PART-A (Employability Skills)
Communication Barriers
Basic Skills for Care and Maintenance of Computer
1. Keep the computer dust free.
2. Do not eat or drink while working on the computer. Food or drink may spill on the system.
3. To keep the keyboard clean, make sure your hands are clean before using it.
4. CDs and DVDs should be handled carefully so that it does not get any scratches.
5. Keep keyboard covered when not in use.
General precautions to be taken while cleaning the computer components
• Always Power Off the computer system before cleaning.
• Never spray cleaning fluid directly on the component of the computer. First spray the liquid on the cloth and then wipe the component.
• Do not allow the cleaning liquid to drip near the circuit board.
• Preferably use anti-static wrist band which helps to prevent building up of static electricity near
electronic device.
Regular maintenance of the computer system is very important.
Some of the maintenance activities are:
• Keep the components of the computer, like keyboard, mouse, monitor, etc. clean.
• Replace hardware that is not functioning properly
• Keep food items away from the computer
• Cables and chords should not be messed up
• Removing unauthorized software from the computer
• Take regular backup of the data
• Ensure backups are working properly by periodically restoring or checking of data. You should
use external hard drive for backup of data on your computer.
• Run anti-virus periodically
• Keep anti-virus software up to date
• Do not overcharge the batteries
• Do not block the vents
• Always shut down the computer properly
PART-B (Vocational Skills)
Styles
A style is a set of formats that you can apply to selected pages, text, frames, and other elements in your document to quickly change their appearance.
Styles and formatting window from format menu.(short cut key F11)
Advantages :
1. Styles help to improve consistency in a document.
2. Styles also make the major formatting changes very simple.
1. Paragraph Style
2. Page Style
3. Character Style
4. List Style
5. Frame Style
Methods of inserting images in a document.
a. Drag and Drop
b. Inserting An Image From The Clipboard
c. Inserting An Image Using A Scanner
d. Insert image from insert picture dialog
Image Cropping.
Cropping means to remove(cut off) unwanted areas from an image
keep scale and keep image size
When we select keep scale , the size of the image also change during cropping
When we select keep image size , the size(height or width) of the image remains unchanged.
resizing an image
Ans. Resizing an image means to increase or decrease the size of an image according to the requirement.
Template
A template is a model that you use to create other documents.
All documents in OpenOffice.org are based on templates
You can create your own templates in two ways:
from a document, and using a wizard
Updating table of contents
Table of content Dialog Box
Consolidating data
Data Consolidation allows you to gather together your data from separate worksheets into a master worksheet.
Sub Total
The Subtotal command allows you to automatically create groups and use common functions like SUM, COUNT, and AVERAGE to help summarize your data.
What if Analysis Tools:
Scenarios, Goal Seek and Solver
Scenarios
A scenario is essentially a saved set of cell values for your calculations.
You can easily switch between these sets using the Navigator or a drop-down list which can be shown beside the changing cells.
Each scenario is named, and can be edited and formatted separately.
When you print the spreadsheet, only the contents of the currently active scenario is printed.
Goal Seek
Usually, you run a formula to calculate a result based upon existing values. you can discover what values will produce the result that you want. using Goal Seek.
Goal Seek tool need three parameters
The formula cell: This is the cell contains the formula we want to resolve
The target value: The required value that we want our formula to to resolve to
The variable cell. The cell that contains the unknown data that we want to find a value that meets the requirements.
Solver
Solver option under Tools menu amounts to a more elaborate form of Goal Seek.
The difference is that the Solver deals with equations with multiple unknown variables.
It is specifically designed to minimize or maximize the result according to a set of rules that you define.
Referencing Other Sheets
(Same Workbook)
There are two ways to reference cells in other sheets: by entering the formula directly using the keyboard or by using the mouse.
(a) Creating Reference using the Mouse
Write the reference of a cell named A14 of sheet named S2 in another sheet of same workbook ? [S2.A14 ]
To refer to cell K5 if sheet MyData in another worksheet namely Final’s cell B3, What would you write ? [MyData.K5 ]
A ___________ refers to a cell or a range of cells on a worksheet and can be used to find the values or data that you want formula to calculate. [Cell reference]
At the bottom of each worksheet window is a small tab that indicates the ____________ of the worksheets in the workbook. [Name]
Every workbook is a collection of _____ . [worksheet]
What are the two ways of referencing cells in other worksheets?
[Using keyboard and Using Mouse ]
We can insert sheet in a workbook using _____ menu. [Insert ]
What is macro ? How are they useful ?
A macro is a saved sequence of commands or keystrokes that are stored for later use
Marco are very useful for situation where set of actions are to be repeated with new set(s) of data every time
Advantages of Macros ?
1. Automates repetitive and routine tasks
2. Reduce the possibility of human error
3. Reduce the amount of time spent in basic, repetitive tasks
4. Makes complex computations easier to perform by storing them in a macro. The macro can be run many times as per need to perform the same complex task
Introduction to DBMS
Database : Collection of information about an organization in form of tables. These tables are logically related with each other
Flat database: all the data is stroed in one file then such a database is called Flat Database. A Spreadsheet is an example of flat database
Relational Database: When data is stored in multiple tables that are linked via common filed or column, then such database called Relational database
RDBMS : Relational Database Management System. Software or computer program that manages the relational database effectively and efficiently. E.g MS Access, Base. Oracle, MySQL.
Relation: In RDBMS table is called Relation
Redundancy : duplication of data
Data Inconsistency : Multiple mismatch copy of same data
( .odb) : the file extension of base database is .odb
Components of table:
Data Item/Field/Column/Attribute: Column headers containing one type of information
Record/Row/Tuple: Row in a table . Record contain a complete unit of information.
Primary key: is a filed that uniquely identifies the records in a table
Composite Primary key: Primary key that consist of combination of two or more columns
Alternative keys : The columns that have the unique values for each record but are not selected as the primary keys are called alternative keys
Candidate keys: Primary keys and alternative keys together are called the candidate keys.In other words all attributes that are eligible to be a primary key , are called candidate keys.
This key can never be duplicated and NULL. For example rollno field can be primary key for a table student.
Foreign Key: Foreign Key is a non key attribute that is defined as a primary key in some other relation. The table where it is primary key called primary table or master table/The table where it is non primary key /foreign key called foreign table or detail table.
This key is used to enforce referential integrity in RDBMS A non-key attribute, whose values are derived from primary key of some other table.
Different categories of commands in SQL ?
SQL structured query language is a non procedural language and set of commands that is used to create, manipulate and process the database.
1. Data Definition Language (DDL) DDL contains commands for defining and modification of database objects like tables, databases, indexes, views, sequences and synonyms. Commands include : create , alter, drop, grant, revoke etc.
2. Data Manipulation Language (DML) command that can be used to manipulate the database objects and to query the databases for information retrieval. e.g Select, Insert, Delete, Update etc.
3. Transaction Control Language (TCL)
TCL include commands to control the transactions in a database system. The commonly used commands in TCL are COMMIT, ROLLBACK etc.
SQL commands
1. Create table : Used to create table in database.
1.Insert into: Used to insert records in table.
2.Select : to display the records form table
3.Delete : to delete one or more records from table
4.Update: to edit one or more records from table
5.ALTER TABLE: to add or remove column and constraint in table
6.DROP TABLE : to remove table from database
SQL Queries with given operators or keywords
ALL , WHERE, BETWEEN, LIKE, IN , NOT IN, USE, NULL
ALL: used with SELECT to display all records
E.g SELECT all city from student;
DISTINCT: to eliminate duplicate column values from table
E.g SELECT DISTINCT city from student:
WHERE ; is used with SELECT command to specify the criteria in SQL Query
BETWEEN: The BETWEEN operator defines a range of values that the column values must fall in to make the condition true. The range includes both lower value and upper value.
e.g. to display ECODE, ENAME and GRADE of those employees whose salary is between 40000 and 50000, command is:
SELECT ECODE , ENAME ,GRADE
FROM EMPLOYEE
WHERE GROSS BETWEEN 40000 AND 50000 ;
LIKE:
LIKE operator is used for pattern matching in SQL. Patterns are described using two special wildcard characters:
1. percent(%) –The % character matches any substring.
2. Underscore ( _ ) –The _ character matches any character.
e.g. to display names of employee whose name starts with R in EMPLOYEE table, the command is :
SELECT ENAME
FROM EMPLOYEE
WHERE ENAME LIKE ‘R%’ ;
IN : To specify a list of values, the IN operator is used. The IN operator selects values that match any value in a given list of values. E.g.
SELECT * FROM EMPLOYEE
WHERE GRADE IN (‘A1’ , ‘A2’);
NULL: column having no value is said to have NULL value.
USE : to open or select database
SQL Query
It is a way to get information from a database as per given condition or criteria.
It is a statement that gives filtered data according to the given criteria or condition
Use of SQL Queries
1.Query shows only required data
2.Query represents required data in a presentable way.
3.Query can be save for later use also
Summary query
The queries created by grouping records are called summary queries. This query is used to summarise the contents of the table. In summary Query only the aggregated / grouped result such as the sum , average , minimum, or maximum value is shown
The basic set of aggregate/Summary functions used for creating summarise queries are COUNT, SUM, MAX,MIN,AVG. E.g
SELECT MIN(SALARY) FROM EMPLOYEE;
SELECT MAX(MARKS) FROM STUDENT;
Detailed Query
non grouped queries are called detailed queries.
In a detailed query all records that match the specified criterion are displayed.
E.g
SELECT * FROM STUDENT ;
SELECT NAME,MARKS FROM STUDENT WHERE MARKS>=75;
Criteria in a Query
It specify the condition in a detailed query in which all records that fulfil the condition specified in Criteria are displayed. where clause used for this purpose
Creating table:
CREATE TABLE employee
(ECODE int , ENAME varchar(20) , GENDER char(1) , GRADE char(2) , GROSS int ) ;
Inserting record:
INSERT INTO employee VALUES(1001 , ‘Ravi’ , ‘M’ , ‘E4’ , 50000);
To select only ENAME, GRADE and GROSS column from student table
SELECT ENAME , GRADE , GROSS FROM EMPLOYEE ;
to retrieve everything (all columns) from a table student/Select all records from tabl :
SELECT * FROM student ;
To display details of employee whose name ends with ‘y’.
SELECT * FROM EMPLOYEE WHERE ENAME LIKE ‘%y’ ;
To display names of employee whose name starts with R in EMPLOYEE table, the command is :
SELECT ENAME FROM EMPLOYEE WHERE ENAME LIKE ‘R%’ ;
To display details of employee whose second character in name is ‘e’
SELECT * FROM EMPLOYEE WHERE ENAME LIKE ‘_e%’ ;
To display details of employee whose grade value is A1 or A2 :
SELECT * FROM EMPLOYEE WHERE GRADE IN (‘A1’ , ‘A2’);
To display ECODE, ENAME and GRADE of those employees whose salary is between 40000 and 50000, command is:
SELECT ECODE , ENAME ,GRADE FROM EMPLOYEE WHERE GROSS BETWEEN 40000 AND 50000 ;
To display the details of employees in EMPLOYEE table in alphabetical order, we use command :
SELECT * FROM EMPLOYEE ORDER BY ENAME ;
Display list of employee in descending alphabetical order whose salary is greater than 40000.
SELECT ENAME FROM EMPLOYEE
WHERE GROSS > 40000 ORDER BY ENAME desc ;
Change the salary of employee in EMPLOYEE table having employee code 1009 to 55000.
UPDATE EMPLOYEE SET GROSS = 55000 WHERE ECODE = 1009 ;
Update the salary to 58000 and grade to B2 for those employee have employee code is 1001.
UPDATE EMPLOYEE SET GROSS = 58000, GRADE=’B2’ WHERE ECODE = 1009 ;
Double the salary of employees having grade as ‘A1’ or ‘A2’ .
UPDATE EMPLOYEE SET GROSS = GROSS * 2 WHERE GRADE=’A1’ OR GRADE=’A2’ ;
To remove the details of those employee from EMPLOYEE table whose grade is A1.
DELETE FROM EMPLOYEE WHERE GRADE =’A1’ ;
To delete all records from employee table :
DELETE FROM EMPLOYEE ;
To add a new column ADDRESS to the EMPLOYEE table, we can write command as :
ALTER TABLE EMPLOYEE ADD ADDRESS VARCHAR(50);
In table EMPLOYEE , change the datatype of GRADE column from CHAR(2) to VARCHAR(2).
ALTER TABLE EMPLOYEE MODIFY GRADE VARCHAR(2);
In table EMPLOYEE , change the column ENAME to EM_NAME and data type from VARCHAR(20) to VARCHAR(30).
ALTER TABLE EMPLOYEE CHANGE ENAME EM_NAME VARCHAR(30);
To delete column GRADE from table EMPLOYEE, we will write :
ALTER TABLE EMPLOYEE DROP GRADE ;
Working with Accessibility options
There are different kinds of disabilities that impair the ability of an individual to function normally. Some specific types of disabilities have an impact on computer usage too.
physical disabilities: Filter Keys, sticky keys
Vision Impairments: Toggle Keys:
Serial keys
It is an accessibility feature that assists people that have difficulty in using a keyboard or a mouse or both. They can use special devices such as Sip, Puff and Breath Switches to provide input to the computer through serial ports.
Toggle keys
It is an accessibility feature which is designed for people who have vision impairment or cognitive disabilities. When toggle keys are turned on, the computer emits a high sound when the locking keys, such as Caps Lock, Num Lock, Scroll Lock are switched on and a low sound when they are switched off.
Sticky keys
It is an accessibility feature to help computer users with physical disabilities. It allows the user to press and release a modifier key, such as Ctrl, Alt, Shift etc. and have it remain active until any other key is pressed.
Filter keys
- It is an accessibility feature that tells the keyboard to ignore repeated keystrokes, making typing easier for people with hand tremors.
Mouse keys
MouseKeys is an accessibility feature that assists people who have difficulty using a mouse. This option uses the keyboard (especially numeric keypad) as a pointing device instead of a mouse.
Magnifier
Temporarily enlarge a portion of screen
Computer network
A computer network is a collection of computers and other hardware components interconnected by communication channels (cables or satellites) that allow sharing of resources and information.
WWW
World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks.
Web Brower
A Web Browser is a software used to view Web sites and acts as an interface between the user and the World Wide Web.
Web Server
A Web server is a computer that stores web sites and their related files for viewing on the Internet. E.g IIS server, tomcat, weblogic etc
Advantages of Computer Network
•Data Sharing: One of the most important uses of networking is to allow the sharing of data.
•Files Transfer : Users can send text files, spread sheets, documents, presentations, audio files, video files, etc. to other users.
Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For example, instead of purchasing 10 printers for each user, one printer can be purchased and shared among multiple users thus saving cost. /
Internet Access Sharing: You can purchase a single Internet connection and share it among other computers in a network instead of purchasing multiple Internet connection for each computer. This is very commonly found in Internet café (browsing centres), schools, colleges, companies, etc./ Network based applications Sharing: Such as web browsers, email clients, chat application, audio & video calling, etc. is another advantage.
ISP
An Internet service provider (ISP) is an organization which provides you with access to the Internet via a dial-up (using modem) or direct (hard wired) or wireless connection.
Internet connections are provided by Internet Service Providers such as Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, JIO etc
Internet connectivity
Wired : Dial up, DSL, Cable Internet Access
Wireless: 3G, wimax, Wi-Fi
DSL
Digital subscriber line(DSL) provides Internet access by transmitting digital data over wires of a local telephone network. DSL service is delivered along with wired telephone service on the same telephone line
wi-fi
Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections.
WiFi devices such as personal computer, smartphones, video game console, etc. can connect to a network resource such as Internet through a device called the Wireless Access Point (WAP).
WiMax
WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide mobile broadband connectivity across cities and countries
3G
3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G mobile telephony communications protocol that allows higher data transfer speeds and capacity.
MODEM
MODEM Á modem is a device that converts digital computer signals into a form (analog signals) that can travel over phone lines. It also re-converts the analog signals back into digital signals. The word modem is derived from its function MOdulator/DEModulator.
Expand following terms :
LAN(local area network) / WAN(wide area network ) / PAN(personal area network) / MAN(metropolitan area network) P2P(PEER-TO-PEER) / MODEM (MOdulator/DEModulator) / ISP(Internet service provider) / DSL(Digital subscriber line) / WIMAX(Worldwide Interoperability for Microwave Access) / WIFI (Wireless Fidelity)/ WWW(World Wide Web) 3G ( 3rd Generation ) WAP(Wireless Access Point)
P2P network
Networks in which all computers have an equal status are called peer to peer networks.
Client server network
Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called client server networks. The computer(s) which provide services are called servers and the ones that use these services are called clients.
Blog(web blog): is a web page that serve as a online journal or diary where online entries are posted
Blogger: author of blog is called blogger. Who blogs or write contents for blog
Blogging: It is the act of writing a post for a blog.
Blog post: the content put on blog by blogger are called blog post
Type of blogs: personal blogs, company blogs, Personal blogs , Micro blogs , News and views
Micro blogs: This is a new type of blog where one can post very short comments that others can follow. Twitter is best example of micro blog, where one can post 140 characters with each entry called a tweet.
Blogs are usually managed using a web browser and this requires active internet connection.
use offline blog software to create content first and later publish the content when an active internet connection is available.
Wordpress
WordPress is a free web service that you can use to create a beautiful website or blog.
WordPress has support for “themes” for customizing the design of a blog. Themes can make the blog or the webpage look attractive.
blog account
Before you start using a blog, a blog account is required. To create one, you need a web browser and an internet connection.
Blog Address
Blog Address: You must provide a unique address to your WordPress Blog. This is the address which others will use to view your blog.
offline blog editor
If you do not have an active internet connection, you can create blogs using a blog application and publish the blog whenever internet connectivity is available.
Offline blog editors.
Qumana
Windows Live Writer
Blogdesk
Blogjet
Marsedi
Online transactions
The transactions over the internet are called Online Transactions Like purchasing of goods, selling of goods, booking a ticket, payment of fees etc. all come under the category of Online transactions.
Online shopping
It is a form of electronic commerce where customers can buy or sell goods over the Internet. Customers need to have an active internet connection for viewing goods or services offered by a seller.
Use Of Online shopping
It could be useful in situations when:
• A customer does not have sufficient time to visit stores.
• Visiting a store is more expensive than purchasing a product online.
• A product or service that is not available in the local market is available online.
Give some Examples of Online Transaction websites?
1) For Buying Goods :- amazon, jabong, myntra, flipkart ,meesho, ebay etc.
2) For Booking of Tickets :- IRCTC , Redbus etc.
Websites for online transactions or shopping.
• IRCTC, an online portal for booking flight and train tickets.
• Flipkart, an online shopping portal for buying consumer products.
• EBay, an online portal for buying and selling goods.
• Redbus, an online portal for booking bus tickets.
• Amazon
Payment tools to use online transactions.
customers can pay online using a credit, debit card ,UPI, cash on delivery(COD ) or by internet banking.
Online threats.
Ans: Online threats such as Phishing, email spoofing, chat spoofing, etc
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons.
Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website.
Email spoofing is the creation of email messages with a forged sender address
Chat Spoofing is a one in which when a computer system or a user of a computer masquerades (masquerades means 'false') to be another identity while engaging in chat
general guideline for managing strong passwords.
•Never use personal information
•Include a combination of letters, numbers, and symbols:
•Never repeat passwords:
•Avoid using real words:
•Keep the length of the password at least 12-14 characters if permitted.
• Use capital and lower-case letters.
•Use random password generators if possible.
Example of a strong password: u1vX:,4Hd{]$
Different ways to protect yourself from viruses & other malware.
•Keep the operating system and software applications up to date
•Use antivirus and antispyware software:
•Do not share personal information:
•Keeping your username and password private
•Using strong passwords
•Do not immediately respond to mails from unknown users: It may be a fake mail trying to gather personal information
•Install firewalls:
•Use encryption software to protect your data from unauthorized users.
•Clear browser cookies frequently
•Never install software from unknown sources
Remove unwanted or unknown software applications
Cookies
Cookies are programs that are created on your local computer when you visit websites. Though cookies are meant for storing data based on your activity performed during your earlier visit such as logon details, details of a shopping cart, visited pages in a website, etc. they could also be tracked by unauthorised users and possibly gain access to your personal information.
firewall
Firewalls could be software or hardware and can assist in keeping a computer and a network secure.
Firewalls analyse the network traffic and determine if the traffic should be allowed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall software as a part of the operating system thus keeping the computer secure. In rare cases, you may need to configure your firewall for additional security.
instant messaging
Instant Messaging (IM) is a form of communication over the internet that offers an instantaneous transmission of text-based messages from sender to receiver. Most IM software includes the option to transfer files, audio chat, video chat, video conferencing transfer images etc.
Key features of IM
Key Features of IM are :- 1) Text message can be sent from one person to another(similar to SMS) 2) Audio calling and conferencing 3) Video calling and conferencing 4) File Transfers 5) Message History (Save messages for future reference)
Different type of IM softwares
There are two kinds of IM Software:-
1) Application Based:- These software are downloaded and installed on user’s computer. Eg. Google Talk , Yahoo! Messenger , Skype ,zoom, whatsapp, hangouts, line, MS teams, Google Meet, Telegram, GoSMS Pro, Messenger , Rediff Bol etc.
2) Web Based:- They are accessed using browsers such as Internet Explorer etc. Eg. MSN Web Messenger , Yahoo! Messenger for the Web , Meebo , IMO etc.
Hardware required for audio and video chat or conferencing
microphones and headsets or speakers and web cameras so that users can talk or see each other.
Google Talk
Google Talk is an instant messaging service that provides both text and voice communication developed by Google Inc.
Google Talk can also be used for making video calls and to view updates from the GMAIL mailbox.
Google Talk is free and is available as application based (users need to download and install Google Talk application to their desktops, mobiles or laptops) and web based (users can use Google Talk through a browser after signing into their Gmail account).
Before you start using Google Talk, a Gmail account is required.
Rules and etiquettes to be followed while chatting on the Internet.
There are some general rules and etiquettes to be followed while chatting over the internet .
1. Messages should be short and to the point.
2.Typing your messages in uppercase is extremely rude - it’s considered shouting and very aggressive.
3.Give people time to respond
4.Do not share sensitive or confidential information
5.Start with a short greeting when starting a conversation over IM. Say “Hi” or “Hello” to check and make sure it’s a good time to chat.
6.Keep the conversation short.
7.Never send bad/negative/ fake news via IM.
8. It’s important to properly end an IM conversation. End conversations with a short closing.Once the conversation ends, say "thanks" or "thank you,"