IT OpenOffice 402-Part B
IT OpenOffice 402-Part B
IT OpenOffice 402-Part B
p
Part B
Unit – I
Assessment Time
Assessment Time
Assessment Time
Assessment Time
Assessment Time
Brain Developer
1. To build a custom style in Writer using drag and drop, follow these steps:
Open the document and format the text (such as a paragraph or title) as per your
requirement.
Open the Styles and Formatting pane and select a style category under which you
want to create a style.
For example, select Paragraph Styles category.
Now, select the formatted text (on which you want to base the style) and drag
and drop the selection into the Styles and Formatting pane.
The Create Style dialog box opens. Type a name for the new style and click on OK.
A
new style will be added in the Styles and Formatting pane under the selected
category.
1. Styles help maintain uniformity in a document. They also make it easy to apply the
main formatting changes. For example, if in a lengthy document, you want to change
the font of all paragraphs or the indentation of all titles, this basic operation can take
a long time. It can be simplified by applying styles.
2. The Fill Format Mode allows you to apply a style to many different areas quickly,
such as you can format many scattered paragraphs, words, or other items with the
same style. In other words, the Fill Format Mode copies a style and applies the same
to the other items.
3. You can press the F11 key to open the Styles and Formatting window.
4. To open the Picture dialog box in Writer, you can right-click on the image and select
the Picture option from the context menu.
5. To maintain the height and width ratio of a shape while drawing it, press the shift
key and then drag the mouse.
6. To resize an image:
Click the image that you want to resize. The green resizing handles appear as
soon as you click on the image.
Take the pointer to any of the handles. You can observe the shape of the pointer
changes to a double headed arrow.
Drag the arrow to increase or decrease the size of the image.
7. Steps to perform Mail Merge in Writer:
Create a mail merge document.
Create a data source.
Merge the data source with the main document.
Unit – II
Assessment Time
Assessment Time
Assessment Time
On the other hand, the Compare Document feature is used to compare the
worksheets. Suppose, you have sent a spreadsheet to a reviewer and asked him/her
to edit it. He/She has made the changes in the spreadsheet without turning on the
Record feature and sent the spreadsheet back. You will not be able to identify the
changes done by him/her. In such a case, Calc provides the 'Compare Document'
feature using which you can compare the spreadsheets.
Chapter 9 – Using Macros in a Spreadsheet
Assessment Time
Brain Developer
1. Ravi can use the Goal Seek feature to calculate how many more votes he has to
secure to win the elections.
2. To open a shared file, follow the given steps:
Locate the file in the network location and double-click it to open it.
When you open a shared spreadsheet, a message appears stating that the
spreadsheet is in the shared mode and some features are not available in this
mode. Click on OK. The spreadsheet will open in the shared mode.
3. Follow the given steps to accept or reject the changes done in a worksheet:
Open the edited spreadsheet on your computer.
Click on the Edit menu and choose Changes > Accept or Reject.
The Accept or Reject Changes dialog box opens containing the list of changes.
Click on the Accept or Reject button to accept or reject a change. Or
Click on the Accept All or Reject All button to accept or reject all the changes at
once.
4. In such a case, Calc provides the 'Compare Document' feature using which you can
compare the spreadsheets. In order to compare the spreadsheets, you must have
the original spreadsheet and the one that is edited.
5. To run an existing macro, follow these steps:
Select the Tools menu on the menu bar and choose Macros > Run Macro.
Kip
The Macro Selector dialog box opens. Locate your macro in the Library box and
select it.
Click on Run.
6. Raj should use the Changes feature of Calc that enables him to keep track of the
changes made by the other users in a spreadsheet.
1. In case some other user has opened and edited the spreadsheet since you first
opened it, one of the following events will occur:
The spreadsheet will be saved, if the changes do not conflict.
If the changes conflict, the Resolve Conflicts dialog box opens and you must
decide which version of the conflicts to keep, by clicking on Keep Mine or Keep
s
Other. The document is saved after all of the conflicts have been resolved.
Notice that while you are resolving the conflicts, no other user can save the
shared worksheet.
2. The two most important what if analysis tools are: Goal Seek and Solver.
Goal Seek: Goal Seek is a useful tool of Calc that is used to set a goal to find the
optimum value for one or more target variables, given certain conditions. It allows
you to try different values in the formula to arrive at a solution for the input value.
Solver: Solver follows the Goal Seek method to solve equations. It is an elaborated
form of Goal Seek. The only difference between Goal Seek and Solver is that Solver
deals with equations that have multiple unknown variables.
3. To add a comment in a worksheet, follow the given steps:
Open the spreadsheet and make the required changes.
Select the cell where you have made the changes.
Choose Edit > Changes > Comments from the menu bar. A dialog box will open.
Here, in the Text textbox, the author or the reviewer can add his/her own
comments to show why the changes have been done.
After typing the comment, click on OK.
4. Macros are small programs that record your actions as you perform a task in Calc.
When you run the macro later, it repeats your keystrokes and thus actions. The
Macros feature of Calc allows you to record a set of actions that you perform
repeatedly in a spreadsheet.
Let us consider an example, where a bookseller Rajneesh creates a report every
month to view the sales and calculate the profit. He colours the names of the
customers with overdue accounts in red and applies bold formatting to them while
creating the report. It means every time, he performs the repetitive task to format
the report, which takes a lot of his time and effort. To speed up this work, he can
create and run a macro to apply these formatting effects quickly to the cells,
whenever required.
5. Calc offers a sharing feature using which you can give access to the other users to
work on the same spreadsheet at the same time. It saves the trouble of keeping
track of multiple versions of the spreadsheet.
To share a spreadsheet, follow the given steps:
Create a spreadsheet and save it in a network location so that the other users
can access it easily.
With the spreadsheet document open, click on the Tools menu. Choose Share
Document to activate the collaboration features for this file.
The Share Document dialog box opens. Select the Share this spreadsheet with
other users checkbox to enable sharing.
Click on OK. If you have already saved the spreadsheet, a message appears
stating that you must save it in the activated shared mode. Click on Yes to
continue.
Now, all the users can work together on the same spreadsheet.
1. The Subtotals feature of Calc is used for generating subtotals from the subgroups of
data. It helps you to manage, analyse, and extract specific information from rows of
related data. Let us consider an example where a Senior Sales Manager of a
renowned publication wants to calculate the subtotals of sales of each employee as
well as the total sales.
To obtain the subtotal of sales, follow these steps:
Open the worksheet containing sales data.
Select the desired range of cells that you want to use to calculate the subtotals.
Choose the Data menu and then the Subtotals option. The Subtotals dialog box
appears.
In the Group by list box, select the column by which you want to group the
subtotals. A subtotal will be calculated for each value in this column.
In the Calculate subtotals for list box, select the columns containing the values
that you want to use to create the subtotals.
In the Use function list box, select the function that you want use to calculate
the subtotals.
Click on OK. The subtotals and grand total of sales will appear in the worksheet.
2. Solver follows the Goal Seek method to solve equations. It is an elaborated form of
Goal Seek. The only difference between Goal Seek and Solver is that Solver deals
with equations that have multiple unknown variables.
3. To create a named range in Calc, follow these steps:
Open a spreadsheet (source sheet) from which data is to be retrieved via a link.
Select the range of cells that contain the data that you want to link to.
Click on the Data menu and then Define Range option.
The Define Database Range dialog box opens. Specify a name for the range in
the Name field and then click on OK.
4. Sometimes, there are multiple edited versions of a sheet that reviewers return at the
same time. In such a situation, the different versions of the file have to be reviewed
one by one, which becomes a difficult task. To overcome this problem, Calc provides
the Merge Document feature that enables you to merge the multiple files so that the
user can review all these changes at once, rather than reviewing one at a time. While
merging sheets, all of the edited documents need to have recorded changes in them.
To merge documents, follow these steps:
Open the original document.
Click on the Edit menu and choose Changes > Merge Document.
The Insert (File Browser) dialog box opens. Select a file that you want to merge
and click on OK.
The Accept or Reject Changes dialog box opens, showing the changes done by
more than one reviewer.
If you want to merge more documents, close the Accept or Reject Changes
dialog box and then open other spreadsheets for merging, by repeating the
previous steps.
Now, all of the changes are combined into one document, and you can accept or
reject the changes. Note that the changes from the different authors appear in
the cells outlined in the different colours.
5. A macro acts as a function. You can pass arguments (values/parameters) to a macro
when you call it. To allow a macro to accept a value, simply type a name for that
value between the parentheses at the beginning of the macro.
Syntax to define a macro with parameters:
Function Function_Name(Optional Parameter1, Optional Parameter2,...)
Program code
FunctionName = Result
End Function
Syntax to pass parameters to a macro while calling it:
=Function_Name(Parameter1, Parameter2,...)
Unit – III
Assessment Time
Assessment Time
Assessment Time
Assessment Time
Assessment Time
Brain Developer
1. Launch OpenOffice Base on your computer, the Database Wizard opens. Choose the
Create a new database option and click on Next. Stay with the default settings and
click on Finish. The Save As dialog box opens. Enter a new for the database and click
on OK.
2. To switch to the Table Design View, click on the Create Table in Design View option
in the Tasks Pane. Specify the following field types for the fields:
EMP_ID: Interger[INTEGER];
Name: Text[VARCHAR];
Address: Text[VARCHAR];
City: Text[VARCHAR];
Contact: Interger[INTEGER];
Aadhaar _Number: Interger[INTEGER];
Department: Text[VARCHAR]
3. Query to get the records in descending order, group by city:
SELECT * FROM SALES
Group By City
ORDER BY S_ID
DESC;
4. To display the students with grade 'A' or 'E' apply the following criteria:
5. He can use the Reports option in the Database Objects Pane. A report is an effective
way to organise and summarise the data for viewing and printing.
1. Tuples: All the rows (consists of a set of related information that belongs to a
particular object) in a table/database are called tuples or records.
Attributes: An attribute is a piece of information about an object. All the columns in
a table/database are called attributes.
2. A composite primary key refers to a combination of two or more attributes (fields)
that uniquely identify the records in a table.
3. A relational model enables the users to store data in several tables, and whenever
the data is need, it can be retrieved easily by establishing a relationship among
them.
4. A field type determines what type of data you can enter into a field.
5. Data/ Time data type is used to store date and time information in form of
MM/DD/YY HH:MM:SS AM/PM.
6. The Yes/No [BOOLEAN] field type stores value in the form of Yes or No. Since,
Boolean interpretation of Yes and No is 1 and 0, respectively. The field length of this
data type is 1, i.e., it can store either 1 or 0.
7. Using the Table Wizard, one can start with the basic structure of a table.
8. In UIDAI database, each person has only one Aadhaar number, and each Aadhaar
number is assigned to only one person.
9. AutoValue: If set to Yes, the values for this data field is generated by the database
engine.
10. SELECT and INSERT
Section 6: Long Answer Type Questions (Unsolved)
1. c. Hearing
2. c. Vision
3. c. Toggle
4. a. Filter
5. b. Eye strain
HEARING IMPAIRMENT: This refers to the inability to hear beeps or other warning sounds or
even the audio portion of the video on the computer.
PHYSICAL/MOTOR IMPAIRMENT: This impairment refers to the inability to control the mouse or
keyboard due to injuries or loss of hands or fingers, stiffness in the finger joints, or tremors in hands
due to some diseases.
LEARNING DISABILITIES
The inability to read and comprehend or difficulty in learning and understanding, the written
test is referred to as learning disability.
2. A Magnifier tool is helpful for the people with impaired vision as it enlarges the different parts
of the screen in such a way, that people with visual impairment can easily see the objects on the
screen. To turn on the Magnifier, simply click on the Start Magnifier option.
3.
Toggle Key Sticky Key
Caps Lock, Num Lock, and Scroll Lock keys Sticky Keys can also be turned on or off from
are the Toggle Keys. the keyboard settings.
If you press Caps Lock to obtain all capital This feature is useful for those who face
letters then pressing the Caps Lock again will difficulty in pressing more than one key at a
turn it off and now all the lowercase letters time (like Ctrl
will be typed. Click on the check box to turn +Alt+ Del). Turn on Sticky Keys will allow the
the Toggle Keys user to press one key at a time instead of
ON or OFF. pressing all
the keys together.
4.Screen Narrator tool helps in reading the text on the screen aloud. It also describes some
system events, such as error messages, notifications etc., while using the computer. You can
activate the narrator by clicking on the Start Narrator option from the Ease of Access Center
window.
5.
a. Filter keys: Turning on Filter Keys will make the computer recognise multiple key presses as a
single key press. Due to trembling of the hands or stiffness of the finger joints, some people face
difficulty in pressing a key on the keyboard. Instead of a single press of the key, they may press it
more than once. For those people, Filter keys may be used.
b. Setting up high contrast: High contrast amplifies the colour contrast of some text and
images on the computer screen to reduce eye strain and makes the items more distinct and
easier to identify. People with poor vision can see in a much better way if the display is set to
high contrast.
2.
Repeater Router
A repeater simply copies the information A router is a networking device, which
arriving at its input and retransmits it from routes the information around the
the output. network.
This is required at times when the network It is also used to connect one network with
signal is weakened or distorted over a long the networks.
distance.
This happens if the network passes through an The header of every packet of the
area having strong electromagnetic fields. The information arriving at a router is checked
weakened or distorted signals are for the destination and using the best
regenerated and route, the
then retransmitted by the repeater. message is forwarded to the next device.
3. Data in the internet refers to all the files, e-mails, web pages, etc. that you can see across the
internet. Data travels across the internet in packets. The information in the packet enables a
computer to understand how it assimilates with any other data, the origin or source of the data,
and the data's final destination. This technique is called packet switching and widely used for
optimising data transfer over a computer network.
Let us understand this technique of data transmission.
When you send a message or an e-mail to another computer connected on the internet,
the data in the message or e-mail is first broken down into small data packets. Once the
packets are ready, the address of the sending and receiving computer is enclosed with the
data packets.
When the data packets are received by a computer the data packets are again
reassembled in a way that they take the form of the original message. The data packets
reach their destination using different routes. The process is somewhat similar to sending
parcel to your friend using a courier service.
4.The different types of connections for connecting to the internet are discussed as follows:
Dial up connection, Digital Subscriber Line, Cable Internet, Satellite Connection, 3G, 4G, or
5G Systems, Wireless Fidelity (Wi-Fi), WiMAX, Wi-Fi Hotspot
Dial up Connection: This type of connection utilises the telephone lines but is not
preferred these days as it is very slow. It allows the user to do one work at a time. One
can either use the phone to call or connect to the internet.
Digital Subscriber Line (DSL): It is also a type of connection that uses the telephone
lines, but is capable of transferring data at a much higher speed. A DSL filter removes
the high-frequency interference, thus enabling simultaneous use of the telephone and
data transmission.
Ch-17: Introduction to Instant Messaging
3.Google Hangouts application is available for installation on both Android and iOS platforms.
You can also use Google Hangouts on your computer or laptop by using a browser, such as
Google Chrome.
Hangouts
Skype
WhatsApp
Hangout
Ch-18: Chatting Using Google Hangouts
2. To chat with a contact in the Google Hangouts application, follow these steps:
3. Following are the basic etiquette that should be followed while chatting with the others:
Always introduce yourself by name, if your screen name does not reflect it.
Always ask if the other person has time to chat first - regardless of how important
you think what you have to say is. Your message is not going to be well received, if
the recipient is busy.
Always start your message with a short greeting.
Ensure that your message is short, precise and to the point.
If you are chatting with a person and he/she is waiting for your response, then do not
keep him/her waiting for a long time.
4. WhatsApp is the most popular instant messenger, nowadays. It is widely used for sending
text and voice messages, and making audio and video calls. It is a free application that can be
easily installed on the mobile phones. You can also use it on your computer by launching
WhatsApp Web.
‘BRAIN DEVELOPER
2. The commonly used protocols for data transfer over the internet are
(Transmission Control Protocol/Internet Protocol (TCP/IP) and File Transfer Protocol
(FTP).
3. LAN
4. Google Hangouts
5. Yes
Toggle Keys
Caps Lock, Num Lock, and Scroll Lock keys are the Toggle Keys. If you press Caps Lock to
obtain all capital letters then pressing the Caps Lock again will turn it off and now all the
lowercase letters will be typed. Click on the check box to turn the Toggle Keys ON or OFF.
2. Narrator option is used to activate the narrator by clicking on the Start Narrator option
from the Ease of Access Center window.
3.
Internet WWW
A global interconnection of computer The World Wide Web (WWW) commonly
networks around the world is known as known as the Web, is a way of accessing
the internet. In other words, the internet information over the internet. It contains
is a network of networks. Communication millions of documents called Web Pages.
over the internet is governed by a set of Sir Tim Berners Lee, along with Robert
rules known as protocols. The commonly Cailliau, invented the world wide web
used protocols for data transfer over the while working at CERN (European Council
internet are (Transmission Control for Nuclear Research) in 1990.
Protocol/Internet Protocol (TCP/IP) and
File Transfer Protocol (FTP).
4. A computer network may be defined as a group of two or more computer systems or
peripheral devices that are connected together to exchange information and share
resources with each other. TYPES OF NETWORKS
Depending on their size, capabilities, and the geographical distance, computer networks can
be classified as follows:
Personal Area Network (PAN)
This type of network connection covers a very small area, such as a home or an office
cabin. Desktop computers, laptops, tablets, smartphones, printers, or wireless
headphones make up the nodes of this type of network. It uses Bluetooth, USB
connections, or the increasingly popular Wi-Fi technology for communication. It generally
covers the range of less than 10 metres.
5. Data in the internet refers to all the files, e-mails, web pages, etc. that you can see across the
internet. Data travels across the internet in packets. The information in the packet enables a
computer to understand how it assimilates with any other data, the origin or source of the
data, and the data's final destination. This technique is called packet switching and widely
used for optimising data transfer over a computer network.
6. Instant Messaging (often called IM) refers to real-time communication with the user at the
other end through an application called Instant Messenger. There are two types of Instant
Messaging software — application-based and web-based.
APPLICATION BASED
These are application programs that can be easily downloaded and installed on the user's
devices. Some popular application-based instant messengers are as follows:
Hangouts
Skype
Rediff Bol
WhatsApp
Facebook Messenger
WEB BASED
These can be accessed by using a browser application, such as Google Chrome, Internet
Explorer, and so on. Some popular web-based instant messengers are as follows:
Hangouts
Skype Online
eBuddy
MSN Web Messenger
WhatsApp Web
7. Google Hangouts application is available for installation on both Android and iOS platforms.
You can also use Google Hangouts on your computer or laptop by using a browser, such as
Google Chrome or on mobile phone.
To use Google Hangouts on your computer, follow these steps:
Open a browser window, such as Google Chrome.
Type hangouts.google.com in the Address bar and press the Enter key.
The Home Page of Google Hangouts appears. Click on the Sign in button.
The Google Sign in page appears. Enter an Email Id of Gmail.
If your email Id is valid, Google will ask you to type the password. Enter the password
and click on Next.
If the email id and password matches, then you will login to Google Hangouts.
The main window of Google Hangouts contains the list of your Gmail contacts,
by default. The contacts that are online at present will be indicated by a green
dot.
You can easily chat through Google Hangouts by clicking on the contact whose green
dot is visible or use other services, such as audio call or video call.
9. To chat with a contact in the Google Hangouts application, follow these steps:
Open Google Chrome web browser on your computer.
Type the URL hangouts.google.com in the Address bar and press the Enter key.
Sign in to Google Hangouts by entering valid Email id and Password of Gmail.
The interface of the Google Hangouts appears. By default, it contains a list of
contacts that you have added in your Gmail.
You will notice a green dot next to the contacts. The green dot indicates that
the contacts are online.
To start chatting, click on the contact (visible along with the green dot) you wish to chat with.
The chat window pops up. It shows all the past conversations with the contact. At
the bottom of the chat window, type a message that you want to send.
Press the Enter key to send the message. Your message will be delivered instantly.
If the other person also replies on the same time, then you will get his/her message
immediately.
Sharing Files: By using a network, the users can easily share documents with
each other. This feature promotes teamwork and increases productivity.
Cost Effective: Since hardware, software, and storage systems can be shared;
this results in cost saving.
Initial Costs: Although the running cost of a network is lower than that of the
individual computers, but the initial cost of setting up a network is higher.
Expensive devices, such as routers, switches, hubs, network interface cards, and
server can add up to the cost.
Maintenance and Administration: If the network grows too large, various issues
may crop up in the day-to-day operation of the computer network. To work
efficiently and optimally, it requires high technical skills and know-how of its
operations and administration.
Major Effect of Breakdowns: If a computer network's main server breaks down,
the entire system would become useless. Likewise, in case of problems with the
shared resources, like hardware, software, or storage systems, all the computers
on the network would also come to a standstill.
3. A specific computer, more powerful than the others, acts as the server and provides resources
to the other computers on the network. Client-Server networks are usually more expensive
and not so easy to implement. It is easy to take measures to secure the system in a Client-
Server network. Specific computers can be allowed access to specific areas of the server.
3. Qumana is one of the best desktop-based blog editors. It can be downloaded for free on your
Windows, Linux, or Mac-based computer. It has the ability to work with most common blogging
applications, like WordPress, Blogger, LiveJournal, Typepad, and many more. It gives an offline
access to blog posts without any browser. In your default blog editor, it becomes quite difficult to
edit and insert various types of media, whereas, this can be done easily in Qumana, and also for
more than one blog at the same time. There are a number of fee-based blog editors that offer the
same or even less functions than Qumana.
4.Qumana displays all the existing posts available in your blog. To create a
new post, do the following in your blog editing window:
Click on the New Post button .
Enter the title of the post in the Title field.
Enter the content of the post in the Content Area.
Click on the Publish Post button. The post will get automatically updated on your
WordPress blog.
To view your published post, open your WordPress blog on the web browser and
type the URL of your blog.
Chapter 21: Online Transactions
2. E-reservation means making a reservation or appointment for a service via the internet. Using
e- reservation, you can check the availability of seats in bus, train, or aircraft anytime, and also
reserve rooms, meeting halls, or tables in restaurants. By making online payment through credit
or debit cards and net banking, you can confirm your reservations also.
3. BENEFITS OF E-RESERVATION
Accessible Anywhere: Buying an e-ticket or making an online booking is the most
convenient method for booking a hotel, flight or car-on-rent. One can buy an e-
ticket anywhere in the world where an internet connection is available.
Discounts and Offers: You can check multiple websites to select the best price while
making an online reservation. Many hotel and airline websites provide lucrative offers
to their online customers by offering discounts and attractive schemes to attract more
clients.
Commission Free: Booking online saves hidden commission fees as there is no third-
party involved.
Quick System: Booking through e-reservation system is very fast. The users can simply
search, select, and book the tickets either by paying through credit cards or net
banking and get an instant confirmation for services.
Changes and Cancellations: Changes and cancellations of e-tickets can be done
immediately and the money is refunded almost instantly by just logging onto the
internet.
Customer Reviews: Customer reviews during e-reservations help in deciding the type of
service that will be provided by the service provider. They help the user in making
decisions and availing the best services.
Safe and Reliable: E-reservation software provides a secure onIine transaction
system by taking security measures to protect your confidential credit and debit card
information.
APPLICATION AREA
E-reservation has changed the reservation process completely in the last few years. More and
more users are now using online reservation facility because of its ease of use and instant
confirmation. It saves both time and money and ensures a stress-free service. It is being used in
areas such as:
Hotel reservation
Travel ticket reservation
Movie ticket reservation
Event reservation
4. You register at various sites for online transactions during which you have to enter a username
and password. If you lose the password to your e-mail, bank, or credit card accounts, you could
be facing severe monetary losses. You should therefore, take special care to protect your
passwords. The following points list some of the measures that you can take to protect your
password:
Use strong passwords that have a combination of lower and upper case letters,
numbers, and also special characters. Keep the length of the password to at least 12-14
characters.
Do not use easy-to-guess passwords. Avoid using passwords, such as your name or
surname, username, names of your family members like mother, father, children,
pets or even friends, birthdates, dictionary words, or part of your address.
If you decide to use a simple password, add a number or special character to the password
either at the beginning or at the end or even in both the places!
Never write your password anywhere so that nobody can misuse it.
2. Phishing is an act of sending an e-mail to a user; misleading him to believe that it is from a
trusted person or organisation. The user is asked to visit a website in which he is supposed to
update or validate his personal details, such as user name, password, credit card details, etc.
In this way the operators of the fake website steal the person's identity and commit crimes in
his name. This could damage the person's reputation and cause him heavy financial losses.
3.
Email Spoofing Chat Spoofing
Email spoofing is one of the most common Chat spoofing is quite similar to email
security threats these days. This process spoofing. The only difference between the
involves sending emails to the two is that in chat spoofing, the
targeted recipients to make them believe spoofing happens when the target is
that these emails originate from trusted engaged in a chat process. The target
resources. perceives that he or she is chatting with
someone known, but in fact, it is a cyber
attack.
4.
Use a Firewall: Some programs might try to access your computer remotely without your
permission. To prevent such a situation, you should install a firewall on your computer. A
firewall is a software that can help in preventing unauthorised access to your computer by
blocking unsolicited communications.
Do not Open Attachments from Unknown Sources: One of the most common ways
through which viruses spread is email. So, always ignore unsolicited e-mails. Avoid
opening attachments, links, and forms in e-mails that come from people you do not know,
or which seem "phishy". Also, avoid untrustworthy downloads.
Scan all Portable Storage Devices before Use: Pen drives are one of the most popular
storage devices in use today due to their convenience and portability. It has been found
that they are also the most common sources of infection in computers. Set up your
antivirus software to automatically scan every portable device plugged into the computer
to ensure that your system remains safe.
Restrict the Number of users on the Computer: Although this may not be possible in
places where computers are shared, but having some control over the usage will greatly
reduce the risk of infection. So, the number of users should be restricted especially when
the users are allowed to bring and use their own portable storage devices.
Update all Software Regularly: Very often software companies discover that there are
certain vulnerable areas in the software they have designed. They will try to develop a
patch for this problem and release it to all the registered users by an update. If your
software is not updated, then this will leave your computer open to a security threat.
To avoid this, try to set all software to update automatically on a regular basis.
Do not use Pirated Software: Though using a pirated and unlicenced software may seem
financially attractive, yet the possibility of picking up a virus infection from such sources is
very high. Always use software from well-known companies that can be downloaded from
their official site.
BRAIN DEVELOPER
1. After creating a blog, you need to create a post. To create your first blog post, do the following:
On your Homepage, click on the Write button to start making your first blog post.
Give a Title to your blog, and start writing the content. The text formatting tools appear
as you type the text. You can choose them to format your text as you do while working
on any word processor.
You can also add images to your blog. Copy an image and paste it on your blog page .
Using the free plan from WordPress, you can store up to 3 GB of media in your
gallery. To upload media, click on the Add button, a drop-down list appears.
You can add audio, video, image, and many other types of files to your blog.
PUBLISHING A BLOG
After finishing up with the content, publish your blog to make it live.
Click on Publish from the top-right corner of the window.
Check the visibility of your blog. You can choose to make it Public, Private, or
Password Protected.
Click on Publish button, and your blog goes live. You can view your blog online and/or
copy the blog link.
2. Rajan has to follow the given steps to insert image in his blog:
Click on the image button on the toolbar.
The Insert Image dialog box opens.
Click on the Browse button and locate the image that is to be added.
Now, choose a wrapping style for the image in the Wrapping Style section.
Click on the Upload & Insert button to insert the selected image in your blog.
Click on the Publish Post button.
Open your WordPress blog in the web browser to view the published blog.
3. Anita can easily book her own train ticket for travelling from some of the popular websites
that provide the reservation facility are:
www.irctc.co.in, www.makemytrip.com, www.bookmyshow.com, www.yatra.com, etc.
4. Rohan should always use a strong password in order to avoid facing severe monetary losses.
Use strong passwords that have a combination of lower and upper case letters, numbers, and also
special characters. Keep the length of the password to at least 12-14 characters. If you decide to
use a simple password, add a number or special character to the password either at the beginning
or at the end or even in both the places.
5. Chat spoofing is quite similar to email spoofing. The only difference between the two is that
in chat spoofing, the spoofing happens when the target is engaged in a chat process. The
target perceives that he or she is chatting with someone known, but in fact, it is a cyber-
attack. The purpose of chat spoofing, also, is to gain access to some important personal
information.
SECTION 5: SHORT ANSWER TYPE QUESTIONS (UNSOLVED)
1. A blog is a combination of the words web and log. It is a frequently updated, online,
personal journal or diary where a person can log (write or post) information related to his
interests or activities, express his ideas or opinions or share his knowledge through writing.
Discounts and Offers: You can check multiple websites to select the best price while
making an online reservation. Many hotel and airline websites provide lucrative offers
to their online customers by offering discounts and attractive schemes to attract more
clients.
Quick System: Booking through e-reservation system is very fast. The users can simply
search, select, and book the tickets either by paying through credit cards or net
banking and get an instant confirmation for services.
Customer Reviews: Customer reviews during e-reservations help in deciding the type
of service that will be provided by the service provider. They help the user in making
decisions and availing the best services.
5. When the shipping cost does not gets added to the cost of the product, then it
is known as free shipping.
10. A padlock sign or https: instead of http: in your browser address bar as this
indicates a secure connection.
3. E-reservation means making a reservation or appointment for a service via the internet.
Using e- reservation, you can check the availability of seats in bus, train, or aircraft
anytime, and also reserve rooms, meeting halls, or tables in restaurants. By making online
payment through credit or debit cards and net banking, you can confirm your
reservations also.
BENEFITS OF E-RESERVATION
Accessible Anywhere: Buying an e-ticket or making an online booking is the most
convenient method for booking a hotel, flight or car-on-rent. One can buy an e-
ticket anywhere in the world where an internet connection is available.
Discounts and Offers: You can check multiple websites to select the best price while
making an online reservation. Many hotel and airline websites provide lucrative offers
to their online customers by offering discounts and attractive schemes to attract more
clients.
Commission Free: Booking online saves hidden commission fees as there is no third-
party involved.
Quick System: Booking through e-reservation system is very fast. The users can simply
search, select, and book the tickets either by paying through credit cards or net
banking and get an instant confirmation for services.
Changes and Cancellations: Changes and cancellations of e-tickets can be done
immediately and the money is refunded almost instantly by just logging onto the
internet.
Customer Reviews: Customer reviews during e-reservations help in deciding the type of
service that will be provided by the service provider. They help the user in making
decisions and availing the best services.
Safe and Reliable: E-reservation software provides a secure onIine transaction
system by taking security measures to protect your confidential credit and debit card
information.
4. The internet has given several advantages to each individual and is extremely
popular in this modern age. However, it is a tool that must be handled with
caution as its misuse can be hazardous. Some of the threats posed by the internet
are as follows:
PHISHING
It is an act of sending an e-mail to a user; misleading him to believe that it is from a trusted
person or organisation. The user is asked to visit a website in which he is supposed to
update or validate his personal details, such as user name, password, credit card details,
etc. In this way the operators of the fake website steal the person's identity and commit
crimes in his name. This could damage the person's reputation and cause him heavy
financial losses.
EMAIL SPOOFING
Email spoofing is one of the most common security threats these days. This process
involves sending emails to the targeted recipients to make them believe that these emails
originate from trusted resources. The purpose of spoofing is to gain access to the
recipient’s personal information. It can be usernames, passwords, banking details, etc.
Nowadays, most email servers provide security features to prevent this type of activity.
Install Antivirus Software: Viruses threaten your computer security, especially when on
the internet. Daily, unscrupulous elements create new viruses and until these threats are
detected and countered by the antivirus software manufacturers, you are always at risk
from these viruses.
Use a Firewall: Some programs might try to access your computer remotely without your
permission. To prevent such a situation, you should install a firewall on your computer. A
firewall is a software that can help in preventing unauthorised access to your computer
by blocking unsolicited communications.
Do not Open Attachments from Unknown Sources: One of the most common ways
through which viruses spread is email. So, always ignore unsolicited e-mails. Avoid
opening attachments, links, and forms in e-mails that come from people you do not know,
or which seem "phishy". Also, avoid untrustworthy downloads.
Keep the Workplace Clean: A clean and tidy workplace helps prevent fire threats,
especially, if it handles a lot of flammable material. Such material should be stored in a
safe environment; away from flames. An untidy workplace results in clutter, which
acts like fuel for the fire to spread and also prevents access to exits and emergency
equipment like fire extinguishers and sprinkler systems. Also, smoking should not be
allowed at the workplace.
Maintain Electrical Safety: A faulty wiring and malfunctioning of electrical equipment can
lead to voltage fluctuations or short circuit that can further be a reason or cause of fire at
workplace. Even defective wiring, overloaded sockets or plugs, and equipment that are old
and faulty may lead to heating of cables and equipment, which in turn can lead to fire.
Regular inspection and maintenance of electrical equipment should become a compulsory
and regular practice to prevent overheating or sparking of cables or equipment.
3. Following are some of the ways by which one can prevent slips, trips, and falls around
the workplace:
Keep Walking Surfaces Clean and Free of Clutter: Keeping walking surfaces clear, can
help reduce the potential for injury. An unobstructed path minimises the risk for an
employee to trip over an object and it also reduces the chances of a spill that could lead
to a slip.
Lighting: Proper lighting inside and outside of the workplace can help illuminate areas,
like steps or other hazards that can cause trips if they are hidden by darkness or shadows.
By installing proper lighting, one can reduce the chances of people slipping or falling.
Signage: Using clear and well-placed signage can help call attention to potential problem
areas. A sign indicating a step, gap, uneven ground, or loose rocks will bring the
employees’ attention to the hazard and increase awareness and attentiveness. Reflective
tape can also be used to highlight such problem areas.
Stairways/Handrails: Stairs are most popular place for falls at the workplace. To reduce
the risk of such injuries, stairwells should have handrails, be kept clear of clutter, well lit,
and free from any unsecured objects, like rugs and carpets. The first and last stair should
always be well marked.
5. First aid is the emergency care given immediately to an injured person. It is given to
minimise injury and future disability. In serious cases, first aid may be necessary to keep the
affected person alive.
2. Slips, Trips, and Falls: Slips and trips can result in falls. Slips can occur due to
slippery floor, leaks from materials or debris left in walkways, uneven floor
or working surfaces, protruding nails and boards, bunched up floor mats or
uneven carpeting, holes or depressions in working surfaces, or uneven stairs.
Getting Caught in or Between Hazards: Sometimes minor cave-ins, such as being pulled into or
caught in machinery and equipment or being compressed or crushed between rolling, sliding,
or shifting objects also happen at the workplace.
Struck by Moving Equipment or Objects or Walking into Objects: Collisions could occur with
heavy equipment or any moving object kept either at the same level or from an object falling
from the above. A working person can also accidentally walk into an object and get injured.
Vehicle-Related Accidents: Accidents due to a crash or impact injuries are also quite frequent in
workplaces. These often involve cars, lorries, or even small vehicles, such as forklift trucks, and at
times result in serious injuries.
3. Slips, Trips, and Falls: Slips and trips can result in falls. Slips can occur due to slippery
floor, leaks from materials or debris left in walkways, uneven floor or working surfaces.
Getting Caught in or Between Hazards: Sometimes minor cave-ins, such as being pulled into or
caught in machinery and equipment or being compressed or crushed between rolling, sliding, or
shifting objects also happen at the workplace.
Struck by Moving Equipment or Objects or Walking into Objects: Collisions could occur with
heavy equipment or any moving object kept either at the same level or from an object falling
from the above. A working person can also accidentally walk into an object and get injured.
Vehicle-Related Accidents: Accidents due to a crash or impact injuries are also quite frequent
in workplaces. These often involve cars, lorries, or even small vehicles, such as forklift trucks,
and at times result in serious injuries.
Fire and Explosions: Accidents also happen because of fire or other explosive substances. In such
cases, problems may not only occur from direct contact with fires, but also because of
asphyxiation, which is caused due to the smoke generated from the fires.
4. Mention some preventive measures that can be taken to prevent accidents at the
workplace. Some of the preventive measures, to prevent accidents, are:
Employers must provide workers with protective equipment, such as safety goggles
and other gear they need, to avoid dangerous exposure.
Reminding employees to be vigilant.
Removing clutter and putting it out of the way so that people would not step on
it and fall accidently.
Effective procedures for dealing with employee grievances can help reduce the risk
of fights in the workplace; which could otherwise, result in nasty injuries.
Good training, clear signage, and access to the necessary safety equipment can all be a
big help.
egular risk assessments are also important.
5. Even when organisations take appropriate workplace safety precautions and measures to
avoid injuries, accidents can happen. In such cases, how employers respond to these accidents
can make all the difference. When an injury occurs, the person in charge should follow proper
protocols to handle a work-related injury or illness. Some such protocols are as follows:
Care for the Affected Employee: The employees’ safety comes first and getting an injured
employee preliminary treatment quickly is crucial.
A proper evaluation of the situation should be done.
An employee, who is trained in first-aid, should attend to the injured person right away.
In an emergency situation, an ambulance should be called. In non-emergency
situations, the injured employee should be taken to a medical care facility at the
earliest.
The family of the employee should be notified immediately about the situation.
Secure the Scene and Evacuation: In case of a serious accident, access to the accident site
should be blocked to avoid any further damage. The site of a serious accident needs to be
secured as quickly as possible to preserve the physical evidence for investigative purposes.
If there is a potential of the other employees being affected, an evacuation of the premises
should be carried out to prevent further injuries or fatalities. The operations of the workplace
need to be shut down in such emergencies.
Proper Reporting of the Accident: After ensuring the employees’ safety, proper paperwork and
documentation must be completed. The accident’s report should be completed to help
investigate the accident and the required documents for processing the claim from the insurance
company should be filled in.
1. Every workplace has its own unique environment and equipment. It is important that all
potential emergency situations, like accidents, injuries, and health issues should be
anticipated and identified so as to be prepared with a proper response plan, when and if such
incidences occur. This will result in controlling the threats to human life and damage to
property. It should not be just a one-time activity but an ongoing process. Proper planning
will result in an effective safety and health program at the workplace.
1. Three examples of workplace hazards are:
2. Rahul should ask the mall manager to have stairways/Handrails in order to reduce the risk
of such injuries, stairwells should have handrails, be kept clear of clutter, well lit, and free
from any unsecured objects, like rugs and carpets. The first and last stair should always be
well marked.
They should also provide ladders and accessible step stools can help reduce the chances
of a fall by helping employees reach heights safely. Availability of these, reduces the
chances of employees using unstable objects or other furniture to climb.
3. Most office systems are computerised now and staring at computer screens
for hours while working causes eyestrain and damage to them in the long run. Rohit can
suggest the following points:
Atleast an arms-length distance should be maintained from the screen. One must
also look away from the screen at regular intervals to reduce eyestrain and long-term
damage to the eyes.
One should take short breaks every half an hour, performing desk exercises or
even having standing desks at the workplace.
4. Office desks, copy machines, computer screens, and keyboards as well as mobile screens are
some of the places that have a lot of microbes, which may cause infections. Vandana can ask
the employees to clean all the objects used at the workplace regularly, using surface
disinfectants and sanitising wipes. One must wash one’s hands regularly with soap to stay
healthy and germ-free.
5. Kalpana can educate employees with work-life balance and can also encourage physical
fitness to refresh themselves by working out and staying energised for the entire day. She
can inform employees that drinking adequate amount of water is extremely essential to
maintain the body temperature and other important functions of the body.
1. An electric shock is a shock that occurs when a person comes in contact with a source of
electrical energy. A person experiences a shock when this electrical energy flows through the
body.
An arc fault is initiated by the passing of the current between the two conducting metals
through ionised gas or vapour, which is caused by a flashover or other conductive material.
An arc fault results in a massive electrical explosion. This results in an arc flash, which is the light
and heat from the explosion and an arc blast, which is a pressure wave that follows.
2. The first aid kit should include basic equipment for administering first aid for
injuries. In order to know what contents are actually needed inside a first aid
kit, a risk assessment of the workplace is required. The kits must be identifiable
with a white cross on a green background and made of a material that will
protect its contents from dust, moisture, and contamination.
3. The preferable scenario is, of course, to prevent accidents by providing adequate
safety equipment and putting the right procedures, including training, in place.
Some of the preventive measures, to prevent accidents, are:
Employers must provide workers with protective equipment, such as safety goggles
and other gear they need, to avoid dangerous exposure.
Reminding employees to be vigilant.
Removing clutter and putting it out of the way so that people would not step on
it and fall accidently.
4. Preparing a proper emergency action plan, which should include the following:
There should be an emergency evacuation plan ready for emergencies.
There should be clearly marked and well lit, unobstructed evacuation routes and
emergency exits.
Employees should be able to have an access to lists with names and
telephone numbers of emergency contacts.
Procedures for employees to shut down critical plant operations, operate fire
extinguishers, or perform other essential services before evacuating should be
clearly communicated as a part of the emergency plan.
Employees should be trained in first-aid procedures.
Practice drills for emergency action plans should be regularly conducted.
Make sure emergency/ fire alarms are recognised by all the employees.
Employers should have a reporting system in place for all accidents and dangerous incidents.
5. Try to juggle the roles and responsibilities at work and home can lead to exhaustion and mental
stress. This may impact the quality of life and also have an adverse effect on the physical
health. One great way to beat stress is to do things one enjoys. These may include spending
time with family or friends, watching movies, listening to music, reading books, and exercising.
A healthy work-life balance can help to avoid future mental and physical health issues.
4. Preparing a proper emergency action plan, this should include the following:
There should be an emergency evacuation plan ready for emergencies.
There should be clearly marked and well lit, unobstructed evacuation routes and
emergency exits.
Employees should be able to have an access to lists with names and
telephone numbers of emergency contacts.
Procedures for employees to shut down critical plant operations, operate fire
extinguishers, or perform other essential services before evacuating should be
clearly communicated as a part of the emergency plan.
Employees should be trained in first-aid procedures.
Practice drills for emergency action plans should be regularly conducted.
5. In the event of an emergency, such as a fire or chemical spill, which
requires evacuation, always consider the following points:
The first person to notice the emergency should activate the emergency alarm
or inform a senior officer and proceed to leave the building immediately.
On noticing a hazard, be safe and then alert the emergency control personnel of your
organisation as soon as possible. If unsafe, then, on reaching a safe location and
distance, alert the personnel and call the relevant emergency services, like the fire
department with the information about the emergency and its location. Medical
services, like hospitals and ambulance can also be called if there are any injured
people that require medical attention.
On hearing an evacuation alarm, or on instruction of emergency control personnel, all
personnel should immediately stop all the activities and follow the evacuation
procedure. Do not attempt to collect personal items except for your wallet or purse. If
there is an emergency kit nearby, take it with you.
Shut down any hazardous equipment or processes, if practical, without
endangering yourself or others.
In the case of a fire, before opening a door, feel it for heat. If it is hot, do not touch or
open it. Stay low if there is smoke in the room or passageway. Do not break windows
unless absolutely necessary for ventilation and escape.
If it is safe to leave, close doors, but do not lock them.
Use a fire extinguisher only if it is safe to do so and you know how to use it.
In case of a fire, do not use a lift to evacuate a building.
Follow the directions given by the emergency control personnel and assist with
the general evacuation, if directed to do so by them.
Help with the evacuation of the disabled personnel.
All the people in the building should walk quickly to the nearest exit and ask the
others to do the same.
In case there is a designated evacuation area, move calmly towards it and do
not leave the evacuation assembly area until the ‘All Clear’ has been given.
Do not return to the building until it has been declared safe.
Remain calm, do not panic, and proceed calmly and without pushing others
towards the exit. If the exit is blocked or crowded, use a secondary exit.
Alert others to the nature and location of emergency on your way out.
Assist any person in immediate danger, but only if you are safe to do so.