0% found this document useful (0 votes)
97 views

IT OpenOffice 402-Part B Answer Key_ClassX

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views

IT OpenOffice 402-Part B Answer Key_ClassX

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Information Technology

OpenOffice
ps
Code 402

CLASS – 10
Ki

© Kips Learning Pvt. Ltd 2023


Information technology – Vocational (Code-402)
CLASS – 10
ANSWER KEY (Part B)
Unit-1 Digital Documentation
1 – Applying Styles in a Document
Assessment Time
A. Select the correct option.
1. b. Style
2. c. Sidebar
3. b. Paragraph Styles
4. a. Shift + F11
5. b. Load Style
B. Write T for True and F for False.
1. F
2. T ps
3. T
4. F
5. T
C. Answer the following questions.
1. A style is a predefined combination of various formatting features, like font style, colour,
and size that is applied to the selected text in a document to quickly change its appearance.
2. Paragraph Styles are used to change the appearance of a paragraph by making changes to
the text alignment, tab stops, line spacing, and so on. On the other hand, the Character
Styles can be applied block of text inside a paragraph. For example, they enable you to set
Ki
the font and size of text, or apply bold and italic effects.
3. To apply a predefined style using the Styles and Formatting pane, follow these steps:
• Open a document in Writer and type the content.
• Click on the Styles and Formatting icon on the Sidebar. Or
Click on the Format menu and select the Styles and Formatting option. Or Click on the
F11 key.
• A dockable Styles and Formatting menu will open. Click on the Paragraph Styles icon
if it is not selected, by default.
• Select the text on which the style is to be applied. For example, select the title of the
content.
• Now, scroll through the list of styles and double-click on the Title style.
• The selected style will be applied immediately. Similarly, you can apply the other
styles to the selected text.
4. The Fill Format Mode allows you to apply a style to many different areas quickly, such as you
can format many scattered paragraphs, words, or other items with the same style. In other
words, the Fill Format Mode copies a style and applies the same to the other items.
5. In Writer, you can create a new style by using any of the following methods:
• Creating a New Style from a Selection

© Kips Learning Pvt. Ltd 2023


• Creating a New Style Using Drag and Drop

Ch-2 Adding Graphics in a Document

Assessment Time
A. Select the correct option.
1. a. Insert > Picture > From File
2. b. Gallery
3. c. Drawing Toolbar
4. a. Corner Handles
5. a. Picture
B. Write T for True and F for False.
1. F
2. T
3. T
4. F
5. T ps
C. Answer the following questions.
1. In Writer, there are several ways to insert images in a text document. Some of them are as
follows:
• Inserting an image from a file
• Inserting an image using drag and drop method
• Inserting a scanned image
• Inserting an image from the clipboard
• Inserting an image from the Gallery
2. Cropping means to delete the unwanted areas of a photograph or image to improve its
Ki
appearance.
3. It is often convenient to group the drawing objects together so that they can be treated as a
single object. Grouping the drawing objects gives you more control over a set of objects. You
can apply the formatting features to all the objects at once.
4. Alignment refers to the vertical or horizontal placement of a graphic in relation to the
chosen anchor point of an image.
5. Gallery is an inbuilt feature of OpenOffice that is available for all its components. It offers an
easy way to group reusable objects such as graphics and sounds that can be inserted into a
document. The Gallery contains ready-to-use objects (Arrows, Bullets, Diagrams, Symbols,
and so on). By default, the Gallery is docked above the Writer workspace.

Ch-3 Working with Templates


Assessment Time
A. Select the correct option.
1. a. New > Templates and Documents
2. b. Template
3. d. My Templates

© Kips Learning Pvt. Ltd 2023


4. b. Ctrl + Shift + N
5. b. Two
B. Fill in the blanks.
1. Template
2. My Templates
3. Set As Default Template
4. .ott
C. Answer the following questions.
1. A template a is predefined layout that contains sample content, themes, colours, font styles,
background styles, etc., and gives an initial foundation to build a document.
2. To create a document using a pre-defined template, follow the given steps:
• Click on File > New > Templates and Documents. You will see many pre-defined
templates in the My Templates dialog box.
• Select the required template and click on Open.
• A new document opens with the selected template.
3. In such a situation, you need to update the document after making changes in the style of
the template. To update a document, follow these steps:
ps
• Click on File > Save As and all changes made to the document will be saved.

Ch-4 Using a Table of Contents


Assessment Time
A. Select the correct option.
1. b. Table of Contents
2. a. Insert
3. a. Title
Ki
4. b. Chapter Number
B. Fill in the blanks.
1. Headings, Sub-headings
2. Paragraph
3. Title page
4. Grey
C. Answer the following questions.
1. The table of contents (TOC) consists of headings and sub-headings of a book or document. It
is a necessary index, generally available in long documents, books, drafts, etc. It includes
titles or first-level headings, such as chapter names, and sometimes it even includes second-
level headings, and occasionally third-level headings.
2. A good table of contents has the following characteristics:
• It should be easy to read and simple to use.
• It should be organised and formatted properly.
• It must be accurate and easily accessible.
• It should be given after the title and copyright page.
3. To edit an existing table of contents, follow these steps:

© Kips Learning Pvt. Ltd 2023


Right-click anywhere in the table of contents. The context menu appears.
From the context menu, choose Edit Index/Table option. The Insert Index/Table window
opens. You can edit and save the table using the five tabs described in the chapter.
4. The five tabs present on the Insert Index/Table dialog box are: Index/Table, Entries, Styles,
Columns, and Background.
• The Index/Table page helps to set the attributes of the TOC, for example, the type of
index.
• The Entries and Styles pages are used to format the entries in the TOC.

Ch-5 Mail Merge


Assessment Time
A. Select the correct option.
1. a. Mail Merge
2. c. Both a and b
3. b. Data Source
4. a. Main Document
ps
B. Fill in the blanks.
1. Main
2. Mailing Labels
3. Merge
4. Register
C. Answer the following questions.
1. The Mail Merge feature of Writer enables you to quickly create and print multiple copies of
a document, mailing labels, and so on.
2. The Mail Merge feature is used to combine a data source with the main document. It saves
Ki
your time and energy to send letters at multiple addresses. It primarily enables automating
the process of sending bulk mail to customers, subscribers, or general individuals.
3. Main Document is the document that contains the text that you wish to send to all the
recipients. To perform Mail Merge, a Writer document is required. Either you can create a
new document or use an existing one. Data Source consists of a mailing list. For example,
name, address, city, pincode, telephone number, etc. The data is organised in a tabular form
along with the field names.
4. Labels are stickers that may contain information related to a product to advertise, a warning
message, instructions for use, caution in use, environmental advice, batch number, etc. In
the same way, mailing labels are stickers that you over the envelopes and/or at the top of
the letters while sending mails to a group of people.
5. After saving the data source, register it by following the given steps:
• For this, click on the File > New > Database.
• The Database Wizard opens. Select the Connect to an existing database option and
choose Spreadsheet from the drop-down list.
• Click on Next > Browse. Select the file name in which you have added recipients
(Recipient.ods).

© Kips Learning Pvt. Ltd 2023


• Now, click on Next and stay with the default settings, and click on Finish. A dialog box
appears. Save the spreadsheet as database by entering an appropriate name (for
example, Employees_List) in the Name field. Click on Save and after that, exit the
spreadsheet application.

Brain Developer
Section 4: Competency Based Questions (Unsolved)
1. To build a custom style in Writer using drag and drop, follow these steps:
• Open the document and format the text (such as a paragraph or title) as per your
requirement.
• Open the Styles and Formatting pane and select a style category under which you want to
create a style.
• For example, select Paragraph Styles category.
• Now, select the formatted text (on which you want to base the style) and drag and drop
the selection into the Styles and Formatting pane.
• The Create Style dialog box opens. Type a name for the new style and click on OK. A
ps
• new style will be added in the Styles and Formatting pane under the selected category.

2. To copy styles from a template or another document, follow these steps:


• Open the document in which you want to copy the styles.
• In the Styles and Formatting pane, click on the New Style from Selection icon and select
Load Styles.
• The Load Styles dialog box opens. Choose any or all from the options present in the Load
Styles dialog box to select the styles to be copied.
Ki
• Find and select the template or document to copy styles from.
• Styles of the selected document or template will be loaded in the current document.
3. In Writer, there are several ways to insert images in a text document. Two of them are:
• Inserting an image from a file
• Inserting an image using drag and drop method.
Let us see how to insert an image from a file in a document.
• Position the cursor where you want to insert an image.
• Click on the Insert menu and then select the Picture > From File option.
• The Insert picture dialog box appears.
• Locate the picture you wish to insert and select it.
• Click on the Open button to add it to your document.
4. Resizing an image:
Follow the given steps to resize an image:
• Click the image that you want to resize. The green resizing handles appear as soon as you
click on the image.
• Take the pointer to any of the handles. You can observe the shape of the pointer changes
to a double headed arrow.
• Drag the arrow to increase or decrease the size of the image.

© Kips Learning Pvt. Ltd 2023


Rotating an image:
OpenOffice Writer does not provide a tool for rotating a picture; however, you can follow the
given steps to rotate an image:
• Open a new Draw or Impress document (File > New > Drawing or File > New >
Presentation). Insert the image you want to rotate.
• Select the image and select the Rotate icon from the Effects tear-off toolbar given on the
Drawing toolbar. The Drawing toolbar is displayed at the bottom of the window in both
Impress and Draw, by default.
• Rotate the image by using the red handles at the corners of the picture and move the
mouse in the direction you wish to rotate.
• Select the rotated picture by pressing Ctrl+A, then copy the image to the clipboard with
Ctrl+C.
• Now, go back to the Writer document where the image is to be inserted and press Ctrl+V.
The rotated image will be inserted in the Writer document.
5. To create a flowchart, Sunita needs to insert several graphic symbols which she can draw by
using the tools present on the Drawing toolbar.
6. To group the drawing objects, follow the given steps:
ps
Draw four or five drawing objects.
Click on the Select tool on the Drawing toolbar.
Drag it over the objects to select them.
Once, all the objects are selected, click on the Group button on the Drawing Object
Properties toolbar. Or
Right-click and select Group from the context menu.
All the selected objects will be grouped.
7. Anand can use the Text wrapping feature of Writer to adjust the text around the image. He
can use the Wrap command given in the Format menu.
8. Dhdfhdfhdfhdfhdfhdfhh
Ki
Section 5: Short Answer Type Questions (Unsolved)

1. Styles help maintain uniformity in a document. They also make it easy to apply the main
formatting changes. For example, if in a lengthy document, you want to change the font of
all paragraphs or the indentation of all titles, this basic operation can take a long time. It can
be simplified by applying styles.
2. The Fill Format Mode allows you to apply a style to many different areas quickly, such as you
can format many scattered paragraphs, words, or other items with the same style. In other
words, the Fill Format Mode copies a style and applies the same to the other items.
3. You can press the F11 key to open the Styles and Formatting window.
4. To open the Picture dialog box in Writer, you can right-click on the image and select the
Picture option from the context menu.
5. To maintain the height and width ratio of a shape while drawing it, press the shift key and
then drag the mouse.
6. To resize an image:
• Click the image that you want to resize. The green resizing handles appear as soon as
you click on the image.

© Kips Learning Pvt. Ltd 2023


• Take the pointer to any of the handles. You can observe the shape of the pointer
changes to a double headed arrow.
• Drag the arrow to increase or decrease the size of the image.
7. Steps to perform Mail Merge in Writer:
• Create a mail merge document.
• Create a data source.
• Merge the data source with the main document.

Section 6: Long Answer Type Questions (Unsolved)


1. Creating a New Style from a Selection:
• Open a document and format the text (such as a paragraph or title) as per your
requirement.
• Open the Styles and Formatting pane, and select a style category in which you want to
create a style. For example, select the Paragraph Styles category.
• Click on the New Style from Selection icon available in the Styles and Formatting pane
and select New Style from Selection option from the drop-down menu.
ps
• The Create Style dialog box appears. Enter a name for the style. For example, type
Custom.
• Click on OK. A new style will be added in the Styles and Formatting pane under the
selected category.
2. To create a template of your document, follow these steps:
• Open the document or create a new document.
• While creating a document, add the content that you want to use further. For example,
company logo, copyright statement, and so on. Also, apply the required formatting.
• Click on the File menu and select Templates > Save.
Ki
• The Templates dialog box appears. All the existing categories of templates are displayed
here.
• Enter a name for the template in the New Template text box, for example,
Template_New.
• Select the template category in the Categories list.
• Click on the OK button. A new template of your document will be saved in the My
Templates folder.

To set a custom default template, follow these steps:


• Open the Templates window by clicking on File > Templates > Organize. The Template
Management dialog box opens.
• Scroll through the list of available templates and right-click on the template that you
want to set as a default template.
• Select the Set As Default Template option from the shortcut menu. Or
Click on the Commands button and select Set As Default Template option.
• Now, when you will create a new document, it will open with the custom default
template.
3. To create the table of contents, follow these steps:

© Kips Learning Pvt. Ltd 2023


• Place the cursor where you want the table of contents to be inserted. Generally, the
table of contents is inserted in the beginning of the document.
• Select Insert > Indexes and Tables > Indexes and Tables. The Insert Index/Table dialog
box appears.
• Click OK to create the table of contents. The TOC will be automatically created and
appears with a grey background colour around the text.
4. Yes, we can edit the table of contents. To edit an existing table of contents, follow these
steps:
• Right-click anywhere in the table of contents. The context menu appears.
• From the context menu, choose Edit Index/Table option. The Insert Index/Table window
opens. You can edit and save the table using the five tabs described in the chapter.

5. To create labels, follow these steps:


• In Writer, click on File > New > Labels. The Labels dialog box appears. It has three tabs:
Labels, Format, and Options.
• By default, the Labels tab is selected. Here, choose a database file under Database. In
ps
the Database field, all the registered database files are listed.
• Select the table from which the data is to be fetched under Table.
• Select a field under the Database field and click on the button to add it in Label text box.
• Choose the brand and type for the label. For example, select Avery A4 in the Brand list
box and J8160 Address in the Type list box.
• You can click on the Format tab if you want to adjust the size of the label manually by
changing its width, height, and other settings.
• Ensure that, on the Options tab, the Synchronize contents option is selected.
• Save your label template if you intend to use it again by clicking on Save.
Ki
• The Save Label Format dialog box appears. Enter the names for your label Brand and
Type. Click OK.
• Now, click on the New Document button. You will see the mail merge label document
with the fields chosen by you instead of data. Notice that there is a small floating
Synchronize Labels button.
• Apply some formatting to the first label by using the options on the Style and
Formatting toolbar, such as change colour, make the text bold, and so on.
• To apply the same formatting to all the labels, click on the Synchronize Labels button.
• Now, the mail merge labels are created.

Unit – II
Chapter 6 – Analysing Data in a Spreadsheet
Assessment Time
A. Select the correct option.
1. a. Consolidate
2. c. Subtotals
3. a. Scenarios
4. b. Solver

© Kips Learning Pvt. Ltd 2023


5. b. Goal Seek
B. Fill in the blanks.
1. Set of values
2. Sorted
3. Consolidation
4. Goal Seek
5. Solver
C. Answer the following questions.
1. Consolidating data means combining data from different worksheets into one place.
2. The Scenarios is an important feature of Calc that you use to test the ‘what-if’ questions. It
enables you to analyse the data by putting different input values.
3. Goal Seek is used to set a goal to find the optimum value for one or more target variables,
given certain conditions. It allows you to try different values in the formula to arrive at a
solution for the input value.
4. The basic difference between Goal Seek and Solver is that Solver deals with equations that
have multiple unknown variables.
5. To create a named range in Calc, follow these steps:
• Select the range of cells from a spreadsheet.
• Click on Data > Define Range.
ps
• The Define Database Range dialog box opens.
• Specify a name for the range in the Name field and click on OK.

Chapter 7 – Linking Data and Spreadsheets


Assessment Time
A. Select the correct option.
1. a. Sheet Name
2. b. /Picture.jpg
3. a. Insert
Ki
4. b. Insert > Link to External Data
5. d. F4
B. Fill in the blanks.
1. Up-to-date
2. Insert, Sheet
3. Reference
4. Hyperlink
5. Relative
C. Answer the following questions.
1. Linking spreadsheets enables you to keep the information up-to-date without editing
multiple locations every time the data changes. The ability to create links eliminates the
need to have identical data, entered and updated in multiple sheets. This saves time,
reduces errors, and improves data integrity.
2. You can insert as many sheets as you want in a spreadsheet. To insert a new sheet in a
spreadsheet:
• Click on the Insert menu and select the Sheet option from the drop-down list.
• The Insert Sheet dialog box appears.
• Select the Before current sheet or After current sheet option from the Position section
in the dialog box.

© Kips Learning Pvt. Ltd 2023


• You can also select the New sheet option from the Sheet tab to insert a new sheet and
No. of sheets option to add more than one sheet.
3. A relative hyperlink contains a partial address, which is relative to the address of the
destination file. Suppose, you have saved a workbook ABC.xlsx and an image file Capture.jpg
in D: drive. To create a relative hyperlink of the image file to the workbook, the relative path
will be \Capture.jpg.Relative linking is only possible when both the source and destination
files are on the same drive or location.
4. An absolute hyperlink is a hyperlink that contains the full address of the destination file or
web page. The following are the examples of absolute hyperlink:
• https://kips.in/index.php/books
• C:\Users\KIPS\Documents
5. To create a named range in Calc, follow these steps:
• Open a spreadsheet (source sheet) from which data is to be retrieved via a link.
• Select the range of cells that contain the data that you want to link to.
• Click on the Data menu and then Define Range option.
• The Define Database Range dialog box opens. Specify a name for the range in the Name
field and then click on OK.

Assessment Time
ps
Chapter 8 – Sharing and Reviewing a Spreadsheet

A. Select the correct option.


1. a. Tools
2. d. Changes > Record
3. b. Show Changes
4. a. Changes
5. b. Resolve Conflicts
Ki
B. Write T for True and F for False.
1. T
2. F
3. T
4. T
5. T

C. Answer the following questions.


1. Calc offers a sharing feature using which you can give access to the other users to work on
the same spreadsheet at the same time. It saves the trouble of keeping track of multiple
versions of the spreadsheet.
2. The Changes feature of Calc enables you to keep track of the changes made by you or the
other users in a spreadsheet.
3. Calc automatically adds comments to the changes made in a spreadsheet. You can view this
comment by hovering your mouse pointer over the cell where the change has been made.
The authors and reviewers can also add their own comments to the changes that they have
made to the spreadsheet to explain why they have made this change.
4. Sometimes, there are multiple edited versions of a sheet that reviewers return at the same
time. In such a situation, the different versions of the file have to be reviewed one by one,

© Kips Learning Pvt. Ltd 2023


which becomes a difficult task. To overcome this problem, Calc provides the Merge
Document feature that enables you to merge the multiple files so that the user can review
all these changes at once, rather than reviewing one at a time.

On the other hand, the Compare Document feature is used to compare the worksheets.
Suppose, you have sent a spreadsheet to a reviewer and asked him/her to edit it. He/She
has made the changes in the spreadsheet without turning on the Record feature and sent
the spreadsheet back. You will not be able to identify the changes done by him/her. In such
a case, Calc provides the 'Compare Document' feature using which you can compare the
spreadsheets.

ps
Ki

© Kips Learning Pvt. Ltd 2023


Chapter 9 – Using Macros in a Spreadsheet
Assessment Time
A. Select the correct option.
1. a. Record Macro
2. c. Tools
3. a. Window Switching
4. c. Tools > Macros > Run Macro
5. a. Function
B. Fill in the blanks.
1. Macros
2. Keystrokes
3. Function
4. Name, Parameters
5. Values
C. Answer the following questions.
1. Macros are small programs that record your actions as you perform a task in Calc.
2. To turn on the macro recorder, use Tools > Macro > Record Macro option. You can observe
a small Record Macro dialog box with a Stop Recording button.
3. The following is the syntax to define a simple function without parameters:
ps
Function Function_Name()
Body of Function
Function_Name = Result
End Function
4. By default, the Standard library is located in Calc.

Brain Developer
Section 4: Competency Based Questions (Unsolved)
1. Ravi can use the Goal Seek feature to calculate how many more votes he has to secure to
win the elections.
Ki
2. To open a shared file, follow the given steps:
• Locate the file in the network location and double-click it to open it.
• When you open a shared spreadsheet, a message appears stating that the spreadsheet
is in the shared mode and some features are not available in this mode. Click on OK.
The spreadsheet will open in the shared mode.
3. Follow the given steps to accept or reject the changes done in a worksheet:
• Open the edited spreadsheet on your computer.
• Click on the Edit menu and choose Changes > Accept or Reject.
• The Accept or Reject Changes dialog box opens containing the list of changes.
• Click on the Accept or Reject button to accept or reject a change. Or
• Click on the Accept All or Reject All button to accept or reject all the changes at once.
4. In such a case, Calc provides the 'Compare Document' feature using which you can compare
the spreadsheets. In order to compare the spreadsheets, you must have the original
spreadsheet and the one that is edited.
5. To run an existing macro, follow these steps:
• Select the Tools menu on the menu bar and choose Macros > Run Macro.
• The Macro Selector dialog box opens. Locate your macro in the Library box and select it.

© Kips Learning Pvt. Ltd 2023


• Click on Run.
6. Raj should use the Changes feature of Calc that enables him to keep track of the changes
made by the other users in a spreadsheet.

Section 5: Short Answer Type Questions (Unsolved)


1. In case some other user has opened and edited the spreadsheet since you first opened it,
one of the following events will occur:
• The spreadsheet will be saved, if the changes do not conflict.
• If the changes conflict, the Resolve Conflicts dialog box opens and you must decide
which version of the conflicts to keep, by clicking on Keep Mine or Keep Other. The
document is saved after all of the conflicts have been resolved. Notice that while you
are resolving the conflicts, no other user can save the shared worksheet.
2. The two most important what if analysis tools are: Goal Seek and Solver.
Goal Seek: Goal Seek is a useful tool of Calc that is used to set a goal to find the optimum
value for one or more target variables, given certain conditions. It allows you to try different
values in the formula to arrive at a solution for the input value.
Solver: Solver follows the Goal Seek method to solve equations. It is an elaborated form of
Goal Seek. The only difference between Goal Seek and Solver is that Solver deals with
ps
equations that have multiple unknown variables.
3. To add a comment in a worksheet, follow the given steps:
• Open the spreadsheet and make the required changes.
• Select the cell where you have made the changes.
• Choose Edit > Changes > Comments from the menu bar. A dialog box will open.
• Here, in the Text textbox, the author or the reviewer can add his/her own comments to
show why the changes have been done.
• After typing the comment, click on OK.
4. Macros are small programs that record your actions as you perform a task in Calc. When you
Ki
run the macro later, it repeats your keystrokes and thus actions. The Macros feature of Calc
allows you to record a set of actions that you perform repeatedly in a spreadsheet.
Let us consider an example, where a bookseller Rajneesh creates a report every month to
view the sales and calculate the profit. He colours the names of the customers with overdue
accounts in red and applies bold formatting to them while creating the report. It means
every time, he performs the repetitive task to format the report, which takes a lot of his
time and effort. To speed up this work, he can create and run a macro to apply these
formatting effects quickly to the cells, whenever required.
5. Calc offers a sharing feature using which you can give access to the other users to work on
the same spreadsheet at the same time. It saves the trouble of keeping track of multiple
versions of the spreadsheet.
To share a spreadsheet, follow the given steps:
• Create a spreadsheet and save it in a network location so that the other users can
access it easily.
• With the spreadsheet document open, click on the Tools menu. Choose Share
Document to activate the collaboration features for this file.
• The Share Document dialog box opens. Select the Share this spreadsheet with other
users checkbox to enable sharing.

© Kips Learning Pvt. Ltd 2023


• Click on OK. If you have already saved the spreadsheet, a message appears stating that
you must save it in the activated shared mode. Click on Yes to continue.
• Now, all the users can work together on the same spreadsheet.

Section 6: Long Answer Type Questions (Unsolved)


1. The Subtotals feature of Calc is used for generating subtotals from the subgroups of data. It
helps you to manage, analyse, and extract specific information from rows of related data.
Let us consider an example where a Senior Sales Manager of a renowned publication wants
to calculate the subtotals of sales of each employee as well as the total sales.
To obtain the subtotal of sales, follow these steps:
• Open the worksheet containing sales data.
• Select the desired range of cells that you want to use to calculate the subtotals.
• Choose the Data menu and then the Subtotals option. The Subtotals dialog box appears.
• In the Group by list box, select the column by which you want to group the subtotals. A
subtotal will be calculated for each value in this column.
• In the Calculate subtotals for list box, select the columns containing the values that you
want to use to create the subtotals.
ps
• In the Use function list box, select the function that you want use to calculate the
subtotals.
• Click on OK. The subtotals and grand total of sales will appear in the worksheet.
2. Solver follows the Goal Seek method to solve equations. It is an elaborated form of Goal
Seek. The only difference between Goal Seek and Solver is that Solver deals with equations
that have multiple unknown variables.
3. To create a named range in Calc, follow these steps:
• Open a spreadsheet (source sheet) from which data is to be retrieved via a link.
• Select the range of cells that contain the data that you want to link to.
Ki
• Click on the Data menu and then Define Range option.
• The Define Database Range dialog box opens. Specify a name for the range in the Name
field and then click on OK.
4. Sometimes, there are multiple edited versions of a sheet that reviewers return at the same
time. In such a situation, the different versions of the file have to be reviewed one by one,
which becomes a difficult task. To overcome this problem, Calc provides the Merge
Document feature that enables you to merge the multiple files so that the user can review
all these changes at once, rather than reviewing one at a time. While merging sheets, all of
the edited documents need to have recorded changes in them.
To merge documents, follow these steps:
• Open the original document.
• Click on the Edit menu and choose Changes > Merge Document.
• The Insert (File Browser) dialog box opens. Select a file that you want to merge and click
on OK.
• The Accept or Reject Changes dialog box opens, showing the changes done by more
than one reviewer.
• If you want to merge more documents, close the Accept or Reject Changes dialog box
and then open other spreadsheets for merging, by repeating the previous steps.

© Kips Learning Pvt. Ltd 2023


• Now, all of the changes are combined into one document, and you can accept or reject
the changes. Note that the changes from the different authors appear in the cells
outlined in the different colours.
5. A macro acts as a function. You can pass arguments (values/parameters) to a macro when
you call it. To allow a macro to accept a value, simply type a name for that value between
the parentheses at the beginning of the macro.
Syntax to define a macro with parameters:
Function Function_Name(Optional Parameter1, Optional Parameter2,...)
Program code
FunctionName = Result
End Function
Syntax to pass parameters to a macro while calling it:
=Function_Name(Parameter1, Parameter2,...)

ps
Ki

© Kips Learning Pvt. Ltd 2023


Unit – III
Chapter 10 – Concepts of Database Management System
Assessment Time
A. Select the correct option.
1. a. Database
2. b. Data
3. c. A set of related fields
4. b. Database Management System
5. c. A primary key field can be NULL.
B. Fill in the blanks.
1. Data Redundancy
2. Relational Model
3. Null
4. Composite Key
5. Data Concurrency
C. Answer the following questions.
1. Database is a collection of data, which is stored in a systematic manner, i.e., in the form of
ps
tables so that one can retrieve and manipulate the information quickly and efficiently from a
large set of data.
2. The Database Management System (DBMS) is a computerised record keeping system or a
software that enables you to create, store, modify, and extract information from a database.
The Relational Database Management System (RDBMS) is a type of the DBMS software that
uses the Relational Database (RDB) model for its database. A relational model enables the
users to store data in several tables.
3. Tuples: All the rows (consists of a set of related information that belongs to a particular
object) in a table/database are called tuples or records.
Ki
Attributes: An attribute is a piece of information about an object. All the columns in a
table/database are called attributes.
4. A primary key is a set of one of more fields that uniquely identifies each record in a table. It
does not contain any duplicate data. A table can have only one primary key. The value in the
primary key field is different for every tuple and thus helps in uniquely identifying the
records. A foreign key is a field or set of fields that is used to establish a relation between
the two tables. In other words, it consists of one or more fields whose value matches with a
primary key in another table. Basically, a foreign key in one table is used to point at a
primary key in another table. It acts as a cross-reference between the tables.
5. A composite key or composite primary key refers to a combination of two or more
attributes (fields) that uniquely identify the records in a table. It may be a candidate key or
primary key. For example, In the Customer table of Dominos database, the CustOrder_ID
field alone cannot become a primary key as many products can be purchased by the same
customer, thus the same customer can have multiple entries. Similarly, column Product_ID
alone cannot become a primary key as the same product can be purchased by different
customers. Hence, composite key is CustOrder_ID and Product_ID, as records can be
retrieved uniquely by using both the fields.

© Kips Learning Pvt. Ltd 2023


Ch 11 – Creating and using Tables
Assessment Time
A. Select the correct option.
1. b. Handouts
2. c. Query
3. b. Database Wizard
4. b. Date [DATE]
5. a. Float [FLOAT
B. Fill in the blanks.
1. Database
2. Record
3. Tables
4. Form
5. Data Type
C. Answer the following questions.
1. Following are the different database objects:
• Tables store data items in the form of rows and columns.
ps
• Queries are used to retrieve a specific data from the tables of a database.
• Forms are the user-friendly interfaces that facilitate the process of inserting, editing,
deleting, and updating the data in tables and queries.
• Reports are used to display the selected data in a printable format.
2. Data types determine what type of data you can enter into a field.
3. Text [VARCHAR] data type a variable length field type, which is used to store character or
string values.
4. The Table Data view is the default view of LibreOffice Base. In this view, you can enter and
navigate the records. In Table Design view, you can create a table by defining the field
Ki
names and field types. This view also allows you to edit the structure of the created tables.
5. To edit a table structure,
• Select the table in a database, right-click on it, and select the Edit option.
• The selected table will be opened in the Design View.
• Change the field name, field type or properties of the field as per your requirement.
• After making the required changes, click on the Save button.

Ch 12 – Performing Operations on Tables


Assessment Time
A. Select the correct option.
1. c. Both a and b
2. a. Edit > Edit Data
3. a. Edit > Delete Record
4. d. Sort Order Dialog Box
5. d. All of the above
B. Fill in the blanks.
1. Primary Key
2. Relationships

© Kips Learning Pvt. Ltd 2023


3. One-to-One
4. Many-to-many
5. Properties
C. Answer the following questions.
1. Tables are the easiest way to store, organise, and present a large amount of information.
They are the building blocks of a database.
2. To sort the records of a table in descending order, first select a field according to which you
want to sort the data. Click on the Sort in Descending Order button on the Table Data
toolbar. Data will be sorted on the basis of the selected field.
3. Referential Integrity (RI) is a rule in RDBMS. It states that a foreign key must have a
matching primary key, i.e., all its references must be valid and the users cannot accidentally
delete or amend the data. It ensures the accuracy and consistency of the data within a
relationship, and prevents the users to enter the inconsistent data.
4. Following are different types of relationships:
• One-to-One
• One-to-Many
• Many-to-Many
ps
5. Students and Courses tables are best example of a many-to many relationship. A student
can register for many courses, and a same course can be opted by many students.

Ch 13 – Retrieving Data using Queries


Assessment Time
A. Select the correct option.
1. a. Add Table or Query
2. b. Criteria
Ki
3. a. Like
4. b. *
5. a. Structured Query Language
B. Fill in the blanks.
1. Query Wizard
2. Alias
3. Where
4. Wildcards
5. SQL
C. Answer the following questions.
1. A query is a database object that enables you to retrieve records from one or more tables of
the database or different databases that meet a specific condition or criteria.
2. Following are the two queries views:
• Query Design View
• The SQL View
3. The Query Wizard guides you to create a query based on selected table. It is the easiest
method for beginners. The Query Design View gives you more control over a query. It allows
you to create a query from the scratch.

© Kips Learning Pvt. Ltd 2023


4. SQL is a language that allows you to make queries to define the data structure and
manipulate the data in the database. A user can create and manipulate (insert new data,
delete data, select and update data) the database anytime by using the Structured Query
Language (SQL) commands.
5. DDL commands are used to define and modify the structure of a database whereas DML
commands allow the users to manipulate data in the database.

Ch 14 – Working with Forms and Reports


Assessment Time
A. Select the correct option.
1. a. Form
2. d. Run Query Buuton
3. d. Report
4. b. Header
5. b. Static
B. Write T for True and F for False.
1. T
2. F ps
3. T
4. T
5. T
C. Answer the following questions.
1. A form holds different fields of a table that you use to enter and modify the data in the
database. Using form, you can add or edit one record at a time. It is a convenient and an
interactive way of entering data, but not an appropriate tool for every data entry.
2. To launch the Form Wizard, click on the Forms option in the Database Objects pane. Then,
Ki
select the Use Wizard to Create Form option in the Tasks pane. The Form Wizard will open.
3. Yes. To change the name of labels, follow these steps:
• Right-click on the created form and select Edit. You will switch to the Design Mode of
the form.
• Choose a label that you wish to modify and double-click on it.
• The Properties: Label Field dialog box opens. Here, enter a new name in the Name
property. Changes will apply immediately.
4. A report is a summary of your database. It is an effective way to organise and summarise the
data for viewing and printing. It consists of information obtained from tables or queries, and
presented as per the user's requirements.
5. A static report always displays the same data from the time when the static report was
created. A dynamic report generates the result of the report from the current table data.
This means that if you have some updated data in the table that feeds the report, then the
report will change accordingly.

Brain Developer
Section 4: Competency Based Questions (Unsolved)

© Kips Learning Pvt. Ltd 2023


1. Launch OpenOffice Base on your computer, the Database Wizard opens. Choose the Create
a new database option and click on Next. Stay with the default settings and click on Finish.
The Save As dialog box opens. Enter a new for the database and click on OK.
2. To switch to the Table Design View, click on the Create Table in Design View option in the
Tasks Pane. Specify the following field types for the fields:
• EMP_ID: Interger[INTEGER];
• Name: Text[VARCHAR];
• Address: Text[VARCHAR];
• City: Text[VARCHAR];
• Contact: Interger[INTEGER];
• Aadhaar _Number: Interger[INTEGER];
• Department: Text[VARCHAR]
3. Query to get the records in descending order, group by city:
SELECT * FROM SALES
Group By City
ORDER BY S_ID DESC;
4. To display the students with grade 'A' or 'E' apply the following criteria:
ps 5. He can use the Reports
option in the Database Objects
Pane. A report is an effective way to organise and summarise the data for viewing and
printing.
Ki
Section 5: Short Answer Type Questions (Unsolved)
1. Tuples: All the rows (consists of a set of related information that belongs to a particular
object) in a table/database are called tuples or records.
Attributes: An attribute is a piece of information about an object. All the columns in a
table/database are called attributes.
2. A composite primary key refers to a combination of two or more attributes (fields) that
uniquely identify the records in a table.
3. A relational model enables the users to store data in several tables, and whenever the data
is need, it can be retrieved easily by establishing a relationship among them.
4. A field type determines what type of data you can enter into a field.
5. Data/ Time data type is used to store date and time information in form of MM/DD/YY
HH:MM:SS AM/PM.
6. The Yes/No [BOOLEAN] field type stores value in the form of Yes or No. Since, Boolean
interpretation of Yes and No is 1 and 0, respectively. The field length of this data type is 1,
i.e., it can store either 1 or 0.
7. Using the Table Wizard, one can start with the basic structure of a table.
8. In UIDAI database, each person has only one Aadhaar number, and each Aadhaar number is
assigned to only one person.
9. AutoValue: If set to Yes, the values for this data field is generated by the database engine.

© Kips Learning Pvt. Ltd 2023


10. SELECT and INSERT

Section 6: Long Answer Type Questions (Unsolved)


1. Following are the advantages of DBMS:
• A database always holds data in a standard format.
• The data of a database can be available anytime and anywhere.
• It has the capability to minimise data duplication and redundancy.
• It also ensures data security.
2. A primary key is a set of one of more fields that uniquely identifies each record in a table. It
does not contain any duplicate data. A table can have only one primary key. The value in the
primary key field is different for every tuple and thus helps in uniquely identifying the
records.
A foreign key is a field or set of fields that is used to establish a relation between the two
tables. In other words, it consists of one or more fields whose value matches with a primary
key in another table. Basically, a foreign key in one table is used to point at a primary key in
another table. It acts as a cross-reference between the tables.
3. Launch OpenOffice Base on your computer, the Database Wizard opens. Choose the Create
ps
a new database option and click on Next. Stay with the default settings and click on Finish.
The Save As dialog box opens. Enter a new for the database and click on OK.
4. Tables are the easiest way to store, organise, and present a large amount of information.
They are the building blocks of a database. Tables play an important role in storing data. All
the data is stored in the database in tabular form. A well-designed table helps the users to
retrieve the data from a database easily. You can create table, by using any of the following
methods:
• Using Table Wizard
• Using Table Design View
Ki
5. Structured Query Language (SQL) is a language that allows you to make queries to define
the data structure and manipulate the data in the database. Data manipulation is the
process of editing or modifying the data to keep it updated. A user can create and
manipulate (insert new data, delete data, select and update data) the database anytime by
using SQL commands.
Following are the two DDL commands:
• CREATE: It is used to create a new database or table.
• ALTER: This command modifies the structure of a database or table.
Following are the two DML commands:
• SELECT: It retrieves data from the table.
• INSERT: It inserts data into a table.

© Kips Learning Pvt. Ltd 2023


ANSWER KEY (Part B – Unit IV)
Unit-IV Web Applications and Security
CHAPTER 15: Working with Accessibility Options
A. Select the correct option.
1. Sound Sentry is designed to help those who have ………………………………… disability.
c. Hearing
2. The Screen Narrator is used by those who have problems in their ………………………………… .
c. Vision
3. Caps Lock, Scroll Lock, and Num Lock are ………………………………… keys.
c. Toggle
4. The ………………………………… key is used to recognise multiple keys pressed as a single key press.
a. Filter
5. High contrast is used to reduce ………………………………… .
b. Eye strain

B. Fill in the blanks.


1. ………………………………… will make the computer recognise multiple key presses as a single key
press.(Turning on Filter Keys)
2. ………………………………… impairment is the inability to hear beeps or other warning sounds or even the
audio portion of the video.(Hearing)
3. The ………………………………… tool is helpful for the people with impaired vision.(Magnifier)
4. ………………………………… will allow the user to press one key at a time instead of pressing all the keys
ps
together.(Turning on Sticky Keys)
5. ………………………………… impairment prevents the user from proper handling of the mouse or
keyboard.(Dexterity)

C. Write T for True and F for False.


1. The Screen Magnifier is not helpful for the people who are suffering from vision problem.(False)
2. The Docked view is used to set the mouse pointer, the keyboard strokes, and the insertion
point.(False)
3. Text tuning is used to place the text on the screen that is easier to read for a long time.(False)
4. The Set volume list box is used to make the voice louder.(False)
5. The On-Screen Keyboard disables the physical keyboard.(False)
6. There are total five Toggle Keys.(False)
7. The Ease of Access Center allows all the settings to be customised.(True)
Ki
D. Answer the following questions.
1. What are the most common disabilities for which Windows provides solutions?
Ans: The most common disabilities for which Windows provides solutions are:
VISUAL IMPAIRMENT: This includes the inability to see and read due to blindness, colour
blindness, impaired eyesight, glaucoma, cataract, or other age-related diseases of the eye.

HEARING IMPAIRMENT: This refers to the inability to hear beeps or other warning sounds or even
the audio portion of the video on the computer.

PHYSICAL/MOTOR IMPAIRMENT: This impairment refers to the inability to control the mouse or
keyboard due to injuries or loss of hands or fingers, stiffness in the finger joints, or tremors in hands due
to some diseases.

LEARNING DISABILITIES
The inability to read and comprehend or difficulty in learning and understanding, the written
test is referred to as learning disability.

2. Write a short note on Magnifier.


Ans: A Magnifier tool is helpful for the people with impaired vision as it enlarges the different parts of
the screen in such a way, that people with visual impairment can easily see the objects on the screen.
To turn on the Magnifier, simply click on the Start Magnifier option.

3. Differentiate between the Toggle key and Sticky key.

© Kips Learning Pvt. Ltd 2023


Toggle Key Sticky Key
Caps Lock, Num Lock, and Scroll Lock keys are Sticky Keys can also be turned on or off from the
the Toggle Keys. keyboard settings.

If you press Caps Lock to obtain all capital letters This feature is useful for those who face difficulty
then pressing the Caps Lock again will turn it off in pressing more than one key at a time (like Ctrl
and now all the lowercase letters will be typed. +Alt+ Del). Turn on Sticky Keys will allow the user
Click on the check box to turn the Toggle Keys to press one key at a time instead of pressing all
ON or OFF. the keys together.

4. What is the use of Narrator option?


Ans: Screen Narrator tool helps in reading the text on the screen aloud. It also describes some system
events, such as error messages, notifications etc., while using the computer. You can activate the
narrator by clicking on the Start Narrator option from the Ease of Access Center window.

5. Write a short note on:


Ans:
a. Filter keys: Turning on Filter Keys will make the computer recognise multiple key presses as a single
key press. Due to trembling of the hands or stiffness of the finger joints, some people face difficulty in
pressing a key on the keyboard. Instead of a single press of the key, they may press it more than once.
For those people, Filter keys may be used.
ps
b. Setting up high contrast: High contrast amplifies the colour contrast of some text and images
on the computer screen to reduce eye strain and makes the items more distinct and easier to
identify. People with poor vision can see in a much better way if the display is set to high contrast.

Chapter 16: Networking Fundamentals

A. Select the correct option.


1. 1. When two or more Local Area Networks are combined together, you get a ………………………………………
.b. WAN
2. Computers are connected together to share .……………………………………… .
b. Software
3. IP stands for ……………………………………… .
a. Internet Protocol
Ki
4. A device that makes the digital signals from a computer suitable for transmission over the internet is
called a ……………………………………… .
c. Modem
5. The earliest type of internet connection was the ……………………………………… connection.
c. Dial-up
6. The TCP/IP uses ……………………………………… switching technique to transfer message through the
internet.
c. Packet

B. Fill in the blanks.


1. A ……………………………………… infection on one computer in a computer network can quickly spread to all
the other computers.(Virus)
2. Special software must be installed on a computer network to prevent the breach of
……………………………………….(Security)
3. The full form of TCP is ……………………………………….(Transmission Control Protocol)
4. Wi-Fi or ……………………………………… is a way of connecting to the internet wirelessly.(Hotspot)
5. A ……………………………………… is a physical location from where Wi-Fi access to the internet is
available.(Wireless Fidelity)
6. A ……………………………………… is known as a dumb switch.(Hub)

C. Write T for True and F for False.


1. When two or more computer systems or other devices are connected together to interchange data,
then it is known as a network.(True)
2. Backup is one of the disadvantages of a computer network.(False)
3. Modem and browser are the requirements to access the internet.(False)
4. WiMAX stands for world-wide interaction for microwave access.(False)
5. Private hotspot is not used in offices and homes.(False)

© Kips Learning Pvt. Ltd 2023


6. The device that routes the information around the network is called a router.(True)

D. Answer the following questions.


1. What is Wireless Fidelity?
Ans: Wireless Fidelity is a popular technology through which computers and mobile devices exchange
data wirelessly over the network. Wireless internet connects a home or business organisation to the
internet using a radio link between the customer's location and the service provider's facility. Wi-Fi is
generally used to provide the internet connection to remote places, where it is difficult to use wires. Wi-
Fi is also used within smaller areas, like a home, an educational institute or a corporate office to provide
wireless internet to all the users there.

2. What is the difference between Repeater and Router?


Repeater Router
A repeater simply copies the information arriving A router is a networking device, which routes
at its input and retransmits it from the output. the information around the network.

This is required at times when the network signal It is also used to connect one network with the
is weakened or distorted over a long distance. networks.

This happens if the network passes through an The header of every packet of the information
area having strong electromagnetic fields. The arriving at a router is checked for the
ps
weakened or distorted signals are regenerated and destination and using the best route, the
then retransmitted by the repeater. message is forwarded to the next device.

3. Explain data transfer in packet switching.


Ans: Data in the internet refers to all the files, e-mails, web pages, etc. that you can see across the
internet. Data travels across the internet in packets. The information in the packet enables a computer
to understand how it assimilates with any other data, the origin or source of the data, and the data's
final destination. This technique is called packet switching and widely used for optimising data transfer
over a computer network.
Let us understand this technique of data transmission.
• When you send a message or an e-mail to another computer connected on the internet, the data
in the message or e-mail is first broken down into small data packets. Once the packets are ready,
Ki
the address of the sending and receiving computer is enclosed with the data packets.
• When the data packets are received by a computer the data packets are again reassembled in a
way that they take the form of the original message. The data packets reach their destination
using different routes. The process is somewhat similar to sending parcel to your friend using a
courier service.

4. Name the different types of internet connections. Explain any two.

Ans: The different types of connections for connecting to the internet are discussed as follows:
Dial up connection, Digital Subscriber Line, Cable Internet, Satellite Connection, 3G, 4G, or 5G
Systems, Wireless Fidelity (Wi-Fi), WiMAX, Wi-Fi Hotspot
• Dial up Connection: This type of connection utilises the telephone lines but is not preferred
these days as it is very slow. It allows the user to do one work at a time. One can either use the
phone to call or connect to the internet.
• Digital Subscriber Line (DSL): It is also a type of connection that uses the telephone lines,
but is capable of transferring data at a much higher speed. A DSL filter removes the high-
frequency interference, thus enabling simultaneous use of the telephone and data
transmission.

Ch-17: Introduction to Instant Messaging

© Kips Learning Pvt. Ltd 2023


A. Select the correct option.
1. b. ICQ
2. b. IM
3. b. I Seek You
4. b. Application based
5. a. Web based

B. Write T for True and F for False.


1. True
2. True
3. False
4. True

C. Answer the following questions.


1. Instant Messaging (often called IM) refers to real-time communication with the user at the other end
through an application called Instant Messenger. Most of the instant messengers use client- server
model where messages from a user are sent to the server first and then forwarded to the intended
recipient.
IM usually takes place between two users and follows back-and-forth style of communication, i.e., a user
can type a short message and send it easily by clicking on the Send button.
Nowadays, a wide variety of IMs (WhatsApp, Google Chat, Facebook, and Skype) are available that
provide people with the facility of sending text, audio chat, video calling and conferencing, and file

2.
ps
transfer. For using audio and video call or conferencing, users must have microphones, headsets or
speakers, and web cameras, so that they can talk or see each other.

Following are the key features of instant messaging:


• It is faster than any other mode of communication.
• Users can connect to IM regardless of their location.
• Users can communicate with each other as per their suitable time.
• A user can make a group of people to chat with them in one go.
• Users can share the screen using the Screen Sharing feature. This feature is available in most of
the instant messengers.

3. Google Chat application is an instant messaging service provided by Google. It is available for
Ki
installation on both Android and iOS platforms. You can also use Google Chat on your computer or
laptop by using a browser, such as Google Chrome.

4. The four instant messaging applications are:

• Google Chat
• Skype
• WhatsApp
• Facebook

Ch-18: Chatting Using Google Chat


A. Select the correct option.
1. d. Both a and b
2. b. Emoticons
3. a. Gmail

© Kips Learning Pvt. Ltd 2023


B. Write T for True and F for False.
1. True
2. True
3. True
4. False

C. Answer the following questions.


1. You can chat with people across the world using an instant messenger like Google Chat.

2. To chat with a contact in the Google Chat application, follow these steps:

• Open Google Chrome web browser on your computer.


• Type the URL chat.google.com in the Address bar and press the Enter key.
• Sign in to Google Chat by entering valid Email id and Password of Gmail.
• The interface of the Google Chat appears. By default, it contains a list of contacts that you have
added in your Gmail.
• You will notice a green dot next to the contacts. The green dot indicates that the contacts are
online.
• To start chatting, click on the contact (visible along with the green dot) you wish to chat with.
• The chat window pops up. It shows all the past conversations with the contact. At the
bottom of the chat window, type a message that you want to send.
• Press the Enter key to send the message. Your message will be delivered instantly. If the other
person also replies on the same time, then you will get his/her message immediately.
ps
3. Following are the basic etiquette that should be followed while chatting with the others:
• Always introduce yourself by name, if your screen name does not reflect it.
• Always ask if the other person has time to chat first - regardless of how important you think what
you have to say is. Your message is not going to be well received, if the recipient is busy.
• Always start your message with a short greeting.
• Ensure that your message is short, precise and to the point.
• If you are chatting with a person and he/she is waiting for your response, then do not keep
him/her waiting for a long time.

4.WhatsApp is the most popular instant messenger, nowadays. It is widely used for sending text and
Ki
voice messages, and making audio and video calls. It is a free application that can be easily installed on
the mobile phones. You can also use it on your computer by launching WhatsApp Web.

BRAIN DEVELOPER

SECTION 4: APPLICATION BASED QUESTIONS (UNSOLVED)


1. Dia should use speech recognition and On-screen if she wants to set the alternatives for input
devices.

2.The commonly used protocols for data transfer over the internet are (Transmission Control
Protocol/Internet Protocol (TCP/IP) and File Transfer Protocol (FTP).

3. LAN

4. Google Chat
5. Yes

SECTION 5: SHORT ANSWER TYPE QUESTIONS (UNSOLVED)


1. Sticky Keys can also be turned on or off from the keyboard settings. This feature is useful for
those who face difficulty in pressing more than one key at a time (like Ctrl +Alt+ Del). Turn on
Sticky Keys will allow the user to press one key at a time instead of pressing all the keys together.

© Kips Learning Pvt. Ltd 2023


Toggle Keys
Caps Lock, Num Lock, and Scroll Lock keys are the Toggle Keys. If you press Caps Lock to obtain all capital
letters then pressing the Caps Lock again will turn it off and now all the lowercase letters will be typed.
Click on the check box to turn the Toggle Keys ON or OFF.

2. Narrator option is used to activate the narrator by clicking on the Start Narrator option from the Ease
of Access Center window.

3.

Internet WWW
A global interconnection of computer The World Wide Web (WWW) commonly
networks around the world is known as the known as the Web, is a way of accessing
internet. In other words, the internet is a information over the internet. It contains
network of networks. Communication over millions of documents called Web Pages.
the internet is governed by a set of rules Sir Tim Berners Lee, along with Robert
known as protocols. The commonly used Cailliau, invented the world wide web
protocols for data transfer over the internet while working at CERN (European Council
are (Transmission Control Protocol/Internet for Nuclear Research) in 1990.
Protocol (TCP/IP) and File Transfer Protocol
(FTP).
ps
4. A computer network may be defined as a group of two or more computer systems or peripheral
devices that are connected together to exchange information and share resources with each other.
TYPES OF NETWORKS
Depending on their size, capabilities, and the geographical distance, computer networks can be
classified as follows:
• Personal Area Network (PAN)
This type of network connection covers a very small area, such as a home or an office cabin.
Ki
Desktop computers, laptops, tablets, smartphones, printers, or wireless headphones make up the
nodes of this type of network. It uses Bluetooth, USB connections, or the increasingly popular Wi-Fi
technology for communication. It generally covers the range of less than 10 metres.

• Local Area Network (LAN)


LAN is used in an office building or educational campus. Ethernet cables and Wi-Fi are used to set up
this type of network. Its range is up to 10 kms. The number of systems connected in LAN may vary
from 2 to 1000. LAN is a useful technology that provides different ways of sharing the resources
between the end users. Resources such as printers, file servers, scanners, and the internet can be
easily shared among the connected computers.
• Metropolitan Area Network (MAN)
This type of network is geographically larger than LAN and covers a city. They are used by large
organisations, having several branches over a city or local government bodies, like the Municipal
Corporation, or police. This type of network uses microwave transmissions or fiber optic cables to
link the different nodes of the network.

5. Data in the internet refers to all the files, e-mails, web pages, etc. that you can see across the
internet. Data travels across the internet in packets. The information in the packet enables a
computer to understand how it assimilates with any other data, the origin or source of the data, and
the data's final destination. This technique is called packet switching and widely used for optimising
data transfer over a computer network.

© Kips Learning Pvt. Ltd 2023


6. Instant Messaging (often called IM) refers to real-time communication with the user at the other end
through an application called Instant Messenger. There are two types of Instant Messaging software
— application-based and web-based.
APPLICATION BASED
These are application programs that can be easily downloaded and installed on the user's devices.
Some popular application-based instant messengers are as follows:
• Chat
• Skype
• Rediff Bol
• WhatsApp
• Facebook Messenger

WEB BASED
These can be accessed by using a browser application, such as Google Chrome, Internet Explorer,
and so on. Some popular web-based instant messengers are as follows:
• Chat
• Skype Online
• eBuddy
• MSN Web Messenger
• WhatsApp Web
ps
7. Google Chat application is available for installation on both Android and iOS platforms. You can also
use Google Chat on your computer or laptop by using a browser, such as Google Chrome or on
mobile phone.
To use Google Chat on your computer, follow these steps:
• Open a browser window, such as Google Chrome.
• Type chat.google.com in the Address bar and press the Enter key.
• The Home Page of Google Chat appears. Click on the Sign in button.
• The Google Sign in page appears. Enter an Email Id of Gmail.
• If your email Id is valid, Google will ask you to type the password. Enter the password and click
on Next.
Ki
• If the email id and password matches, then you will login to Google Chat.
• The main window of Google Chat contains the list of your Gmail contacts, by default. The
contacts that are online at present will be indicated by a green dot.
• You can easily chat through Google Chat by clicking on the contact whose green dot is visible or
use other services, such as audio call or video call.

8. An emoticon known as an emote, which are a pictorial representation of a facial


expr*ession using characters—usually punctuation marks, numbers, and letters—to express a person's
feelings or mood, or as a time-saving method.

9. To chat with a contact in the Google Chat application, follow these steps:
• Open Google Chrome web browser on your computer.
• Type the URL Chat.google.com in the Address bar and press the Enter key.
• Sign in to Google Chat by entering valid Email id and Password of Gmail.
• The interface of the Google Chat appears. By default, it contains a list of contacts that you have
added in your Gmail.
• You will notice a green dot next to the contacts. The green dot indicates that the contacts are
online.
• To start chatting, click on the contact (visible along with the green dot) you wish to chat with.
• The chat window pops up. It shows all the past conversations with the contact. At the
bottom of the chat window, type a message that you want to send.
• Press the Enter key to send the message. Your message will be delivered instantly. If the other

© Kips Learning Pvt. Ltd 2023


person also replies on the same time, then you will get his/her message immediately.

SECTION 6: LONG ANSWER TYPE QUESTIONS (UNSOLVED)


1. Some commonly used accessibility tools are discussed as follows:
• MAGNIFIER
A Magnifier tool is helpful for the people with impaired vision as it enlarges the different parts of the
screen in such a way, that people with visual impairment can easily see the objects on the screen. To
turn on the Magnifier, simply click on the Start Magnifier option.
• NARRATOR
Screen Narrator tool, besides reading the text on the screen aloud, also describes some system events,
such as error messages, notifications etc., while using the computer. You can activate the narrator by
clicking on the Start Narrator option from the Ease of Access Center window.
• ON-SCREEN KEYBOARD
The on-screen keyboard displays a visual keyboard with all the standard keys.
To use an on-screen keyboard, simply click on the desired key using the mouse. The on-screen keyboard
does not disable the functioning of a physical keyboard and it is possible to use both simultaneously.

• SET UP HIGH CONTRAST


High contrast amplifies the colour contrast of some text and images on the computer screen to reduce eye
strain and makes the items more distinct and easier to identify. People with poor vision can see in a
ps
much better way if the display is set to high contrast.

• EXPLORE ALL SETTINGS


This section of Ease of Access Center allows all the settings to be customised. Let us discuss how these
options help a disabled person to use a computer.

• USE THE COMPUTER WITHOUT A DISPLAY


This section helps in optimising the settings for a person who is blind or has severely impaired vision.

2. Few advantages and disadvantages of computer networks are as follow:


Ki
ADVANTAGES OF COMPUTER NETWORKS
• Sharing of Hardware: Sharing of hardware devices, like printers, scanners, or storage
devices such as hard drives help in reducing the cost of the hardware.

• Sharing Files: By using a network, the users can easily share documents with each other. This
feature promotes teamwork and increases productivity.

• Backup: Data can be stored on a central computer or server with a backup system; ensuring that
no data loss can occur.

• Cost Effective: Since hardware, software, and storage systems can be shared; this results in
cost saving.

DISADVANTAGES OF COMPUTER NETWORKS

• Initial Costs: Although the running cost of a network is lower than that of the individual
computers, but the initial cost of setting up a network is higher. Expensive devices, such
as routers, switches, hubs, network interface cards, and server can add up to the cost.

• Maintenance and Administration: If the network grows too large, various issues may crop up in
the day-to-day operation of the computer network. To work efficiently and optimally,
it requires high technical skills and know-how of its operations and administration.

© Kips Learning Pvt. Ltd 2023


• Major Effect of Breakdowns: If a computer network's main server breaks down, the entire
system would become useless. Likewise, in case of problems with the shared resources,
like hardware, software, or storage systems, all the computers on the network would also come to a
standstill.

3. A specific computer, more powerful than the others, acts as the server and provides resources to the
other computers on the network. Client-Server networks are usually more expensive and not so easy to
implement. It is easy to take measures to secure the system in a Client-Server network. Specific
computers can be allowed access to specific areas of the server.

4. The various uses of an instant messaging account are as follow:


• To use an instant messenger service, a user must have an account with the IM application and
needs to be signed in the same application to communicate with the others who are already
logged in.
• Every IM application has a different interface and format. For example, the interface or
format of WhatsApp is different from the Google Chat or Facebook Messenger.
• Google Chat and Facebook Messenger are closely associated with the online profiles of the users,
whereas WhatsApp can be used to chat with the contacts stored in the mobile phones. However,
all these platforms have one thing in common, i.e., they are used for communication.
ps
5. To use WhatApp on your computer, follow these steps:
• Open the browser window.
• Type web.whatsapp.com in the Address Bar and press the Enter key.
• Then, open the WhatsApp app on your mobile phone and follow the instruction given on the web
page to scan the code.

CHAPTER 19: Creating and Publishing Blogs


A. Select the correct option.
1. To log in to the WordPress account, you can use your ………………………………… .
c. Both
Ki
2. Before publishing your first blog post, you must first ………………………………… your site.
c. Customise
3. You can create blog post by clicking on the ………………………………… button.
a. Create
4. You can store up to ………………………………… of media files in the Media Library using the free plan from
WordPress.
c. 3 GB

B. Fill in the blanks.


1. Posts can be made live online using the ………………………………… button. (Publish)
2. The ………………………………… button allows you to insert images, audio, and video in your blog. (Add)
3. Click on the ………………………………… tab to start making your first blog post. (Write)
4. The computer where your blog is stored is called ………………………………… . (Host)

C. Write T for True and F for False.


1. An internet connection is required to publish a blog. (True)
2. It is important to choose a short and easy name to remember the address for your blog. (True)
3. Blogs can have more than one page and the last page is the page posted last. (False)
4. WordPress allows you to add images from your Google account. (True)

D. Answer the following questions.

1. Mention three important points that you must keep in mind while writing a blog.
Ans: Three important points that you must keep in mind while writing a blog are:
Understand your target audience. Have a clear understanding of their interest and what they want to

© Kips Learning Pvt. Ltd 2023


know about.
• Make sure that the blog is well structured.
• Use social media portals, like Facebook, Instagram, etc. to make your blog popular. This method
of marketing offers a huge potential.

2. What should you keep in mind while choosing a blog name.


Ans: Select an engaging topic and give an interesting title to it. A prominent headline is the key to attract
people towards your blog.

3. How can you add media files in your blog post?


Ans: To upload media, click on the Add button, a drop-down list will appear. Then you can add audio, video,
image, and many other types of files to your blog.

Chapter 20: Using Offline Blog Editors


A. Select the correct option.
1. ………………………………… blogging means to write a blog when you are not connected to the internet.
a. Offline
2. ………………………………… is a popular offline blog editor.
c. Both a and b
3. The ………………………………… is required to configure an offline editor, like Qumana.
a. Blog's URL
4. The Qumana blog ………………………………… window helps you to add a blog.
b. Manager ps
5. ………………………………… is a blog editor that helps you to easily write, edit, spell check, and manage
the content of your blog.
a. Qumana

B. Write T for True and F for False.


1. Online blog editors are faster than the offline blog editors. (False)
2. You cannot publish your post through an offline editor. (False)
3. To view a published post, you need to open the blog account in the web browser. (True)
4. You can post a blog content with an image. (True)

C. Answer the following questions.


1. What is an offline blog editor?
Ki
Ans: Offline blog editors are the application software that helps you to easily write, edit, spell-
check, and manage the content of your blog without being connected to the internet.

2. List any four advantages of an offline blog editor.


Ans: Offline blogging has a many benefits. Some of them are as follows:
• Offline blog editors are faster than the online blog editors.
• While using an offline editor, you always have a backup copy of your post on the hard drive.
• With a blogging app, all the advanced editing, and formatting features are available, just like
you get in the WordPress editor.
• Offline editors provide the settings for images, videos, and links easily.

3.Write a short note on Qumana.


Ans: Qumana is one of the best desktop-based blog editors. It can be downloaded for free on your
Windows, Linux, or Mac-based computer. It has the ability to work with most common blogging
applications, like WordPress, Blogger, LiveJournal, Typepad, and many more. It gives an offline access to
blog posts without any browser. In your default blog editor, it becomes quite difficult to edit and insert
various types of media, whereas, this can be done easily in Qumana, and also for more than one blog at
the same time. There are a number of fee-based blog editors that offer the same or even less functions
than Qumana.

4. How can you create and publish a post?


Ans:Qumana displays all the existing posts available in your blog. To create a new post,
do the following in your blog editing window:
• Click on the New Post button .

© Kips Learning Pvt. Ltd 2023


• Enter the title of the post in the Title field.
• Enter the content of the post in the Content Area.
• Click on the Publish Post button. The post will get automatically updated on your WordPress blog.
• To view your published post, open your WordPress blog on the web browser and type the URL
of your blog.

Chapter 21: Online Transactions

A. Fill in the Blanks.


1. The process of selling and buying products over the internet is called ………………………………… . (Online
shopping/E-shopping)
2. The. ………………………………… term is used for online commercial activities. (E-commerce)
3. The Indian Railways has an official website …………………………………, which is used for the e-reservation
process. (www.irctc.co.in)
4. Exchanging data/information online is called the ………………………………… . (Electronic Data Interchange)

B. Write T for True and F for False.


1. Amazon was founded on 5 July 1994. (True)
2. Flipkart is a popular website for online shopping. (True)
3. Bonanza.com is a popular website for booking railway tickets online. (False)
4. You should use secure and safe passwords while logging in for doing online transactions. (True)

C. Answer the following questions.


ps
1. What is e-shopping? What are its benefits?
Ans: Nowadays, lots of the internet services are available to promote businesses electronically. The
internet offers you many convenient ways to shop from your homes or offices for almost everything,
such as movies, games, stationery, apparels, health care, personal products, home appliances, and
electronic items. This process of selling and buying products over the internet is called Online shopping
or E-shopping.

2. What do you understand by the term e-reservation?


Ans: E-reservation means making a reservation or appointment for a service via the internet. Using e-
reservation, you can check the availability of seats in bus, train, or aircraft anytime, and also reserve
rooms, meeting halls, or tables in restaurants. By making online payment through credit or debit cards
Ki
and net banking, you can confirm your reservations also.

3. Explain briefly about the benefits and application areas of e-reservation.


Ans: BENEFITS OF E-RESERVATION
• Accessible Anywhere: Buying an e-ticket or making an online booking is the most convenient
method for booking a hotel, flight or car-on-rent. One can buy an e-ticket anywhere in the
world where an internet connection is available.
• Discounts and Offers: You can check multiple websites to select the best price while making
an online reservation. Many hotel and airline websites provide lucrative offers to their
online customers by offering discounts and attractive schemes to attract more clients.
• Commission Free: Booking online saves hidden commission fees as there is no third-party
involved.
• Quick System: Booking through e-reservation system is very fast. The users can simply search,
select, and book the tickets either by paying through credit cards or net banking and get an
instant confirmation for services.
• Changes and Cancellations: Changes and cancellations of e-tickets can be done immediately
and the money is refunded almost instantly by just logging onto the internet.
• Customer Reviews: Customer reviews during e-reservations help in deciding the type of
service that will be provided by the service provider. They help the user in making decisions
and availing the best services.
• Safe and Reliable: E-reservation software provides a secure onIine transaction system by
taking security measures to protect your confidential credit and debit card information.

© Kips Learning Pvt. Ltd 2023


APPLICATION AREA
E-reservation has changed the reservation process completely in the last few years. More and more
users are now using online reservation facility because of its ease of use and instant confirmation. It
saves both time and money and ensures a stress-free service. It is being used in areas such as:
• Hotel reservation
• Travel ticket reservation
• Movie ticket reservation
• Event reservation

1. Why should you keep a secure password while doing transactions online? List some security measures
to be taken.
Ans: You register at various sites for online transactions during which you have to enter a username and
password. If you lose the password to your e-mail, bank, or credit card accounts, you could be facing
severe monetary losses. You should therefore, take special care to protect your passwords.
The following points list some of the measures that you can take to protect your password:
• Use strong passwords that have a combination of lower and upper case letters, numbers, and
also special characters. Keep the length of the password to at least 12-14 characters.
• Do not use easy-to-guess passwords. Avoid using passwords, such as your name or
surname, username, names of your family members like mother, father, children, pets or
even friends, birthdates, dictionary words, or part of your address.
ps
• If you decide to use a simple password, add a number or special character to the password either
at the beginning or at the end or even in both the places!
• Never write your password anywhere so that nobody can misuse it.

Chapter 22: Internet Security

A. Fill in the blanks.


1. The ………………………………… of all the websites you have visited is stored in the browser. (History)
2. ………………………………… is an act of sending an e-mail to a user; misleading him to believe that it is
from a
trusted person or organisation. (Phishing)
3. You should install and regularly update the ………………………………… software in your computer to
Ki
prevent all kinds of malware.(Antivirus)
4. A ………………………………… is a software that can help in preventing unauthorised access to your
computer by blocking unsolicited communications. (Firewall)
5. Scheduling routine ………………………………… can protect you from unexpected events. (Backups)

B. Write T for True and F for False.


1. You should never clear out the data stored in the web browsers. (False)
2. Encryption is important for data security. (True)
3. Regular and periodic updates of software is recommended to make it secure. (True)
4. You must always use a pirated software because you can save a lot of money. (False)
5. One of the most common ways through which viruses spread is email. (True)

C. Answer the following questions.


1. What is the purpose of internet security?
Ans: With the rapid growth of the internet and its applications in diverse fields, security risks have also
increased. People tend to put their personal information, like name and address, passwords for the
email accounts, banking, or even credit card details over the internet. This information can be easily
intercepted by some people with bad intentions (crackers). They may misuse this information for their
own benefit. Virus like the Ransomware virus attacks have made people realise how vulnerable their
information is and has increased the need for Internet Security.

2. What is phishing?
Ans: Phishing is an act of sending an e-mail to a user; misleading him to believe that it is from a trusted
person or organisation. The user is asked to visit a website in which he is supposed to update or validate
his personal details, such as user name, password, credit card details, etc. In this way the operators of

© Kips Learning Pvt. Ltd 2023


the fake website steal the person's identity and commit crimes in his name. This could damage the
person's reputation and cause him heavy financial losses.

3. What is the difference between email spoofing and chat spoofing?


Email Spoofing Chat Spoofing
Email spoofing is one of the most common Chat spoofing is quite similar to email spoofing.
security threats these days. This process involves The only difference between the two is that in
sending emails to the chat spoofing, the
targeted recipients to make them believe that spoofing happens when the target is engaged in
these emails originate from trusted resources. a chat process. The target perceives that he or
she is chatting with
someone known, but in fact, it is a cyber attack.

The purpose of spoofing is The purpose of chat spoofing, also, is to gain


to gain access to the recipient’s personal access to some important
information. It can be usernames, passwords, personal information.
banking details, etc.

4. List a few security practices to be followed while using the internet.


• Use a Firewall: Some programs might try to access your computer remotely without your
ps
permission. To prevent such a situation, you should install a firewall on your computer. A
firewall is a software that can help in preventing unauthorised access to your computer by
blocking unsolicited communications.

• Do not Open Attachments from Unknown Sources: One of the most common ways through
which viruses spread is email. So, always ignore unsolicited e-mails. Avoid opening attachments,
links, and forms in e-mails that come from people you do not know, or which seem "phishy".
Also, avoid untrustworthy downloads.

• Scan all Portable Storage Devices before Use: Pen drives are one of the most popular storage
devices in use today due to their convenience and portability. It has been found that they are
Ki
also the most common sources of infection in computers. Set up your antivirus software to
automatically scan every portable device plugged into the computer to ensure that your
system remains safe.

• Restrict the Number of users on the Computer: Although this may not be possible in places
where computers are shared, but having some control over the usage will greatly reduce the
risk of infection. So, the number of users should be restricted especially when the users are
allowed to bring and use their own portable storage devices.

• Update all Software Regularly: Very often software companies discover that there are certain
vulnerable areas in the software they have designed. They will try to develop a patch for this
problem and release it to all the registered users by an update. If your software is not updated,
then this will leave your computer open to a security threat. To avoid this, try to set all software
to update automatically on a regular basis.

• Do not use Pirated Software: Though using a pirated and unlicenced software may seem
financially attractive, yet the possibility of picking up a virus infection from such sources is very
high. Always use software from well-known companies that can be downloaded from their
official site.

BRAIN DEVELOPER

© Kips Learning Pvt. Ltd 2023


SECTION 4: APPLICATION BASED QUESTIONS (UNSOLVED)
1. Manisha wants to create and publish a blog using WordPress account. Tell her the steps to create and
publish the blog.
Ans: After creating a blog, you need to create a post. To create your first blog post, do the following:
• On your Homepage, click on the Write button to start making your first blog post.
• Give a Title to your blog, and start writing the content. The text formatting tools appear as you
type the text. You can choose them to format your text as you do while working on any word
processor.
• You can also add images to your blog. Copy an image and paste it on your blog page .
• Using the free plan from WordPress, you can store up to 3 GB of media in your gallery. To
upload media, click on the Add button, a drop-down list appears.
• You can add audio, video, image, and many other types of files to your blog.

PUBLISHING A BLOG
• After finishing up with the content, publish your blog to make it live.
• Click on Publish from the top-right corner of the window.
• Check the visibility of your blog. You can choose to make it Public, Private, or Password Protected.
• Click on Publish button, and your blog goes live. You can view your blog online and/or copy the
blog link.

Qumana.

blog
ps
2. Rajan has installed and configured Qumana on his system. Also, he has published a blog through

But, now he wants to include a picture with the published blog. Help him to include the image with the

and update the published post in Qumana.


Ans: Rajan has to follow the given steps to insert image in his blog:
• Click on the image button on the toolbar.
• The Insert Image dialog box opens.
Click on the Browse button and locate the image that is to be added.
• Now, choose a wrapping style for the image in the Wrapping Style section.
Ki
• Click on the Upload & Insert button to insert the selected image in your blog.
• Click on the Publish Post button.
• Open your WordPress blog in the web browser to view the published blog.

3.Anita wants to visit Kolkata, so she contacts a travel agent to book her train ticket. Suggest a portal
though which she can easily book her own train ticket for travelling.
Ans: Anita can easily book her own train ticket for travelling from some of the popular websites that provide
the reservation facility are:
www.irctc.co.in, www.makemytrip.com, www.bookmyshow.com, www.yatra.com, etc.

4. Rohan always keep his passwords simple. Tell him why should he use a strong password and how can
he
create it.
Ans: Rohan should always use a strong password in order to avoid facing severe monetary losses. Use
strong passwords that have a combination of lower and upper case letters, numbers, and also special
characters. Keep the length of the password to at least 12-14 characters. If you decide to use a simple
password, add a number or special character to the password either at the beginning or at the end or even in
both the places.

5. Manisha does not know anything about chat spoofing. Tell her something about it in 40-50
words.

Ans: Chat spoofing is quite similar to email spoofing. The only difference between the two is

© Kips Learning Pvt. Ltd 2023


that in chat spoofing, the spoofing happens when the target is engaged in a chat process. The
target perceives that he or she is chatting with someone known, but in fact, it is a cyber-attack.
The purpose of chat spoofing, also, is to gain access to some important personal information.

SECTION 5: SHORT ANSWER TYPE QUESTIONS (UNSOLVED)


1. What is blog?
Ans: A blog is a combination of the words web and log. It is a frequently updated, online, personal journal or
diary where a person can log (write or post) information related to his interests or activities, express his
ideas or opinions or share his knowledge through writing.

2. Distinguish between online and offline blog editors.


Ans: An internet connection is required to publish an online blog, whereas in offline blogging, one can
write a blog when he/she is not connected to the internet. Offline blog editors are faster than the
online blog editors.

3. Why are users moving towards e-reservations?


Ans: Due to following reasons users are moving towards e-reservations

• Accessible Anywhere: Buying an e-ticket or making an online booking is the


most convenient method for booking a hotel, flight or car-on-rent. One can buy an
e-ticket anywhere in the world where an internet connection is available.


ps
Discounts and Offers: You can check multiple websites to select the best price while
making an online reservation. Many hotel and airline websites provide lucrative offers to
their online customers by offering discounts and attractive schemes to attract more clients.

Commission Free: Booking online saves hidden commission fees as there is no third-
party involved.

Quick System: Booking through e-reservation system is very fast. The users can simply
search, select, and book the tickets either by paying through credit cards or net banking
and get an instant confirmation for services.

• Changes and Cancellations: Changes and cancellations of e-tickets can be done


immediately and the money is refunded almost instantly by just logging onto the
Ki
internet.

• Customer Reviews: Customer reviews during e-reservations help in deciding the type
of service that will be provided by the service provider. They help the user in making
decisions and availing the best services.

• Safe and Reliable: E-reservation software provides a secure online transaction system
by taking security measures to protect your confidential credit and debit card
information.

4. Name some popular websites that provide e-reservations.


Ans: Some popular websites that provide e-reservations are:
www.irctc.co.in, www.makemytrip.com, www.bookmyshow.com, www.yatra.com, etc.

5. What do you understand by the term free shipping?


Ans: When the shipping cost does not gets added to the cost of the product, then it is known as free
shipping.

6. What is a firewall?
Ans: A firewall is a software that can help in preventing unauthorised access to your computer by blocking
unsolicited communications.

7. What do you understand by the term data encryption?


Ans: Data encryption is a security method by which information is encoded in such a way that only an
authorised user can read it. Data is encrypted using encryption software.

© Kips Learning Pvt. Ltd 2023


8. Give two ways of keeping your data safe.
Ans: Install Antivirus Software: Viruses threaten your computer security, especially when on the
internet. Daily, unscrupulous elements create new viruses and until these threats are detected and
countered by the antivirus software manufacturers, you are always at risk from these viruses. It is
therefore necessary to have strong antivirus software installed on your computer.

Use a Firewall: Some programs might try to access your computer remotely without your
permission. To prevent such a situation, you should install a firewall on your computer. A firewall is
a software that can help in preventing unauthorised access to your computer by blocking unsolicited
communications.

9. Why do you need to backup your data?


Ans: To avoid an unfortunate eventuality of your computer being infected by a virus, it is important to
have a backup of all of your important data.

10. Which keyword indicates that you are making transactions through a secure connection?

Ans: A padlock sign or https: instead of http: in your browser address bar as this indicates a secure
connection.
ps
SECTION 6: LONG ANSWER TYPE QUESTIONS (UNSOLVED)
1. List some important features of a blog.

Ans: Some important features of a blog are:


• An internet connection is required to publish a blog; however, a blog can also be written offline
and uploaded on the internet when the connection is available.
• A blogger can interact with the readers by answering their questions and regularly updating
the contents after the readers have given comments related to the blog. This enables
him/her to establish trust with his/her readers.
• To write a blog, you need a blogging tool. There are many such tools available on the
Ki
internet, i.e., weebly.com, sitebuilder.com, etc. However, WordPress is an online, and one
of the most popular open source website/blog creation tool, which is versatile and quite
simple to use. It offers both paid and free services. It allows you to make a website or a
blog in the shortest possible time.
• Blogs can be written on any topic. They could be related to business, education, legal,
travel, marketing, advertising, health, sports, etc.

2. What are the advantages of offline blogging?


Ans: Offline blogging has a many benefits. Some of them are as follows:
• Offline blog editors are faster than the online blog editors.
• While using an offline editor, you always have a backup copy of your post on the hard drive.
• With a blogging app, all the advanced editing, and formatting features are available, just like
you get in the WordPress editor.
• Offline editors provide the settings for images, videos, and links easily.
• These editors provide facility to add tags and categories directly.
• These editors help to publish multiple blogs quickly as it is easier to switch from one blog
to another.
• Offline editors let you post your article directly to your blog or post as a draft.

3. What do you understand by the term e-reservation? List any four advantages of e-reservation.
Ans: E-reservation means making a reservation or appointment for a service via the internet. Using e-

© Kips Learning Pvt. Ltd 2023


reservation, you can check the availability of seats in bus, train, or aircraft anytime, and also reserve rooms,
meeting halls, or tables in restaurants. By making online payment through credit or debit cards and net
banking, you can confirm your reservations also.

BENEFITS OF E-RESERVATION
• Accessible Anywhere: Buying an e-ticket or making an online booking is the most convenient
method for booking a hotel, flight or car-on-rent. One can buy an e-ticket anywhere in the
world where an internet connection is available.
• Discounts and Offers: You can check multiple websites to select the best price while making
an online reservation. Many hotel and airline websites provide lucrative offers to their
online customers by offering discounts and attractive schemes to attract more clients.
• Commission Free: Booking online saves hidden commission fees as there is no third-party
involved.
• Quick System: Booking through e-reservation system is very fast. The users can simply search,
select, and book the tickets either by paying through credit cards or net banking and get an
instant confirmation for services.
• Changes and Cancellations: Changes and cancellations of e-tickets can be done immediately
and the money is refunded almost instantly by just logging onto the internet.
• Customer Reviews: Customer reviews during e-reservations help in deciding the type of
service that will be provided by the service provider. They help the user in making decisions
and availing the best services.
ps
• Safe and Reliable: E-reservation software provides a secure onIine transaction system by
taking security measures to protect your confidential credit and debit card information.

4. Describe any two cyber threats.


Ans: The internet has given several advantages to each individual and is extremely popular in this
modern age. However, it is a tool that must be handled with caution as its misuse can be hazardous.
Some of the threats posed by the internet are as follows:
• PHISHING
It is an act of sending an e-mail to a user; misleading him to believe that it is from a trusted
person or organisation. The user is asked to visit a website in which he is supposed to update or
Ki
validate his personal details, such as user name, password, credit card details, etc. In this way
the operators of the fake website steal the person's identity and commit crimes in his name. This
could damage the person's reputation and cause him heavy financial losses.
• EMAIL SPOOFING
Email spoofing is one of the most common security threats these days. This process involves
sending emails to the targeted recipients to make them believe that these emails originate from
trusted resources. The purpose of spoofing is to gain access to the recipient’s personal
information. It can be usernames, passwords, banking details, etc. Nowadays, most email servers
provide security features to prevent this type of activity.

5. What precautions must be taken to improve the internet security?


Ans: Following precautions must be taken to improve the internet security:
• Keep Passwords Safe: You register at various websites for accessing their content during which
you have to enter a username and password. It is suggested that one should change their
password frequently. If you do not change your password frequently then your password might
get hacked and you may face severe monetary losses. You should therefore, take special care to
protect your passwords.

• Secure Transactions: Nowadays, most of the transactions are happening online, therefore, it
is very important to ensure the security of these financial transactions on the internet. The
online transactions are made through a mobile application, like eBay, Flipkart, Amazon, etc,
using Point of Sale (POS) payment system in shopping malls or shops and third party pay
services, like PayPal or Paytm.

© Kips Learning Pvt. Ltd 2023


• Install Antivirus Software: Viruses threaten your computer security, especially when on the
internet. Daily, unscrupulous elements create new viruses and until these threats are detected
and countered by the antivirus software manufacturers, you are always at risk from these
viruses.

• Use a Firewall: Some programs might try to access your computer remotely without your
permission. To prevent such a situation, you should install a firewall on your computer. A
firewall is a software that can help in preventing unauthorised access to your computer by
blocking unsolicited communications.

 Do not Open Attachments from Unknown Sources: One of the most common ways through
which viruses spread is email. So, always ignore unsolicited e-mails. Avoid opening attachments,
links, and forms in e-mails that come from people you do not know, or which seem "phishy".
Also, avoid untrustworthy downloads.
6. Why it is important to clear data stored in a browser?

Ans: Data may be stored in temporary internet files, cookies, usernames, passwords, browsing
history, download history, favorites, and data from forms. If this information falls into the
wrong hands, it would result in the loss of your privacy and may also result in an unsecured
ps situation.
To preserve your privacy ensure that your browsing is always secure. To do so, you should
regularly delete any unnecessary data stored in the browsers.

CHAPTER 23: Importance of Workplace Safety

A. Select the correct option.


1. A key strategy to prevent fire is to remove ………………………………… .
b. Heat, oxygen and fuel
2. A fire can be caused by ………………………………… .
c. Both of these
3. Falls and trips can be prevented by ………………………………… .
Ki
c. Both of these
4. ………………………………… is initiated by current passing between two conducting metals through ionised gas.
b. Arc fault
5. The type of first aid equipment and training required depends on ………………………………… .
c. Both of these

B. Write T for True and F for False.


1. Training is not necessary to become a first-aider. (False)
2. A proper first aid program is a legal and moral obligation of all employees in many countries. (True)
3. A risk assessment at the workplace should include fire prevention, fire detection and warning,
and emergency escape and fire-fighting. (True)
4. Slips happen where there is friction or traction between the footwear and walking surface. (False)
5. A fuse is designed to ‘blow’ and cut off the electricity when the current exceeds its rated capacity.
(True)

C. Answer the following questions.


1. Write briefly about any three fire safety rules.
FIRE SAFETY RULES
The following fire safety rules, if implemented correctly, can prevent and reduce fire hazards:
• Carry Out a Fire Safety Risk Assessment: Employers should carry out a risk assessment at
the workplace, which can include fire prevention, fire detection and warning, and emergency
escape, and firefighting. Fire needs three elements—heat, oxygen, and fuel. Without these
elements, a fire will not start or spread. Hence, a key strategy to prevent fire is to remove one
or more of these elements. The risk assessment should include detail on all the three elements
to minimise the risk of a fire starting and/or spreading. A fire prevention strategy should be
built based on this assessment.

• Keep the Workplace Clean: A clean and tidy workplace helps prevent fire threats,

© Kips Learning Pvt. Ltd 2023


especially, if it handles a lot of flammable material. Such material should be stored in a
safe environment; away from flames. An untidy workplace results in clutter, which acts
like fuel for the fire to spread and also prevents access to exits and emergency
equipment like fire extinguishers and sprinkler systems. Also, smoking should not be
allowed at the workplace.

• Maintain Electrical Safety: A faulty wiring and malfunctioning of electrical equipment can
lead to voltage fluctuations or short circuit that can further be a reason or cause of fire at
workplace. Even defective wiring, overloaded sockets or plugs, and equipment that are old and
faulty may lead to heating of cables and equipment, which in turn can lead to fire. Regular
inspection and maintenance of electrical equipment should become a compulsory and regular
practice to prevent overheating or sparking of cables or equipment.

2. List some of the common causes of slips and trips at workplaces.


Common causes of slips or trips are:
• Poor lighting
• Trailing cables
• Unsuitable floor coverings
• Uneven or damaged floor surfaces
• Contaminated floor surfaces due to liquid or grease
• Poor housekeeping
• Occasional spills

3. Mention some important measures that can be taken to prevent slips and falls at workplaces.
ps
Following are some of the ways by which one can prevent slips, trips, and falls around the workplace:
• Keep Walking Surfaces Clean and Free of Clutter: Keeping walking surfaces clear, can help
reduce the potential for injury. An unobstructed path minimises the risk for an employee to trip
over an object and it also reduces the chances of a spill that could lead to a slip.

• Lighting: Proper lighting inside and outside of the workplace can help illuminate areas, like steps
or other hazards that can cause trips if they are hidden by darkness or shadows. By installing
proper lighting, one can reduce the chances of people slipping or falling.

• Signage: Using clear and well-placed signage can help call attention to potential problem areas.
A sign indicating a step, gap, uneven ground, or loose rocks will bring the employees’ attention
Ki
to the hazard and increase awareness and attentiveness. Reflective tape can also be used to
highlight such problem areas.

• Stairways/Handrails: Stairs are most popular place for falls at the workplace. To reduce the risk
of such injuries, stairwells should have handrails, be kept clear of clutter, well lit, and free from
any unsecured objects, like rugs and carpets. The first and last stair should always be well
marked.

4. Which measures should be included in the electric safety programs of organisations?


Following measures should be included in the electric safety programs of organisations:
• Electrical installations should be done and maintained by a competent person and
checked regularly.
• Extension cables, plugs, sockets, and other flexible leads and their connections that are
particularly prone to damage should be visually checked, maintained, and where necessary,
replaced before using any equipment.
• Correct cable connectors or couplers should be used to join cables together; taped joints
should not be allowed.
• Socket outlets should not be overloaded by the use of adaptors.
• Electrically powered equipment should be used.

5. What is the primary goal of first aid? What should the training of a first-aid program include?

First aid is the emergency care given immediately to an injured person. It is given to minimise injury

© Kips Learning Pvt. Ltd 2023


and future disability. In serious cases, first aid may be necessary to keep the affected person alive.

The overall goals of first aid are to:


• keep the victim alive.
• prevent the victim’s condition from worsening.
• keep the victim awake until help arrives.
The training of a first-aid program includes:
• The first few minutes after an accident or emergency are extremely important. In a lot of cases,
the recovery of the victims and their lives depend on the first-aid provided at the scene of the
accident. In such a situation, a person who is trained in first-aid can stop the condition of the
affected person from becoming worse and even save lives.
• Prompt, properly administered first aid care can mean the difference between life and death,
rapid versus prolonged recovery, and temporary versus permanent disability.
• We have seen that it is important to have qualified first-aiders at the workplace. There are
nationally accredited training courses as well as certain other equivalent courses available to
empower people to become qualified first-aiders. Only employees trained in first aid should
assist a victim. As part of their emergency training, employees should know how to respond
during an injury or illness situation, while not causing any further damage.

CHAPTER 24: Preventing Accidents and Emergencies


ps
A. Select the correct option.
1. A workplace emergency is unforeseen situations that can threaten ………………………………… .
c. Both a and b
2. A radiation leak is an example of a ………………………………… .
b. Manmade hazard
3. Natural hazards occur because of natural incidents that include factors, like ………………………………… .
b. Meteorological, geological, and biological
4. The reasons of cuts and lacerations to the body from equipment include ………………………………… .
c. Both a and b
5. Manmade disasters include ………………………………… .
a. Civil disturbances

B. Fill in the blanks.


Ki
1. Problems may not only occur from direct contact with fires, but because of ………………………………… caused
due to the smoke generated. (Asphyxiation)
2. The ………………………………… of toxic liquid or chemicals in the workplace can cause harm to people working
there. (Accidental release)
3. Employers must provide workers with ………………………………… , such as safety goggles that they need to
avoid
dangerous exposure. (Protective equipment)
4. In case of a serious accident, access to the accident site should be ………………………………… to avoid any
further accidents. (Blocked)
5. ………………………………… at the workplace is an event that is an unplanned, unintended, and unexpected
incident. (An accident)

C. Answer the following questions.


1. What are accidents and emergencies?
Ans: An accident at a workplace is an event that is an unplanned, unintended, and unexpected. It can
happen due to various factors that a person faces at the workplace. Such accidents can cause minor to
severe physical injury or even result in death. This may either be due to a risk that has not been
identified or identified but not properly controlled.
A workplace emergency is an unforeseen situation that threatens the employees, customers, or
public. It disrupts the company’s operations and even sometimes causes physical or environmental
damage. The hazards leading to accidents and emergencies may be natural or manmade.

2. Name any four type of accidents that can occur at the workplace? Explain them in
brief.
Ans: Slips, Trips, and Falls: Slips and trips can result in falls. Slips can occur due to

© Kips Learning Pvt. Ltd 2023


slippery floor, leaks from materials or debris left in walkways, uneven floor or
working surfaces, protruding nails and boards, bunched up floor mats or uneven
carpeting, holes or depressions in working surfaces, or uneven stairs.

Getting Caught in or Between Hazards: Sometimes minor cave-ins, such as being pulled into or
caught in machinery and equipment or being compressed or crushed between rolling, sliding, or
shifting objects also happen at the workplace.

Struck by Moving Equipment or Objects or Walking into Objects: Collisions could occur with heavy
equipment or any moving object kept either at the same level or from an object falling from the
above. A working person can also accidentally walk into an object and get injured.

Vehicle-Related Accidents: Accidents due to a crash or impact injuries are also quite frequent in
workplaces. These often involve cars, lorries, or even small vehicles, such as forklift trucks, and at
times result in serious injuries.

3. What are the types of disasters leading to accidents and emergencies? Give some examples.
Slips, Trips, and Falls: Slips and trips can result in falls. Slips can occur due to slippery floor, leaks
from materials or debris left in walkways, uneven floor or working surfaces.

Getting Caught in or Between Hazards: Sometimes minor cave-ins, such as being pulled into or caught
in machinery and equipment or being compressed or crushed between rolling, sliding, or shifting
ps
objects also happen at the workplace.

Struck by Moving Equipment or Objects or Walking into Objects: Collisions could occur with heavy
equipment or any moving object kept either at the same level or from an object falling from the
above. A working person can also accidentally walk into an object and get injured.

Vehicle-Related Accidents: Accidents due to a crash or impact injuries are also quite frequent in
workplaces. These often involve cars, lorries, or even small vehicles, such as forklift trucks, and at
times result in serious injuries.

Fire and Explosions: Accidents also happen because of fire or other explosive substances. In such
Ki
cases, problems may not only occur from direct contact with fires, but also because of asphyxiation,
which is caused due to the smoke generated from the fires.

4. Mention some preventive measures that can be taken to prevent accidents at the workplace.
Mention some preventive measures that can be taken to prevent accidents at the workplace.
Some of the preventive measures, to prevent accidents, are:
• Employers must provide workers with protective equipment, such as safety goggles and other
gear they need, to avoid dangerous exposure.
• Reminding employees to be vigilant.
• Removing clutter and putting it out of the way so that people would not step on it and
fall accidently.
• Effective procedures for dealing with employee grievances can help reduce the risk of fights in
the workplace; which could otherwise, result in nasty injuries.
• Good training, clear signage, and access to the necessary safety equipment can all be a big help.
• Regular risk assessments are also important.

5. What are some points to take care of while handling an accident at the workplace?

Even when organisations take appropriate workplace safety precautions and measures to avoid
injuries, accidents can happen. In such cases, how employers respond to these accidents can make
all the difference. When an injury occurs, the person in charge should follow proper protocols to

© Kips Learning Pvt. Ltd 2023


handle a work-related injury or illness. Some such protocols are as follows:

Care for the Affected Employee: The employees’ safety comes first and getting an injured
employee preliminary treatment quickly is crucial.
• A proper evaluation of the situation should be done.
• An employee, who is trained in first-aid, should attend to the injured person right away.
• In an emergency situation, an ambulance should be called. In non-emergency situations,
the injured employee should be taken to a medical care facility at the earliest.
• The family of the employee should be notified immediately about the situation.
Secure the Scene and Evacuation: In case of a serious accident, access to the accident site should
be blocked to avoid any further damage. The site of a serious accident needs to be secured as
quickly as possible to preserve the physical evidence for investigative purposes.
If there is a potential of the other employees being affected, an evacuation of the premises should
be carried out to prevent further injuries or fatalities. The operations of the workplace need to be
shut down in such emergencies.
Proper Reporting of the Accident: After ensuring the employees’ safety, proper paperwork and
documentation must be completed. The accident’s report should be completed to help investigate
the accident and the required documents for processing the claim from the insurance company
should be filled in.

CHAPTER 25: Protecting Health and Safety


ps
A. Select the correct option.
1. A workplace hazard refers to a situation within the workplace that has the potential to cause
……………………… .
c. Both a and b
2. Some of the hazardous physical agents at a workplace include ……………………… .
a. Radiation
3. One of the most important ways of avoiding potential injuries during work is ……………………… .
b. Identifying possible hazards before accidents occur
4. During the development of an evacuation plan, one must think about ……………………… .
c. Both a and b
5. Healthy snacks at a workplace include ……………………… .
b. Fruits and nuts
Ki
B. Fill in the blanks.
1. A ………………………… is any agent that can cause harm or damage to human life, property, or the
environment. (Hazard)
2. ………………………… practices at work like sitting for long hours and incorrect posture can cause stress
injuries to muscles or bones. (Unhealthy)
3. A good workplace ………………………… results in long term health and wellness amongst the employees.
(Health program)
4. Good health and fitness require a ………………………… commitment and discipline. (Long-term)
5. Apart from physical health, a ………………………… health program should also be created for the
employees. (Mental)

C. Answer the following questions.

1. What are workplace hazards? Why is it important to identify and monitor hazards at the
workplace?
Ans: Every workplace has its own unique environment and equipment. It is important that all
potential emergency situations, like accidents, injuries, and health issues should be anticipated and
identified so as to be prepared with a proper response plan, when and if such incidences occur. This
will result in controlling the threats to human life and damage to property. It should not be just a
one-time activity but an ongoing process. Proper planning will result in an effective safety and
health program at the workplace.

2. Give any three examples of workplace hazards.


Ans: Three examples of workplace hazards are:

© Kips Learning Pvt. Ltd 2023


• Improperly fitted or guarded moving parts that can hit a person
• Getting hit by sharp edges, corners, or parts that are protruding out from the equipment
• Working at potentially hazardous places, like heights where there is possibility of a fall, or narrow
places where one could get trapped

3. When does it become necessary to evacuate a workplace?

Ans: At the workplace, emergencies may arise due to several hazards. Often, the best protection in
an emergency is to move out from where one is and shift to a safer place. When there are
emergencies, like fires, hazardous chemical spills, radiation leakages, terrorism threats, or some
health crisis, the workplace may need to be evacuated. For example, when a building catches fire,
everyone in it must leave it and move out to a pre-decided safe area.

4. Mention any three tips for healthy living of working people.


Ans: Three tips for healthy living of working people are:
• Eating Healthy: It is said, ‘You are what you eat’. Having a healthy breakfast in the morning, lunch
that is nutritious and avoiding junk and fried food are some of the key factors in maintaining
one’s health.
• Having Adequate Amount of Water: While working, one tends to lose track of the amount of
water consumed. Drinking adequate amount of water is extremely essential to maintain the
body temperature and other important functions of the body.
ps
• Limit Drinks with Caffeine: Office goers often get into the habit of having tea, coffee, or
other caffeinated beverages frequently and in large amounts.

5. What are the benefits of a workplace helping its employees to make wise food choices and active
living?

Ans: The availability of healthy food at the workplace, like fresh fruits and dry fruits, healthy snacks,
juices, and healthy food in the canteen as well as during official programs and meetings can establish
a culture of eating healthy at the workplace. This would, in turn, result in employees making healthy
food choices in their personal life too.
Ki
SECTION 4: APPLICATION BASED QUESTIONS (UNSOLVED)
1. You go to a restaurant with your friends and find that some un-insulated electric wires are hanging lose
from some electrical outlets. Also, there is no fire-fighting equipment around. What safety measures would
you suggest to the restaurant manager?
Ans: An electric safety program should be established by all organisations and followed properly.
• Electrical installations should be done and maintained by a competent person and
checked regularly.
• Extension cables, plugs, sockets, and other flexible leads and their connections that are
particularly prone to damage should be visually checked, maintained, and where necessary,
replaced before using any equipment.
• Correct cable connectors or couplers should be used to join cables together; taped joints
should not be allowed.
• Electrically powered equipment should be used.
• A fuse protects the device from over current. It is designed to ‘blow’ and cut off the
electricity when the current exceeds its rated capacity.
• It is important to ensure that the correct fuse is used for all appliances.
• Employees working in areas where there are potential electrical hazards must be provided
with appropriate, safe, and tested protective equipment.

2. A new mall has opened in Rahul’s city. On visiting it, he almost slipped on the wet floor, which was
being
cleaned by the cleaners. Also, there was no railing on the stairs that go to the second floor of the building

© Kips Learning Pvt. Ltd 2023


and the area near the stairs was also not well-lit. What suggestions should Rahul give to the mall manager
to make the mall a safer place?
Ans: Rahul should ask the mall manager to have stairways/Handrails in order to reduce the risk
of such injuries, stairwells should have handrails, be kept clear of clutter, well lit, and free from
any unsecured objects, like rugs and carpets. The first and last stair should always be well
marked.
They should also provide ladders and accessible step stools can help reduce the chances of a fall
by helping employees reach heights safely. Availability of these, reduces the chances of
employees using unstable objects or other furniture to climb.

3. Rohit visits an office where people sit for hours on computers and work. He finds that the personnel are
suffering from back problems and eye strain. What suggestions can he give to the management to correct
this situation?

Ans: Most office systems are computerised now and staring at computer screens
for hours while working causes eyestrain and damage to them in the long run. Rohit can suggest the
following points:
Atleast an arms-length distance should be maintained from the screen. One must also look away from the
screen at regular intervals to reduce eyestrain and long-term damage to the eyes.
One should take short breaks every half an hour, performing desk exercises or even having standing
desks at the workplace.
ps
4. Vandana has been recently promoted as a manager in her office and wants to improve and maintain
hygiene in her office. What advise should she give to the people working in the office in order to maintain
a clean and healthy environment?
Ans: Office desks, copy machines, computer screens, and keyboards as well as mobile screens are some of
the places that have a lot of microbes, which may cause infections. Vandana can ask the employees to clean
all the objects used at the workplace regularly, using surface disinfectants and sanitising wipes. One must
wash one’s hands regularly with soap to stay healthy and germ-free.

5. Kalpana is a manager. She has been shifted to a new branch of her company. On reaching there, she
notices that the employees are overworked, tired, and stressed and aren’t as efficient or productive as
Ki
they should be. What action should she take to build a better work culture at the new branch?

Ans: Kalpana can educate employees with work-life balance and can also encourage physical fitness to
refresh themselves by working out and staying energised for the entire day. She can inform employees that
drinking adequate amount of water is extremely essential to maintain the body temperature and other
important functions of the body.

SECTION 5: SHORT ANSWER TYPE QUESTIONS (UNSOLVED)

1. What are the damaging effects of electric shocks, arc faults, arc flash, and arc blast?
Ans: An electric shock is a shock that occurs when a person comes in contact with a source of
electrical energy. A person experiences a shock when this electrical energy flows through the
body.
An arc fault is initiated by the passing of the current between the two conducting metals
through ionised gas or vapour, which is caused by a flashover or other conductive material.
An arc fault results in a massive electrical explosion. This results in an arc flash, which is the light
and heat from the explosion and an arc blast, which is a pressure wave that follows.

2. Describe a typical first-aid kit.


Ans: The first aid kit should include basic equipment for administering first aid for
injuries. In order to know what contents are actually needed inside a first aid kit, a
risk assessment of the workplace is required. The kits must be identifiable with a
white cross on a green background and made of a material that will protect its

© Kips Learning Pvt. Ltd 2023


contents from dust, moisture, and contamination.

3. After an accident occurs, what measures should be taken to prevent its recurrence?
Ans: The preferable scenario is, of course, to prevent accidents by providing adequate safety
equipment and putting the right procedures, including training, in place.
Some of the preventive measures, to prevent accidents, are:
• Employers must provide workers with protective equipment, such as safety goggles and other
gear they need, to avoid dangerous exposure.
• Reminding employees to be vigilant.
• Removing clutter and putting it out of the way so that people would not step on it and
fall accidently.

4. What are the aspects that one must consider while developing an evacuation plan?
Ans: Preparing a proper emergency action plan, which should include the following:
• There should be an emergency evacuation plan ready for emergencies.
• There should be clearly marked and well lit, unobstructed evacuation routes and emergency exits.
• Employees should be able to have an access to lists with names and telephone numbers
of emergency contacts.
• Procedures for employees to shut down critical plant operations, operate fire extinguishers, or
perform other essential services before evacuating should be clearly communicated as a part of
ps
the emergency plan.
• Employees should be trained in first-aid procedures.
• Practice drills for emergency action plans should be regularly conducted.
• Make sure emergency/ fire alarms are recognised by all the employees.
• Employers should have a reporting system in place for all accidents and dangerous incidents.

5. How can employee manage stress at the workplace to avoid some potential health issues?
Ans: Try to juggle the roles and responsibilities at work and home can lead to exhaustion and mental
stress. This may impact the quality of life and also have an adverse effect on the physical health. One
great way to beat stress is to do things one enjoys. These may include spending time with family or
friends, watching movies, listening to music, reading books, and exercising. A healthy work-life
Ki
balance can help to avoid future mental and physical health issues.

SECTION 6: LONG ANSWER TYPE QUESTIONS (UNSOLVED)


1. As a part of the first-aid training, what knowledge should be given to the trainees?
Ans: The first few minutes after an accident or emergency are extremely important. In a lot of cases, the
recovery of the victims and their lives depend on the first-aid provided at the scene of the accident. In such a
situation, a person who is trained in first-aid can stop the condition of the affected person from becoming
worse and even save lives. Prompt, properly administered first aid care can mean the difference between life
and death, rapid versus prolonged recovery, and temporary versus permanent disability. It is important to
have qualified first-aiders at the workplace. There are nationally accredited training courses as well as
certain other equivalent courses available to empower people to become qualified first-aiders. Only
employees trained in first aid should assist a victim. As part of their emergency training, employees should
know how to respond during an injury or illness situation, while not causing any further damage.

2. What are the electric safety measures that should be taken by the organisations to prevent electrical

accidents?
Ans: An electric safety program should be established by all organisations and followed properly.
• Electrical installations should be done and maintained by a competent person and checked regularly.
• Extension cables, plugs, sockets, and other flexible leads and their connections that are particularly
prone to damage should be visually checked, maintained, and where necessary, replaced before
using any equipment.
• Correct cable connectors or couplers should be used to join cables together; taped joints should not

© Kips Learning Pvt. Ltd 2023


be allowed.
• Socket outlets should not be overloaded by the use of adaptors.
• Electrically powered equipment should be used.
• Fixed electrical equipment should have a clearly identified switch to cut off power in an emergency.
• A fuse protects the device from over current. It is designed to ‘blow’ and cut off the electricity
when the current exceeds its rated capacity.

3.What are the different types of accidents that can occur at a workplace?
Ans: The different types of accidents that can occur at a workplace includes:
• Slips, Trips, and Falls: Slips and trips can result in falls. Slips can occur due to
slippery floor, leaks from materials or debris left in walkways, uneven floor or
working surfaces, protruding nails and boards, bunched up floor mats or uneven
carpeting, holes or depressions in working surfaces, or uneven stairs.
• Getting Caught in or Between Hazards: Sometimes minor cave-ins, such as being pulled into or
caught in machinery and equipment or being compressed or crushed between rolling, sliding, or
shifting objects also happen at the workplace.
• Struck by Moving Equipment or Objects or Walking into Objects: Collisions could occur with heavy
equipment or any moving object kept either at the same level or from an object falling from the
above. A working person can also accidentally walk into an object and get injured.
ps
• Vehicle-Related Accidents: Accidents due to a crash or impact injuries are also quite frequent
in workplaces. These often involve cars, lorries, or even small vehicles, such as forklift trucks,
and at times result in serious injuries.

• Fire and Explosions: Accidents also happen because of fire or other explosive substances. In such
cases, problems may not only occur from direct contact with fires, but also because of
asphyxiation, which is caused due to the smoke generated from the fires.

4. What are the important features of an effective emergency action plan?


Ki
Ans: Preparing a proper emergency action plan, this should include the following:
• There should be an emergency evacuation plan ready for emergencies.
• There should be clearly marked and well lit, unobstructed evacuation routes and emergency exits.
• Employees should be able to have an access to lists with names and telephone numbers
of emergency contacts.
• Procedures for employees to shut down critical plant operations, operate fire extinguishers, or
perform other essential services before evacuating should be clearly communicated as a part of
the emergency plan.
• Employees should be trained in first-aid procedures.
• Practice drills for emergency action plans should be regularly conducted.

5.What steps should be followed in case of an evacuation?


Ans: In the event of an emergency, such as a fire or chemical spill, which requires evacuation, always
consider the following points:
• The first person to notice the emergency should activate the emergency alarm or
inform a senior officer and proceed to leave the building immediately.
• On noticing a hazard, be safe and then alert the emergency control personnel of your
organisation as soon as possible. If unsafe, then, on reaching a safe location and distance,
alert the personnel and call the relevant emergency services, like the fire department with
the information about the emergency and its location. Medical services, like hospitals and
ambulance can also be called if there are any injured people that require medical attention.
• On hearing an evacuation alarm, or on instruction of emergency control personnel, all

© Kips Learning Pvt. Ltd 2023


personnel should immediately stop all the activities and follow the evacuation procedure. Do
not attempt to collect personal items except for your wallet or purse. If there is an
emergency kit nearby, take it with you.
• Shut down any hazardous equipment or processes, if practical, without endangering yourself
or others.
• In the case of a fire, before opening a door, feel it for heat. If it is hot, do not touch or open
it. Stay low if there is smoke in the room or passageway. Do not break windows unless
absolutely necessary for ventilation and escape.
• If it is safe to leave, close doors, but do not lock them.
• Use a fire extinguisher only if it is safe to do so and you know how to use it.
• In case of a fire, do not use a lift to evacuate a building.
• Follow the directions given by the emergency control personnel and assist with the
general evacuation, if directed to do so by them.
• Help with the evacuation of the disabled personnel.
• All the people in the building should walk quickly to the nearest exit and ask the others to do
the same.
• In case there is a designated evacuation area, move calmly towards it and do not leave
the evacuation assembly area until the ‘All Clear’ has been given.
• Do not return to the building until it has been declared safe.
• Remain calm, do not panic, and proceed calmly and without pushing others towards the
exit. If the exit is blocked or crowded, use a secondary exit.
ps
• Alert others to the nature and location of emergency on your way out.
• Assist any person in immediate danger, but only if you are safe to do so.
Ki

© Kips Learning Pvt. Ltd 2023

You might also like