucrative offers
to their online customers by offering discounts and attractive schemes to attract more
clients.
• Commission Free: Booking online saves hidden commission fees as there is no third-party
involved.
• Quick System: Booking through e-reservation system is very fast. The users can simply
search, select, and book the tickets either by paying through credit cards or net banking
and get an instant confirmation for services.
• Changes and Cancellations: Changes and cancellations of e-tickets can be done
immediately and the money is refunded almost instantly by just logging onto the
internet.
• Customer Reviews: Customer reviews during e-reservations help in deciding the type of
service that will be provided by the service provider. They help the user in making
decisions and availing the best services.
• Safe and Reliable: E-reservation software provides a secure onIine transaction system
by taking security measures to protect your confidential credit and debit card
information.
4. The internet has given several advantages to each individual and is extremely
popular in this modern age. However, it is a tool that must be handled with caution
as its misuse can be hazardous. Some of the threats posed by the internet are as
follows:
• PHISHING
It is an act of sending an e-mail to a user; misleading him to believe that it is from a trusted
person or organisation. The user is asked to visit a website in which he is supposed to
update or validate his personal details, such as user name, password, credit card details,
etc. In this way the operators of the fake website steal the person's identity and commit
crimes in his name. This could damage the person's reputation and cause him heavy
financial losses.
• EMAIL SPOOFING
Email spoofing is one of the most common security threats these days. This process
involves sending emails to the targeted recipients to make them believe that these emails
originate from trusted resources. The purpose of spoofing is to gain access to the
recipient’s personal information. It can be usernames, passwords, banking details, etc.
Nowadays, most email servers provide security features to prevent this type of activity.

5. Following precautions must be taken to improve the internet security:


• Keep Passwords Safe: You register at various websites for accessing their content
during which you have to enter a username and password. It is suggested that one
should change their password frequently. If you do not change your password
frequently then your password might get hacked and you may face severe monetary
losses. You should therefore, take special care to protect your passwords.

• Secure Transactions: Nowadays, most of the transactions are happening online,

© Kips Learning Pvt. Ltd 2023


therefore, it is very important to ensure the security of these financial transactions on
the internet. The online transactions are made through a mobile application, like eBay,
Flipkart, Amazon, etc, using Point of Sale (POS) payment system in shopping malls or
shops and third party pay services, like PayPal or Paytm.

• Install Antivirus Software: Viruses threaten your computer security, especially when on
the internet. Daily, unscrupulous elements create new viruses and until these threats are
detected and countered by the antivirus software manufacturers, you are always at risk
from these viruses.

• Use a Firewall: Some programs might try to access your computer remotely without
your permission. To prevent such a situation, you should install a firewall on your
computer. A firewall is a software that can help in preventing unauthorised access to your
computer by blocking unsolicited communications.

• Do not Open Attachments from Unknown Sources: One of the most common ways
through which viruses spread is email. So, always ignore unsolicited e-mails. Avoid
opening attachments, links, and forms in e-mails that come from people you do not know,
or which seem "phishy". Also, avoid untrustworthy downloads.

6. Data may be stored in temporary internet files, cookies, usernames, passwords,


browsing history, download history, favorites, and data from forms. If this information
falls into the wrong hands, it would result in the loss of your privacy and may also result
in an unsecured situation.
To preserve your privacy ensure that your browsing is always secure. To do so, you should
regularly delete any unnecessary data stored in the browsers.

CHAPTER 23: Importance of Workplace Safety

A. Select the correct option.


1. b. Heat, oxygen and fuel
2. c. Both of these
3. c. Both of these
4. b. Arc fault
5. c. Both of these

B. Write T for True and F for False.


1. False
2. True
3. True
4. False
5. True

C. Answer the following questions.


1.
FIRE SAFETY RULES
The following fire safety rules, if implemented correctly, can prevent and reduce fire hazards:
• Carry Out a Fire Safety Risk Assessment: Employers should carry out a risk assessment at
the workplace, which can include fire prevention, fire detection and warning, and
emergency escape, and firefighting. Fire needs three elements—heat, oxygen, and fuel.
Without these elements, a fire will not start or spread. Hence, a key strategy to prevent
fire is to remove one or more of these elements. The risk assessment should include detail
on all the three elements to minimise the risk of a fire starting and/or spreading. A fire

© Kips Learning Pvt. Ltd 2023


prevention strategy should be built based on this assessment.

• Keep the Workplace Clean: A clean and tidy workplace helps prevent fire threats,
especially, if it handles a lot of flammable material. Such material should be stored in a
safe environment; away from flames. An untidy workplace results in clutter, which
acts like fuel for the fire to spread and also prevents access to exits and emergency
equipment like fire extinguishers and sprinkler systems. Also, smoking should not be
allowed at the workplace.

• Maintain Electrical Safety: A faulty wiring and malfunctioning of electrical equipment can
lead to voltage fluctuations or short circuit that can further be a reason or cause of fire at
workplace. Even defective wiring, overloaded sockets or plugs, and equipment that are old
and faulty may lead to heating of cables and equipment, which in turn can lead to fire.
Regular inspection and maintenance of electrical equipment should become a compulsory
and regular practice to prevent overheating or sparking of cables or equipment.

2. Common causes of slips or trips are:


• Poor lighting
• Trailing cables
• Unsuitable floor coverings
• Uneven or damaged floor surfaces
• Contaminated floor surfaces due to liquid or grease
• Poor housekeeping
• Occasional spills

3. Following are some of the ways by which one can prevent slips, trips, and falls around the
workplace:
• Keep Walking Surfaces Clean and Free of Clutter: Keeping walking surfaces clear, can
help reduce the potential for injury. An unobstructed path minimises the risk for an
employee to trip over an object and it also reduces the chances of a spill that could lead
to a slip.
• Lighting: Proper lighting inside and outside of the workplace can help illuminate areas, like
steps or other hazards that can cause trips if they are hidden by darkness or shadows. By
installing proper lighting, one can reduce the chances of people slipping or falling.

• Signage: Using clear and well-placed signage can help call attention to potential problem
areas. A sign indicating a step, gap, uneven ground, or loose rocks will bring the employees’
attention to the hazard and increase awareness and attentiveness. Reflective tape can also
be used to highlight such problem areas.

• Stairways/Handrails: Stairs are most popular place for falls at the workplace. To reduce
the risk of such injuries, stairwells should have handrails, be kept clear of clutter, well lit,
and free from any unsecured objects, like rugs and carpets. The first and last stair should
always be well marked.

4. Following measures should be included in the electric safety programs of organisations:


• Electrical installations should be done and maintained by a competent person and
checked regularly.
• Extension cables, plugs, sockets, and other flexible leads and their connections that are

© Kips Learning Pvt. Ltd 2023


particularly prone to damage should be visually checked, maintained, and where
necessary, replaced before using any equipment.
• Correct cable connectors or couplers should be used to join cables together; taped
joints should not be allowed.
• Socket outlets should not be overloaded by the use of adaptors.
• Electrically powered equipment should be used.

5. First aid is the emergency care given immediately to an injured person. It is given to minimise
injury and future disability. In serious cases, first aid may be necessary to keep the affected
person alive.

The overall goals of first aid are to:


• keep the victim alive.
• prevent the victim’s condition from worsening.
• keep the victim awake until help arrives.
The training of a first-aid program includes:
• The first few minutes after an accident or emergency are extremely important. In a lot of
cases, the recovery of the victims and their lives depend on the first-aid provided at the
scene of the accident. In such a situation, a person who is trained in first-aid can stop the
condition of the affected person from becoming worse and even save lives.
• Prompt, properly administered first aid care can mean the difference between life and
death, rapid versus prolonged recovery, and temporary versus permanent disability.
• We have seen that it is important to have qualified first-aiders at the workplace. There are
nationally accredited training courses as well as certain other equivalent courses available
to empower people to become qualified first-aiders. Only employees trained in first aid
should assist a victim. As part of their emergency training, employees should know how to
respond during an injury or illness situation, while not causing any further damage.

CHAPTER 24: Preventing Accidents and Emergencies

A. Select the correct option.


1. c. Both a and b
2. b. Manmade hazard
3. b. Meteorological, geological, and biological
4. c. Both a and b
5. a. Civil disturbances

B. Fill in the blanks.


1. Asphyxiation
2. Accidental release
3. Protective equipment
4. Blocked
5. An accident

C. Answer the following questions.


1. An accident at a workplace is an event that is an unplanned, unintended, and unexpected. It
can happen due to various factors that a person faces at the workplace. Such accidents can cause
minor to severe physical injury or even result in death. This may either be due to a risk that has

© Kips Learning Pvt. Ltd 2023


not been identified or identified but not properly controlled.
A workplace emergency is an unforeseen situation that threatens the employees, customers, or
public. It disrupts the company’s operations and even sometimes causes physical or environmental
damage. The hazards leading to accidents and emergencies may be natural or manmade.

2. Slips, Trips, and Falls: Slips and trips can result in falls. Slips can occur due to
slippery floor, leaks from materials or debris left in walkways, uneven floor or
working surfaces, protruding nails and boards, bunched up floor mats or
uneven carpeting, holes or depressions in working surfaces, or uneven stairs.

Getting Caught in or Between Hazards: Sometimes minor cave-ins, such as being pulled into or
caught in machinery and equipment or being compressed or crushed between rolling, sliding,
or shifting objects also happen at the workplace.

Struck by Moving Equipment or Objects or Walking into Objects: Collisions could occur with
heavy equipment or any moving object kept either at the same level or from an object falling
from the above. A working person can also accidentally walk into an object and get injured.

Vehicle-Related Accidents: Accidents due to a crash or impact injuries are also quite frequent in
workplaces. These often involve cars, lorries, or even small vehicles, such as forklift trucks, and at
times result in serious injuries.

3. Slips, Trips, and Falls: Slips and trips can result in falls. Slips can occur due to slippery floor,
leaks from materials or debris left in walkways, uneven floor or working surfaces.

Getting Caught in or Between Hazards: Sometimes minor cave-ins, such as being pulled into or
caught in machinery and equipment or being compressed or crushed between rolling, sliding, or
shifting objects also happen at the workplace.

Struck by Moving Equipment or Objects or Walking into Objects: Collisions could occur with
heavy equipment or any moving object kept either at the same level or from an object falling
from the above. A working person can also accidentally walk into an object and get injured.

Vehicle-Related Accidents: Accidents due to a crash or impact injuries are also quite frequent
in workplaces. These often involve cars, lorries, or even small vehicles, such as forklift trucks,
and at times result in serious injuries.

Fire and Explosions: Accidents also happen because of fire or other explosive substances. In such
cases, problems may not only occur from direct contact with fires, but also because of
asphyxiation, which is caused due to the smoke generated from the fires.
4. Mention some preventive measures that can be taken to prevent accidents at the workplace.
Some of the preventive measures, to prevent accidents, are:
• Employers must provide workers with protective equipment, such as safety goggles and
other gear they need, to avoid dangerous exposure.
• Reminding employees to be vigilant.
• Removing clutter and putting it out of the way so that people would not step on it
and fall accidently.
• Effective procedures for dealing with employee grievances can help reduce the risk of
fights in the workplace; which could otherwise, result in nasty injuries.

© Kips Learning Pvt. Ltd 2023


• Good training, clear signage, and access to the necessary safety equipment can all be a big
help.
• Regular risk assessments are also important.

5. Even when organisations take appropriate workplace safety precautions and measures to avoid
injuries, accidents can happen. In such cases, how employers respond to these accidents can
make all the difference. When an injury occurs, the person in charge should follow proper
protocols to handle a work-related injury or illness. Some such protocols are as follows:

Care for the Affected Employee: The employees’ safety comes first and getting an injured
employee preliminary treatment quickly is crucial.
• A proper evaluation of the situation should be done.
• An employee, who is trained in first-aid, should attend to the injured person right away.
• In an emergency situation, an ambulance should be called. In non-emergency
situations, the injured employee should be taken to a medical care facility at the
earliest.
• The family of the employee should be notified immediately about the situation.
Secure the Scene and Evacuation: In case of a serious accident, access to the accident site
should be blocked to avoid any further damage. The site of a serious accident needs to be
secured as quickly as possible to preserve the physical evidence for investigative purposes.
If there is a potential of the other employees being affected, an evacuation of the premises
should be carried out to prevent further injuries or fatalities. The operations of the workplace
need to be shut down in such emergencies.
Proper Reporting of the Accident: After ensuring the employees’ safety, proper paperwork and
documentation must be completed. The accident’s report should be completed to help
investigate the accident and the required documents for processing the claim from the insurance
company should be filled in.

CHAPTER 25: Protecting Health and Safety

A. Select the correct option.


1. c. Both a and b
2. a. Radiation
3. b. Identifying possible hazards before accidents occur
4. c. Both a and b
5. b. Fruits and nuts

B. Fill in the blanks.


1. Hazard
2. Unhealthy
3. Health program
4. Long-term
5. Mental
C. Answer the following questions.

1. Every workplace has its own unique environment and equipment. It is important that all
potential emergency situations, like accidents, injuries, and health issues should be
anticipated and identified so as to be prepared with a proper response plan, when and if such
incidences occur. This will result in controlling the threats to human life and damage to

© Kips Learning Pvt. Ltd 2023


property. It should not be just a one-time activity but an ongoing process. Proper planning
will result in an effective safety and health program at the workplace.
1. Three examples of workplace hazards are:

• Improperly fitted or guarded moving parts that can hit a person


• Getting hit by sharp edges, corners, or parts that are protruding out from the equipment
• Working at potentially hazardous places, like heights where there is possibility of a fall, or
narrow places where one could get trapped
2. At the workplace, emergencies may arise due to several hazards. Often, the best protection
in an emergency is to move out from where one is and shift to a safer place. When there are
emergencies, like fires, hazardous chemical spills, radiation leakages, terrorism threats, or
some health crisis, the workplace may need to be evacuated. For example, when a building
catches fire, everyone in it must leave it and move out to a pre-decided safe area.

3. Three tips for healthy living of working people are:


• Eating Healthy: It is said, ‘You are what you eat’. Having a healthy breakfast in the
morning, lunch that is nutritious and avoiding junk and fried food are some of the key
factors in maintaining one’s health.
• Having Adequate Amount of Water: While working, one tends to lose track of the amount
of water consumed. Drinking adequate amount of water is extremely essential to maintain
the body temperature and other important functions of the body.
• Limit Drinks with Caffeine: Office goers often get into the habit of having tea, coffee,
or other caffeinated beverages frequently and in large amounts.
4. The availability of healthy food at the workplace, like fresh fruits and dry fruits, healthy snacks,
juices, and healthy food in the canteen as well as during official programs and meetings can
establish a culture of eating healthy at the workplace. This would, in turn, result in employees
making healthy food choices in their personal life too.

SECTION 4: APPLICATION BASED QUESTIONS (UNSOLVED)


1. An electric safety program should be established by all organisations and followed properly.
• Electrical installations should be done and maintained by a competent person and
checked regularly.
• Extension cables, plugs, sockets, and other flexible leads and their connections that are
particularly prone to damage should be visually checked, maintained, and where
necessary, replaced before using any equipment.
• Correct cable connectors or couplers should be used to join cables together; taped
joints should not be allowed.
• Electrically powered equipment should be used.
• A fuse protects the device from over current. It is designed to ‘blow’ and cut off the
electricity when the current exceeds its rated capacity.
• It is important to ensure that the correct fuse is used for all appliances.
• Employees working in areas where there are potential electrical hazards must be
provided with appropriate, safe, and tested protective equipment.

2. Rahul should ask the mall manager to have stairways/Handrails in order to reduce the risk
of such injuries, stairwells should have handrails, be kept clear of clutter, well lit, and free
from any unsecured objects, like rugs and carpets. The first and last stair should always be

© Kips Learning Pvt. Ltd 2023


well marked.
They should also provide ladders and accessible step stools can help reduce the chances of
a fall by helping employees reach heights safely. Availability of these, reduces the chances
of employees using unstable objects or other furniture to climb.

3. Most office systems are computerised now and staring at computer screens
for hours while working causes eyestrain and damage to them in the long run. Rohit can
suggest the following points:
• Atleast an arms-length distance should be maintained from the screen. One must also
look away from the screen at regular intervals to reduce eyestrain and long-term
damage to the eyes.
• One should take short breaks every half an hour, performing desk exercises or even
having standing desks at the workplace.

4. Office desks, copy machines, computer screens, and keyboards as well as mobile screens are
some of the places that have a lot of microbes, which may cause infections. Vandana can ask
the employees to clean all the objects used at the workplace regularly, using surface
disinfectants and sanitising wipes. One must wash one’s hands regularly with soap to stay
healthy and germ-free.

5. Kalpana can educate employees with work-life balance and can also encourage physical
fitness to refresh themselves by working out and staying energised for the entire day. She
can inform employees that drinking adequate amount of water is extremely essential to
maintain the body temperature and other important functions of the body.

SECTION 5: SHORT ANSWER TYPE QUESTIONS (UNSOLVED)

1. An electric shock is a shock that occurs when a person comes in contact with a source of
electrical energy. A person experiences a shock when this electrical energy flows through the
body.
An arc fault is initiated by the passing of the current between the two conducting metals
through ionised gas or vapour, which is caused by a flashover or other conductive material.
An arc fault results in a massive electrical explosion. This results in an arc flash, which is the light
and heat from the explosion and an arc blast, which is a pressure wave that follows.
2. The first aid kit should include basic equipment for administering first aid for
injuries. In order to know what contents are actually needed inside a first aid kit,
a risk assessment of the workplace is required. The kits must be identifiable
with a white cross on a green background and made of a material that will
protect its contents from dust, moisture, and contamination.
3. The preferable scenario is, of course, to prevent accidents by providing adequate safety
equipment and putting the right procedures, including training, in place.
Some of the preventive measures, to prevent accidents, are:
• Employers must provide workers with protective equipment, such as safety goggles and
other gear they need, to avoid dangerous exposure.
• Reminding employees to be vigilant.
• Removing clutter and putting it out of the way so that people would not step on it
and fall accidently.

© Kips Learning Pvt. Ltd 2023


4. Preparing a proper emergency action plan, which should include the following:
• There should be an emergency evacuation plan ready for emergencies.
• There should be clearly marked and well lit, unobstructed evacuation routes and emergency
exits.
• Employees should be able to have an access to lists with names and telephone
numbers of emergency contacts.
• Procedures for employees to shut down critical plant operations, operate fire
extinguishers, or perform other essential services before evacuating should be clearly
communicated as a part of the emergency plan.
• Employees should be trained in first-aid procedures.
• Practice drills for emergency action plans should be regularly conducted.
• Make sure emergency/ fire alarms are recognised by all the employees.
• Employers should have a reporting system in place for all accidents and dangerous incidents.

5. Try to juggle the roles and responsibilities at work and home can lead to exhaustion and mental
stress. This may impact the quality of life and also have an adverse effect on the physical
health. One great way to beat stress is to do things one enjoys. These may include spending
time with family or friends, watching movies, listening to music, reading books, and exercising.
A healthy work-life balance can help to avoid future mental and physical health issues.

SECTION 6: LONG ANSWER TYPE QUESTIONS (UNSOLVED)


1. The first few minutes after an accident or emergency are extremely important. In a lot of
cases, the recovery of the victims and their lives depend on the first-aid provided at the scene
of the accident. In such a situation, a person who is trained in first-aid can stop the condition
of the affected person from becoming worse and even save lives. Prompt, properly
administered first aid care can mean the difference between life and death, rapid versus
prolonged recovery, and temporary versus permanent disability. It is important to have
qualified first-aiders at the workplace. There are nationally accredited training courses as well
as certain other equivalent courses available to empower people to become qualified first-
aiders. Only employees trained in first aid should assist a victim. As part of their emergency
training, employees should know how to respond during an injury or illness situation, while
not causing any further damage.
2. An electric safety program should be established by all organisations and followed properly.
• Electrical installations should be done and maintained by a competent person and checked
regularly.
• Extension cables, plugs, sockets, and other flexible leads and their connections that are
particularly prone to damage should be visually checked, maintained, and where necessary,
replaced before using any equipment.
• Correct cable connectors or couplers should be used to join cables together; taped joints
should not be allowed.
• Socket outlets should not be overloaded by the use of adaptors.
• Electrically powered equipment should be used.
• Fixed electrical equipment should have a clearly identified switch to cut off power in an
emergency.
• A fuse protects the device from over current. It is designed to ‘blow’ and cut off the
electricity when the current exceeds its rated capacity.

© Kips Learning Pvt. Ltd 2023


3. The different types of accidents that can occur at a workplace includes:
• Slips, Trips, and Falls: Slips and trips can result in falls. Slips can occur due to
slippery floor, leaks from materials or debris left in walkways, uneven floor or
working surfaces, protruding nails and boards, bunched up floor mats or
uneven carpeting, holes or depressions in working surfaces, or uneven stairs.
• Getting Caught in or Between Hazards: Sometimes minor cave-ins, such as being pulled into
or caught in machinery and equipment or being compressed or crushed between rolling,
sliding, or shifting objects also happen at the workplace.
• Struck by Moving Equipment or Objects or Walking into Objects: Collisions could occur with
heavy equipment or any moving object kept either at the same level or from an object falling
from the above. A working person can also accidentally walk into an object and get injured.
• Vehicle-Related Accidents: Accidents due to a crash or impact injuries are also quite
frequent in workplaces. These often involve cars, lorries, or even small vehicles, such as
forklift trucks, and at times result in serious injuries.
• Fire and Explosions: Accidents also happen because of fire or other explosive substances.
In such cases, problems may not only occur from direct contact with fires, but also because
of asphyxiation, which is caused due to the smoke generated from the fires.

4. Preparing a proper emergency action plan, this should include the following:
• There should be an emergency evacuation plan ready for emergencies.
• There should be clearly marked and well lit, unobstructed evacuation routes and emergency
exits.
• Employees should be able to have an access to lists with names and telephone
numbers of emergency contacts.
• Procedures for employees to shut down critical plant operations, operate fire
extinguishers, or perform other essential services before evacuating should be clearly
communicated as a part of the emergency plan.
• Employees should be trained in first-aid procedures.
• Practice drills for emergency action plans should be regularly conducted.
5. In the event of an emergency, such as a fire or chemical spill, which requires
evacuation, always consider the following points:
• The first person to notice the emergency should activate the emergency alarm or
inform a senior officer and proceed to leave the building immediately.
• On noticing a hazard, be safe and then alert the emergency control personnel of your
organisation as soon as possible. If unsafe, then, on reaching a safe location and
distance, alert the personnel and call the relevant emergency services, like the fire
department with the information about the emergency and its location. Medical
services, like hospitals and ambulance can also be called if there are any injured
people that require medical attention.
• On hearing an evacuation alarm, or on instruction of emergency control personnel, all
personnel should immediately stop all the activities and follow the evacuation
procedure. Do not attempt to collect personal items except for your wallet or purse. If
there is an emergency kit nearby, take it with you.
• Shut down any hazardous equipment or processes, if practical, without endangering
yourself or others.
• In the case of a fire, before opening a door, feel it for heat. If it is hot, do not touch or
open it. Stay low if there is smoke in the room or passageway. Do not break windows
unless absolutely necessary for ventilation and escape.
• If it is safe to leave, close doors, but do not lock them.

© Kips Learning Pvt. Ltd 2023


• Use a fire extinguisher only if it is safe to do so and you know how to use it.
• In case of a fire, do not use a lift to evacuate a building.
• Follow the directions given by the emergency control personnel and assist with the
general evacuation, if directed to do so by them.
• Help with the evacuation of the disabled personnel.
• All the people in the building should walk quickly to the nearest exit and ask the others
to do the same.
• In case there is a designated evacuation area, move calmly towards it and do not
leave the evacuation assembly area until the ‘All Clear’ has been given.
• Do not return to the building until it has been declared safe.
• Remain calm, do not panic, and proceed calmly and without pushing others towards
the exit. If the exit is blocked or crowded, use a secondary exit.
• Alert others to the nature and location of emergency on your way out.
• Assist any person in immediate danger, but only if you are safe to do so.

© Kips Learning Pvt. Ltd 2023

You might also like