IT Code 402 Book 10 Answerkey
IT Code 402 Book 10 Answerkey
Code - 402
Rapid Electronic
Typing Spreadsheet
Answers Book
BALDHA HEMIL
CONTENT
1.1 Digital Documentation (Advanced) (Styles, Images and Templates)
1 2
5
BALDHA HEMIL
1.2 Table of Contents and Mail Merge
text area.
viii. Repeat steps 6 to 7 to add all the field headings to the
appropriate points in the Label text.
ix. Select the label Format option.
x. Click on New Document.
8
BALDHA HEMIL
xi. Click on the Print button on the toolbar and then click
on yes. The Mail Merge dialog box appears.
xii. Click on OK. Print dialog box appears.
xiii. Click on OK. The label will be printed.
5. We can use the Entries tab from the Table of Contents, Index or
Bibliography box to define and format the text of entries in the
TOC. The text of each outline level can be styled independently
from the other levels by adding and deleting elements.
Steps to apply character styles are:
i. Right-click anywhere in the TOC. A context menu will
appear.
ii. Click on Edit index. The Table of Contents, Index or
Bibliography box appears.
iii. Click on Entries tab.
iv. Click on a number in the Level column.
v. Click on the following button elements representing the
element to apply a style in the Structure line:
! LS: represents the start of a hyperlink.
! E#: represents the chapter number.
! E: represents the chapter (or subchapter) text.
! T: represents a tab stop.
! #: represents the page number.
! LE: represents the end of a hyperlink.
vi. Click on the Character style drop-down list and select
the desired style to apply to the element.
IT PLANET - 10 (CODE - 402)
is to be inserted.
ii. Click on the Sheet menu.
iii. Click on Link to External Data. The External Data dialog box
will appears.
iv. Type the URL of a web resource or click on browse button to
select the resource file that is to be used as a data source.
12
v. Press the Enter key to complete the typed entry.
BALDHA HEMIL
vi. Click on Automatic option to let Calc import the data
directly.
vii. Click on OK. The list of available tables/ranges appears into
the Available Tables/Ranges area.
viii. Click on the table or range to insert.
ix. Click on OK.
Calc will insert the linked data in the target document.
F. Differentiate between the following:
1. Shrink Button: This button is used to minimize the box so that we
can clearly see the cell range, data rangeor or database.
Expand Button: This button is used to maximize or expand the
box or view Tables individual sheet within the selected database.
2. Solver: Solver allows to alter different variables in a spreadsheet,
so that we can achieve a desired solution. Solver is a more
elaborate form of Goal Seek. It deals with equations with
multiple unknown variables. It is specifically designed to
minimize or maximize the result according to a set of rules that
we define.
Goal Seek: Goal seeking is the process of finding the correct input
value when only the output is known. It is the ability to calculate
backward to obtain an input that would result in the given
output. It deals with equations with single variables.
3. Sorting: This is a feature in Calc that allows arranging of data in a
specific order. Data can be sorted on the basis of text, numbers,
and combinations of text and numbers. Data can be arranged
either in ascending order (A-Z) or descending order (Z-A).
Filtering: This is a feature in Calc that allows setting of conditions
so that only certain data is displayed. It is done to make it easier
IT PLANET - 10 (CODE - 402)
14
BALDHA HEMIL Sharing, Reviewing a Spreadsheet
2.2 and Using Macros
purpose in spreadsheet.
3. A macro is a series of commands that is recorded so that it can be
played back or executed later. Follow the given steps to enable
the macro are:
i. Open a spreadsheet and click on the Tools menu.
ii. Click on Options. The Options dialog box appears. 15
iii. Edit the text and click outside the comment box.
3. We can also define macros with parameters and can pass
arguments while calling it.
i. Open spreadsheet and press Alt + F11. The Basic Macros
dialog box appears.
ii. Click on Standard > Organiser. The LibreOffice Basic Macro 17
Organiser dialog box appears.
BALDHA HEMIL
iii. Click on the Modules tab.
iv. Click on Standard, under Module.
v. Click on New. The New Module dialog box appears.
vi. Type a name for new nodule.
vii. Click on OK.
viii. The Module area shows the name of the newly created
Module.
ix. Click on new module name.
x. Click on Edit to edit the module. The Integrated Development
Environment appears.
xi. Type the below code. Here we define a macro Total with two
parameters i.e. x and y.
19
BALDHA HEMIL Database Management System
3.1 Creating and Editing Tables
20
BALDHA HEMIL
3. A relational database has the following major components:
Table: Tables are the places where all the information in your
database is stored. They have to be created first; no other part of
the database can function until the tables are created. Tables are
used to keep the data tabulated in rows and columns.
Record: A record is a row in a table that contains information
about a given person, product, or an event. It is also known as
row, entity or tuple.
Field: A field is a column in a table that contains a specific piece
of information within a record. It is the smallest unit of data. It is
also known as a column or attribute.
Database: A database object is any defined object in a database
that is used to store or reference data.
Some of the database objects are:
Table: Base organizes information into tables composed of rows
and columns and stores information about a specific subject or
entity.
21
BALDHA HEMIL
Query: A query is used to retrieve information from one or more
tables. A new table or view created from the existing tables is
based upon the query applied.
Forms: Forms are the interactive or user friendly way to enter or
view data of the fields of the tables of a database. It is an
alternative way to access data source of LibreOffice Base.
Report: A report is a database object that aids in presenting the
information in an enticing way, especially for printing purpose. It
also provides the way to view, format, and summarize the
information that is fetched from tables or queries of a database.
4. To Switch to Table Design view, follow these steps:
i. Open the database and click on the Tables icon in the
Database section.
ii. Right-click on the Table name in the List section.
iii. Click on Edit from the context menu.
The Table Design view window will appear.
To Switch to Table Data View, follow these steps:
i. Open the database and click on the Tables icon in the
Database section.
ii. Right-click on the Table name in the List section.
iii. Click on Open from the context menu.
The Table Data View window will appear.
5. To delete a relationship between tables, follow these steps:
i. Click on the line of the relationship you want to delete.
The line will be selected.
ii. Press the Delete key on the keyboard. LibreOffice Base
permanently deletes the relationship.
IT PLANET - 10 (CODE - 402)
Students Dance
Student_ID Dance_ID
Name Name
Contact No. Contact No.
StudentsDance
Student_ID
Dance_ID 25
Contact No.
BALDHA HEMIL
Relationships are created and managed in a special database
view called Relationships window . You can create
relationships between tables from there by dragging a field
from one table onto a field from another.
F. Differentiate between the following
1. In Table Data view, you can enter data.
You can use Table Design view to modify the design of the table.
2. A primary key is a field that uniquely identifies each record in a
table. The data in a primary key is unique to a specific record.
A foreign key acts as a link between two tables of a database. A
foreign key is a column of a table that references a column (most
often the primary key) of another table.
3. One to One: In this relationship, a record in a table can have only
one matching record in another table.
Many to Many: In this relationship, several records of one table
are associated with several records of another table and vice
versa.
4. Sorting means arranging the records in a particular order,
ascending or descending.
Filtering data can help you review and analyze information
in your database.
G. Application Based Questions
1. Riya can add a column by using DDL commands. To do so,
she can follow the below given syntax:
ALTER TABLE table_name
ADD column_name datatype;
2. She should use Sorting feature to display the records in
IT PLANET - 10 (CODE - 402)
alphabetical order.
26
BALDHA HEMIL
3.2 Query, Form and Report
the report.
LibreOffice Base adds the fields to the list.
To add all the fields, click on the Add All
[ ] button.
Each field you select appears in the Fields in report area.
6. To remove a field you have wrongly selected, double- 28
click on the field in the Fields in report area.
BALDHA HEMIL
To remove all the fields at once, click on ( ).
7. Click on Next button to continue.
8. Click on any Field label box and change the label
(optional).
9. Click on the Next button to continue.
10. To use a specific field to group data in your report,
double-click on the field you want to use.
This area shows how LibreOffice Base will group data in
your report.
11. Click on the Next button to continue.
12. To sort records of table in your report, click on the arrow
button in this area (optional).
13. Select the field you want to use to sort the record
(optional).
14. Click on the Next button to continue.
15. Click on the Layout options to select a layout for the
report.
16. You can set the page orientation for a report using
Orientation options.
17. Click on the Next button to continue.
18. Type a name for the report.
19. Click on Finish.
LibreOffice Base creates the report.
E. Long answer Questions
1. You can create a calculated field in the query. Now, let's say
you want to figure out something based on that data. The
club is giving discount to the club members. Now, subtract
IT PLANET - 10 (CODE - 402)
For Sellers:
! The web offers low overhead expenses.
! Free or low-cost marketing activities.
! Potential buyers can be millions of people.
8. Once you have researched about your product, read the
reviews and found the best price, you are ready to purchase
34
the product.
BALDHA HEMIL
E-retail occurs when retailers use the web to sell their
products and services.
9. Internet Service provider (ISP) is a company that provides
access to the Internet for a monthly or yearly fee.
E. Long Answer Questions
1. A computer network is a collection of computers and other
devices connected by various communication channels.
Need for a Network
You can share resources such as hardware devices, software
programs, data and information with the help of a network.
Sharing resources saves time and money.
Data and Information Sharing- In a network environment,
any authorised user can use a computer to access data and
information stored on other computers in the network.
Hardware Sharing- In a network environment, each
computer on a network can access and use the hardware
available on that particular network.
Software Sharing- A network lets people gain access to
software programs stored on a central computer. Using their
own computer, individuals can gain access to and work with
these programs.
Transferring Funds- A computer network allows users to
exchange money from one bank account to another via
Electronic Fund Transfer (EFT). Businesses and consumers
both use EFT.
2. There are different protocols for different operations on the
Network.
! HTTP (HyperText Transfer Protocol): It is a set of rules
IT PLANET - 10 (CODE - 402)
the left and will offer you three options in the center of
the page, "Video Call," "Phone Call," and "Message.”
iii. Click on the option you want, then type the phone
number to call, or the contact you want to video chat or
message into the search bar that pops up on the top left
corner of the screen (if you are reaching out to someone
36
who is not yet a contact, type in their email address).
BALDHA HEMIL
iv. If you want to message several people at once, instead
of entering the contact to text, click "New group" and
then enter a series of contact names, emails, or phone
numbers.
General rules and etiquettes to be followed while chatting
! Messages should be short and to the point.
! Always introduce yourself by name if your screen name
doesn't reflect it.
! Always ask if the other person has time to chat first –
regardless of how important you think what you have to
say is, it's not going to be well received if the recipient
is busy.
! Typing your messages in uppercase is extremely rude it's
considered shouting.
! Give people time to respond – multiple questions sent
to a recipient before they've had a chance to answer
can seem more like an interrogation rather than a
conversation.
! Wherever possible, give your undivided attention to the
person you are communicating with. It's not just a sign
of respect, but if you have multiple conversations
happening or are allowing other issues to distract you,
you may miss an important point in the other person's
messages or lose the gist of the conversation.
! It's important to properly end a conversation – you may
think the chat is over, but the other person may not.
While you're off doing other things, they may be sitting
IT PLANET - 10 (CODE - 402)
data.
BALDHA HEMIL
ii. These packets follows the different routes in the series of
networks which decides where to send the packet and is
sent from computer to computer until it finds its
destination.
iii. All the packets are assembled and examined at
destination and if any of those packets is missing or
damaged in between the route then a message is sent
again.
Once all the packets are received at the destination, they
get reassembled into their original form.
5. Blogging is an exciting and dynamic medium by which you
can publish your ideas, opinions, and stories online. It is a
place to express yourself to the world. A place to share your
thoughts and your passion.
A blog is a website that consists of a frequently updated
collection of information and entries. Most blogs focus on a
particular topic or subject area, although in a majority of
blogs the subject is the person writing the blog. The entries
that appear on a blog are called posts, and the act of
publishing a blog is called posting. A single person who
maintains many blogs is known as a blogger.
F. Differentiate Between the following
1. Web Browser: A web browser is a program that allows you
to view and explore information on the web.
Microsoft Edge, Google Chrome, Mozilla Firefox, and Safari
are some popular web browsers.
Web Server: A web server is simply a computer program,
used to store web pages and websites available to web
browsers as they are requested. There are millions of web
IT PLANET - 10 (CODE - 402)
39
BALDHA HEMIL Internet Security and Workplace
4.2 Safety
vii. Click on Clear data boxes. The browser will clear cache,
cookies and browsing history.
2. Passwords work as your identity all your online accounts.
Therefore, creating a strong password is of paramount
importance, so that it would be impossible for hackers to guess
or crack and avert unauthorised access to your computer and
personal information. Stronger the password, lower is the risk of 40
a security breach.
BALDHA HEMIL
3. The word 'emergency' refers to emerging of something
unexpected. It is a sudden, unexpected occurrence that
poses an immediate risk to health, life, property, or
environment and calls for immediate action or urgent
intervention to prevent worsening of the situation.
4. Internet security is taking measures to protect or safeguard
our information on internet from loss, damage, and misuse.
5. Viruses are programs which are created deliberately to
damage data. A virus can badly affect or infect your
computer without your knowledge. Once a virus is in your
computer, your files and operating system may be damaged.
6. Ergonomics is the study of people, their physical
characteristics, and the ways in which they function in their
working environment, the furnishings, and the machines
they use. The main goal of ergonomics is to incorporate
comfort, efficiency, and safety into the design of keyboards,
computer desks, chairs and other things at the workplace.
7. Here are some of the emergency evacuation points:-
i. An organization must have a well-written evacuation
plan, and also need to ensure that every employee is
informed regarding this.
ii. With signs marking evacuation routes, the safety
coordinators should show the plan to visitors. It
decreases the risks visitors face in an emergency, even if
they are unfamiliar with the building.
8. Every organization must identify and understand the
different types of safety risks that can do potential harm to
the employee or to the workplace, and pair that information
with the action plan for accident prevention.
IT PLANET - 10 (CODE - 402)
emergency evacuation.
BALDHA HEMIL
! An individual should be made responsible for taking
decisions during emergencies. They oversee the
emergency procedures, notify and coordinate with
outside emergency services.
F. Differentiate between the following
1. Viruses are programs which are created deliberately to
damage data. A virus can badly affect or infect your
computer without your knowledge. Once a virus is in your
computer, your files and operating system may be damaged.
An antivirus software is a program specifically designed to
detect and remove the virus from the computer system. It
also helps in eliminating the virus while preventing any
potential viruses or threats such as keyloggers, Trojan
horses, worms, spyware, adware, botnet and ransomware
infecting your computer in the future.
2. A backup tool allows users to copy, or backup selected files
or the contents of an entire storage medium to another
storage location, such as another hard drive, optical disc.
During the backup process, the backup tool monitors
progress and alerts you if it needs additional media, such as
another disc.
In the event you need to use a backup file, a restore tool
reverses the process and returns backed up files to their
original form. The Backup tool works in tandem with a
restore tool.
3. Carpal Tunnel Syndrome (CTS) is a Repetitive Strain Injury
(RSI) whose symptoms include numbness, tingling, and pain
in the fingers. This condition affects people who type
IT PLANET - 10 (CODE - 402)
sensitivity to light.
BALDHA HEMIL
4. Phishing is a cyber crime in which you receive a legitimate
looking e-mail or text message that attempts to obtain your
personal and/or financial information. These messages look
legal and request you to update your credit card numbers,
bank account number, password, or other private
information. Phishing can be executed via e-mail, website,
and even on the phone.
The word “spoof” means to hoax or deceive. In the context
of information security, it refers to tricking or deceiving
users into giving up sensitive financial or private information,
i.e password, bank details etc. by faking the identity of
another user on the Internet. Spoofing can take place in
different ways, i.e., e-mail spoofing, chat spoofing, IP
spoofing, text spoofing, etc.
G. Application Based Questions
1. Amazon website has identified her interest in shoes by using
the cookies.
2. She is a victim of Phishing.
46