0% found this document useful (0 votes)
12 views

O Level Module 1 M1 R5 Information Technology & Tools and Network

Uploaded by

abhay.kl9965
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

O Level Module 1 M1 R5 Information Technology & Tools and Network

Uploaded by

abhay.kl9965
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 192

Search on TG: @apna_pdf

NIELIT(DOEACC) O'level Revision-V

O'level
Module-1[M1-R5]
Information Technology Tools
&
Network Basics
Study Material
&
Objective Question Bank
Chief Editor
A. K. Mahajan
Compiled and Edited by
Mahima Tripathi
Computer Graphics by
Balkrishna, Charan Singh, Anurag Pandey
Editorial Office
12, Church Lane Prayagraj-211002
Mob. : 9415650134
Email : [email protected]
website : www.yctbooks.com / www.yctfastbook.com
© All rights reserved with Publisher
Publisher Declaration :
Edited and Published by A.K. Mahajan for YCT Publications Pvt. Ltd. and printed by Roop
Printing Press, Prayagraj. In order to Publish the book,
full care has been taken by the Editor and the Publisher,
still your suggestions and queries are welcomed. Rs. : 395/-
In the event of any dispute, the judicial area will be Prayagraj.
Search on TG: @apna_pdf
CONTENTS
M1R5
Information Technology Tools & Network Basics
1. INTRODUCTION OF COMPUTER 2.7 Icons & Shortcuts --------------------------------------------41
1.0 Introduction ---------------------------------------------------- 7 2.8 Running an application window -------------------------43
1.1 Types of Computer ------------------------------------------- 7 2.9 Operating System Simple Setting------------------------45
(i) Characteristics of Computer --------------------------- 8 (i) Using Mouse and changing its Properties ---------45
(ii) Basic Applications of Computer --------------------- 8 (ii) Changing System Date and Time -------------------47
(iii) Latest IT Gadgets --------------------------------------- 9 (iii) Changing Display Properties of System ---------48
1.2 Evolution of Computers & its Applications ----------- 9 2.10 To Add or Remove Program and Features -----------49
(i) Generation of Computer ------------------------------ 10 2.11 Adding, Removing to Sharing Printers ----------------50
1.3 IT Gadgets and their Applications --------------------- 11 2.12 File and Folder Management -----------------------------51
1.4 Basics of Hardware and Software ---------------------- 11 2.13 Types of File Extension -----------------------------------55
(i) Software --------------------------------------------------- 12 2.14 File Struture---------------------------------------------------55
1.5 Central Processing Unit (CPU) ------------------------- 12 2.15 File Handling in Linux -------------------------------------55
(i) Types of Processing ------------------------------------ 12 2.16 Other Important Points ------------------------------------57
(ii) Processor Speed ---------------------------------------- 13 (i) Open Office Software ----------------------------------57
(iii) Cache Memory ----------------------------------------- 13 (ii) GNU Project ---------------------------------------------57
(iv) Levels of Cache Memory --------------------------- 13 (iii) Difference Between Open Source Software and
(v) Importance of Cache Memory ---------------------- 14 Proprietary -----------------------------------------------58
1.6 Input Devices ------------------------------------------------ 14 (iv) Introduction of Ubuntu Operating System ------58
1.7 Output Devices --------------------------------------------- 17 (v) Method to Download Ubuntu ------------------------58
1.8 Computer Memory and Storage ------------------------ 19 Practice Questions with Explanatory Solutions ---58-61
(i) Booting ---------------------------------------------------- 22 3. WORD PROCESSING
(ii) Computer System -------------------------------------- 23 3.0 Introduction----------------------------------------------------62
(iii) Number System ---------------------------------------- 24
3.1 Word Processing Basic -------------------------------------62
(iv) Coding Scheme ---------------------------------------- 27
(i) Introduction of Libre office Writer -----------------62
(v) EBCDIC Code ------------------------------------------ 29
(vi) UNICODE ---------------------------------------------- 29 (ii) Objective -------------------------------------------------62
1.9 Application Software --------------------------------------- 29 (iii) Comparision of Libre office and Microsoft
1.10 System Software -------------------------------------------- 29 office -------------------------------------------------------62
1.11 Utility Softwre ---------------------------------------------- 30 3.2 Opening Word Processing Package ---------------------62
(i) Utility Program ------------------------------------------ 30 3.3 Menu/Ribbon and Tabs-------------------------------------63
1.12 Open Source and Proprietary Software -------------- 31 (i) Libre Office Document Window --------------------63
1.13 Mobile Apps ------------------------------------------------ 31 (ii) Side Bar ---------------------------------------------------63
Practice Questions with Explanatory Solutions--- 33-35 (iii) Style and Formatting ----------------------------------63
2. INTRODUCTION OF OPERATING (iv) Toolbar ----------------------------------------------------63
SYSTEM (v) Status bar -------------------------------------------------64
2.0 Introduction --------------------------------------------------- 36 3.4 Creating a New Document --------------------------------64
2.1 Operating System ------------------------------------------- 36 (i) Creating Document Using Blank Templates -----64
2.2 Basics of Operating System ------------------------------ 36 3.5 Opening and Closing Documents ------------------------65
2.3 Operating Systems for Desktop and Laptop --------- 36 (i) Save and Save as ----------------------------------------65
(i) DOS (Disk Operating System) ---------------------- 36 (ii) Save a Document Automatically -------------------65
(ii) Windows Operting System -------------------------- 37 (iii) Closing Document -------------------------------------66
(iii) Linux Operating System ---------------------------- 37 3.6 Using the Help ------------------------------------------------66
A. Basic Elements of Linux --------------------------- 37
3.7 Page Setup -----------------------------------------------------66
B. Feature of Linux Operating System-------------- 38
(i) Page Orientation ----------------------------------------66
C. Key Differences between Windows and Linux
Operating System------------------------------------- 38 (ii) Paper Margin and Size --------------------------------67
(iv) Mac Operating System ------------------------------- 38 (iii) Page Layout Borders, Watermark -----------------67
2.4 Operating Systems for Mobile Phone and Tablets - 38 A. Page Layout----------------------------------------------67
2.5 User Interface for Desktop and Laptop ---------------- 39 B. Border -----------------------------------------------------67
2.6 Taskbar--------------------------------------------------------- 41 C. Water Mark ----------------------------------------------68
2
Search on TG: @apna_pdf
3.8 Print Preview, Printing of Documents ----------------- 68 4.18 Formulas, Functions and Charts -------------------------97
(i) Print Preview --------------------------------------------- 68 (i) Use of Formulas------------------------------------------97
(ii) Printing of Documents ------------------------------- 68 (ii) Autosum Feature ----------------------------------------97
3.9 PDF File and Saving a Document as a PDF File --- 69 (iii) Functions -------------------------------------------------97
3.10 Text Creation and Manipulation ------------------------ 69 4.19 Difference Between function and formula in Calc 101
(i) Document Creation ------------------------------------- 69 4.20 Database Function ---------------------------------------- 101
(ii) Editing Text --------------------------------------------- 70 (i) DAVERAGE ----------------------------------------------- 102
(iii) Text Selection ------------------------------------------ 70 (ii) DSUM ----------------------------------------------------- 102
(iv) Cut, Copy and Paste ---------------------------------- 71 (iii) DCOUNT ------------------------------------------------- 102
(v) Font Color, Style and Size Selection ------------- 72 (v) DMAX ----------------------------------------------------- 102
(vi) DMIN ----------------------------------------------------- 102
(vi) Bold, Italic and Underline -------------------------- 72
4.21 Pivot Table Chart ----------------------------------------- 102
(vii) Changing Color --------------------------------------- 72
Practice Questions with Explanatory Solutions 106-107
(viii) Alignment of Text ---------------------------------- 73
(ix) Undo and Redo ---------------------------------------- 73 5. PRESENTATION
3.11 Auto Correct & Spell Checking------------------------ 74 5.0 Introduction-------------------------------------------------- 108
3.12 Using Find and Replace ---------------------------------- 75 5.1 Basic Feature of Libre Office Impress --------------- 108
3.13 Formatting the Text --------------------------------------- 75 5.2 Creation of Presentation ---------------------------------- 109
(i) Paragraph Indenting ------------------------------------ 75 (i) Creating a Presentation Using an Installed
(ii) Bullet and Numbering -------------------------------- 76 Template ----------------------------------------------------- 109
(iii) Using Change Case Command -------------------- 77 (ii) Creating Blank Presentation ----------------------- 109
3.14 Header & Footer ------------------------------------------- 77 (iii) Entering and Editing Text ------------------------- 109
3.15 Table Manipulation --------------------------------------- 78 (iv) Inserting and Deleting Slides in a Presentation110
(i) Insert and Draw Table --------------------------------- 78 (v) Saving the presentation ------------------------------ 111
(ii) Changing Cell width and Height ------------------- 79 5.3 Manipulating Slides --------------------------------------- 111
(iii) Deletion/Insertion of Row & Column ----------- 79 (i) Inserting table------------------------------------------- 111
3.16 Borders and Shading -------------------------------------- 79 (ii) Adding Clipart Pictures ----------------------------- 113
3.17 Mail Merge -------------------------------------------------- 80 (iii) Inserting other objects ------------------------------ 113
3.18 Table of Contents ------------------------------------------ 80 (iv) Resizing and scaling on object-------------------- 113
(i) Creating a Table of Contents ------------------------ 80 (v) Creating and Using Master Slide ----------------- 114
(ii) Editing a table of Content --------------------------- 81 5.4 Presentation of Slides ------------------------------------- 114
(iii) Updating and deleting the table of Contents --- 81 (i) Viewing a Presentation ------------------------------- 114
3.19 Adding Comments ---------------------------------------- 81 (ii) Choosing a setup for presentation ---------------- 115
3.20 Tracking Changes ----------------------------------------- 81 (iii) Adding Headers and Footers ---------------------- 115
3.21 Macro --------------------------------------------------------- 81 (iv) Printing Slides and Handouts --------------------- 115
3.22 Key Board Shortcuts -------------------------------------- 82 5.5 Slide Show -------------------------------------------------- 116
Practice Questions with Explanatory Solutions--- 83-84 (i) Running a Slide Show -------------------------------- 116
(ii) Transitions and Slide Timings --------------------- 116
4. SPREADSHEET (iii) Automating a Slide Show -------------------------- 117
4.1 Introduction --------------------------------------------------- 85
5.6 Providing Aesthetics -------------------------------------- 117
(i) Elements of Spreadsheet ------------------------------ 85
(ii) Opening of Spreadsheet ------------------------------ 85 (i) Enhancing Text Presentation ----------------------- 117
(iii) LibreOffice Calc Interface -------------------------- 85 (ii) To Change Shape fill Color ------------------------ 119
4.2 Creation of Spreadsheets ---------------------------------- 86 (iii) Adding Movie or Video & Sound --------------- 119
4.3 Concept of Cell Address [Row and Column] and Practice Questions with Explanatory Solutions 120-122
Selecting a Cell --------------------------------------------- 86 6. INTRODUCTION OF INTERNET
4.4 To Enter Text, Numbers and Data in a Worksheet - 87 & WWW
4.5 Page Setup ---------------------------------------------------- 89 6.0 Introduction ------------------------------------------------ 123
4.6 Printing a Worksheet --------------------------------------- 89 6.1 Basics of Computer Network --------------------------- 123
4.7 Saving a Workbook----------------------------------------- 90 (i) Transmission Media ---------------------------------- 124
4.8 Opening a Workbook -------------------------------------- 90 (ii) Local Area Network (LANs) ---------------------- 125
4.9 Manipulation of Cells & Worksheet ------------------- 90 (iii) Metropolitan Area Networks (MANs) --------- 126
4.10 Modifying Editing Cell Contents----------------------- 90 (iv) Wide Area Networks (WANs) -------------------- 126
4.11 Formatting Cells -------------------------------------------- 91 6.2 Network Topology----------------------------------------- 128
4.12 Cut, Copy, Paste & Paste Special ---------------------- 92 (i) Bus Topology ------------------------------------------- 128
4.13 Inserting and Deleting Rows and Columns ---------- 93 (ii) Star Topology ------------------------------------------ 128
4.14 Changing Cell Height and Width ---------------------- 94 (iii) Mesh Topology --------------------------------------- 129
4.15 Auto fill ------------------------------------------------------- 95 (iv) Ring Topology ---------------------------------------- 129
4.16 Sorting & Filtering ----------------------------------------- 96 (v) Tree Topology ----------------------------------------- 129
4.17 Freezing Pane------------------------------------------------ 96 6.3 Protocol ------------------------------------------------------- 130
3
Search on TG: @apna_pdf
6.4 Internet -------------------------------------------------------- 1318.3 Unified Payment Interface ------------------------------- 170
(i) Concept of Internet & WWW ---------------------- 131 (i) How to receive Payment Using UPI? ------------ 171
(ii) Website Address and URL ------------------------- 131 (ii) Benifits of UPI ----------------------------------------- 171
(iii) Application of Internet ------------------------------ 133 8.4 Aadhaar Enabled Payment System -------------------- 171
(i) Features of Aadhar Enabled Payment System - 171
(iv) Difference between Internet and www --------- 133
(ii) Benifits of AePS -------------------------------------- 171
(v) Difference between Internet and Intranet ------- 133
(iii) How to Use AePS? ---------------------------------- 172
6.5 ISP and Role of ISP --------------------------------------- 133 8.5 Unstructured Supplementary Service Data ---------- 172
(i) Introduction to IP Address -------------------------- 134 (i) How to send money using USSD *99#, Using
(ii) Modes of Connecting Internet --------------------- 134 IFSC Code & Bank Account Number? ---------- 172
6.6 Identifying IP/MAC/IMEI of Various Devices and 8.6 Card (Credit/Debit) ---------------------------------------- 172
their Users --------------------------------------------------- 138 (i) Credit Card ---------------------------------------------- 172
6.7 Popular Web Browsers ----------------------------------- 140 (ii) Debit Card ---------------------------------------------- 173
6.8 Exploring the Internet ------------------------------------- 141 (iii) Difference between Credit and Debit Card --- 173
(i) Surfing the Web ---------------------------------------- 141 8.7 E-Wallet ------------------------------------------------------ 173
(i) Benifits of E-Wallet ----------------------------------- 173
(ii) Popular Search Engines ----------------------------- 142
(ii) Various E-Wallet Payment Gateway ------------ 174
(iii) Searching on Internet-------------------------------- 143
8.8 Point of Sale [POS] ---------------------------------------- 174
(iv) Downloading Web Pages--------------------------- 143 8.9 Internet Banking-------------------------------------------- 175
(v) Save Complete Web-Pages as PDF -------------- 143 (i) Advantages and Disadvantages of Internet
(vi) Printing Web Pages ---------------------------------- 144 Banking -------------------------------------- 175 _
Practice Questions with Explanatory Solutions 144-147 8.10 National Electronic Fund Transfer 'NEFT', Real
Time Gross Settlement 'RTGS' ------------------------ 176
.
7 E-MAIL, SOCIAL NETWORKING (i) What is IFSC -------------------------------------------- 176
AND E-GOVERNANCE SERVICES 8.11 Real Time Gross Settlement (RTGS) ---------------- 177
7.0 Introduction -------------------------------------------------- 148 8.12 Immediate Payment Service --------------------------- 177
7.1 Structure of E-mail----------------------------------------- 148 8.13 Online Payment ------------------------------------------- 177
7.2 Using E-Mail ------------------------------------------------ 149 Practice Questions with Explanatory Solutions 178-181
(i) Opening an E-mail Account ------------------------ 149 9. OVERVIEW OF FUTURSKILLS AND
7.4 Mailbox:Inbox and Outbox ------------------------------ 152 CYBER SECURITY
7.5 Creating and Sending a New E-mail ------------------ 152 9.0 Introduction to Futureskils ------------------------------ 182
(i) Replying to an E-mail Message -------------------- 153 9.1 Industrial Revolution 4.0 -------------------------------- 182
(ii) Forwarding an E-mail Message ------------------- 153 9.2 Introduction to Internet of Things [IOT]------------- 183
(i) Advantages and Disadvantages of IOT --------- 183
(iii) Turn automatic forwarding on or off ------------ 153
9.3 Big Data Analytics----------------------------------------- 184
7.6 Sorting and Searching of E-mail ----------------------- 153
(i) Characteristics of Big Data-------------------------- 184
7.7 Attaching Files with E-mail ----------------------------- 154 (ii) Applications of Big Data --------------------------- 184
7.8 E-mail Signature-------------------------------------------- 155 9.4 Cloud Computing ------------------------------------------ 185
7.9 Social Networking ----------------------------------------- 155 (i) Basic Concept of Cloud Computing -------------- 185
(i) Examples of Social Network------------------------ 156 (ii) Service Model of Cloud Computing ------------- 185
(ii) Instant Messaging ------------------------------------- 158 (iii) Advantages of Cloud Computing ---------------- 185
7.10 Introduction to Blogs ------------------------------------- 161 (iv) Characteristics of Cloud Computing ------------ 185
7.11 Basics of E-Commerce ---------------------------------- 161
9.5 Virtual Reality ---------------------------------------------- 185
7.12 Netiquette ---------------------------------------------------- 161
(i) Applications of Virtual Reality -------------------- 186
7.13 Overview of E-Governance Services Like Railway
Reservation Passport and eHospital (ORS) -------- 161 9.6 Artificial Intelligence ------------------------------------- 186
7.14 Accessing E-governance Services on Mobile Using (i) Goal of AI ----------------------------------------------- 186
"UMANG App" -------------------------------------------- 163 (ii) Applications of AI ------------------------------------ 186
7.15 Digital Locker ---------------------------------------------- 164 9.7 Social & Mobile -------------------------------------------- 187
Practice Questions with Explanatory Solutions 165-168 9.8 Block Chain Technology--------------------------------- 187
8. DIGITAL FINANCIAL TOOLS AND 9.9 3D Printing Additive Manufacturing ----------------- 187
APPLICATIONS 9.10 Robotics Process Automation -------------------------- 187
8.0 Introduction -------------------------------------------------- 169 (i) Applications of RPA ---------------------------------- 188
8.1 Digital Financial Tools ----------------------------------- 169 9.11 Cyber Security --------------------------------------------- 188
(i) Key Component of Digital Financial Services - 169 (i) Need for Cyber Security ----------------------------- 188
8.2 Understanding OTP and QR ---------------------------- 169 (ii) Securing your PC ------------------------------------- 188
(i) One Time Password ---------------------------------- 169 (iii) Securing your Smartphone ------------------------ 189
(ii) Quick Resoponse Code [QR] ----------------------- 170 Practice Questions with Explanatory Solutions 189-192
4
Search on TG: @apna_pdf
M1-R5
NIELIT Syllabus 'O' Level, Information Technology
Tools and Basics of Network (Revision V)
Outline of Course
1. Introduction to Computer, Introduction to Operating System 10
2. Word Processing 20
3. Spreadsheet 20
4. Presentation 20
5. Introduction to Internet and WWW, E-mail, Social Network and e- 20
Governance Services
6. Digital Financial Tools and Applications, Overview of Future Skills & Cyber 10
Security
7. Total 100
Detailed Syllabus
(i) Introduction of Computer
Computer and Latest IT gadgets, Evolution of Computers & its applications, IT gadgets
and their applications, Basics of Hardware and Software, Central Processing Unit, Input
devices, Output devices, Computer Memory & storage, Application Software, System
Software, Utility Software, Open source and Proprietary Software, Mobile Apps.
(ii) Introduction to Operating System
Operating System, Basics of Operating system, Operating Systems for Desktop and
Laptop, Operating Systems for Mobile Phone and Tablets, User Interface for Desktop and
Laptop, Task Bar, Icons & shortcuts, Running an Application, Operating System Simple
Setting, Using Mouse and Changing its Properties, Changing System Date and Time,
Changing Display Properties, To Add or Remove Program and Features, Adding,
Removing & Sharing Printers, File and Folder Management, Types of file Extensions.
(iii) Word Processing
Word Processing Basics, Opening Word Processing Package, Title Bar, Menu Bar,
Toolbars & Sidebar, Creating a New Document, Opening and Closing Documents,
Opening Documents, Save and Save As, Closing Document, Using The Help, Page Setup,
Page Layout, Borders, Watermark, Print Preview, Printing of Documents, PDF file and
Saving a Document as PDF file, Text Creation and manipulation, Document Creation,
Editing Text, Text Selection, Cut, Copy and Paste, Font, Color, Style and Size Selection,
Alignment of Text, Undo & Redo, AutoCorrect, Spelling & Grammar, Find and Replace,
Formatting the Text, Creating and using user defined Styles, Paragraph Indentation,
Bullets and Numbering, Change case, Header & Footer, Table Manipulation, Insert &
Draw Table, Changing cell width and height, Alignment of Text in cell, Delete/Insertion
of Row, Column and Merging & Splitting of Cells, Border and Shading, Mail Merge,
Table of Contents, Indexes, Adding Comments, Tracking changes.
(iv) Spreadsheet
Elements of Spread Sheet, Creating of Spread Sheet, Concept of Cell Address [Row and
Column] and selecting a Cell, Entering Data [text, number, date] in Cells, Page Setup,
Printing of Sheet, Saving Spreadsheet, Opening and Closing, Manipulation of Cells &
Sheet, Modifying/Editing Cell Content, Formatting Cell (Font, Alignment, Style), Cut,

SYLLABUS 5 YCT
Search on TG: @apna_pdf
Copy, Paste & Paste Special, Changing Cell Height and Width, Inserting and Deleting
Rows, Column, AutoFill, Sorting & Filtering, Freezing panes, Formulas, Functions and
Charts, Using Formulas for Numbers (Addition, Subtraction, Multiplication & Division),
AutoSum, Functions (Sum, Count, MAX, MIN, AVERAGE), Sort, Filter, Advanced
Filter, Database Functions (DSUM, DMIN, DMAX, DCOUNT, DCOUNTA), What-if
Analysis, Pivot table Charts (Bar, Column, Pie, Line).
(v) Presentation
Creation of Presentation, Creating a Presentation Using a Template, Creating a Blank
Presentation, Inserting & Editing Text on Slides, Inserting and Deleting Slides in a
Presentation, Saving a Presentation, Manipulating Slides, Inserting, Table, Adding ClipArt
Pictures, Inserting Other Objects, Resizing and Scaling an Object, Creating & using
Master Slide, Presentation of Slides, Choosing a Set Up for Presentation, Running a Slide
Show, Providing Aesthetics to Slides & Printing, Enhancing Text Presentation, Working
with Color and Line Style, Adding Movie and Sound, Adding Headers, Footers and Notes,
Printing Slides and Handouts
(vi) Introduction to Internet and WWW
Basic of Computer Networks, Local Area Network (LAN), Wide Area Network (WAN),
Network Topology, Internet, Concept of Internet & WWW, Applications of Internet,
Website Address and URL, Introduction to IP Address, ISP and Role of ISP, Internet
Protocol, Modes of Connecting Internet (Hot Spot, Wifi, LAN Cable, Broad Band, USB
Tethering), Identifying and uses of IP/MAC/IMEI of various devices, Popular Web
Browsers (Internet Explorer/Edge, Chrome, Mozilla Firefox, Opera etc.), Exploring the
Internet, Surfing the web, Popular Search Engines, Searching on Internet, Downloading
Web Pages, Printing Web Pages
(vii) E-mail, Social Networking and e-Governance Services
Structure of E-mail, Using E-mails, Opening Email account, Mailbox: Inbox and Outbox,
Creating and Sending a new E-mail, Replying to an E-mail message, Forwarding an E-
mail message, Searching emails, Attaching files with email, Email Signature, Social
Networking & e-commerce, Facebook, Twitter, Linkedin, Instagram, Instant Messaging,
(Whatsapp, Facebook, Messenger, Telegram), Introduction to Blogs, Basics of E-
commerce, Netiquetters Overview of e-Governance Services like Railway Reservation,
passport, e-Hospital [ORS], Accessing e-Governance Services on Mobile Using
"UMANG APP", Digital Locker
(viii)Digital Financial Tools and Applications
Digital Financial Tools, Understanding OTP [One Time Password] and QR [Quick
Response] Code, UPI [Unified Payment Interface], AEPS [Aadhaar Enabled Payment
System], USSD [Unstructured Supplementary Service Data], Card [Credit/Debit], e-
Wallet, Pos [Point of Sale], Internet Banking, National Electronic Fund Transfer (NEFT),
Real Time Gross Settlement (RTGS), Immediate Payment Service (IMPS), Online Bill
Payment
(ix) Overview of Future skills and Cyber Security
Introduction to Internet of Things (IoT), Big Data Analytics, Cloud Computing, Virtual
Reality, Artificial Intelligence, Social & Mobile, Blockchain Technology, 3D Printing/
Additive Manufacturing, Robotics Process Automation, Cyber Security, Need of Cyber
Security, Securing PC, Securing Smart Phone.
SYLLABUS 6 YCT
Search on TG: @apna_pdf

1 INTRODUCTION TO COMPUTER

1.0 Introduction: subtraction etc. Except calculation, we do many


The word computer is derived from the English word activities, they are called data processing.
'Compute' which means 'to calculate'. Therefore, the A computer stores and processes data as well as
literal meaning of computer is- 'Calculating', Computer retrieves it when needed. Computer is capable of storing
is such a machine, which helps us in calculations. data and analyzing it in a fast and error-free manner.
Computer was invented mainly to calculate, in olden There are three main types of computer-
times computer was used only for calculation but (1) Analog computer
nowadays it is used for making documents, send e- (2) Digital computer
mail, watching and listening to audio and video, (3) Hybrid computer
playing games, creating databases as well as in many (1) Analog Computers–Those computers which
other works. measure physical units (pressure, temperature, length
The computer only works that the user tells it to do. It etc.) and convert them into numbers are analog
only follows those commands, which are already fed computers. These computers measure any unit on the
inside the computer. basis of comparison.
In modern times, computer has become an essential (2) Digital Computers–This category belong those
part of our life and we can easily use many available computers which calculate numbers. They do all kinds of
application software packages for many tasks. work which can be done on a computer. Most computers
belong under the category of digital computers. Digital
1.1 Types of Computer: computers convert data and programs into 0's and 1's and
take them into electronic form.
A computer is an electronic device that
automatically accepts and stores data, manipulates it, and On the basis of size and function, there are four
produces output under the direction of a detailed step-by- types of computer-
step program of stored instructions. (i) Mainframe Computer: They are very large in
size and the number of micro processors is also high in
it. They usually use 32 or 64 bit microprocessors. Many
■ Raw facts are called data.
people do different things on it at the same time.
■ Meaningful data is called information.
Its working and storage capacity is very high and
■ The commands which tell the computer what to do speed is also very fast. It is used in big companies,
are called instructions. banks, defense research etc.
■ Computer as a machine and all the other devices (ii) Mini Computer: These are smaller in size than
connected to it which we can feel by touch are called mainframe computers while larger than micro computers.
hardware. These computers are capable in storage capacity and
Monitor
C.P.U speed. It is used in passenger reservation, big office,
Printer
company etc.
Mick (iii) Micro Computer: Its development started from
1970 AD when micro processor started being used in
CPU. First it was developed by IBM Company. In this,
8, 16, 32 or 64 bit micro processor is used. The
Speakers Keyboard development of multimedia and internet has increased
Mouse the utility of microcomputers. It is being used in many
areas such as home, office, school, business etc.
Figure 1.1 Parts of a computer system (iv) Super computer: Super computer is the fastest
computer in the world, which can process data very fast.
■ A set of instructions that tells the user what to do is Compared to a general purpose computer, the computing
called a program. performance of a supercomputer is measured much
■ A set of programs that perform a specific task is higher. The computing performance of supercomputers is
called software. measured in FLOPS (Floating Point Operating Per
Computer is an electronic machine in which we Second) instead of MIPS. Supercomputers have
perform arithmetic operations such as addition, thousands of processors, which can perform billions and
trillions of calculations per second.
M1R5 7 YCT
Search on TG: @apna_pdf
(3) Hybrid computer– Such computers which are ■ Computer controlled robots are used in those areas
capable of doing the work of both analog and digital where there is danger to human life. Like as deep sea
computers are called hybrid computers. By converting exploration, Computers are used in nuclear research
data from analog to digital and from digital to analog in etc.
hybrid computer results are obtained. Business Application– Maximum use of computers
is in shops, banks, insurance credit companies etc.
1.1(i) Characteristics of Computer: Working without computers has become impossible for
The main characteristics of computer are following- the financial world.
Speed– The biggest quality of computer is fast Many industrial institutions such as steel, chemical,
speed of calculation. Computer can do millions of oil companies etc. are dependent on computers. E-
calculations in a second. Presently the computer can also commerce is a utility of the Internet; with the help of it
do calculations in nanoseconds (10 seconds). Generally business can be through electronic means. Computers
Computer speed becomes 2 to 4GHz. provide updated information about the business position
Storage– Computer can store huge amount of of the management in text and graphics from charts,
information in its memory. It has the capacity to store graphs etc. quickly and at very low cost.
data and programs. Information is stored electronically in Entertainment– Computers are often used in the
the computer, so the possibility of information being lost field of entertainment in the form of movies, television
is negligible. programs, video games, etc. With the help of computer
Accuracy– The rate of accuracy in working of graphics, such special effects are also shown in films
computer is very high. If the data and program are which were not possible earlier. The use of multimedia
correct, then the computer always gives the correct has made the computer the best means of entertainment.
result. Sometimes errors also occur in the computer due Animation films are made on a computer only and later
to virus. they are transferred to television medium.
Consistency– Just opposite to humans, computers Communication– The use of computer has made
are machines that work in a non-conflicting manner. possible the use of internet in the field of
There is no effect on the work quality of the computer communication. Telephone and internet have given rise
even after doing the same work repeatedly and to the communication revolution. But computers are also
continuously. By giving instructions to the computer, one used in fiber optics communication, to transfer message
or several types of work can be done repeatedly with the using e-mail which saves time and paper.
same reliability and speed. Computers are also used to talk on the telephone to
Flexibility– Computer is the first general purpose people in other countries at low cost, which is called
machine made by man. All other machines do only Internet telephone.
single type of work, such as televisions, refrigerators or Medicine– In the field of medicine, computers are
typewriters can do only one thing for which they are widely used in the detection of diseases inside the body,
made. On the contrary, many tasks can be done their analysis and diagnosis.
simultaneously on the computer. Example- Typing Computer is used in CT scan, ultrasound, X-ray, eye
letters, sending fax, watching movies, listening to music, test etc.
designing building bridges etc. Engineering– Computers are also used in the field
1.1(ii) Basic Applications of Computer: of engineering from the design stage to the
In the modern era, there is hardly any field where manufacturing process control.
computers are not used. Computers can be used in Computers are used to perform difficult
different applications by changing different types of mathematical calculations. Microscopic study of Planets,
software packages. Following are the applications of Satellites and space events is done due to the fast
computers in some of the main areas- computing power of the computer.
Word Processing– A word processor is a software In electronics engineering, computers are used to
package, by using it we can create, modify, print and design and test integrated circuits that are used in radios,
save a document faster than preparing it by hand. televisions, and computers.
Creating a document means typing from the keyboard, Book Publishing– The use of computer in
correcting spelling mistakes in the document, deleting publishing and printing makes it convenient and
attractive. Creating diagrams and graphs is now
and adding words, joining sentences or paragraphs, etc.
convenient. In DTP (Desk Top Publishing) anyone can
Scientific Research: easily design and write books with the help of a
■ Computer's help is being taken in solving many computer and a laser printer. Many books writing tasks
complex mysteries of science. which earlier used to take many hours by hand can now
■ Proper assessment of situations is also possible with be done easily with the help of computer (PC) and DTP
the help of computer. software.

M1R5 8 YCT
Search on TG: @apna_pdf
In Banks–The application of computer in banks has
brought a revolution. Today, computers are being used
for most of the time-consuming tasks of banks like
online banking, withdrawing money from ATMs,
payment of cheques, counting money, passbook entry
etc. Different branches of banks are connected through
computer network, so clearing of cheques like
interbranch transaction can also be done immediately.
Games– Many types of video games are played on Figure - 1.2 Laptop
the computer, they can be both entertaining and (b) PDAs (Personal Digital Assistants)– Personal
educative. Digital Assistant PDA is a hand held computer. It is also
Education– Computer has changed the picture of called palmtop. They are smaller than laptops and can be
modern education, today through internet we can get easily kept in a pocket. It is touch screen and has a
information about any subject in a few moments, schools memory card for storage of data. It is effectively used as
and colleges have also been connected to internet. But portable audio players, web browsers etc.
the emphasis is on smart class which is possible only
because of computers. The development of computer-
based education and multimedia has made it more useful
and accessible to the students. According to the
researchers, when a new concept is brought to the
students through audio-video medium from a computer,
they can learn that subject better and faster.
Personal– In modern times, people use computers to
Figure-1.3 PDA
keep their records safe and to analyze their income,
(c) Tablet PC– A tablet PC is a slate-like thin
expenditure, cost, savings etc. There is a financial
mobile computing device. There is a touch screen facility
package called SM Money which helps in calculating to operate this device. This makes it easy to operate the
income, interest insurance etc. tablet. In this, instead of physical keyboard, there is a
Accounting–Special programs like Tally 9 are virtual on-screen keyboard. Tablet PCs have a wireless
available for accounting; this program is used in adapter for Internet and LAN (Local Area Network)
maintaining the account of a company, making profit and connections.
loss account and balance sheet etc.
1.1(iii) Latest IT Gadgets:
In modern times, daily life is greatly affected by the
inclusion of IT gadgets. Gadget is generally used for
inormation and communication technology.
All devices such as mobile, radio, TV, personal
computer, PDA, landline phone etc belongs under
gadgets. These devices are being used in various fields
like education, entertainment and business, medical Figure - 1.4 Tablet PC
through specially designed applications. 1.2 Evolution of Computers & its
You can install different types of software packages Applications:
in the computer and use it in many ways. Some of the Computer is such a man-made machine that has
major IT gadgets are as follows- changed the way we work, live, play etc. It has hardly
(a) Laptop and Notebooks been 50 years since modern computers came into
(b) PDAs (Personal Digital Assistants) existence, but the history of their development is very
(c) Tablet PC old. In the last almost four decades, computers have
(a) Laptop and Notebooks– Laptop is a small and changed the way of living and working of our society.
portable computer. It is so small in size that can be Abacus– It was invented by Li Kai Chen (China) in
operated by keeping it on the lap. That's why it got name the 16th century. This is the first and simplest device. It
laptop. Notebooks are smaller in size than laptops. It can was also used for addition, multiplication and square
be easily carried in any bag. It is more expensive than root. The abacus was a rectangular wooden frame with a
desktop. It is used by reporters and other field work wire frame inside. Counting was done by circular beads
people. in horizontal wires.

M1R5 9 YCT
Search on TG: @apna_pdf

Fig-1.8 ENIAC
Fig. 1.5 Abacus EDSAC (Stored Program Concept)– It was
Pascaline or Pascal Calculator– The first invented by Marris Wilkes (UK) in 1949 AD. It was
calculating machine was built in 1645AD by Blaise developed at the University of Cambridge. According to
Pascal (France). This machine worked on the principle of the stored program concept, the operating instructions
odometer and clock. In this machine there were dialers and data that are going to be used in the processing
like many cycles and old telephones, numbers from 0 to should be stored in the computer and should be modified
9 were marked on them, these dialers were used by at the time of execution of the program as required.
rotating them. These mercury deley lines are used for memory and
vacuum tubes are used for logic.
EDVAC (Electronic Discrete Variable Automatic
Computer)– It was invented in 1950 by John Von
Newman (America). It was used to do calculations. It
was a 150 feet wide computer with the weight of 30 tons.
UNIVAC (Universal Automatic Computer)– It
was invented in 1951 by J. Prosper Eckert and John
Mauchly (America). It was used for commercial use.
Figure 1.6 Pascaline or Pascal calculator This computer can process both statistical and textual
Analytical Engine– It was invented in 1833 AD by data. It contained all the qualities of the first generation
Charles Babbage (England). It is used in all computer.
mathematical operations. It is a mechanical machine
which is considered to be the earliest form of modern
1.2(i) Generation of Computer:
computers. For this reason, Charles Babbage is After the Second World War, the development of
considered the father of computer. The five main parts of computers took place very rapidly. The purpose of
this machine were input unit, store, mill, control, output developing various reliable generations of computers has
unit. been to make cheap, small, fast and reliable computers.
First Generation Computer (1942-1955)– Vaccum
Tube was used in this. These computers were larger in
size and generated more heat. The vacuum tube took
time to heat up and after heating produced a lot of heat,
which required the use of an expensive air conditioning
system to keep it cool and consumed a lot of electricity.
In this, all instructions and information were stored in the
form of 0 and 1 and machine language was used in this.
Its speed was 333 microseconds. It was mainly used at
scientific level later in general business systems like
ENIAC, UNIVAC and MARK-1 etc. It had limited main
storage capacity.
Figure 1.7 Analytical Engine Second Generation Computer (1955-1964)– Light
ENIAC (First Electronic Computer)– ENIAC small transistors were used instead of vacuum tubes in
(Electronic Numerical Integrated and Calculator) was this generation computers. In this, magnetic core
built in 1946 during World War II. This was developed technology was used in storage devices. Assembly
by P. Eckert and John Mauchly (USA). It was the first language and high level language were used in this. It
fully electronic computer and was a combination of was widely used in commercial applications, including
twenty accumulators. It had 18000 vacuum tubes. It was engineering design and updation of inventory file etc.
used by private firms, the Engineers Research Computers of this generation were less in size & heat
Association, and IBM. and were faster and more reliable.

M1R5 10 YCT
Search on TG: @apna_pdf
Third Generation Computer (1965-1974)– Google Glass– Google Glass is a wearable, voice-
Continuous technological advances in electronics led to controlled Android device that works like a pair of
the reduction in size of computers and the ability to glasses. It uses visual, audio, and location-based input to
perform tasks at a faster rate. The third generation appear and provide information directly in the user's field
developed by J. S. Kilby. Due to the use of RAM of vision argument by providing the experience of
(Random Access Memory) in this Genertion, the storage reality.
capacity of magnetic tape and disk increased. Languages Drone Camera– A drone is an unmanned small
like Fortron, COBOL etc. were used in this. It was used aircraft or ship that can navigate without man control. To
in database management system, online system, reduce weight, a drone is made from different
reservation system etc. For example- IBM system/360, lightweight composite materials, which can be equipped
NCR 395, B 65001. Magnetic core and solid state were with a variety of additional equipment, which includes
used as main storage. cameras, GPS, guided missiles, global positioning
Fourth Generation Computer (1975-up till now)– systems, navigation systems, sensors, etc.
VLSI (Very Large Scale Integration) and ULSI (Ultra Pen with Camera– It has a hidden digital camera
Large Scale Integration) started being used instead of inside, which gives the facility of taking secret videos.
LSIIC in the fourth generation computer. In which about Often the pen is kept in a shirt pocket or held in the hand.
millions of things could be stored in a single chip.
1.4 Basics of Hardware and Software:
Languages such as Fortron-77, Pascal, ADA, COBOL-74
Computer system is a combination of hardware and
etc. were used in computers of this generation. The use
software.
of mini computers increased in this generation. There
was compatibility between devices from different Hardware– Every machinery part of a computer is
hardware manufacturers so that the consumer was not hardware, whether it is a monitor, keyboard, memory
tied to a single vendor. Computers of this generation are chip, hard disk, circuit board, cooling fan, plug in the
electrical board.
IBM PC-XT Apple II, Intel 4004 chip etc.
Computer system consists of monitor, CPU and a
The Fifth Generation Computer At Present– In
keyboard, peripheral devices and an operating system.
the fifth generation computer, ULSI (Ultra Large Scale
Integration) was developed in place of VLSI and it was The parts connected in the form of hardware in the
possible to perform crores of calculations by a single computer perform their different functions, such as the
chip. CD (Compact Disk) was developed for storage. keyboard takes input from the user, the processor
processes the instructions given by the software.
Internet, e-mail and the World Wide Web (www)
developed. Very small and fast working computers were The main functional units of a digital computer are-
developed and programming complexity decreased. An ■ Central Processing Unit (CPU)
attempt was made to develop Artificial Intelligence so ■ Input Devices
that computers can take decisions according to the ■ Output Devices
situation. Portable PC and Desktop PC revolutionized the The following hardware components are available to
field of computer and it started being used in every field perform various functions in a computer system-
of life. In this, optical disc is used for storage. They are Motherboard– In a computer system, the
very small in size, fast and easy to use, plug and play. motherboard is such a link to which all electronic
Example- IBM notebook, Pentium PC super computer components such as memory, CPU, etc components are
etc. connected. These components are connected to the
motherboard by recieving power allow them to
1.3 IT Gadgets and their Applications: communicate with each other.
An IT device is used for "Information and SMPS (Switch Mode Power Supply)– This is an
Communication Technology". It is a term that covers all electronic circuit. This device gives power to different
available communication tools such as cell phones, parts of the computer such as motherboard, RAM, fan.
television sets, tablets, personal computers, etc. IT The main components of SMPS are power connectors
includes both Internet-connected devices and mobile and power supply.
devices supported by wireless technology. Storage Controllers– Storage Controller, hard disk,
Following are some of the major latest IT gadgets- floppy disk, CD ROM etc. to other devices let's control.
Smart Watch 360– Smart watch can play apps and The controllers are located directly on the motherboard.
all types of digital media. Such as audio tracks or radio Graphics Controllers– Graphics controllers that
streaming to Bluetooth headphones. Most of these watch produce output for the monitor.
have touchscreens that allow the use of various function Interface Controllers– It is used to connect the
such as a calculator, thermometer, compass, etc. computer to external peripheral devices.

M1R5 11 YCT
Search on TG: @apna_pdf
1.4(i) Software: Output– The process of displaying the information
Software is a set of instructions written in a on the paper by user to the monitor or printer is called to
programming language, that control the functions of a output.
computer system. Software coordinates between the Controlling– Directing all the processes written
various hardware components of the computer so that a above is called controlling. This controlling is done by
particular task can be accomplished. Its primary purpose CU in CPU.
is to convert data into information. It also helps in data The chip speed of CPU is measured in GHz. The
input and produce the result output. higher the speed, the faster the computer works.
Types of Software: Software can be divided into (CPU) Following are the main three components of
the following categories– CPU-
(i) System Software ■ Memory Unit
(ii) Application Software ■ Arithmetic and Logic Unit (ALU)
(iii) Packages ■ Control Unit
(iv) Utilities Memory Unit– The memory unit is used to store
data and instructions. Memory units are mainly divided
into two categories – primary memory and secondary
memory. The data and instructions currently in use on
the computer are stored in the primary memory.
Secondary memory is used to store data and instructions
for later use. Primary Memory is located within CPU.
That's why it is called Internal Memory or RAM
(Random Access Memory).
Arithmetic Logic Unit (ALU)– In a computer
system, the instructions received from the control unit
(Types of software) are executed in the Arithmetic logic unit.
1.5 Central Processing Unit (CPU): It is used in arithmetic and logical calculations.
Arithmetic calculations include addition, subtraction,
CPU is called processor. Most of the devices multiplication, division, and logical calculations include
connected to the computer, communicate with the CPU comparative calculations As- >, <, =, Yes or No etc.
to perform some work. CPU is an electronic microchip The results generated in the ALU are stored in the
that processes data by converting it into information. It memory unit. This storage is temporary until they are
works to transfer instructions and data from main needed again. Data and instructions stored in main
memory to registers. The CPU executes the instructions memory are transferred for processing when required.
sequentially and transfers the output data from the No processing takes place in the memory unit. After
registers to the main memory as and when required. processing is completed, the final results stored in the
memory unit (RAM) are sent to the output device such as
monitor or printer.
Control Unit– The functions of the control unit are
as follows-
• It is responsible for controlling all the functions of
the computer.
• The control and typing signals generated by the
control unit are sent to other units for program
execution and correct control.
• The control unit coordinates all the activities of all
the parts of the computer such as input, output
devices, processor etc.

Figure 1.9 CPU


1.5(i) Types of Processing:
To Input– The process of entering data into the There are mainly three types of processing–
computer by a user using an input device such as a i. Serial Processing– It can execute one instruction at a
mouse or keyboard is called input. time.
Storing– Working on the data entered in the ii. Parallel processing– It is also called Teraflop. In
computer is called processing. It can be of both this, many instructions (more than 1 billion) can be
Arithmetic and Logical types. From this useful executed simultaneously. Network computers, super
information can be retrieved. computers etc. are examples of parallel processing.

M1R5 12 YCT
Search on TG: @apna_pdf
iii. Pipeline processing– It is a process in which a task is
divided into sub-tasks and all the Sub-Tasks are
1.5(iii) Cache Memory:
executed in different segments and all the segments Cache memory is a special type of high speed
are executed simultaneously. This reduces the memory which is placed between the CPU and main
processing time and also increases the throughput of memory and it increases the processing speed of the
the system. computer. It is part of the static RAM already assigned to
the system.
For example, if we do more than two printing
commands and more than two music plays
simultaneously, then printing and music play go on CPU → Cache Memory → Main Memory
simultaneously, but the second printing task starts only
after the first print is over and the second music also The speed of CPU is high but due to low speed of
starts after the first music. RAM, the speed of data transfer between CPU and RAM
decreases. The speed of cache memory is high, it makes
1.5(ii) Processor Speed:
data available to the CPU at a faster rate. Similarly, the
Processor is the main part of the computer system, it processed data from the CPU is also received at a faster
is also called the brain of the computer. It takes the rate, due to which the access time of the entire computer
instructions given by a user as input, processes it and is reduced.
produces the output. It can execute more than one
Cache memory is very small in size but much faster
million instructions in a second. The speed of a than the main memory of the computer, it is also called
microprocessor is often measured in MIPS (Million the memory of the CPU.
Instructions per Second). MIPS is used for integer
The programs and instructions that are used
computation and for floating point measurement repeatedly, stored inside the cache memory. The
MFLOPS (Million of Floating Point Instructions per processor checks the cache memory before processing
Second) is used. any data. If it does not find that file there, then it check
Microprocessor requires main memory, power this in the primary memory. If the required data is
supply and clock system to function like a PC. available then it is called Hit while the data is not
Processor is a combination of ALU and CU built on available it is called Miss. Cache memory is more
an integrated chip according to the capacity of the CPU, expensive than main memory. It is often used to store
a computer may have one or more processors can be instructions and only cache is used in the 68020
engaged. Processors differ from each other on the basis processor. The work of cache memory depends on its
of the following points- speed and size.
'Based on the size of the data that can be manipulated Most newer microprocessors have cache memory
at a time (16 bits, 32 bits or 64 bits) etc. that is added to the CPU to speed up processing.CPU is
Depending on the architecture (such as the internal cache memory but you can also add external
processor's involvement in floating point math and cache memory.
the size of the cache memory, etc.) 1.5(iv) Levels of Cache Memory:
Based on the maximum addressable memory. Standard PCs have Level 1 (L1) and Level 2 (L.2)
8-bit microprocessor– 8-bit microprocessor cache memory built-in. Some specialized processors,
executes 8-bit data consisting of 0's and 1's in one clock such as the Intel Itanium, have caches up to level 3 (L3).
cycle. It has an address and a data bus. The Intel 8085 Level 1 (L1) Cache– L1 cache is also called
was the most popular processor. But currently processors primary or internal cache; it is in the form of CPU cache
with more capacity are available. in the micro processor chip. It is part of the RAM which
16-bit microprocessor– 16-bit microprocessor is 8, 16, 20, 32, 64 or 128KB in size and works at the
manipulates 16 bits at a time and its word length is 16 same clock frequency as the rest of the CPU.
bits. The Intel 80286 is an example of a 16bit LI cache is generally divided into two parts – one for
microprocessor. data, the other for instructions, common for both data
32-bit microprocessor– A 32-bit microprocessor and instructions. The cache is called Unified Cache.
can handle 32 bits at a time. this kind of microprocessors Level 2 (L2) cache– It is larger than the level 1
were used in earlier expensive PCs. cache and can store data up to a maximum of 24KB. This
32bit is available in all operating systems since Increases the processing speed. The main function of
Microsoft Windows 95. cache L2 is to keep L1 available by continuously reading
64-bit microprocessor– A 64-bit microprocessor large amount of data.
can handle 64 bits of data at a time. It is used in more Level 3 (L3) Cache - This memory boosts
powerful workstations and computers (such as performance when combined with the L1, L2 cache.
minicomputers, servers and high-end workstations) Multicore processors have dedicated L1 and L2 caches
DEC's Alpha Server etc are important microprocessor, for each core, but L3 caches can be shared. It is different
based on 64-bit. from other caches (CPU cache, hard disk cache, etc.).

M1R5 13 YCT
Search on TG: @apna_pdf
Keyboard– Keyboard is the most important device
of any computer. Text or numerical data can be entered
in the computer from the keyboard itself. The keyboard
has all the letters in the same order as a typewriter, but it
has more buttons than a typewriter.
A port is made to connect the keyboard to the
computer, but nowadays USB keyboards are available,
which plug into the USB port of the computer, and
wireless keyboards also available which do not need to
be connected to the system.
1.5(v) Importance of Cache Memory:
System performance matters a lot to a computer
user. For this, the CPU needs to be faster and more
efficient i.e. the faster and more efficient the CPU will
perform a process. The better performance of the
computer, the better the cache memory improves the
efficiency of the CPU. Due to the slowness of the main
memory, the CPU slows down the process of program
execution, while using the cache memory speeds up the
process.
1.6 Input Devices: Fig. 1.11 Keyboard showing the functions of
The devices, through which data is input or the different buttons.
devices through which words, data or instructions are
inserted into the memory, are called input devices. There are five types of keys in the keyboard–
Following are some of the main input devices- ■ Alphabet Keys: There are 26 alphabet keys from A
Mouse– This is an input device; it is used to give to Z in the keyboard, which are used to type any
instructions to the computer with the help of graphics in word or text.
the computer. It was invented by Douglas C. Engelbart. ■ Numeric Keys– The numeric keys are in the row
It usually has two or three buttons. It has a left button, above the alphabetic keys. They are numbered from
right button and a scroll wheel in the middle. Using a 0 to 9. There is a separate set of keys for typing
mouse, we do not have to remember any key on the numbers called Numeric Key Pad. It contains 0 to 9
keyboard; just click the mouse pointer at a certain place digits, decimal, addition, subtraction, multiplication
on the screen. and division etc.
■ Function Keys– These are located at the top of the
keyboard. These buttons are marked F1 to F12. They
are used for specific tasks defined in the computer.
Their work also depends on the running program.
■ Cursor Control Keys– These keys are used to
move the cursor anywhere on the desktop. These
indicate four different directions, right, left, up and
down, which are indicated by arrows. These are also
called Arrow Keys.
Just above these, there are four more buttons to
Fig. 1.10 Mouse control the cursor which are Home, End, Page Up
There are mainly four functions of the mouse- and Page Down.
1. Left Click: It is used to select an object on the Home: This key moves the cursor to the beginning
screen. of the line.
2. Double Click: Pressing the left mouse button twice End: This key moves the cursor to the end of the
quickly is called double click. It is used to open a line.
file, document or program. Page Up: It moves the cursor to the previous page.
3. Right Click: It shows the list of commands on the Page Down: It moves the cursor to the next page.
screen. Use right click to open the properties of the ■ Special Purpose Key:
object is accessed. Caps Lock Key– It is a toggle button, that is, when
4. Drag & Drop: It is used to move any object from this key is activated, it converts the uppercase letters to
one place to another on the screen. lowercase and lowercase to uppercase.

M1R5 14 YCT
Search on TG: @apna_pdf
Num Lock Key– It is also a toggle button, when
activated; it acts as a group of numeric keys on the right
side of the keyboard. It acts as a directional switch when
the Num lock is off.
Shift Keys– There are two shift keys on any
keyboard. This is a combination button. It is used with
any other button. It is used to change the case of a letter
and at any button on the keyboard where two characters
are marked, then the 'shift key' is used to type the above
character.
Enter Keys– It is also called the Return Key. It is
used to execute the command or program given to the Figure 1.13 Light Pen
computer. It is also used to start a paragraph. Scanner– A scanner is used to convert data written
Tab Key– Its full name is tabulator button. It moves on paper or printed images into digital form. It is an
the cursor to a certain distance at once and takes the
optical input device. Scanned images can be saved in
browser to another link in the page. By setting the tab in
the Word document, the margin of the page, paragraph memory or CD or any processing or editing can be done.
and the distance between one word to another is set. The scanners are of the following types-
Escape Key– This is like the Cancel button. (i) Hand Held Scanner– Hand held scanner is a
Whatever work is going-on on the computer, this button portable scanner. To scan the object, the hand held
closes it and quit program. Using the Esc button along scanner is moved over the object. It is more useful for
with Ctrl button opens the Start menu. small images such as signatures, signs, symbols or small
Space Bar– This key is used to insert space between photographs. It is used in many applications such as bar
words. code readers.
Back Space Key– By using this key, the text to the
left of the cursor is erased.
Delete Key– This key is used to delete the text on
the right side of the cursor, as well as it can also be used
to delete the selected word, line, page, file or drawing.
Ctrl Key– This key is used in conjunction with any
other key to give a specific command. There are two
places on the keyboard. Control is used to give various
shortcuts such as- Ctrl + C to copy, Ctrl + V to paste and
Ctrl + Alt + Delete to reset etc.
Joystick– Joystick is an input device and it is a
pointing device which moves in all directions and
controls the movement of the cursor. Joysticks are used
in flight simulators, computer gaming and CAD/CAM Figure 1.14 Hand held scanner
systems. Its system is also similar to that of a track ball, (ii) Flatbed scanner– Flatbed scanner is also called
except instead of a ball, a stick is attached to it. desktop scanner which is used to convert the object into
digital format. It also scans sheets of image paper (most
are A4 size). It provides excellent output in less time.

Figure 1.12 Joystick


Lightpen– Lightpen is a handheld electro-optical
pointing input device. Lightpen is used for making
drawings, graphics and for menu selection. It is mainly
used in Personal Digital Assistant (PDA). It is used to
identify a specific location on the screen. Figure 1.15 Flat bed scanner

M1R5 15 YCT
Search on TG: @apna_pdf
(iii) Sheetfed Scanner– Sheetfed scanner is also
called rolled over scanner. It looks like a fax machine.
This scanner can scan only one sheet of paper at a time.
The pages to be scanned are passed through like a
lamination machine. These scans are less expensive but
take longer to produce normal output.

Fig. 1.18 Bar Code Reader


A beam of light emerges from the BCR; Then put
that ray on the bar code image. The BCR contains a light
sensitive detector, which recognizes the bar code image
from both sides. After recognizing the BCR code, it
converts into a numeric code.
MICR (Magnetic Ink Character Recognition)–
MICR examines the information in the form of a matrix.
By this, letters or documents written with special
magnetic ink are read by it or collected in the computer.
It is used in banks to recognize the magnetic encoding
numbers printed on the bottom of cheques.

Figure 1.16 Sheetfed scanner


Voice Input and Recognition System– Voice input
and recognition is the process of capturing a set of words
spoken by a microphone or telephone and converting
them into sound. It can be used for command and
control, data input and document preparation. It converts
spoken words into readable input. It is used in voice
dialouge, simple data input, text processing from airplane
cockpit and speech. People who are unable to use hand
Fig. 1.19 Bank cheque processed using MICR device.
for computer input, they can work on computer with the
Web Camera– It is used for taking photos on the
help of this.
Internet. It would have been a digital camera. This is
OMR (Optical Mark Reader)– OMR is a type of connected with the computer. It is also used for video
input device which is used to read the marks put on the conferencing and online chatting etc.
form or card. It emits a beam of light on the paper and
the mark on which the beam of light falls, OMR reads
that mark and gives input to the computer. It is used for
checking lottery tickets, official forms and objective type
answer sheets.
1.
a b c c
2.
a b c c
Fig. 1.17 Optical mark in an answer sheet
Bar Code Reader–BCR is an input device used to
read a barcode (Universal Product Code) printed on a Fig. 1.20 Web Camera
paper product. These days it is used to update prices and Touch Screen– Touch screen is an electronic visual
data of supermarkets. Dark and light vertical lines are display that the user can touch with his fingers. With the
made on the top of the goods in the super market, which help of touch screen, we can do our work quickly as
are presented as information and are easily read by the compared to mouse. Touch screen is used in computer,
BCR, called barcodes. laptop, smartphone, tablet, information kiosk etc.

M1R5 16 YCT
Search on TG: @apna_pdf

Figure 1.21 Touch screen Figure- 2.24 Biometric sensor

Microphone– A microphone is an input device that


converts our voice into digital data. And with its help 1.7 Output Devices:
you can also record and store audio. It supports the These are such devices which displays the results
computer only when the hardware of the sound card is obtained from CPU after process through this we see the
installed in the computer. information processed by the computer. Output devices
display the input as soft copy or hard copy. Hardcopy is
the output that user receives on paper. Whereas soft copy
is the output that is visible to the user on the computer
monitor.
VDU Visual Display Unit– VDU or Monitor is an
output device that displays images or process input
results as soft copy on the screen. Monitor is like
television in view, but monitors of computers are made
of special type, in which even 80 characters in a line can
be clearly displayed.
Monitor quality is determined by dot pitch,
Fig. 1.22 Microphone resolution, and refresh rate.
The display size of a monitor is measured
Trackball– The trackball is a pointing input device. diagonally. Monitors are available in sizes of 9", 12",
It is often used with laptops and notebooks. It consists of 14", 15.5", 16.5", 17.5" etc. and 21".
a ball which when rotated in different directions pointer Mainly two types of monitors are used, these days-
also moves on the monitor. The electronic circuit in the
■ CRT( Cathode Ray Tube)– CRT monitor works on
trackball monitors its movement speed and direction and
sends the information to the processor. the same principle as television. It consists of a
cathode ray tube with an electron gun attached to it.
The display is obtained by reflecting the electron
beam received by the same electron gun.
■ LCD Monitor (LCD)– Its full name is Liquid
Crystal Display and monochrome pixels are used on
its screen. They consume very less power and
provide better graphics quality. Today mostly LCD
Monitors are used only. These are available in
screen sizes of 17 inches to 6 inches. It has a
backlight which provides light to all the pixels
Figure - 2.23 Trackball individually.
■ TFT Monitor (TFT)– In TFT, one to four
Biometric Sensor– Biometric sensor is such device, transistors are used to control one pixel. These
which is used to recognize finger print, eye retina, voice, transistors make the screen much sharper, brighter
signature etc. These devices are installed in an institution and more colorful than a passive matrix. This
for security reasons that allow persons to enter and exit monitor gives a very good display but it is relatively
the institution. expensive compared to other monitors.

M1R5 17 YCT
Search on TG: @apna_pdf
(ii) Daisy Wheel Printers: This is such a printer in
which a daisy wheel is attached instead of the print head,
which is made of plastic or metal. It prints with higher
resolution than dot matrix printer and its output is more
reliable than dot matrix printer. It cannot print graphs or
pictures. It is noisy and prints slowly.

Fig. 1.25 Monitor (TFT)

LED-Monitor– This is the most modern type of


monitor available in the market. It is a flat panel, which
uses light emitting diodes. Very less power is used in
Fig-1.27 Daisy wheel printer
this. It also does not generate much heat. LED monitors
(iii) Line Printer: This type of printer prints a
use Light emitting instead of cold cathode fluorescent
complete line at a time.
(CCFL) (used in LCD) for backlighting in monitors
(iv) Drum Printer: These are also a type of line
diodes are used.
printer, in which a cylindrical drum rotates continuously.
Some of the commonly used output devices are: It consists of an ink-filled ribbon between the drum and
(i) Printers the paper, which helps to print the characters on the
(ii) Plotters paper.
(iii) Multimedia Projectors
(iv) Speech Synthesizer
Printers– Printer is the main output device. It is
used to print the data and information received from the
computer on a paper. It is used to prepare permanent
documents. The speed of a printer is measured in
characters per second, lines per minute and pages per
minute. The quality of a printer is measured in Dots Per
Inch (DPI).
Fig-1.28 Drum printer
The printer is divided into two parts-
1. Impact Printer
2. Non-Impact Printer– This is a sound free
2. Non-Impact Printer printer. They do not strike the paper but leave a spray of
1. Impact Printer– This printer works like a ink on the paper to print letters or images. Non-impact
typewriter. It prints data by striking on paper, ribbon and printers use electrostatic chemical and inkjet technology
character simultaneously. These printers are cheaper than for printing.
other printers and make more noise during printing, that Non Impact Printers are of the following types-
is why they are less used. (i) Inkjet Printer: In this type of printer, printing is
There are three types of Impact Printers- done by putting small dots on the paper by spraying ink.
(i) Dot Matrix Printers: It is a character printer. They can print letters and pictures in a variety of colors.
Dot matrix printers have a row of pins that strike the A4 size paper is used for printing in these printers.
ribbon on the top edge of the paper. When the pin strikes Cartridge for ink is installed in it. Its quality and speed
on the ribbon, a group of dots falls on the paper in the both are low and printing cost is also high in it.
form of a matrix from which the letters or images are
printed. This type of printer is also called pin printer.

Fig. 1.26 Dot matrix printer Fig. 1.29 Inkjet printer

M1R5 18 YCT
Search on TG: @apna_pdf
(ii) Thermal Printer– Thermochromic paper is
used in Thermal Printer. In this, the ink is melted by heat
and left on the paper, due to which letters or pictures are
printed. Fax machine is also a type of thermal printer. It
is faster and noiseless as compared to dot matrix printer.
It has good print quality.

Fig. 1.33 Projector

Speech Synthesizer– Speech synthesizer is an


output device that converts text data into spoken
sentences. Basic sound units are added to it to give the
output of speech. A sequence of words in a text is
combined with sound units, amplified and output is
received by a speaker connected to the computer.
Using this device, text information is read out to
Figure 1.30 Thermal print
visually impaired people and with the help of this device,
the typed information of a mute person is converted into
Laser Printer– It is a high speed page printer. It spoken words.
works on thermal technology. It is of both mono and
color type. Both its quality and speed are much better 1.8 Computer Memory and Storage:
than other printers. Memory is the internal storage area of the computer.
Computer memory stores input data and instructions for
the CPU to process. The stored data and instructions are
processed in the memory itself and the output is
received, hence memory is an essential part of computer.
There are two types of computer memory-
1. Primary Memory
2. Secondary Memory
1. Primary Memory– Primary memory is also
called internal memory because it is a part of computer
Fig. 1.31 Laser printer CPU only. In the primary memory, there are programs
Plotters– It is an output device, which is used in running at that time and the input data and output data of
large drawing or pictures such as construction plans, the programs are stored for some time and after their
AutoCAD etc. It is mainly used by engineers, doctors, need is over, they can be removed and other data or
architects, city planners etc. In this, writing tools like programs can be kept.
pen, pencil, marker etc. are used to make drawings. It 2. Secondary Memory– Secondary memory is also
provides output like graphs and diagrams. called external memory. Due to the high cost of
computer's main memory and most of the information
kept in it is destroyed when the power is turned off,
neither we can increase it as per our wish nor we can
store any information in it permanently.
Primary memory can be divided into the following
two types-
(i) RAM (Random Access Memory )
(ii) ROM (Read Only Memory)

RAM (Random Access Memory)– This is the most


used memory in the computer. It is a volatile memory i.e.
Fig. 1.32 Plotter if the power supply is turned off, the data stored in it is
also lost.
Multimedia Projector– It is a hardware device that
is used to display information or data received from a ■ Data can be read from anywhere in RAM, it does
computer in pictures on a large surface or screen. not have to be read sequentially.
Generally it is used in presentations and meetings, in ■ RAM is available in capacity of 64MB, 128MB,
which there is a large number of audience. 256MB, 512MB, 1GB etc.

M1R5 19 YCT
Search on TG: @apna_pdf
■ Burning process in EPROM can be repeated with the
help of ultraviolet rays.
■ EEPROM is also permanent memory such as
EPROM, but the burning process can be repeated
with the help of electricity.

Volatility of Memory– Volatility of computer


memory means the ability to retain information even
after the computer's power is switched off. A computer's
main memory, which is represented by SRAM or DRAM
Fig - 1.34 RAM Random Access Memory chips built in, it loses its information as soon as the
power stops. RAM is volatile memory. Volatile memory
Static and Dynamic RAM: is the memory whose information is lost when the power
■ Static RAM is also called SRAM. Data is stored in turned off.
it as long as the power supply remains ON. Storage
cell circuits in SRAM consist of multiple transistors. Secondary Memory– Secondary memory is also
called auxiliary and backing storage memory. Since main
■ Data in SRAM does not need to be refreshed and it
memory RAM is temporary and of limited capacity,
works faster than DRAM.
therefore secondary memory is used as a large amount of
■ Dynamic RAM is also called DRAM. The storage non-volatile data memory. The data which is not
cell circuits of a DRAM chip include a transistor and currently required by the Central Processing Unit (CPU)
a capacitor. is stored in secondary memory.
■ DRAM is frequently refreshed and cheaper than ■ The cost of secondary memory is very less
SRAM. compared to main memory RAM and the capacity to
■ DRAM chip provides a memory whose information store data is very high.
is lost when the power is turned off. ■ Such information is stored in it, which has to be kept
■ SDRAM, RDRAM, DDR SDRAM etc. are safe for a long time and not required continuously.
examples of DRAM and SRAM, Synchronous ■ It stores system software, assemblers, compilers,
SRAM etc. are examples of SRAM. useful packages, large data files, etc.
■ This memory is in the form of some magnetic
ROM (Read Only Memory)– Read Only Memory devices, such as- Magnetic Disk (Hard Disk, Floppy
is such a memory in which the stored data can only be Disk, Magnetic Tape etc.), Optical Disk (CD-ROM.
read. It cannot be destroyed or changed. DVD etc.) and Solid State Disk (Flash Drive etc.).
It is a permanent (Non-Volatile) memory. ROM is This memory is used for backup.
used to keep data permanently in the computer. ■ Magnetic drives and magnetic disks are commonly
used direct access storage devices.
■ ROM is a silicon chip located on top of the
motherboard that stores instructions at the time of
manufacture. When the computer is switched on, the Floppy Disk– Floppy disks are round, flat and
instruction/program stored in ROM is automatically flexible disks which are coated with magnetic oxide. It is
called a floppy disk because it is made of flexible plastic
executed and the instruction/program stored in it is
plates. A vinyl jacket is placed in the cover to protect the
not destroyed even after turning off the power
disc surface. The storage capacity of a floppy disk is 1.44
button.
MB (standard) and a maximum of 2.88 MB. Its size is
5¼" and 3½".
Data stored on diskette requires special care, it
should not be left in sunlight, high temperature or high
power magnetic field. The labeled side should be facing
up when inserting it into the disc drive. Data can be
Figure-1.35 ROM read only memory prevented from being accidentally erased by using the
Write tab on the disk.
PROM– PROM is called Programmable Read Only
Memory (PROM). Once a program/instruction is burnt, Magnetic Tape–It is the most successful backing
by users it cannot be changed. storage medium.
■ There are some other types of PROM such as- ■ Magnetic tape is a half inch or 12.7 mm wide and
Erasable PROM (EPROM), Electronically Erasable 2400-3600 feet long tape of plastic, which is wound
on a spool remains wrapped.
PROM (EEPROM)
M1R5 20 YCT
Search on TG: @apna_pdf
■ More Data can be stored in it as compared to punch
card and paper tape. Any number of times the data
on the tape is written / erased and can be changed.
■ Requires a magnetic tape drive. All magnetic tape
drives have two reels, one roll of tape that is used for
reading or writing is called the file reel and the other
is called the take up reel.
Hard disk– Hard disk is the main device for storing
data under CPU. It offers higher storage capacity, Fig-1.37 Compact Disc
reliability and fast speed than other discs.
■ Computer's operating system, various application ■ The standard diameter of a CD is 12 cm, which
software and data and information are stored in hard holds 80 minutes of data.
disk only. It is a permanent memory in which the ■ It stores computer data of graphics, text and audio.
stored data is not destroyed even when the power ■ CD-ROM has a shelf life of more than 40 years.
supply is switched off. ■ There are two types of optical discs – Compact
■ Since this disc is sealed inside a box with the Read Discs (CD-ROMs) and WORM (Write Once Read
and write head, it is also protected from environment Many) discs.
and scratches. ■ CD-ROMs provide access data retrieval. Large
information and documents can be easily searched
■ With the help of hard disk drive, the data stored in and retrieved in this.
the hard disk can be read and written directly on any
track of any sector. Digital Video Disc (DVD)– DVD is an abbreviation
■ The hard disk is placed inside the computer cabinet for Digital video disc or Digital versatile disc. It was
and is connected to the motherboard. In computers, brought out by Philips and Sony in 1995. This optical
it is often named C Drive. All programs or data disc technology is similar to CD-ROMS.
installers reside in this hard disk under the computer. It can store a full length movie and a minimum of
Which we use according to our need. 4.7GB of data. DVDs are usually used for movies and it
■ Hard Disk is available in 10GB, 20GB, 40GB, is a medium for presenting multimedia presentations in
digital form.
80GB etc. capacity. The disc is divided into tracks
Single sided or double sided and can store data in
and sectors which is called formatting.
one or two layers on each side. A double sided layer
DVD stores up to 17GB of video, audio or other
information.

Pen Drive– Pen drive is also called Thumb drive,


Flash drive or USB drive. It is a small portable device
the size of a thumb. It can easily transfer files between
compatible systems and is used for storage.
It is available in different capacities. It is used by
plugging it into the USB port of the PC. Due to the main
component of pen drive being flash memory, it is also
called flash drive.
Fig.- 1.36 Hard Disk
Flash memory is a special type of memory that holds
The main memory of a computer system is designed
data even in the absence of electric current. Flash
in such a way that it provides space to store more and memory is widely used in the electronics industry.
less instructions as well as to store results. Pen drive is an example of EEPROM (Electrically
Information in a computer is stored as strings of 0s Erasable Programmable Read only Memory).
and 1s. 0 and 1 are two symbols used to represent the
binary states of components in computers. These are
called binary digits or bits.
Compact Disc (CD)– CD is a form of optical disc.
Information is stored by putting them in a CD Drive,
which changes its reflecting property when a laser beam
of high intensity is inserted.
Fig. 1.38 Pen drive
M1R5 21 YCT
Search on TG: @apna_pdf
Memory Cards– Memory cards are devices that
provide a fast way to store and transfer digital files
provides an easier way.
It is a thin card like electronic memory device which
is used in computers and other modern devices such as
mobile phones, digital cameras, PDAs, palmtops,
smartphones, etc. It is also called Multimedia Card
(MMC), its use is becoming popular as a removable Figure 1.41 Micro SD memory card
storage device. Portable Hard Drive: Portable hard disk drives are
similar to computer hard drives. It is connected to the
computer through an external USB port. But because of
the USB connection, portable hard disk drives tend to be
slower than internal hard drives. Portable hard disk
drives such as USB or Firewire are used for backup.
Portable sizes available in the market are 320GB 500GB,
1TB and 5TB (modern).

Fig. 1.39 Memory card


There are also many types of memory cards which
we use to store data in various electronic devices. These
are the following-

Figure 1.42 Portable hard drive


Smart Media Card– The Smart Media Card was
invented by Olympus and Fuji. Smart media cards are a Portable hard drive helps the user to back up or store
very common storage media used in digital cameras. important information, which is kept separate from the
main internal hard drive. Documents such as music files,
DVD movies, images and backups of the contents of
main internal hard drive can all be safely and discretly
stored on a portable hard drive.

1.8 (i) Booting:


The starting process of an operating system is called
Figure 1.40 Smart Media Card booting. On starting the computer system, CPU and
BIOS together scan the computer, in which RAM,
Secure Digital Card (SD Card)– SD card is used in display, hard disk etc. are checked, this process is called
digital camera or DSLR camera. SD cards have an POST. After post, the BIOS search the booting device
additional locking switch that prevents the MMC from and loads the necessary files and resources into main
writing, reading or deleting data from the card. An SD memory. During booting, the BIOS file is loaded into the
card can be read and write devices but the SD card has main memory (RAM) after which the user can use his
digital writes management capability which is not computer. When the computer is shut down, all the
available in MMC. There are two types of SD cards. It is system related files automatically disappear from the
as follows- main memory while the information written on ROM
Mini SD Memory Card: Mini card form factor is a stays safe even when power off. There are two types of
removable and portable memory device. Form factor booting in a computer.
means the ability to transfer energy from one object to 1. Cold Booting: When the computer system is
another is good. It is used in mobile phones, MP3 turned on by the power button of the CPU, it is called
players, digital cameras and other devices. cold booting. Since it takes some time for the OS to load
Micro SD Memory Card: This is a flash memory when the computer is switched on, it is also called hard
card that can be added to the device and removed when booting.
the job is completed. It is mainly used in mobile phones 2. Warm Booting: In the event of a computer
along with portable media players, GPS devices etc. system hanging, the process of re-booting the computer
Micro SD cards are designed for use in cellular phones by pressing the combination of Alt + Ctrl + Del on the
and smaller mobile devices. The Micro SD format is keyboard or using the restart button is called warm
about 1/4 the size of an SD card, which ranges from
booting. Warm booting is also called soft booting
15mm to 0.7mm.
because it does not take time to load the OS.
M1R5 22 YCT
Search on TG: @apna_pdf
1.8 (ii) Computer System: Keyboard and mouse socket– With the help of this
A computer system is an electronic device made up circuit, the keyboard is connected to the computer
of input-output devices, processing devices, memory, system.
etc. The following are the classifications of a computer
system panel according to their physical facts-
1. Front Panel
2. Rear Panel
3. Inside the system unit

Figure- 1.44 PS/2 port and connector

VGA Port– This port is used to connect a visual


display unit such as a monitor.

Fig. 1.43 Different parts of PC Fig - 1.45 VGA port


Parts of Front Panel: Rear USB port– This is the port used to connect a
Power switch– By power switch button we can turn USB device, also known as USB 2.0.
on/off the computer system. This button is usually
located on the front or side of the system unit.
Reset Button– It is a button that can be used to
restart the computer without turning it off. By Reset all
the data available in the memory is destroyed.
Turbo Switch– This button is located on the front
of the PC with two different operation speeds, using
which you can speed up or slow down the speed of the
switch. This switch was useful for old-time computers,
but in modern times its function to has been disabled.
Figure - 1.46 USB port
CD/DVD ROM Drive– With the help of this drive,
we can play CD or DVD in our computer system can
Parallel or serial port– Parallel port is used to
access.
connect printer etc. and serial port is used to connect
Floppy Drive– Using this drive, the data stored in mouse or modem.
the floppy disk is accessed in the computer system.

USB Port, Mic & Headphone Slot– USB devices


are accessed through the USB Port, Mic & Headphone
Slot USB Port. The mic and headphone jack slots are
used to listen to music by connecting a microphone or
headphone device to the jack wire.
Indicator Light– It is a signal light which burns
when the computer system is on and also shows its Fig. 1.47 Parallel or serial port
working, it automatically turns off when the computer is
shut down. Network Slot– With the help of this slot, we can
Various ports on the rear panel: Holes and slots connect the computer system to a network through a
are made with different cables in the rear part of PC's network cable.
system unit, which are as follows– IEEE 1394 (Firewire)– It is a serial bus interface
Power supply socket– This socket is used to for high speed and real time data transfer.
connect the cable to provide power supply in the Fan– A fan is installed in the power supply inside
computer system. This socket carries the electric power the computer system; it throws out the heat generated by
supply to the system unit and then from the system unit the CPU. The system unit should be kept away from the
to the monitor. wall so that there is enough room for heat to escape.

M1R5 23 YCT
Search on TG: @apna_pdf
Inside the system unit: CPU Support Chip– It is a chip that helps CPU in
Some electronic components inside the system unit managing various parts (peripherals) of the computer this
to operate the program, handle instructions, and is mounted on the motherboard.
determine results are attached which are as follows- 1.8 (iii) Number System:
Motherboard– In a computer system, the The way of representing a number is called a
motherboard is such a link that all electronic components number system. Numbers commonly used in computer
such as RAM, ROM, processor etc remain connected. systems
These electronic components connected to the There are four types, which are as follows-
motherboard make operation possible. It allows the 1. Decimal Number System
components to receive power and communicate with 2. Binary Number System
each other. 3. Octal Number System
RAM Chip (Random Access Memory)– RAM is 4. Hexa Decimal Number System
the most commonly used primary memory in the 1. Decimal Number System: The base of the
computer. A RAM chip consists of a black plastic decimal number system is 10. It contains numbers in the
integrated circuit (IC) with a row of pins on either side, range 0-9.
inserted either as a chip with the help of a slot, or directly Example:- (75)10, (821)10, (799)10 etc.
mounted on a circuit board. Memory chips are usually 2. Binary Number System: It is a number system
inserted in the motherboard as a group called SIMM whose base or radix is 2 which is always written in
(Single in Line Memory Module). They are inserted into subscript format and binary number system as per its
SIMM slots to increase the capacity of a computer name supports only two numbers 0 and 1.
system to store more data. RAM chips are available in The 2 written in subscript in the binaray number
64MB, 128MB, 256MB, 512MB, 1GB and more (101010)2 is its base.
capacities. Here are the binary numbers equivalents to some
ROM Chip (Read Only Memory)– ROM is decimal numbers-
connected to the computer system in the form of a chip. Decimal Numbers Binary Numbers
Read Only Memory is a memory in which the stored data
0 0000
can only be read and cannot be destroyed or changed.
1 0001
It is a permanent (Non-Volatile) memory. ROM is
2 0010
used to store BIOS information. This is used during the
booting of computer system. ROM is a silicon chip 3 0011
located on top of the motherboard that stores instructions 4 0100
at the time of manufacture. When the computer is 5 0101
switched on the instruction/program stored in ROM is 6 0110
automatically executed and the instruction/program 7 0111
stored in it is not destroyed even after turning off the 8 1000
power button. 9 1001
Video Graphics Card / Display Adapter Card– A 10 1010
display adapter card is an adapter for linking the CPU to Table 1.1 Binary numbers equivalent to decimal
the monitor. It displays all the tasks under the CPU on numbers
the monitor and converts the binary form of information Conversion from Decimal to Binary– The process
into a form understandable by the user. used to convert a decimal number to binary is called
Expansion Slot– An expansion slot is a thin long Dibble-Dabble. In this, the given number is divided
connector that allows other devices or adapter cards to be by 2 continuously until the quotient becomes 1 and
connected to a computer system. Some features such as whatever remainder remains 0 or 1 while dividing,
sound card, network card, graphics card, etc., which the writing them in reverse order (from bottom to top)
PC does not support, we can increase the capacity of our with base 2, The binary number equivalent to the
PC by connecting it with the help of expansion slot. decimal is obtained.
Disk Interface Card– Disk Interface Card is Example:-
required to communicate with hard disk and other (A) Convert the decimal number (255)10 to its
peripherals like floppy disk drive etc. equivalent binary number.
I/O interface card– Input / output interface card for
input / output (I/O) devices such as keyboards, printers,
modems, etc. It usually has one or two serial ports, one
joystick port, and one or two parallel ports.
Microprocessor– Microprocessor is called the heart
of the PC; it executes all the program instructions. CU
(Control Unit) and ALU (Airthmatic Logic Unit)
registers remain in the microprocessor. It contains a
silicon chip. Which are available in different types and
sizes such as- Intel P4 Athlon etc. (255)10 = (11111111)2

M1R5 24 YCT
Search on TG: @apna_pdf
(B) Convert the decimal number ( 295)10 to octal Example:-
number. (A) Convert the decimal number (90)10 to octal number.

∴ (90)10 = (132)8
(B) Convert the decimal number (295)10 to octal
number.

(255)10 = (11111111)2
∴ (295)10 = (447)8

■ Conversion from Octal to Decimal– Equivalent


decimal numbers are obtained by multiplying the
octal number with its place value and adding it
together. The place value of the rightmost octal
number is 3 and so on from right to left and the
value goes on from 80 to 81, 82, 83......respectively.
Example:-
(A) Convert the octal number (75)8 to its equivalent
decimal number.
758 (Octal Number) = 7×81+5×80
= 56 + 5
(1995)10 = (11111001011)2 = 6110 (Decimal)
Conversion from Binary to Decimal– The ■ Octal to Binary Conversion– In an octal to binary
equivalent decimal number is obtained by
multiplying a binary number with its place value and conversion, each octal number supports 3-bits of
adding it together. The place value of the rightmost binary.
binary number (bit) is 20 and similarly from right to
left the value increases from 20 to 21, respectively.
Example:-
(A) Convert the binary number ( 110001)2 into a
decimal number.
110001 = 1×25+1×24+0×23+0×22+0×21+1×20
= 32+16+0+0+0+1
= 49 (Decimal Number)
∴ (110001)2 = (49)10
(B) Convert the binary number (11000001)2 into
decimal number.
11000001= 1×27+1×26+0×25+0×24+0×23+0×22 Example:-
+0×21+1×20 (A) Convert the octal number (123)8 to binary.
= 128+64+0+0+0+0+0+1 Ist Method: (123)8 = 1×82+2×81+3×80
= 193 (Decimal Number) = 64+16+3 = 8310 (Decimal)
∴ (11000001)2 = (193)10 83 10 →

3. Octal Number System: The octal number system


has a base of 8 and numbers in the range 0-7.
Example:- (7)8, (123)8, (702)8, etc.

■ Change from Decimal to Octal– In this, the given


decimal number is divided by 8 continuously till the
quotient becomes 1 and while dividing the
remaining remainders are written in the reverse ∴ (123)8 = (1010011)2
order with base 8. Octal number is obtained.
Or,

M1R5 25 YCT
Search on TG: @apna_pdf
IInd Method: (123)8 → (HexaDecimal) = 4096+0+16+0
(1) (2) (3) = (4112)10 (Decimal)
↓ ↓ ↓ ■ Hexadecimal to Binary Conversion- The
001 010 011 hexadecimal number system is repesented in 4 bits.
∴ (123)8 = (001010011)2
To convert a hexadecimal number to binary, each
⇒ (1010011)2 hxadecimal number can be converted to 4 bits and
■ Binary to Octal Conversion– combined with base 2 to get the equivelent binary
Example:- number.
(A) Convert the binary number (10101)2 to its equivalent
octal number. Example:- Convert hexadecimal number (7C2)16 to
st 4 3 2
I Method:(10101)2 = 1×2 +0×2 +1×2 +0×2 +1×2 1 0 binary number.
(Binary) = 16+0+4+0+1 Ist Method: (7C2)16 →
= 2110 (Decimal) 7 C 2
(21)10 → ↓ ↓ ↓
(0111) (1100) (0010)
= (011111000010)2
∴ (7C2)16 = (011111000010)2
∴ (10101)2 = (25)8 Or,
Binary numbers can be directly converted to octal IInd Method: (7C2)16 → 7×162+12×16'+2×160
number by pairing a 3-bit pair from right to left.
IInd Method: (10101) → (∵ C = 12)
010101 = 1792+192+2
↓ ↓ = (1986)10 (Decimal)
2 5 (1986)10 →
∴ (10101)2 = (25)8

4. Hexadecimal Number System: Hexadecimal


nunber system has base of 16 and it's range 0 to 9 and A
to F or Hexadecimal range is
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F.
Example- (398)16, (5F3)16

■ Decimal to Hexadecimal Conversion– The given


decimal number is divided continuously by the base
16 of the hexadecimal number unit the quotient
becomes 1 and while dividing the remainder 0 and 1
is written in reverse order with base 16 to get the
equivalent hexadecimal number.
Example:- Convert the Decimal number (920)10 in to
Hexadecimal.
(11111000010)2
∴ (7C2)16 = (11111000010)2
■ Binary to Hexadecimal Conversion- By dividing
the binary values into a group of 4-4 bits, after
obtaining the hexadecimal number of each bit group,
∴ (920)10 = (398)16 writing them jointly can obtain the hexadecimal
number.
■ Hexadecimal to Decimal Conversion–Multiplying a Example:-Convert binary number (10110) to
hexadecimal number with its place value and adding hexadecimal
it together gives the equivalent hexadecimal number
from right to left the place value becomes 160, 161, I Method: (10110)2 → (1) (0110)
st

162.......... ↓
Example:- 6
(A) Convert the Hexadecimal number (1010)16 in to = (16)16
Decimal. Or,
(1010)16 → 1×163+0×162+1×161+0×160 nd
II Method:
(HexaDecimal) = 4096+0+16+0 (10110)2 → 1×24+0×23+1×22+1×21+0×20
= (4112)10 (Decimal)
(Binary) → 16+0+4+2+0
(B) Convert the Hexadecimal number (7B1)16 in to
Decimal. = (22)10 (Decimal)
(1010)16 → 1×163+0×162+1×161+0×160 (22)10 →

M1R5 26 YCT
Search on TG: @apna_pdf
16 22 Interchange) code is used to display number characters
1 6 and symbols in each computer. Presently this code is
accepted by computer system and uses 7 or 8 bits to
(16)16 represent the data. These codes allow computer
∴ (10110)2 = (16)16 manufacturers to standardize computer hardware such as
keyboards, printers, video displays, etc., to identify the
1.8 (iv) Coding Scheme: data and instructions used in computer systems. When
Any text based data is stored by the computer in the input is given by the user to the computer system the data
form of bits (series of 1S and 0s) and it follows a given is first converted into code after that it is converted into
coding scheme. A coding scheme is a standard that tells a binary information and executed in the computer system.
user's machine character represents which set of bytes. It 7 bit ASCII code is represented as–
is very important to specify the coding scheme used x6 x5 x4 x3 x2 x1 x0
The following coding scheme is used to represent Each bit in this is either 0 or 1. Upper character 'E' is
any character– coded as 100101 and lower case 'e' is coded as 1100101.
ASCII (American Standard Code for In an 8-bit ASCII code, the 8th bit is used as the check or
Information Interchange)– When the user writes parity bit. The 8-bit ASCII code x6 x5 x4 x3 x2 x1 x0 in x7
anything on the computer, it is written in ASCII only. is the parity bit that is added to 7-bit ASCII to make it 8-
ASCII (American Standard Code for Information bit.
Symbol Hex Code ASCII Symbol Hex Code ASCII
NUL 00 0 & 26 38
SOH 01 1 ’ 27 39
STX 02 2 ( 28 40
ETX 03 3 ) 29 41
EOT 04 4 * 2A 42
ENQ 05 5 + 2B 43
ACK 06 6 , 2C 44
BEL 07 7 – 2D 45
BS 08 8 ⋅ 2E 46
TAB 09 9 / 2F 47
LF 0A 10 0 30 48
VT 0B 11 1 31 49
FF 0C 12 2 32 50
CR 0D 13 3 33 51
SO 0E 14 4 34 52
SI 0F 15 5 35 53
DEL 10 16 6 36 54
DC1 11 17 7 37 55
DC2 12 18 8 38 56
DC3 13 19 9 39 57
DC4 14 20 : 3A 58
NAK 15 21 ; 3B 59
SYN 16 22 < 3C 60
ETB 17 23 = 3D 61
CAN 18 24 > 3E 62
EM 19 25 ? 3F 63
SUB 1A 26 @ 40 64
ESC 1B 27 ! 21 33
FS 1C 28 " 22 34
GS 1D 29 # 23 35
RS 1E 30 $ 24 36
US 1F 31 % 25 37
(space) 20 32 | 7C 124
{ 7B 123 } 7D 125

M1R5 27 YCT
Search on TG: @apna_pdf
[ 5B 91 ] 5D 93
\ 5C 92 _ 5F 95
^ 5E 94 ` 60 96
∼ 7E 126 7F 127
A 41 65 a 61 97
B 42 66 b 62 98
C 43 67 c 63 99
D 44 68 d 64 100
E 45 69 e 65 101
F 46 70 f 66 102
G 47 71 g 67 103
H 48 72 h 68 104
I 49 73 i 69 105
J 4A 74 j 6A 106
K 4B 75 k 6B 107
L 4C 76 l 6C 108
M 4D 77 m 6D 109
N 4E 78 n 6E 110
O 4F 79 o 6F 111
P 50 80 p 70 112
Q 51 81 q 71 113
R 52 82 r 72 114
S 53 83 s 73 115
T 54 84 t 74 116
U 55 85 u 75 117
V 56 86 v 76 118
W 57 87 w 77 119
X 58 88 x 78 120
Y 59 89 y 79 121
Z 5A 90 z 7A 122
Table 1.2a ASCII Code
Control Character Definition Control Character Definition
NUL NULL DC2 DIRECTION CONTROL 2
SOH START OF HEADIN DC3 DIRECT CONTROL 3
STX START TEXT DC4 DIRECT CONTROL 4
ETX END TEXT NAK NEGATIVE ACKNOWLEDGE
EOT END OF TRANSMISSION SYN SYNCHRONOUSE IDLE
ENQ ENQUIRY ETB END TRANSMISSION BLOCK
ACK ACKNOWLEDGE CAN CANCLE
BEL BELL EM END OF MEDIUM
BS BACKSPACE SUB SUBSTITUTE
HT HORIZONTAL TAB ESC ESCAPE
LF LINE FEED FS FORM SEPARATOR
VT VERTICAL TAB GS GROUP SEPARATOR
FF FORM FEED DLE DATA LINK ESCAPE
CR CARRIAGE DCI DIRCTION CONTROL 1
SO SHIFT OUT RS RECORD SEPARATOR
SI SHIFT IN US UNIT SEPARATOR
Table 1.2b Control characters and their definitions
M1R5 28 YCT
Search on TG: @apna_pdf
■ A computer does not need more than one type of
1.8 (v) EBCDIC Code: system software, while several application software
The full name of the EBCDIC code is Extended
programs can be installed.
Binary Coded Decimal Interchange Code which was
developed by IBM for use on mainframe operating ■ System software can run independently of application
systems. It encodes 8-bit characters. It converts the software, whereas application cannot run without the
number characters and symbols inputted by the user into presence of application software.
binary code for the computer to understand easily. Packages– A package is a computer application that
EBCDIC code is similar to ASCII code and is used includes individual files or resources as part of a
in computers and its devices. software collection packaged together in a form that
1.8 (vi) UNICODE: provides some functionality as part of a larger system.
Unicode is an international language encoding Software suite, which provides an organized
method that converts numbers, alphabets and symbols of collection of several packages or a package consisting of
most platforms, programs and local languages and scripts more than one separate piece. Application packages are
into a unique number value, after which that Unicode can available for all types of applications such as business
be used in various application programs. Three forms of applications, engineering designs, home applications, etc.
Unicode are in use, UTF-8, UTF-16, UTF-32 and it
consumes more memory than ASCII. It can represent 1.10 System Software:
65000 different characters with the help of Unicode. System software is the software that is written to run
At present, services such as Google Input Tools are the computer, control it, take care of its various parts and
available for typing in the local language in the computer make good use of all its capabilities. Our communication
system. system with the computer is possible only through
UTF-8– In this format, all Unicode characters are software.
converted into codes of one, two, three or four bytes.
UTF-16– In this format, Unicode characters are System software includes those programs, which
converted into codes of one or two words. Hence it is control the computer system and make it working by
also called Word Oriented Format. making proper coordination between its various parts.
UTF-32– All the letters of this code are converted Operating System– Operating System is the main
into two words i.e. 32 bit Unicode. type of system software, without which it is impossible
to run a computer. This is the first program that is loaded
1.9 Application Software: into the computer's memory when the computer is
Application software are programs that are written switched on.
to do our actual work, such as calculating the salaries of ■ It controls the signal coming from the CPU with a
office workers, keeping track of all transactions and
view to flow to different parts of the computer.
accounts, printing various types of reports, preparing
letters and documents. Application software is developed ■ MS-DOS. MS-Window, Unix, Linux, OS/2, Apple
by using high level computer languages. Software Macintosh, etc. are some of the major operating
programs are written using the English language, so the systems.
user can easily use the computer; Such as industrial
automation, medical software, educational software,
word processor etc.
Now a days, such programs usually written in the
same way for everyone, which are called readymade
software or packages, such as- MS Word, Ms-Excel,
Tally, Corel Draw Page Maker, Photoshop etc.
Differences between system and application
software–
■ System software is installed when the operating system
is installed on the computer, while as per the user's
requirement application software is installed.
■ System software includes programs such as compilers,
debuggers, drivers while application software includes ■ That operating system is the group of instructions that
media players, word processors and spreadsheet runs various activities of the computer such as
programs. memory, processor, file system and other I/O devices,
■ Generally users do not interact with the system in addition to this it also decides who will use the
software as it works in the background while the user various devices of the computer and For how long will
performs various tasks interacts with application do it? Operating systems perform the following
software during activities. functions-
M1R5 29 YCT
Search on TG: @apna_pdf
Job Management– Job management is the process A computer system can be booted in two ways, first
of organizing the execution of jobs required for a system cold booting which occurs when the computer is first
to funtion jobs are usually arranged in a sequence called turned on and second warm booting in which the
FIFO (First In First Out). computer is already on and it is restart. [ Ctrl + [Alt] +
Most OS like Unix, Windows etc include standard [Del] Keys Combination is used for warm booting.
job management capabilities Database Management
System (DBMS), many programs also have specific job 1.11 Utility Softwre:
capabilities, including backup. Utility software is a type of system software
Task Management– Task Management is a system designed to assist in the analysis, configuration, and
monitoring program that provides information about the maintenance of a computer.
processes and programs running on the computer as well The following are examples of utility software:
as the general status of the computer. ■ Virus scanner– To protect computer system from
In multiprogramming computers, the operating trojans and viruses.
system decides which process will get the processor and ■ Disk Defragmenter– To increase the speed of hard
which will not and for how long. This process is called disk.
task management. ■ File Manager– To add, remove, rename and transfer
Data Management– The main function of the files and folders.
operating system is to keep track of the data on the disk.
from which its name DOS (Disk Operating System) was 1.11(i) Utility Program:
installed. A utility program is a type of system software that is
Operating system access methods or device driver used to perform a specific task utility some examples of
routines contain knowledge of where to get data to an programs are as follows-
application program have to retrieve when a program is Assemblers– This is a program that reads a program
ready to accept data, the operating system (OS) signals written in assembly language and translates it into
with a coded message. The OS locates the data and machine language. This translation is necessary because
delivers it to the program. In contrast, when the program the computer can only follow the program written in its
is ready for output, the OS transfers the data from the machine language.
program to the next available space on disk. The source program of the assembly language
Security– In a multi user and multi programming program is also called the object program and the
system where many programs of many users run at the program that is obtained after its translation into machine
same time however, protecting those programs and their language.
data is a complex task. Compilers– Compiler is a program that converts the
In multi programming system, many jobs are program or source code written in high level language
processed in RAM at the same time and the data into machine language or object program.
processed by jobs is also remains in RAM there are It reads the entire program at once and points out all
always the possibility that the output of a program may the errors. This converts the program into machine
not be stored in the data space. language when the errors are removed. A separate
Operating systems maintain a list of authorized users compiler is required for each high level language.
and provide password protection against unauthorized A compiler is more intelligent than an assembler,
users. but its program execution time is longer.
Boot Strap Program– Bootstrap is a program that Compiler checks all types of limits ranges and errors
initiates the operating system during startup. etc.
Bootstrapping is the process of loading a set of Interpreters– It translates the source program
instructions when a computer is powered on or booted. written in high level language by a program into machine
During the startup process, diagnostic tests are language. Interpreter translates each instruction one by
performed Such as Power on Self Test (POST) which one without storing it, then translates another instruction.
sets the configuration for the equipment and routine tests In this way, when the whole program is executed, it
for connections to peripherals, then the bootstrap finally gives the response.
program is loaded to start the OS. ROM chip in PC Basically the work of Compiler and Interpreter is the
(Personal Computer) has a small boot strap routine same, the only difference is that while Compiler creates
which is automatically executed. Object Program, Interpreter does not create anything, so
source program is required every time while using
Such PC (Personal Computers) in which single
Interpreter.
tasking operating system is used, it is necessary to reset A compiler is 5 to 25 times faster than an interpreter.
them after they are cached. Interpreter takes less memory space.

M1R5 30 YCT
Search on TG: @apna_pdf
1.12 Open Source and Proprietary Software: Types of Mobile Applications– There are three
Software that is developed and tested through open types of mobile apps-
collaboration is called open source software. With 1. Native Apps– These types of apps are specially
academic knowledge anyone can inspect, modify and developed for single mobile operating system so they can
redistribute the source code. In this, the management of be used on a particular platform only. The Android app
the project is done by the open source community of cannot be used on the iPhone. Apps made for systems
developers and programmers. They are not aimed at Such as Android, Windows Phone cannot be used on any
unskilled users. It provides better flexibility. platform other than itself.
Software that is owned by the person or organization 2. Web Apps– These types of apps also behave in
that developed it is called proprietary software. Only the the same way as Native Apps. Web apps use a browser
owner or publisher who holds the legal property rights to to run, which are usually coded in HTML, JavaScript, or
the source code can access this software. This project is CSS. Chrome, Firefox, Opera and Safari are web
used or managed by a closed group of the team who applications. These apps are generalized for multiple
developed it. This software is focused on a limited platforms and cannot be installed locally. It is made
market of both skilled and unskilled users. There are available on the Internet through a browser.
restrictions as well as limited scope for innovation. 3. Hybrid Apps– Such apps are a combination of
1.13 Mobile Apps: both native and web apps. Hybrid apps are often used to
A mobile app is a type of application software refer to mobile computing.
designed to run on a mobile device (tablet, smartphone). In modern times, mobile companies are increasingly
Applications are usually small, personal software units making smartphones. With the help of communication
with limited functions. App software is originally used apps, people can sit anywhere and share any information,
by Apple Inc. and was popularized by its App Store, audio, video, image etc. Through these mobile apps, we
which offers many applications for the iPhone, iPad, and can easily do shopping, ticket booking, bill payment,
iPod Touch. getting traffic information etc. while sitting at home.
Applications are typically downloaded from Following are some of the important mobile
application distribution platforms operated by the owner applications-
of the mobile operating system, such as the Google Play BHIM App– The full name of BHIM is Bharat
Store App Store (iOS). Mobile applications provide users Interface for Money. It was launched by the Government
with services similar to those that can be accessed on a of India on 30 December 2016, through which we can
personal computer. Using these, any person can talk to make fast, secure and reliable cashless payments with the
help of our mobiles. BHIM integrates with other UPI
anyone from any place, internet browsing, entertainment
applications and bank accounts to easily transfer money.
etc. In modern times, mobile apps are widely used in It is developed by National Payments Corporation of
their vast work areas such as calling, browsing, chatting, India. Through BHIM app, we can send or receive
social network communication, games, audio, video etc. money from one account to another. You can send
Some applications are pre-installed in the mobile and money to any person using UPI ID only. BHIM app can
other apps can be installed using internet. Some apps are be used not only to transfer money but also to make all
available for free to use, while some apps cost money, other types of online payments.
the profit of which is split between the application Following are some of the salient features of BHIM
developer and the app distribution platform. app-
There are following categories of mobile (i) UPI supports all banks.
applications on the basis of usage- (ii) It is based on Immediate Payment Interface.
■ Communications–E-mail, Facebook Twitter, (iii) Money transfer can be done using the UPI address
Instagram etc. (mobile no.).
■ Multimedia–Graphics, image, presentation viewer etc. (iv) This app can work even without internet.
■ Games–Temple Run, Solitaire, Trivial Crack, PUBG (v) It allows instant money transfer between two bank
etc. accounts.
■ Productivity–Notepad, Calendar, Calculator etc. (vi) Presently maximum `10,000 per transaction and
■ Business–Adobe Acrobat Reader `20,000 transactions per day are permitted.
■ Utility–Bitmoji, Flashlight, Speed Test My Gov App– It is a portal of the Government
■ Travel–Google Earth, United Airlines etc. of India which was launched by Prime Minister Narendra
Installing Mobile Apps– Mobile apps are installed Modi on 26 July 2014. The main objective of this portal
by searching them from application distribution is to connect the citizens with the government and act as
platforms. Apps can be installed from the Google Play a medium to join hands in the development of the nation.
Store for Android devices and the Apple App Store for The app gives citizens an opportunity to participate in
iPads and iPhones. To install the app, navigate to your discussions and debates on a wide range of topics and
App Store and select the app as per your requirement and exchange ideas with a wide range of people. Through
download the app. After downloading, the device this app, users can log-in and share their suggestions,
automatically installs it. feedback and ideas with Central Ministry.

M1R5 31 YCT
Search on TG: @apna_pdf
IRCTC Connect App– It plays an important role The service transformations achieved through PSP
in railway reservation system, it helps passengers to get are as follows-
train related information on the basis of destination. • Through PSP Portal (www.passportindia.gov.in)
Status of booked tickets, ticket cancellation etc are done citizens can pay passport fee from anywhere at their
through e-governance. Reservation and cancellation of convenience. It also provides latest information on
train tickets is done through the official website of all passport related services.
IRCTC (Indian Railways Catering and Tourism • PSP has expanded to 37 Passport Offices to increase
Corporation Limited) www.irctc.co.in. its network.
Digital Locker App– Digital Locker is a service • National Call Center operated in Indian languages,
operated by the Department of Electronics and for Indian citizens to obtain passport related
Information Technology, Government of India. It allows information.
all Indian citizens to scan or store their documents in Online RTI App– RTI means Right to
digital formats. It uses cloud computing where all Information, this law came into force in our country in
citizens are given 1GB of storage space in a secure and
private cloud account. It is part of the Digital India 2005, using which you can ask for information from the
initiative of the government. government and any department, under 'right to
To use the Digital Locker portal, sign up using the information', the country's democracy is strengthened
Aadhaar card number at digitallocker.gov.in. The OTP and administrative Participation of common citizens in
sent to the mobile number linked with Aadhaar has to be works increases. The biggest objective of bringing this
entered. law was to give the common people the right to question
Following are the objectives of Digital Locker the government. This law can prove to be a great way to
System- stop corruption. This law is applicable in all the states of
• Digitally empowers to the residents by providing India except Jammu and Kashmir. 'J&K RTI' runs in
digital lockers on the cloud. Jammu and Kashmir. Almost all the constitutional posts
• By ensuring the authenticity of e-documents, it also come under this law whose information can be obtained.
eliminates the use of fake documents. It protects the rights of the common citizens and
• Easy access to documents for residents at any point empowers the citizens. Under this law, a person can get
of time. all the information related to his personal life, such as
• It ensures the confidentiality and authorized access passport, provident fund related information, tax refund
of the data. related information, pension related information etc.
Along with this, by using the RTI Act, people can get
• Provides a well-structured document format to information related to complaints of corruption,
support easy sharing between departments and problems related to electricity, water, repair of roads, etc.
agencies. Important rules related to Right to Information–
• Through this, departments and agencies make it Under this, it is necessary to take care of some special
easier for residents to get services. things before submitting the application-
Voter Helpline App– The Election Commission • An Indian citizen can submit his application under
has developed Voter Helpline App to solve the problems this. If you are an Indian citizen, using this you can
of voters at home. Through this mobile app, citizens can also get the necessary information from the
register their names in the voter list, modify it, transfer to government office.
another part of the same assembly, transfer from one • In this application the applicant has to submit the
assembly to another, know the candidates involved in the exact name of the government organization from
election process, know the results of the election facility where the applicant has to get the information.
has been made available. • Many institutions have been kept separate from this
GARV App– The full name of this app is act. Security and intelligence agencies have been
Gramin Vidyutikaran App. The app provides the facility kept out of this under section 24 (1) of the Right to
to track the progress of rural electrification in India Information Act.
through a dashboard in real time. Dashboard is • The applicant has to send the application fee along
multilingual, which is user friendly. Through this you with his application.
can also see which villages will be electrified. • Under this the applicant gets the result within 30
M Passport Seva App– In the last few years, the days. Urgent documents can also be received in 48
Government of India has taken several initiatives in e-
governance to improve public services. The National e- hours.
Governance Plan (NeGP) includes several high-impact e- Process of filing RTI– Under this, the applicant can
Governance projects, including Passport Seva. adopt the following process for applying and obtaining
The Ministry of External Affairs is responsible for information-
issuing passports to Indian citizens ministry of external • You can write an application with your own hand to
affairs (MEA) 37 passport centers across the country, apply under it. Many online samples are also
Issues passports by creating a network of 180 India Post available for this with the help of which the
offices and abroad. application can be written.
Passport is an essential travel document for those • If you have any difficulty in writing the application,
who are traveling abroad for education, tourism, you can also get help from the Information Officer.
pilgrimage, business purposes and family visits. In order • The application form for this has been put online by
to enhance and improve the delivery of passport services the Central Government, which you can get from the
to Indian citizens, the Ministry of External Affairs website https://rtionline.gov.in/request/request.php.
launched passport Seva Project (PSP) in May 2 010. PSP With the help of this application can be made by
is a simple, efficient and enables transparent process. depositing the online fee sitting at home.
M1R5 32 YCT
Search on TG: @apna_pdf
Practice Questions with Explanatory Solutions
1. Which symbols are used in hexadecimal number Ans.(c) Plotter heads, tracks, sectors, clusters,
system? cylinders etc. are the components in a hard disk drive.
(a) 0-7 (b) 0-9 The surface of the disc is divided into a number of
(c) 0-9, A-F (d) none of these invisible concentric circles called tracks. Each track is
divided into small blocks called sectors. There are 8 or
Ans.(c) The base of the hexadecimal number system more sectors on a track.
is 16 and the range is from 0 to 9 and from A to F i.e.
The storage capacity of a hard disk depends on
the symbols used in hexadecimal are 0. 1, 2, 3, 4, 5, 6,
the number of surfaces in the disc pack.
7, 8, 9 is A, B, C, D, E, F.
6. What is information?
2. Binary of (23)10 :
(a) data
(a) 01011 (b) 10111
(b) significant and understandable data
(c) 10011 (d) none of these
(c) alphanumeric data
Ans.(b) (d) program
2 23 Ans.(b) When instructions are given to the computer
2 11 1 to perform any task, then this data is processed and
2 5 1 meaningful results are given.
2 2 1 7. which is called information. Which of the
1 0 (10111)2 following is not an output device? [July 2003]
(a) Plotter
3. Also known as daisy wheel printer– (b) Printers
(a) Line printer (b) Petal printer (b) RAM
(c) Golf ball printer (d) laser printer (d) Smart and Digital Terminal
Ans.(c) MICR is an input device used in banks to
Ans.(c) A plastic wheel is used for printing in daisy recognize magnetic encoding numbers printed on
wheel printer, whose shape is similar to daisy flower, cheques.
so it is called daisy wheel printer. This wheel is 8. Which of the following is a secondary storage
rotated at high speed by a motor when the position of device? [July 2003]
the correct letter comes on printing, it prints the (a) CD-ROM (b) RAM
character. The quality of these printers is good. These (c) ROM (d) OMR
printers can print 10 to 50 characters in a second.
These are impact printers. These are also called golf Ans.(a) CD-ROM is an optical disc in which data is
ball printers. stored for future reference. CD-ROM one is a
secondary storage device.
4. .........is a system software.
9. The equivalent decimal number of (1101011)2 is–
(a) operating system (b) loader
[Jan 2005]
(c) linker (d) all of these
(a) 107 (b) 111
Ans.(a) System software is the software which is (c) 110 (d) 164
written to run the computer, control it, take care of its
Ans.(a) (1101011)2 Equivalent to Decimal Number;
various parts and make good use of all its capabilities.
Our communication system with the computer is done 1101011→ 1 × 26 + 1 × 25 + 0 × 24 + 1 × 23 + 0 × 22 +
through software. 1 × 21 + 1 × 20
Operating systems are the main type of system 64 + 32 + 0 + 8 + 0 + 2 + 1 = (107)10
software. Without which it is impossible to run the 10. Which of the following is not a high level
computer. This is the first program that gets loaded language? [Jan 2005]
into the computer's memory when the computer is (a) C programming (b) LISP
switched on. (c) Java (d) assembly
5. The storage capacity of a disk system depends on Ans.(d) High level language is a programming
the bits per inch of track and tracks per inch. language which is designed to simplify computer
(a) Platter (b) cluster programming. C++ C#, COBOL Photon, Java,
(c) Surface (d) cylinder JavaScript Pascal, LISP etc. are high level languages.

M1R5 33 YCT
Search on TG: @apna_pdf
11. ASCII means- [July 2005] 17. Who tanslates the program in high level language
(a) American Standard Code for Information into mahine code?
Interchange (a) Assembler (b) Compiler
(b) American Statistical Code for Information (c) Operating (d) Editor
Interchange Ans.(b) A compiler is a program that converts a
(c) Alphabetic Series Co for Information program written in a high level language into a
Interchange machine language. Each high level language requires
(d) Alphabetic Standard Code for Information a separate compiler.
Interchange 18. What type of software is Linux?
Ans.(a) The full form of ASCII is American Standard (a) Compiler (b) Operating System
Code for Information Interchange. It uses 17 bit (c) Utility Software (d) Application Software
binary code to represent text in the computer. Ans.(b) Linux operating system is a multiuser,
12. The equivalent octal number of binary bits multitasking and multiprocessing software desingned
(1001101) is- [July 2007] for personal omputers. It is open soure operating
(a) 464 (b) 715 system.
(c) 125 (d) 115 19. RAM............is a memory:
Ans.(d) (1001101)2 Equivalent to Octal; (a) Volatile (b) Non-Volatile
(1001101)2 → 1 × 26 + 0 × 25 + 0 × 24 + 1 × 23 + 1 ×
2 1 0 (c) Cache (d) None of these
2 +0×2 +1×2
64 + 0 + 0 + 8 + 4 + 0 × 1 = (77)10 Ans.(a)Volatility of computer memory refers to the
most appropriate "Capaity to retain". RAM is volatile
8 77 memory which means information is lost when power
(77)10 → 8 9 5 off.
1 1 (115)8 20. Hexadeimal of binary number 1001001011:
∴ (1001101)2 Equivalent to Octal = (115)8 (a) 587 (b) 24B
13. The most appropriate input device for Kiosk (c) 92B (d) None of these
operation is: Ans.(b) Hexadecimal number of (1001001011)2:
(a) Key-board (b) Trackball 1001001011 = 1 × 29 + 0 × 28 + 0 × 27 + 1 × 26 + 0 ×
25 + 0 × 24 + 1 × 23 + 0 × 22 + 1 × 21 + 1 × 20
(c) Bar code Reader (d) Touch-pannel
= 512 + 0 + 0 + 64 + 0 + 0 + 8 + 0 + 2 + 1
Ans.(d) Information Kiosk is like an ATM machine in = (587)10 decimal
which all the hardware such as PC. Motherboard,
(587)10 →
RAM, hard disk etc. are inbuilt. Input can be with the
help of touch panel.
14. By whom was the basic architecture of computer
developed?
(a) John von Nmen (b) Charles Babbage
(c) Blaze Pascal (d) Gardan Mure
Ans.(a) Basic architecture of computer was developed (24B)16 [Hexadeimal]
by John von Numen. 21. Standard Alphanumeric Code is- [July 2015]
15. Which language is written in the form of binary (a) EBCDIC (b) UNICODE
binary digits? (c) ASCII (d) None of these
(a) Assembly (b) High level Ans.(c) When the user writes anything on the
(c) Machine (d) Basic computer, this uses ASCII (American Standard Code
Ans.(c) Only two digits zero and one are used in for Information Interchange) to write. ASCII code is
machine language. It is the basic language of the used to display number characters and symbols in
computer, which is written in binary Code. every computer. Presently this code is accepted by
computer system system and uses 7 or 8 bits to
16. Which file extension indicates only graphis file? represent the data.
(a) BMP and DOC (b) JPEg and TXT
22. Artificial Intelligence is related to which
(c) TXT and STK (d) BMP GIF generation- [July 2013]
Ans.(d)BMP (bitmap) and GIF file extenssion indiates (a) first (b) third
only graphics file.
(c) fourth (d) fifth

M1R5 34 YCT
Search on TG: @apna_pdf
Ans.(d) Fifth generation computers are based on ULSI 27. The operating system of a computer does the
(Ultra Large Scale Integration) technology. Artificial following:
intelligence capability is being developed in the (a) Disk and file management
computer of this generation, due to which the ability (b) Management of computer resoures
to think on its own is being created in the computer. (c) Management of computer memory
(d) All of the above.
23. BIOS means- Ans.(d) Operating system is a type of system software
(a) Base Input Output System without which running of computer is not possible.
(b) Basic Input Output Source The operating systems perform many funtions such as
(c) Basic Input Output System disk and file management, computer resource
(d) None of these management, memory management Job management,
task management, data management, security etc.
Ans.(c) BIOS stands for Basic Input Output System. It
is a software or firmware, which enables you to start a 28. Which can be used to input printed text?
(a) OCR (b) OMR
computer system. When system starts, BIOS runs a (c) MICR (d) All of the above
Power On Self Test (POST) to ensure up that all
Ans.(a) OCR is used to input printed text. The full
hardware connected to the system is working properly. form of OCR is optical character Recognition. Which
24. Example of utility software is- is used to recognize text in digital images. Using this
(a) Virus scanner (b) Disk Defragmenter any hard copy document can be converted into
(c) File manager (d) All of the above electronic version (soft copy).
Ans.(d) Utility software is a type of system software 29. What is the meaning of EEPROM?
designed to assist in the analysis, configuration and (a) Electronically erasable program read only
maintenance of a computer. memoy.
(b) Eletrically erasable programmable read only
Following are the examples of utility memory.
software- (c) Electronically erasable programmable read only
Virus scanner– To protect the computer system from memory.
trojans and viruses. (d) None of these.
Disk Defragmenter– Its increase the speed of hard Ans.(b) The full form of EEPROM is Electronically
disk. Erasable Programmable only Memory. It is a type of
File Manager– To add, remove, rename and transfer non-volatile memory used in computers and other
files and folders. electronic devices to store relatively small amounts of
data.
25. On which is the fourth generation computer
based? 30. Which of the following is the largest unit of
(a) Microprocessor (b) VLSI chip storage is;
(c) ULSI chip (d) All of the above (a) MB (b) TB
(c) KB (d) GB
Ans.(b&c) VLSI (Very Large Scale Integration) and
ULSI (Ultra Large Scale Integration) started being Ans.(b) The computer understands only machine
used instead of LSIC in fourth generation computers. language, whih includes a combination of two digits 0
In which about millions of things could be stored in a and 1, and in this form the computer stores the data in
single chip. Languages like Fortron-77, Pascal, ADA, the memory. These are called bits or binary digits of a
COBOL 74 etc. were used in computers of this computer is written in binary code. It starts with 8 bits
generation. The use of mini computers increased in or digits. A group of 8 bits is called 1 byte.
this generation. There was compatibility between 1 Bit Single Dgit 0 or 1
devices from different hardware manufacturers so that 1 Nibble 4 Bits
the consumer was not tied to a single vendor.
Computers of this generation IBM PC-XT Apple 11, 1 Byte 8 Bits
Intel 4004 chip etc. 1 KB (Kilobyte) 1024 Bytes
26. UNIVAC IS: 1 M B (M egabyte) 1024 KB
(a) Universal Automatic computer 1 GB(Gigabyte) 1024 M B
(b) Unvalued Automatic Computer 1T B (Terabyte) 1024 GB
(c) Unique Automatic Computer
1 PB (Petabyte) 1024 TB
(d) Universal Array Computer
1 EB (Exabyte) 1024 PB
Ans.(a) The full form of UNIVAC is Universal
Automatic Computer. It was invented in 1951 by J. 1 ZB (Zettabyte) 1024 EB
Prosper Eckert and John Mauchly (USA). It was used 1 YB (Yotta Byte) 1024 ZB
for commercial use. This omputer can process both 1 Bronto Byte 1024 YB
statistical and Textual data. It contained all the
1 Geop Byte 1024 Born to Byte
qualities of the first generation computer.

M1R5 35 YCT
Search on TG: @apna_pdf

2 INTRODUCTION TO OPERATING
SYSTEM

2.0 Introduction: The function of an operating system for a computer


Operating system is a software (group of programs) is mainly to manage the software and hardware resources
that controls the internal activities of the computer and of the computer. Software resources include various
provides interface to the user. It manages memory and software applications used on the desktop/laptop. While
files and exchanges data between memory and storage computer's hardware resources include memory, hard
disks. The operating system acts as an interface between disk, disk space, mouse, printers and other peripherals
the computer hardware and application programs in the etc.
input/output and memory space allocation of the 2.3 Operating Systems for Desktop and
hardware whereas application programs are usually Laptop:
executed directly by the hardware.
Computer and all similar devices such as laptop,
Operating systems can be divided into four tablet, desktop and smartphone etc also need an
categories, which are single user, multiuser, single operating system. The most commonly used operating
tasking and multitasking. Without an operating system, systems in desktops and laptops are single user operating
the hardware cannot execute any application programs. systems. Windows operating system developed by
Some application software such as Video Player, Web Microsoft Company is commonly used in desktops and
Browser, Calculator, etc. are already built in with most laptops. Mac OS developed by the Apple company is
of the operating systems. used in desktops and laptops. Linux is also a popular
The function of the operating system for a computer operating system with different available versions.
is mainly to manage the software and hardware resources Desktops are a personal computer that can be kept
of the computer. Software resources include various fix at one place, their functionality can be increased by
software applications used on desktop/laptop. While adding desktop devices very easily. A laptop is a single
computer hardware resources include memory, hard disk, unit that has a keyboard, mouse, monitor, webcam,
disk space, mouse, printers and other peripherals etc. speakers, etc. built-in. Laptops can be easily moved
2.1 Operating System: anywhere while desktops need to be disassembled before
moving from one place to another. You can upgrade
A computer's operating system (OS) is the software version of any component in desktop its capacity can be
that controls the internal activities of the computer increased by using, whereas in laptops, only the memory
hardware and provides an interface to the user. and hard drive can be upgraded.
The operating system is the first program that is At present, operating systems based on GUI
automatically loaded (copied) into the computer's (Graphicial User Interface) are used in desktops and
memory after the computer is switched on. Some popular laptops, in which Windows operating system is popular.
operating systems are Microsoft DOS (MS DOS), Operating systems used in desktop and laptops are
Windows XP, Windows Vista, OS/2, Unix, Windows 7, Microsoft Windows, apple macOS Ubuntu, Linux, mint,
Windows 10 etc. Fedora, Debian, Chrome OS, SkyOs, Dos etc.
It ensures control, coordination and optimum 2.3(i) DOS (Disk Operating System):
utilization of various hardware resources. One function DOS is an operating system. It is an important
of the operating system is to allocate and deallocate software for performing simple tasks of a computer
computer resources for one or more tasks. system. DOS stands for Disk Operating System. This
Some operating systems support only one user at a operating system acts as a medium between the user and
time, they are called single user operating systems. Such the computer system. To run the computer through this
as Windows XP; some OS support many users at once; operating system, it is necessary to load the operating
they are called multi users such as- Linux, Unix etc. system into the memory. It converts those commands,
2.2 Basics of Operating System: which are entered with the help of the keyboard, into
Operating system is software (group of programs) such a language that the computer can easily understand.
It is stored on disk and loaded into memory from the
that controls the internal activities of the computer and
user's hard disk. DOS was the first operating system used
provides interface to the user. It manages memory and by the IBM Company for its computers. It was basically
files and exchanges data between memory and storage available in two versions that were same, but under two
disk. Operating system, Acts as an interface between different names. PC-DOS was the version developed by
computer hardware and application programs, whereas IBM and MS-DOS was provided by Microsoft. The
application programs are usually executed directly by the operating system which repeatedly takes the help of disk
hardware. in its work is called Disk Operating System (DOS).
M1R5 36 YCT
Search on TG: @apna_pdf
MS-DOS designers have divided the functions of the Windows also provides some functions that allow
operating system into two parts as frequently used and the user to manage multiple programs at the same time. It
occasionally used functions. Groups of frequently used customizes PC and also does the work of much
functions form a large program that is loaded into the maintenance related to it.
computer's memory during the booting process. Windows takes care of PC and keeps on doing many
Infrequently used functions are stored on disk and loaded tasks in the background which is not visible to the user.
into memory only when needed. Windows becomes engage in managing software
packages and hardware working in the background.
Internal Commands– Functions that are
automatically loaded into memory during the booting Windows task are following:
process. These are always available for use and stored in ■ Windows takes care of the personal computer. It does
many tasks simultaneously in the background. This is
a single program file, Commands.com.
called multitasking. It means that users can open both
For Example DIR is an internal command. word processing and spreadsheet programs at the same
External Commands– Such functions which are time and work on them alternately.
used occasionally and remain in storage are called ■ It provides a way for the user to manage files.
external commands. These are individual program files, Documents such as letters, memos and worksheets
so their program file names are also different. created by a user are called files. Windows Explorer is
For example, FORMAT is an external command. a file management program and comes with Windows.
2.3(ii) Windows Operting System: It is used to copy, move, delete, organize or work with
Windows is an official user interface operating files.
system developed by Microsoft. In this, MS-DOS short ■ Windows provides a way to customize the desktop and
coming were considered and it was made user friendly. other screen areas of the monitor.
Windows is 32/64 bit multitasking operating system ■ Windows comes with a number of useful accessory
software. Microsoft Company released Windows 3.0 in programs, such as WordPad and word processing
1990 to overcome the shortcomings of MS-DOS. Later programs. It includes a text editor; there is also a
some revised versions of it were issued from time to time notepad which is used for typing notes etc.
such as Windows 95, Windows-98, Windows ME.
Windows XP, Windows Vista, Windows 7, Windows-10
2.3(iii) Linux Operating System:
etc. Linux operating system is a multi-user, multi-
It is based on Graphical User Interface (GUI), so ittasking and multi-processing software designed for
is easy to learn and operate. Pictures, graphs and letterpersonal computers. It is a freely available open source
works can be done in this. The working method of all operating system developed for network use. The first
programs based on Windows is almost the same. In this, version was brought out by Lines Benedict Torvalds in
the knowledge of one program is also useful in another 1991. Linux is a 32 bit operating system. It includes most
program. It is a multitasking single user operating of the features of all other operating systems, not just
system. In this, many programs can be run Unix. All versions of Linux are distributed free of cost
simultaneously and work can be done on it. It is an via the Internet. Red Hat Ubuntu and Chromium etc. are
object oriented software. Linux based operating systems.
A key part of this is the kernel, which is fully
protected against application crashes, due to which Linux
does not have to be restarted even after an application
crash. It is completely safe from virus attack. Linux is
also a multi programming operating system. In this multi
programming facility is available through time sharing.
In this, DOS based programs can also be run with the
help of DOS Emulator. Linux also works on GUI
Fig - 2.1 Windows Operating System Logo (Graphical User Interface). Its window is called X-
Windows. Apache web server is also available in Linux,
The software part of the interface determines the
which prepares and organizes webpages, it is available
commands to be given to the PC. Prior to Windows, this
for free on the Internet.
work was done by keyboard commands and therefore
operating system seems very difficult to use. With the 2.3(iii)A. Basic Elements of Linux:
invention of Windows environment, many daily tasks of Following are the features of Linux Basic elements–
computers such as running programs, opening files, Kernel– The kernel is the main part of Linux, which
selecting commands, etc. are done through a graphical organizes and operates other programs and hardware.
approach. The kernel is the central module of the OS. It is the part
As soon as a user switches on the power supply, the of the operating system that is loaded first and then
Windows operating system program is loaded into the transferred to the main memory. Maintaining time and
PC after some initial checks and then takes over the date, launching applications and allocating system
control of the PC provides a communication link. resources etc. are also functions of this part of OS.
M1R5 37 YCT
Search on TG: @apna_pdf
Shell– Shell is a program that interprets the 2.3(iii)C. Key Differences between Windows
commands given by the user. Shell is also called and Linux Operating System
Command Interpreter. Commands in the shell are either
Following are the differences between Linux and
typed on the command line or placed in a file.
Windows operating system-
File System– Linux treats everything as a file. A
(i) Linux is completely free while Windows is a
directory containing multiple files is also treated as a
marketable operating system.
single file. In Linux, all hardware devices such as I/O
devices, storage devices, etc. are considered as files. In (ii) Linux is an open source operating system where
this, the files are arranged according to the hierarchy in users can access the source code and make
the directory. The topmost directory is called the root improvements to the code using the system. In
directory. It is denoted by a slash (/). All files and Windows users cannot access the source code and it
directories becomes root is attached to the root directory. is a licensed operating system.
(iii) Linux provides higher security than Windows
2.3(iii)B. Feature of Linux Operating because Linux is open source.
System:
Following are the features of Linux operating (iv) Windows can be booted from primary partition. In
system–- contrast, Linux cannot be booted from a primary
1. Low Cost– Most Linux variants are almost free or partition.
very low cost compared to Microsoft on Windows (v) File names in Linux are case sensitive while
available. Windows file names are case insensitive.
2. Stability– Linux does not require rebooting to (vi) Linux uses a monolithic kernel, which consumes
time to maintain the presentation level. It doesn't slow more running space while Windows uses a micro
down over time because of memory leaks. kernel that takes up less space but the efficiency of
3. Performance– Linux continues to deliver high running the system is lower than that of Linux.
performance on networks and workstations. It handles a 2.3(iv) Mac Operating System:
large number of users simultaneously.
Mac is an operating system. No computer can be run
4. Flexibility– Linux is used for high performance
without operating system. It is an operating system itself
server applications certain disk space can be saved by
but it is slightly different from other operating systems. It
installing only the components required for use. It is
runs on Macintosh Computer. The Mac operating system
called Desktop Application and can also be used for
is a series of graphical operating systems. It was created
Embedded System.
by Apple. It is a Unix based operating system. It is the
5. Multi Tasking– Linux is designed to perform second most popular desktop operating system after
multiple tasks at the same time as if there is a big Windows. It was used in GUI (Graphical User Interface).
printing job going on in the background. But this will not Its cost was slightly higher than other operating systems
affect other functions. but its design was very simple. All the work could be
6. Network Friendly– Linux is a network friendly easily done by the mouse on Mac computer. It was made
operating system. Linux was developed by many for personal computers.
programmers together through the Internet, so more
priority was given to the Internet in particular. The Linux 2.4 Operating Systems for Mobile Phone
operating system itself has the ability to act as a powerful and Tablets:
Internet service provider, as well as a client or server on Just as the Linux or Windows operating system
any OS able to act as. controls the desktop and computer, in the same way the
7. Compatibility– All Unix software packages can mobile operating system controls your mobile devices
run on Linux and it is common to all can process file such as mobile phones, smartphones, PDAs, tablets,
formats. smartwatches, etc. This operating system is responsible
8. Full use of hard disk– It works well until the for controlling all the applications running on the mobile
hard disk of Linux is completely full. and determining all the features. It will also determine
9. Fast and Easy Installation– Popular Linux mobile input, synchronization with WAP applications, e-
distributions come with tools that make installation of mail, text messaging, etc. Some examples of your mobile
additional software user-friendly. They also setup the operating system - Android OS (Google Inc) iPhone OS
programs. (iOS Apple), Bada, Black Berry, Windows Mobile etc.
iOS is Apple's mobile operating system that runs the iPad
and iPod touch devices. It uses a multi-touch interface.
The icon screen displayed when a mobile device is
turned on for the first time is managed by the operating
system. The device does not turn on without the
operating system. A mobile operating system is a set of
data and programs that run on a mobile device. It makes
possible to manage hardware as well as run apps for
Fig- 2.2 Linux logo
smartphones, tablets and wearable devices.
M1R5 38 YCT
Search on TG: @apna_pdf
Some of the operating systems for mobile phones
and tablets are as follows-
Apple iOS– In Apple iOS each app is in its own
protective shell and also prevents other apps from
tampering with them. It offers Wi-Fi, Bluetooth and
cellular connectivity with VPN support. These have
integrated front and rear facing cameras with video
capability. Apple iOS provide direct access to the Apple
App Store and iTunes catalog of music, etc.
Android– Android is a Linux-based operating
system designed for touch screen mobile devices such as
tablets, smartphones. It supports many convenient
applications for the users, it is an open source operating
Figure - 2.3 Start Menu of Windows 10
system which can be used by anyone for free. storage in
Android, messaging in the form of SMS and MMS, Search box–By typing on the search box, you can
multilingual support, multi touch, video calling, screen search your documents and files or anything on the web.
capture, streaming media support, external storage etc. As soon as you type in the search box, results start
features are available and it provides connectivity in the appearing related to it. You can open them by clicking on
form of Bluetooth, CDMA, Wi-Fi, LTE, GPS. them. You can also search your command by clicking on
the microphone built in the search box. Web results
Symbian OS (Nokia)– Symbian is an operating based on your location at the top of the best match list
system designed for mobile phones that provides a high and remaining matching results related to the command
level of integration with communication and personal being searched in Cortana. Documents/folders, apps, are
information management. displayed in groups according to system settings.
Windows Mobile– Windows Mobile is a mobile You can also talk to Cortana as a virtual assistant
operating system from Microsoft that is used in and get answers to your questions like- How is the
smartphones and mobile devices. It supports Microsoft weather today?
Office apps and lets you synchronize your information
between multiple devices.
BlackBerry Operating System– The BlackBerry
Operating System is a proprietary mobile operating
system developed by Research In Motion (RIM) for the
company's popular handheld devices. It also provides
synchronization with Microsoft Exchange, Lotus
Domino, Novell GroupWise Email and other commercial
software when used with Microsoft Enterprise Server.
2.5 User Interface for Desktop and Laptop:
Desktop– The user uses the screen of Windows in
such a way that we use the top of our desk, that's why it
is called desktop. Desktop Windows is a work area
located on the screen where the user works.
While working on Windows, users move items on
the desktop, delete them, restore them, and also perform
many other functions.
When you turn on the PC or boot Windows 10, the
desktop is displayed. The taskbar is displayed at the Figure- 2.4 Cortana in Windows 10
bottom of the desktop, in which various tools such as the Task View– This is a new feature in Windows 10
start menu, taskbar search box, etc. are available. that allows you to have multiple desktops open. It gives
Following are some of the basic features available on the you multiple desktop screens from which you can
desktop screen- organize all the open windows. If you're switching
Start Button– Through the start menu, you can between multiple apps, you can group them on a separate
easily access the apps available on your PC. Clicking on desktop so you can switch between screens without
the Start button on the left edge of the taskbar displays minimizing them.
the Start menu. ■ To add a virtual desktop,
The left side of the start menu provides quick links • Click on Task View on the taskbar.
to frequently used apps, power button, alphabetical list of • Click on New Desktop on the upper left corner.
all apps, etc. Apps that are always available on the right • You can access or delete the new desktop by
side of the Start menu are pinned and you can start the clicking on Task View again.
app by clicking on them. These are available in the form • You can store back any missing app on the screen
of tiles by clicking on which you can start the app. You while working on your PC, laptop. For this,
can also remove these tiles from the menu by right- • Click on the Task View button and all the
clicking on these tiles of apps, resizing or unpinning programs open on your device will appear as
them. thumbnails.
M1R5 39 YCT
Search on TG: @apna_pdf

Figure - 2.5 Task View of Windows 10


• By clicking on the thumbnail you can get the full
size screen of the same program. You can return Figure- 2.7 Action Center Pane
to the desktop by closing apps or programs that Action Center– The work of the Action Center in
you don't want the view of thumbnail. Windows is only to give information about the activities
Microsoft Edge– This new browser is designed to happening in the computer in the form of messages.
give Windows users a better experience on the web, There are different types of icons on the right side of the
Which includes many new features. It can be accessed by taskbar. You can open the Action Center pane by
clicking on the icon available on the taskbar. It opens the clicking on the Action Center icon.
screen just like other web browsers, in which the
Action Center in Windows displays your computer's
following buttons are available for different functions-
antivirus, internet related information, user accounts, e-
Back– It takes you to the previous web page.
mails etc. in the form of a message. The following
Forward– It takes you to the next web page. buttons are available at the bottom of the Action Center
Refresh–It reloads the web page. pane–
New Tab– Adds a new tab to view a different web page.
● Tablet Mode– It converts desktop to tablet mode and
tablet mode to desktop mode. When this tab is colored,
it remains in tablet mode, which works through the
touchscreen.
● Connect– This searches for the network you are
connected to wirelessly. Select it after turning on the
wireless monitor or Bluetooth speaker.
● All settings– This opens the complete setting screen of
the computer. Many Control Panel options from older
Windows versions have been replaced by Windows 10
settings.
You can also open the Settings app via Start
button → setting. Each computer may have different
Figure- 2.6 Microsoft Edge buttons depending on its Action Center configuration.
Favorites and History– Displays list of favorite ● Focus Assist– This temporarily disables notifications.
web pages and history of all visited web pages. ● Airplane Mode– It turns off Bluetooth and Wi-Fi.
Web Notes– It creates web notes on the web page. ● Location– It turns on and off the location service.
Share–You can share the web page through e-mail ● Bluetooth– This manages Bluetooth devices.
and other methods.
● VPN– It connects to a Virtual Private Network.
More options– Help to configure the browser.
● Battery Saver– Turns on the battery saving feature as
File explorer– It becomes in the form of a folder-
per the functionality and increases the battery life of
like icon on the taskbar. By clicking on this icon, you can
the device.
easily open the saved files in your system in less time.
Connect– It connects Bluetooth devices.
Notification Area– The notification icon is
available on the right edge of the taskbar. It displays Mobile Hotspot– It connects to the mobile hotspot.
various types of notifications related to your computer. Night Light– This adjusts the brightness of your device.

M1R5 40 YCT
Search on TG: @apna_pdf
Navigation Pane– Windows keeps the most Moving the Taskbar–
recently used items by the personal computer in the Taskbar → Right click → Taskbar setting →
navigation pane. There is a navigation pane on the left Taskbar location on screen → Choose
side of all the folders which have several main sections Left/Right/Top/Bottom
which are as follows- The default location of the taskbar is the bottom.
● Quick Access– It stores shortcuts to items you ■ To change the height of the taskbar, click on the
frequently use from different locations on your inside edge of the taskbar. When the mouse pointer
computer. It is also called favourites. is changed in double headed arrow this, drag it and
● Desktop– The screen displayed when the computer set its height according to your wish.
system is turned on is called Desktop and it is one of Pinning an app to the taskbar– You can pin
the navigation panes. Works such as folder by clicking frequently used apps on your PC to the taskbar to open
on which you can see your content quickly. them with a single click.
● Downloads– By clicking on this folder you can get the ■ To pin an app to the taskbar,
files which are downloaded while browsing the • Right click → More → Pin to taskbar
internet. ■ To unpin any app from taskbar,
● Documents– It is a special folder that stores most of • Right click on the app's icon and select "Unpin".
the works like images, reports, letters etc.
2.7 Icons & Shortcuts:
● Pictures– Through this folder you can see all the
Each version of Windows has different icons. An
images saved in your PC. icon is a small graphic image that represents an
● One Drive– When you create a Microsoft account, execution of a program. When the user clicks on this
you get free online storage space from Microsoft it is icon with the mouse, the program related to it gets
called One Drive. You can access it through any PC. executed. Programs, files and folders are shown on the
In this you can store your favorite files and it is desktop through icons and below these are program files
password protected. or folders the name of the folder is written.
This PC– Through this folder you can browse the ■ To add desktop apps,
folders of your PC and hard drive. 1. Open the Start menu by clicking on the Windows
Dismiss a notification– You can dismiss a button.
notification without even opening it for this, 2. Select "All Apps".
● Click on the Action Center on the taskbar. 3. Right click on that app, you want to create desktop
● Click on the Notifications close button on the top right shortcut.
corner. 4. More → Open File Location
Or, you can click the "Clear All" button to clear all 5. Right click on the selected app icon.
notifications from your PC at once. 6. Select 'Create Shortcut'.
2.6 Taskbar: 7. Select Yes.
The taskbar is located at the bottom of the Windows A desktop shortcut to your program is created.
screen. The Windows 10 taskbar contains icons for the ■ Create shortcut on desktop by drag and drop,
Start Menu, Cortana Search Box, Task View, Microsoft 1. Minimize all running programs.
Ease, Documents, Sound, Battery Life, System 2. Click on the Start button.
Language, Notifications, Date & Time, etc. On 3. Click on the app.
Windows, the current active programs are also displayed 4. Click on the program whose shortcut you want to
on the taskbar as icons. create.
5. You can create shortcut icons on the desktop by
dragging and dropping programs.

Figure- 2.8 Windows 10 Task Bar

Configure the Taskbar– By default, you can move


and resize your taskbar or you can lock the taskbar, but
any changes can be made only when the taskbar is
unlocked.
You can manage the features of the taskbar through
the shortcut menu that opens by clicking on an empty
area of the taskbar.
■ You can lock the taskbar by right clicking on the
taskbar and clicking on the check box in front of
Lock the Taskbar and prevent changes from
happening on the taskbar.
■ Uncheck the 'Lock the Taskbar' option to make your
taskbar active for the change again. Fig – 2.9 Creating Shortcut by Dragging an App Icon

M1R5 41 YCT
Search on TG: @apna_pdf
6. The shortcut will be displayed on the desktop as Desktop Icons:
shown in the above picture. Desktop icons are the icons that appear on the
This is displayed in the lower left corner of the desktop screen that opens after turning on the computer.
shortcut icon. Recycle Bin– That icon provides temporary storage
■ To create a shortcut using the Create Shortcut Wizard, for deleted files and folders from the user's hard drive.
1. Right click on the desktop and select New and then Which can be restored again if needed. In fact, the
'Shortcut' from the context menu. Recycle Bin acts like a folder. It looks like a waste paper
basket. Recycle Bin is not included in a single drive like
a folder rather each hard drive of your computer
maintains its own Recycle Bin and whenever we open
Recycle Bin all the Recycle folders are visible.

Fig- 2.10 Creating Shortcut

2. Create Shortcut" wizard will be displayed.

Figure-2.12 Recycle Bin with the files selected for


deletion highlighted.

This PC– It displays all the information stored in


the computer. It contains icons for hard disk parts,
documents, folders, printers, removable disk drives, and
other system applications.
Clicking on the This PC icon displays a Windows
Explorer window.
Windows Explorer is a program that displays
Windows folder contents. If the user connects his PC to
the network, it also displays the network directories. In
addition, it also provides access to system folders,
Windows Control Panel, Printers Dialup Networking and
Fig- 2.11 Using the Shortcut Wizard a folder scheduler to manage tasks.
3. Click on the 'Browse' button and from the 'Browse The name of the This PC icon can also be changed,
for folder' dialog box select the item whose shortcut
for this right-click on the icon and select Rename from
do you want to make.
the context menu. Type the name you want to use and
4. Click on Next Type in a name for the shortcut. Click press the Enter key.
on Finish and your shortcut appears on the desktop.
Control Panel– By double-clicking on the Control
Renaming a shortcut– When you create a shortcut
Panel, you can manage your computer's software and
to a program, Windows giving it a name by default. Lets
hardware in different ways.
you rename it too.
■ To rename the shortcut, Network– By double-clicking on this icon, you can
access the computers and servers of your workgroup.
• Right click on the shortcut.
User's File– You can open your personal folder by
• Select 'Rename'.
double clicking on this icon.
• Type in the shortcut name you want to use.
■ To control the display of desktop icons,
■ To delete the shortcut,
• To resize the icon, click on View from the pop-up
• You can also delete a shortcut by selecting the icon,
menu and choose large icon, Medium icon or Small
press the button or right-clicking on the icon and
choosing Delete. icon select one of the following
Windows asks for your consent before deleting your • To hide all desktop icons, go to view and click
icon. "Show Desktop icons again" again.

M1R5 42 YCT
Search on TG: @apna_pdf
■ From the All Programs menu item list, click on the
desired application such as Word, Excel, PowerPoint
etc. For example an application window (MS-Word)
opens.
Closing Apps– You can close Windows apps in the
following several ways-

• File Menu->Exit, or,


• Press the Alt + F4 keys. or.
• Click on the Close button. or,
Figure- 2.13 View menu • Right click on taskbar and select close window
2.8 Running an application window: option.
An application window is the window that displays Paint:
MS Word, Excel, PowerPoint, etc. Whatever works the Paint is a very important graphical tool used to
user does that will remain in the application window. An
application window is a program run and operated by the create maps, diagrams, pictures etc. It is also called paint
user. brush. The Paint Brush has a Toolbox window. Which
⇒ To open an application window contains various tools. Paint is a bitmapped program. It
makes the picture from dots, which are called Pixel.
To start MS Paint,
• Start → All programs → Accessories → Paint

Fig. 2.14 Application window (MS-word Document)


■ Click on the Start button, the Start menu will be
displayed.
■ Highlight the All Programs menu to display a list of
programs. Each group program has a pointer to the
right of the name of the selection. A program group
is a collection of programs and related document
files. When the user selects a program group, a Figure - 2.16 Paint screen
menu appears and lists the items of the program
group. Drawing in MS Paint–
• Select that drawing tool you want to use.
• Select the width of the line which you want from the
Line Size box.
• Select the foreground color for the line border for
various shapes and text for this, by pointing at the
color of your choice from the color palette, click
with the left button of the mouse.
• Select a background color to fill the background
color inside the shapes and text frames.
Calculator:
This tool, present in the Accessories group of
Windows, is used in arithmetic and scientific
calculations. Standard calculator is used for simple
numerical mathematical calculations and scientific
calculator is used for more complex calculations by
Engineer Scientist Chartered Accountant. To run the
Figure 2.15 Apps item list and selected applications calculator, a simple calculator is displayed on the screen.
M1R5 43 YCT
Search on TG: @apna_pdf
To use the calculator, • Click on de fragment disk.
1. Start button → All prorgrams → Accessories →
Calculator Disk Clean up– Using Disk Clean up Disk capacity
is increased by erasing data.
To open Disk Cleanup,

• Start → All Programs → Accessories → System


Tools → Disk Clean up
• The Disk Cleanup drive appears as in Figure 2.19.

Fig - 2.17 Standard calculator


2. The Calculator program opens in Standard view by
default. To use the scientific calculator, select
Scientific from the View menu.
Figure - 2.19 Disk Cleanup Drive Selection Window
System Tools:
System Tools is a set of tools for the management of
computer system which is System Tools Options • Choose Drive→ Ok
Accessories Including backup, scheduling, disk cleanup, • Disk Cleanup dialog box for the selected drive will
disk defragmenter, etc. be seen.
Disk Defragmenter– It is a utility software. When a
file is stored on a disk in a computer, the computer stores
it on the first available free space. In this way, with
repeated use, the disc gets divided into different pieces
and the reading speed becomes slow. Disk de-
fragmentation program is run to re-arrange all the files.
This improves memory management by arranging free
space between files and also improves disk speed.
■ To open Disk De-Fragmenter,

Fig - 2.20 Disk Cleanup Dialog Box


• Files to Delete: Which file you want to delete click
on the checkbox under the list.
Fig - 2.18 Disk Defragmenter Window • Click on the OK button.
• Start button → all program → Accessories → With Disk Clean Up, you can delete some or many
Highlight System Tools → Disk De-fragmenter. files at once. Disk Cleanup frees up space on the hard
• Select the disk you want to defragment under drive and helps in searching the user's drive to delete
Current Status, by doing this defragmentation will temporary files, unnecessary program files, cache files,
start. etc.

M1R5 44 YCT
Search on TG: @apna_pdf
Task Scheduler– This tool schedules the disk. It • Moving files by dragging and dropping.
automatically turns on every time Windows is turned on
and continues to run in the background. • Scrolling through windows or web pages with the
■ To add a schedule task, tap mouse wheel.
Using the Mouse– Mouse is an input device whose
• Start → All programs → Accessories Task System real name is Pointer Device, it is used to control the
Tools → Task Schedular screen pointer. The mouse is mainly used to select
• Task Scheduler window displayed as figure no. 3.21 menus, commands, text, graphic objects or windows.
There should be a smooth and flat surface to move the
mouse. User should not use mouse on paper or card
board surface
The main actions of the mouse are as follows -
Double click– Pressing the left button of the mouse
twice quickly at the same time is called double click.
Double click acts like a shortcut. By this any items,
folders, files, programs etc. can be opened. Apart from
this, double click is also used to select any word in a
document.
Right Click– Pressing the right button of the mouse
is called Right Click. Right clicking on an item opens a
list of actions that can be performed with that item.
Shift + Click– If the user wants to select the names
of several conjunctive files at once then the Shift key
Fig - 2.21 Task Scheduler Window should be pressed and clicked. In this way the user can
• Action Menu → Create Basic Task also select the text between the location clicked with
• In the Create Basic Task window, enter a description Shift and the current insertion point.
for the task by typing in a name, then click Next. Ctrl + Click– This method is used to select the
• In the next step, when do you want the task to slant? names of different types of non-conjutive files. While
Select one option from Daily, weekly etc. then click clicking in this, the Ctrl key has to be kept pressed. From
on next. this the item of your choice can also be selected.
• Select the schedule you want to use by choosing that Dragging–Any item available on the computer
Click Next. screen can be moved from one place to another by using
Mouse Dragging and Dropping action of Mouse is used
• To schedule the start of a program automatically, for this. To select an item by Mouse Pointer, press the
start a program → Next. left button on that item and drag that item to its desired
• Select the program from the list, browse it and click place, release the button. This whole process is called
on Next do it. Dragging and dropping.
• Click on Finish. Click– Pressing the left mouse button once is called
2.9 Operating System Simple Setting: a click; it selects the data and executes the command.
Most of the Windows settings are done through the
Control Panel. We can also do some settings without To Change the Basic Setting of Mouse–
using the control panel. Control Panel is a special folder 1. Open the start menu by clicking on the start button
that contains many small programs, they are called and click on setting as shown in figure 2.27.
applets. Each applet is designed to allow you to adjust 2. Setting → Choose "Devices"
settings for a specific part of your system.
2.9(i) Using Mouse and changing its
Properties:
Use the mouse to interact with objects on the
Windows screen.
As soon as the user starts the computer, the mouse
starts working then the user can make some changes in
its working system and may bring some changes in the
functionality and look and behavior of the user's mouse
pointer on the screen. For example, users can change the
role of their mouse buttons. You can increase the
visibility of the mouse pointer; change its appearance,
etc. Fig- 2.27 Selecting devices from Windows Settings
The basic functions of the mouse are as follows- 3. Select "Mouse" from the left pane of the window to
• Pointing and selecting an object on the screen. access the mouse configuration settings.

M1R5 45 YCT
Search on TG: @apna_pdf
mouse click on the check box next to the "Switch
Primary and Secondary buttons" option. This
function is useful for left-handed users.
• Some users are unable to double click the mouse in
time, so you can adjust the speed under 'Double
Click Speed' section. You can manage the double
click speed by dragging the slider towards Slow or
Fast. To test speed double clicks inside the yellow
folder icon.
• Drag and drop process is used to move files. To
move an item it is dragged while releasing the left
mouse button and if the mouse button is released in
the middle, it moves to the wrong place. Insted of
holding down the mouse button while dragging. You
can use lock option while typing. Under the click
Fig - 2.23 Select the mouse with the left pane look section, Click on the check box in front of
4. To select your primary mouse button, select the left "Turn on click Lock"
or right mouse button by clicking "select your
primary button." (fig 2.23) Pointers tab of Mouse– Use the Pointers tab to
5. Select any one of the options available in the "Roll change the appearance of the mouse pointer.
the mouse wheel to scroll" option.
Multiple lines at a time– This option is set by
default. By this option you can change how much in each
scroll lines are scrollable, can be selected. You can
increase or decrease the number of scroll lines by
dragging the cursor left or right. Its default setting
position is 3.
One Screen at a time– On selecting this option, the
entire screen is scrolled at once.
6. When the "Scroll inactive windows when hover over
them" option is on, you can scroll an inactive
window without focus and when this option is off,
you can click on the inactive window and then scroll
its content. By default it is on. (Figure 2.23)
7. You can explore other settings in the mouse by
clicking on "Additional Mouse Properties" in the Fig. 2.25 Mouse Properties dialog box with Pointers tab
"Related Setting" section.
8. The Mouse Properties dialog box appears as shown ■ To convert all your pointers at once, select "new
in Figure 2.24 below. scheme" under Scheme.
■ To change a particular pointer, select it from the
custom list and click the mouse button. Select the
name of the new pointer file from the list of selected
cursor files which you want to use for your task.

Pointer Option tab of Mouse– Pointer Option tab


is used to change the behavior of the mouse.
■ In the "Snap to section area the user can make the
mouse snap to the default button (such as Apply or
Ok) In the dialog box, select the Automatically
move pointer to the default button in a visibility box
under Snap to.
■ In the visibility section area,
• By clicking in the Display Pointer Trails check box
Figure- 2.24 Mouse Properties dialog box with Button
tab and moving the slider, you can adjust the length of
Button tab of Mouse– You can configure the the pointer trail.
behavior of the mouse by clicking on the Button tab of • To make the pointer invisible while you are typing,
the Mouse Properties dialog box. click the "Hide Pointer While Typing check box."
• Under the "Button Configuration" section, to change this pointer appears only on moving and disappears
the function of the left and right buttons of the on typing.
M1R5 46 YCT
Search on TG: @apna_pdf
• Show Location of Pointer when press the Ctrl Key to Hardware tab of Mouse–Hardware tab is used to
easily locate the pointer when it is not in motion display the pointing devices which are connected with
select. comuter. Another way to open the basic settings of
mouse.
Right click on desktop→ Personalize→ Theme→
Mouse Cursor

Figure- 2.28 Themes setting


Fig - 2.26 Pointer's Options Tab
In the Motion section, its speed is adjusted by 2.9(ii) Changing System Date and Time:
dragging the slider. For this click on the check box to You can also set a system's date and time using the
Enhance Pointer Precision. This allows the pointer's Control Panel's Settings option or by typing in the Start
control to be fined at short distances. By clicking on the Menu search box.
check box again the option can be turned off. ■ To change date and time,
Wheel tab of Mouse– Wheel tab is used to change
• Start Menu→Setting
the properties of the scroll wheel.
In the scrolling section-
• The number of lines to be scrolled by rotating a The Windows Setting page opens. Click on time &
Notch is set under "Number of lines at a time". language in it. The Time and Language setting is
• Or, clicking "One Screen at a time" scrolls the entire displayed in the left pane of the screen as shown in the
screen at once. It works like page up and page down figure below.
keys.

Fig – 2.29 Date and Time page in Settings window


• Click on 'Change' button under "Set the date and
Time manually" Enter the date and time in the
Change date and Time dialog box displayed as
Figure - 2.27 Wheel tab shown in Figure-2.30 and click on Change button.

M1R5 47 YCT
Search on TG: @apna_pdf
• Select the "Change Date and Time" button from
the Date and Time tab. Date and time setting
dialog as shown in figure 2.33 The box opens.

Figure- 2.30 Change Date and Time Dialog Box


■ Changing date and time format from Control Panel,
• Search box→ 'Type Control Panel'→ Clock and
Region

Figure- 2.34 Changing the time in the Date and Time


dialog box
• Select Current Month and Date in it by clicking in
the Month list.
• Select Change Time Zone in the Date and Time
Figure- 2.31 Selecting clock and region in Control dialog box to open the Time Zone setting.
Panel
• Select the time zone from the drop down arrow and
• Click on date and time.
click on ok and again click on Ok in the date and
time dialog box.
2.9(iii) Changing Display Properties of
System:
The setting related to computer or desktop is called
display properties. Display properties include wallpaper,
screen saver, colors, fonts, etc., which can be set through
the Display Properties dialog box.
Settings are organized in a slightly different way in
Windows 10 (Figure 2.32). Settings are organized into
Fig- 2.32 Selecting date and time several categories. You can open the Settings by typing
• The Date & Time dialog box is displayed with the Settings in the taskbar search box as in Figure 2.35.
Date & Time tab.

Chitra - 2.33 Date and Time Dialog Box Figure - 2.35 Display Settings
M1R5 48 YCT
Search on TG: @apna_pdf
Display– You can adjust the display setting of your
personal computer such as text size, brightness level,
apps etc. You can easily connect to any display near your
device by recognizing it. Go through the advanced
display settings in the multiple displays section, click on
"Connect to a wireless display" and follow the
instructions Computer.
Notification Area– Through this tab you can turn
on or turn off notifications for selected apps. You can
toggle on/off the app's icon for clock, power, volume,
etc. and select the icon to be displayed on the taskbar or
system tray as per your preference.
Quick Actions– You can customize the quick
access buttons in the Notification Center and arrange
them in the order you want. You can click on an action to Figure - 2.36 selecting a program and choosing to
swap it with another action and arrange it according to uninstall
your preference. • A pop-up window is displayed when an application
Multitasking– You can arrange two or more
is uninstalled. Which displays the message that
windows by dragging them across the corners of the
screen. You can also automatically adjust the setting by information related to the application will be
selecting the window you want to snap. uninstalled along with it. You can complete the
Tablet Mode– This setting is for tablet users. If process by clicking on the Uninstall button
you're working on a touch-friendly device, you can make
Windows 10 more touch-friendly by turning on the tablet
mode button.
Battery Saver– Through the Battery Saver setting
of System Settings, you can limit your background
activity. You can also stop notifications of any app as per
your need by turning on the battery saver mode
automatically or manually and you can turn on the
notifications for those apps on that you want to receive
even when the battery saver mode is on.
Power and Sleep– You can set power off times for
both battery and power plugging modes by adjusting the
power and sleep settings for your PC and similarly, when Fig- 2.37 Message pop-up window
your PC is on battery or plugged in you can organize the • Uninstalling a desktop program opens the "Programs
sleep time.
and Features" window.
Storage– You can check the available storage in
your PC drive and you can also change the location of
the documents saved on different location in PC.
About– Through this you can check the details of
your system and you can rename PC or receive other
privacy setting link and system update link.
2.10 To Add or Remove Program and
Features:
Add or Remove Programs is a feature in the
Microsoft Windows operating system that allows users to
uninstall or organize software installed on their
computers. This feature is named Add/Remove Programs
in Windows 98 and Programs and Features in Windows Figure- 2.38 Programs and Features window
Vista and Windows 7, Apps and Features in Windows
10. • Select the program you want to uninstall and click
You can uninstall software in Windows 10 in the Uninstall. A pop-up window "If you are sure to
following ways– uninstall the Program" will be displayed. Clicking
■ To add or remove programs and apps, yes will uninstall the program.
• Start Menu → All apps ■ Removing programs and apps from the Settings
Select the program you want to delete. menu,
• Select Uninstall by right clicking on the program. Start Menu→Setting→Apps→Apps&Features.

M1R5 49 YCT
Search on TG: @apna_pdf
• You will see a complete list of applications and • Select the program you want to uninstall.
programs. You can search for an app using the
search box at the top of the screen.

Figure- 2.42 Selecting Uninstall from Programs and


Features
• On clicking the Uninstall button, a pop-up menu will
Fig - 2.39 Apps and Features window be displayed.
• Select the app you want to delete and click on • Click on yes when the confirmation message is
Uninstall.
displayed by 'User Account Control'.
• A pop-up window will be displayed in which the
message "This app and its related info will be 2.11 Adding, Removing to Sharing Printers:
uninstalled" will be displayed. Windows 10 provides you the facility to add
• Complete the process by clicking on Uninstall. printers; you can connect the printer to your PC/Laptop
■ Adding or removing desktop programs from the
via USB cable.
Control Panel– Only desktop programs can be
uninstalled through the Control Panel, not apps. ■ To add a printer,
• Search box → Type Control Panel' → Programs • Start → Setting Devices Printers & scanners

Fig- 2.43 Selecting Add a printer or scanner to the


Fig- 2.40 Typing control panel in the search box device
● Select "Add a printer or scanner" as shown in the
• Select programs and features.
picture above.
● After Windows detects the printer, select the name
of the printer and follow the instructions for
installation.
Or if you want to share your printer on the local
network, click the "The printer that i was n't listed"
link.
● Now click on the radio button in front of "Select a
shared printer by name" option in the Add Printer
dialog box and type the path of the printer to be
Fig- 2.41 Selecting program and features from the shared.
program window
M1R5 50 YCT
Search on TG: @apna_pdf
● A pop-up message will be displayed in which "Are
you sure want to remove the device" message will
be displayed. The printer will be removed as soon as
you click on yes button.
2.12 File and Folder Management:
File and folder are fundamental concepts in the
Windows operating system. Due to the large number of
files created in a computer, they are kept divided into
different folders. File Explorer is used for managing files
in Windows 10. This is how files and folders are
browsed. It is a tool to access the files stored in the
computer provides official user interface.
You can open it by clicking on the File Explorer
Fig- 2.44 Adding path to printer share. icon on the taskbar.
● Click on Next. The parts of the File Explorer window that opens
You can also use the name or IP address of the when clicked are-
computer connected to the shared printer.
● File Explorer Ribbon, is a feature of the Microsoft
● The PC will attempt to locate the shared printer.
Download and install the driver from the computer Office ribbon and has buttons for performing
connected to the shared printer. The printer driver common tasks with files and folders.
will be installed as shown in the picture below. ● Navigation Pane, it provides library of stored and
recently used files, documents and pictures in PC
which can be accessed.
File explorer– File Explorer is a file management
application used by the Windows operating system to
browse files and folders. It allows the user to navigate
the files stored in the computer and provides a graphical
interface to access.
Fig- 2.45 Installed printer driver To start File Explorer.
● After the printer is installed successfully, click on
Next. Now the share printer will be available on ● It is opened by clicking on the File Explorer icon on
your PC the taskbar.

Fig - 2.47 File Explorer icon available on the taskbar

● On opening File Explorer in Windows 10, a quick


access window is displayed in which recently
accessed folders and files are displayed.
● File Explorer can be used for a variety of tasks. With
the help of various elements designed in Windows,
you can work with files, folders. Each explorer
consists of the following elements-
Quick Access Toolbar– In this, frequently used
Fig – 2.46 Selected printer available in Printers & commands are automatically pinned, you can also pin the
Scanners commands according to your own choice.
■ To remove a printer, if you no longer need a printer, Ribbon Toolbar– Ribbon Toolbar with the help of
you can remove it from the Printers & scanners
this command, you can easily organize your files and it
page.
● Click on the installed printer device and select also reveals hidden commands. You can cut, copy, move,
Remove. delete, rename, etc. using the ribbon.

M1R5 51 YCT
Search on TG: @apna_pdf

Figure- 2.48 File Explorer window


Navigation and Address Bar– You can use this to
navigate forward or backward in a folder and the address
bar displays the folder layout or makes it easy to
navigate the different folder paths.
Fig - 2.50 Folder Options Dialog Box
Quick Access– You can also get your most
● You can set whether the folder will open on single
frequently accessed folders and pinned folders through it.
click or double click under "Click items as follows".
This PC– Through this you can view and manage ● If you uncheck the option of not using recently used
optical devices with internal storage and other connected files and folders - then under 'Privacy' section the
storage devices in your PC. following–
Search box–The search command is used to search ⇒ Show recently used files in quick access
for a file in the current folder. ⇒ Show frequently used folders in quick access.
Status Bar– It displays information related to the ● You can also clear the file explore history by
content stored in Windows such as file size, file clicking on the Clear button.
selection, quick access folder layout etc. ● Close the dialog box by clicking on Ok.
You can change the This PC computer environment Displaying Sub Folders– Folders within a folder
by clicking on the left pane of the File Explorer window. (Sub Folders) in older versions of Windows, there was a
Or you can change it to the default from the Folder plus (+Sign) in front of the folder. In Windows 10, when
Options dialog box. there is a subfolder in the folder, a small right arrow
(Triangle Arrow) remains in front of it. Subfolders can
be viewed by clicking on the triangle arrow next to the
To change Open File Explorer, folder. On clicking on Right Pointing Triangle, it gets
● Open File Explorer. converted into Down Pointing Triangle and all the
● View tab → Show/hide group Options → Change folders are displayed.
folder and Search options.

Figure- 2.49 Change folder and search option


Fig- 2.51 Viewing sub folders in Navigation Pane
● The Folder Options dialog box appears with the Accessing File and Folders– You can access your
General tab. (picture - 2.50) files and folders in many ways in File Explorer. These
are:
● Click on the "Open File Explorer to" list box, select
● Forward and Backward buttons
"This PC", then click on Apply and then click on ● by folders pane
Ok. (Fig. 2.50) ● using the search function

M1R5 52 YCT
Search on TG: @apna_pdf
Using Address Bar– The address bar is located at
the top of File Explorer. This displays the path of the
currently selected folder. (Fig. 2.52)

Fig- 2.54 Selecting multiple files


Fig- 2.52 Address bar ■ Selecting all items in a folder
File Explorer drop down menu is available for each ● Open the folder or Windows Explorer that contains
sub folder in the address bar. You are on the pointing the files.
edge on the path you can go backward or forward by ● Home tab → Select group → Select all or, press Ctrl
clicking and select subfolders from the drop-down menu. + A keys. Creating new files and folders
■ To create a new file folder,
Viewing Previously Visited Folders in the
● Navigate to the location in which you want to open
Address Bar–
the new file / folder.
● Click on the Forward or Back button.
● Now click on the folder name in the address bar. ● Home tab → New group → New Folder
Changing Display of File or Folder– You can Or right click on the empty area of the folder and
change your file and folder icons as well as the click on New. A sub-menu is displayed in which the type
various information displayed by them. of files is displayed. (Fig. 2.55)
● Navigate to the folder whose display you want to ● Click on the folder and click on New.
change.
● Click on the View tab to display the ribbon.

Fig – 2.55 Creating a new file or folder

Figure 2.53 View tab


● A folder appears with the default name 'New Folder',
● Display options are displayed in the view tab as
shown in the above figure. you can type the name of your new folder.
● You can see a quick preview of each option by ● After entering the name, click anywhere outside the
moving the mouse over it. Select an option by text area.
clicking on it can do. Renaming a file or folder–
Selecting Files and Folders in Windows 10– ■ To rename a file or folder,
■ To select a single file, ● Select the file/folder you want to rename.
● Open the folder in which the file is located and click ● Home tab → Organize group → Rename or [press
on it. To select multiple files, the F2 key.]
● Open the folder or Windows Explorer that contains Or, right click on the file folder and select Rename.
the file click on the first file.
● A box is displayed with the current name selection.
● Select other files by holding down the Ctrl key. Type new name and press Enter.

M1R5 53 YCT
Search on TG: @apna_pdf
● Release the mouse button. The file folder will be
moved to that location. Or,
µ Select file → Home tab → Organize group →
'Move to' Drop down arrow
To copy file folder to another drive or folder
● Task bar → File explorer → Select File/Folder
● Pointing to the selected file, hold down the left
mouse button.
● Now holding down the Ctrl key, drag the file folder
from the right pane to the left pane and drop it in the
file/folder in which you want to copy it.
Figure 2.56 Renaming a Folder
■ Make it bold.
● Any file or folder can be opened by double clicking
on it.
Or, you can open the folder by selecting it and clicking
the Open Folder icon in the Open group, and to open
the file, select the file by clicking on it and click on
open with the selected application icon selected in
the Open group.

Fig- 2.59 Copying a File / Folder


● It will be copied as soon as you release the mouse
button. Or,
µ Select file → Home tab → Organize group →
'Copy to' Drop down arrow
µ Select the folder in which the file folder

Fig- 2.57 Opening a file


■ Moving and copying files and folders,
● You can drag and drop any file/folder to copy or
paste it to another drive.
■ Move a file/folder to another drive or folder,
● Click on File Explorer from the taskbar. Fig- 2.60 Selecting Copy from the drop down menu
● Select the file/folder that you want to move.
● Pointing to the selected file/folder, hold down the Deleting files and folders:
left mouse button. ■ To delete files and folders,
● Drag the file/folder from the right pane to the left
pane and drop it in the selected folder. • Select file/folder → Home tab → Organize group
→ Delete
or, Right click on file/folder → Choose → Delete

Fig- 2.61 To delete selected item


Fig- 2.58 Moving a file/folder from one location to • Delelt File/Folder dialog box is displayed, click on
another yes in it.

M1R5 54 YCT
Search on TG: @apna_pdf
• The files and foders you delete go to the Recycle Root– The list of all the directories through which
Bin. You can also restore by double clicking them. one has to go to reach additional files from the root
directory is called the path of that file. Linux commands
• To permanently delete a file folder from the Recycle require path to be given multiple times.
Bin, click the Delete drop-down arrow in the
Organize group. Select 'Permanently delete'. • /bin directory– In this, the utilities available by Linux
2.13 Types of File Extension: are stored in the root directory, due to all the command
files being in binary format, they are kept in the 'bin'
A file extension is an identifier placed at the end of a
directory.
computer file name. File extensions are used by the
operating system to determine in which app the file will • /dev directory– In this directory, files related to all the
display best when opened. devices of the system are kept, so that they can be used
Each file contains different types of information again.
such text, audio, video etc. and each file type has a • /etc directory– In this, the files related to the
specific icon which helps you to understand the type of configuration of the system such as password files etc.
file. are stored in the form of text files.
Some main file extensions are–
(i) DOCX (MS Word Document)
• /lib directory– This directory contains the library files
and all the small programs that are needed by the
(ii) XLSX (Microsoft Excel Spreadsheet) compiler. By which the compiler works.
(iii) PNG-Portable Network graphics (an image
format) • /tmp directory– All the temporary files of the Linux
(iv) HTML-Hyper Text Markup Language (for operating system are stored in this directory. The files
creating online web pages) which are used as variable or swapping files are called
(v) PDF Portable Document Format: temporary files.
• /usr directory– It contains files that are not required
during booting. This also includes utilities can be
placed.
• /mnt directory– This directory holds all storage
devices except the hard disk. Subdirectories like
Fig- 2.62 File extension 'Floppy' and 'Cdrom' are kept in the directory.
You can also easily turn on or off the file extension. • /kernel directory– This directory contains all the
For this, click on the View tab in File Explorer. Turn it kernel specified code. The kernel is the heart of the
on by clicking on the check box in front of the option Linux system. It is responsible for resource allocation,
'File Name Extension' given in the Show/hide group. security and low level hardware interface.
Clicking on the same checkbox again turns it off.
2.15 File Handling in Linux:
2.14 File Struture: In Linux, each file is referred to using its pathname
Following are the basic elements of Linux- starting with the root directory. Such as usr directory is
Kernel– The kernel is the main part of Linux, which represented as /usr (/ or root is its parent directory) and
organizes and operates other programs and hardware. mini is represented as /usr/mini, in mini Office the parent
The kernel is the central module of the OS. It is the part directory of a directory is usr.
of the operating system that is loaded first and then
There are two types of path names in a file–
transferred to the main memory. Maintaining time and
date, launching applications and allocating system 1. Absolute Path
resources are also the functions of this part of OS. 2. Relative Pathname
Shell– Shell is a program that interprets the Absolute pathname specifies the entire path of a
commands given by the user. Shell is also called single directory starting from the root. the root with a
Command Interpreter. Commands in the shell are either forward slash (/) is shown.
typed on the command line or placed in a file. The relative path name tells the location of a
File System– Linux treats everything as a file. A directory relative to the current working directory. If a
directory containing multiple files is also treated as a pathname contains a slash (/) if not specified, Linux
single file. In Linux, all hardware devices such as I/O assumes that the user is using relative path names.
devices, storage devices, etc. are considered as files. In Identifying the Current Working Directory– $
this, the files are arranged according to the hierarchy in pwd Enter command should be typed by a user to know
the directory. The topmost directory is called the root in which directory he is working.
directory. It is expressed by a slash (/). All files and Pwd command will print the absolute path name of
directories are attached to the root directory in it. the current working directory of the user. There is no
parameter in this command.
Making New Directories–
(mkdir): The mkdir command is used with the name
of the directory to create a new directory.

M1R5 55 YCT
Search on TG: @apna_pdf
For example, if a new directory named Sales is This will have the following output-
created in /usr/mini, it can give the following command- east
west
north
south
In the list that will be displayed in this type of
display, the numbers will come before the letters and in
the letters also, the uppercase letters will come before the
lowercase ones.
If the list of names and files of the directories
coming under a certain directory (Like- north) is to be
made, then the user will have to give ℓs command with
the name of the directory which will be like this–
$ ℓs north
Fig - 2.63 A sample Linux session using the commands This command will display the output as shown in
mentioned so far. the picture.
Subdirectory Sales is created in the current directory Generally, there are many files in a directory and for
/usr/mini. the convenience of knowing whether there is any
If a multiple directories are to be created with one important file in a directory, the user should give is
mkdir command, separate the names of each directory by command with the name of the directory, which is as
a space is written. The example of this is as follows-
$ mkdir sales/east sales/west sales/north sales/southEnter follows– $ ℓs March
The above command creates 4 directories inside the In our current working directory, This command
sales subdirectory. displays the result "File not found error" because there is
No subdirectory can be created without creating a no file named if there is a file with this name in the
parent directory. In this, the order of arguments is directory, it will display is and the name of the file.
important.
Moving to a different directory (Cd)– Using the This ℓs command can be used with a number of
Cd command, your current working directory can be options. The options used in this are predefined
changed. For this, after the Cd command, we have to arguments and they are used with a negative sign (-Sign).
write the path name of the directory in which we want to Each option has its own separate meaning.
go. The path name of the directory can be absolute or
relative. For example, if the user wants to go to the Sales Option Description
directory, then he should type the following command- –a Generally hidden files also list all other
$ Cd Sales Enter files as well.
Relative path names are used in this command. –A Lists files by inode modification time.
–c It lists the inode of each file.
The Cd command always returns the user to his
home directory without using a pathname. –i Size allows more modification time.
In Linux, the current working directory is specified –l Displays the names of files and
using a single dot (.) and the current working directory is directories.
specified using a double dot (..). The parent of the
directory is used to represent the directory. –r It lists files and subdirectories in reverse
Removing a directory (rmdir)– The rmdir order.
command is used to delete a directory. To delete a –t It lists files and subdirectories lists in
directory, it must be empty. For example, to delete the Time order.
directory named Exam, the following command should
–x Multi columnar output
be typed– $ rmdir exam Enter RD exam
If a user wants to delete directory while being in a Table- 3.2 Different options of ℓs command
subdirectory, he cannot do so and if you want to delete
multiple directories at once, then for this, the names of Creating files (Using Cat)– To create a file, type
the directories are written separately by each space. the Cat command at the shell prompt character and then
Listing the Contents of Directories (ℓs)– The ℓs the name of the file is typed. For example, if a file named
January is to be created, then use the following command
command is used by the user to create a list of files and
would be– $ Cat > January Enter
subdirectories of the working current directory. Its
function is also similar to the DIR command of DOS. For As soon as the user presses the Enter key, the user is
example, the user mini would type the following prompted to enter the contents of the file. By pressing
command to list the contents of his current directory- $ Ctrl + D keys after typing the data the command line is
ℓs terminated simultaneously. (Fig. 2.64)

M1R5 56 YCT
Search on TG: @apna_pdf
Listing the contents of a file (Cat)– To list the
contents of a file, use the Cat command to list its Deleting Files (rm) - Use of command to remove or
contents. After this the name of the file is written delete a file. The rm command is similar to the DEL
whereas in DOS TYPE command was used for this. For command used in DOS. For example, use the $ rm >
example, "$ Cat January" command is used to list the March Enter command to delete the March file.
contents of January file. ■ Same as Cp command, the option should be used
By entering the absolute path name of the file, it can with rm to prompt the user for confirmation before
also be displayed in other directory. To display more the system deletes a file. To delete a directory, it is
than one file by the Cat command, their names are used with the option of rm command.
written separately from each space. As– $ rm – r accounts Enter
Example: $ Cat January February Enter The above command will delete the accounts
The above command displays the contents of two directory. In this option means Recursive deletion.
files on two separate lines. Create and display the ■ The rmdir command only removes empty directories
contents of files using the cat command may go. (Fig. while rm-r deletes a directory whether it is empty or
2.64) not.
In the above picture directory east could not be
deleted by rmdir but it was deleted by rm-r
command.

Moving Files (mv)– The mv command is used to


move a file. The MOVE command is used for this
purpose in DOS. With the following command, the north
directory will be moved from the Sales directory to the
/usr/mini directory–
$ mv north/usr/mini north
■ Dot (.) always indicates the current directory. The
mv command is also used to moving files and
directories.
For example– $ mv west Bombay Enter command
removes the directory named west and creates a
Fig – 2.64 A sample Linux session using the commands directory named Bombay.
mentioned so far. ■ Like cp and rm, mv also has –i options and they all
do the same thing.
Copying files (Cp)– Cp command is used to copy 2.16 Other Important Points:
one file to another. Where as in DOS the COPY 2.16(i) Open Office Software:
command is used for this task Like in DOS, the Cp
command also requires two arguments. The first is the Open Office is application software, on which all
name of the source file and the second is the name of the office work can be done very easily. It is an office
target file. The file whose contents are to be copied is automation package. This is a free office suite. This is
called the source file and the one in which the contents absolutely works just like M.S. Office.
are to be copied is called the target file. Word processors, spreadsheet software, and
For example, to copy the January file to the March presentation software are the application software
file, the command $ cp > January March Enter has to be packages of the Office Open Suite. It can be used for
typed. windows; linux, etc. can be done in all operating systems
as well as it comes with most all versions of Linux. This
But if ℓs command is given then it will display three suite is a group of many software and these software are
files January February and March. designed in such a way that this software can work
together with each other. These capabilities that are a
■ If a user wants that confirmation should be asked must have in any office suite.
before copying the files, then Cp should be used 2.16(ii) GNU Project:
with the option for this. In the above figure, the file GNOME is a free and open source desktop
January is copied to a new file March. environment for the operating system. It belongs to the
■ If a file named March is already created, then all its GNU Project, providing free software to the world for
contents will be destroyed and January file will be three decades. The term GNU is an abbreviation for
created instead contents will come. 'GNU's not Unix'. The purpose of developing GNU was
■ If the user wants to give more than one option with to develop an operating system similar to Unix that was
the command, then either of the two methods $ ls-l- free from copyright and modification restrictions. The
a-t or $ ls-lat can be used. Both of these will work first GNU C compiler was developed by Richard
the same way. Instalman in 1991.
M1R5 57 YCT
Search on TG: @apna_pdf
Just as Ubuntu uses the Linux kernel to perform Ubuntu is also an operating system like Microsoft
software communication with the computer, GNOME is Windows which is freely available for personal
used here to provide a simple on-screen interface. The computers, devices mobile phones and servers. This
panel portion of GNOME displays the time, the launcher system has been developed by Canonical Limited, a UK
opens apps, and the overview screen displays all open based company. All the principles used to develop
windows. Ubuntu software are based on the principles of open
2.16(iii) Difference Between Open Source source software development. Ubuntu also includes a lot
Software and Proprietary: of other software. Starting with Linux kernel versions
Software that is developed and tested through open 4.15 and GNOME 3.28, it covers virtually every standard
collaboration; is called open source software academic desktop application, from word processing and
knowledge anyone with can inspect, modify and spreadsheet applications to Internet access applications,
redistribute the source code. In this, the management of web server software, email software, programming
the project is done by the open source community of languages, various tools, and many computer games.
developers and programmers. They are not aimed at Apart from being free, Ubuntu is also open source
unskilled users. It provides better flexibility. whose source code is publicly available to all. Being
Software that is owned by the person or organization open source, developers from all over the world keep
that developed it is called proprietary software. Only the making some improvements in it and we keep getting to
owner or publisher who holds the legal property rights to
see new versions from time to time. Ubuntu is also the
the source code can access this software. It is managed
by a closed group of project individuals or team who world's most famous network server and cloud server
developed it. This software is focused on a limited distribution. Ubuntu is very easy to use and gives a very
market of both skilled and unskilled users. There are similar experience to Windows. In Ubuntu users can
restrictions as well as limited scope for innovation. work in both the graphical user interfaces. An update
2.16(iv) Introduction of Ubuntu Operating comes from Ubuntu almost every 6 months.
System: 2.16(v) Method to Download Ubuntu:
Ubuntu is an open source software or operating To download Ubuntu, click on the link http:
system that originated from the Linux operating system //www.ubuntu.com/download/. The Ubuntu mirror list
i.e. Ubuntu OS; Linux is a distribution of the operating contains a complete set of official Ubuntu mirrors,
system. Which is also called Distro or Family Member. It starting with the one closest to you. You can also
is based on Debian Linux. upgrade to Ubuntu after installing Ubuntu.

Practice Questions with Explanatory Solutions


1. Which of the following is not an operating Ans.(a) The main function of real time operating
system? system is to manage certain system resources. It
(a) UNIX (b) MS-DOS updates files on basis of real time. Real time operating
systems are mainly used in airlines reservation
(c) PASCAL (d) WINDOWS XP
systems; air traffic control system is used in satellite
Ans.(c) The Operating System (OS) of a computer is operation etc.
the software that controls the internal activities of the 3. Whose examples are Redhat, Ubuntu and
computer hardware and provides an interface to the Chromium etc.?
user. The operating system is the first program that is (a) Windows based operating system
automatically loaded (copied) into the computer's (b) Linux based operating system
memory after the computer is switched on. Some (c) Unix based operating system
popular operating systems are Microsoft DOS (MS (d) Mac based operating system
DOS), Windows XP, Windows Vista, OS/2, Unix, Ans.(b) Examples of Linux based operating systems
Windows 7, Windows 10 etc. Pascal is not an are Redhat, Ubuntu Chromium, Fedora, opensuse and
operating system. It is a high-level structued computer Debian etc. Linux operating system is a multi-user,
multi-tasking and multi-processing software designed
progamming language used for teaching and general
for personal computers. It is a freely available open
programming. source operating system designed for use with the
2. Which type of operating system is often used in Office development network. The first version was
the operation of satellites? brought out by Lines Benedict Torvalds in 1991.
(a) Real Time Operating System Linux is a 32 bit operating system. It includes most of
the features of all other operating systems, not just
(b) Single Tasking Operating System Unix. All versions of Linux are distributed free of
(c) Batch Processing Operating System charge via the Internet. Red Hat, Ubuntu and
(d) Multi-programming operating system Chromium etc. are Linux based operating systems.

M1R5 58 YCT
Search on TG: @apna_pdf
4. Which of the following allows you to view and 8. Which of the following is not true about
change system settings? computer files?
(a) My Computer (b) Windows Explorer (a) They are a collection of data saved in a storage
(c) Control Panel (d) Recycle Bin medium.
Ans.(c) Control Panel is a group of many programs (b) Every file has a name.
which is used for hardware, font setting, system and (c) The user gives an extension to specify the date
security setting, network and internet setting, user it was created.
account setting. This is an option in which all the (d) Files generally contain data.
methods of controlling the software or system are
present. Window settings and changes can be using Ans.(c) Files are required to keep data programs,
Control Panel functions. software etc. safe in the computer. Data files are
5. Which of the following button is used to reduce prepared with the help of any software. Usually files
the size of any window? contain data. For this reason, they are also called
(a) Minimize document files. Each file has a name and they are a
(b) Maximize collection of data saved in a storage medium.
(c) Close button 9. Both GUI and CUI properties are present in the
(d) Restore button operating system.
(a) WINDOWS
Ans.(d) Restore button is used to reduce the size of
any window. This button is just another form of the (b) MS-DOS
Maximize button available on the title bar. The (c) LINUX
window is enlarged according to the screen by the (d) SUN
Maximize button and the Restore button is used to
Ans.(a) Windows is a graphical user interface
bring back the maximized window to its previous size.
operating system developed by Microsoft. In this the
6. The full form of GUI is. shortcomings of MS-DOS were kept in mind and it
(a) Graphical User Interface
was made user friendly. Windows is 32/64 bit multi
(b) Graphical User Interface tasking operating software released by Microsoft
(c) Great User Interface company such as-windows 95, windows-98. Windows
(d) None of the above ME, Windows XP, Windows Vista, Windows-7,
Ans.(a) The full form of GUI is Graphical User Windows 10 etc. Windows operating systems have
Interface. In Graphical user interface (GUI) both GUI and CUI features. Windows 3.0 was
Commands is represented by small pictures called released in 1990 to address the shortcomings of MS-
icons. In this, the user does not need to remember DOS. Later, some revised versions of it were
various commands. The user can get the commands published from time to time.
executed by pointing or clicking on the command 10. What does "Sleep" mean in Windows 10?
objects displayed through the icons, menus, windows (a) Restarting the computer in safe mode
present on the screen.
(b) Restarting the computer in sleep mode
7. ...........The list includes programs that perform
(c) Shutting down the computer by closing all
various tasks commonly required on a computer.
running applications.
Most of these programs are installed with
Windows 10 such as notepad, spinning tool, quick (d) Shutting down the computer without closing the
assist and wordpad: running applications.
(a) Helper programs Ans.(d) You can set power off time for both battery
(b) Nesties and power plugging mode by adjusting power and
(c) Utilities sleep setting for your PC and similarly you can set
(d) Windows Accessories sleep time when your PC is on battery or plugged in.
Ans.(d) Windows 10 provides some formatting utility 11. Which of the following is responsible for
software packages such as disk formatting, disk clean searching and loading the operating system into
up backup program, calculator, notepad, paint etc. RAM?
These are used to simplify the work of the computer, (a) Bootstrap loader
to keep it away from errors and to maintain the (b) CMOS
various functions of the system software designed for (c) DMOS
security purposes. (d) BIOS

M1R5 59 YCT
Search on TG: @apna_pdf
Ans.(a) A bootstrap loader is the program that Ans.(d) When the user starts the computer, the CPU
initializes the operating system by searching it in and BIOS scan computer together. In which the
RAM during startup. It is the process of loading a set computer finds out which devices are connected to the
of instructions when a computer is first turned on or motherboard and working properly or not. In this,
booted. Bootstrap operating allows programs to be RAM, display, hard disk etc. are checked; this process
loaded to start the system. is called POST (Power on self test). Load the basic
12. Which of the following command is used to elements of the operating system into its main
memory. The process of starting the computer by
rename a file?
doing this is called booting.
(a) Not
(b) Rename 16. Not a part of operating system:
(a) Linker (b) Booting loader
(c) Both (a) and (b)
(c) BIOS (d) Supervisor
(d) All of the above
Ans.(d) Linux operating system is mainly divided into
Ans.(b) On saving a file created by the user, that file
three parts – Kernel, System Library and System
is saved with the default name by the computer
Utility. Kernel is the main part of Linux operating
system. Users can rename the file according to their system and it is responsible for all the main activities
own preferences by changing the default name. of Linux. System libraries are special functions or
Rename to change the file name command is used. programs with the help of which various application
13. What is the meaning of OSI in the context of programs of Linux use the features of the kernel. A
computer? system utility program is responsible for performing a
(a) Open Software Interrelation specific task.
(b) Open System Intrarelation 17. Linux is:
(c) Open Software Interconnection (a) Application software
(d) Open system interconnection (b) System software
Ans.(d) The full form of OSI is Open System (c) (a) and (b) Both
Interconnection. It was developed by ISO (d) none of these
(International Organization for Standardization) in Ans.(b) Linux operating system is a multi user, multi
1978 and the OSI model consists of 7 layers. It is a tasking and multi processing software designed for
reference model for communication between two personal computers. It is a freely available open
users in a network. OSI model has 7 layers application source operating system developed for network use.
layer, transport layer network layer, data link layer, The first version was brought out by Lines Benedict
presentation layer, session layer and physical layer. Torvalds in 1991. Linux is a 32 bit operating system.
The OSI model describes how data or information is It includes most of the features of all other operating
sent or received over a network is in this, all the layers systems, not just Unix. All versions of Linux are
have their own separate work so that data can easily distributed free of charge via the Internet. Red Hat,
reach from one system to another. Ubuntu and Chromium etc. are Linux based operating
14. Operating systems and utility programs belong to systems.
the class of software known as. 18. Ubuntu........ is an operating system available for:
(a) Application software (a) PC (b) mobile
(b) System software (c) both (a) and (b) (d) none of these
(c) Software suites Ans.(c) Ubuntu is also an operating system like
(d) BIOS software Microsoft Windows which is available for personal
computers, devices, mobile phones and Available for
Ans.(b) System software is such software which is
free on the server. This system has been developed by
written to run the computer, control it, take care of its Canonical Limited, a UK based company. All the
various parts and make good use of all its capabilities. principles used to develop Ubuntu software are based
Our communication system with the computer is on the principles of open source software
possible only through software. System software development. Ubuntu also includes a lot of other
includes programs that control the computer system software. Starting with Linux kernel versions 4.15 and
and makes proper coordination between its different GNOME 3.28, it covers virtually every standard
parts. desktop application, from word processing and
15. The process of making the computer functional spreadsheet applications to Internet access
after the light is on is called. applications, web server software, email software
(a) Application (b) System programming languages, various tools, and many
(c) Strap (d) Booting computer games.

M1R5 60 YCT
Search on TG: @apna_pdf
19. Taskbar is available in Windows screen: Ans.(a) Operating system is the main type of system
(a) Top (b) Bottom software which controls the working of the computer,
(c) Left (d) Right it's not possible to run the computer without operating
Ans.(c) The taskbar is located at the bottom of the system. The operating system is the first program that
Windows screen. The Windows 10 taskbar contains runs after the computer is switched on is loaded into
icons for the Start Menu, the cortana search box, Task the computer's memory.
View, Microsoft Edge, Documents, Sound, Battery 25. Which of the following shortcut key is used to
Life, System Language, Notifications, Date and Time, open the Run program window?
etc. On Windows, the current active programs are also (a) Ctrl + R (b) Alt+R
displayed on the taskbar as icons. (c) Win+R (d) Ctrl + Shift + R
20. Linux GREP command is used– Ans.(c) The Win + R shortcut key combination is used
(a) Searching for a particular line to open the Run program window.
(b) Creating a new file 26. Which of the following is not based on Unix?
(c) Delete the already created file (a) Mac OS (b) Fedora
(d) Serving the file path (c) MS-DOS (d) Android
Ans. (a) The full form of GREP command is Globally Ans.(c) M.S. DOS is a non-graphical command line
Search Regular Expression and Print. It is used to operating system while Mac OS, Fedora and Android
search for files that contain a particular pattern in a are Unix based operating systems.
particular file. It prints the entire line and displays the
27. To retrieve the properties of a file DOS command
searched word in red.
is:
21. Multitasking operating system is: (a) FORMAT (b) DOSKEY
(a) windows 2000 (b) OS/2 (c) ATTRIB (d) DIR
(c) Unix (d) all of the above
Ans. (c) We can use ATTRIB command to retrieve
Ans.(d) OS can execute more than one program at a the properties of a file.
time under multitasking operating system. Almost all
operating systems of modern times support 28. Which of the following is not based on Unix?
multitasking operating systems. such as-Windows (a) Mac OS (b) Fedora
2000, OS/2, Unix, Linux etc. (c) MS-DOS (d) Android
22. What is the shortcut key for reboot? Ans.(c) M.S. DOS is a non-graphical command line
(a) Ctrl+Alt+Del (b) Ctrl+B+T operating system while Mac OS, Fedora and Android
(c) Ctrl+C (d) Ctrl+X are Unix based operating systems.
Ans.(a) To reboot a computer system means to switch 29. GUI is used to interface between:
off and on again the operating system. The (a) Hardware and software
combination of Ctrl+Alt+Del shortcut is used for (b) Man and machine
reboot. Use Reboot to fix device hangs, while (c) Software and user
installing apps, this is done when updating the (d) None of these
operating system. Ans.(c) In Graphical User Interface (GUI), many
23. The shortcut to open the start menu is: commands are represented by the computer operating
(a) Window logo system through thumbnails. Those are called icons. In
(b) Window logo + @ this, the user does not need to keep following various
(c) Window logo + M commands. The user can get the commands executed
(d) Window logo + F by pointing or clicking on the command objects
displayed through the icons, menus, windows present
Ans. (a) You can open the start menu without using
on the screen. GUI is used as an interface between the
the mouse by pressing the window logo key. The start
software and the user.
menu can also be opened by the 'Ctrl+Esc' shortcut
key. 30. Which of the following command is used to delete
an empty directory?
24. Operating system means:
(a) From (b) RD
(a) The set of programs that control the working of
(c) Erase (d) MD
the computer.
(b) The way a floppy disk drive operates. Ans.(b) RD command is used to delete an empty
(c) The way a computer operator works. directory. To use the RD command for,
(d) Converting high level language to low level Syntax– C:\>RD<DIR name>
language. Example– C:\>RD ABC

M1R5 61 YCT
Search on TG: @apna_pdf

3 WORD PROCESSING

3.0 Introduction: 3.1(iii) Comparision of Libre office and


LibreOffice Writer is also a type of word processing Microsoft office:
software that is freely available for use. LibreOffice was LibreOffice and Microsoft Office have almost
developed by the Document Foundation, using which similar features. Following are the comparisons based on
the quality of services in Interface of LibreOffice and
users can type, edit, documents. Its native format is Open Microsoft Office–
Document Format (ODF). LibreOffice works on all types ⇒ LibreOffice is a free and open source software,
of GUI based operating systems such as Microsoft while Microsoft Office need to pay monthly or
Windows, Linux, and Apple Mac OS etc. LibreOffice annual fee to buy.
includes the following components– Writer Document, ⇒ LibreOffice works in all types of operating systems
Calc Spreadsheet, Impress Presentation, Draw Drawing, and Microsoft Office works only in Windows and
Apple operating systems.
Math Formula, and Base Database. ⇒ Using both the software is almost the same.
The first version of LibreOffice Writer was launched ⇒ If Microsoft Office Suite is downloaded, different
on 25 January 2011 and LibreOffice is developed using links are given for its application while there is a
C++, XML, and Java programming languages. Its most dashboard of LibreOffice where all the applications
modern version is 7.5.3 which was launched on 04 May can be seen and run simultaneously.
2023. LibreOffice is updated from time to time so that ⇒ Compared to Microsoft Office, LibreOffice is
updated quickly, due to which new features are
new features are added every two to three months. added to the software every two-three months.
3.1 Word Processing Basic: ⇒ Very few people buy Microsoft Office because it is
Word processing is a type of application software expensive and pirated version of Microsoft Office
that used to create paragraphs and make modifications on can harm your computer.
⇒ Libre Office is updated from time to time due to its
it. There are many software available providing this such
Piracy doesn't happen. It is open source and free
as MS Word, Pagemaker, Corel Draw, Libre office software because it does not harm the computer.
writer etc. Through these, the text can be typed on the ⇒ The application size of LibreOffice is also very
screen, can be changed and it can also be kept safe for small which can be easily downloaded.
the future, which can also be printed if needed. ⇒ Even if the RAM and processor of the LibreOffice
LibreOffice Writer is also a word processor, its computer is low it works very well.
⇒ When a new document is opened in LibreOffice, it
extension is ⋅odt. Whereas all programs of LibreOffice displays the Untitled file name by default, whereas
are saved in .odf format only. in Microsoft Office the default name of the new
A word processor software has the following document is displayed as Doc 1 file name.
features– 3.2 Opening Word Processing Package:
Text editing, OLE, auto formatting, language and ■ To start Libre Office Writer,
grammar formatting text, GUI interface, graphics, online LibreOffice is usually started in the same way as
help, mail merge, etc. other programs on the computer. LibreOffice is
displayed in the menu of the computer system, by
3.1(i) Introduction of Libre office Writer: clicking on which you can open the LibreOffice.
LibreOffice Writer is a word processing program Clicking on the LibreOffice icon opens the LibreOffice
similar to Word in Microsoft Office that is used to create Start center as shown in Figure 3.1.
and modify documents. In LibreOffice Writer, you can
easily create any type of resume, letter or document.
Different styles, formatting, Tables etc. can be made very
easily.
3.1(ii) Objective:
In this chapter you will study about the following
topics–
• Basics of Word Processing
• Opening and closing documents
• Creation and manipulation of text
• Formatting text
• Manipulating tables
• Mail merge
• LibreOffice Writer shortcut keys Figure 3.1 Main Window of LibreOffice
M1R5 62 YCT
Search on TG: @apna_pdf
Ribbon– The upper part of the ruler is called the
ribbon and It contains the Standard toolbar and the
Formatting toolbar.
Standard Toolbar– Open an already created file,
Save, Print, Export etc. options are given in the standard
toolbar.
Formatting toolbar–In this, options are available to
set the style related to the paragraph. For example, the
document is made attractive by using options such as
bold, italic, underline, font color text alignment etc.
Scroll Bar– It performs to the same function as the
scroll bar of MS Word. A file can be scrolled using scroll
Bar.
Figure 3.2 shows the elements of the Libre Office 3.3(ii) Side Bar:
Elements of LibreOffice writer window is being The commands which are available in the
display in figure 3.2 LibreOffice Writer menu they are available vertically on
3.3 Menu/Ribbon and Tabs: the right side as shortcuts. This is a new option, which is
The LibreOffice Writer interface is similar to available only in LibreOffice. This includes page styles,
Microsoft Word. LibreOffice documents are opened galleries and navigators.
using the Quick Starter feature on Windows or Linux. The sidebar is on the right side of the Writer
You can also insert graphics and objects in Writer. window. The sidebar contains five decks- Properties,
Writer can Export files to multiple versions of HTML, Styles and Formatting, Gallery, Navigator, and Function.
XHTML, XML, ADOBE PROTABLE FORMAT (PDF) Each deck has a corresponding icon on the tab panel
and Microsoft Word files. It also connects to your e-mail on the right side of the sidebar, allowing users to switch
client. between them.
Quick Starter–When a user installs LibreOffice on
a computer which is running a Windows or Linux Properties– In this deck the five content panels are-
operating system. A Quick Starter feature can also be ⇒Styles; It provides existing cell styles, in this you can
installed when Quick Starter is activated; required library update cell styles as well as create new cell styles.
files are loaded when computer system starts resulting in ⇒Character; It provides the facility to format the text
reduced startup time for LibreOffice components. But i.e. font, font size, colour, etc. can be applied
computer systems with the Mac operating system do not accordingly.
have a Quickstarter. ⇒Alignment; This panel lets you align text in a variety
To activating the Quick starter: of ways. Which includes wrapping, indenting,
• Tools Menu → Options → Libre office → Select Load marging, text orientation, horizontal and vertical
alignment.
• Select LibreOffice or Enable Systray Quicstartery ⇒Cell Appearance; It provides facility to set cell border
during system startup. formats, cell background color, cell color and style
• Close LibreOffice to display the Quick Starter and including grid lines.
then restart. ⇒Number Format; By using this user can convert
number formats to decimal, convert to numbers
3.3(i) Libre Office Document Window: including currency, date or numeric text.
Title bar–The file name is displayed in the title bar 3.3(iii) Style and Formatting:
of LibreOffice writer which is at the top of the software. This deck consists of a panel that is opened by
If the file is not saved then Untitled1 is written on saving selecting the styles and formatting buttons from the text
the file, name starts appearing instead of Untitled1. formating toolbar.
Close / Minimize / Maximize / Restore Down– Ruler– In LibreOffice, Ruler works like as MS
Close (Alt + F4) button is used to close an application. word.
Minimize button (Alt + Spaccbar + N) is used to ■ To activate the ruler,
minimized software and placed on the task bar. The • View Menu → Rulers → Vertical Ruller
function of Maximize button (Alt + Spacebar + X) is to To quickly show or hide the rulers the Ctrl + Shift +
be fullscreen any software. The function of restore down R key combination is used.
is to keep it smaller than full screen. 3.3(iv) Toolbar:
Menu Bar / Tab– Commands related to formatting It is a desktop publishing tool with the help of which
you can create all types of documents. There are two
are given in the menu bar. File, Edit, View, Insert types of toolbar places in LibreOffice– docked (fixed
Format, Styles, Table, Form, Tools, Windows. Help place) or floating. The user can move the dock toolbar to
menus are available in this. The Alt or F10 button is used another place by moving it as per his choice.
to activate the menu. ■ To display or hide toolbar,
Close Document– It is used to close the document. • View Menu → Toolbar
This is different from the close button. The function of • Click on the name of the toolbar by clicking on the
the close button is to close the software and the function drop down list. A checkmark appears next to the
of the close document is to close the document only. name of the active toolbar.
M1R5 63 YCT
Search on TG: @apna_pdf
To hide the toolbar, deselect the toolbar icon from Zoom– The zoom slider can be used to change the +
View Menu or right click on the empty space available view magnification by dragging to the + and – symbol.
between the icons on the toolbar and click on Close 3.4 Creating a New Document:
Toolbar. We can create a new document by using the new
Moving the toolbar– You can keep the toolbar option given under the File menu. Apart from this, the
floating or you can undock the docked toolbar and move option of New Template is also available, in which
it to another location. formats of different types of pre-made documents such
• Move the mouse cursor over the toolbar handle. as letter, CV, resume etc. are available.
• Drag the toolbar to the new location while holding
down the left mouse button.
• Release mouse button.
Customizing the toolbar– You can customize the
toolbar, by adding the icon to the toolbar create new
toolbars.
■ To know the status of Toolbar,
• To dock the selected floating toolbar, click Dock
Toolbar. By default, it will display at the top of the
workspace.
• By clicking on Dock All Floating Toolbar can be
docked.
• By clicking on lock toolbar position you can lock
the docked toolbar in its docked position.
• Close the selected toolbar by clicking on Close
Toolbar.
• You can open the Customize dialog box by clicking
on the Customize Toolbar option in the View menu.
Navigator– This is a tool that allows you to move
around any object in the document, including tables,
frames, graphics, comments, or links.
3.3(v) Status bar:
The status bar available in LibreOffice Writer
provides information about the document to change Figure-3.4 New Tab Back Stage View in LibreOffice
certain document features. Writer
3.4(i) Creating Document Using Blank
Templates:
A document can also be easily created in Libre-
Office Writer. If you want to create a document like
memo, resume, brochures, card, report, etc., you can use
fig.- 3.3 Status Bar of LibreOffice Writer the wizard or template, which is available in writer.
Page Number– It displays the current number, the By creating a blank document with the blank
serial number of the current page and the total number of template of the writer, you can create and edit documents
document pages. Bookmarks defined in the document as per your requirement.
can also be viewed by right-clicking in the same field. ■ To create a new document,
Selection Mode– By clicking on this you can select
any mode from the various selection modes available • On clicking File tab → New
here such as Standard Selection, Extended Selection, the following dialog box is displayed
Adding Selection and Block Selection.
Document Change Status– It displays the save or
unsaved changes made in the document. You can save
the document by clicking on unsaved Changes.
Digital Signature– This icon is displayed only
when a document is digitally signed, otherwise it is
blank. You can view the certificate by double clicking on
the icon displayed.
Section or object information– When the cursor is
over a section, heading, list item, or when an object is
selected, information about that object is displayed in
this field.
View Layout– Click this icon to change between
single page, book layout views. The document can be
edited in any view. Fig.- 3.5 Available templates in Writer

M1R5 64 YCT
Search on TG: @apna_pdf
• Documents available in the template, as shown in Typing and editing a document– After the
the image above. LibreOffice writer document is opened, the user starts
• Create a new blank document by clicking on Select typing the text. Typed text is appended to the character
button. sequence at the cursor position and words, at the end of
the line automatically wrap the text to the next line.
Using Enter, moves the cursor to a new line.
Mistakes made during typing can be corrected by using
the Backspace key or by using the arrow keys to move
the cursor to the right place by using the Delete key. Any
change can be made at any time by editing the document.
3.5(i) Save and Save as:
Unless a document is saved to a disk, it remains only
in the main memory and destroyed forever after power
off.
To save any LibreOffice Writer document, the
following steps should be followed-
• Click on File tab → Save/Save As. Or, on pressing
Ctrl + S key, the following dialog box will be
Figure-3.6 Writer Blank Document displayed-
3.5 Opening and Closing Documents:
Apart from creating new documents, there is a need
to open previously saved documents. You can open a
document and make some other changes in it.
By doing this, you can also save it at another
location with another name.
■ To open a document which is already created in
LibreOffice Writer,
• File Menu → Open
Or, File Menu → Open remote file or press the
combination of Ctrl + O
Or, the drop-down menu of the Open icon is available
on the Standard toolbar.
Select the file by clicking on the list and open it.
Scrolling in a document– Scrolling in a document
can be done using the mouse or keyboard. Splitting a Fig - 3.7 Save As Dialog Box
document window lets you view two different parts of a • In the displayed dialog box, select the name of that
document. document in the text box in front of the File name
Scrolling through a document with the mouse– label and select its type in Save as type and click on
• If you want to scroll up one screen then click on Save button. After this, every time that file is
scroll box. opened, the file name will be displayed on the title
• If you want to scroll down one screen, click at the bar.
bottom of the scroll box. Naming a Document– The name of a file in
• To scroll up one line, click on the up scroll arrow. Windows can be up to 255 characters long. After these
• To scroll down one line, click on the down scroll dot (⋅) appears and there is a file extension of three
arrow. characters. When naming the file * ? : [ ] + = \/;< > etc.
• If you want to click left, click on the left scroll characters should not be used.
arrow. 3.5(ii) Save a Document Automatically:
• If you want to scroll right, click the right scroll LibreOffice can set and reset user data, versions, etc.
arrow. This is a special facility and saves your work in some
• To scroll to a specific page, drag the scroll button. time interval.
• To scroll left beyond the margin in Normal View, ■ To save your document automatically,
hold down the Shift key and click the left scroll • Tools→Options→Load/Save→General
arrow. • Click on Save AutoRecovery Information and set 5
It allows fast scrolling up or down the page by minutes, 10 minutes or any other time. Auto backup
clicking on the "select browse object" on the vertical option can be select to backup your work.
scroll bar and choosing the desired option.
M1R5 65 YCT
Search on TG: @apna_pdf
3.6 Using the Help:
For any kind of help related to LibreOffice Writer,
you can use Help. Help is available in LibreOffice Writer
and can be accessed by using the Help menu or the F1
key.

Fig- 3.8 Automatic saving of document


3.5(iv) Closing Document:
When you are finished to working on a document,
closing the window removes the document from the
screen and frees up the computer's main memory (RAM).
■ To exit Writer by closing a document,
• File tab → Close
• If any changes have been made by the user since the
last time the document was saved, an alert dialog
box is displayed for asking the option to save your
work.
If no changes are found in the document the window
closes.
Fig - 3.11 Help Menu
3.7 Page Setup:
In word processing, it is very important to set up the
page of your document before printing it. Page setup
means the size of the document, the margins around it,
etc. Page setup is required to set page settings, such as
margins, orientation, size; page, different margins, layout
Fig - 3.9 Alert Dialog Box of paper etc.
■ To quit LibreOffice Writer, 3.7(i) Page Orientation:
• Terminate the application by closing the LibreOffice There are two types of page orientations in
Writer window.
LibreOffice Writer– Portrait (vertical length greater than
File tab → Exit.
width) and landscape (horizontal, width greater than
length).
■ To change the page orientation in LibreOffice
Writer,
• Format → Page Style → Page → Select
Portrait/Landscape

Figure-3.10 Selecting Exit Option in File Tab Fig-3.12 Selecting page orientation
M1R5 66 YCT
Search on TG: @apna_pdf
3.7(ii) Paper Margin and Size:
There are four types of margin available in
LibreOffice Writer– Left, Right, Top and Bottom, by
default all four margins are 2 cm. All four margins in MS
Word are 1 cm. Left and right margins can be set up to
0cm to 20.5cm this is for A4 paper size. For top and
bottom margin can be set up to from 0cm to 29.2cm.
The paper margin is set according to the paper size
used. A4 paper size is set by default, Paper width 23 cm.
and length and height 29.7cm.
■ How to set paper margin and size in LibreOffice
Writer
fig-3.14 Page Style' dialog box
• Format→ Page Style → Page tab
• With the help of above dialog box you can set paper
• Under the Margins section of the Page tab; format, orientation (portrait/landscape), layout
Left, Right, Top and Bottom margins can be set. settings.
• Click on 'Apply' and click on the OK button.
• Under the page margins section of the page tab:
3.7(iii)A. Page Layout:
Set the paper size using the Format option. In LibreOffice writer also Like MS Word, there are
two types of page orientations– Portrait (vertical, longer
than width) and Landscape (horizontal, wider than tall).
The page layout of a new text document uses the default
page style for all pages users can apply different page
styles to different pages according to their own
preferences.
■ To set the page orientation,
• Format Page
• Click on the page tab.
• Select Portrait or Landscape under Paper Format.
• Click on the OK button.
3.7(iii)B. Border:
Border is a box which surrounds the paragraph.
Borders are defined for page styles in LibreOffice
Writer. The change to the border is displayed on all
pages that use the same page style.
■ To set the border,
• Format Page→ Borders

Figure-3.13 Page Sizing in LibreOffice Writer


3.7(iii) Page Layout Borders, Watermark:
In a LibreOffice Writer document uniformly styled
pages properties can be changed directly when–
• Click on the Page option available in the Format
menu. The 'One Page Style' dialog box will be
displayed.
Figure-3.15 Setting Border
M1R5 67 YCT
Search on TG: @apna_pdf
• In the default area, select one from default border Printing the Current Document– The easiest way
style. to print an open document is by clicking on the File tab.
• In the Line area, select the line style, width, and Select the Print icon from dispayed backstage view.
Or, click the Print button on the Quick Access
color to style the selected border.
Toolbar. By default, on clicking the print button, it prints
• Click on the OK button. only one copy of the open document, the hidden text
3.7(iii)C. Water Mark: does not print.
It is used to protect the document. It avoids ■ To print the document,
duplication of documents. It is displayed uniformly on • Click on Print option in File tab, Back Stage view
will be displayed.
the background as light colored letters on all pages of
this document. Even after printing, it is printed on the
paper in the same way. Watermark is used to insert as
text or picture on the background of the page. It appears
evenly on all pages.
■ To set a watermark in a LibreOffice Writer
document,
• Format Menu → Water Mark
• In the Watermark window, enter the text that you
want to set as a watermark. Select the font, color and
angle of the text and click on OK.
• Once the watermark is set, it can also be removed.
Open the Watermark dialog box from the Format
menu, remove the text, and click OK.

Fig - 3.17 Print Back Stage View

• You can select the following options from the print


section-
⇒Select any one of the installed and available printers in
your computer under Printers.
⇒Under Settings, select the settings as per your choice.
⇒Select Print all Pages to select the entire document.
⇒You can print only your current page by clicking on
the Print Current Pages button.
Paper Range Option–
■ To print the selected text, first select the text, then in
the Print dialog box, click the Selection button in the
page range area. If the user will select some other text
then this selection starts appearing Dimmed.
■ Pages used to print a range of pages, such as pages 7
Fig - 3.16 Watermark Dialog Box through 12 of a 25-page document. For this, type the
first page number and the hyphen between the last
3.8 Print Preview, Printing of Documents: page numbers in the Pages text box. (Like, 7-12)
3.8(i) Print Preview: ■ Pages can also be printed in a particular section of a
Writer's print preview feature allows users to view a document by the Pages option. To print the fifth
section of the current document, type S5 in the Pages
document on the screen before printing it.
box. To print page number 3 of the first section to page
■ To print preview in LibreOffice Writer, number 12 of the third section, in the Pages box, type
• File → Print Preview P3 S1–P12, S3.
Or, press the Ctrl + Shift + O shortcut key. Copies– Type the number of copies of the document
3.8(ii) Printing of Documents: you want to print in the Number of Copies box.
If you want to print a document, click the File tab ■ To cancel printing for,
• Start button → Printer and Faxes.
and select print option. In that you can also select a
• Click on the printer icon in the Printers and Faxes
different printer. Other settings related to printing can be dialog box. Double click to open the Printers folder
made. and click on Cancel.
M1R5 68 YCT
Search on TG: @apna_pdf

Fig-3.18 Printer Folder Options


3.9 PDF File and Saving a Document as a
PDF File:
Now a days PDF file is being used a lot. It helps to
share files and display files uniformly on other devices.
It is very easy to open and view PDF files.
■ Convert a document to PDF in LibreOffice Writer to
save. Figure-3.20 New Tab Back Stage View in LibreOffice
• File Menu → Export As/Export As PDF Writer
• Documents available in the template, as shown in
the image above choose.
• On clicking the Create button, a new blank
document is created as shown in the following
image.

Fig-3.19 Saving a document in PDF format


• Now click on Export button in the displayed dialog
box.
3.10 Text Creation and Manipulation:
After the Writer document is opened, the user starts
typing the text. Text in the document can be created and Figure - 3.21 Writer Blank Document
manipulated, such as selecting text, copying, pasting, Starting a New Paragraph– Any paragraph in the
writer, the user can hold any amount of text or graphics.
editing, etc.
A new paragraph begins when you press Enter. Each
3.10(i) Document Creation: paragraph is followed by a paragraph mark ¶.
A document can also be easily created in ■ To start a new paragraph,
LibreOffice Writer. If you want to create memos, Place the insertion point where you want to start a
resumes, brochures, cards, reports, etc. in the document, new paragraph and press the Enter key. As soon as you
you can use the wizard or template that comes with the press the Enter key, Inserting a paragraph mark writer
writer. moves the insertion point to the first line of a new
By creating a blank document with Writer's blank paragraph.
template, you can create and edit documents as per your Starting a New Line–Even in writer, when we type
requirement. any text, and text reaches the right margin, it
■ To create a new document, automatically wraps the text to a new line.
■ To start a new line in the same paragraph,
• On clicking File tab → New, the following dialog
• Place the insertion point where the user wants to
box is displayed- start a new line press Shift + Enter.

M1R5 69 YCT
Search on TG: @apna_pdf
3.10(ii) Editing Text:
After typing some text in the document, the user can
edit it as required. Any text, sentence, word etc. can be
added to the document. To add new text, click and type
by placing the mouse pointer to the appropriate place.
All typed text will shift to the right of the cursor. A
document can also be deleted from the document.
Typing over existing text– By default, it moves the
text to the right when new characters are inserted. But by
switching to overtype mode, we can replace the existing
text character by character.
Applying Correction in the Typed Text– Delete or
Backspace is used to correct simple mistakes made
during typing. To delete multiple characters at once, first
select the text then delete it with any of the following Fig - 3.22 Selecting text using the selection bar
Selecting Text with a Mouse– Using the mouse,
key-combination– you can select a single character, a paragraph, or an
To delete Key combination entire document.
Selected text Press Backspace or ■ To select a small text with the mouse,
Delete • Double click left mouse button by moving cursor at
Characters before insertion Press Backspace the beginning of the text to be selected.
• By dragging the mouse pointer over the text in any
point
direction, you can select the desired text as per your
Characters after insertion Press Delete requirement.
point
Word before insertion Ctrl + Backspace Mouse Action Select to Text
point Double click on a word Selects a word
Word after the word Ctrl + Delete Click on the sentence by A word
insertion point pressing Ctrl key.
Table-3.1 Key combination to delete text or graphics Lines by clicking on the Single line
selection bar text the select to
■ To restore deleted text,
end up or down.
Click the Undo button on the Quick Access Tool bar Double click on selection bar A paragraph
or press the Ctrl + Z key combination. Click on the pressing Ctrl key Document
■ To replace a selection with new text, silection bar
Select Text → Type New Text. Table- 3.2 Method of text selection
The new text will replace the selected text. To Select to text using keyboard– By moving
3.10(iii) Text Selection: Insertion point to move hold down the Shift key. Text
can be selected by using any of the move keys along with
For any type of formatting on the text in the
the Shift key. Some key combinations are as follows.
document, such as moving, formatting or deleting the
Key Combiantion To Select
graphic picture, the items have to be selected. Text can
Shift + → Letters from left to right
be selected with both the mouse and keyboard. To select
Shift + ← Letters from right to left
the text with the mouse, click and drag with the mouse
Shift + ↑ Bottom to top lines
from the first character of the text while other keys are
Shift + ↓ Top bottom lines
used from the keyboard with the Shift key. Selecting a
Shift + Ctrl + ← or → A word
text highlights it and click outside the selection to cancel
Shift + Home To the beginging of a line
the selection.
Shift + End To the end of a line
■ To select text,
Ctrl + Shift + ↓ The end of a paragraph
• Place the insertion point from where you want to
Ctrl + Shift + ↑ The begining of the
select the text. paragraph
• Move the mouse pointer by holding down the left Shift + Ctrl + End To the end of the document
mouse button or by placing the insertion point at the Shift + Ctrl + Home To the begining of the
beginning of the text to be selected and holding doument
down the Shift key, click there, the selected text will Ctrl + A Full document
be displayed as shown below- Table- 3.3 Key combinations for text selection
M1R5 70 YCT
Search on TG: @apna_pdf
■ To select a distance location from the insertion Moving text– Moving means cutting the selected
point, text and transferring it to another location in the same
• Move Insertion point at the begining of the text to bedocument.
selected.
■ To move text from one location to another within
• Press F8 key to extend selection. In this mode the
word is displayed on the status bar at the bottom of the same document,
the screen. • Select the text to be cut.
Press any of the following keys. • Edit Menu → Cut
Key Combiantion To Select or Ctrl + X. The selected text will disappear from the
← or → keys Next or previous character
screen and placed on the clip board.
End key End of the line
• Place the insertion point at the place to be pasted.
Page Down key To the bottom of the next screen
Page Up key Top of the previous screen • Edit Menu → Paste
Home key Start of line In this way the selected text will be moved.
Ctrl + Home key To the begining of the document Moving and copying by Drag and Drop method–
Ctrl + End key To the end of the document If the text is to be moved within the current page of the
Table- 3.4 Selecting text from the insertion point document, then drag and drop is an easy way to do it. By
After pressing any of the above keys, finally press this method, you can move the text to a short distance,
the Esc button. only cut, copy and paste commands are used to copy or
Delelting Text– Press Backspace to delete all move more distance.
characters to the left of the insertion point in a document■ To move text graphics by drag and drop editing,
and the Delete button to delete character to the right of
the insertion point. • Select the text graphics to be moved.
This method is not suitable for deleting multple line • Pointing to the selected text graphics and holding
at once, for this select all text to be deleted at once. down the left mouse button, drag the dotted insertion
■ To delete text, point to the new location until the drag and drop
• Select the text to be deleted by pressing the left pointer is displayed as shown in Figure (3.24).
mouse button.
• Press the Delete button with the help of the • Release the mouse button to move the text to the
keyboard. new location.
3.10(iv) Cut, Copy and Paste: ■ To copy text by drag and drop editing,
With the help of copy command, the document text • Point the text to be copied and, while holding down
can be transferred to another place with the help of paste the left mouse button, drag the dotted insertion point
while remaining in place. This command does not affect
to the new location.
the original document.
■ To copy text from one location to another in the
same document,
• First select the content or text which you want to
copy.
• Edit Menu → Copy
or, Ctrl + C. copied text will be copy to the Clipboard
which is an accessory of Libre office.

Figure-3.24 Dragging and Dropping the Mouse Pointer


Keyboard shortcuts for moving and copying–
There are many keyboard shortcuts in Writer to cut or
copy any text or graphic. Cut, Copy, Paste commands are
used and supported not only in LibreOffice but also in
Fig - 3.23 Select text to copy windows used by all applications running on the
• Position the cursor where you want to paste the text. platform.
• Edit Menu → Paste To move text or graphics using the following
or, Ctrl + V. Thus the selected text will be pasted. shortcuts can be move or copied-
M1R5 71 YCT
Search on TG: @apna_pdf
Shortcuts Task • Font Style (Regular, Bold, Italic, Bold Italic) and
Ctrl + C Selected text or graphics copy to Font Size from the displayed character dialog box
clipboard can be set.
Ctrl + X Ùee, Moving selected text or graphics • Click on the OK button.
Shift + Delete to the clipboard
Or, font size can also be changed through toolbar
Ctrl + V Ùee, Copy the contents of the clipboard option.
Shift + Insert to the document to move
3.10(vii) Changing Color:
Alt + Shift + ↑ Moves paragraph up The commands located in the ribbon can be used to
Alt + Shift + ↓ Moves paragraph down modify any text or character. Or the appearance of the
Table-3.5 Shortcuts to move or copy for text or graphics font can also be changed by selecting the text. A mini
3.10(v) Font Color, Style and Size Selection: toolbar displays at the edge of the selected text.
Font or type face is the different styles of writing ■ To change the font using the ribbon,
letters, which provides variety to the writing of the • Select the text whose font is to be changed.
document. Font is used in any type of font editing for all • Click the Formatting toolbar.
types of computer document characters. The minimum
font size in LibreOffice Writer is 6 and the maximum is
96. You can change the font and size of the selected text
in the document.

Fig- 3.25 Selecting font size in Writer


3.10(vi) Bold, Italic and Underline: Fig-3.27 Selecting font in Writer
LibreOffice Writer has bold, italic and underline
formatting tools. You can use these tools for formatting
• All the available fonts are displayed in the drop
selected text or paragraphs. The bold, italic, and down list from which you can select the desired font.
underline formatting tools are available in the Edit menu The selected font will be applied to the document.
in LibreOffice Writer. ■ To change the font color,
■ To change the font of the selected text; • Select the text whose font color you want to change.
• Select the text you want to format.
• Formating Toolbar→ Font group→ 'Font color'
• Format → Character dropdown arrow
• Select a font color from the Font Color menu.

Fig - 3.28 Selecting font color


Or, you can select the color by clicking on more colors
after that click on ok.
■ To change the font size,
• To change the size of a font, select the text and enter
the desired font size by selecting it from the font size
Fig – 3.26 Character Dialog Box list box.
M1R5 72 YCT
Search on TG: @apna_pdf
• You can increase your font size by clicking on the
Increase font size button or by pressing Ctrl + <
simultaneously and you can decrease the font size by
clicking on the Decrease font size button or by
pressing Ctrl + >.
■ To change the font style,
• To make a font bold, italic, regular or underline,
click on its corresponding button on the Format
toolbar. These formatting buttons are toggle buttons,
which means they activate when clicked and
deactivate when clicked again.
Applying Character Formatting Using
Keyboard– Most formatting can also be done using Figure-3.29 Paragraph Dialog Box
keyboard shortcuts, which are mentioned below- • Select Alignment from the dialog box displayed on
■ Using Shortcut Keys to format, the screen.
• Select the text to be formatted and use the shortcut There are four options for setting the alignment–
key combinations to apply the desired formatting (i) Using the Left Alignment button, the text is set on
effect. the left margin but it leaves the right margin skewed.
Format Shortcut Key (ii) On clicking the right element button, it sets the right
Bold Ctrl + B margin and leaves the left margin skewed.
Italic Ctrl + I (iii) On clicking the center alignment button, it places the
text on the center line between the left and right
Single underline Ctrl + U margins. And in this the margins on both the left and
Word underline Ctrl + Shift + W right sides are skewed.
Double underline Ctrl + Shift + D (iv) On clicking the Justify Alignment button, it aligns
Small Caps Ctrl + Shift + K the text on both the left and right margins, in which
All Caps Ctrl + Shift + A the space between the words is adjusted by
Hidden Text Ctrl + Shift + H increasing.
Super Script Ctrl + Shift + =
Sub Script Ctrl + =
Copy Formatting Ctrl + Shift + C
Paste Formatting Ctrl + Shift + V
Remove Formatting Ctrl + Spacebar
Change case of letters Ctrl + F3
font
Font Ctrl + Shift + F : This
command activates the
font box in the formatting
toolbar. Type a new font
name or highlight the
desired font using the Fig - 3.30 Paragraph Alignment Options
arrow keys. Select it by
pressing Enter. 3.10(ix) Undo and Redo:
Symbol Font Ctrl + Shift + Q When you delete a text, it disappears, but if you
Point Size Ctrl + Shift + P want to display that text again on your computer screen,
To decrease font size Ctrl + Shift + > it can be done with the help of undo command without
To Increase Font Size Ctrl + Shift + < typing and redo command reverses the undo.
One point font size up Ctrl + ] ■ To undo an action,
One point font size down Ctrl + [ • Select the undo command from the quick access tool
Table - 3.6 Formatting Options by Keyboard bar or press the ctrl + Z keys simultaneously.
3.10(viii) Alignment of Text:
The position of the text of the main document on a
page is called alignment. Following are the available
alignments in LibreOffice Writer and these steps should
be followed to apply them–

■ To align text in Writer,


• Select the text you want to align.
• Format menu→ Paragraph→ Alignment Figure-3.31 Selecting an undo command
M1R5 73 YCT
Search on TG: @apna_pdf
You can select one or more undo commands by • User can select any one of the words displayed in
clicking on the downward-pointing arrow displayed the pop-up menu or can also add it to ignore or
to the left of the undo icon can display a list of custom dictionary.
multiple undo actions. • Correct spelling can be selected automatically by
choosing AutoCorrect from the pop-up menu.
• The redo command is the opposite of undo. You can To Correct Proofing Errors– You can check the
redo the undo action by pressing ctrl + Y keys spelling and grammar in a document, and when errors
together. are found, it displays the errors in a Spelling or Grammar
3.11 Auto Correct & Spell Checking: pane.
■ To correct proofing errors,
Autocorrect feature is used to correct mistakes in the • If you want to proofing errors from the beginning of
document. Capitalization errors can also be corrected the document, place the cursor at the beginning of
using AutoCorrect. For example, when you press the the document or press the Ctrl + Home keys
space bar after typing the name of the day of the week, simultaneously.
the first letter of the name of the day of the week • Error displayed in Tools Menu → Spelling pane
becomes a capital letter.
Automatically checking the spelling of the
document–
After turning on the automatic spell checking
feature, it checks and underlines words while typing.
■ To switch on automatic spelling checking,
• Select the Auto Correct option under the Tools menu
do.
• Click on the check box in front of "While Typing".

Figure-3.34 Spelling and Grammar Dialog Box


• Follow any one of the following to correct the error
displayed in the Pane.
⇒Clicking on Ignore to see further errors without
making any changes and by clicking on Ignore you
can ignore errors in the current document.
⇒By clicking on Add, you can add your word to your
dictionary.
⇒Select the correct spelling of that word from the
Spelling Suggestions list and click on Change or
Change All to correct the spelling in the entire
document.
Using the AutoCorrect Feature– AutoCorrect
Feature is used to correct type, capitalization errors and
misspelled etc. in the document.
■ To create AutoCorrect entries,
Fig- 3.32 Proofing tab of Word Options dialog box • Menu Tools → Auto Correct
• Under Auto Correct option on Replace options
■ To check the spelling of underlined words, Click on The Auto Correct dialog box appears as
• Right clicking on the underlined word will display a shown in Figure 3.35 below.
pop-up menu with a list of other words and options.

Fig - 3.33 Pop-up menu Fig-3.35 Autocorrect dialog box

M1R5 74 YCT
Search on TG: @apna_pdf
• Replace; Type the misspelled words or abbreviations 3.13(i) Paragraph Indenting:
that you want automatically correct in the text box. Indents are the white space added to a margin along
• With; Type the correct spelling or phrase in the text the margin, which is used to reduce the text area for
box. paragraphs in a document. In this, if the user sets a left
• To add these entries, click on add and then on Ok. margin of 1.0 inches, then at the time of printing the text
3.12 Using Find and Replace: will be printed at 2.0 inches from the left edge of the
With the help of Find and Replace command, you paper.
can easily edit your document. With the help of Find Once a paragraph indent is set in a document, the
command, you can search for any text and with the help same indent applies to each new paragraph until it is set
of Replace command, you can replace it. again.
Searching for text– You can search for a text or Line Spacing– The space set between two lines in a
sentence within a document by using the Find command. document is called line spacing. Following are the
■ To search for a specific text in Writer, options of line spacing available in the writer–
• Use Edit menu → Find or Ctrl + Shift + F shortcut
key. Option Description
Single Spacing No spaces between lines of text
the place is not visible.
Double Spacing A blank space appears between
lines of text.
1.5 Spacing A line space half the height of a
line space of text appears
Fig-3.36 Finding text in Writer between lines of text.

• Enter the text to search for in the dialog box that Table-3.7 Different options for line spacing
appears. Space before and after paragraphs– There is a
• Click on Find Next / Find All. spacing box in the Before Paragraph and Paragraph
Replacing text– If you find any wrong text in the dialog box to set before and after white space settings
document and want to replace the word, you can use the can be entered in Points (Pts), Inches (In), Lines (Li) or
replace command to replace it with the correct word.
■ To replace any text with other text in Writer For, Centimeters (Cm).
• Edit menu→ Find and Replace Formatting Paragraph Using Dialog Box
Launcher–
■ For formatting paragraphs,
• Place the insertion point in that paragraph or select
several at once.
• Paragraph Format Menu→ Paragraph option →
Indent & Spacing

Figure-3.37 Find and Replace Dialog Box


• Type the text you want to search for in the Search
for dialog box that appears.
• In Replace with, type the word you want to replace
with the existing text.
3.13 Formatting the Text:
In Writer, the user can do formatting on any selected
text very easily. Text apperance can be changed using
formatting.
Paragraph formatting options include text alignment,
paragraph indentation, line spacing, border and shading, Figure-3.38 Paragraph dialog box with Indents and
and spacing before and after the paragraph. Spacing property sheet
M1R5 75 YCT
Search on TG: @apna_pdf
General Options– • Use any one of the following shortcut keys.
■ The current alignment is displayed in the alignment list Effects Combination Key
box.
■ You can also change the current alignment as required. Creates single spaced lines. Ctrl + 1
The list is displayed when you click on the down Creates double spaced lines Ctrl + 2
arrow next to the list box. Click on the desired Creates 1.5-spaced lines. Ctrl + 5
alignment option from the presented list.
Line spacing option– It is used to add or remove Ctrl + 0
■ This is an option for line space. By clicking on its a line space before
down arrow Spacing can be controlled. paragraph.
Space options before and after paragraphs– ■ To give single line space before paragraph,
■ In the 'before' text box, select the required space to add • Select Paragraph → Ctrl + 0.
space before the paragraph.
■ Select the required space in the after text box so that Ctrl + 0 (Zero), it acts like a toggle button it is used
space can be added after paragraphs. to remove single line space.
■ Click on Ok to close the dialog box. 3.13(ii) Bullet and Numbering:
Formatting Paragraphs Using Ruler in Writer– Bullets and numbering are frequently used tools in
■ To format paragraphs using a ruler,
documents. It is used to highlight a paragraph and show
• To align multiple paragraphs, select or place the
insertion point on the paragraph to be formatted. it step by step.
• Format Tab→ Paragraph→ Alignment button ■ To create a bulleted list,
Left/Center/Right/Justify. • Select a location to create a new list or select an
■ To indent paragraphs using the mouse, existing list.
• Place the insertion point on the paragraph to be • Click on the Bullets and numbering button or select
indented or select multiple paragraphs at once.
Right click on the entered text and choose Bullets or
• Format Tab→ Paragraph→ Indentation button
• With the help of the Increase Indent button, the Numbering.
indent marker is moved forward by one tab and with • Click on the Format tab and select Bullets and
the help of the Decrease Indent button, it is moved numbering command.
back by one tab.
■ To indent paragraphs using the ruler,
• Select the paragraph to be indented.
• Indent markers are displayed on the ruler.
• By Selecting from Traingle Indent Marker and drag
to the desired location.
• As the marker is dragged, the ruler scale displays the
position relative to the margin of the indent mark.
• After positioning the mouse button the text in the
selected paragraph moves accordingly.
Formatting Paragraphs Using Shortcut Keys–
■ To use Shortcut Keys for formatting paragraphs.
• Select a paragraph.
• One of the following keyboard shortcuts use to.
Alignment Combination Key
Left Ctrl + L
Right Ctrl + R
Center Ctrl + E
Justify Ctrl + J
Table- 3.9 Alignment Shortcut Keys Fig- 3.39 Applied Bullet Style in Writer
• To indent paragraph by using keyboard shortcut.
• Select the paragraph to be indented.
• Use the following shortcut key combination. • On moving the mouse over the displayed various
Effects Combination Key bullet styles a preview of that bullet is displayed in
Sets the left indent. Ctrl + M the document. Select the bullet you want to use in
Removes the left indent. Ctrl + Shift + M your document.
Inserts a hanging indent. Ctrl + T • The selected bullet appears in your document.
Reduces hanging indent. Ctrl + Shift + T Creating a Numbered List– Organize text into a
Removes paragraph Ctrl + Q numbered list to do this, number letters and Roman
formatting. numbers are available.
Table- 3.10 Effects Shortcut Key Combinations
■ To change the line spacing using keyboard shortcuts, • Select the text you want to format as a list.
• Select the paragraph to change the line spacing. • Format tab→ Bullet and Numbering

M1R5 76 YCT
Search on TG: @apna_pdf

Sentence case

UPPER CASE

lower case

Each Word

tOGGLE cASE

Figure-3.41 Change Case Dialog Box


Figure- 3.40 Applied Number Style in Writer
• Select Numbering tab in the Bullet and Numbering
3.14 Header & Footer:
dialog box the Under Numbering Style menu is In header and footer, the matter is set which we want
displayed. to show on each page of the document. The added text
• Hovering the mouse over the various numbering appears in the header at the top of each page of the
styles. It displays a preview of that numbering style document and the footer at the bottom of the page.
in the document. Select the numbering style. Header is the top part of the page which is added to
• The selected numbering style appears in your the top margin of the page. In this page number, number
document. of pages, date and time, autotext, etc. are added.
3.13(iii) Using Change Case Command: Footer is the bottom part of the page which is added
Writer provides the facility to convert any text from to the bottom margin of the page. It is used to insert
small letters to capital letters and from capital letters to footnotes, page numbers of pages.
small letters. This work is done by the user using the Inserting Header & Footer–
■ To insert header and footer in a document,
change case command.
• Insert Menu → Header and Footer
■ To apply capitalization, • Format Menu → Page
• Select the text. • In page dialog box, you can select header on same
• Format tab → Text group → Select Case. content on left and right pages, same content on first
• The command displays in the change case command page, merging, dynamic spacing and autofit height
are–
(i) Sentence Case– It is used to capitalize the first
letter of a sentece and leave all other letter as
lower Case.
(ii) Upper Case– It converts all characters in upper
case.
(iii) Lower Case– It converts to all characters in lower
case.
(iv) Capitalize each word– This capitalizes the first
letter of each word.
(v) Toggle Case– By using this the characters which
are in upper case in each selective text are
converted to in lower and those in lower case are
converted to upper case.
■ By selecting any of the above option it is applied
to the text. Figure- 3.42 Setting Header in Page Style Dialog Box

M1R5 77 YCT
Search on TG: @apna_pdf
3.15 Table Manipulation: • Writer inserts an empty table as soon as you release
Information is organized in the form of rows and the mouse button.
columns in the table. Tables are used to prepare forms, ■ To create a table using the Table option in Writer,
reports and resumes etc. Tables are made up of • Place the insertion point where the table is to be
horizontal rows and vertical columns. inserted.
The boxes made by intersecting of rows and • Table → Insert table.
columns are called cells. Any cell can also contain Enter the number of rows and column which you
numbers, characters or graphics. Rows and columns can want to have in the table as shown in the above
also be inserted and deleted in the table. In this, the table picture.
can be more attractive by using border and shading • Click Ok
features. The drag and drop feature of the mouse or the Ctrl +
Concept of Table– Table Cells are made up of rows F12 shortcut key combination can be used to insert a
and columns. The user can insert characters, numbers or table into a document in Libre Office Writer. For this
graphics in the cell. Numbers in the columns of tables. follow the following steps-
Calculation is also done by aligning and sorting them. • Click on the menu available in the menu bar and
Rows– A row is a horizontal block that runs across select Insert Table.
from left to right in the document.
Column– Column is a vertical block which runs
from top to bottom through the entire document.
Cell– This is the intersecting point of the row and
column. This is the storage space of the table in which
text or graphics are stored.

3.15(i) Insert and Draw Table:


Insert tab → Insert table Grid → Draw table
Or, Table group → Table option → Insert table.....
■ To draw a table using the mouse,
• Position the insertion point where the table is to be
inserted.
• Tool bar→ Table group → Click Down arrow →
Insert table grid
Highlight the rows and columns as needed by
dragging the mouse button.

Fig- 3.44 Insert Table Dialog Box


• In the displayed dialog box, define the Row and
Column and click on the Insert button.
• Or, To select the number of rows and columns drag
and release on the Insert Table in toolbar.
• Even after inserting the table, you can insert rows
and columns in the table as per your requirement.
For this, Table Menu → Insert → Row above / Row
Below / Column Left / Column right.

To input and Edit Text in a Table– In a table, text


can be moved, entered, and edited like other text. Use the
mouse or arrow keys to position the insertion point.
In tables, the borders of the cells automatically act as
margins, which wrap the word as you type the text and it
reaches the left-to-right edge.
■ To move inside the table with a mouse,
by placing the mouse pointer inside the desired cell
and you can move to the cell by click.
Fig-3.43 Table Grid ■ To use the keyboard to move within the table,
• Grid displays the required number of rows and Move to the last column on the left of the table and
columns. If the grid is according to your choice click press shift + tab key combination to move one row
on the mouse button. above.
M1R5 78 YCT
Search on TG: @apna_pdf
3.15(ii) Changing Cell width and Height: ■ To insert row in middle of a table in LibreOffice
A cell is a small but most important part of a table Writer,
which is used to insert data into the table. A cell is • Place the cursor on the row above or below the row
formed from the intersection point of row and column. In you want to insert a new one.
which the height of the row and the width of the column • Table Menu→ Insert→ Row above/Row below
■ To insert columns between tables in LibreOffice
determine the size of the cell. Writer,
Changing Row Height– Writer adjusts the height of • Place the cursor in the column before or after you
each row automatically. want to insert a new column.
■ To change the row height of a table in LibreOffice
• Table Menu→Insert→Column before/column after.
Writer,
■ To delete a row/column in LibreOffice Writer,
• Place the cursor in the cell whose row height you
• Select the column from table which you want to
want to change.
delete.
• Table Menu Size→ Row/Column Height
• Table Menu → Delete → Rows / Columns / Table.
Merging and Splitting Cells– Merge Cells is used
to join multiple cells and Split Cells feature is used to
separate a merged cell.
■ To merge row, column and cell in LibreOffice
Writer.
• Select the row/column/cell you want to merge.
• Table Menu → Merge Cells.
Or, Right Click → Merge Cells.

Splitting a table– You can also split a table into two


or more parts. Splitting the table means dividing the Row
and Column into two or more separate parts.
Fig- 3.45 Setting Row Height in Writer Table ■ To split row, column and cell in LibreOffice Writer,
• Now you can change the row/column height by • Select the row/column/cell you want to split.
clicking + or – in displayed dialog box. • Table Menu → Split Cells
Or, click on the check box option and then click Ok
button.
Changing Column Width–
■ To change the column width of a table in
LibreOffice Writer,
• Place your cursor in the cell whose column height
you want to change.
• Table Menu→ Size→ Column width

Fig – 3.47 Split Cells Dialog Box


• Now specify the cell number under Split cell in
Fig-3.46 Setting column width in Writer table appeared dialog box and click on the Ok button.
• In displayed dialog box, you can change the column 3.16 Borders and Shading:
width by using + or – . A border is a "box" that surrounds a paragraph with
Or, by clicking on the check box option and click Ok. sides. It also includes shading.
3.15(iii) Deletion/Insertion of Row & Formatting the paragraph with a box around it and
Column: pressing the Enter key at the end of the paragraph also
You can insert or delete to row and column as per keeps the new paragraph inside the box. To create a new
your requirement. paragraph outside the border, place the cursor outside the
To insert a row at the end of a table, placing the border and press the Enter key.
insertion point in the last cell and pressing the tab button ■ To apply borders and shading in LibreOffice Writer,
will insert a new row. • Select the object for which you want to define a
Insert row– border.
• Format Menu → Paragraph → Border
M1R5 79 YCT
Search on TG: @apna_pdf
• Click on the Mail Merge Wizard option.
⇒ Select the document to start with and select any
option from create a New Document/Start from
existing document/start from a template/Start from a
recently saved document.
• Select the document type which you want to create
such as letter or image message.
• Enter the address box and click on Next.
• Create Saluation and click on Next.
• Preview and edit document and select recipient
number and click on Next.
• Personalize your mail merge document by editing
the personal document as required and click Next.
• Document is able to save, print and send, select the
Fig- 3.48 Setting Border option according to your choice and click on Finish.
• In the displayed dialog box, you can select line style, ■ To create a form letter,
width color, padding, shadow style as per your
• Tools → Mail Merge Wizard
choice. • Click on Ok.
• Select "Start from a template" and click on browse
3.17 Mail Merge:
Mail merge is a LibreOffice tool that allows us to button which displays new dialog box.
create multiple documents from a single document using
data sources. Mail merge tool is used to create a set of
documents. LibreOffice Writer provides very useful
features to create and print–
⇒ Multiple copies of a document to be sent to different
recipient lists.
⇒ Mailing Labels
⇒ Envelopes
All the above features use a data source. There are
three main steps in the mail merge process–
i. Linking the data source with the source document.
ii. Inserting table fields into the document.
iii. Create merge document.
The Mail Merge Wizard is started to create a letter
or send an e-mail message to multiple recipients. To
open Mail Merge Wizard:–
Figure-3.50 Browsing Templates
• Tools menu → Mail Merge Wizard
● After selecting the address and letter, click on OK to
close the template dialog box and click on Next in
Wizard.
● Select Letter and click on Next
• Click on "Select a Address List" button and Click on
Next.
• Click on Next and click on Finally Finish to create
the mail merge.
3.18 Table of Contents:
The Table of Contents feature available in
LibreOffice Writer allows users to automatically
generate a table of contents from the headings in their
document. Table of Contents is an index that provides
Fig- 3.49 Mail Merge in LibreOffice Writer easy access to the user anywhere in the document.
⇒ Follow the steps given below to start and send mail 3.18(i) Creating a Table of Contents:
merge– It is an essential index which is needed for every
• Create a data source. user to deal with long documents, books, drafts etc.
• Create a document template and type the text you Follow these steps to insert table of contents–
want to send. i. Open the document where you want to insert the
■ To attach a database in a document, table of contents.
Exchange Database→ Browse→ Select your ii. Insert → Table of Contents and Index → Table of
Database file
contents, index or Bibliography
• Add fields to documents.

M1R5 80 YCT
Search on TG: @apna_pdf
3.19 Adding Comments:
Comments are a way of making notes on a section of
a document. It helps in getting the information about the
document correctly. Follow these steps to add a comment
to a document–
• Place the cursor at the place in the document where
you want to insert the comment.
• Insert Menu → Comment
Or, press the combination of Ctrl + Alt + N
simultaneously.
• The new comment block will appear on the right
Fig-3.51 Table of Contents Index and Bibliography side of the document.
Dialog Box
iii. You can see the preview of Insert Index or Table of
Contents in the box that appears.
iv. Press the OK button to insert the Table of Contents.
Now the table of contents is automatically created
and appears with a gray background color around
the text.
3.18(ii) Editing a table of Content: Figure-3.53 Comment block
After creating the table of contents, users can also • Insert your comment in the block.
make changes in it as per their requirement. To edit the • Comment can also be removed by clicking on the
Table of Contents (Toc), follow these steps– drop down arrow.
• Right click anywhere inside the Toc. 3.20 Tracking Changes:
• Select the "Edit Table of Contents" command from
the context menu. In-built review mechanism in LibreOffice is helpful
• You can change the title of the table of contents when you're working with a document that needs to be
through the "Index or Table of Contents" tab. reviewed by multiple people. It provides all the basic
3.18(iii) Updating and Deleting the table of tracking, comments needed for an effective review. This
Contents: gives you the ability to distribute and enable track
Once the new heading is added, follow the steps changes in a document.
given below to update the table of contents– Following are the steps for track change–
• Right click on the top of the table of contents and • To initiate a track change in any document, select
Click on Update index. the Track Change option from the Edit Menu.
Or, press the key combination Ctrl + Shift + C.
Your document enters review mode.
• Whatever changes the user will make now in his
document and all changes are displayed highlight.
• The 'Manage Changes' dialog box is displayed.
Hovering over a marked change with the mouse
pointer shows a reference to the change type, author,
date and change time.
• Select Change in the List tab.
• You can insert comments on each change by placing
the cursor in the change area, for this,
Edit→Track Changes→Comment
• To stop recording changes, go to Edit Menu →
Track Changes → Record. The check mark is
removed and the document can be saved.
3.21 Macro:
Figure-3.52 Context Menu Using macro we can also record text or any task.
• Toc → Update This is very useful when there is a need to perform the
• The complete table of contents will be updated with same task over and over again. A macro is a sequence of
the title of the entire document. commands or keystrokes that can be used to perform a
• If you want to edit the styles of the Table of repeated task easily.
Contents, right click and select 'Edit Index' option To create a library to contain the macro Follow the
from context menu. steps below–
• Click on "Delete Index" to delete the Table of • Tools Menu→ Macros→ Organize Macros→ Libre
Contents. office Basic
M1R5 81 YCT
Search on TG: @apna_pdf
Ctrl + Right Arrow For move next word
Ctrl + Shift + Right Word by word to the right of the
Arrow selection
Arrow Up Move cursor up one line
Shift + Arrow Up Lines in the upward direction
Ctrl + Arrow Up Cursor to beginning of previous
paragraph to make selection
Ctrl + Shift + Arrow Select to start a paragraph
Up
Arrow Down Move the cursor down one line
Home Go to the start of the line
Home + Shift Select start of line
End Go to the end of the line
End + Shift At the end of the line while
selecting
Ctrl + Home Go to beginning of document
Figure-3.54 Creating a Macro Ctrl + Home + Shift Go to beginning of document by
selecting
• Click on Organizer to open the Basic Micro Ctrl + End Go to end of document
Organizer dialog box. Ctrl + + Calculation Options
• Select the Library tab. Ctrl + Alt + E Extension Manager
• Set the location to My Macro & Dialogs, which is Ctrl + F2 Insert field
the default location. Ctrl + F3 Auto text
Ctrl + F7 Thesaurus
• Click New to open the New Library dialog box. Ctrl + W Close the writer
• Enter a library name, for example, My Library, and Ctrl + Shift + R For Ruler (on / off)
then click Ok. Ctrl + 1, Ctrl + 2.... Heading style
• Select the Modules tab. Shift + Enter Line break
The user can expand the module list as per their Ctrl + Enter Page break
choice.
Ctrl + Left Arrow Moves the cursor to the beginning
3.22 Key Board Shortcuts: of the word.
Shortcut keys for LibreOffice Writer– Ctrl + Backsace Delete the text at the beginning of
Shor cut keys Function the word.
Ctrl + A Select all
Ctrl + N To create a new document Shift + Enter Line break
Ctrl + O To open the document Ctrl + Enter Page break
Ctrl + Shift + O Print preview Ctrl + Left Arrow Moves the cursor to the beginning
Ctrl + S To save the current document of the word.
Ctrl + Shift + S To copy or save as on other Ctrl + Backspace Delete the text at the beginning of
location the word.
Ctrl + P To print the document Ctrl + Shift + C Track change record
Ctrl + Q To exit the LibreOffice Ctrl + Shift + J Full screen
application (closing LibreOffice) Ctrl + Alt + C Comment
Ctrl + X To cut the selected item Ctrl + Shift + A Left to Right
Ctrl + V For paste to copied content Ctrl + Shift + D Right to Left
Ctrl + K Hyperlink Ctrl + F5 Side bar (show/hide)
Ctrl + Shift + V For Paste Special dialog box Shift + F11 Create style
Ctrl + Z For undo last action Ctrl + F11 Check style
Ctrl + Y For last action redo Shift + F12 Insert bullets
Ctrl + Shift + Y For action repeat
Ctrl + F To search Ctrl + F12 Insert table
Ctrl + H For search and replace F1 Libreoffice help
Ctrl + G Go to page F2 Formula bar
Ctrl + Shift + P For superscript F3 Complete auto text
Ctrl + Shift + B For subscript F4 Open data source view
Ctrl + L Left align F5 Navigator
Ctrl + R Right align F7 Spell check
Ctrl + J Justify F11 To display style
Ctrl + I Italicize selected text F12 Numbering on
Ctrl + B Bold the selected text Ctrl + Shift + F8 Ùee Block Selection Mode
Ctrl + U Underline selected text
Ctrl + D Double underline selected text Alt + Shift + F8
Ctrl + Shift + F For the last searched term Ctrl + Shift + F4 Data Source (Bibliography)
Ctrl + Shift + J For fullscreen mode and normal Ctrl + ] To increase text size
mode Ctrl + [ To decrease text size
Alt + Enter To enter a new paragraph directly
before a section or table. Shift + F3 Style case
Arrow Left To move the cursor to the left Shift + F7 Auto Spellcheck (Select Word)
Shift + Left Arrow Move the cursor to the left with Ctrl + M Clear formatting
the selection Alt + F12 Options

M1R5 82 YCT
Search on TG: @apna_pdf
Practice Questions with Explanatory Solutions
1. To copy character formatting, Ans. (d) LibreOffice writer export files in HTML,
(a) Ctrl + Shift+C (b) Curl+Shift+V XHTML, XML, Adobe, Portable format (PDF) etc. as
(c) Ctrl + Shift+V (d) Ctrl+Shift+D well as multiple versions of microsoft word file.
Ans. (a) Ctrl + Shift + C Key combination is used to 9. To insert a table in LibreOffice Writer Shortcut
copy character formatting the color, size, font etc. of a key is–
(a) Ctrl + F2 (b) Ctrl + F12
text is called format. In character formatting, only the
(c) Ctrl + Fl (d) Ctrl + F10
formatting of words is set.
Ans. (b). Information is arranged in the form of rows
2. 'Shrink to fit' is an option to fit the full content of and columns in a table. Tables are used to prepare
the page– forms, reports and resumes etc. Tables are made up of
(a) Before print (b) Inside the print horizontal rows and vertical columns. Inserting a table
(c) below print (d) above the print can be done using the Ctrl + F12 shortcut key in
Ans. (a) Before printing a document, Shrink to fit LibreOffice Writer.
option is used to completely contain the contents of 10. For double underline in LibreOffice Writer
the page. Shortcut key is–
3. The key used to subscript text in LibreOffice (a) Ctrl + Shift + D (b) Ctrl + D
Writer is– (c) Ctrl + U (d) Ctrl + Shift + U
(a) Ctrl + P (b) Ctrl + Shift + B Ans. (b) While working in libreOffice writer, if you
(c) Ctrl + O (d) Ctrl + M want to highlight a text through double underline, Ctrl
Ans. (b) The combination of Ctrl + Shift + B shortcut + D shortcut is used.
key is used to subscript the text in LibreOffice Writer. 11. Shortcut to Exit LibreOffice Writer is it–
Subscripts appear at or below the baseline. In this, all (a) Ctrl + Q (b) Ctrl + W
the remaining characters appear relatively large. (c) Ctrl + T (d) None of these
4. Numerical list can be prepared in ......... – Ans. (a) by using Ctrl + Q shortcut key LibreOffice
(a) Arabic numerals Writer can be closed.
(b) Roman number
(c) Alphabetical order 12. The file extension for the template in LibreOffice
(d) all of the above Writer is–
(a) ⋅ott (b) ⋅ods
Ans. (d). Arabic numerals, Roman numerals, small or
(c) ⋅ppt (d) ⋅doc
capital alphabet order can be used to make a list in
Writer document. Ans. (a) A template is a pre-made format of a
document in which the necessary rules for the format
5. Print dialog box opens– or preparation of a document are given. Selecting a
(a) Ctrl + P (b) Ctrl + V
template applies all those rules to that document. For
(c) Ctrl + A (d) Ctrl + I
example, font, color, background, style, table, text box
Ans. (a) A document is printed to be presented as a etc. are already set in the template. User only needs to
hard copy. The shortcut key combination Ctrl+P opens insert their own data are. The template file extension
the Print dialog box. in LibreOffice Writer is ⋅ott.
6. The minimum zoom percentage in a LibreOffice 13. Elements can be added to a Writer
writer is– document.........–
(a) 40% (b) 30% (a) Image (b) Chart
(c) 20% (d) 10% (c) Special character (d) All of the above
Ans. (c). The minimum zoom in a LibreOffice writer Ans. (d) All the elements such as image, shape,
is 20% and the maximum zoom percentage is 600%. object, chart, symbol, special character, table, header
The zoom slider is on the right side of the title bar. It and footer, page number, column and word art etc. can
is used to increase or decrease the zoom size of the be added in LibreOffice Writer document.
page.
14. Which option is used to save a file for online use–
7. LibreOffice works on …………… operating (a) Save (b) save as
system. (c) save remote (d) Save as PDF
(a) Windows (b) Apple Ans. (c) There is a save remote option in the file menu
(c) Linux (d) All of the above of the libreOffice writer. Saving a document created in
Ans. (d) LibreOffice works on all types of GUI based LibreOffice as an online file on a server such as
operating systems such as Microsoft Windows, Linux, Google Drive, One Drive etc. is Save Remote and
Apple, Mac OS etc. opening it is called Open Remote.
8. In which version, LibreOffice Writer can export 15. In which menu is the digital signature option
file?. available?
(a) HTML (b) XML (a) File (b) Edit
(c) PDF (d) All of the above (c) View (d) Format

M1R5 83 YCT
Search on TG: @apna_pdf
Ans. (a) Digital signature option is available in the 23. The key combination is used to select a line from
File menu of LibreOffice Writer. Electronically the beginning in a LibreOffice writer–
signed, document is called digital signature. This icon (a) Home + Shift (b) Ctrl+ Home
is displayed if the document is digitally signed, (c) Alt + Home (d) Shift + C
otherwise it is blank. Double click on this icon to view Ans. (c) While working on the document in
the certificate. LibreOffice Writer, if you want to select the text from
16. Which combination is used to cut text from a the beginning of the line, the Home + Shift shortcut
document– key is used for this.
(a) Ctrl + V (b) Ctrl + C 24. To break the line in LibreOffice Writer, the
(c) Ctrl + A (d) Ctrl+ X shortcut key is used–
Ans. (d) 'Cut' option is used to move any text from (a) Ctrl + M (b) Ctrl+P
one place to another in the document. For this Ctrl + X (c) Shift + Enter (d) Ctrl + O
shortcut key is used. Ans. (c) You can go to the next line without creating a
17. Which of the following file extension is not new paragraph by using the line break option. The
associated with Open Office Writer? Shift + Enter key combination is used to break a line
(a) ⋅ods (b) ⋅odt in LibreOffice Writer
(c) ⋅rtf (d) ⋅doc 25. The shortcut key used to left align the text in
Ans. (c) ⋅txt, doc and sxw file extensions are LibreOffice Writer is–
associated with Open Office Writer .doc is related to (a) Ctrl+ M (b) Ctrl+P
MS Word. A file extension is an identifier placed at (c) Ctrl+L (d) Ctrl+O
the end of a computer file name. File extensions are Ans. (c) On which side and how much space should
used by the operating system to determine in which be left before typing text in a document is called
app the file will display best when opened. alignment. When we start typing text leaving space on
18. What is the A series standard paper size the left side, it is called left alignment. For this, Ctrl +
supported by most printers? L shortcut key is used.
(a) Al (b) A2 26. The minimum font size in LibreOffice Writer is–
(c) A3 (d) A4 (a) 6 (b) 3
Ans. (d) A4, A4, A5, Letter, Legal, Custom etc. paper (c) 1 (d) 0
sizes are available in word processing. A4 paper size is Ans. (a) Computer font is also called type case. This
supported by most printers. is the way of writing different types of words in the
19. The key combination to insert page break in computer. The minimum font size in LibreOffice
LibreOffice Writer is– Writer is 6.
(a) Shift + A (b) Tab 27. Exiting the Application in LibreOffice Writer
(c) Ctrl + Enter (d) Ctrl+C which shortcut key is used–
Ans. (c) Using the page break option, you can go to (a) Ctrl + O (b) Ctrl+T
the next page even before reaching the end of the (c) Ctrl + F1 (d) Ctrl+ Q
page. For this, the combination of Ctrl + Enter Ans. (d) When the user has finished working on an
shortcut is used in LibreOffice Writer. application, the key combination Ctrl + Q is used to
20. In a LibreOffice Writer document usually what is exit that application.
Margin? 28. What is the shortcut key for redo in Writer?
(a) 0.5 (b) 0 (a) Ctrl + Z (b) Ctrl+Y
(c) 1.5 (d) 1 (c) Ctrl+R (d) Ctrl + Shift + R
Ans. (d) The untyped or empty space around the Ans. (b) By using redo command user can get back
document page is called margin. LibreOffice Writer their deleted text. The combination of Ctrl + Y is used
documents usually have margins of 1. for this in Writer.
21. Under which menu in LibreOffice Writer mail or 29. How many menus are there in LibreOffice
letter wizard found? Writer?
(a) format (b) file (a) 11 (b) 10
(c) tools (d) insert (c) 7 (d) 8
Ans. (c) Wizard is such a facility which provides step- Ans. (a) Where the functions are found in LibreOffice
by-step guidance to do any work, by which any work Writer are categorized by the menu bar. LibreOffice
Writer has 11 menus. File, Edit, View, Insert, Format
can be done easily. LibreOffice Writer's Under the
Styles, Table, Form, Tools, Window and Help.
Tools menu provides Mail or Letter Wizard option.
30. Which shortcut key is used to add bullet list in
22. Which function is used for spell check is? LibreOffice Writer?
(a) F7 (b) Ctrl+C (a) Shift + F12 (b) F12
(c) Shift + C (d) Ctrl + F7 (c) Ctrl + F12 (d) none of these
Ans. (a) The spelling and grammar option is an Ans. (a) Bullet option is used to arrange any subject
important tool for users with little knowledge of matter in a sequence. Bullet list can be added in
English. Spelling check is done using the shortcut key LibreOffice Writer by using Shift + F12 (key)
Ctrl + F7. combination.

M1R5 84 YCT
Search on TG: @apna_pdf

4 SPREAD
SPREAD SHEET
SHEET

4.1 Introduction: Function– Functions are predefined formulas with


the help of which you can perform complex to complex
Calc is an office spreadsheet program that allows to
calculations. For this, values are inserted in a certain
users to store and manipulate data. order so that the correct result can be obtained.
Every spreadsheet is a set of cells that are organized Formula Bar– The formula bar displays the
into rows and columns. Each value becomes in a cell and constant value or formula used in the active cell. The
different cells depend on each other. The relation value of the cell can also be edited through the formula
between cells is called a formula. After defining the cells bar.
and formulas, you can enter the data. It helps in linking Name Box– There is a name box on the left side of
the cells together. the formula bar which identifies the selected cell etc.
You can also present the data in worksheet in the 4.1(ii) Opening of Spreadsheet:
Open to LibreOffice Calc,
form of different types of graphs, such as– pie chart, line
• Start Menu → All Programme → LibreOffice →
chart, bar chart etc. LibreOffice Calc
4.1(i) Elements of Spreadsheet: Or click on the LibreOffice icon.
Following are some essential spreadsheet terms for • File→ New→ Spreadsheet
working in LibreOffice Calc:
Workbook– A workbook is a collection of several
worksheets. On opening a workbook, Calc opens with a
single worksheet and can add up to 10,000 worksheets.
Worksheet– Worksheet is a sheet made up of rows
and columns, which we use to create financial
documents.
Chart sheet– It helps to create charts and graphs in
the workbook to present any data in the form of charts or
tables. That is called a chart sheet.
Row– This is a horizontal block of cells that runs
from left to right across the width of the worksheet. Row
is represented by numbers which are numbered from top
to bottom. A Calc worksheet can have a maximum of
1048576 rows but in Calc 3.2 and earlier it was 65536.
Column– This is a vertical block of cells that runs
from top to bottom. Column is displayed alphabetically
from left to right. Display the first column as A, the Fig.- 4.1 Starting Calc in LibreOffice
second as B and so on till Z. After this, columns are 4.1(iii) LibreOffice Calc Interface:
named with AA, AB AZ is up to AMJ. There are total
1024 columns are available in Calc which are named
from A to AMJ.
Cells– The intersect block of row and column in a
worksheet is called a cell. The address of a cell is
presented by combining the column alphabet and row
number, such as the address of the first cell of the
worksheet is A1, it has A column and row number 1.
Cell Range– More than one contiguous cell is called
a cell range. A cell range identifies by its first and last
cells that are separated by a colon (:) symbol.
Formula– Formulas in Calc always begin with an
equal (=) sign. The values entered into cells are a
sequence of operators and functions that together
produce the new value. Formula in Calc can be used on
millions of data simultaneously. Fig.- 4.2 LibreOffice Calc Window

M1R5 85 YCT
Search on TG: @apna_pdf
Title Bar– The title bar is located at the top of the ⇒ The facility of clear viewing is available for any part
spreadsheet. Where the name of the spreadsheet is of the entire sheet. Calculations can be done easily
displayed when a user creates a spreadsheet from a with the help of formulas in worksheets.
template or blank document, the name of the spreadsheet Importance of electronic spreadsheet–
is displayed as Untitled. Spreadsheet is used to calculate tax, number and formula
Menu Bar– The commands in the available tabs are etc. This software is essential for many businesses that
arranged in logical groups in menu bar. have to keep track of income-expenditure, plan budget,
• File– It stores the commands applicable to the entire chart data. Data can be easily saved and edited in an
document. Such as- Open, Save, Wizards, Export as electronic spreadsheet. You can use this software by
PDF, Print, Digital Signatures etc. installing it on your computer. Many websites have the
option of using an online spreadsheet.
• Edit– Commands are available to edit the document,
such as Undo, Copy, Redo Cut, Paste, Paste Special, 4.2 Creation of Spreadsheets:
Find, Find & Replace etc. Opening LibreOffice Calc displays a new
spreadsheet document file with a grid made up of
• View– Commands are available for editing the Calc columns and rows.
user interface, such as Normal, Page Break,
New workbooks can be created based on pre-
Toolbars, Formula Bar, Status Bar, Split Window,
existing or template workbooks.
Show Formula, Freeze Cells, Side Bar, Styles
■ To create a new workbook in LibreOffice Calc,
Gallery, Navigator, Zoom Full Screen etc.
• Open the LibreOffice.
• Insert– It Contains commands related to the
insertion of other elements in a spreadsheet. Such • File Menu → New → Spreadsheet
as- Image, Chart, Pivot Table, Media, Object, Shape, Or, you can open a new Calc spreadsheet in a new
Function, Text Box, Comment, Date, Time etc. window by pressing the combination of Ctrl + N.
• Format– It Contains commands related to 4.3 Concept of Cell Address [Row and Column]
modifying the layout of a spreadsheet. Such as- and Selecting a Cell:
Text, Spacing, Align Cells, Rows, Columns, Page, Inserts the value or data in the cell. This cell is made
Anchor etc. up of rows and columns. Cells are made up of horizontal
• Styles– In this, the styles related to the spreadsheet lines which is name as row. From these and the
are available. Such as- Default, Accent 1, Good, intersection of the columns, a cell is formed. To
Bad, Neutral etc. represent the address of a cell, its column alphabet and
then use the row number.
• Sheet– Most commonly used commands for table Such as- B3, C4, etc.
handlings are available in this. Such as- Insert Cells,
Insert Rows, Insert Columns, Delete Rows/Cells /
Columns, Fill Cells, Clear Cells etc.
• Data– In this, commands related to data
manipulation are available in the spreadsheet. Such
as- Sort, Auto Filter, Define Range, Pivot Table,
Calculate, Validity, Form etc.
• Tools– Commands are available for the display
window Such as- New Window, Close Window etc.
• Help– It contains links to the LibreOffice Help
system and various other functions. Such as- Libre
Office Help, License Information, Send Feedback,
Show Tip-of-the-Day etc.
Status bar– The status bar displays information at
the bottom of the LibreOffice Calc window. About
current working command and active worksheet etc.
Features and Significance of electronic
Spreadsheet– Each spreadsheet is a group of many cells, Figure-4.3 Addressing of Cells
which are arranged in rows and columns. Calc is a
spreadsheet program for Office with the help of which In the above picture alphabet B is column name and
users can store and manipulate data. 3 is Row number, B3 is a address of the cell.
Features of electronic spreadsheet– Constant Value– This value is a type of data which
⇒ In this, the data can be easily edited in less time. is typed directly in the cell and can be changed only by
⇒ Printing copies of sheets is very easy and editing them. This value can be text, number, fraction
convenient. etc.

M1R5 86 YCT
Search on TG: @apna_pdf
Formulas– Formulas always begin with an equal
sign (=) which is sequence of values, names, operators or
functions entered into a cell, using which a new value is
obtained, changing the values used in formula it changes
in the worksheet
Calc helps to perform calculations on numerical
data. If you want to extract the sum of some data, then
you can use either a formula or a function.
The formula to find the sum of numbers from cell
address B1 to B8 will be like this,
= B1 + B2 + B3 + B4 + B6 + B7 + B8 Figure-4.5 Selecting cell range
A function is a shortcut to a formula, such as the • On releasing the mouse button, that cell will
function used to calculate numbers from B1 to B8 will be continue to be displayed until another cell is selected
like this, in the worksheet is done.
= Sum (B1:B8) Cell Referencing– Each cell in the worksheet has a
Writing a function is relatively easier than a unique address by which a cell is referred. When the user
formula. references a cell address in a formula, LibreOffice Calc
reads the value of that cell address.
Formulas Using Cell Addresses– When using a Cell referencing can be done in three ways in
formula in a spreadsheet, the address of the cell can be LibreOffice Calc–
used instead of the value, which can be highlighted and
included in the cell. In a formula, cell addresses are used i. Relative cell referencing– When we copy a formula
with numbers, functions and mathematical operators. For from one cell to another, Calc automatically adjusts
example, To multiply the value in A17 by C20, type each cell reference in the formula. In this type of cell
address, first the letter of the column then the
following formula, number of the row is entered. Such as- A1 B5, D6
= A17 * C20 etc.
It provides calculations in a preset order when ii. Absolute cell referencing– In this, when copying a
multiple formulas are used together in Calc. formula from one cell to another, the reference of
Selecting a cell– To input or edit cell content, it is the cell address given in the formula does not
necessary to select the cell first. change.
To make any cell address absolute, one dollar sign is
To select a cell, put before the column letter and Row number of that
• Click on a cell. In the picture given below, cell B3 is cell address, Such as - $A$2, $B$9 etc.
selected. When a cell is selected, a border is created iii. Mixed cell referencing– Any cell address has two
around it. The selected cell remains selected until parts, one column letter and the other Row number.
you click another cell in the worksheet By keeping any one part of the cell address relative
and the other part absolute, the reference of that cell
gets mixed. Such as- $A1 and A$1, $D6 and D$6
etc.
4.4 To Enter Text, Numbers and Data in a
Worksheet:
Follow these steps to insert the data in Calc–
⇒ Select the cell in which you want to enter data.
When selected, that cell becomes active and gets
displayed with a dark colored border.

Figure 4.4 Selecting a cell


• Cells can also be selected using the keyboard.
To select a cell range,
• Click and drag with the mouse until all the cells are
highlighted which you want to select. In the figure
below, the cell range B2:D5 is selected. Fig – 4.6 Entering data in a cell
M1R5 87 YCT
Search on TG: @apna_pdf
⇒ Type data in the active cell. Two buttons 'Enter' and Entering date and time in a worksheet– Calc
'Cancel' are displayed in the formula bar. usually automatically understands the typed date and
⇒ By pressing the Enter button, Tab key or any arrow time.
button, typing can be shown complete during data If the user does the date entry correctly, the entered
entry. date will appear in the formula bar in the format
⇒ If there is any mistake in typing during data entry mm/dd/yy.
you can erase the characters to the left of the cursor ■ To enter current date/time in LibreOffice calc,
with the help of Backspace (←) key. To delete the • To enter the current date,
entire entry typed in a cell, press the Esc key or the Select Cell → Ctrl + ; keys.
Cancel button. • Entering the current time,
⇒ For data entry in Calc, user data can be entered in Select cell → Ctrl + Shift keys.
formula bar or direct cell only. Create text, number, and data series:
Entering Text– While inserting text in Calc, it Creating Text– Type an entry from the keyboard by
includes letters, numbers and symbols. placing the insertion point on the cell in which you want
■ To enter text in a cell, to create text. For example, if the user wants to type
• Select the cell in which the data is to be entered, "India is a democratic country" in cell B5, then the
type your text entry and press the Enter key. If following steps are to be followed–
numbers are to be used as text, put them in " " after ⇒ Move the mouse pointer to the cell address B5 and
the equal sign (=). For example, "56536" is used to click once with the left button of the mouse, as soon
align the numbers to the left. as you click the cell address B5 Turns into a
■ A range of numbers can be formatted as text by rectangle shape.
inserting them in text numeric form in a worksheet. ⇒ Type the text "India is a democratic country" in cell
Entering Numbers– A number is a constant value B5.
in which the available characters are shown in the table ⇒ Now after pressing the Enter key, the workbook will
below is displayed. be displayed as shown in Figure 4.7.
⇒ Phone numbers, addresses etc. can be entered as
Character Function text, which being entered in the cell and no formula
0 to 9 Any combination of these numbers. can apply in the text.
Each cell in Calc has a default width of 10
± When it is written with E then it characters and after holding 9-10 characters, the display
indicates indicates a exponent for of the cell extends to another cell.
example 3E + 3 means 3 × 103 For example (in figure 4.7) entering text in cell
– Indicates a negative number address B5 extends to C5, it does not occupy the space of
another cell C5, but displayed above it. You may notice
( ) Used to represent the ranges.
that no entry is displayed in the formula bar when you
, (comma) There are a thousand markers. left-click in the cell address C5.
/ Fraction Indicator or Date Separator
$ Currency indicator
% Percentage Indicator
. (period) Decimal Indicator
E Exponent indicator
e Exponent indicator
: Time separator
(Single space) Separator in compound fraction
(such as 41/2) and date-time entries
(such as 1/2/94 5.00)
Table 4.1 Special Characters - for Numeric Entries

■ To enter a number,
• Select cell → Type Number → Enter key
When a number is entered as text, it displays the #
sign if the cell is not wide enough to display the
number.
• Integer 236, Decimal Fraction 256.45, Integer
Fraction 21/2 etc. can be entered in a cell. Fig – 4.7 Creating text in a cell

M1R5 88 YCT
Search on TG: @apna_pdf
4.5 Page Setup: ■ To select the page order details, etc., to be used
Under page setup, page margin, orientation, size, when printing a spreadsheet in calc.
etc. settings of the Calc document are done. Page is setup • Format→Page→Sheet tab→Select options→Ok
according to the printer and paper, before printing a
worksheet.
Set margin from Margin tab of page setup and select
headers, footers, print area etc. Available in Margin tab
the options are as follows–
Top: It sets margin between printed data and the top
edge of the page.
Bottom: It sets the margin between the bottom edge
of the page and the printed data on the page.
Left: It sets the margin between the left edge of the
page and the data printed on the page.
Right: It sets the margin between the right edge of
the page and the printed data in the page.

■ To use the page setup option in LibreOffice Calc,


• Format Page....
Now set up the page by selecting the options
according to you in the Page Style : Default dialog box Fig. 4.9: Page Style dialog box with sheet tabs in Calc
can displayed on the screen.
■ To change the page orientation, ■ Using the print range, you can print the selected
• Click on the Page option in the Format menu, then a area. To define a cell range,
Page Style dialog box appears. • Select the cell range.
• In this you can set orientation (portrait or • Format → Print Ranges → Define.
landscape), margin and layout of page format.
■ To format page margins,
• Format → Page

Fig- 4.8 Style dialog box with page tab in Calc Figure 4.10 Print range in Calc
Now you can set page margins by selecting the tab
of the Page Style dialog box. • Page break lines are displayed on the screen.
■ You can define borders, background, header footer • Now you can check the print range by,
etc. in your spreadsheet only through the Page Style Format → Print preview.
dialog box. • LibreOffice will display print ranges in separate
pages.
4.6 Printing a Worksheet:
• You can also remove print ranges using,
To print an open worksheet, select the Print option Format → Print Ranges → Remove / Clear.
from Backstage View or Print Preview from the Quick • You can print the spreadsheet using the Print option
Access Toolbar and click on the Print button. of the File menu.

M1R5 89 YCT
Search on TG: @apna_pdf
4.7 Saving a Workbook: • To open CSV (Comma Separated Values) files,
■ You can save the spreadsheet in the LibreOffice calc select open command from file menu. It is a text file
in the following way– whose extension is CSV.
• Click the Save icon on the Standard toolbar. • Some CSV files also have the extension txt.
Or, use the Ctrl + S shortcut key combination. Closing a workbook window– If the user wants to
Or, File Save / Save to remote server / Save a close a workbook after making some changes to it, Calc
copy/Save all. displays an alert box asking the user to agree that they
• Type a name for the file in File Name. want to save their work or not.
• Select the file format by clicking on the drop down
menu in Save as Type.
• Click on the Save button.

Fig – 4.13 Alert Dialog Box


■ To close a file in a workbook,
• File + Close.
Or, click on the close button on the right side of the
menu bar.
If no changes have been made since the last save, it
closes.
• An alert box is displayed when the user closes the
document without saving the changes made since
the last save. (Figure 4.13) On selecting Save in this
alert box, it allows to save the document which you
Fig- 4.11 Save as dialog box can save by typing a new name.
• Selecting Don't Save closes the file without saving
4.8 Opening a Workbook: changes.
Quitting Calc Program–
■ To open a file already created in LibreOffice Calc,
■ To quit Calc,
• File → Open / Ctrl + O.
Or, click on the Open icon available on the toolbar. • File → Close or, Alt + F4
• Open the spreadsheet by selecting it in the dialog Click (X) on the close button at the top right corner.
box that appears. • Closing all workbooks terminates the Calc
window.
4.9 Manipulation of Cells & Worksheet:
Before manipulating the data in Calc, it should be
entered correctly. For this, the user can enter the data in
many ways.
4.10 Modifying Editing Cell Contents:
You can edit the text or entry of a cell directly in the
cell or in the formula bar.
Editing Cell Entry in the Formula Bar–
■ To edit a cell entry in the formula bar,
• Select the cell whose data is to be selected.
• Bring the insertion point to the text in the formula
bar and click on the text to be edited.
• Edit a cell entry.
■ To directly edit an entry in a cell,
• Press the F2 button or double-click in cell.
• Press the arrows to move the insertion point (I
Figure- 4.12 Open dialog box beam) to the cell which you want to edit.
M1R5 90 YCT
Search on TG: @apna_pdf
• Make desired edits to the cell entry.
• Enter the information by pressing the Enter or Esc
key.
■ Insert, delete or replace cell contents–
• To insert characters, click on the cell in which you
want to insert the content and type the new
characters.
• To delete a character, click on the cell and press
Backspace or select the character and press the
Delete button.
• To replace specific characters, select them and type
the new character.
Copying or Filling Cell Contents Using the Fill
Handle– You can easily perform data entry in less time
by using the Copy or Fill command. You can easily enter
data in other cells. You can also copy the formula and
format to another cell.
■ Using the Fill Handle you can fill the data using the
mouse, for this,
• Fill a data or formula cell or cell range.
• Fill the selected range by dragging the handle.
• Release the mouse button.

Fig-4.15 Selecting font size


■ To change the font,
• By default, Liberation sans is the default font in
every workbook in Calc, but you can change the
font.
• Select the cells in which you want to change the
font.
• Select the font by clicking on the Font drop down
arrow.
• The text will be converted to the selected font.

Fig - 4.14 Using the Fill Handle


4.11 Formatting Cells(Font Alignment, Style):
You can format your worksheet to make it more
attractive and easy to understand.
Changing font and font size–
■ To change font and font size in Calc,
• Select the cell or cell range whose font size you
want to change.
• By clicking on Font and Font Size drop down, select
font size as per your requirement. Figure 4.16 Changing font type

M1R5 91 YCT
Search on TG: @apna_pdf
Cell Styles– Some cell styles are already available
in Calc. You can also design the cell style according to
your choice.
■ To apply cell style in LibreOffice Calc,
• Select the cells to which you want to apply the cell
style.
• You can select the cell style according to you by
clicking on Styles in the menu bar.

Fig - 4.17 Cell Style Options Fig - 4.19 Selecting the content to cut
• It displays the new style by replacing the old cell Or, press Ctrl + X keys together or you can also select
style. the Cut command by right clicking on the cell
Text Alignment– By default in Calc, the entered selection.
text in the cell is bottom left aligned. You can also align • Now click on the cell where you want to move and
your cell content as per your wish. paste those cells.
■ To align text in Calc, • Select Paste from the Ctrl + V keys or Clip Board
• Select the cells whose content you want to align, group. The cell content will be pasted.
Format → Align → Left/Center/Right/Justified.
• For vertical alignment,
Format → Align → Top/Center/Bottom.

Fig-4.18 Text alignment options


4.12 Cut, Copy, Paste & Paste Special: Fig- 4.20 Pasting the cut content in the newly selected
cell
You can also cut or copy the entered cell contents
■ To copy and paste cell contents,
and paste them to another location in your worksheet.
■ To cut and paste cell content, • Select the cells you want to copy.
• Select the cells you want to cut. • Press the Ctrl + C keys simultaneously.
• Edit menu → Cut or, Edit → Copy

M1R5 92 YCT
Search on TG: @apna_pdf
■ To use Paste Special feature in LibreOffice Calc,
• Select the cells.
• Edit → Paste Special

Fig- 4.21 Selecting the content to be copied


• Select the cell where you want to paste the content.
• Press the Ctrl + V keys simultaneously.
or, Edit → Paste
• The cell content gets pasted as shown below.
Fig- 4.24 Paste Special Option in Calc
Now select the option as per your requirement from
the displayed options (Paste Unformatted Text, Paste
Only Text, Paste Only Number, Paste Only Formula,
Paste Special).

4.13 Inserting and Deleting Rows and


Columns:
In Calc worksheet, you can insert or delete any row
or column as needed and you can also insert Row or
delete cells by changing whole Row or column.
Inserting Cells, Rows or Columns– While working
in Calc if want to make space for new data, you can
easily insert cells Rows and columns.
■ To insert a cell,
Fig- 4.22 Pasting the copied content in the newly • Select the range of one or more cells where the new
selected cell cells are to be placed.
Using Paste Special Feature– Using Paste Special • Sheet → Insert Cells.
Feature, you can copy or paste any of the cell's format or or, Press Ctrl + + or, Right click Insert.
value, so that you can paste the attributes of the cells
together and combine them.
The Paste button places the contents of the clipboard
at the cursor position. Paste has several options which
display the description when pointed.

Fig - 4.25 Insert Dialog Box


• To insert the selected cells, choose the direction
from the following options–
Option Function
Shift Cells Moves the selected cells to the right.
Right
Shift Cells Moves the selected cells down.
Down
Entire Row The entire row containing a selected
cell is inserted.
Entire Column The entire column containing a
Figure- 4.23 Paste Special Feature selected cell is inserted.

M1R5 93 YCT
Search on TG: @apna_pdf
• Click on the Ok button. This will replace the Keys Function
selected range with an empty cell and the cells This clears selected content
affected by it will be deleted and arrange according Delete like the Clear command on
to the setting. the Edit menu.
■ To insert Row or column, Backspace Activates and clears the
• Select the same number of columns or rows where contents of the formula bar.
you want to insert new rows or columns. Ctrl + Backspace By repositioning this
• Sheet → Insert Rows/ Columns worksheet displays the active
This will add as many empty rows or columns at that cell.
place and fill the data in all the columns ahead of that It cuts the selected contents
column is shifted to the right. Ctrl + X just like the cut command of
Deleting Cells, Rows, or Columns– You can delete the Edit menu, for pasting.
cells, rows, or columns from a Calc worksheet. It copies the selected contents
■ To delete cells, rows or columns in Calc, Ctrl + C to paste like the copy
• Select the cells, rows or columns you want to delete. command of the Edit menu.
• Sheet → Delete Cells / Rows / Columns. It paste the selected cell
• This displays the Delete dialog box. Ctrl + V content like the Paste
command of the Edit menu.
Ctrl + Z This is a shortcut to the undo
command on the Edit menu.
4.14 Changing Cell Height and Width:
According to the data in a worksheet, the height and
width of the cell have to be changed so that maximum
data can be fitted in the same sheet. If required, hidden
data can also be hidden in the worksheet.
How to adjust column width– On entering the data
in the worksheet, if the width of the column in the cell
does not have enough space to display the data, it
displays the # character, so to display the entire content
for this, the width of the column has to be adjusted.

Fig - 4.26 Delete Dialog Box


• From the options displayed in the above box, select Fig - 4.27 Copying column width by paste option
the direction in which you want to move the rest of ■ To adjust column width in Calc,
the cells. ■ To adjust the column width with the mouse,
• Select the column whose width you want to change.
Option Function • Position the mouse pointer over the column
Shift Cells Left It moves left to the cells which are separator to the right of the column heading. The
right side of the deleted cells. mouse pointer changes to a double-headed
Shift Cells Up Shift Cells Up Moves the cells horizontal arrow.
below the deleted cells up.
Entire Row The entire row containing a selected
cell is deleted.
Entire Column The entire column containing a
selected cell is deleted.
• Click on the Ok button and it arranges the worksheet
as per your setting.
Clearing, Inserting or Deleting Cells in a
Worksheet–When you want to insert or delete cells or
columns from the worksheet after creating it and
reorganizing it, then you can do this easily with the help
of the given shortcut keys. Fig - 4.28 Changing column width with mouse
M1R5 94 YCT
Search on TG: @apna_pdf
• Drag the same arrow until the shadow reaches the ■ To change the row height in Calc,
end of the column which you want to adjust. • Format → Row → Height
Column to the right and left can be dragged in any Define the height of the row in displayed dialog box
direction. and click on OK.

Fig- 4.31 Options Available to Change Height from


Calc
Figure- 4.29 Options available to adjust column width 4.15 Auto fill:
in Calc While entering data in LibreOffice Calc, auto fill
• Format → Columns → width. command is used when there is a large amount of data
How to adjust Row Height– The height can be and there are some repeating patterns in that data. This
adjusted to display, Title, Totals, etc. in worksheet. command saves user time by entering more data in less
time.
■ To visually adjust Row height using the mouse,
• Select the Row you want to adjust its height.
• Hovering the mouse pointer over the line just below
the header whose height you want to adjust changes
to a double-handed vertical edge.

Figure- 4.32 Auto fill


Figure 4.30 Changing row height with mouse ■ To create a series using the Fill tool in Calc,
• Select the cell that contains the content you want to
• Release the mouse button after dragging up or down convert in series.
the height you want set for that row. • Sheet → Fill Cells → Fill Up / Down/ Left/Right

M1R5 95 YCT
Search on TG: @apna_pdf

Fig- 4.35 Filter option


Fig- 4.33 Using the Fill Tool. 4.17 Freezing Pane:
4.16 Sorting & Filtering: We type our data on the Calc worksheet and when
there is a large amount of data, it starts hiding on the
You can organize the worksheet by sorting your Calc sheet. We have to use scroll bar to see the data. The
data. It makes easier to understand your data. Freezing Pane function does not allow the data to be
hidden inside the data table.
■ To sort data in Calc, If the report created by us is large and while
• Select the cells you want to arrange in shorting inserting data in other fields, we can freeze a particular
order. field. When doesn't have hide data.
• Select Freeze First Column.
• Data → Sort Scroll through the worksheet to view other columns
to the right of the frozen column.
• The frozen column appears on the left with a grey
line.
■ To freeze the first cell or column in LibreOffice
Calc,
• View → Freeze Cells → Freeze First Column /
First row.

Fig- 4.34 Sort dialog box in Calc


• Select Sort Criteria in the dialog box displayed on
the screen.
• Click on the OK button.
Filters– Users can filter the data in the worksheet as
per their requirement.
■ To Filter Data in Calc
• In Calc, you can filter data using the Auto Filter or
More Filter option.
• Data → Auto Filter / More Filter.
Figure- 4.36 Freezing Rows and Columns in Calc

M1R5 96 YCT
Search on TG: @apna_pdf
To Unfreeze Panes– • To move a cell, drag the selection to a cell in the
■ To unfreeze a row or column, upper left of the paste area. Calc replaces the data in
• View tab → windows group → Freeze panes → the pasted area.
Unfreeze panes • To copy the cell, hold down the Ctrl key while
dragging the mouse.
You can also use the fill handle to copy a formula to
an adjacent cell. Select that cell, Which contain the
formula, and then drag the fill handle over the range you
want to fill.
4.18(ii) Autosum Feature:
You can quickly sum up data in a row or column by
using the AutoSum feature in Calc. It makes calculations
easy.
■ To autosum in LibreOffice Calc,
• Select the cell in which you want to sum.
• Click on the Autosum button in Function Library.
The Sum function appears in the cell, dotted around
Fig-4.37 Unfreezing the pane
the cell range. The line is displayed that sums by
■ To unfreeze all row and columns of LibreOffice calc.
Calc, • Confirm this action by pressing Enter key, the cell
• View → Unchecked Freeze Rows & Columns. range will be totaled in the selected cell.
4.18 Formulas, Functions and Charts: 4.18(iii) Functions:
To perform many calculations from the data inserted Functions are predefined formulas that perform
in the cells of the worksheet prepared in Calc, many calculations on certain values. The values passed to the
formulas and charts are used to display the data in a function are called augments. Every function has a fixed
graphical form. With the help of function engineering number of values, such as number references, text or
calculations, financial calculations and various studies logical, that can be entered as arguments to the function.
related work can be done. Calc also uses these arguments of the function in the
same way as algebraic equations use variables.
4.18(i) Use of Formulas: There are many types of functions available in Calc.
Formulas in Calc always begin with an equal (=) In which there are Mathematical Function, Logical
sign. In these, thousands of millions of data can be Function, Statistical Function, Date and Time Function,
manipulated simultaneously by using formula. You can Financial Function etc.
use formulas to perform mathematical and logical In LibreOffice Calc also, you can open Function
calculations such as addition, subtraction, multiplication, Wizard by using Ctrl + F2 or Insert to Function–
etc. This can include the following types of data;
• Constant (Numeric & Text)
• Arithmetic, comparison, text operator functions and
parenthesis.
• cell references and names
By combining the above components the user can
calculate any result that they want to display in the
worksheet.
Copying a Formula– Moving a formula from one
cell to another, It does not change the cell reference
within the formula, but if a formula is copied, the relative
cell reference changes and the absolute cell reference
does not change.
■ To move or copy a formula,
• Select the cell that contains the formula to be moved
or copied.
• Point to the border of the selected cell. Fig-4.38 Function Wizard in Calc

M1R5 97 YCT
Search on TG: @apna_pdf
Before starting the wizard, select a cell or cell range Number– That number you want to round.
from the current sheet in which to define the formula. Num–digits– That number to digit which you want
■ SUM– It Sums up all the values in a cell or range of to round the number.
cells. • If NumDigits is greater than '0' then the number is
Syntax: SUM (Number1, Number 2 ...) you can
rounded off to a specified number of decimal places.
enter up to 30 arguments such as Number 1, Number
2 for which you want total sum or total value. • If NumDigits is '0' then the number is rounded off to
■ ROUND– This function rounds a number up to a the nearest integer.
certain number of digits (Figure-4.39) • If NumDigits is less than '0' then the number is
Syntax– ROUND (Number, Num–digits) rounded to the left of the decimal point.

Fig - 4.39 Mathematical functions and their results


Example– ROUND (5.39, 1) = 5.4 (Fig. 4.39) • If Num-digits is greater than '0' then this number
ROUND (-2.672,0)=-3 will be rounded up to the decimal place.
ROUND (59.5, –1) = 60 • If Num-digits is less than '0' then this number will be
■ ROUND DOWN– This function rounds a number rounded up to the left of the decimal point.
down (Figure-4.39) • If Num Digits is '0' then it will be rounded up to the
Syntax– nearest integer.
ROUND DOWN (Number, Num-digits) Example– ROUND UP (5.39. 1) = 5.4 (Fig. 4.39)
Number– the number you want to round. ROUND UP (–2.672,0) = –3
Num–digits–The number, as many digits as you ROUND UP (59.5, -1) = 60
want to round the number.
• If Num-digits is greater than '0' then it rounds the ■ ABS ( )– This function returns the absolute value of
number to the number of decimal places. a number. Absolute value means that number
• If Num-digits is less than '0' then it rounds down without + or – sign.
the number to the left of the decimal point. syntax– ABS ( SUM ) sign
Example– ABS (10) = 10 (Figure-4.39)
• If Num-digits is '0' then it is rounded down to the ABS (-10) - 10
nearest integer. ■ SQRT ( )– This function returns the positive square
Example– ROUND DOWN (5.39 1 ) = 5.3 (Fig. 4.39) root of a number. (Fig. 4.39)
ROUND DOWN (−2.672,0) = –2 Syntax– SQRT (NUM)
ROUND DOWN (59.5, –1 ) = 50 NUM–The number whose square root you want to
■ ROUND UP– This function rounds the number find. When a negative value is passed to the
upwards from '0'. SQRT (NUM) function, the # Num! will display the
Syntax– error value.
ROUND UP (Number, Num-digits) Example– SQRT(64) = 8
Number– The number you want to round. AQRT(64) = #Num!
Num-digits– The number of digits to which the To find the square root of a negative number, SQRT
number is to be rounded up. (ABS (64)) = 8 (Fig. 4.39)
M1R5 98 YCT
Search on TG: @apna_pdf
■ TRUNC ( )– This function removes the fractional IF (logical test, value_if_true, value if false) logical
part of the number and truncates it into integer test; Is an expression or value that after returns 'true'
value. (Picture-4.39) or 'false'. After evaluation as– A10 = 150 A logical
Syntax– TRUNC (num, num digits) is expression.
Num– The number to be truncated.
value_if_true; This is the value to be returned if
Num-digits– The number that determines the
precision for truncation, which is the default value logical test is true such as if cell A10 has the value
of 0. 150 then evaluated result will be true.
Example– TRUNC (7.5 ) = 7 value if_false; It is the value to be returned when
TRUNC (–7.5 ) = –7 the logical test is false. If cell A10 does not contain
TRUNC(7.267) = 7 the value 150 then the expression evaluates to False.
■ IF ( )– This function is used to determine whether Empty cells are not counted while cells with 'value'
the condition given in brackets is true or false. If the are counted while averaging the cells.
condition given in this function is true, then it
■ TRUE ( )–This function does not take any argument
returns the first value and if the condition is false, it
returns the second value. (Fig. 4.40) and returns the logical value 'True'.
Syntax– TRUE ( )
■ FALSE ( ) This function is also similar to TRUE ( ),
does not take any argument but returns the logical
value 'FALSE '.
Syntax– FALSE ( )
■ MAX ( )– This function returns the largest number
from a set of values stored in a cell.
Syntax– MAX (number1, number2.......)
In this there are numbers number 1, number2 up to
30 out of which the largest value is found.
MAX ( ) has numbers as arguments, logical values,
text forms of numbers, can be empty. Only those
texts that cannot be translated, generate errors.
They Returns '0' if argument does not have a value.
For example, if cells A1 : A5 contain numbers 5, 8,
Fig- 4.40 Logical Functions 17, 40 and 1, then MAX (A1 A5 ) = 40. (Fig - 4.41)
Syntax– MAX (A1: A5, 100) = 100

Figure- 4.41 Statistical Function

M1R5 99 YCT
Search on TG: @apna_pdf
■ MIN ( )– This function returns the smallest number If number, date or text forms of numbers are taken
from a set of values. as arguments, they are counted only. Text and error
Syntax– MIN (number1 number2.......) is ignored in the argument it is a reference or array
in which There are number 1, number2. up to 30 except for then its empty cell, logical value, It count
numbers out of which you find the smallest value. only number except text value.
MIN ( ) can take numbers, empty cells, logical Example– If column J2 to 37 has the following values.
values, etc. as arguments. Value 0 is returned if there (Fig-4.41)
is no number in the Augment. For example, if cells J1 = Sales
A1:A5 contain the numbers 5.8, 17, 40 and 1, then J2 = 2/6/2015
MIN (A1 A5 ) = 1. (Fig. 4.41) J3 = 20
MIN (A1 A50 ) 0 J4 = 73,42
■ AVERAGE ( )– This function returns the average of J5 = FALSE
the function passed as argument. (Fig. 4.41) J6 = DIV/O!
Syntax– AVERAGE (number1, number2........) J17 = Blank
There can be numbers from 1 to 30 whose average COUNT (J2 : J8) = 2 (Fig-4.41)
you want to calculate. As a document, this function COUNT (J5 : J8 ) = 0
can contain numbers, names and references with COUNT (J2: J8:2) = 3
numbers.
In the Argument of this function, if there is an array ■ TODAY ( )– This function returns the current date
or reference that contains empty cells, text or logical of the system. (Fig-4.42)
values, they are not included in the function, but Syntax– TODAY ( )
cells with the value '0' are included in the function. ■ NOW ( )– This function returns the current date and
Example– If A1 A5 is named as Scores and it time of the system. (Fig. 4.41)
contains numbers 5, 8, 17, 40 and 1 then, Syntax– NOW( )
AVERAGE (A1 : A5 ) = 14.2 (Fig. 4.41) ■ DAY ( )– This function returns the day of the date
AVERAGE (Scores) = 14.2 (Scores-name of range) passed as an argument. This is as an integer between
AVERAGE (A1: A5, 9 ) = 13.33333 1 and 31 returns happens. (Fig. 4.42)
AVERAGE (A1 : A5 ) = SUM (A1: A5) COUNT Syntax– DAY (Serial–Number)
(A1: A5 ) = 14.2
■ COUNT ( )– This function counts the number of In this the Serial Number is the date of the day you
cells in a number field in a range or array of want to find. Enter this date inside Quotation Marks
numbers that contain numbers. (Fig. 4.41) is done.
Syntax– COUNT (Value 1. Value2........) Example– DAY ("27-July") = 27
It can have 30 arguments such as Value 1, Value etc. DAY ("10-Apr-1998" ) = 10
which can contain different types of data but it only AY ("11/17/2010") = 17
counts cells with numbers. DAY ("2013/11/11) = 11

Fig-4.42 Date and Time Function


M1R5 100 YCT
Search on TG: @apna_pdf
■ MONTH ( )–This function returns the month of the ■ RIGHT ( )– This function is also like LEFT ( ) but
date given as argument. Which is in the form of an it is based on the number of characters specified in
integer from 1(January) to 12(December).(Fig. 4.42) the element. Returns characters from the end of the
Syntax– MONTH (Serial Number) Serial Number is text string.
the date of the month whose MONTH you want to
get. Syntax–
Example– MONTH ("12 NOV") = 11 (Fig-4.42) RIGHT (text, num-chars)
MONTH ("1217/03/05") = 03 text– text string and,
■ YEAR( )– This function returns the year num-chars– the number of characters to extract
corresponding to the date given as an argument. Example– RIGHT ("INDIA", 3) = "DIA" (Fig. 4.43)
(Fig. 4.42) RIGHT ("OBJECT") = "T"
Syntax– YEAR (Serial–Number) Weekday– This function is used to display the day
In this Serial Number is the date of the year you of the week of the given data.
want to find. Syntax– Week day ("Date")
Example– YEAR ("11/8/2017") = 2017
YEAR ("2015/04/06") = 2015 Days 360– This function is used to display the
■ CONCATENATE ( )– This function concatenates number of days between two days.
two or more text strings into a single text string. Syntax– Days 360 ("Date", "Date")
(Fig. 4.43) Proper: This function is used to convert the first
Syntax– letter of a text string to upper case, such as title to upper
CONCATENATE (text 1, text 2.......). case and the rest of the letters to lower case.
There can be up to 30 text items such as text 1 text 2 Syntax– Proper ("Text")
.....etc which are combined into a single text. Rept: This function is used to repeat a text up to a
Amphersand operator (&) is also used to specified number of times.
concatenate strings.
Example– CONCATENATE ("TOTAL", "VALUE") Syntax– REPT ("Text, Specified Number")
= TOTAL VALUE (see figure 4.45) Counta: Counts the number of cells in a range that
CONCATENATE ("TOTAL","&","&","VALUE") are not empty.
■ LEFT ( )– This function returns characters from the Product: It displays the multiplication of numbers
left of the text string at half the number of characters in the given cell range.
specified in the arguments. Syntax-Product (Cell Range)
Syntax– 4.19 Difference between function and formula
LEFT (text, num-chars)
in Calc:
In Calc, a formula is an expression that calculates
the value of a cell.
For example, = B2 + B3 + B4 + B5 is a formula that
adds the values in cells B2 through Bs.
A function is a predefined formula that is already
available in Calc with the help of which you can do the
most difficult calculations very easily. The values passed
to the function are called arguments.
For example, instead of adding each value in the
above formula, you can use the SUM function to add a
range of cells.
= SUM(B2 : B5)
4.20 Database Function:
The three arguments to a database function are the
database, the database field, and the search criteria.
Database– It is the cell range defining the database.
Database Field– It specifies the column where the
function operates after the first parameter's Search
Criteria is applied and data rows are selected. It is not
related to the search criteria itself. For the database field
Figure- 4.43 Text Function and Financial Function parameter, a header cell or number reference can be
text - text string and, entered to specify the column within the database area,
num-chars– the number of characters to extract starting with 1.
(this is the default) Search Criteria– This is the cell range that contains
Example– LEFT ("INDIA", 3) = IND (see figure 4.43) the search criteria. If you write multiple criteria in a row,
If any cell B5 contains SUBJECT, then they are joined by AND. If Criteria is written in different
LEFT (B5) = "0" rows then they are connected by OR.

M1R5 101 YCT


Search on TG: @apna_pdf
4.20(i) DAVERAGE: Example– to find the shortest distance to school for
Returns the average of the values of all cells (fields) children in each class;
across all rows (database records) that match the = DMIN (A1 : E10 "Distance to School": A13 : 14 )
specified search criteria. The syntax for DAVERAGE is A B C D E
as follows: 1 Name Grade Age Distance Weight
DAVERAGE (Database: Database field: Search to School
Criteria) 2 Tom 3 7 300 40
For example, to get the average weight of all 3 Sam 4 10 1200 42
children of the same age, 4 James 3 10 1000 51
= DAVERAGE (A1:E10: "Weight": A13:E14) In
5 Joy 5 11 650 48
Row 14, enter 7, 8, 9 below Age. The average of the ages
of all children of the same age will be displayed. 6 Mateo 2 8 150 33
4.20(ii) DSUM: 7 Roman 2 7 1000 42
Returns the sum of all cell values across all rows 8 Soren 1 7 1200 36
(records) in a database field that match the specified 9 Elio 3 9 200 44
search criteria. The syntax for DSUM is as follows. 10 Laszlo 2 8 300 42
DSUM (Database : Database : Field : Search : Criteria) 11
Example– To get the combined distance to school 12 Name Grade Age Distance
of all children for Tom's birthday party, to School
=DSUM (A1: E10: "Distance to School": A13:14) 13 >600 weight
4.20(iii) DCOUNT: 14 2
DCOUNT counts the number of rows (records) in 15 DCOUNT 5
the database that match the specified search criteria and
16
have a numeric value in a database field column.
The syntax for DCOUNT is as follows– 17
= DCOUNT (Database; [Database Field]; Search Figure-4.44 DMIN Function
Criteria) 4.21 Pivot Table Chart:
It omits the Database field element. DCOUNT Pivot tables are a very powerful tool in LibreOffice
counts all records that match the criteria. Calc, through which large data can be easily summarized
Example– To find how many children have to travel and analyzed in the spreadsheet. Through pivot tables,
more than 600m to go to school, we can represent large data in the format of small
= DCOUNT (A1: E10: D1: A13; E14) reports, so that the data becomes very easy to explain and
4.20(iv) DCOUNTA: analyze.
DCOUNTA counts the number of days in a database Apart from this, we can add or remove fields as per
that match the specified search criteria and contains our requirement in pivot table and can perform basic
alphanumeric values and numeric. functions without writing formula because all these
The syntax for DCOUNTA is as follows– functions are already defined in pivot table.
DCOUNTA (Database: [Database field]; Search Criteria) Charts are used for graphical and pictorial
Example– to search the name of children whose presentation of data in a worksheet in LibreOffice Calc.
name starts with letter E or after; Data can be analyzed with the help of these charts. By
DCOUNTA (A1 : E10 : "Name" ; A13 : E14) customizing charts, you can insert text, arrows, titles and
4.20(v) DMAX: legends etc.
DMAX returns the maximum value of a cell (field)
in a database that matches the specified search criteria.
The syntax for DMAX is as follows–
= DMAX (Database: Database Field: Search Criteria)
Example– to find the weight of the heaviest child in
each grade,
= DMAX (A1: E10: "Weight"; A13 E14)
4.20(vi) DMIN:
DMIN Returns the minimum value of a cell (field)
in a database that matches the specified criteria. for
DMIN The syntax is as follows– Figure- 4.45 Embedded chart with data elements in the
=DMIN (Database: Database Field: Search Criteria) same worksheet

M1R5 102 YCT


Search on TG: @apna_pdf
Creating a Chart– • Select by clicking on the title and then click inside
■ To create a chart in a Calc spreadsheet, the text box.
• Select the data items to be shown in the chart. • Insertion point is displayed on clicking Characters
• Click on Chart in Insert tab, select the chart type in
are displayed as erase point Use Backspace or
the Chart Wizard dialog box that appears. (Fig. 4.45)
• The chart will be displayed as shown in Figure 4.45 Deleted to erase characters You can move around in
the text with the help of arrow keys. Enter new text
to do this, press the letter keys on the keyboard.
Bar Charts– Bar charts display comparisons
between different items. A bar chart is a graph that
Arranges the values on the horizontal axis and the
categories on the vertical axis. by doing this we can
display the data in the spreadsheet in graphical form.
■ To create a bar chart,
• Select the cells from which you want to create a
Fig- 4.46 Creating Chart chart, along with the column titles and row labels.
Changing the Type of Chart– Calc provides ten • Insert tab → Charts group → Select chart
types of chart types. You can choose any of these • A bar chart is displayed in a spreadsheet with
subtypes. You can record formatting changes to charts horizontal bars.
and other objects by using the macro recorder in Calc.
■ To change any chart type in LibreOffice Calc,
• First of all select the chart by double clicking on it.
The chart is displayed with a border.
• Format → Chart Type
• Select the Chart Type to be replaced.
• Click OK.
Inserting title in the chart– Let's insert it as
follows;
• Activate the chart to which you want to add the title.
• Insert menu → Titles. Figure– 4.48 Bar Chart
Select the option as per your requirement by clicking Pie Chart– Pie chart displays the size of the items
on the title. (As per Fig. 4.46)
of a data series. A pie chart represents 100% and each
pie slice represents the data in the entire chart.
Data arranged in a single column or cell of a
worksheet can be displayed as a pie chart.
■ To make pie chart,
• Select the data for the pie chart.

Fig- 4.49 Selected data for making pie chart


Figure-4.47 Insert Chart Title • Insert tab → Charts → Pie chart
• Type text in the Chart Title text box. • Select 2D Pie from the menu that appears when you
Editing the title– Edit it in the following two ways; click on the pie chart.

M1R5 103 YCT


Search on TG: @apna_pdf
• The line chart will be displayed as shown below

Fig- 4.50 Selecting the Pie Chart Type


• On clicking on 2D pie, a pie chart like figure 4.50
will be displayed.
Figure- 4.54 Line chart

Write shortcut keys for office calc–

Shortcut keys Function


→ It moves cursor to next right cell.
← It moves cursor to next Left cell.
↑ It moves cursor to just above cell.
↓ It move cursor to just below cell.
Home Moves the cursor to the first cell
of the current row.
Figure- 4.51 Pie chart Ctrl + Home Moves the cursor to the first cell
(A1) in the sheet.
Line Chart– A line chart is a graph that displays a
series of data points connected by straight lines. It is a End Moves the cursor to the last cell
graphical object that is used to represent data in a of the current row in the column
spreadsheet. containing the data.
You can use a line chart to display a trend over time. Ctrl + End Moves the cursor to the last cell
■ To create a line chart, of the current sheet.
• Select the data.
Ctrl + + insert cell
Ctrl + – delete cell
Ctrl + ; insert date
Shift + Ctrl + ; insert time
Ctrl + 2 2 line spacing
Ctrl + 5 1.5 line spacing
Ctrl + Shift + Tab Navigate to the previous sheet
Ctrl + Tab Navigate to the next sheet
Ctrl + Alt + C Comment
Figure-4.52 Selected data for drawing a line chart Ctrl + K hyperlink
• Insert tab → Charts → Line chart → 2D Lines Ctrl + Left Arrow If the column to the left of the
(←) cell is blank, moves the cursor to
the left edge of the current data
range.
Ctrl + Right If the column to the right of the
Arrow (→) cell is blank, the cursor moves to
the right edge of the current data
range.
Ctrl + Up Arrow If the column at the top of the
(↑) cell is blank, moves the cursor to
Figure- 4.53 Selecting the Line Chart Type the top of the current data range.

M1R5 104 YCT


Search on TG: @apna_pdf
Ctrl + Down If the column Arrow at the Ctrl + N new sheet
Arrow (↓) bottom of the cell is empty,
Ctrl + Shift + N Manages new sheet templates.
moves the cursor to the bottom
of the data range. Ctrl + O opens saved document.

Ctrl + Shift + Selects all cells from the current Shift + F11 Saves as an open template.
Arrow Keys cell to the end of a continuous Ctrl + S Save document file
range of data cells.
Ctrl + Shift + S Save (Save As)
Ctrl + Page Up It moves Left to the sheet and in
Ctrl + Enter Moves to the next line.
page preview it moves to last
print. Ctrl + Shift + O print preview
Ctrl + Page Down Moves one sheet to the right. Ctrl + Q Exit from LibreOffice.
F1 LibreOffice Help Ctrl + X Cuts the selected matter
Shift + F1 Context help Ctrl + C copies the selected matter
Ctrl + F1 It displays note connected with Ctrl + Z Undo
present cell.
Ctrl + Y Redo
Ctrl + F2 Insert function
Ctrl + Shift + Y repeat (To get back current
Shift + F2 Opens the Function Wizard. matter)
Shift + Ctrl + F2 Moves the cursor to the input Ctrl + V to paste
line.
Ctrl + Shift + V paste special
Alt + Down Increases the height of the
Ctrl + Shift + select all
Arrow current column.
Space Bar
Alt + Right Arrow Increases the width of the
Ctrl + Page Down Moves to the next sheet.
current column.
Ctrl + Shift + Tab
F4 Shows or hides the Database
Sources menu. Ctrl + Page Up / Moves to the previous sheet.
Ctrl + Shift + Tab
Shift + F5 Moves the name box of the
cursor. Shift + Space Bar Selects a row.
Ctrl + F5 show/hide sidebar
F7 Checks spelling in the current
sheet. Ctrl + Shift + J full screen

F8 Turns on/off the additional Ctrl + Shift + P superscript


selection mode. Ctrl + Shift + B subscript
F9 Retrieves all formulas in a sheet. Ctrl + Shift + 6 general format

F11 Style and formatting window. Ctrl + Shift + 1 number format


Ctrl + Shift + 5 percent format
Shift + F11 It creates a document template.
Ctrl + Shift + 4 currency format
F12 Performs grouping of the
selected data range. Ctrl + Shift + 3 date format
Ctrl + M clear formatting
Ctrl + F12 Unwraps the selected data range.
Ctrl + 1 cell formatting
Alt + O Displays the current field
options. Ctrl + D Copies the data in the cells
below.
Delete Removes the current field from
the area. Ctrl + W Closes window.

M1R5 105 YCT


Search on TG: @apna_pdf
Practice Questions with Explanatory Solutions
1. In which formats the spreadsheet can be Ans.(a) The ROUND function rounds a number up to
imported and exported? a specified number.
(a) HTML (b) CSV Syntax– ROUND (Number Num-digits)
(c) PDF (d) All of the above Number– The number you want to round.
Num digits– The number to which you want to round
Ans. (d) Files are imported and exported in the format the number.
of HTML, CSV, PDF, etc. in the spreadsheet. So, ROUND (59.5, 1) = 60.
2. The value of Product (10, –4) will be– 10. In LibreOffice Calc, the value of - FLOOR (100, -
(a) 40 (b) –40 2) will be–
(c) 6 (d) 14 (a) 98 (b) 102
Ans. (b) The value of Product (10, −4) will be –40. (c) Error (d) –102
The Product function is used to obtain the product of Ans.(c) The formula =FLOOR ( ) in LibreOffice Calc,
numbers. returns the nearest integer to the given number in the
3. The minimum font size in Calc is– number line. It Rounds down the passed number.
(a) 6 (b) 10 The value of = FLOOR (100, −2) will display Error.
(c) 8 (d) 12 11. Shortcut key used to convert a number into
Ans. (a) The minimum font size in Calc is 6. This can currency form–
also be increased by the user as per their requirement. (a) Ctrl + Shift + 1 (b) Ctrl + Shift + 2
The maximum font size available in Calc is 96 which (c) Ctrl + 4 (d) Ctrl + Shift +4
is set to 10 by default.) Ans. (d) In LibreOffice Calc, Ctrl + Shift + 4 is used
4. To highlight cells with numeric values in Calc, to convert a number into currency form and for data
(a) Ctrl + F6 (b) Ctrl + F8 source.
(c) Ctrl + F7 (d) Ctrl + F5 12. In LibreOffice Calc, the value of CEILING ( 108,
Ans. (b) Ctrl + F8 shortcut key combination is used to 11 ) will be–
highlight the cells which contains numeric value. (a) 119 (b) 110
5. In LibreOffice Calc, the shortcut key used to (c) 108 (d) 112
select the entire sheet is– Ans. (F) CEILING Function Finds the nearest integer
(a) Ctrl + A in the number line to the given number. It rounds up
(b) Ctrl + W the given number
(c) Ctrl + Shift + Space 13. In LibreOffice Calc = QUOTIENT (509.8,7) will
(d) Ctrl + Space be–
Ans. (c) Ctrl + Shift + Space shortcut key (a) 75 (b) 72
combination is used to select the entire sheet in Office (c) 50 (d) 8
Calc. Ans. (b) QUOTIENT( ) in LibreOffice Calc performs
6. In LibreOffice Calc, the shortcut key used to division and returns the integer part.
insert the current time is– Syntax; = Quotient (numerator; denominator)
(a) Ctrl + ; (b) Ctrl + = (509.8, 7) will have a value of 72.
(c) Ctrl + T (d) Ctrl + Shift + ; 14. Cycle Case is–
Ans. (d) User can insert time in any cell of the (a) lower case (b) upper case
spreadsheet by using the combination of Ctrl+Shift + ; (c) Sentence case (d) All of the above
shortcut. It inserts the current time of the computer Ans. (d) Upper Case, Lower Case and sentence case
system into the cell. in cycle case.
7. In Calc, the shortcut key to select the entire row 15. Horizontal block made of cells is called–
is- (a) cry (b) column
(a) Ctrl + Space (b) Shift + Space (c) cell range (d) worksheet
(c) Ctrl + R (d) Ctrl + A Ans. (a) It is a horizontal block of cells that runs from
Ans. (c) Ctrl + Shift + Space shortcut key left to right across the width of the worksheet. In this
combination is used to select the entire sheet in Office the rows are represented by numbers which are
Calc. numbered from top to bottom. A Calc worksheet can
8. Which function is used to display the current have a maximum of 1048576 but in Calc 3.2 and
date and time– earlier it was 65536.
(a) Now ( ) (b) Time ( ) 16. The Autofill command in LibreOffice Calc is
(c) Date ( ) (d) none of these available in the ........... menu.
(a) Styles (b) sheet
Ans.(a) NOW ( ) is used to display the current date (c) Data (d) tools
and time. Syntax. Now ( ) is used for this. This
function inserts the current date time of the system. Ans. (b) While entering data in libreOffice calc, there
is a large amount of data and there are some repeating
9. The value of =ROUND (59.5, -1 ) will be– patterns in that data. Autofill command is used when it
(a) 60 (b) 58 occurs. This command saves user time by entering
(c) 58.5 (d) 61 more data in less time.
M1R5 106 YCT
Search on TG: @apna_pdf
To create a series using the Fill tool in Calc, 23. = (C10 + C11/12) + D18 is an example of?
• Select the cell that contains the content you want to (a) function (b) cell address
series. (d) value (c) Formula
• Sheet→ Fill Cells→ Fill Up/Down/Left/Right Ans. (c) = (C 10 + C 11)/12) + D18 is an example of a
formula. Formulas in Calc always begin with an equal
17. Formula = ABS ( 10 ) will result in– (=) sign. It is a sequence of operators and functions
(a) 10 (b) –10 that put the values into the cell, which together
(c) ±10 (d) none of these provide the new value. The formula in Calc can be
Ans. (a) ABS ( ) returns the absolute value of a used on thousands of millions of data simultaneously.
number. Absolute value means this number without + 24. Which of the following is not a financial
or – sign, function?
Syntax = ABS (Number) (a) VF ( ) (b) NPV ( )
So = ABS (–10) will result in 10. (d) PMT ( ) (c) I am ( )
18. A collection of worksheets is called– Ans. (c) Financial functions are generally used for
(a) Workbook (b) cell range doing business related calculations. SLN ( ). PMT ( ).
(c) cell reference (d) none of these FV ( ), NPV ( ) etc. are some of the major financial
Ans. (a) A workbook is a collection of many functions. While SUM ( ) is a mathematical function,
worksheets. When Calc opens a workbook, with a it calculates the sum of all values in a cell or range of
worksheet and can add up to 10,000 worksheets. cells adds values.
19. The shortcut key to highlight the entire column 25. Which symbol is used to enter numbers as text?
is– (a) = (b) "
(a) Ctrl + Space (b) Ctrl + Enter (c) , (d) +
(c) Ctrl + M (d) Ctrl + C Ans. (b) When inserting text in a spreadsheet, it
Ans. (c) If the user wants to highlight an important includes letters, numbers and symbols. If a number is
written as text If you want to use it in a spreadsheet,
column while working in the spreadsheet, then the put it after the equal sign (=) in "". For example,
combination of Ctrl + M shortcut is used for this. entering the number "56536" will left align it like text.
20. To make a cell address absolute, is used– 26. Which of the following is a concatenation
(a) $ (b) * operator?
(c) & (d) # (a) Apostrophe ( ' ) (b) Ampersand (&)
Ans.(a) When using absolute cell reference, copying a (c) Exclamation (!) (d) Hash (# )
formula from one cell to another does not change the Ans. (b) This function concatenates two or more text
reference of the cell address given in the formula. To strings into a single text string. Amphersand Operator
make any cell address absolute, a dollar ($) sign is (&) it is also used to concatenate strings.
placed before the column letter and row number of Like–
that cell address. CONCATENATE("TOTAL","&","&","VALUE")
21. ...............Addressing is a cell addressing method– = TOTAL VALUE
(a) relative (b) Mixed 27. In which category are COS, EVEN, FACT, EXP
(c) referencing (d) All of the above functions in LibreOffice Calc?
Ans.(d) When cell address is used in a formula or (a) Data (b) Math and String
(c) Mathematical (d) string
function, then that cell address is called cell reference Ans.(c) Mathematical function is used for arithmetic
of that function. There are three types of cell operation in office calc. COS, EVEN FACT. EXP,
references in LibreOffice Calc– Relative Cell SUM, AVERAGE, COUNT, MAX etc. are called
Reference, Absolute Cell Reference, Mixed Cell mathematical functions.
Reference. 28. The shortcut key to access the last edited cell in
An absolute cell reference uses a dollar sign ($) LibreOffice Calc is–
(a) Ctrl + Home (b) Ctrl + Alt +0
before both the column name and the row number to (c) Ctrl + End (d) Ctrl + H
indicate that the reference is unchanged. The dollar Ans.(c) Mathematical function is used for arithmetic
sign is not used in relative cell references. In this, both operation in office calc. COS, EVEN FACT. EXP,
the row and column of the cell reference are changed. SUM, AVERAGE, COUNT, MAX etc. are called
A mixed cell reference uses a dollar sign in mathematical functions.
conjunction with either a column or a row. in the 29. The shortcut key to open Function Wizard in
column or row of which The dollar sign used with it is LibreOffice Calc is–
unchanged. (a) Alt + F1 (b) Ctrl + F6
22. .ods extension is used for ……… files. (c) F2 (d) Ctrl + F2
(a) Calc (b) Excel Ans. (d) Function Wizard opens all the functions in
(c) Power Point (d) word LibreOffice Calc through sub menus and categories.
Ans. (a) File extension is a suffix which is used at the The Function Wizard can be opened using the Ctrl +
end of a computer file name and is usually two to four F2 shortcut key combination.
characters long. The file extension is used by the 30. In Calc spreadsheet, the maximum number of
operating system to identify which apps are associated characters in a cell is–
(a) 32767 (b) 1024
with this file. .ods extension is used for LibreOffice (c) 6000 (d) 255
files. With the help of Calc, the user can create a Ans. (a) In calc spreadsheet, maximum 32767
spreadsheet electronically and can manipulate. character can be inserted in a cell.

M1R5 107 YCT


Search on TG: @apna_pdf

5 PRESENTATION

5.0 Introduction: • From Template (This is a presentation designed


Libre Office Impress is a presentation program. You with a template of the user's choice.)
• Open the presentation you created earlier.
can also use Impress to create slides that can contain
• Click on Create to open the main Impress
many elements, such as text, bulleted lists, tables, charts, window.
clipart, drawings, photographs, and more. Impress
includes a spelling checker, thesaurus, text styles, and
background styles. Impress can support Microsoft's
PowerPoint format (ppt) as well as its Open Document
Presentation Format (ODP).
LibreOffice Impress allows you to create
professional slide show that can contain charts, drawings,
object text, multimedia and many other items.
5.1 Basic Feature of Libre Office Impress:
To start LibreOffice Impress,
Start → All programs → Libre office → Libre office
Impress.

Fig- 5.2 Blank presentation

Main Impress Window– The main Impress


window has three parts- Slides Pane, Workspace and
Sidebar.
Slide Pane– Slides with thumbnail pictures are
displayed in the presentation in the Slide Pane. This slide
is visible until the slide show order is changed. Clicking
on any slide in the slide pane selects that slide and
displays it in the workspace. You can also make changes
to the slides as per your choice.
Sidebar– There are seven sections in the sidebar.
Click on the icon of the section you want to use. Only
one section can be used at a time–
⇒ Properties: This displays the layouts included in
Impress that the user can select and use as per their
choice.
⇒ Master Pages– This displays the slide style of the
presentation. There are many slide master designs
available in Impress.
⇒ Custom Animation– Different types of animation
are used to emphasize or enhance different elements
of each slide. Through the Custom Animation
section, you can add, remove as well as change the
animation.
⇒ Slide Transitions– It provides various slide
transition options which is set to 'No transition' by
Figure 5.1 Starting Office Impress default. You can also define the transition speed in
or, to open impress with run command, it.
Window Key + R → Type 'Simpress' → Press Enter. ⇒ Style and Formatting– This section provides the
The first time you start LibreOffice Impress, the facility to edit and apply graphics style.
Presentation Wizard is displayed by default, in which ⇒ Gallery– By using this you can add an object to
you can choose from the following options– your presentation as a copy or a link.
• Blank presentation (It is displayed as a blank ⇒ Navigator– You can quickly move from one slide to
document.) another through the Navigator.
M1R5 108 YCT
Search on TG: @apna_pdf
⇒ Workspace– The workspace usually has five tabs in • Now select a template from template dialog box that
the center - Normal, Outline, Notes, Handout, and is displayed and click on Open.
the Slide Sorter. Tab is also known as view button.
The view of the workspace changes depending on • You can also search online template by clicking on
the selection of the View button. Browse Online Template.
Write Office Impress Interface– they are as
follows;
⇒ Title Bar; It is displayed at the top of the document.
Along with the file name, It displays minimize,
maximize, restore and close button, on the right side.
⇒ Menu bar; Impress has a total of 10 menus
available under the menu bar- File, Edit View,
Insert, Format, Slideshow Tools, Window and Help.
It shows below the title bar.
⇒ Tool bar; It is a collection of buttons available with
an icon, which is usually located at the top of the
screen. You can show or hide the toolbar by clicking
on the Toolbar option in the View menu.
⇒ Status bar– It is displayed at the bottom of the
screen which displays information about the
document such as page number, word and character
count, page style, language, insert mode, selection Figure– 5.4 Available Templates dialog box in Impress
mode, document status, digital signature, object 5.2(ii) Creating Blank Presentation:
information, view layout slider, etc. On opening LibreOffice Impress, the blank title slide
5.2 Creation of Presentation: of the program is displayed by default. You can choose
LibreOffice Impress is a presentation program that is different layouts as well as apply designs when adding
used to create presentations. Using this, teachers can text and pictures to slides.
easily explain any topic to the students through You can use the blank template to create a
presentation in their class and can also display their presentation in LibreOffice Impress. The template
thoughts effectively in front of the audience by making provides only the basic visual elements of the
presentations related to business, medical etc. presentation such as place holders, slide titles can be
5.2(i) Creating a Presentation Using an added to it.
■ To create a blank presentation in LibreOffice
Installed Template: Impress,
A template is a file that includes documents such as
resumes, cover letters, business plans, business cards, • File Menu → New → Presentation
etc. LibreOffice povides Pre-installed templates and • Now select one of your choices from the template
presentations with Impress. With the help of different dialog box displayed as shown in figure 5.4.
layouts, visual elements and other design related
elements provided by the template are useful to create
presentation.
■ To create a presentation using a template in
LibreOffice Impress,
• File Menu → New → Templates
Or, press the Shift + Ctrl + N shortcut key.

Figure- 5.5 Blank presentation


5.2(iii) Entering and Editing Text:
Text is entered and edited in Impress in the same
way as in Writer and Calc. There is always some type of
text involved when creating a presentation.
Entering Text to Slides– In Impress presentation,
you can enter text in the following two ways–
1. Inserting a new slide.
Fig- 5.3 Opening the template 2. Inserting text into an existing slide.
M1R5 109 YCT
Search on TG: @apna_pdf
Inserting a new slide– When you insert a new slide, Copying Text– If you want to insert any text of
it is displayed with a placeholder. In placeholders Text, your document on another page as well, then you can
image, video etc can be inserted. copy and paste that text. This is possible through
When starting a presentation, it is displayed with
Title Slide layout. You can insert slides of different Windows' clipboard, which is an area of computer
layouts according to the user's requirement. memory that holds data as it is copied. Hold data in
■ To insert a new slide in LibreOffice Impress, clipboard can be paste anywhere in Windows software
• Slide Menu → New Slide application. This data remains in the clipboard until you
Or, press the Ctrl + M shortcut key simultaneously. exit windows or replace it with new data.
Adding Text in a Place Holder– Impress provides ■ Copying text using ribbon commands,
16 automatic slide layouts, many of which have text
place holders for titles, bodies, and bulleted lists. • Select the text you want to copy.
• To insert a new slide, click on the placeholder to • Edit menu → Copy or Ctrl + C key or click on the
select it. Copy button available on the toolbar.
• Move the copied text to the presentation where you
want to insert it.
• Click on the Paste button available on the toolbar or
press the Ctrl + V key combination.
Moving Text– Moving a text is similar to copying,
but the difference is that on moving a text, it is removed
from the first place to copy at new place.
■ Moving text using ribbon commands,
• Switch to edit mode by clicking on the text you want
to move.
• Select the text.
• Right Click → Cut or press Ctrl + X Keys and move
the cursor to the location where you want to move
Fig - 5.6 Adding text to placeholder the text and press Right Click → Paste
• Select the place holder by clicking on it. This will or Ctrl + V Key combination.
change the dimmed outline to a wider head border. Deleting Text– To remove the text written by the
• The sample text will disappear and an insertion point user in the text box, it is deleted. To delete a text, use one
will appear there as an indication to enter the text. of the following methods–
• The insertion point in a title place holder is set or ■ Using the Backspace key, the characters to the left
left-aligned. of the cursor are deleted.
• The sample text disappears when clicked in the ■ The characters to the right of the cursor are erased
place holder of the bulleted list. but the bullets by using the Delete key. If you want to retrieve the
remain and the cursor stops at the same insertion deleted text you can undo it–
point from where the text should start. • Toolbar → Undo button.
• Type the text for the slide in the selected place • Press Ctrl + Z
holder and press the Enter key.
• A new bullet is inserted on pressing the Enter key, if • Edit menu → Undo option.
the bulleted list is longer than one line, then the text 5.2(iv) Inserting and Deleting Slides in a
is automatically wrap and aligns to the next line. Presentation:
• After the text entry is complete, click on any blank After the presentation file is created, users can insert
space of the slide to deselect the place holder or or delete any slide as per their requirement.
Click on the Grey border which is displayed around ■ To insert a slide,
slide. If more than one slide is required in the presentation
Editing text on a slide– To edit text on a slide, click window, then a new slide has to be inserted for it. For
on that text. An insertion point appears in it, from which this–
the text can be edited. • Select the slide after which you want to insert the
Choose a technique from the following to edit the
text– new slide.
• To select a word, double click on it or press the shift • Slide menu → New slide.
key by placing the insertion point at the beginning of Deleting Slides– The slide which is not required in
the text which you want to select and select the the presentation can be deleted. For this–
characters by pressing arrow key then click at the
end. • In the Outline pane, select the slide you want to
delete.
• You can select its entire text by clicking inside the
place holder– • Now the selected slide will be deleted as soon as you
Or, Edit Menu → Select All press the Delete key.

M1R5 110 YCT


Search on TG: @apna_pdf
5.2(v) Saving the presentation:
After creating the presentation file, it is necessary to
save it for re-accessing it in future and while working on
the presentation it is necessary to save it at regular
intervals so that the data can be saved from being
destroyed even if the system fails.
There are two commands available to save a
presentation in Impress, Save and Save As.
• Save command is used to save the presentation.
• Save As command is used to save a presentation
with a new name. Figure-5.8 Inserting a Table
■ To save the presentation,
• Clicking on the File tab in the ribbon will display the • Enter the number of rows and columns as per the
Back Stage view. Select the Save option from it or above dialog box.
press Ctrl+S. • On clicking Ok, the table is inserted in the slide.
• Save option saves the data in the already saved file Or, click on the drop down arrow of the table icon
and updates that file and if the file is not already available on the standard toolbar.
saved then it displays the Save As dialog box.

Figure 5.7 Save As Dialog Box Figure 5.9 Using the Table Tool
• Highlight the required column and name by
• Set the location of your file in Save As dialog box. dragging the mouse.
• Enter the name of your file in File Name. • When you release the mouse button, a table appears
• Click on the Save button. on the current slide.
■ To save a presentation using Save As command For,

File tab → Select Save As → Select File Location→


Choose File Name → Click Save
5.3 Manipulating Slides:
You can manipulate your presentation different
forms–
5.3(i) Inserting table:
Any type of writer table or calc sheet can be inserted
in the presentation file. You can insert data into your
presentation either from a Writer file or from a Calc
worksheet or by selecting the Impress Layout option.
■ To create a new slide with a table,
• Insert menu → Table
On clicking on the Table option, a dialog box
appears as shown in Figure 5.8– Fig. 5.10 Slide with table

M1R5 111 YCT


Search on TG: @apna_pdf
Entering Text in a Table– On inserting a new table ■ To copy or move cells,
in a slide, it will be completely empty and displayed • Edit menu → Cut/Copy/Paste.
within the (grey) frame as shown in Figure 5.10. In Or, Right Click on Cell → Choose Cut/Copy/Paste.
inserted table in the slide, the cursor keeps blinking in You can also move the cell contents by selecting
the first cell on the top left edge and the typed text is them using the Drag & Drop option.
displayed near this cursor. ■ To copy or move contents using drag and drop,
After inserting text, you can exit from edit mode by Select the text you want to move or copy.
clicking anywhere on the table.
Editing a Table– After creating a table and • To move the text,
inserting data in it, if you want to change the structure of Standard Toolbar → Cut/copy
that table as per your requirement, then you can add, • Click on the insertion point to paste the cut or copied
move, delete rows, columns, cells in the table. You can text into the table.
merge or split cells as well as change the height and • Standard Toolbar → Paste.
width of columns to fit the text you type in the table. This will paste that text at the insertion point.
■ Moving a table,
• To copy the selected text, keep the mouse pointer on
• You can move the table to another location by the selected text and press the left Ctrl key.
clicking and dragging on the edge of the table. Hold down the mouse button and drag it to the place
where you want to paste it.
• To move the selected text, move the mouse pointer
over the selected text while holding down the left
mouse button.
Drag to the place where you want to paste it. When
copying text instead of moving it, a Plus Sign (+) will be
displayed next to the mouse pointer to indicate that the
Fig-5.11 Moving the table text is being copied rather than moved.
■ Resizing a table.
• Click and drag the table's sizing handle until the
table is sized as per your requirment.

Fig- 5.12 Resizing the table


Fig-5.13 Copying a cell with contents
Adding Columns and Rows–
Merging and Splitting Cells– To make a cell bigger,
■ To insert a column, you can merge the adjacent cells to that cell. That big
• Click anywhere in the next column to the table cell is equal to many small cells.
where you want to insert the new column.
• Right Click → Insert → Insert Column Before/Insert
Column After.
The column will be inserted on the left or right side
of the column which you selected.
■ To insert row into the table one by one,
• Click anywhere in the table, next to the cell where
you want to insert the new cell.
Right Click → Insert Row Above / Insert Row
Below will be inserted above or below the selected Fig – 5.14 Merging cells in row 1 and splitting it into
row. two cells in row 2
Deleting Columns and Rows–
■ To merge two or more cells,
■ To delete a column or row,
• Select the cells you want to merge.
• Select the column or row from which you want to or, Right Click→ Merge Cells.
delete. ■ To split a cell,
Right Click → Delete → Delete Row or Delete only one cell can be split at a time.
Column. • Select the cell you want to split.
Copying and Moving Cells– Right click → Split Cells.
M1R5 112 YCT
Search on TG: @apna_pdf
The cell is split into two cells of equal width, and if 5.3(iv) Resizing and scaling on object:
the larger cell has any content, it will be moved to the The meaning of resizing and scaling is to change the
left after splitting. size of the inserted object on the slide.
5.3(ii) Adding Clipart Pictures: Resizing an object– To resize an object, drag one of
Many pictures are available in clip art gallery which the object's handles in the desired direction. If you want
user can add anywhere in any slide of their presentation. to resize the object outside the current center, hold down
There are symbols used in all applications of clipart. the Ctrl key and drag the corner handle.
Users can search for suitable pictures to add to their ■ To resize an object,
presentation by typing their keywords. • Select the object you want to resize.
Inserting a Picture from ClipArt Gallery– • Drag one of the side handles of the object until the
■ To add a clipart picture in LibreOffice Impress, object is in the required shape.
• Insert Menu → Image
• The Insert Image dialog box will appear.

Fig- 5.17 Resized object

Scaling an object– To change the size of an object


without dragging, you can set object placements and
sizing on the Size and Position tabs of the Format
AutoShape dialog box.
Fig. 5.15 Insert Image Dialog Box ■ To scale an object in Impress,
• Select an object on the slide that you want to scale.
• After selecting File/Image/Picture click on Open • Format menu → Object and Shape → Position
button. and Size.

5.3(iii) Inserting other objects:


Apart from Impress clipart, many other types of
objects can be inserted. Graphics created by other
graphics processing software can be inserting on slides.
■ To insert another object in LibreOffice Impress,
• Insert menu → Audio or video/media/chart/object.
• Insert Audio or video dialog box will be displayed.

Figure- 5.18 Position and Size dialog box

Fig– 5.16 Insert Audio/Video Dialog Box • Insert the Width and Height in displayed Position
• Select File / Image / Picture from the left pane of the and Size dialog box.
dialog box and click on the Open button. • Click OK.
M1R5 113 YCT
Search on TG: @apna_pdf
■ Creating a hyperlink to link to a different slide in the
presentation,
• Hyperlinking to another file is an important tool in a
LibreOffice Impress presentation. to create a
hyperlink Follow the steps below–
• Select the inserted object on the slide that you want
to use for the hyperlink.
• Insert → Hyperlink
Or press the shortcut key combination Ctrl + K.

Figure- 5.20 Master slide


5.4 Presentation of Slides:
Making slides and explaining your point through it
is called presentation of slides. It helps in conveying
your point to the audience.
5.4(i) Viewing a Presentation:
Preparing a presentation and running it on the
system is called viewing the presentation & can be
Figure- 5.19 Hyperlink dialog box compose and run using Impress functional commands
• Set the URL in the Hyperlink dialog box.
presentations can be compose and run. Normal View,
• Click on Apply and then on Ok.
Slide Shorter to view a presentation in Impress View
5.3(v) Creating and Using Master Slide:
Slide Master View is a special feature in Impress Notes Page View, Slide Show View, Master View are
that allows you to modify the slides and slide layout in a available in impress to view a presentation.
presentation. By editing in the slide master, you can Each view provides different features for creating
apply the same formatting, layout to all the slides presentations.
available in the presentation.
The effect of changes made in one view can be seen
Some of the common uses of Slide Master View are:
• Rearranging Place Holders– If you need to rearrange in the other view. These views are as follows–
place holders on each slide, you can save time by ■ Normal– It is the main view of Impress in which we
arranging them in - Master Slide view. By adjusting can apply almost all the functions of Impress.
one of the layouts in slide master view all slides On opening LibreOffice Impress, the normal view is
become change with that layout. opened by default.
• Creating Unique Slide Layouts– If you want to
create a presentation that is different from the regular ■ Outline– With the help of this tabsheet, text typing,
Impress them, you can use slide master view. Custom editing, drawing, arranging slides, etc. can be done.
layouts can include background graphics, placeholders, On clicking this option, all the presentation slides
etc. appear in outline view.
• Modifying the background– Slide Master view lets ■ Notes Pane– With the help of this pane, you can add
you customize the background for all your slides at
the information that you want to share with the
once. By this you can add logo or watermark to each
slide of your presentation. audience. With the help of this option, you can write
• Customizing text formatting– Instead of changing and view notes in the presentation slide.
the text color on each slide individually, you can ■ Slide Sorter– With the help of this view, you can
change the text color on all slides at once using a see all the slides of the presentation together in a
master slide.
smaller form, so that whole concept of Presentation
■ To create a master slide,
• View Menu → Master Slide Slide can be understood easily. With the help of this
• The presentation will switch to slide master view. view, we can change the order of slides as per our
• Make changes to the slide master as per your choice. choice.

M1R5 114 YCT


Search on TG: @apna_pdf

Figure- 5.23 Header and Footer Dialog Box


Fig. 5.21 Slide Sorter View • You can insert more data in the two tabs available in
5.4(ii) Choosing a setup for presentation: the dialog box that is displayed, Slides and Notes
■ To set the slide show setup option in LibreOffice and handouts.
• Date and Time checkbox remains enabled but you
Impress, can set date format and language.
• Slide show menu → Slide show setting. • Click on Apply to all button.
The Slide Show Settings dialog box will display. 5.4(iv) Printing Slides and Handouts:
In the Impress application, any handout, slide or
entire presentation can be easily printed when needed. It
can be printed in black and white, Grayscale or color.
While printing handouts, users can select its format.
You can insert slides from Handouts into your
presentation as per your choice.
You can customize the Handout format as per your
requirement using Handout Master.
Impress chooses how many slides to print on a page,
depending on the options you choose when you create
the Handout Shrinks that many slides to fit on one page.
■ To print header/footer, date and letter number etc. of
each handout, it is necessary to select them on the
notes pages. If you want to print a different header,
page number, etc. in the handout, change it by to the
Header and Footer dialog box.
You can also print selected slide handouts, notes
pages, slides, or outline pages.
■ On clicking the print option in the file tab, the back
stage view is displayed as shown in the picture
below.
Fig– 5.22 Slide Show Settings Dialog Box
• Select the range, presentation mode option and
multiple displays.
• Slide timing through transitions on the task pane
need to be customized to automatically advance
slides.
5.4(iii) Adding Headers and Footers:
During the presentation, you can add page numbers
or headers, footers to number your slides.
The header is printed in the upper margin of the
slide and the footer is printed in the lower margin. It can
contain both text and pictures.
■ To add header, footer and notes in Impress,
• Insert → Header and Footer. Fig- 5.24 Selecting pages on slides from File tab in
Handout format
M1R5 115 YCT
Search on TG: @apna_pdf
■ Select the Printer Range and Copy (All Slides, Even Controlling the Slideshow from the Keyboard–
Slides, Odd Slides, Selection, etc.) options under the You can use the keys listed in Table 5.1 to control
Print menu Select as required. various aspects of the slide show including the slide
■ After applying all the options in the Handouts show popup menu.
section, click on OK. Key Combination Function
5.5 Slide Show: Spacebar, → or ↓ , To move on next Slide.
After preparing a presentation, the user can present
it on a large screen (LCD or monitor screen). Page Down Ùee N
5.5(i) Running a Slide Show: Backspace, ← , ↑ , To move on previous Slide.
You can preview the transition effects for all slides Page Up or P
through the slide show developed in Slide Sorter view. Slide Number+ Enter To move on specific slide
You can view the transitions full screen by selecting the number.
presentation as a slide show. Black screen / start again
Starting the Slide show– The following options are B or ⋅
available while viewing the slide show– white screen / start again
W or ,
• Slide show menu → Start from first slide/current
slide. Ctrl + A To show mouse pointer as
• Select slide show from beginning or press the F5 arrow.
button. Ctrl + P To show mouse pointer as
• During the slide show, keep pressing the N key to pen.
move to the next slide and the Backspace key to H To show or hide to hidden
move to the previous slide. slide (show/hide)
• To customize the slide show presentation through Esc Ends the show.
Custom Slide Show, set the slide numbers by Table- 5.1 Slideshow keyboard control
clicking on the Custom Slide Show dialog box.
• You can start the presentation from any slide by 5.5(ii) Transitions and Slide Timings:
clicking on Start from current slide. During the presentation, the slide show runs with the
Controlling a slide show with the mouse– During help of mouse or keyboard. If you don't want to move the
a slide show, you can display the pop-up menu by slide show manually, you can set the style and way the
moving the mouse pointer and Right click in the lower- slides are displayed. You can run a slide show by setting
left corner of the slide. (As in Fig. 5.25) the time of the slide manually and also you can rehearse
Use the Next and Previous buttons of the pop-up as well as record the time using the rehearsal feature.
menu to move forward and backward slides during the ■ To set transition and slide timings in LibreOffice
slide show.
To go to a particular slide, highlight Go and then Impress,
select Slide Navigator from the menu. • Select a slide from the slide navigation pane.
Select the slide in the dialog box and click GoTo. • Slide menu → Slide transition.
(As per Fig. 5.25)
To stop the slide show at any point during the
presentation, simply select 'End show' from the pop-up
menu.

Fig- 5.26 Slide Transition Dialog Box


• Now select slide transition from task pane as per
your choice.
Figure-5.25 Popup menu during slide show • Click on Apply to all.

M1R5 116 YCT


Search on TG: @apna_pdf
5.5(iii) Automating a Slide Show:
With the help of tools available in Impress, you can
automatically play the presentation. After creating a
presentation, you can configure it to play automatically
after arranging it in the correct sequence.
■ For automating slide show in LibreOffice Impress,
• Open the presentation file and open the Slide
Transitions sidebar. (As per Fig. 5.26)
• Go to Advance slide area and click on automatically
after and select a time.
• Select Apply transition to all slides.
5.6 Providing Aesthetics:
There are many such tools in Impress which help in
providing stable and attractive look to the slide Fig- 5.27 Demonstration of different types of fonts
presentation. Various options like design templates The following points should be considered while
making a slide presentation–
masters, color schemes and layouts of slides etc. are used • Do not use different types of fonts in the same slide.
to improve the slides. If necessary, use one font for the head line, another
5.6(i) Enhancing Text Presentation: for the rest of the text, and a third font for the
Enhancing text presentation means setting the font, bulleted items.
color, size, alignment, etc. of the text for the presentation • Fancy Fonts should not be used in the headline. •
through its own formatting features. Text entered in Liberation Sans are also bold and good.
place holders of a slide such as title, bullet list, etc. can
be edited in the slide or outline tab.
Aligning Text on a slide– The way of placing a text
in the middle of the margin of a text box in a page or
slide is called alignment. It can be of four types, which
are given in Table 5.2 below.
Alignment Effects
Left Align The left margin of all lines runs
straight to the left, while the right
margin ends where appropriate.
Right align The right margin of all lines is in a
straight line to the right, while the
left margin varies depending on the
line contents.
Setter Centers each line. There is a gap
between the left and right sides of
each line that separates the
numbers and characters in the line
depends on the size of the key.
Justified Each line starts at the left margin
and ends at the right margin.
Table- 5.2 Text Alignment in Slides
■ To align text,
• Select the text. Fig. 5.28 Selecting font through dialog box
• Format menu → Align → Left / center / Right / ■ To change the font of any text on a slide,
Justified • Select the text whose font you want to change.
Changing Fonts– A font consists of a group of • Format menu → Character (as per figure 5.28)
characters with the same style. There are two types of • Once the font is selected, the selected text is
fonts as follows– converted to the same font.
Changing the Text size– The size of each font ie
■ Mono Spaced or proportionally spaced, depending height is measured in point size. This is equal to 1/72 of
on how much space is between each character. an inch.
■ In moonscape font all the characters are of the same ■ To change the text size,
width and in proportionally spaced each character • Select the text whose size you want to change.
• Format menu → Character
has a different width for example the width will ℓ
• In the displayed font dialog box (Fig. 5.28), type the
less than M. size as per your choice or click on the size drop
■ Serif and Sans Serif based on the last stroke Serif down list. Select the desired size by clicking.
fonts have the last stroke while sans serifs do not. • Select a new size or click Increase or Decrease font
size on the formatting toolbar.

M1R5 117 YCT


Search on TG: @apna_pdf
Adding Special Effects to Text– To make a text Remove formating Ctrl + Spacebar
effective as a presentation, special effects are added to Change the font Shift + F3
characters, sentences and paragraphs. Change the font Ctrl + Shift + F
■ To add special effects, Change the font size Ctrl + Shift + P
• Select the text to which you want to add special Increase the font size Ctrl + Shift + >
effects. Decrease the font size Ctrl + Shift + <
• Select Character by clicking the Format menu and Bullets and Numbering– Using the Bullets and
then click on any option in the Font Effects tab in Numbering option available in Impress, you can create
the Character dialog box. bulleted and numbered list. On activating the Bullets
option, a graphic character is inserted at the beginning of
the paragraph. In this you can use several types of
bullets.
■ To create a bulleted list,
• Select the text in which you want to add bullets.
• Format menu → Bullet & Numbering Command.
• The drop down list displayed on clicking the down
array of the Bullets command icon contains the pre-
defined bullet lists.
• You can select the bullet type as per your choice
from the drop down list that appears.

Figure- 5.29 Font style effect

Changing Text Color– Changing the color of the


text used in the presentation to make it attractive.
■ To change the color of the text,
• Select the text whose color you want to change.
• Select the font color in the Character option of the
Format menu and in the Font Effects tab.
Or, clicking on the arrow next to the font color will
display the font color palette.
• Select the color for the font from Automatic Color
by clicking on the down triangle.
• If the color, you want to choose is not in the Color Figure 5.30 Selecting bullets from a paragraph group
box, click More Font Colour.... Select the desired • The selected bullet type is applied to the text as
color and click on OK. shown in the image below.
Applying character formatting using the
keyboard– We can apply most of the character
formatting using keyboard shortcuts.
■ To format using shortcut keys,
• Select the text you want to format. To get the
desired formatting effect, use the keyboard shortcut
given below and the shortcut key combination
according to their respective formats.
Format Shortcut
Bold Ctrl + B
Italic Ctrl + I
Underline Ctrl + U
Figure- 5.31 Apply Selected Bullets to Paragraph
Superscript Ctrl + Shift + (+) Removing Bullets and Numbering–
Subscript Ctrl + = ■ To remove the bullets and numbering,
Copy formatting Ctrl + Shift + C • Select the text or place holder from which you want
Paste formating Ctrl + Shift + V to remove bullets or numbers.

M1R5 118 YCT


Search on TG: @apna_pdf
• Formatting Toolbar → Bullets & Numbering.
Impress automatically rearranges the order of the
list.
• If you want to rearrange the elements of the list after
removing the bullets or numbering, click use
Promote and Demote Bullets.
5.6(ii) To Change Shape fill Color:
By using color and line style, we can make our
presentation more attractive.
■ To change shape fill color in LibreOffice Impress,
• Select the shape or text box you want to change.
• View menu → Color Bar
• Move the mouse over the Fill Color Standard toolbar
and select the color you want to use. Custom Color
by clicking on it you can see more options.
5.6(iii) Adding Movie or Video & Sound: Fig.- 5.33 Insert Sound Dialog Box
You can add any type of sound or video files to your • Browse to the location on the computer where the
presentation and play them at runtime. By adding these, sound clip is saved.
we can provide better presentation interface to our • Select your favorite sound clip and click on Ok
presentation as compared to graphics and text. button.
You can insert video, files stored in the computer or • The audio file is inserted in the slide as shown in
downloaded from the web into the presentation. Click on figure 5.34.
its icon to play it automatically during the slide show.
Impress supports to videos to avi (audio video
interchange), mpg (motion pictures group), mov (movie)
etc. different formats.
Adding Sound File– You can make your
presentation more professional by adding sound effects
like music, voice recording. You can also play a voice
recording or a music (song) in the background of the
presentation can.
The two main file formats used in presentations are
wave files and MIDI files.
The file name extension of Wave Files is ⋅wav and
the file name extension of M1D1 Files is ⋅mid, ⋅mid or
⋅rmi.
■ To insert the sound into the slide,
• Select the slide in which you want to insert the
sound.
• Insert → Media group → Audio button.
• Select the Audio from file option from the drop Fig – 5.34 The audio file gets inserted in the
down list that is displayed, as shown in Figure 5.32. presentation.
■ To add movies and sounds in LibreOffice Impress,
• Move to the slide to which you want to add the
audio or video.
• Insert menu → Audio Or Video →
Video/Picture/Music
• Locate the folder that contains the file you want to
add.
• Click on Open.
Impress Shortcut Keys–
Shortcut keys Function
Ctrl + N New slide
Ctrl + Shift + N Manage template
Ctrl + O Open
F2 Edit/insert text
Ctrl + S Save
Ctrl + Shift + S Save As
Fig- 5.32 Selecting audio from file by Insert tab Ctrl + M Duplicate Slide
• The Insert Audio dialog box will be displayed. Shift + F3 Duplicate Object
(As per Fig. 5.33) Ctrl + Q Exit LibreOffice
M1R5 119 YCT
Search on TG: @apna_pdf
Ctrl + X Cut Ctrl + F3 To exit the group
Ctrl + C Copy F7 Spell check
Ctrl + V Paste Ctrl + F7 Thesaures (Dictionary)
Ctrl + Z Undo F11 Style and Formatting
Ctrl + Y Redo Alt + Page down To go to the next slide
Ctrl + H Find and Replace without effect.
Ctrl + Shift + V Paste Special Alt + Page up To go to the previous slide
F4 Object Position and Size without effect
F5 Start Slide Show Ctrl + Page up To Move on previous slide.
Shift + F5 Starting From Current Slide Ctrl + Page down To go to the next slide
Ctrl + Shift + F5 Navigator Plus (+) Key To zoom out
F8 Edit Points Shift + Enter Line break without paragraph
Ctrl + Shift + F8 Fit Text To Frame change
Home Go To First Slide Multiply (*) key To fit the page in the window
End Go To Last Slide Divide (÷) key To 'zoom' in on the current
Esc To Close The Presentation selection
B Display Black Screen Left arrow/Up Next slide without effect
W Display White Screen arrow/Page up/
Ctrl + Shift + G Grouping Selected Objects Backspace/P
Ctrl+Alt+Shift + G Ungroup
Space bar/Right Next effect play
Ctrl + Shift + (+) Bring an Object to the Front
Alt + Shift + F5 Jumping to the last edited arrow/Down
slide arrow/Page
F3 To enter the group down/Enter/Return/N

Practice Questions with Explanatory Solutions


1. Which key is used to close the presentation in Ans. (d) odp (open document presentation) is file
LibreOffice Impress– format in LibreOffice impress presentation. PPt or pdf
(a) Ctrl + Home (b) Ctrl + X (portable document format) a presentation can be sent
(c) Shift + End (d) Esc as an attachment using any of the following formats.
Ans. (d) Slide show presentation running in 5. How many menus are available in LibreOffice
libreOffice is closed by using Esc button. This only Impress?
Closes slide show Office, not Presentation and (a) 7 (b) 9
LibreOffice Impress. (c) 10 (d) 11
2. The following view is not available in the view tab Ans. (c) 10 menus are available in LibreOffice
for slides– Impress – File, Edit, View, Insert, Format, Slide,
(a) slide sorter (b) Notes pane Slideshow, Tools, Window, Help
(c) print view (d) reading view 6. How many views LibreOffice Impress normally
Ans.(c) Normal Outline, Notes, Slide Sorter, Master have?
Slide, under View tab for slides in LibreOffice (a) 7 (b) 5
Impress. Master Notes and Master Handout options (c) 4 (d) 6
are available. Ans. (a) There are 7 views available in LibreOffice
Impress - Normal Outline, Notes, Slide Sorter, Master
3. To go to the last slide of the presentation-
Slide, Master Notes and Master Hand Out.
(a) Ctrl + End. (b) Ctrl + L
(c) Ctrl + Esc (d) None of these 7. Which objects can be used while making a
presentation in LibreOffice Impress?
Ans.(a) Ctrl + End shortcut key is used to go to the
(a) Image (b) Graph
last slide in the online office impress presentation
(c) Graphics (d) All of the above
4. Using which format presentation can be send as
Ans.(d) Following are the objects used in LibreOffice
an e-mail attachment in LibreOffice Impress?
impress presentation–
(a) Odp (b) PPt
Text– Under this, words are displayed on the screen
(c) Pdf (d) All of the above through letters, numbers and special characters. This
M1R5 120 YCT
Search on TG: @apna_pdf
is used in the exchange of information. In this, words Ans.(b) The combination of Shift + F3 shortcut key is
are made attractive by using special tools like bold, used to insert duplicate shape in draw in LibreOffice
italic and underline etc. Impress presentation.
Image– Images are made up of pixels. Good quality 12. The maximum font size in LibreOffice Impress
images are prepared on the screen by the computer. is–
Images are used along with words to explain any type (a) 100 (b) 95
of information. (c) 90 (d) 96
Video– The dynamic presentation of event is called Ans. (d) LibreOffice can take maximum 96 font size
video. With the help of multimedia programs in impress presentation; it is set on two basis by
computer can also be used as television. default. On opening the LibreOffice Impress, the slide
Audio– Audio is used to explain any information in has 44 points for heading and 32 points for
the computer. subheading.
Graphics– Under graphics, information is presented 13. To arrange or sort the slides in LibreOffice
by an image made of lines. Impress…... is used.
Graph– A graph is a chart form used to represent (a) Slides Pane (b) Slide Sorter view
statistical data and relationships between variables. (c) both (a) and (b) (d) none of these
8. The default line spacing of slides in LibreOffice Ans. (c) Both the Slides Pane and the Slide Sorter
Impress is– View are used to arrange or sort the slides in a
(a) single (b) double LibreOffice Impress presentation. The Slide Pane is a
(c) 1.5 (d) none of these thumbnail picture of a presentation that can be used to
Ans. (a) The default line spacing of a slide in an add, hide, or add new slides renaming, copy, paste etc.
LibreOffice Impress presentation is single, which is 14. There is no option available under zoom in
equal to two lines in the slide text Shows the space LibreOffice impress–
between. (a) Variable (b) 100%
9. A presentation written in LibreOffice Impress (c) Optimal (d) none of these
can be printed in........... Ans. (d) The options available under Zoom in
(a) Portrait (b) landscape LibreOffice Impress Presentation are Optimal, Fit
(c) both (a) and (b) (d) none of these Width and Height, Fit Width, 100% and Variable.
Ans.(c) After creating a presentation in LibreOffice Under the variable option, the user can increase or
Impress, it is also printed. Print out of the presentation decrease the zoom percentage as per their choice.
it's called Handout. LibreOffice Impress presentations 15. Which menu is used to check spelling in
can be printed in portrait mode in addition to LibreOffice Impress?
landscape. (a) Tools (b) Slide
10. Font work option in LibreOffice Impress is (c) Format (d) edit
available in menu– Ans.(a) Check spelling by using F7 function key in
(a) edit (b) insert LibreOffice Impress or by using spelling option of
(c) view (d) slide tools menu can be done. This tool is very useful for
Ans.(c) Font work option is available under the Insert users having little knowledge of English.
menu of Office Impress. This option works like the16. To start slide show from current slide is used–
Word Art option of Microsoft Word. In this, many (a) F5 (b) Shift + F5
(c) Ctrl + F2
text formats related to the style of the text are given, (d) Shift + F2
which the user can apply on the text typed by him. Ans. (b) F5 to start slide show from first slide and
11. Shortcut key for duplicate balance for draw in Shift + F5 shortcut key is used to start from current
Office Impress– slide.
(a) Shift + F3 17. To close the presentation in Impress presentation
(b) Shift + F3 is used–
(c) Shift + F4 (a) ESC (b) Close button
(d) Shift + F5 (c) Ctrl + W (d) Alt + F4

M1R5 121 YCT


Search on TG: @apna_pdf
Ans.(c) Ctrl + W is used to close the slide in Impress Ans.(c) A special effect used to show a slide show in a
presentation. It does not close the LibreOffice but only presentation is called a slide transition. Various types
closes the current presentation. of transitions and sound effects are used to make the
slide show attractive. The next slide coming in the
18. To insert a text box in Office Impress…..shortcut presentation can be opened from top to bottom, left to
key is used– right, circular etc. A sound effect can also be selected
(a) F2 (b) Ctrl + F2 when opening each slide.
(c) Shift + F2 (d) Alt + F2 24. What is the maximum zoom in Impress?
Ans. (a) The F2 function key is used to insert a text (a) 300% (b) 3000%
box in Impress. Text can be inserted in both (c) 450% (d) 500%
placeholders and text boxes. The text boxes always Ans. (b) The zoom percentage is displayed on the
stay in the same place even when you change themes. status bar in LibreOffice Impress. Clicking on the
zoom percentage opens the Zoom and View Layout
by inserting text box you can add to the slide layout.
dialog box. The maximum zoom available in Impress
19. What Kind of Clips Are in the Clip Art Gallery? is 3000%.
(a) picture (b) video 25. What is the maximum number of slides that can
(c) sound (d) all of the above. be printed on an A4 size paper?
Ans. (d) There are many pictures available in clip art (a) 1 (b) 5
gallery which users can add anywhere in any slide of (c) 9 (d) 4
their presentation. Users can search for suitable Ans.(c) A maximum of 9 slides can be printed on an
pictures to add to their presentation by typing their A4 size paper. A4 size paper size 84 1mm and is
1189mm. 14 size paper is the most widely used paper
keywords. Image, audio video in clip gallery there are size around the world.
all kinds of clips. 26. The default name of Impress presentation is–
20. What is the shortcut to close the presentation (a) Presentation
window? (b) Untitled 1 LibreOffice Impress
(a) Ctrl + X (b) Ctrl + W (c) Slide 1
(c) Ctrl + B (d) none of these (d) Writer1
Ans. (b) The presentation window is closed by using Ans. (b) The default name of an Impress presentation
is Untitled 1. Which users can also change as per their
the combination of Ctrl + W shortcut.
choice.
21 An object on a slide that when clicked performs 27. What is used to hold text clipArt and chart in
an action, in the context of animation it is......... slide–
(a) run (b) trigger (a) Text box (b) Drawing box
(c) initiate (d) style (c) Place holder (d) window
Ans. (b) While making a presentation in LibreOffice Ans. (c) Every time a new slide is inserted in the
Impress, there is an object on the slide which, when presentation, it is displayed with a placeholder in
clicked, performs a specific action is called a trigger. placeholders, text, Clipart, chart, images, audio and
video etc. can be inserted.
This is an animation effect for playing an audio or
28. To see all the slides on one screen in LibreOffice
video clip in a slide; Instant trigger only works when
Impress–
clicked. (a) View Slide Sorter (b) View Slide
22. What is defined by Handout Master? (c) View-Master (d) View- Slideshow
(a) slide formatting Ans. (d) In LibreOffice Impress, you can view all the
(b) Layout of audience handout notes slides together in a smaller form on the same screen
(c) Handout Content Formatting for Word Export with the help of the Slide Sorter option in the View
(d) all of the above menu.
Ans.(b) You can customize the Handout format as per 29. In Impress, which shortcut key is used for
subscript–
your requirement by using Handout Master. The (a) Ctrl + Shift + B (b) Ctrl + Shift + P
layout of the Audience Handout notes can be defined (c) Ctrl + B (d) None of these
using the Handout master. Handout is a printout of the Ans. (a) The shortcut key combination Ctrl + Shift +
presentation, which is given to the audience before the B is used to put the text in sub script form in Impress.
presentation so that the presentation can be easily When using subscript, the text is typed below the
understood. normal base line.
23. What is slide transition? 30. What is the shortcut to insert new slide?
(a) Over Head (a) Ctrl + Shift + M (b) Shift + M
(b) Letter (c) Ctrl + M (d) Ctrl+N
(c) A special effect used to show a slide show Ans. (c) Using the shortcut key Ctrl + M, a new slide
(d) Slide Type can be inserted in the presentation.

M1R5 122 YCT


Search on TG: @apna_pdf

6 INTRODUCTION OF
INTERNET & WWW

6.0 Introduction: Components of Computer Network– Following


The full name of Internet is International Network. It are the introduction of some of the major components
is a global network made up of many small and large required to be installed in the network–
computer networks spread all over the world, • Server– It is the main computer of the network
interconnected through various means of which holds all the data such as shared files, programs
communication, which makes possible to exchange of and network operating system.
information. • Client– In addition to the servers connected in the
To connect a computer with Internet, we have to network, the computers which are also called nodes, the
take the service of an Internet Service Provider, after that user works on these computers. The more powerful node
the computer is connected to the Internet Service is called a Workstation.
Provider through a telephone line.
• Transmission media– It is an essential component
The first Internet service in India was started by that connects physical devices (hardware) in a computer
VSNL (Videsh Sanchar Nigam Limited) on 15 August network.
1995.
• Network Interface Card– This is a circuit
Internet provides us electronic mail, online chat,
connecting network cables to the computer, with the help
online banking, online gaming etc. It has become
of which the arrival of data is fast. This card is installed
necessary for day to day activities; such as paying bills,
in the motherboard of all the computers connected in the
online shopping, surfing etc.
network.
6.1 Basics of Computer Network: • Protocol– A set of rules that establish interaction
A computer network is a group of many computers between various devices in the entire communication
that are connected to each other in such a way that they process, is called protocol.
can exchange their data and information with each other.
• Resources– Hardware available on a particular
A network consists of computers as well as peripheral
computer, are called resources.
devices that are carriers and data communication devices
• Types of Networking– A computer network can
and helps to exchange data and information.
be divided on various grounds. They mainly have
Benefits of Computer Network–Computer network
following types–
has the following advantages–
• On the basis of transmission media– The medium of
transmitting the data to the receiver is called
transmission media. Based on the medium of data
transmission, there are two types of wired network and
wireless network. Wired networks include twisted pair
cables, fiber optics, coaxial cables, and wireless
networks include radio wave, microwave, infrared, and
Fig - 61 Advantages of computer network satellite.
■ Data and File Sharing– It helps the user to share • Depending on the size of the network– there are
data and files. mainly three types of networks on the basis of network
■ Hardware Sharing– It helps users to share size- LAN (Local Area Network), MAN (Metropolitan
hardware like printer, scanner etc. Area Network) and WAN (Wide Area Network).
■ Software Sharing– It helps in easy sharing of
• Based on the Management Method– There are two
software in a network.
types of networking based on the network management
■ Reliability– This allows users to store more than method–Peer to Peer Network and Client Server
one copy of their files on different networks. Network.
M1R5 123 YCT
Search on TG: @apna_pdf
● Based on Topology– Connectivity of computer of glass. In this, light is used for the transmission of
network is called topology. data. Fiber optics supports uni-directional
Types of toplogy, based on networking– bus, star, ring, communication.
tree, mesh.
6.1(i) Transmission Media:
The medium through which two devices are
connected for data communication is called transmission
media.
There are two types of transmission media:
1. Guided Media/Wired technology
2. Unguided Media (Un-Guided Media/Wireless
technology)
1. Guided Media– The media in which the
transmission of data between nodes is through cables or
Fig- 6.4 Fiber Optics
wires, is called Guided Media. The signal travels on this
2. Unguided media– The media in which
media path. information is exchanged without any cable is called
There are three types of guided media: unguided media. Some types of unguided media are as
(i) Coaxial Cable– It carries only high frequency data. follows–
It consists of a copper core as a conductor in which (i) Bluetooth– It was discovered by 'Ericsson' in 1994
the electric current travels from one node to another. and it was wireless. This made it possible to use
Internet can be accessed with data rate of 100Mbps. short wavelength radio waves to exchange data over
short distances (up to 30 feet). The frequency of
Over a distance of one kilometer by using coaxial
waves in Bluetooth is between 2.4GHz to 2.8GHz.
cable. With its help, various computer devices like mouse,
keyboard, printer, modem etc. can be connected
wirelessly.

Fig- 6.2 Coaxial Cable

(ii) Twisted pair cable– In this type of cable, two


copper wires are twisted together, which is covered Fig- 6.5 Bluetooth Technology
(ii) Infrared technology– In this the frequency of
with an insulating material and the outer cover of the
waves ranges from 300GHz - 400THz. It is used for
other layer. Out of these two wires, one wire is used communication in close area for short distance. This
for transmitting signals to the receiver and the other technology is used in TV remote.
wire is used for ground reference (earthing).

Fig- 6.3 Twisted pair cable

(iii) Fiber Optics– It helps in broadcasting over long


distances at high bandwidth. It consists of a glass
core surrounded by a cladding made of another layer Fig- 6.6 Infrared Technology
M1R5 124 YCT
Search on TG: @apna_pdf
(iii) Radio Wave Transmission– In this, Figure- 6.9 Satellite communication
communication takes place through radio wave and Network Based on Size– Following are the types of
their frequency ranges from 3kHz-1MHz. The radio computer network–
wave can transmit data in all directions (Omni-
direction). It can also travel in space, covering very 6.1(ii) Local Area Network (LANs):
long distances. Local Area Network is a network, used within a very
small geographical area (about 1 km) such as home,
school, computer lab, office building etc. It is used to
connect network and computer accessories together. In
this network communication devices like hub, switch is
used. The hub Switch and Router, Ethernet Cable are
connected to the RJ45 port.

Line Fig. 6.7 Radio Wave Transmission


(iv) Microwave Transmission- Microwaves have a
frequency of 1GHz -300GHz, they are also called
electromagnetic waves. These waves are uni
directional.

Fig- 6.10 Local Area Network


Advantages of LANs–
Computers connected in a local area network can
also share resources among themselves. You can
Fig. 6.8 Microwave transmission share devices such as DVD drives, printers,
(v) Satellite communication– In this, the signals scanners, modems, hard drives, etc. by not installing
received from one earth station are amplified and
separate devices for each computer.
retransmitted to another earth station located 100
miles away, it is used for longer distance All the data of connected computers can be stored
transmission. on a single server. User can access data from any
workstation when required.
We can also share the internet connection in the
office or within a certain distance.
Single license software can also be shared over a
LAN.
Through LAN, we can easily and quickly exchange
data and messages.
Each computer is assigned MAC address. MAC
address is used to identify all computers in LAN
during communications which are used to send and
receive data.
Disadvantages of LANs–
LANs are expensive to set up because specialized
software is required to set up the servers. Apart from
this, communication devices like hubs, switches,
routers, cables are expensive.
M1R5 125 YCT
Search on TG: @apna_pdf
All computers can be affected by a server crash if
any file on the server is corrupt or the hard drive
fails, all connected computers can not function
properly.
Networking between only one building or adjacent
buildings can be using LAN. We can not expand
more area of LAN.
Strong security system is necessary for the privacy
of any confidential data.
6.1(iii) Metropolitan Area Networks (MANs):
A MAN (Metropolitan Area Network) is a computer
network that covers cities or large areas. Its purpose is to
provide a link to the Internet for a long time. Its data
speed becomes high. The most widely used technologies
for developing MAN networks are FDDI, ATM, MDS. It
is usually installed using optical fiber. It connects
networks larger than a local area network but smaller Fig. 612 Wide Area Network
than a wide area network. Advantages of WANs–
■ It covers a wide geographical area, If your office is
in different cities or countries, you can connect the
office branches together through WAN.
■ Like a local area network, we can share software
applications and other resources. In web hosting, we
share computer resources among multiple websites.
Disadvantages of WANs–
■ There are more security issues in WAN as compared
to LAN. There are many technologies used with
each other which create security gap.
■ The data being transferred on the Internet can be
accessed and changed by hackers, so there is a need
Fig- 6.11 Metropolitan Area Network
to enable firewall in the computer.
Advantages of MANs–
■ Antivirus software needs to be installed to protect
• Any institution can connect all its branches in one city. the computer from viruses.
• Through this, all the branches of the company can be ■ Setting up a WAN for the first time in an office is
connected to expensive equipment, which makes it very expensive as routers, switches and other
beneficial. security software have to buy.
Disadvantages of MANs– ■ In some areas, ISPs face problems due to poor
• Installation of network is very difficult and requires electricity supply or poor line infrastructure. Due to
experienced persons. which slow speed internet and connectivity
• Installation cost is very high. problems have to be faced.
• Data transmission speed is moderate. A. Wide Area Network is known in the following forms–
(i) Wireless Network– Wireless broadband
6.1(iv) Wide Area Networks (WANs): provides internet connection using radio link between the
A wide area network is a type of network that user's location and the service provider. It does not
transmits voice, data, images, and video over a require any cable or modem. Following are the two
geographic area. It is a group of local area network. Data methods for wireless connection to the internet–
communication becomes with the help of hub, switch, • Wi-Fi (Wireless Fidelity)– This is a wireless
fiber optics, modem and router etc. Technologies like networking technology that provides high-speed
ISDN, Frame Relay are used to transfer data through the Internet connection using radio frequencies without the
Internet. use of Wi-Fi cables or wires.
M1R5 126 YCT
Search on TG: @apna_pdf
• Worldwide Interoperability for Micro Web Access Remote Data and Job Entry– It is possible to save
(WiMax)– It is wireless networking technology that transaction details on the sales terminal using WAN.
provides economic broadband service to enterprise This is necessary for the Branch Office for the purpose
customers. of reporting to the Head Office. For example, sales in a
(ii) Public Network– Public network is a type of
supermarket can be monitored on a daily basis. Through
network in which the general public has access and can
this, the stock of each item can be delivered to the branch
connect to other networks or the Internet through it. It is
the opposite of a Private Network. There are no supermarket on time.
restrictions on public networks so users need to be aware Similarly, through remote job entry in the college,
of potential security risks while accessing it. There is no students can do their projects or other works directly on
technical difference between a private and a public the central computer.
network in terms of hardware and basic structure, except Facilitated Communications–
for security, addressing and authentication systems. This
Facilitated communication is a form of alternate
is the network that is run by telecommunication
companies and available for any organization or personal communication often used in large cities by employees
subscription. PSTN, PSDN, VANS/VADs are types of or people with communication disabilities using a WAN.
public networks. It is used for long distance phone call to save letter
• PSTN (Public Switched Telephone Network)– It is writing, to overcome the cost of preparation of written
based on circuit switching network like internet in document etc. It is through WAN that many users
which the message is divided into different packets conduct computer conferences using their own computer
from source to destination and it is sent in different systems.
packet pieces. It has the characteristics of low speed,
The following are two particularly important types
analog nature of transmission, limited bandwidth and
its wide spread availability. of WAN–
• PSDN (Public Switched Data Network)– Many (a) Hierarchical Network
technologies are included under it. High level of PSDN (b) Distributed Data-Processing Networks
reliability and high quality connection is its main Hierarchical Network– computers are arranged in
feature. It supports high and low level speeds at a the form of hierarchy in smaller and more manageable
reasonable cost.
areas in a wide area network which solves the complex
• VANs (Value Added Network Services)– A value
problem of network design. Computers arranged in
added network is a private hosted service that provides
hierarchies, the network mesh itself is called Hierarchy
a secure way for companies to send and share data
with their counterparties. Electronic data interchange network. The most powerful computer in this network is
between companies value added networks were a the mainframe computer. Often a front end processor is
common method for convenience. used at the mainframe site to handle the input/output data
(iii) Private Network– Computer servers, communication and computer security functions of the
mainframes, network devices or other such devices system, enabling the back end processor to perform the
which share data with each other, their mutual necessary data processing functions.
connection through wire is called network. Such
Distributed Data Processing Networks–
networks which are in your home, office or any
Distributed data processing is a computer networking
particular organization are called private networks.
method in which multiple computers share processing
Some of the functions performed over WAN are as
follows– capacity in different locations. This is in contrast to
Centralizing Information– There is no need to providing a single, centralized server management and
install e-mail, files, backup servers at different branches processing capability for all connected systems.
for an office, all of them can install only in the main Distributed data processing network computers are
office. All the offices can share the data through the located at different places but wireless or are
branch head server only. interconnected through satellite links.
M1R5 127 YCT
Search on TG: @apna_pdf
Difference between LAN, MAN and WAN
Component Local area network Metropolitan area Wide Area Network
network
Types of Small single site network These data networks are A group of local area networks
network made for cities. that may be located over a large
geographic area.

Coverage It connects the devices in the They are bigger than local It can spread all over the world.
Area network located in a short area network but smaller
distance (about 1 km). than wide area network
connects to networks.
Distance Limited Limited Unlimited
Node Desktop desktop or mini computer Desktop
Medium Twisted pair cable, fiber optics Twisted pair cable, fiber Twisted pair cable, fibre optics,
and coaxial cable optics coaxial cable satellite for
wireless
Speed Extreme 1000 Mbps Maximum– 100 to 1000 Minimum– 10 to 100mbps
mbps.
Graphical
representation

Table- 5.1 Types of Computer Network


6.2 Network Topology: Advantages of bus topology–
Topology works to connect computers in the • Its cost is very less.
network through which different computers can establish
mutual communication. • Used in small networks.
Following are the types of network topology– • The network can be easily expanded by
6.2(i) Bus Topology: connecting two cables together.
In bus topology the nodes are connected through a Disadvantages of bus topology–
long cable (BUS). This network is used for short term • Cable length is limited.
broadcasting. Its cost is very less and it is often used in
LAN. Bus topology is completely dependent on only • If the cable damaged, the whole network gets
Cable (Back Bone Wire). If the only Cable is affected, damaged.
the entire network gets damage. Ethernet protocol is
• It works at a slower speed than the ring topology.
often used in the connected network in bus topology.
• When the network traffic is high, the performance
of the connected node decreases.
6.2(ii) Star Topology:
In star topology the nodes are interconnected
through a central controlling device. In this, a hub,
switch or router is used as the central controlling device.
This topology is more expensive than bus and ring
topologies. Hub re-broadcasts the signal, received from
Picture- 6.13 Bus Topology any node of the network to all the nodes.
M1R5 128 YCT
Search on TG: @apna_pdf
Twisted pair cable, optical fiber or coaxial cable is Advantages of Mesh Topology–
used in star topology. Ethernet, a token ring protocol, is • Each connection carries its own data load.
often used in a star topology.
• It provides security and privacy.
• Fault can be easily detected in this topology.
Disadvantages of mesh topology–
• Mesh topology is difficult to install and configure.
• Cable cost is very expensive.
• Bulk wiring is also required.

6.2(iv) Ring Topology:


There is no main computer in this topology. In this,
all the computers are connected to their subordinate
computers in a circular shape. It is also called circular
topology. Due to lack of terminal end in it, the data
signal travels in a circle. Computers are connected to
Fig. 6.14 Star topology each other by twisted pair cable, coaxial cable and optic
fiber. Token pass method is used to provide access to the
• The Hub can be easily upgraded. connected devices in the network.
• Its setup and modification can be done very easily.
• If any one node fails, other nodes can work
smoothly.
• Reduced network traffic and higher performance
speeds.
Disadvantages of star topology–
• Its setup cost is high. Due to which its use is
expensive.
• All the nodes depend on the hub and if the hub
fails, the whole network is destroyed.
6.2(iii) Mesh Topology:
In this topology each node is connected to all other
Fig- 6.16 Ring Topology
nodes. It is the most expensive topology and a
Advantages of Ring Topology–
combination of both bus and star topologies. In mesh
• Ring topology is easy to install and expand.
topology, failure of a device affects only one node and
• The transmitting network does not get affected
does not affect the entire network.
due to heavy traffic even if more nodes are added.
Disadvantages of Ring Topology–
• Trouble shooting is difficult in this.
• Adding or removing a node (computer) affects the
activity of the entire network.
• If one computer fails, the whole network gets
damaged.
6.2(v) Tree Topology:
Under tree topology, one node is connected to
another node and second node to third node, like the
branches of a tree. This topology is an extension of the
star topology. In this, the root node acts as a server. It is
used in wide area network.
Figure 6.15 Mesh topology
M1R5 129 YCT
Search on TG: @apna_pdf
POP: Post Office Protocol is used to receive e-mail.
Since POP is in version 3, it is called POP3. This
protocol operates at the application layer of the OSI
model, Allows clients to download and receive mail from
servers. E-mail can be read offline once downloaded.
SMTP: Simple Mail Transfer Protocol is a standard
protocol used for e-mail service over TCP/IP networks.
This protocol helps in sending e-mail messages. The
SMTP protocol works at the application layer of the OSI
Fig. 6.17 Tree topology
Advantages of Tree Topology– model and helps in the transmission and delivery of e-
• It is a hybrid of bus and star topology. mail over the Internet. It is used for e-mail applications
• Errors can be easily identified and corrected. in the same network as well as in different networks.
• It can be arranged easily. Ethernet– Ethernet protocol is used for
communication. It transfers data in the form of digital
• Other nodes can be added easily.
packets. This protocol can be used only when the
Disadvantages of Tree Topology–
Ethernet network interface card is connected to the
• If the central hub fails, the entire network fails. computer. The microchip embedded in the Ethernet
• Tree topology becomes difficult to maintain as network card contains a unique address code.
more nodes are added. Wi-Fi– Wi-Fi is a wireless networking protocol that
6.3 Protocol: allows devices to communicate without a direct cable
The system, which establishes coordination between connection. It represents a wireless local area network
different devices in the entire communication process, is protocol.
called a protocol. Data and information can be IP– Internet Protocol also known as TCP, was
transmitted from the sender to the receiver only in the developed in 1970. It is an addressing protocol that
presence of the protocol. The basis of computer network allows different computers to establish a network and
is also protocol. Protocols are a set of rules that enable communicate with each other. It maintains the address of
communication between computers in a network. packets based on each standard and each IP packet has a
Following are some protocols– source and destination address.
TCP– Transmission Control Protocol is used for Telnet– Telnet is a set of rules for connecting one
communication in a network. It converts the message system to another. In this the connecting process is called
into a set of packets at the sender itself. It is also called remote login. After entering the user name and password,
connection oriented protocol and it is an important the Telnet session starts. The computer requesting the
protocol which is part of OSI. It works at the transport connection is called the local computer and the computer
layer. accepting the connection is called the remote computer.
HTTP: Hyper Text Transfer Protocol is used to WAP– Wireless Application Protocol provides
transmit information in the form of web pages to services to web browsers. It is a browser used in mobile
browsers. devices.
It is often used to securely download files, media, UDP– User Datagram Protocol is a transport layer
text, etc. from servers. If the data is encrypted and protocol for client server network applications. it is a
transferred over the Internet, it ensures that even if connectionless protocol that transfers data in a network.
someone receives the data, it cannot be easily decrypted. This protocol does not ensure that the data reaches the
It works on the application layer and uses TCP protocol destination properly. Therefore, it is used only in those
for data transfer. It provides additional features for situations where the transmission speed is important
network security using Secure Sockets Layer. rather than the security of the data.
FTP: Through File Transfer Protocol, Internet users Gohper– Gohper is an application-layer protocol
can upload files from their computers to various websites that provides the ability to search and view web
and download them from the website to their computers. documents stored on remote web servers. It works on the
It operates at the application layer of the OSI model. client/server theory.

M1R5 130 YCT


Search on TG: @apna_pdf
6.4 Internet: Every page stored on the World Wide Web is called
The full name of Internet is International Network, it a Web page, which uses HTML (hypertext markup
was started by Vint Karf in 1950, hence he is also called language) to be prepared.
the father of Internet. Internet is a network of networks, ■ The World Wide Web is based on the client/server
it connects all computers at the global level, so that it model. Computer providing internet service is called
helps people to exchange data among themselves, the Web server and user of this service is called Web Client.
data available on the Internet is controlled with the help Client Software is called web browser which runs on
of protocols. Services provided by internet are- email, local computer.
web portals chat, social networking, blogging, online
■ Server software runs on a web host, accessing the
transaction etc.
web by taking an internet connection and then launching
6.4(i) Concept of Internet & WWW: a web browser.
The Internet is a global system of interconnected ■ In a web browser, a page can be visited by typing
computer networks, which is made up of many small and in a URL or clicking on a link. The URL takes the user
large computer networks spread across the world, to the appropriate location to provide the desired
interconnected by various means of communication. In information. URL (Uniform Resource Locator) is the
this, personal, public, business and government networks name of web location, through this web browser and web
etc. are connected. It uses a common set of protocols for server can communicate with each other.
data transmission known as TCP/IP. The primary ■ A URL consists of several parts. The first part
purpose of the Internet is to facilitate the transmission of contains the name of the transfer protocol (http) followed
information. There are many different tools used on the by a colon (:) and two slashes (//). In the second part, the
internet to make this possible. Among these, e-mail, name and address of the server, it is also called the
newsgroups, Telnet, Gopher, FTP and Wide Area domain name of the host computer, which is www. The
Network are important tools. The World Wide Web third part contains the identification of the web server for
(www) is the most popular Internet tool. the connection. Its last part contains google.com to
WWW (World Wide Web)– The World Wide Web identify the specific directory, document and other object
is also called the Web. It is the most popular service on the web server. In its last part, the specific directory,
available on the Internet. It is a large set of
document and other objects are identified on the web
interconnected information that can be accessed on the
Internet with the help of a web browser through server.
hyperlinks. It is the second most popular Internet service http:// www google.com/ index
after e-mail. ←
Part I →←
Part II→←
Part III →←
Part IV→
How does this work?– Figure 6.18 shows the travel
Fig- 6.19 Example of URL
of web pages through networking equipment and
telecommunication systems. ■ Internet routers examines request to determine that
the requests are for which servers URL. Web Server tells
the Internet what request to search for, if the correct
request is made over HTTP://.
■ By receiving the request through the HTTP
protocol, the web server tells which document the user
has requested.
■ When the requested document or object is
received on the main page of the server, then this main
page (Home page) sends that document back to the client
which is displayed on the computer screen.
Figure 6.18 Web pages travel through the 6.4(ii) Website Address and URL:
networking equipment and telecommunication systems Website is a collection of web pages belonging to a
of the Internet. particular person or organization found under the same
■ The World Wide Web is a system that connects domain name. Different pages of the website are linked
information collected on multiple computer to each other with each other through hyperlinks.
with the help of text documents and to send this A website can contain few or many webpages. Steps
information from one place to another, Hyper text to connect to any website are as follows–
transfer protocol is used which exchanges data with the • Type URL for any website in web browser such
help of Hyper link. as- www.youthcompetitiontimes.com
M1R5 131 YCT
Search on TG: @apna_pdf
• The browser tries to connect to the web server. Internet Addressing Scheme– Many computers are
• The web server accepts the request. connected together on the Internet. But each connected
• The homepage of the website is downloaded from computer is assigned a unique address for
the web server on your personal computer. communication, which is called the IP Addressing
• The web page is displayed by the web browser System. IP address is an address that is used to uniquely
and the connection between server and your identify a device on an IP network. The directory system
browser is closed. available in IP addressing is called Domain Name
Web Page– It is an electronic page created using System which converts a name into a numeric (DNS)
HTML (Hyper Text Markup Language). This Provides address.
links to information. A web page can contain text, Domain Names– A set of network resources that are
images, graphs, audio, video or hyperlinks. assigned to users. Through this, computers connected on
Each web page has a unique address called a URL the Internet are identified and located. The domain name
that identifies its location on the network. There are two is always unique and separated by a dot (.)
types of web pages static and dynamic. Static web page Example- google.com, yahoo.com etc.
has the same content every time then it is accessed and The Domain Name System is used to identify
the content of dynamic web page keeps changing at servers and translates domain names into IP addresses. It
every time accessed. is a two-letter abbreviation indicating the name of a
Website Address– The web address is also called single country and a three-letter abbreviation indicating
URL. It identifies the location of a specific web page. the name of the organization.
URLs display the Internet addresses of files on client Some of the key identifiers are as follows–
computers connected to the Internet.
.com – Commercial business
Enter the web page address you want to visit in the
.edu – Educational Institutions
address bar.
.org – Organizations
■ To type a web page address,
.gov – Government entities
• Click on the address bar.
.net – Internet servic provider
• Type in the web page address.
.info – Information services
Example- https://www.featurepics.com

URL (Uniform Resource Locator)– Uniform


Resource Locator (URL) is used to specify an address on
the World Wide Web. It provides network identification
for any resource connected to the web.
Any document or page available on the World Wide
Web can be easily accessed using a URL.
The format of the URL is as follows–
Protocol://host name/other_information
For example, http://featurepies.com
The protocol in a URL describes that how
Fig- 6.20 Typing an address in the address bar information is being transferred through the link. The
• The web page is displayed as shown below. protocol used for web resources is Hypertext Transfer
Protocol (Http). Apart from this, HTTPS, FTP, Telnet
and Gopher protocol are also used in most web browsers
and newsgraps.
The protocol is followed by a colon (:), two slashes
(//) and then the domain name. The domain name refers
the location of the resource. Domain after the name there
are links to files or subdirectories.
Absolute URL– An absolute URL contains all the
information needed to locate a resource on the Internet.
Fig- 6.21 The FeaturePick homepage is displayed. This is a complete path including the domain filename.
M1R5 132 YCT
Search on TG: @apna_pdf
Example- http://www.sparkpay.com/images/img.jpg The development of information technology has
It locates the image file named img.jpg which is completely changed the old education system. Online
available in the Images directory and has the education can be taken at home using the internet.
domain www.sparkpay.com. Today, there are many such online applications, on
Relative URL– A relative URL usually contains which information about almost every subject is being
only the path to a particular file, which is relative to the given better. The development of information technology
absolute URL itself. has made the education system simple, easy and
comprehensive.
Example- http://www.domain.com/default.html
An example of a relative is URL. 6.4(v) Difference between Internet and Intranet:
Through this you can easily create hypertext Internet Intranet
documents. They can be connected by hyperlinks A public network, This is a private
through file names, so that the user can go to another file anyone can access the network, which can be
by clicking on the file name available in a document Internet. accessed only by
while reading it. authorized users.
6.4(iii) Application of Internet: It is the largest network It is a small network
The services received through the Internet are called based on the number of which connects few
Internet Services. Internet services are as follows– devices connected to the devices
Internet.
Communication: Communicating through the
Internet has become easier, faster and cheaper. In the It is a medium to share Intranet is a medium to
Internet, more than one person can be interacted with at Information world wide. share private and
the same time through e-mail, chat, etc. sensitive information in
an organaization.
Education– There have been many changes in the
field of education through the Internet. Individuals can Internet is largely Intranet can be operate
get information about any topic through internet. unsafe, its security by any organization or
Education can be achieved at home through virtual depends on the user's company.
classes. connected device in
network.
Business– There has also been a revolution in the
field of business through Business Internet. With this, Any one can access the Only the members of
maximum profit can be earned by doing business on a informations which are the organization can
large scale. available on internet access the information
present in the network.
Entertainment– One can be entertained sitting at
home by downloading any movie, listening to songs etc. Internet is an Intranet can be
through internet. independent network i.e. accessed by internet,
Online Transactions– Online transactions can be there is no restriction on but it becomes
done using the internet. This is for doing transactions its use. password protected and
can be used by
while sitting at home easy way.
authorized users.
E-Commerce– Buy and sell anything online
through the Internet. There are number of web portals It is a network of Intranet mainly consists
networks, in which a of Local Area Network
available for buying and selling in huge numbers.
network is created by (LAN).
6.4(iv) Difference between Internet and www: combining different
Information technology is a field under which types of networks
computers or other physical devices are used to create (LAN, MAN, WAN).
process, protect and exchange to electronic data. 6.5 ISP and Role of ISP:
Everything related to computing technology refers to An Internet Service Provider is a company that
information technology. This means that the work done provides access to the Internet. The computer of Internet
by the computer and the things related to it like Internet, Service Provider (ISP) is called server computer.
networking, data management etc. are all a part of Within large organizations most users and
information technology. Information technology is also corporations connect to an ISP via high speed links that
commonly known as communication system. are direct connection.

M1R5 133 YCT


Search on TG: @apna_pdf
Choosing an ISP– The quality and reliability of the personal information such as account passwords, credit
services provided by an ISP is highly variable as a card information, messages and photos can be hacked
service. While selecting the ISP, it should be within the from device. A personal hotspot available on a mobile or
local distance and reach the user if required he can tablet is called tether. The device has a mobile network
access immediately. data plan that allows other devices to connect to the
Following are some of the famous ISPs in India– Internet through the hotspot.
• BSNL • Reliance Communications ■ To connect hotspot,
• MTNL • Sify Broad Band • Window key → Setting
• Bharti Airtel • HFCL Infotel Select Network & Internet from Window Setting.
• Hathway Cabel • Tata Communication • Now click on Mobile Hotspot as shown in the
Online Service Internet Gateways–Online services picture below–
provide access to Internet resources through Internet
gateways. An Internet gateway consists of specialized
hardware and software that provides online services to its
customers to access Internet resources.
Choosing a Service– The simplest way to connect
the Internet is through an Internet Service Provider. The
ISP also provides technical support for itself along with
basic technical support. Nowadays, in many cities,
internet is accessed only through VSNL or other private
ISP.
6.5(i) Introduction to IP Address:
The full form of IP is Internet Protocol. It is a Fig- 6.23 Systems Connected to Mobile Hotspot
network layer protocol and provides a number to Or, in Windows 10 your hotspot is displayed in the
uniquely identification to a computer on the Internet. It is wireless network list as shown in Figure-6.24–
a 32-bit value that can also be divided into four separate
parts. Each section consists of 8 bits representing a value
in the range 0-255. All its sections are separated by dot
(.). Each section is known as an octet.
Each group of a 32-bit IP address is divided into 8
bits that are represented in decimal format. Each section
is called an octet and each bit in the octet has a binary bit
(128, 64, 32, 16, 8, 4, 2, 1). Minimum value of each octet
is 0 and the maximum value is 255.

Fig- 6.24 Mobile hotspot as a wireless access point on


6.5(ii) Modes of Connecting Internet: the wireless network list
There are many different ways to access the Internet ■ To turn off the hotspot,
such as Hotspot, Wi-Fi, Broadband, LAN Cable and • You can also disable your mobile hotspot when not
USB Thethering, which are described below– required. It can be turned off by double clicking on
Hotspot– A hotspot is a physical location where the mobile hotspot itself.
people can provide Internet access. You can use a router LAN Cable Connecting Internet– LAN is used to
connected to an ISP via a WLAN, often using Wi-Fi connect two desktops through the Internet. Internet speed
technology. Public hotspots are made for the use of connected is to LAN cable is high. Use of LAN internet
customers at many hotels, airports, railway stations etc. connection is to share internet and files/folders.
Your personal data can be accessed by any hacker Following are the steps to connect one desktop to
by using hotspot. If the user's data is not encrypted, another desktop using LAN internet connection–
M1R5 134 YCT
Search on TG: @apna_pdf
• Find your PC's Ethernet port, usually on the back or
side of desktops and laptops.
• Plug one end of the Ethernet cable into your
computer.
• Plug the other end of the Ethernet cable into the
LAN port. It can be Switch as per your LAN setup,
in LAN port or router.
• Test the network. Computers connected to LAN
ports assign themselves IPs and appear on the
network.
• You should also make sure that you have an account Figure- 6.27 Selecting Change Adapter Settings
and internet connection on your PC. • Different connections are displayed here. You can
• Start Menu → Control Panel select the connection according to you, now select
Ethernet
(Fig - 6.28)

Figure-6.28 Selecting properties


• Right click on the connection and select Properties.
The Local Area Connection properties are displayed
as shown below.
Fig– 6.25 Typing control panel in the search box • Click on the Sharing tab and according to Figure
6.29, under Internet connection Sharing, Click on
the check box next to "Allow of th network users to
• Click on Network and Internet in the Control Panel
connect through this computer's Internet
window.
connections".

Figure- 6.26 Selecting Network and Internet


• A dialog box is displayed. Open the Networking and
Sharing Center in it.
• Click on the option Change Adapter Setting
displayed on the left side of the Networking and
Sharing Center window. Fig - 6.29 Selecting the Sharing tab

M1R5 135 YCT


Search on TG: @apna_pdf
• Click on ok. • Click on ok.
• Now that both the PCs are connected by a single • Connect the Server PC to the Internet and Access
LAN cable and capable of network sharing. the Internet now through another PC.
Networking tab → Internet protocol version 4 Wi-Fi Connections (Wireless Fidelity
(ICP/IPV4)→ Properties
Connections)–Wi-Fi means wireless internet connection,
provides internet access without fixing your device to
any place. Wi-Fi internet connection is also called 'hot
spot'. It provides Internet via Radio Wave instead of
cable. Using a wireless network is more convenient.
Wireless LAN can be installed in very less time.
It provides internet through hub. The hub is
connected to the main computer system or server and
provides internet connectivity to the clients.
Wi-Fi protect Access II (WPA2) encrypts all data
traffic on the LAN.
Following are the steps to connect to Wi-Fi network
using Taskbar–
• Click on a wireless icon present at the bottom right
corner of the taskbar.
Or, open the Action Center by pressing (Windows key
+A) and click on the Network button under the
Quick Actions section and access the Network flight
out as shown in Figure 6.32.

Fig– 6.30 Selecting the Networking tab


• Now you need to configure both the PCs with
different IP addresses as shown in the picture below.
First set the IP address and subnet mask of the
computer in the General tab.

Fig.- 6.32 Wireless icon (to connect)


• Select the wireless network from which you want to
connect.
Fig– 6.31 Setting IP Address in General Tab
M1R5 136 YCT
Search on TG: @apna_pdf
• Check the box next to "Connect Automatically" as You can also use the Internet using mobile
shown in Figure 6.32. broadband technology, for this you need a mobile data
• Enter the Network Security key. card and data plan of broadband provider.
• Click on Next button as shown in figure 6.33.
After getting the device and data plan, activate your
SIM (Subscriber Identity Module) and mobile
broadband.
■ Using mobile broadband to connect to the internet,
• Start button → All programs Accessories → Choose
your broadband Network
• Click on Connect in the opened window.
Connect to USB Tethering– Process of sharing
mobile data for internet access on other devices like
laptop this is called Tethering. You can also share mobile
data via Wi-Fi, Bluetooth but USB Tethering Shares
mobile data at high speed.
■ To connect to USB Tethering,
• Connect your mobile and PC via USB cable.
Fig.- 6.33 Wireless icon (for entering password) • Select setting from your mobile.
• After following the above steps, you will get a • More Networks → Tethering and Portable Networks
connection to a wireless network connection.
• To disconnect Wi-Fi, open the Wi-Fi pane, select the
network you are connected to, and click the
Disconnect button.

Fig- 6.35 Selecting Tethering and Portable Hotspot

• Click on USB Tethering as shown in Figure 6.35.

Fig- 6.34 Wireless icon (to disconnect)


Broadband Connection– A high speed Internet
connection with a speed of at least 256 kbps is called
broadband. Broadband simply means having high speed
internet access. Channel sending signal to its carrier
without modulation, is broadband.
Customers often use landline phones to use
broadband, for which no separate telephone charge is Fig- 6.36 Selecting USB Tethering from Mobile
taken. Internet access is several times faster than normal
dial up access. It offers a high speed (2Mbps) connection
• You can now access mobile internet on your PC.
at a low cost, takes no time to set up and is always on.
M1R5 137 YCT
Search on TG: @apna_pdf
6.6 Identifying IP/MAC/IMEI of Various Class D Address– These are also known as
Devices and their Users: multicast IPV4 addresses. The first four bits of its first
octet are set to 1110. Class D IP addresses range from
IP address provides a number to identify connected
224.0.0.0 to 239.255.255.255. Class D IP address is
computers in a network. It uses Internet Protocol for
communication. reserved for multi casting. In multicasting the data is not
for one but for many. It does not have a subnet mask.
IP address has two main functions- identification of
host or network interface and location addressing. Class E address– It is used for research or
Two versions of IP address are prevalent– development You can assign these IPV4 address to your
IPV4 and IPV6 device can not do. Class E ranges from 240.0.0 to
IPV4– It uses 32-bit IP address. These 32-bits are 255.255.255.254. It also does not have a subnet mask.
divided into four sections, each separated by a dot (.). IPV6– This is the latest version of Internet Protocol.
Each section can contain numbers 0-255. IPV4 is divided IPV6 was developed by the Internet Engineering Task
into two parts – the network part and the host part. Force. It is used in place of IPV6. The size of IPV6 is
Network part– 128 bits and it is represented in hexadecimal. 128 bits are
divided into blocks of 16 bits. Each 16 bit is converted to
a four digit hexadecimal number separated by a colon (:)
lives separately.
This part refers the unique number assigned to your
FE80:CD00:0000:0CDE: 1257:0000: 211E-729C is
network and it also identifies the class of the network.
This IP takes two bytes of the address. an example of a full IPV6 address.
Host Part– This is the part of IPV4 that you assign IPV6 can be simplified in two ways–
to each host. It identifies user's device in network. The 1. Removing leading zeroes, 2. Double colon
network part of the IP address will be the same for all 1. By removing the leading zeros– In any 16-bit
hosts in your network while the host part will be leading zero can be removed. For example, the above
different. example can be written as FE80:CD00:0:CDE
IP Address and Classes– The IPV4 addressing 1257:0211E729C.
system of IP addresses is divided into five classes - Class 2. Double Colon– Double colon (:) can also be used
A, Class B, Class C, Class D and Class E. All classes are in place of series of zero in the above example- The
identified by the first octet. Usually only Class A, Class given address can be written as FE80 CD CDE 1257:
B and Class C are used. 0:211E: 729C.
Class A address– It is used for very large networks. ■ Identifying IP address using command prompt–
It always has the first bit of the first octet. Whose range
• Open the command prompt.
is 1-127.
Class A IP addresses range from 1.0.0.1 to • Type "ipconfig" and press Enter.
126.255.255.254. Its default subnet mask is 255.0.0.0. • It will display IPV4 addresses of all network
The format of an IP address can be written as– connections connected on your network computer.
network⋅host⋅host⋅host It supports 16 million hosts on
each of 127 networks.
Class B Address– It is used for medium size
network. The first two bits of the first octet are always at
110. Class B; The range of IP addresses is 128.1.0.1 to
191.255.254.
It consists of 16384 (214) network address and
65534 (216-2) host address. IP address format for class B
is written in the format of network⋅network⋅host⋅host. It
supports 65000 hosts each in 16000 networks.
Class C Address– This is often used for small or
mid size business. The first 3 bits of its first octet are set
to 110. Class C IP addresses range from 192.0.1.1 to
223.255.254.254. It provides 2097152 (2)21 network
addresses and 254 (28–2) host addresses. Class C IP
address is written in format of network⋅network⋅host. It
Figure - 6.37 List of network connection information
supports 254 hosts each on a 2 million network.
M1R5 138 YCT
Search on TG: @apna_pdf
MAC Address– Its full name is Media Access ■ Recognizing MAC/IP address through Control
Control. It is a unique identifier assigned by the Panel–
manufacturer to the network interface card. This is the • Type Control Panel in the search box and open
unique ID of the hardware used in a network which is Control Panel.
permanently assigned to the adapter and cannot be • Network & Sharing → Change adapter Settings.
changed. This is the physical address. This address is • Right click on the connection for which you want
sent to your local network where it is used to transmit information and select Status from the context menu.
information to computers.
MAC address is a 48 bit hexadecimal address in the
format MM : MM : MM : SS : SS : SS where
MM:MM:MM is the address of the manufacturer and the
remaining half (SS : SS : SS) is the serial number of the
NIC card any network but the MAC address of each
computer is unique. When the NIC card of the computer
is changed, its MAC address also becomes change. This
is Used at the data link layer of the OSI/TCP/IP model.
ARP (Address Resolution Protocol) is used to receive the
MAC address of a device.
■ Identifying MAC Address in Windows 10–
• Start Menu → Settings → Network & Internet →
Ethernet Figure 6.40 Selecting Status
A list of connections is displayed on the right side of • Click on the Details button in the Ethernet Status
the opened window. window.

Fig- 6.38 Selecting Ethernet


• Click on any one connection and you can get the
Fig- 6.41 Selecting details from Ethernet status
information by scrolling in the Properties section.
• The Network Connection Details window displays
information. The MAC address is seen as a physical
address

Fig- 6.39 MAC address displayed in the property Figure- 6.42 In the details window, the MAC address
section displayed as the physical address
M1R5 139 YCT
Search on TG: @apna_pdf
IMEI– International Mobile Equipment Identity can make annotations on web pages that can be stored
(IMEI) is a unique identification number or serial with a drive but cannot save HTML pages.
number assigned to all mobile phones and smart phones. Mozilla Firefox– This is a free open source web
Usually the phone has only one IMEI number but dual browser developed by Mozilla Corporation, it can be
SIM phones have two IMEI numbers. This is a 15 digit used in Windows, Linux, Macintosh etc. operating
number which is used only to identify the device. This systems. It can also be downloaded from its official
number is used to identify legitimate devices through the website.
GSM network and steal the phone from it to others. Its Opera– Opera is a free Internet browser available
use can be prevented by the person. for mobile phones and computers. It includes features
■ To check IMEI, like tab browsing, page zooming, mouse gestures and an
• Dial *#06# from your mobile phone keypad. The integrated download manager. Opera comes with a free
IMEI number is also written on the back of the Virtual Private Network (VPN) that works on private and
battery of the mobile phone. public, free internet and protects your location from
hackers. Opera's VPN blocks your location when using
the public Internet, providing additional protection
against malware. The Opera Portable browser, available
for Windows, stores your browsing history, bookmark
extensions and other private data on a portable storage
device such as a USB drive.
Google Chrome– This is a web browser developed
by Google Company in 2008, which is becoming popular
for its fast speed and better security provisions. It is a
web browser primarily released for Microsoft Windows.
■ To open Microsoft Edge,
• Click on the Microsoft Edge icon on the taskbar.
Figure - 6.43 IMEI number

6.7 Popular Web Browsers:


A web browser is a software application that allows
a user to view and display web pages the present text and
images can be a hyperlink on web page that can be easily
accessed on another web page by clicking on them. Web
Browsing software is the client of the Internet server,
which is provided free of cost by Microsoft Corporation
and many other companies. Through this we send,
receive or retrieve any information on the Internet. Web
Fig- 6.44 Selecting Microsoft Windows
browser identifies the location of the requested page only
when it is given URL.
Following are the parts of Microsoft Edge–
Following are some of the famous web browsers–
Microsoft Internet Explorer– It is a popular web Title bar– The title bar at the top of the Internet
browser manufactured by the Microsoft company it is Explorer window is that displays the name of the current
also a type of Windows component that helps in web page to the left. There is a Minimize, Maximize and
accessing and navigating web pages. Restore button on the right side of the title bar.
Internet Explorer supports HTML4.01. CSS Level 1 Address bar– It displays the address of the web
XML 1.0 and DOM Level this is the default of windows page you are currently viewing. You can also use the
Browser which is now replaced by Microsoft Windows. address bar for navigation can be used. Type the address
Microsoft Edge– This is the latest web browser for of the page in the address bar you want to go to and press
Windows 10. In Windows 10 Internet Explorer 11 is also Enter following are the buttons–
available with it for compatibility. The browser includes • Back: Displays a page from a list of previously
integrated Adobe Flash Player and a PDF reader. User viewed pages.
M1R5 140 YCT
Search on TG: @apna_pdf
• Forward: Displays the page from the list of viewed • Type the address of the web page
pages ahead. (eg http://gmail.com)
• Stop: Stops the downloading of the current page.
• Refresh: It displays the updated version of the
current web page.
Reading View– Clicking on the book icon displays
the clean view to go to reading mode by removing the
distraction of its main content.
Reading List– It allows you to save web pages for
later viewing like in the favorites folder you can also add
web pages to the reading list.
Pinning sites to the Start menu– Open your
favorite website and click on the Settings button. Now
click on the "Pin to start" option from the displayed
Settings menu. Now your favorite website will be
displayed on the start menu.
Sharing– Regularly opened web pages can be Fig- 6.45 List of previous web page addresses
shared by sending a link. • The web page is displayed.
Advanced Tab Management Option in Edge– ■ Redisplaying the web page,
Browser Edge has focused on tab browsing in tab
management option. Right click on the any browser tab.
This will display a context menu option. It can be used to
reopen closed tabs, refresh tabs, close all tabs, etc.
6.8 Exploring the Internet:
The huge network that connects small networks of
computers is called the Internet. It is a major tool for
sharing computer resources, communication with people,
etc.
6.8(i) Surfing the Web:
Internet browsing by going from one web page to Fig- 6.46 Gmail web page

another web page using hyperlinks in the Internet • Click on the drop-down arrow of the address bar.
browser is called Web surfing. The term surfing was first • A list of the addresses you typed is displayed. Select
used by Mark McHill. When a person is surfing the the site address of your choice.

internet, he is called a surfer or net surfer. Web is the • The web page is displayed.
only way to get information about different topics on Opening a Web Page in a Tab– While browsing
the web, it is sometimes more convenient to open a web
different websites, it's called surfing.
page in a new tab than the one you are currently using.
■ Accessing the web browser,
By doing this you can do your work on one site as well
• Open Microsoft Edge from the taskbar. as other sites can open to load. You can open multiple
• The initial page of the browser is called the home pages in different tabs at the same time.
page and can be set to any page on the Internet. ■ To open a web page in a tab,
■ Typing a web page address, • Right click on the link you want to open.
• Click on the address bar. • Click on Open in New Tab.

M1R5 141 YCT


Search on TG: @apna_pdf

Fig- 6.49 Setting Home Tab in General Pane


• Select an option by clicking on the drop down
Fig- 6.47 Opening in New Tab button under Set your home page button.
• A new page will be displayed with the page title. • Type the address of the website which you want to
set as the home page.
6.8(ii) Popular Search Engines:
With the help of search engine, we can search the
desired information from the internet. Search engines
maintain a list of all web pages located on the web. The
search engine searches a web page on the basis of its
title, key words or any phrase located on that page. The
search results that are displayed usually arranged in a list
according to the most frequently visited pages. The
information being displayed includes text, images, web
pages, etc.
Some of the popular search engines available on the
web are:
Figure-6.48 New tab with page title
Yahoo– Yahoo is a very popular and used search
Navigating Web Pages– You can easily navigate to
engine and web portal all over the world. It is mainly a
previously visited web pages by navigating pages. You search directory with subject catalogs arranged in order
can go through and you can also move to the next page and it is very easy to browse and search.
again. You can search on Yahoo in two ways–
• To go back to the previous page, click on the button 1. Yahoo! Search Page,
or press Alt + Left Arrow together. 2. Yahoo! Search Options.
• Go forward one page; For this, click on the Forward Bing– This is a search engine launched by Microsoft
button or press Alt + Right Arrow simultaneously. on May 28, 2009. It fulfill your requirement and displays
Setting the Home Page– For browsing, as soon as useful search results after organizing.
you open the browser, a lot of information starts being Opera– It is a web browser developed by Opera
displayed on it, which can confuse you. To avoid this, Software. Its latest version is available for Microsoft
you can designate one or several pages as your home Windows, Linux operating system OSX etc. This tab is
page. Home page is the first web page displayed after the first browser with RSS support, built-in BitTorrent. It
opening the web browser. allows you to duplicate tabs, Goto URL feature for web
address, fit window size, cache recovery, page zoom,
■ To set the home page,
instant back, close tabs, etc.
• In Microsoft Edge, click on Settings and more
MSN– It is an abbreviation for Microsoft Network.
(Alt+X), which appears on the right side of the
Web based programs and services offered by Microsoft
browser window. Corporation in the network are included. In 1996, MSN
• Click on the Settings option and the General pane 2.0 introduced a version of Internet Explorer called MSN
appears as shown in the figure below. Program Viewer for web access. MSN partnered with
M1R5 142 YCT
Search on TG: @apna_pdf
Verizon and other carriers to offer DSL connections in 6.8(iv) Downloading Web Pages:
addition to dial-up. A web page is a term used on the World Wide Web
ASK.Com– It is a question-answer based e-business that is a source of information which can be accessed
and web search engine. ASK Browser Toolbar is an through a web browser. The meaning of downloading
extension that displayed as an extra bar on the browser web pages is to save that page in your computer, internet
window. facility for uploading and downloading of FTP files.
Google– Google is a very popular and most used ■ To download the web page,
search engine. It accepts the search terms and searches • Menu button → Save
them in its index database and returns a list of URLs as a The Save As dialog box is displayed.
result. It provides priority ranking of the web page on the
basis of keywords, content and number of web pages
linked to it.

6.8(iii) Searching on Internet:


There are many search engines available on the web,
on which we can search and get information. The process
of searching is similar in some search engines.
information searching process of Google is described
below.
■ To search a web page,
• Type www.google.com to go to Google's home
page. Fig- 6.52 Save Web Page Dialog
• In the search box displayed in the opened dialog • There is a default value in front of the File Name,
box, type the information related to which you want you can save the file with the same name or by
to get.
another name.
• You can also select the drive location from the
address bar.
• Save the file by clicking on the Save button.
6.8(v) Save Complete Web Pages as PDF:
Follow these steps to save a webpage as PDF in
Google Chrome–
• Open the web page you want to save as PDF in
Chrome.
• Click on the three dots icon in the top right corner of
the Chrome interface to open the Settings menu,
Figure- 6.50 Google search
then select the "Print" option from the drop down
• It displays different website links- (Figure 6.51)
menu choose, Windows shortcut Alternatively, you
Selecting a link and right clicking on it will open in
can also use "Ctrl+P" on windows or "Command+P"
a new tab.
on Mac.
• You can apply PDF output settings to the newly
opened "Print" window.
Destination: Select "Save as PDF" on the destination
option.
Pages: The webpage will be displayed as PDF pages
preview on the left column of the window. You can
select to save all pages as PDF or convert selected
pages.
Pages per sheet: This setting option determines how
Figure- 6.51 Search Result many pages a sheet will display in your converted
M1R5 143 YCT
Search on TG: @apna_pdf
PDF. After finishing all the settings click on the
Save button and choose a destination to save the
PDF on your local device. Google Chrome will save
a webpage as a PDF file with the original content,
images, links and CSS layout at maximum detail.
6.8(vi) Printing Web Pages:
When we browse through web browser, web pages
related to our requested information are displayed. If you
want to have a hard copy of web pages print them.
There are many print options in Internet Explorer
8.0 which are as follows–
(i) Printing all the documents related to the current
page.
(ii) Printing the list of links present in the current
page.
(iii) Printing the selected portion of the current page.
To print a web page using the print dialog box,
follow these steps–
1. File Menu → Print or,
Fig- 6.53 Print Dialog Box
Right click → Print on web page
3. Select printer, Pages & Number of Copies.
2. A Print dialog box will be displayed.
4. Click on the Print button

Practice Questions with Explanatory Solutions


1. An underlying TCP/IP protocol for accessing (a) PUSH (b) SMTP
remote computers is: (c) POP (d) both (b) and (c)
(a) Telnet (b) MIME Ans. (d) SMTP (Simple Mail Transfer Protocol) and
(c) UDP (d) All of the above POP (Post Office Protocol version 3) are used to
download and send e-mail from the e-mail server.
Ans. (a) Telnet is a protocol that provides a command
Whereas PUSH notifications are messages that pop-up
line interface for communication with a remote device
on the user's device.
or server. Telnet is a set of rules for connecting one
system to another. In this the connecting process is 4. Example of computer communication is–
called remote login. After entering the user name and (a) Voice mail
password, the Telnet session starts. Computer (b) E-mail
requesting connection is called the local computer and (c) Online Social Networks
the computer that accepts the connection is called the
(d) All of the above
remote computer.
Ans.(d) Communication refers to the process when
2. The preferred media for backbone network is:
information is exchanged between two mediums. In
(a) twisted pair cable (b) fiber optics this, the sender of the information is called the sender
(c) both (a) and (b) (d) none of these and the receiver is called the receiver and a medium is
Ans. (b) Twisted pair cables are such wires in which required to exchange the information. Voice mail, e-
two wires are twisted with each other. Current time mail and online social networks are examples of
fiber optical cable is used as the media for the computer communication.
backbone network. 5. Google chrome is–
3. The protocol used to download e-mail from e- (a) Web browser (b) Social media
mail server is– (c) Search engine (d) None of these

M1R5 144 YCT


Search on TG: @apna_pdf
Ans. (a) Google Chrome is a web browser with the Ans. (b) Ping is a network utility tool that is used to
help of which information available on the Internet check network errors. Ping verifies whether the
can be accessed. This web browser is developed by network is capable of delivering data packets to an
Microsoft. address without error.
6. On the motherboard of each computer connected 11. The full form of SMS is–
to the network, there is a special circuit called. (a) Simple Message Service
(a) NIC (b) Cache (b) Sort Message Service
(c) CMOS (d) BIOS (c) Simple Message System
Ans.(a) Motherboard is the most important part of the (d) Sort Message System
computer in which all the necessary devices like CPU, Ans. (b) The full form of SMS is Sort Message
RAM, BIOS, CMOS, mouse, monitor, keyboard etc. Service. Earlier, only small messages of one or two
are connected. NIC (Network Interface Card) is used lines were sent through SMS, but after gradually
to connect the device to the Internet. It is a circuit changing it, now users can send big and attractive
connecting network cables to the computer, with the messages according to themselves.
help of which the arrival of data is fast. This card is 12. The full form of GPRS is–
installed in the motherboard of all the computers (a) General Packet Radio Service
connected in the network. (b) General Pocket Radio Service
7. Which of the following is a stateless protocol? (c) General Packet Radio System
(a) HTTP (b) UDP (d) None of these
(c) Both (a) and (b) (d) FTP Ans.(a) The full form of GPRS is General Packet
Ans.(c) HTTP (Hyper Text Transfer Protocol), is a Radio Service. It is a service that transmits data
stateless protocol i.e. all the requests sent by the client through radio waves. It is a packet oriented mobile
are executed individually and the connection is closed data service for global system for mobile
after the response to the request is given. communication mainly on 2G, 3G cellular
communication systems.
8. Full name of URL is–
13. The shortcut key for bookmarking the current
(a) Uniform Resource Locator
page in Google Chrome is–
(b) Universal Resource Locator
(a) Ctrl + B (b) Ctrl + G
(c) Uniform Resource Location (c) Ctrl + Shift + B (d) Ctrl + D
(d) None of these
Ans. (d) In Google Chrome, the combination of Ctrl +
Ans. (a) The full form of URL is Uniform Resource D shortcut is used to bookmark the current page and
Locator. Uniform Resource Locators (URLs) are used Ctrl + Shift + B to show or hide the bookmark and
to identify addresses on the World Wide Web Used to Ctrl + Shift + O shortcut key combination is used to
specify. It provides network identification for any open the bookmark manager.
resource connected to the web. Any document or page 14. The full form of MAN is–
available on the World Wide Web can be easily (a) Men Area Network
accessed using a URL.
(b) Metropolitan Area Network
9. Which protocol is used for video conferencing– (c) Measure Area Network
(a) VOIP (b) SMTP (d) None of these
(c) UDP (d) FTP
Ans. (b) MAN (Metropolitan Area Network) is a
Ans. (a) VOIP (Voice Over Internet Protocol) is an computer network that covers cities or large areas. Its
Internet technology that allows video calls to be made purpose is to provide link to internet for long time. Its
without analog lines using Internet Protocol networks. data speed is high. To develop MAN network most
VOIP protocol is used for video conferencing is. comprehensive technologies commonly used are
10. A network utility tool is– FDDI, ATM and MDS. It is usually installed using
(a) PUSH (b) Ping optical fiber. It connects networks larger than a local
(c) GPRS (d) All of the above area network but smaller than a wide area network.

M1R5 145 YCT


Search on TG: @apna_pdf
15. What is the full form of IMEI? domain name of the host computer, which is www.
(a) International Mobile Equipment Information The third part contains google.com to identify the
(b) International Mobile Equipment Identity specific directory, document and other object on the
web server for connection. In its last part, the specific
(c) International Mobile Educational Identity
directory document and other objects are identified on
(d) International Machine Equipment Identity the web server.
Ans. (b) The full form of IMEI is International Mobile http:// www. google.com/ index
←→ ← → ← → ←→
Equipment Identity. This GSM IDEN is a unique PartI PartII PartIII PartIV
number to identify mobile phones as well as some
19. The full form of MAC is–
satellite phones. Most phones have an IMEI number,
but dual SIM mobiles, there are two IMEI numbers. (a) Media access control
(b) Medium access control
16. How many bits of IP address are used in IP4–
(c) Media Authority Control
(a) 32 bits (b) 64 bit
(d) None of these
(c) 128 bits (d) none of these
Ans. (a) MAC (Media Access Control) is also called
Ans.(a) It uses 32-bit IP address. These 32-bits are
physical address of device. Even being large number
divided into four sections, each separated by a dot (.).
of devices in a network, each device has to be
Each section can contain numbers 0-255. IPV4 is
assigned a unique MAC address. A MAC address is a
divided into two parts, the network part and the host
48 bit unique 12 digit Identification number.
part.
20. Which of the following is not an example of a
search engine?
(a) Google (b) Bing
That part tells the unique number assigned to your (c) Yahoo (d) Opera
network and it also identifies the class of the network.
Ans. (d) It is a specialized software program. Search
This takes two bytes of the address.
engines serve the requested information from the
17. How many bit is the IPv6 size? information available on the Internet. Search engines
(a) 32 bit (b) 64 bit maintain a list of all web pages located on the web.
(c) 128 bit (d) none of these Search engines refer to a web page as keyword its title
or that Searches on the basis of a Phrase located on the
Ans.(c) It is the latest version of Internet Protocol.
page. Google, Yahoo, Bing, Aol.Com, Wolframalpha
IPV6 was developed by the Internet Engineering Task
Lycos, Ask. Com, Baidu etc are popular search
Force. It is used in place of IPV6. The size of IPV6 is
engines.
128 bits and it is represented in hexadecimal 128 bits
are divided into blocks of 16 bits. Each 16 bit is 21. The frequency of waves in bluetooth are–
converted to a four digit hexadecimal number (a) 2.4 GHz 2.8 GHz (b) 1GHz-3MHz
separated by a colon (:) varies by, (c) 6.2 GHz-73 MHz (d) 2 GHz-3MHz
FE80:CD00:0000=0CDE:1257:0000211E:729C Ans.(a) It was discovered by 'Erickson' in 1994 and it
this is an example of a full IPV6 address. was wireless. This made it possible to use short
18. The first part of the URL contains– wavelength radio waves to exchange data for short
(a) Server name (b) Domain name distances (up to 30 feet). The frequency of waves in
(c) Transfer protocol name (d) Two slash (//) Bluetooth is between 2.4GHz to 2.8GHz. With its
help, various computer devices like mouse, keyboard,
Ans. (c) URL (Uniform Resource Locator) is the printer, modem etc. can be connected wirelessly.
address of a file or web site on the Internet. It
represents the website or page of the website. There 22. The types of public network are–
are several parts to a URL. The first part consists of (a) PSTN
the name of the transfer protocol (http) followed by a (b) PSDN
colon and two slashes (://). In the second part, the (c) VANs.
name of the server is known, it is also called the (d) All of the above
M1R5 146 YCT
Search on TG: @apna_pdf
Ans.(d) Public network is a type of network in which Ans.(d) In a graphical web browser, the interface
general public has access and can connect to other between the user and the World Wide Web is
network or internet through it. It is the opposite of a represented by graphs or icons or blue colored text. In
private. There are no restrictions on public networks this, users can also navigate using hyperlinks. like-
so users need to be aware of potential security risks chrome opera etc. Mosaic was the first graphical web
while accessing it. There is no technical difference browser.
between a private and a public network in terms of
hardware and basic structure, except for security 27. IP address number varies till–
addressing and authentication systems. This is the (a) 1–255 (b) 2–255
network that is run by telecommunication companies (c) 0–254 (d) none of these
and is available for any organization or personal
Ans. (b) The full form of IP is Internet Protocol. It is a
subscription. PSTN, PSDN, VAN/VADs are types of
network layer protocol and provides a number to
public networks.
uniquely identify a computer on the Internet. It is a
23. What is LAN short for? 32-bit value which can also be divided into four
(a) Local Area Nodes different parts. Each section consists of 8 bits that
(b) Large Area Network represent a value in the range 0-255. All its sections
(c) Large area nodes are separated by dot (.). Each section is known as an
(d) Local Area Network Octet. Each group of a 32-bit IP address is divided
into 8 bits that are represented in decimal format. Each
Ans.(d) Local Area Network in a very small section is called an octet and each bit in the octet has a
geographical area (about 1 km) like home, school, binary weight (128,64,32, 16,8,4,2,1). The minimum
computer lab, office building etc. are networks used value and maximum value of each octet is 255.
within the group. It is used to connect network and
computer accessories together. In this communication 28. What is NIC?
device like hub, switch is used. Hub, Switch and (a) network interface card
Router by RJ45 port, connected to Ethernet cable. (b) network information card
24. The full form of www is. (c) network interface computer
(a) World Wide Web (d) Network Information Computer
(b) World Wide Windows Ans.(a) Network interface card is a circuit connecting
(c) Window Wide Web network cables to the computer, with the help of
(d) World Wide Website which this card is installed in the motherboard of all
Ans. (a) The World Wide Web is also called the Web. the computers connected in the network.
It is the most popular service available on the Internet. 29. Ethernet is–
It is there is a vast set of interconnected information (a) LAN (b) MAN
that can be accessed on the Internet with the help of a
web browser. It is the second most popular Internet (c) WAN (d) A chemical
service after e-mail. Ans.(c) Ethernet protocol is used for communication.
25. Who created Internet Explorer? It transfers data in the form of digital packets. This
(a) Microsoft (b) IBM protocol can be used only when an Ethernet network
interface card is connected to the computer. The
(c) Dell (d) None of these microchip embedded in the card contains a unique
Ans.(a) Internet Explorer is a popular web browser address code.
developed by the Microsoft company, it is also a type 30. The full form of ARPANET is–
of Windows component used to access and navigate
(a) Advance Research Projects Agency Network
web pages. Internet Explorer HEML4.01. CSS Level
1. Supports XML 1.0 and DOM Level. It is the default (b) Advance Research Projects Agency Network
browser of Windows which is now replaced by (c) Asymmetric Routing Project Advance Network
Microsoft Edges. (d) none of the above
26. Which of the following is considered to be the Ans. (a) The full form of ARPANET is Advanced
first graphical web browser? Research Projects Agency Network. This early packet
(a) Nexus switching network was the first to implement the
(b) Netscape Navigator TCP/IP protocol suite. Beginning of ARPANET
Advanced Research of the United States Department
(c) Internet Explorer
of Defense Projects Agency (ARPA).
(d) Mosaic
M1R5 147 YCT
Search on TG: @apna_pdf

7 E-MAIL, SOCIAL NETWORKING


& E-GOVERNANCE SERVICES

7.0 Introduction:
E-mail is a popular feature of the Internet. It is a
cheap, fast and reliable medium of exchanging
Messages, Videos, Images, Graphics etc. It is a
client/server application that provides a routed, stored
message service between two e-mail accounts. With
modern computers connected to the Internet, users can
send e-mail from any location.
7.1 Structure of E-mail:
E-mail messages are composed of binary data, most
often in ASCII (American Standard Code for
Information Exchange).

Fig-7.2 Main parts of e-mail message

Figure-7.2 shows the sections of an e-mail message.


Attachments and signatures are completely optional;
many messages do not display them.
E-mail Addressing–To send or receive any e-mail
user's e-mail address is very necessary. It is made up of
two different parts–
1. User Name 2. Domain Name

1. User Name– This is the personal identity on the


mail server given by the user, which can be used only
once on a server. This is called the @ (at the rate)
symbol which is automatically added to the e-mail.
2. Domain Name– This is the name of the server on
which you want to create your e-mail account.
Fig-7.1 E-mail Format
The structure of an e-mail message is shown in
Figure-7.1 In 'To', you type the e-mail address of the
recipient of the email massage and in 'From' your e-mail
address appears. In 'Subject' you can type the subject or
summary of your e-mail. At the bottom of the message,
there is a 'Signature' area where you can put any personal
information about yourself. There are five parts of an e-
mail message– Figure- 7.3 E-mail address
Header– It contains the date and time of sending
• e-mail address message, the subject of message, carbon copy (CC) and
• Header information related to the attached files and the e-mail
• Body address of the sender. Following are the header fields
• Signature (optional) related to message transport which are required for the
• Attachments (optional) users of e-mail facility–
M1R5 148 YCT
Search on TG: @apna_pdf
Name Function 7.2 Using E-Mail:
To Email address of primary recipient Through e-mail, users can send or receive data
CC The email address of the secondary anywhere in the world. Any user can access e-mail in
recipient to whom copied email is send. two ways. First through e-mail client and second through
From E-mail Address of sender web based e-mail pattern.
BCC The email address of the secondary 7.3 (i) Opening an E-mail Account:
recipient to whom a copy of the email is To send e-mail, you must have an e-mail account.
being forwarded, but the primary recipient There are many free websites and web portals available
is not aware that the email has been on the Internet to open an e-mail account, using which
received by someone else. you can open an account. Some of these are as follows–
Sender E-mail Address of Original Sender • www.hotmail.com
• www.yahoo.com
Received Transfer Agent's Identity, Message ● www.gmail.com
Received date and time etc. • www.msn.com
Return It is used to identify the return path to the • www.rediffmail.com
Path sender User can create their account on gmail by following
Following are some other header fields, which are these steps–
not necessary but are used if required– Type www.gmail.com in the address bar of a web
• Date– Date and time of sending message. browser and press Enter key.
• Reply To– The e-mail address to reply to.
• In Reply-to–Identification number of these replied
messages.
• Message ID– A unique number to identify the
message.
• Reference– Identification number of the other
message.
• Keywords– User selected keywords.
• Subject– A one-line display of the message is being
sent.
• Body– It contains the text of the e-mail message and
the icon of the attachment. This is the primary location
of the entire e-mail.
• Attachments– Attachments can be sent by adding
text, table, graphics, animation, audio or video to any
file with an e-mail. It Contains personal information of
the sender which is optional. Fig- 7.4 Gmail Google Window
• Bounce mail– When an e-mail is sent, if it does not Click on Create an Account button.
reach the intended destination, then that e-mail comes Gmail account window is displayed like picture-7.5–
back to the sender, it is called bounce mail.

Signature– Signature is personal information in


email message that appears automatically at the bottom
of the outgoing message.
Carbon Copy– To send the message through CC to
more than one recipient, their e-mail address is written in
Carbon Copy (CC). Under this, the person receiving the
message from the mentioned e-mail address also gets to
know that apart from him, who else has received this
message.
Blind Corbon Copy– BCC (BCC), it is exactly like
CC, the only difference is that in BCC, the recipient does
not know which other people have received this message.
The header displays the following information–
• Date and time of the message.
• Message subject
• Where carbon copies have been sent.
• Files attached to messages
Fig-7.5 Typing information in the Google Account text
• Sender's e-mail address box.
Configuring E-mail Client– E-mail address can be Type first and last name in the name box.
changed only by configuring the e-mail client. Agents In the Username box, type the login ID which you
are registered with the software to access e-mail. want to create.
Outlook 2010, included with Internet Explorer 8.0, Type the password in the Password text box.
is the e-mail program through which we can Retype the password in the "Confirm your
communicate all over the world. password" section.
M1R5 149 YCT
Search on TG: @apna_pdf

Figure-7.6 Verifying Your Account through Google


Account

Type your mobile number in the Phone number box.


Click on Next. Fig- 7.9 Welcome Screen
Type the verification code sent by Google to your Click on the message received by gmail team.
mobile number in Enter Verification Code.

Fig- 7.7 Mobile Verification


Enter an e-mail address in Recovery Eamil Address.
This is optional.
Enter your date of birth in date of Birth section. Figure - 7.10 Gmail Mailbox Window
Select the type of gender in the Gender drop down You can type a new e-mail message by clicking on
list. the Compose button. It is displayed on the left side
of the window.

Fig- 7.11 Selecting compose mail


Several fields are displayed in the compose message
window which are as follows– (As per Figure 7.12)
Figure 7.8 Selecting date of birth and gender (a) In the To: section, type the e-mail address to
Click on Next in it. which the e-mail is to be sent.
Click on the agree button in the Privacy and terms (b) Enter the title of the message in the Subject
window. section.
Now the Welcome window of gmail is displayed, (c) Type the message body in the message area.
M1R5 150 YCT
Search on TG: @apna_pdf

Figure- 7.14 Account Settings Dialog Box


Click on the New...button. This displays the Add
Account dialog box as shown in Figure 7.15.

Figure-7.12 New Message Window


Send the message by clicking on the Send button.
The sent message is displayed in the Gmail Inbox
window.
You can sign out of your Google Account by
clicking on the drop down arrow below your email
address and selecting the Sign out button.
Adding an E-mail Account in MS Outlook 2010–
Before adding an e-mail account in MS Outlook 2010,
you must have the following information–
• The type of e-mail server, you use such as POP3 Fig- 7.15 Add Account Dialog Box
(Post Office Protocol 3), IMAP In displayed dialog box type your name in the Your
• Your account name and password Name: section and your e-mail address under E-mail
Address Section. Enter your account password in
Following are the steps for setting up an e-mail Password: and confirm your account password in
account in Outlook 2010– Retype Password and click on Next > button.
File tab → Info tab On clicking the Next > button, another dialog box
Under Account Information click on add Account or appears which Displays the Progress indicator of
click on Account Settings drop down arrow. your account configuration. This may take several
minutes.

Fig- 7.13 Setting E-mail Account Figure- 7.16 Adding an account while configuring the
The dialog box appears as shown in figure-7.14. e-mail server settings
M1R5 151 YCT
Search on TG: @apna_pdf
After the account is added, you can add multiple 7.5 Creating and Sending a New E-mail:
accounts by clicking on the Add another Account With the help of Microsoft Outlook, we can easily
button. create and send any mail. Before creating and sending
Click on the Finish button to exit the Add Account
the e-mail, the e-mail address of the message recipient
dialog box.
has to be ensured.
7.4 Mailbox:Inbox and Outbox: After logging in to the e-mail account, click on the
A mailbox is the storage area of an e-mail account
that holds received e-mail, sent e-mail, and some Compose button on the top left corner of your Gmail
additional e-mail folders. As soon as an e-mail arrives at inbox. This opens a New Message window at the bottom
the mailbox, the e-mail software automatically stores it right corner.
in the user's mailbox and stores it until the user reads it.
In this, recently received messages are at the top and
old messages are at the bottom. You can sort the message
list by clicking on any field header (From, Subject,
Recieve etc.).
The Outbox is the part of the e-mail account that
stores e-mails that have not been fully delivered. Once
done, it is moved out of the Outbox and stored in the
Sent Item.
You can view the contents of the outbox and edit
them before sending.
Editing messages in Outbox
• Click on Outbox in the Folder pane to select it.
• Double-click the message header in the message list
pane.
• An edit window is displayed and you can edit the Fig- 7.18 Selecting mail to open new message window
message in it. Insert other people's e-mail addresses into the
• After clicking on Send, it goes back to Outbox. different fields. Like–
• It prompts to connect, click on Cancel. (a) To; To whom to send the e-mail (recipient). Enter
Sending a message from outbox. that e-mail address.
• Click on the Send/Receive tab and select the (b) CC; To send the message more than one recipient,
message you want to edit. their e-mail address is written in carbon copy (CC).
• When offline it prompts the user to go online, click Under this, the person receiving the message from
on yes and then click on Connect. the mentioned e-mail address would also have this
• After clicking on the Connect button, the message is information that, who else has received this
sent to the recipient address. message.
Logging In of an E-mail account– After creating e-
(c) BCC; It is exactly the same as CC, the only
mail account, the user can sign in, that is, by opening the
e-mail account, user can see their e-mail. difference is that in (BCC) the recipient is not
For this, go to the homepage of the web site where known which other people have received this
you have your e-mail account. There will be a dialog box message apart from him.
display for Sign in, after entering your e-mail ID and (d) Subject; one-line display of the being sent message.
Password, your Gmail box will open. After successful (e) e-mail; Type the message body in the message.
login, you can view the e-mails in your inbox.

Fig – 7.19 After entering the e-mail address, click on


the send button.
Figure- 7.17 Gmail account sign in form Click on Send to send the message to the recipient's
address.
M1R5 152 YCT
Search on TG: @apna_pdf
7.5(i) Replying to an E-mail Message: • Go back to the Settings page of the Gmail account
To reply means to answer to received an e-mail. from which you want to forward messages and
Follow these steps to reply to an e-mail– refresh the browser.
Open the email which you want to reply.
Click on the 'Reply' option to answer only to the • Click on the Forwarding and POP/ IMAP tab.
sender of the e-mail. • Forward a copy of incoming mail in the Forwarding
Click on 'Reply to all' to reply to all the recipients of section.
To and Cc boxes. • Select the Recommend option with the Gmail copy
of the e-mail.
• At the bottom of the page, click Save Changes.

Turning off automatic forwarding;


• Open Gmail on your computer using the account,
you want to stop forwarding messages from.
• Click on Settings in the top right and then View all
settings.
• Click on the Forward and POP/ IMAP tabs.
• In the Forwarding section, click on Disable
forwarding.
Figure- 7.20 Reply, Reply All Options
You can write reply to your mail message and click • At the bottom, click on Save Changes.
on Send button. 7.6 Sorting and Searching of E-mail:
Any mail can be searched with the help of the search
7.5(ii) Forwarding an E-mail Message: box, but you can organize them on the basis of sender
Sending a message received on an e-mail box to name or suject and then it can be searched easily in all
another person is called e-mail forwarding. You can
forward an e-mail with the following instructions– mail, send or inbox mail. All mails are mostly organized
by date.
Sorting by Sender Name, E-mails in Gmail is
organized by date resulting the e-mail messages
from multiple senders getting dumped into the
inbox.
Sorting Gmail by Search Function
⇒Login to your Gmail account
⇒Enter your e-mail address and password before
proceeding.
⇒Type the name or e-mail address under From and
click on the Search button.
Fig- 7.21 Forward Sort Gmail by moving the mouse over the sender
name,
Open the mail which you want to forward. ⇒Login to Gmail account
Click on 'Forward' option. ⇒Open any mail from the sender whose messages you
Enter the e-mail addresses of the recipients in the To want to sort. Place the mouse cursor on the name of
Cc and Bcc boxes.
an e-mail at the top left corner and a pop-up window
Send the message by clicking on the Send button.
appears below that displays the e-mail address.
7.5(iii) Turn automatic forwarding on or off:
To turn on automatic forwarding;
• On your computer, open Gmail using the account
from which you want to forward messages. Users
can forward messages to only one Gmail address.
• Click on 'Settings' at the top right and see all
settings.
• Click on the Forwarding and POP/ IMAP tab.
• Add a forward address in the "Forwarding" section.
• Enter the e-mail address to which you want to Fig- 7.22 Clicking Send-e-mail from the pop-up
forward messages. window
• Click on Next → Proceed → Ok ⇒Click and drag the mouse over the e-mail address.
• A verification message will be sent to that address. Copy the e-mail address from the context menu
Click on the verification link in that message. displayed on right-clicking with the mouse.
M1R5 153 YCT
Search on TG: @apna_pdf
• On clicking the Attach button, the Open dialog box
is displayed. Select the files that you want to upload.

Fig- 7.23 Copying E-mail Address from Context Menu


⇒Copy the e-mail address on the Gmail search bar
available at the top of the inbox.

Fig- 7.27 Open Dialog Box


• Select the file and click on the Open button. This
Fig- 7.24 Pasting an e-mail address in the search box starts the process of attaching files to your outgoing
⇒Press Enter to search for that e-mail address in the e-mail messages.
inbox. Now the selected sender's e-mails are
displayed as a list.

Figure- 7.25 Selected sender list of e-mail addresses Fig- 7.28 Click on the Send button.
7.7 Attaching Files with E-mail: • Click on the Send button.
We can send documents and pictures very easily by Create and Send an E-mail Message in Outlook 2010–
attaching files with the help of e-mail. • Home tab → New group → New E-mail
Open Gmail.
• Click on Compose.
• Click on the Attach button displayed as a paper clip
icon.

Figure- 7.29 Creating a new e-mail message


• An Untitled Message window is displayed.
• Enter the recipient address in the To... text box.
• If you want to send a copy of the message to
someone other than the recipient, enter that e-mail
Fig- 7.26 Select the Attach icon. address in the CC... text box.
M1R5 154 YCT
Search on TG: @apna_pdf

Fig- 7.32 Forward


Fig- 7.30 Message window • The message which you selected, is displayed in a
• The New Message window title bar is displayed. message window.
Enter the subject of the message in the subject line. • To; Type the e-mail address in the text box.
• Click on the Send button.
• Type the message body below the subject line in the Sorting and Searching Email in outlook 2010– E-
message window. mail list can be sorted on the basis of date, size, sender or
• Send the message by clicking on the Send icon. other properties.
To sort e-mail,
• Open the e-mail folder which you want to sort by
Reply to an Email Message– date.
• Select the message from the message list which you • View tab → Arrangement group → Arrange By
drop down Arrow
want to reply to from the message list. Now select the displayed in date option from the list.
• Home tab → Respond group → Reply or Reply to All e-mails are now displayed in form of arranged by
all date series.
Searching E-mail– By using Outlook 2010, you can
• RE is added to the subject line while replying to the search e-mail.
message and the original message gets added below Searching for an e-mail address,
the new message. • Enter any search word in the search box and press
enter button. The highlighted items are displayed in
the window.
7.8 E-mail Signature:
An e-mail signature is a block of text which is added
to the end of e-mail messages that you send. Signatures
are often used to provide your name, e-mail address,
business contact information, or website URL to the
recipient. The option is available always on all outgoing
e-mails to attach a signature. A signature block may
contain the following information–
• Full Name
• Job Title / Position
• Organization Name and Division
• Phone and fax numbers
• Physical address
• E-mail address
• Website Address - Uniform Resource Locator
Fig- 7.31 Reply to e-mail message 7.9 Social Networking:
• Outlook displays a message window that contains An online service, platform, or site which focuses on
creating or reflecting social networking or social
the recipient's e-mail address and type in the subject relationships between people. A social network service
line. includes a profile of each user with their social links and
• To add the recipient, click in the To CC or BCC a variety of other services. Almost all social networking
services are based on the web and provide users with e-
box, compose the message, and click on the Send mail, chatting, file sharing, blogging etc features.
icon. Through social media, you can express your thoughts
Forward an Email Message– and share many information by forming a group of
people with similar interests. It is all about
• Home tab → Respond group → Forward communication.

M1R5 155 YCT


Search on TG: @apna_pdf
For example, the profile of a medical representative How to Find People on Twitter– Following are the
of a company highlights only medical product deals ways to find people on Twitter–
launched by his company. 1. Name search (Search by Name)
Today's social networks are often online. Whereas 2. E-mail Search (Search by E-mail)
before this people had to be face to face to form a social 3. Keyword Search (Search by selected words)
network-LinkedIN, Facebook, Myspace, Youtube etc. You can easily search for people by typing person's
are some of the major social networking sites using name or e-mail or keywords in the search box at the top
which information can be exchanged at a fast pace. You of your Twitter.com home timeline.
can often join modern social networks for free. Their Types of Tweets– Tweets are of the following three
being free makes the sites even more popular. Using types–
these you can share your feelings and information with 1. General Tweets– This is a message posted on
the people connected in your network. Twitter that can include text, images, GIFs or videos.
7.9(i) Examples of Social Network: This is a public tweet that is displayed on your followers'
A. Facebook– Facebook is a free social networking timeline.
service on the Internet through which its members can be 2. Replies– This is a reply sent to a particular person
in touch with their friends, family and acquaintances. on his Twitter. You can reply message using an @reply–
Currently Facebook has become the most used social
network all over the world. By creating a profile on
Facebook, users & can fill different information about
them and can also share content like text, pictures,
music, videos etc.
Creating an Account– Follow the steps given
below to create an account on Facebook–
♦Go to www.facebook.com.
♦As shown in Figure 7.33, enter your name (First,
Name and Last Name), e-mail address and Enter
password in the prescribed boxes.
Fig- 7.34 Sign in to Twitter Dialog Box
♦Click on Sign up 3. Direct Message– You can only tweet directly to
the person who follows you on Twitter. This is a
personal message that you can send to any of your
followers.
How to tweet?– You can tweet by moving to your
Twitter home page. Pictures showing below as per 7.34
sign-in by home page.

Fig- 7.33 Facebook sign in window


♦Now enter the security code that is displayed.
♦Now click on a confirmation link which is sent to
your e- mail.
After this you will be sent to the 'Getting Started'
page of Facebook. In which the name of such people will Fig- 7.35 Message Box
be displayed who are searching for you. You can add Type your Tweet in the box at the top of your Home
them to your friend list by selecting them as per your timeline, up to 140 characters, 4 photos, a GIF, or a
wish. video. Click on the Tweet button to post a Tweet on your
B. Twitter– Twitter is a free social networking website. profile.
It was established in the year 2006. Like other social To Send a Tweet on Twitter–
networking sites, Twitter is also a social site, but in this • Login to the Twitter homepage
message, you can send short messages (maximum 140 • Type your message in the message box labeled what
characters), they are called tweets. You can only send is you doing?
your messages to the Twitter communities which are as • You can send your tweet to twitter by clicking
follows– "Update".
♦People you follow– Following someone means • By typing "d USER NAME" you can send the tweet
subscribing to their Tweets. The people you follow are to a specific user. By doing this only the person to
your community. You can see the tweets of them. whom you sent the message can see your message.
♦People who follow you– People who follow you You can reply to a specific user by typing your
after reading your tweets are called followers. Twitter is message.
real time based social site which is used by almost all • "@USERNAME" at the beginning of the tweet. This
government offices, banks, politicians, actors, business reply can be only seen by the user's followers and
men etc. You can follow anyone as per your wish and get your followers. It is not displayed on the public
the latest information about them. timeline.
M1R5 156 YCT
Search on TG: @apna_pdf
Search people by name, • Finding People– Using LinkedIn, you can search
• Type the person's name into the search box at the top for people in a particular organization and even send
of the Twitter homepage. those messages or e-mails.
• Your search result is displayed under the People tab Creating a LinkedIn Account– You can promote
of the search page. your business or yourself with the help of creating a
Sending a Direct Message via the Web; LinkedIn account. For this, first you have to create an
• Sign in to a Twitter account. account. Following are the steps for this–
• Click on the envelope icon on the top right • Open web browser and go to Linked In.com.
navigation bar.
• A pop-up with Direct Message History is displayed
Click on New Message button.
• In the Address box, type the username of the person
whom you want to send the message.
• Type your message and click on Send Message.
Deleting a direct message via the web;
• Click on the envelope icon on the top right
navigation bar.
• A pop-up menu with Direct Message History is
displayed. Click on the message you want to delete.
• Locate the message by moving the mouse. A trash
icon is displayed as shown in figure-7.36 Click on
that.

Fig- 7.36 Delete Message Figure- 7.37 LinkedIn Homepage


• A message 'Are you sure you want to delete this
message?" is displayed at the bottom of the DM • Complete the information which are displayed on
inbox. Click on Delete Message. the homepage;
C. LinkedIN– This is a social network available in the ⇒In the Email or phone number box, enter your e-mail
social media world which is geared towards business. or Enter phone number.
Using this you can enhance professional networking and ⇒The Password box: It contains the password for your
job searching activities. Many people use it to increase account. When creating your account password do
their contacts and get career opportunities. It is popularly not use blank space in password. (The password
known as marketing of a business as the business owner should be of six characters or more). Use lowercase,
can interact directly with the people who are interested in uppercase numbers, special characters, etc. to create
their services. your password.
How to use LinkedIn?– LinkedIn is an important ⇒Agree & Join: As soon as you click on the button the
tool for career and business professionals. It is a next screen for LinkedIn is displayed in front of you.
resource. By using this one can get the job, it is also • Fill in your employment status and location
famous as business marketing. Using LinkedIn is information.
beneficial for the user. Following are some of the ways
to make the most of online networking – • I am currently: select either Student or Employed
• Online Identity– With the help of LinkedIn, users Job Seeker from the drop down list. Click on Create
can create a professional identity. By plugging your my Profile button.
name in search engine by any person your • Importing e-mail contacts; This is completely
Professional Identity comes first. It is very useful in optional. Selecting this prompts, LinkedIn checks
building a professional identity. your address book for members with an available
• Networking with people you know– New users to LinkedIn account.
LinkedIn can easily grow their network by making
connections with people they already know.
LinkedIn allows you to import contacts from your e-
mail.
• Jobs– LinkedIn is a popular networking tool that
also has a jobs section, allowing you to connect with
people and companies near you. Through this, you
can increase your knowledge by contacting any
person, along with getting a job. People having same
interest can exchange their information by forming
their own group. Fig- 7.38 Importing E-mail Address
M1R5 157 YCT
Search on TG: @apna_pdf
If you do not want use this feature, click on the link. A. Whatsapp– There are many free instant messengers
A confirmation screen is displayed by LinkedIn available in modern times that allow you to communicate
indicating that a confirmation e-mail has been sent to with your friends through text, phone calls, videos, file
your e-mail account for the LinkedIn account you sharing etc.
registered with. WhatsApp Messenger is a cross platform instant
messaging application that allows users to exchange text,
image, audio, video messages for free. Recently
WhatsApp has become a famous messenger with 1
billion users. Due to the large number of users, Facebook
acquired WhatsApp in the year 2014. It is a freeware
cross platform messaging app and Voice over IP (VOIP).
It is an application that runs on mobile devices but can
also be accessed through desktop computers if the
mobile device is connected to the Internet.
Fig-7.39 Confirmation Message Sending Messages from your Contacts Screen for
mobile phones–
You will receive the LinkedIn confirmation after • Click on WhatsApp from your Home screen. It looks
which the following steps should be followed: like a white telephone icon in a green bubble.
• Click on the LinkedIn confirmation message link. • Tap the Chat icon in the top right of your screen.
• Login to LinkedIn with the login you created. • Select the Contact you want to send the message to.
• Now you can start using LinkedIn. • After opening a new WhatsApp chat, type the message
D. Instagram– Instagram is a free online photo sharing in the message area. (Fig. 7.40)
application and social networking platform that allows
you to share your day-to-day experiences with your
friends and other people. Instagram users can upload
photos and videos through the mobile app. Users can
also add captions to each of their posts. Each of the user's
posts are displayed on the Instagram feed of their
followers. Like other social networking platforms,
Instagram users can also like, comment and bookmark to
others' posts. You can also send personal messages to
your friends through the Instagram Direct feature.
Images can also be shared on one or many other social
media.
Instagram was started in San Francisco by Kevin Fig- 7.40 Sending text message in WhatsApp
Systrom and Mike Krieger and launched on iOS in • To send emoji, click on the emoji icon on the left side
October 2010. For Android devices version was of the message field.
launched in 2012 and for windows in 2016. It is available • Tap the emoji which you want to send.
for free on iOS Android Windows Phone devices. It can ● To go back to the keyboard, click on the mini
also be accessed via the web on a computer, but users keyboard icon that replaces the emoji icon.
can upload and share photos and videos from their own • Send the text message by clicking on the Send button.
devices. Users can also set privacy settings based on Forwarding messages and media using
their preferences. WhatsApp–
7.9(ii) Instant Messaging: • Tap and hold the message or media you want to
Instant messaging (IM) is text-based communication forward. It turns blue when held with tap.
between two or more people that occurs in real time. ● The Forward icon is at the top right of your screen. In
Some advanced instant messaging apps also provide
users to enhanced communication modes such as live which white arrow mark is made.
voice or video calling. Many instant messaging services
also provide VOIP (Voice over Internet Protocol), video
calling features.
The following are the features provided by almost
all instant messaging providers–
• Instant messaging; This provides the facility of
messaging with friends who are present online.
• Chat; This creates a chat room with friends.
• Web Links; This also shares links to your favorite
websites.
• Video; Sends and displays video and also allows
face-to-face chat.
• Sound; It also plays sounds.
• Shares; It sends files by sending. Figure- 7.41 Forward icon
M1R5 158 YCT
Search on TG: @apna_pdf
• Select the recipient. You can also choose to forward a
message. You can forward your recent chats by
clicking on the recent chat icon. It is displayed as an
clock icon.
• Select the group icon to send a group chats.
• You can send a message to a particular Contact by
clicking on the Contact icon.
To use Whatsapp from a Computer– Using
Whatsapp from a computer is called Whatsapp Web. It
provides a web client to access the WhatsApp interface
from a computer. You can use WhatsApp on your phone
through the website or through the desktop app. Before
using on computer, it is necessary to have WhatsApp app
downloaded on your mobile. For the browser version, Fig- 7.44 Open Message on your computer
visit WhatsApp Web or download the desktop program • Once set up, WhatsApp can open your web app at any
via the WhatsApp page. When using the desktop version, time. If you want to log out, click on the menu setting
click the download link that corresponds with your
computer's operating system. Desktop programs and web drop down icon and select Logout.
clients display a large QR code when opened. (as per
Fig. 7.42)

Fig- 7.42 WhatsApp on your mobile to scan the code Fig- 7.45 Selecting Logout
• You can logout from all computers through WhatsApp
• Open Whatsapp from your phone. mobile app by going to Whatsapp Web Screen and
• Go to Settings and click on Whatsapp Web.
clicking on "Logout from all Computers".
• Scroll down and select Scan QR Code is your phone
which asks for permission to use the camera. Allow it
as per the picture given below–

Figure- 7.43 Selecting WhatsApp Web Desktop in


Settings and scanning the QR code

• Place your phone on the computer screen to scan the


QR Code. Point the camera in that direction as shown
in the above picture.
• When done it will do everything by itself the
WhatsApp client will open immediately and the
messages on your phone will be displayed on the
screen. As shown in Figure-7.44, now you can send or
receive WhatsApp messages to anyone through your
computer. Fig- 7.46 Logging out of computer
M1R5 159 YCT
Search on TG: @apna_pdf
B. Facebook Messenger– Facebook Messenger is a free • Click on the "Type Message" text field that appears
mobile messaging app. It is available for iOS, Android, at the bottom of the chat window.
Windows 10 devices and can be connected via mobile • The message is automatically sent after pressing
data or Wi-Fi. Enter.
It is available free to download and is used to • You can also add photos, stickers or other content
communicate with your friends on Facebook. It provides from Facebook to your messages.
instant messaging, photo/video sharing, group chat, live
video chat, etc.
To use Facebook Messenger,
• Open Facebook from computer web browser. This
opens your news feed page.

Fig - 7.50 Selecting a Sticker


With the help of the icon at the bottom of the screen,
you can add the following items–
Photos: You can select photos from your computer
Fig- 7.47 Selecting a message by clicking on the photo icon at the bottom right
corner of the chat window.
• Click on the light bold message icon at the top right GIFs: Select a GIF by clicking on the GIF button at
corner of the page. A drop down menu is displayed. the bottom of the chat window.
• Click on New Message, it opens a new chat window Sticker: Click on the sticker of your choice from the
towards the bottom of the page. sticker category.
Emoji: You can select emoji by clicking on the
smiley face icon at the bottom of the chat window.
File: You can share any file available on your
computer by clicking on the paper clip icon at the
bottom of the chat window.
C. Telegram– Telegram is a cloud based instant
messaging service. It is a messenger that you can use to
online chat with family and friends. It is a Voice over IP
service developed by Russian entrepreneur Pavel Durov
and his brother Nikolai. It can be used on smartphones,
tablets, laptops and desktop computers. It supports
Android, IOS, Windows Phone, Windows NT. It is
available for use in platforms such as Mac OS and Linux.
Fig- 7.48 New Message Chat Window Using Telegram, users can send messages and photos,
• Or, to create a new group, click on New group at the videos, stickers, audios and other types of files up to
top of the drop down menu. 1.5GB. Being a cloud-based service, the data of the
• Enter a few letters of your friend's name. A list of Telegram app is stored in the Telegram servers instead of
names appears that matches with them. device. It provides end-to-end encryption for two online
• Click on the name of your friend with whom you users. You can use Telegram from your computer using
want to chat. On clicking, the screen opens as shown the following methods–
in figure 7.49. ● Using Windows Mac OSX Linux Application.
● Using apps from the Chrome Web Store.
● Using the web client.
Using Telegram Windows Application–
To download the app,
Visit on the website https://desktop.telegram.org.
● Open Telegram app.
● Click on the Start Messaging icon available in the form
of a blue button appearing at the bottom of the
window.
● Type your mobile number for Telegram setup.
● On clicking Next, a message with 5 digit code is sent
through Telegram.
Fig- 7.49 Typing message in text field ● Enter the code received in SMS.
● Click on Next now your are sign-in on the telegram.
M1R5 160 YCT
Search on TG: @apna_pdf
7.10 Introduction to Blogs: (i) B2B (Business to Business)– In this type of e-
Blog is the short form of Weblog. It is a type of commerce, both the seller and the buyer are business
website which is regularly updated with new content. organizations, that is, one business organization sells
Most blogs consist of short articles called blog posts. its product to another business organization.
These posts usually contain a combination of text, (ii) B2C (Business to Consumer)– In this type of e-
photos, videos and other media. Blog is a space available commerce, the organization or company directly
on the web in which you can express your opinion, sells its product online to the consumer. This is the
experience and interest. Blogs can be used for personal most used e-commerce.
use as well as for sharing information with groups. You (iii) C2B (Consumer to Business)– It is such an e-
can set your blog for private or public access. commerce in which the consumer provides the
In modern times, people are making blogs for many product or service to the business organization. This
reasons. It is being made in the form of business, is the exact opposite model of the B2C model.
lifestyle, fashion, food and entertainment blog etc. (iv) C2C (Consumer to Conumer)– In this type of e-
Bloggers can communicate with people on the Internet. It commerce, both seller and buyer are consumers, that
allows you to present your views by talking on any topic. is, one consumer sells his product to another
People can discuss the issues related to them by staying consumer through a website.
updated with the topic according to their interest. 7.12 Netiquette:
Following are the reasons for using blog– A group of rules which are made for correct
● Being able to share your experience and expertise. behavior during any kind of communication on the
● Being more involved in your hobby and passion. Internet is called Netiquette. Netiquette as distinct from
● Becoming part of the community traditional forms of Internet communication such as
● Updating family and friends on your life telephone conversations face-to-face meetings, paper-
If you have a passion for teaching, then starting a based letters, etc. It helps the user to avoid
blog allows you to educate other people interested in misunderstandings during e-mail or chatting.
your area of expertise. Nowadays a large part of the Nature of Poor Netiquette– Following are the
population is internet friendly; many companies promote nature of poor netiquette–
their products through blogs advertises. Companies can ● Using harsh language.
also get a review of their product through the blog itself. ● Use of spam mail.
You can easily get a job through a blog. Some people ● Bad grammar and spelling errors.
also earn money through blogs. ● Telling lies on newsgroups or public forums.
7.11 Basics of E-Commerce: Following are the rules of internet etiquette–
E-commerce is a business transaction which is ● Do not interfere in controversial conversations.
conducted electronically over the Internet. Popular ● Use of capital letters in the message shows
examples of e-commerce usually involve buying and indecency, so do not use them. Be sure to include
selling online. E-commerce has expanded more rapidly the subject in the subject field when sending an e-
in the last few years and the expansion of e-commerce mail.
will increase further in up coming years. E-commerce ● Do not send mail, containing your personal
works on technologies such as electronic funds transfer, information to anyone else.
electronic data interchange (EDI) inventory management ● Respond to received e-mails as soon as possible.
system, online transaction processing, supply chain 7.13 Overview of E-Governance Services
management etc. The technological foundation of e- Like Railway Reservation Passport and
commerce is the Internet, www and various protocols. E- eHospital (ORS):
commerce involves buying and selling through websites E-governance stands for electronic governance. Its
that can be accessed anywhere in the world. The main objective is to simplify procedures for government,
Information Technology Act 2000 regulates e-commerce citizens, businesses, etc. at the state, national and local
activities in India. levels.
Following are some of the common applications Various information can be delivered to the citizen
related to e-commerce–
by using electronic governance to empower the citizen
● Online Marketing & Purchasing
services. Use of e-governance, to enable citizen
● Retail & Whole seller
participation in government and enhance economic and
● Finance
social opportunities for citizens can prove to be very
● Manufacturing
effective.
● E-Banking
Government wants to make business centric
● Online Publishing environment to citizen centric for administration to
● Online Booking implement state and integrated service level. The E-
● Electronic Tickets Governance standard portal (http://egovstandards.gov.in)
● Teleconferencing provides a plateform to share ideas, knowledge,
● Newsgroups agreement documents and passwords among members of
● E-mail various committees involved in the process of standard
● Enterprise Content Management formulation. Governance means the political, economic
Types of e-commerce Models– There are four main and social life of the country, including the expression of
types of e-commerce that can describe every transaction the interests and legal rights and obligations of the
between a consumer and a business– citizens. Relates to administrative matters.
M1R5 161 YCT
Search on TG: @apna_pdf
■ IECT is being used by the government at the central The service transformations achieved through PSP
and state level to make governance easy and are as follows–
automated, this has not only increased the efficiency ● Through PSP Portal (www.passportindia.gov.in)
of the government but has also brought transparency citizens can pay passport fee from anywhere at their
in the work of the government. convenience. It also provides latest information on all
■ E-governance includes e-administration, e-services passport related services.
and e-democracy, which are used by the ● PSP has expanded to 37 Passport Offices to increase
administrative departments of the Government of its network.
India, For example, it is being done in District ● The National Call Center, operated in Indian
languages, enables Indian citizens to obtain passport
Court, Tehsil and Transport Department etc. related information.
■ Due to transparency in work, people's trust towards E-Hospital (ORS)– Online Registration System
the government has also increased. (ORS) is an Aadhaar based registration process by which
Railway Reservation– It plays an important role in Patients can register themselves in OPD without standing
railway reservation system. It helps passengers to get in long queues. Under Digital India initiative, National
train related information on the basis of destination Informatics Center (NIC) has developed ORS (Online
Status of booked tickets, ticket cancellations etc. are Registration System). Through which OPD appointment
done through e-governance. Through the can be taken in various departments of government
website www.irctc.co.in official website of IRCTC hospitals. The patient portal http://ors.gov.in is available
(Indian Railways Catering and Tourism Corporation on the internet.
Limited) Reservation and cancellation of train tickets is Appointment can be taken using the following
done. methods–
Impact of Information Technology on Indian
● Using E-kyc of Aadhaar number, if patient's mobile
Railways–
Information technology has greatly influenced the number is registered with UIDAI (Unique
Indian Railways greately. Information technology is used Identification Authority of India).
in Indian Railways for ticketing and ticket cancellation, ● The new patient is also given a UHID (Unique
time table information, passenger information, tourist Health Identification) number along with the
information, budget for the financial year, etc. appointment. If Aadhaar is already linked with
Following are the applications of Information UHID, then appointment is given.
Technology in Indian Railways– ● In case the mobile number is not registered with
● NTES (National Train Inquiry System) and ICMS UIDAI, the patient's name is used.
(Integrated Coaching Management System) Simple Appointment Process– On first visit to the
application is used for monitoring train running hospital, registration and appointment with the doctor
information and coaching stock and trains carrying has been simplified. All you need to do, to verify
more than 8500 passengers per day. yourself using the SMS received for the appointment by
● Using SMS gateways to notify passengers when their entering the Aadhaar number, select hospital and
reservation status has changed from about more than department, select appointment date.
1.5 lakhs SMS are sent daily. Dashboard Reports– Appointment of all hospitals
● Trains or stations can also be logged in and tracked with their departments can be done on web through this
through the portal. The Retiring Room application is portal. Detail reports can be viewed displaying
operational at 82 stations now. information about new and old patients taking
● Every day more than 10 lakh passengers have been appointments.
booked at 11,127 PRS (Passenger Reservation System) Hospital on Boarding– Hospitals can come on this
counters and at 3107 locations. Tickets worth about Rs platform and provide their appointment slots for online
85 crore are sold daily. booking by patients. This system will help the hospital to
Passport– In the last few years, the Government of easily manage their registration and appointment and
India has taken several initiatives in e-governance to provides facility to monitor patients.
improve public services. Following is the procedure for taking appointment
The National e-Governance Plan (NeGP) includes
several high-impact e-Governance projects, including for a new patient;
Passport Seva. The Ministry of External Affairs is ● Visit the portal http://ors.gov.in/copp/appointment.jsp
responsible for issuing passports to Indian citizens. The ● If you have the patient's Aadhaar number and mobile
Ministry of External Affairs (MEA) issues passports number registered with UIDAI, an OTP is sent by
through a network of 37 passport offices across the UIDAI via SMS. For taking an OPD appointment, the
country and 180 India Post abroad. Aadhaar holder has to give consent to the hospital to
Passport is an essential travel document for those share the KYC data stored with UIDAI.
who are traveling abroad for education, tourism, ● In case the mobile number is not registered with
pilgrimage, business purposes and family visits. In order UIDAI, the name given in the patient's Aadhaar is
to enhance and improve the delivery of passport services used. After authentication, information like age,
to Indian citizens, the Ministry of External Affairs address, mobile number etc. is taken from the patient.
launched the Passport Seva Project (PSP) in May 2010. ● Patients can take online appointment even if they do
PSP enables simple, efficient and transparent process for not have Aadhaar number but OPD card has to be
delivery of passport and related services. taken from the hospital.
M1R5 162 YCT
Search on TG: @apna_pdf
● The department of the government hospital in which
the patient wants to get the checkup can also be
selected.
● Thereafter OPD appointment details are sent to the
user through SMS.
Importance of Information Technology in
Education– Information technology is an area under
which computers or other physical devices are used to
create, process, secure and exchange electronic data.
Everything related to computing technology refers to
information technology. This means that the work done
by the computer and the things related to it like Internet,
networking, data management etc. are all a part of
information technology. Information technology is also
commonly known as communication system or computer
system.
The development of information technology has
completely changed the old education system. Online
using internet Education can be taken by sitting at home.
Today, there are many such online applications, on
which information about almost every subject is given
properly. The development of information technology
has made the education system simple, easy and
comprehensive.
7.14 Accessing E-governance Services on Fig – 7.51 Registering on UMANG
Mobile Using "UMANG App":
The full name of UMANG is Unified Mobile ● Clicking on the registration option takes you to the
Application for New-age Governance. It has been started mobile number verification page. On this page, enter
to encourage people to adopt digital payments, the mobile number (as shown in Figure 7.51) to
transactions in the country. UMANG App is a unified generate the OTP required to complete the UMANG
application that can be used for multiple e-Government App registration.
services such as Income Tax filing, Aadhaar and ● After registration and OTP input, the option to create
Provident Fund, Gas cylinder booking, Passport Seva MPIN is displayed. After setting the MPIN, the
etc. With UMANG, the government aims to promote e- registration is complete and the home page of the
governance and adopt a new governance system as part
UMANG app is displayed. This page also displays the
of the Digital India initiative. The app can be
downloaded for free on Android, iOS and Windows recently opened services through the UMANG app.
Phone. UMANG has been developed by National e-
Governance Division (NeGD) and Ministry of
Electronics and Information Technology (Meity). Using
this, all the services of local, state and central
government can be accessed. Umang App supports
Aadhaar, DigiLocker, Bharat Bill Payment System,
PAN, EPFO Services, PMKVY Services, AICTE, CBSE,
Tax & Fees or Utility Bill Payment, Education, Job
Search, Business, Health, Agriculture, Travel, Birth
Certificate, E-services like District, Passport etc.
The e-Governance applications can also be accessed
through other channels such as web, SMS or IVR. You
can register on UMANG App on web
through http://web.umang.gov.in/web/#/ and on mobile
app through http://web.umang.gov.in/web/appdown.html
To download UMANG app on mobile phone,
● Scan the QR code given on the official Umang App
website.
● Receive an UMANG app link on your phone by
giving a missed call to 9718397183.
● Receive the download link for the app by SMS on
the mobile number provided by you on the UMANG
website.
How to register on UMANG App?– To register
new user on Umang For this follow the following steps,
● Launch the UMANG app and click on the Register
option. Fig - 7.52 UMANG App Home Page
M1R5 163 YCT
Search on TG: @apna_pdf
UMANG App Login– You can login to UMANG ● Life certificate is a service available only for
App using the following methods; pensioners. It allows pensioners to generate Life
● Mobile number registered with UMANG App and
Certificate by connecting the biometric device to the
M-PIN
● Registered mobile number with UMANG app and mobile phone.
OTP. 7.15 Digital Locker:
● You can log in using Facebook, Google + or Digital Locker is a service operated by the
Twitter, as long as you keep your social media
accounts up to date with the app Department of Electronics and Information Technology,
Key Features and Benefits of UMANG App Government of India. It allows all Indian citizens to scan
UMANG developed by Govt–Following are some of or store their documents in digital formats. It uses cloud
the key features of the app– computing where all citizens are given 1GB of storage
● Using the app, you can access over 150 different space in a secure and private cloud account. It is part of
Central and State Government services.
● Easy online payment of multiple utility bills like the Digital India initiative of the government.
gas, water, electricity etc.
● Apart from smartphone, this app can also be used on
desktop, tablet or through SMS.
● It is available in English as well as in other regional
languages.
● It also allows to search the services of any particular
state or central government.
Following are the services available through
UMANG application on mobile–
Fig- 7.53 Digital Locker
● EPFO Services– UMANG app allows users to
access EPFO services. Through this, you can
monitor EPF (Employee Provident Fund) account Digital Locker Portal– To use this portal, sign up
balance, EPF pension account balance etc. using on digital locker.gov.in using Aadhar card number.
UAN and OTP of registered mobile number. The OTP sent to the mobile number linked with
● LPG Services– Online cylinder booking, subsidy,
cylinder connection etc can be done using the Aadhaar has to be entered.
Umang app. Services can be availed on Bharat Gas, Following are the objectives of Digital Locker
HP Gas and Indane Gas. System–
Tax Payment–It also allows users to pay income ● Digitally empowers residents by providing digital
tax. It also allows payment of advance tax, self lockers on the cloud.
assessment tax using 280 challan. After Tax Payment, It
can be tracked using Track Challan Service, after tax ● By ensuring the authenticity of e-documents, it also
payment. eliminates the use of fake documents.
Passport Seva– This is a service controlled by the ● Easy access to documents for residents at any point
Ministry of External Affairs, Government of India. of time.
Through the UMANG app, you can locate passport ● It ensures confidentiality and authorized access to
centers, make fee payments, and monitor passport data.
application status. ● Provides a well-structured document format to
Pension– The services provided by the Department support easy sharing between departments and
of Pension and Pensioners' Welfare department can be
agencies.
accessed using Umang App. All facilities like application
process, grievance and avail other retirement benefits ● Through this, departments and agencies make it
through pension portal on the app can be raised. easier for residents to get services.
E-Pathshala– It is an initiative of the Government Components of Digital Locker System–
of India and the National Council of Educational ● Repository, It is a collection of e-documents
Research and Training (NCERT). Students have access uploaded by issuers in a standard format and
to e-books, educational audios and videos etc. Parents Exposes a set of standard APIs for secure real-time
and teachers also to get educational material and search and access.
teaching instructions can use it. ● Access Gateway, it fetches e-documents from
CBSE– Students can use it to see exam centers and different repositories in real time using e-document
to check results of 10th, 12th and other competitive
(Uniform Resource Indicator) Provides a safe online
exams.
mechanism for requesters to use.
● DigiLocker provides a secure platform to store,
share and verify documents/certificates. ● URIs; It identifies the address of a repository by an
● Aadhaar Card allows you to view and download issuer where the e-document is stored based on the
your Aadhaar card through your DigiLocker URI and will retrieve the e-document from that
account. repository.
M1R5 164 YCT
Search on TG: @apna_pdf
Practice Questions with Explanatory Solutions
1. Full meaning of CC in e-mail. Ans. (a) LinkedIn is one such social network available
(a) Carbon copy in the social media world which is geared towards
business marketing. Using this you can enhance
(b) Contact copy
professional networking and job searching activities.
(c) Clone copy
6. The founder of Facebook is–
(d) none of these
(a) Elon Musk
Ans. (a) The full meaning of CC in an e-mail address
(b) Mark Zuckerberg
is carbon copy. To send the message being sent
through e-mail to more than one recipient, their e-mail (c) Ray Tomlinson
address is typed in carbon copy. Under this, the person (d) None of these
receiving the message from the mentioned e-mail Ans. (b) The founder of Facebook is Mark
address also gets to know that apart from him, who Zuckerberg. Facebook is a free social networking
else has received this message. service on the Internet through which its members can
2. Incoming mail server is– keep in touch with their friends, family and
(a) IMAP (b) PoP3 acquaintances. Currently Facebook has become the
most used social network all over the world. By
(c) Both (a) and (b) (d) none of these
creating a profile on Facebook, a user can fill different
Ans. (c) An e-mail server is a computer system that information about him self. And can also share
sends and receives e-mails. The remote or central content like text, pictures, music, videos etc.
computer that stores e-mail messages for customers on
7. The founder of personal blogging is–
a network is called a mail server. IMAP and POP 3
protocols process the received messages. (a) Justin Hall (b) Elon Musk
(c) Mark Zuckerberg (d) Ray Tomlinson
3. Mail cannot be sorted using the Settings icon's
tabs. Ans.(a) Personal blogging is that in which a person
(a) Inbox (b) default writes his lifestyle etc and shares it through a blog on
the Internet. Justin Hall is said to be the founder of
(c) Impotent first (d) Unread first
personal blogging.
Ans. (a) To sort e-mails, Click on the Settings icon.
8. Cannot send file type via e-mail–
Select any of the default, important first, unread first
(a) doc (b) resp
etc. under the section.
(c) ppt (d) exe
4. Clicking Save Changes displays the saved e-mail
list in the Inbox. The folder to store mail is– Ans.(d) Most e-mail service providers including
Gmail do not allow sending exe file type. exe files are
(a) Inbox (b) Outbox
programs that require user action to install. Most
(c) Send (d) All of the above
executable files are valid.
Ans.(a) Inbox is the most important section in an e-
9. Skype is–
mail account where all the received mails can be
(a) E-mail service provider
viewed and accessed. A mailbox is a container that
(b) Shopping App
contains all mail sent and received by an e-mail
account. There are many folders in it, which separate (c) Social networking site
Send, Receive, Junk, Spam and Delete mail. (d) Utility bill payment app
5. LinkedIn is a social network popularly known as Ans. (c) Skype is a software application that provides
.........app. users with features such as voice calls, chat and video
calls over the Internet. In this, users can exchange
(a) Business Marketing (b) online shopping images, documents or files, videos, text, etc. skype
(c) Bill Payment (d) All of the above setup was done Tom Anderson.
M1R5 165 YCT
Search on TG: @apna_pdf
10. The time limit for a video to be posted on Twitter Ans.(a) The full form of ISP is Internet Service
is– Provider. ISPs are the companies that provide access
(a) 60 seconds to the Internet provides. The computer of ISP is called
(b) 1 minute 40 seconds server computer.
(c) 2 minutes 30 seconds 15. The word Blog is a combination of two words–
(d) 3 minutes 10 seconds (a) web log (b) wev log
Ans.(c) The video posted on Twitter has a limit of 2 (c) waive log (d) Wade Long
minutes 30 seconds i.e. 140 seconds whose size can be Ans.(a) Blog is the short form of Weblog. It is a type
up to 512MB. Twitter is a free social networking site. of website that is regularly updated with new content.
11. How many types of e-governance are there? Most blogs consist of short articles called blog posts.
These posts usually contain a combination of text,
(a) 4 (b) 3
photos, videos and other media. Blog is a space
(c) 2 (d) 5
available on the web in which you can express your
Ans.(a) The primary delivery models of e- opinion, experience and interest. Blogs can be used for
Government can be divided into: personal use as well as for sharing information with
(a) Government to Citizen or Government-to- groups. You can set your blog for private or public
Consumer (G2C) access.
(b) Government-to-Business (G2B) 16. What is netiquette?
(c) Government-to- Government (G2G) (a) Acting decently and with manners on the Internet
(d) Government-to-Employees (G2E) (b) a software
Within each of these interaction domains, there are (c) website com
four types of activities. (d) search engine
12. Standard for transfer of e-mail– Ans.(a) The group of rules made for correct behavior
(a) IMAP (b) POP during any kind of communication on the Internet is
(c) SMTP (d) HTTP called Netiquette. Netiquette, as distinct from
traditional forms of Internet communication such as
Ans. (c) SMTP (Simple Mail Transfer Protocol) is a
telephone conversations, face-to-face meetings, paper-
standard for transfer of e-mail. Using a TCP/IP mail
based letters, etc. does. It helps the user to avoid
used to send and receive.
misunderstandings during e-mail or chatting.
13. QSAM service can be availed by dialing ……
17. To select text in the address bar, press the
from mobile phone–
…………….. keys together.
(a) *99*99# (b) *9*999#
(a) Ctrl + A (b) Alt + D
(c) *999*9# (d) *999*#
(c) Ctrl + B (d) Alt + F1
Ans.(a) The QSAM service provided by NPCI is a
Ans. (b) F6 or Ctrl+D or any one of the combination
USSD service, which provides users with the status of
of Alt+D shortcuts to select any text in the address bar
their Aadhaar seeding. Since this service works on
can be used.
USSD, it is available on all handsets. In QSAM the
user dials *99*99# from his mobile and by inputting 18. The following infrastructure is required for C2C
your Aadhaar number, you can know the Aadhaar e-commerce to work–
seeding status and avail the service. i. World Wide Web
ii. Electronic data internet stand
14. The full form of ISP is–
iii. Corporate network
(a) International Service Provider iv. Secure electronic communication links
(b) Internet shopping provider connecting businesses
(c) Internet Service Provider (a) (i) and (ii) (b) (ii) and (iv)
(d) International Service Processing (c) (i) and (iii) (d) (i) and (iv)

M1R5 166 YCT


Search on TG: @apna_pdf
Ans. (c) When a consumer sells his goods or goods to Ans.(a) In e-mail, inbox is a container that contains all
another consumer over the Internet, the transaction is mail sent and received from an e-mail account.
called Consumer to Consumer (C2C). In this, the Usually e-mail the inbox overflows with mail.
consumer sells any of his old things like laptop, 23. A software used for Gmail is–
mobile to other consumers directly through internet.
(a) web page search
Like OLX etc. The World Wide Web and Electronic
(b) checking e-mail
Data Interchange Standard infrastructure is necessary
for C2C e-commerce to work. (c) Searching for hotels

19. “Passport Seva” website is– (d) searching files

(a) www.passportindia.gov.in Ans. (b) Gmail is used to check e-mails. Gmail is an


e-mail service created by Google with its help, you
(b) www.passportindia.com
can send or receive e-mail to anyone.
(c) www.passportinia.edu
24. What is the minimum age to join Facebook–
(d) www.e-passportindia.gov.in
(a) 18 years (b) 15 years
Ans.(a) A passport is a document issued by a national
(c) 13 years (d) 10 years
government that certifies the identity and nationality
of its holder for international Ans. (c) Facebook is a free social networking service
travel. www.passportinida.gov.in is the official on the Internet through which its members can
website for passport service. communicate with their friends, family and
acquaintances. The minimum age to join Facebook is
20. The full form of ORS is–
13 years old.
(a) Open resource system
25. When did Twitter start–
(b) Online Registration System
(a) 01-03-2006 (b) 01-04-2006
(c) Open Reform System
(c) 01-10-2006 (d) 01-12-2006
(d) Open repair system
Ans. (a) Twitter is a free social networking website in
Ans. (b) The full form of ORS is Online Registration
which users can send short messages. Twitter was
System. The Government of India has created an
Originated in San Francisco, California on 21-03-
Aadhaar based online registration system to connect
2006.
hospitals across the country under the Digital India
initiative. Note- In this question the correct option is not
given. Hence 01-03-2006 can be considered as the
21. UMANG has integrated with.....
answer.
(a) Aadhaar and DigiLocker
26. With which company did IRCTC start the
(b) Aadhaar or DigiLocker
internet ticketing system?
(c) DigiLocker only
(a) CRIS. (b) BRICS
(d) Aadhaar only
(c) Both (a) and (b) (d) none of these
Ans.(a) The full name of UMANG app is Unified
Ans. (a) IRCTC (Indian Railway Catering and
Mobile Application for New-age Governance. The
Tourism Corporation) in collaboration with CRIS
purpose of which is to bring all the online services of
Company started the internet ticketing system in 2002.
the Government of India on the mobile app. The
CRIS (Center For Railway Information System) is an
UMANG app has been integrated with Aadhaar and
organization under the Ministry of Railways.
DigiLocker.
27. E-ticketing system was started in–
22. Which box usually overflows with e-mail?
(a) 12 August 2005
(a) Inbox
(b) Outbox (b) 25 August 2005

(c) Address box (c) 12 August 2006

(d) Message box (d) 26 August 2005

M1R5 167 YCT


Search on TG: @apna_pdf
Ans.(a) E-ticketing system was started on 12 August Ans. (b) A document sent to someone through e-mail
2005. E-ticket means a ticket which is booked online or received from another person's e-mail is called
from home or information kiosk etc. without visiting attachment.
the railway counter. Its validity is the same as that of a
ticket issued from a railway booking counter. 32. How many Passport Seva Kendras are
established and managed by TCS?
28. What is the purpose of the UMANG app?
(a) Fast Track Mobile Governance (a) 90 (b) 81

(b) Fast gaming (c) 71 (d) 37


(c) Slow Gaming Ans. (b) TCS has established and manages 81 offices
(d) None of these in India as Passport Seva Kendra (PSK), which are
Ans.(a) Umang App whose full name is (UMANG - extended branches of the 37 Regional Passport
Unified Mobile Application for New-age Offices, which act as the front end for passport
Governance). The purpose of which is to bring all the applicants.
online services of the Government of India on the
33. UMANG is not available on devices such as–
mobile app, that is, its purpose is fast track mobile
governance. (a) Smartphone
29. How many languages does the Umang app (b) Laptop
support? (c) Desktop
(a) 10 (b) 11
(d) Digital camera
(c) 12 (d) 13
Ans. (d) UMANG app has been launched to
Ans.(d) Umang app supports 13 languages in total.
encourage people to adopt digital payments,
These include English, Hindi, Assamese, Gujarati,
Bengali, Kannada, Oriya, Punjabi, Malayalam, transactions in the country. UMANG App can
Marathi, Tamil, Telugu and Urdu. be accessed through devices like Desktop, Laptop, and
Smartphone etc.
30. The expanded form of UMANG is–
(a) Unified Mobile Application 34. Which of the following is not a messaging service–
(b) Unique mobile application (a) WhatsApp
(c) United Mobile Application (b) YouTube
(d) Universal Mobile Application (c) SMS
Ans.(a) The full name of UMANG app is Unified (d) Telegram
Mobile Application for New-age Governance. The
purpose of which is to bring all the online services of Ans. (b) Text based communication between two or
the Government of India on the mobile app. It has more people is called messaging. Whatsapp, sms,
been started to encourage people to adopt digital linkedin, Telegram, Instagram etc are the apps
payments, transactions in the country. UMANG App providing messaging service.
is a Unified Application that can be used for multiple
e-Government Services Such as income tax filing, 35. What is the character limit for a post on Twitter?
Aadhaar and provident fund, gas cylinder booking, (a) 45 (b) 280
passport service etc. can be done. (c) 145 (d) 180
31. Documents sent or received by e-mail. They say– Ans. (b) Twitter is a microblogging social networking
(a) Detachment website. This was established on 21 March 2006. The
(b) attachment process of sharing information on Twitter is called a
(c) Document tweet. Currently, a key character limit of 280
(d) file characters is set for a post on Twitter.

M1R5 168 YCT


Search on TG: @apna_pdf

DIGITAL FINANCIAL TOOLS AND


8 APPLICATIONS

8.0 Introduction: (ii) Retail Agent– Retail agents use a digital device
Digital Financial Services provide basic financial connected to a communication infrastructure to send
services to the people at very low cost through latest and receive transaction details. It enables the
technologies. DFS (Digital Financial Services) channels customer to convert cash electronically into store
provide 24x7x365 services. Digital channels drastically value and convert store value into cash.
reduce costs for customers and service providers. (iii) Device– The customer's device can be digital like a
mobile which is a medium of transmitting data and
information or a device like payment card machines
which connects to a device like a POS terminal.
8.2 Understanding OTP (One Time
Password) and QR (Quick Response
Code):
8.2(i) One Time Password (OTP):
OTP is also known as One Time Pin. It is a string of
characters that is used only once for login or transaction.
It can be used only once with an individual name or
Figure- 8.1 Digital Financial Services
password. Many software or devices can be used to
8.1 Digital Financial Tools: generate OTP, such as personal digital assistant, mobile
Digital services are accessed with the help of digital phone etc. OTP is sent to a user's phone via SMS. This is
financial tools which include mobile and internet. Mobile a password based authentication.
phones, computers or cards are used at Point of Sale It is more secure than static passwords. These are
(POS), which connect individuals and businesses to a invalidated on every 30 or 60 seconds, which prevents
digital national payment system and enable seamless all- attackers from obtaining the secret codes and reusing
party transactions. This includes the following services– them. This code is a random series of numeric and
• All types of financial services like savings bank alphanumeric characters.
account credit, insurance etc. The information flow works in this order–
• Banks, payment providers, other financial • User enters username and password.
institutions, telecommunications companies, • The request is sent to the back-end.
financial technology startups, retailers and provider • Username and Password are matched.
of all types of financial services including other • User receives OTP through SMS.
businesses. • User logins to the site by entering OTP.
• Users of all income levels. It generates random password and does not allow
8.1(i) Key Component of Digital Financial hackers to easily guess the OTP for future reuse. It uses
random characters and symbols while generating one
Services:
time password. It uses several techniques to generate
There are three major components of any digital passwords–
financial service–
• Based on time-synchronization between the
(i) Digital Transaction Platform– It enables a authentication server and the client to provide the
customer to use a device to make payments, money password (OTPs are valid only for a short period of
transfers or conduct financial transactions time.)
electronically with a bank or any such non-bank • Using a mathematical algorithm to generate a new
institution or to support electronic value. password based on the previous password (OTPs are
Importantly, there is no contribution of cash money an effect chain and must be used in a predefined
in this. order)
M1R5 169 YCT
Search on TG: @apna_pdf
Benefits of OTP– OTP is used to keep secure our Error Correction Code (Reed Solomon Code)–
account. For example, OTP is used while using Google Read solomon codes are implemented to restore data
account, bank account, net banking or ATM etc. OTP when a portion of the QR code is missing or damaged.
acts as a security shield like the login password. For Restoration rate is at four different error correction
some reason someone knows your bank's netbanking levels.
password. Even then he cannot misuse it without OTP. Other types of information in a QR code–
8.2(ii) Quick Resoponse Code [QR]: • It contains an e-mail message with a subject and
message text. There may be a request for message
The QR code is a two-dimensional barcode created
information So that you can get reply with additional
in 1994 by the Japanese company Denso waive. This can
information and attached files.
be read by the digital device and stores the information.
• Dynamic QR Code redirects users to a webpage. It
QR codes are often used to track information about
also offers new useful features.
products. When you scan the QR Code with a webcam or
• It also includes a Geographical Location which can
mobile, the QR application takes the user to a website or
be accessed directly by scanning the QR Code from
other web content. Codes hold information in the form of the advertisement of a hotel or other.
horizontal and vertical axes. Compared to regular • Business cards include an electronic version of
barcodes, QR codes allow a large amount of raw data to contact information. Reader connects to the
be embedded. Data can be stored up to 2953 bytes in application by scanning the code.
these. The smallest element of QR code is called module.
8.3 Unified Payment Interface:
A QR code is composed of black and white module,
UPI is a system that provides multiple banking
position detection pattern, timing pattern, format
features to bank accounts in a single mobile application.
information, containing error connection level This transfers instantly money through mobile device
and available 24x7 and 365 days. It is an instant real time
payment system developed by National Payments
Corporation of India. The interface is regulated by the
Reserve Bank of India and works by making instant
money transfers between two bank accounts on a mobile
platform. In this, the user has to use only virtual address,
which is known as VPA (Virtual Payment Address).
VPA is used only to carry the transaction.
Nowadays UPI is very popular for digital payment.
UPI interface is compatible with most of the banks,
Figure- 8.2 Structure of QR code digital wallets, payment applications and apps like
Google Tez, Airtel Payment, Phonepe and Paytm.
Position detection patterns– Arranged at the three Transaction Limit– NPCI has prescribed
corners of a QR code. They indicate the direction in transaction limit for UPI transfer and also transaction
which the code prints. Code can be read from any limit per day. Currently the UPI transaction limit is per 1
direction. lakh.
Alignment Pattern– Alignment pattern is used to
locate the position, when module is displaced due to Following are the types of transactions that can be
distortion. done through UPI–
Margin– This is the blank area around the QR code. • Sending/Receiving Money; You can transfer money
Model 1 and 2 require a margin of four modules and two and receive money instantly through VPA.
modules require a Micro QR Code. • Bill Payment; You can also pay your utility and
Timing Pattern– The white and black modules are communication bills.
arranged alternately to determine the co-ordinate. • Merchant Transactions; You can shopping or movie
Format information– It contains the error ticket booking etc through the online app.
correction rate of the code and the mask pattern of the
code. Format Information is read first when the code is Following are some of the essential steps to register
decoded. on the UPI app–
M1R5 170 YCT
Search on TG: @apna_pdf
• First download the UPI application from the Google * Bill Payment,
Play App Store or the bank's website. If you try to * Balance Enquiry,
download it from the bank's website, most of the * Sending money request.
banks will send you the download link on your Non-Financial Services–
phone. * Generating OTP,
• Once you have downloaded the application, open the * Changing and Creating PIN,
app and create a profile. For registration you need to * Creating and changing virtual payment addresses,
enter some details. * Add and remove bank accounts,
• After this you have to enter the virtual ID of the * View transactions,
beneficiary and the amount you want to send. * Generating QR code,
• Once you receive the confirmation message, check * Complaint related to any transaction.
the payment details to confirm the payment. 8.4 Aadhaar Enabled Payment System:
• Then you have enter MPIN. AePs (Aadhar Enabled Payment System), provides
• You will receive a notification containing the basic financial services at low cost to access device
message 'Success' or 'Failure' of the payment. (micro ATM) arranged in an interpretable manner on low
cost access devices (cash deposit, cash widthdrawl,
Remittances). This system has been developed by the
National Payment Corporation of India through which
8.3(i) How to receive Payment Using UPI ?: Balance enquiry cash deposit etc. necessary banking
transactions are allowed to do. It allows customers to use
This will also help you understand how to accept or
their Aadhaar number to make payments by providing
decline a UPI payment request if someone sends you
Aadhaar verification at Point of Sale or Micro ATM.
from their end. For this also you need to login your
RBI has not set any limit for the transactions that
bank's UPI application–
can be through AEPS. Some banks have set a maximum
• Once you are logged in, click on the Collect Money
transaction limit of 50,000 per day.
option which displays the payment request.
The following services offered by AePS are
• Next you need to enter the virtual ID of the payee or
available in both interbank and intra bank mode–
remitter, the amount as well as the account that
• Cash Withdrawal
needs to be credited.
• Cash Deposit
• On the next screen you have to review and check the
• Balance inquiry
payment details and click on confirm.
● Aadhar to Aadhar Fund Transfer
• Request money notification is sent to the payer. He
• Mini Statement
reviews your payment request and opens his bank's
UPI app. • Best Finger Detection
• Payer may accept or decline your decision to pay 8.4(i) Features of Aadhar Enabled Payment
your accounts payment. System:
• He has to enter the MPIN to authorize the • It supports various network protocols
transaction. (CDMA/GPRS/PSTN/IP).
• Once you complete the transaction, get a notification • It facilitates delivery of government schemes like
whether the transaction is 'Success' or 'Decline'. NAREGA, social security, pension, handicapped,
• As a recipient, you will also receive text and old age pension etc. of any central or state
notification from the bank once the money is government bodies using Aadhaar verification.
credited to your account. • Aadhaar biometric based transactions.
8.3(ii) Benifits of UPI: • It autolocks when the Micro ATM is idle.
Two types of services are available to the users • Many Technology Service Providers (TSP) are
through UPI– Financial Services and Non-Financial arranged by the banks.
Services. 8.4(ii) Benifits of AePS:
Financial Services– Enables the weaker sections of the society to access
* Transfer money, economic and basic services benefits associated with
* Receive money, AePS. Following are the AEPS societies–

M1R5 171 YCT


Search on TG: @apna_pdf
• Through this, one can make money payment, deposit 8.5(i) How to send money using USSD *99#,
amount, get mini statement and check balance.
Using IFSC Code & Bank Account Number?:
• No debit card is required.
• Through this all bank account holders can access • Dial *99# from your registered mobile number.
their bank accounts. • Proceed to your Bank's Abbreviation or first 4
• The Banking Correspondent of any bank can characters of IFSC or 2 digits Bank Numeric Code.
undertake specified transactions of any bank. • Select the option to transfer funds using IFSC code
• Banking correspondent in remote rural location can and mobile number.
be reached through Micro POS. • Enter Beneficiary/Payee Account Number, IFSC
8.4(iii) How to Use AePS?: Code and Transaction Amount.
Following are the steps to use AePS– • Key in the MPIN and enter the last four digits of
• Visit the Banking Correspondent in your nearest your bank account number. A confirmation message
area. will be displayed on the screen.
• Enter your 12 digit Aadhaar number in the POS 8.6 Card (Credit/Debit):
machine.
A small, rectangular piece of plastic that holds your
• Select the type of transaction like Cash Deposit,
personal data like signature, photo, and other
Withdrawal, Mini Statement, Intrabank, Fund
information. Using which you can make payment and
Transfer Balance Inquiry or e-KYC etc.
receive money from the bank etc.
• Select the name of the bank.
• Enter transaction amount. 8.6(i) Credit Card:
• Validate transactions using your biometric A credit card is a card that allows the purchase of
(fingerprint or iris scan). goods without cash. Each card has a unique number.
• The transaction is completed. There are other details (validity date or a code) on the
• The receipt is given to you by the banking card. Through these, customers can buy any goods or
correspondent. services. The card issuer transfers the money to the
8.5 Unstructured Supplementary Service seller. Paying by using a credit card is one of the most
Data: common methods of electronic payment. The customer
Unstructured Supplementary Service Data (USSD) can also borrow money from the line of credit to buy
is a Global System for Mobile (GSM) communication things.
technology used to send text between mobile phones and Credit card makes money in three ways–
application programs in the network. It is a technology • Fees such as late payment or annual fees
platform through which information can be transmitted • Interest payments, when you do not repay your loan.
through GSM network on a basic phone and will be • Merchant fee each time the card is used
available on all mobile phones with SMS facility. To use Advantages of Credit Card–
USSD, users need to dial *99# to get mobile balance. • Nowadays, the trend of online shopping has
These codes communicate directly with the server of the increased in which online companies give attractive
telecom company and are known as USSD. discounts to the customers.
• In return for using the credit card, banks give reward
points to the customer, which the customer can later
redeem.
• With the electronic record that comes with the credit
card, the customer receives a statement by e-mail at
the end of the month so that you can track your
expenses.
• Along with credit cards, many companies also
provide insurance.
• Credit cards reduce the need to carry cash. Most
Fig- 83 USSD Platform retailers accept credit cards.

M1R5 172 YCT


Search on TG: @apna_pdf
Disadvantages of Credit Card– 8.6(iii) Difference between Credit and Debit
• Using a credit card is like taking a loan. Delaying Card:
the payment of the credit card becomes very high.
• Due to credit card you never feel short of money Credit Card Debit Card
which increase your expenses. It allows to borrow for It deducts money
• Late payment can lead to downgrade of your credit purchase of goods and directly from your
services. saving bank account or
card due to which you will face problems in future.
current account.
• Nowadays online hacking has increased a lot to
A credit card can be It is linked to a saving
which sometimes credit card gets hacked and due to
obtained from the bank or current account and
which you can lose a lot of money.
even without opening an can be issued by a bank
• While giving credit cards to their customers almost account. only.
all banks say that you will be paid at 0% interest rate Credit cards have a credit Debit cards do not have
but instead many conditions are also applicable period. Transaction any credit period. When
which are generally not followed by the people and amount is given on the the debit card is swiped,
they have to pay more. basis of credit of the user. the funds available in
8.6(ii) Debit Card: the account are
A debit card is a payment card that deducts money deducted immediately.
from a customer's checking account to pay for a Credit card purchases can No credit facility is
purchase. Debit card eliminates the need to carry cash or be converted into EMIs. available. Payment is
cheques to make purchases directly from your savings. made immediately from
Except this debit cards are also known as 'cheque cards', own funds.
which is offered by major payment processors such as Usually offered with a It is issued free of cost
Visa and offer other consumer protections. Debit cards joining and annual fee. with savings account.
can also be used at ATMs to withdraw cash with a debit Late payment of credit Penalty charges are not
card, you can spend only as much money as is avialable cards attracts penalty. applicable in debit
with you. cards.
8.7 E-Wallet:
Advantages of Debit Card– An e-wallet is a type of electronic card that is used
• By using a debit card, you can avoid the long queues for online transactions through a computer or
at the bank and save time. smartphone. Its utility is similar to that of a credit or
debit card. The e-wallet should be linked to the bank
• Getting a debit card is very easy once the account is
account for making the payment. It is a type of pre-paid
opened, on a Debit card is issued by the bank
account in which the user can deposit money for any
making a request. future online transactions. Its main objective is to make
• There is no need to carry cash or check book when paperless money transactions. An e-wallet is a system
using the debit card. that securely stores a user's payment information and
• Using Debit Card, you can recharge your mobile, passwords. There are mainly two components of an e-
pay electricity bill etc online. wallet– Software and Information,
• If you want to enable internet banking in your bank Software components store personal information and
account, then enable internet banking with debit card provide data security and encryption. The information
component is a database of details provided by the user
without going to the bank.
including his name, shipping address, payment method,
Disadvantages of Debit Card–
amount to be paid, credit or debit card details, etc.
• This card is prone to misuse if stolen, however you
8.7(i) Benifits of E-Wallet:
can also block it with your registered mobile
• It can send or receive payments anywhere in the
number.
world.
• Due to the use of this card online, there is a
• Unlimited Transfers
possibility of online fraud in it.
• No need to enter credit/debit card details while
• If you use the debit card more than its daily limit, doing every online transaction.
then you also have to pay its charge to the bank. • Account can be managed through only mobile
• Balancing your account can be difficult unless you phone.
record each and every debit card transaction. • Provides fast access to communications
M1R5 173 YCT
Search on TG: @apna_pdf
Why use e-wallet?– Using E-Wallet saves your HDFC PayZapp– HDFC Payzapp is a mobile
time as there is no need to enter credit/debit card details wallet for bill payment, that allows basic things like
every time you make an online payment. You can make payments, mobile recharge, DTH recharge. It allows
utility payments, online shopping, mobile phone purchases from e-commerce sites and it actually allows
recharge, etc. using the e-wallet. the user to browse the products of e-commerce
8.7(ii) Various E-Wallet Payment Gateway: companies directly from their own interface.
Paytm– Paytm is the most popular e-wallet in India. ICICI Pockets– This is a highly popular digital
It is approved and authorized by the Reserve Bank of wallet in pockets created and operated by ICICI Bank.
India. It allows not only online payments, but has also This digital wallet is powered by VISA. This wallet can
brought the option of offline payments, where money can be used by users of any bank and can take up to 20,000
be transferred without active internet connection. Paytm balance in the account.
has been granted license to set up payments bank by 8.8 Point of Sale [POS]:
RBI, this means that Paytm may soon offer savings and
Point of sale means that the customer pays money to
current bank accounts, issue debit cards.
a merchant for receiving services or goods after
Citrus Wallet– This is a popular payment gateway.
receiving the payment, the merchant gives a receipt for
Movies, dinner and drinks bill payment, money transfer
that transaction. The customer can also make the
all can be with just a few tips. This citrus wallet is
payment by credit or debit card.
licensed from the Reserve Bank of India. This Site
Wallet is enriched with a network of 21 million user
base.
SBI Buddy– This bank offers a complete e-wallet
app for those who prefer to use digital wallets. Available
in 13 languages, this wallet allows you to send money,
receive money and recharge mobile and DTH services
utility bill payments, booking movie tickets, hotel and
flight etc.
Once Internet Banking is enabled, the customer can
maintain a balance of up to 50,000 in his wallet. 50,000
Figure- 8.4 Point of Sale
per day and can do transactions up to 100000 in a month.
Mobikwik– It is the main player in the e-wallet
The full meaning of POS is Point of Sale. POS is a
ecosystem. It also provides a host of paid options. This e-
computerized machine which is used in place of cash
wallet is also authorized and licensed by the Reserve
Bank of India, making it one of the most trusted mobile register. The POS machine is used to read debit/credit
wallets available in the Indian market. cards, verify purchases, and give receipts to customers.
ltz Cash– It is powered by Itz Cash Card Ltd and But this function can be change according to business
Provides end-to-end payment solutions with secure and location.
money transfer option to Reserve Bank of India account. A POS machine is capable of doing cashless
It allows a digital transaction like- balance transfer, transactions alone. Nowadays POS is being used
prepaid mobile recharge, movie tickets, railway ticket everywhere from delivery boy of e-commerce companies
booking etc. to shopping mall, restaurant, hospital etc.
Oxigen Wallet– This mobile wallet is one of the
most popular mobile wallets in India. Like Mobikwik Following are the benefits of using POS–
and Paytm, Oxigen Wallet is also approved by the • Customer does not need to carry cash for making
Reserve Bank of India. It actually claims to be the first purchases.
• Record of every transaction is available.
non-bank wallet. It has tied up with National Payments
Corporation of India to allow instant money transfer. The • Eliminates the possibility of black money and
maximum limit is to INR 5,000 in a single transaction corruption.
and in a month, not more than INR 10,000 can be • Due to the complete transparency of the money
transferred. transaction, the government will get full tax.
M1R5 174 YCT
Search on TG: @apna_pdf
8.9 Internet Banking: ■ Customer can transfer money between linked
Through internet banking, the bank customer can see accounts, as well as balance checking, view recent
the complete account of the bank using the website and transactions etc.
can do its transactions also. ■ Payable Demand Draft (DD) can be made by name
Bank customers can use this facility by registering of anyone.
themselves on the bank's website and creating a user ID ■ Vser can pay income tax.
and password. Through this, customers can transfer ■ Pay Credit Card Bills, Utility Bills (Electricity,
money, pay bills, update accounts, etc. For this, it is Telephone, Gas, Mobile, Insurance etc.).
mandatory for the customer to have computer or mobile Note–One should never share his internet banking
internet connection. password with anyone.
■ To access Internet Banking,
• Open the bank's secure website.
• Insert the Customer ID and Password to login
Internet Banking.

Figure-8.7 Internet Banking


8.9(i) Advantages and Disadvantages of
Internet Banking:
Internet Banking is a system that allows a customer
Figure- 8.5 Login Form to do financial and non-financial transactions from his
• After successful authentication, you will be taken to Net Banking account.
the Customer Area of Internet Banking. Advantages of Internet Banking– Its benefits are
as follows–
• Customers get permanent access to their bank
anytime and anywhere.
• Transaction is secure.
• Instant money transfer helps users in time of urgent
need.
• On withdrawal of money, it is immediately informed
on the mobile, so that you can easily monitor your
account.
• Through this, you can do all the work of the bank
like- checking balance, money transfer, opening and
closing FD or RD.
Disadvantage of Internet Banking–
• Even if you need net banking, you cannot do
anything if the server is down at that time.
• If any other person gets to know about your
netbanking account, he can withdraw all the money
Figure- 8.6 Customer Area and cause huge loss.
• Bank tells net banking as free but it is not free.
Feature– Users can do the following things through When using it, many types of charges are taken from
Internet Banking– the user.

M1R5 175 YCT


Search on TG: @apna_pdf
8.10 National Electronic Fund Transfer called batch mode. Under this, money can be transferred
'NEFT', Real Time Gross Settlement from a person, company or bank branch to the account of
'RTGS': a person or company in the same branch. There is no
National Electronic Fund Transfer; It is a method
limit on the minimum or maximum amount.
of fund transfer through internet in the country which
The complete process of NEFT is shown in the
was started in November 2005. Due to this process
picture given below–
through internet, it is automated on hourly basis, which is

Figure-8.8 Process of NEFT.


Process of NEFT– • Through NEFT, any firm, individual, corporation, etc.
■ The person fills a form in which he fills the payee can easily send money from one account to another.
related information like payee name, bank, branch • To whom the money is sent (Beneficiary Customer)
does not need to go bank branch to receive the funds,
name, IFSC code, account type, account number and nor does it have to do any kind of paper formality.
amount to be deposited. • The fees in NEFT are very less.
■ After filling all the relevant information, the person • It is more useful for Low Value Transaction.
authorizes the bank to credit the money to the payee's • Here the receiver does not need to pay any additional
account. fee.
■ Person generates message to bank branch NEFT • Each batch is of one hour duration.
service centre. • Credit confirmation of remittances is done through
■ NEFT Service Center forwards the received message SMS or e-mail.
to NEFT Clearing Center through National Clearing 8.10(i) What is IFSC:
Cell, Bank of India Mumbai. The full name of IFSC Code is Indian Financial
■ Thereafter NEFT Clearing Center in Fund Transfer System Code, which is the unique code of each bank
Transaction sorts the message as per the destination branch. It is an 11 character alphanumeric code, given by
banks and maintains the account entries. So that funds the Reserve Bank of India to each branch. This code
can be given to the destination banks by taking funds initially consists of 4 character alphabets, which
from the originating banks. represent the name of the bank. The fifth character of this
■ After this the message of bank wise transfer is code is always 0 and the last 6 digits represent the branch
forwarded to the destination banks by the service code of the bank.
center. Money comes directly to your account through IFSC
■ Finally, the destination bank receives the inward fund Code. IFSC Code is also used for the convenience of
transfer message from the clearing center and credits NEFT, RTGS, IMPS. Apart from this, it can be used for
the amount to the recipient.Transfers to the account (as many other types of work. Like- Internet banking,
foreign money transaction, online payment, fast payment
per Figure-8.8) etc. all these transactions cannot be done without this
Following are the advantages of using NEFT– code.
M1R5 176 YCT
Search on TG: @apna_pdf
8.11 Real Time Gross Settlement (RTGS): How to transfer funds using IMPS?– IMPS uses
bank account and IFSC details for fund transfer. Using
The meaning of real time gross settlement system is this you can transfer funds to any bank account. For this
used to settle the account of money on real time. The you need internet connection, netbanking or mobile
amount sent through it, gets credited to the recipient's banking.
account at the same time without any time lag. 2 lakh or Follow the steps below to transfer funds–
more amounts by this can be sent. This is the most • Log-in to your net banking account by entering your
popular process of transferring money from one account password.
to another. • Select the beneficiary to whom you want to transfer
If for some reason the money is not transferred to funds or add a new beneficiary, as required.
To add beneficiary, you need to enter the details of
another account, then the money is sent back to your the person like name, bank account number, IFSC code
account. any person who has an account with the bank etc. Apart from this, you can also get an OTP through
can take advantage of the service. Fund transfer form has SMS on the mobile number for verification.
to be filled for RTGS. To send RTGS money, we need to • Enter the amount which you want to transfer.
• Verify all the details.
know the Beneficiary's Bank Account Number, Bank
• Click on Confirm.
Branch, IFSC Code, as well as a self-signed cheque. • The amount is deducted from your account and
Following are the benefits of using RTGS– credited into the receiver's account within seconds.
• Transfer of money through RTGS is done in real • You receive an SMS from the bank with transaction
details.
time.
Advantages of IMPS–
• You can transfer large amount of money using • Real time money transfer
RTGS. • You can transfer funds any time through IMPS
• RTGS is very fast and secure mode of money 24×7×365 days in a year.
transfer. • The transaction limit through IMPS is Rs 1 lakh to Rs
2 lakh.
• Through RTGS, you can transfer money up to a
• Available on multiple channels like Net Banking,
minimum of 2 lakhs and a maximum of any limit.
ATM, SMS and Mobile Application.
8.13 Online Payment:
Table 8.1: The difference between NEFT and RTGS
The use of online bill payment systems started in the
is shown. 1960's. It was mainly used in financial and banking
Factors NEFT RTGS institutions. It is a service that allows to make bill
Full form National Real Time payments like electricity bill, car payment, credit card
Electronic Fund Gross payment etc.
Many banks that have comprehensive online
Transfer Settlement banking services allow customers to schedule automatic
Speed Slow Fast payments and track their past acquaintance allows you to
work with the platform. It enables various forms of
amount of time According to On the basis of financial transactions like- Business to Business (B2B)
batch mode One-by-one Business to Consumer (B2C) Consumer to Business
(C2B) and Consumer to Consumer (C2C).
Minimum 10,000 to 2 lakh up to 2 lakh
Some points should be considered while selecting
amount to be or more and using online bill payment service–
transferred • Do not make bill payment through a link received
through any e-mail.
Maximum up to 2 lakh no upper limit
• Do not respond to any request for information via e-
amount to be mail directly for any bill payment service.
transferred • Avoid clicking on any e-mail link that appears to be
from your bill payment service.
8.12 Immediate Payment Service:
• Read the privacy and security policy of the bill
Immediate Payment Service is an instant payment payment service for strong data encryption and other
inter bank electronic fund transfer system which provides security policies must be mentioned.
an inter bank electronic fund transfer service through • Always use firewall software and antivirus software
mobile. It is managed through the National Payment for Windows or MAC.
Corporation of India (NPCI). It has been built on the Benefits of Online Payment–
• Saving time and effort
existing National Financial Switch network. The main
• Cashback and EMI facility
feature of IMPS is to makes instant transfers. It is a good • Reduction in expenses
banking platform. In this, the transaction charge is very • Reduced risk of theft
minimal and there is a transfer limit of Rs 2 lakh per day. • Shopping etc. sitting at home.
M1R5 177 YCT
Search on TG: @apna_pdf
Practice Questions with Explanatory Solutions
1. The full form of ATM is– doing cashless transactions. Nowadays POS is being
(a) Automated Teller Machine used everywhere from delivery boy of e-commerce
(b) Auto Transaction Machine companies to shopping mall, restaurant, hospital etc.
(c) Auto teller machine 4. The full form of IFSC is–
(d) None of these (a) Indian Fund System Code
Ans. (a) The full form of ATM is Automated Teller (b) Indian Financial System Code
Machine. These are automatic banking machines, cash (c) Indian Fund Security Code
points, which are a kind of data terminal, which has (d) Indian Financial Security Code
input and output devices like monitor, keyboard, Ans. (b) The full form of IFSC Code is Indian
mouse. It is connected to the host processor, which Financial System Code, which is a unique code for
acts as a link between the bank and the ATM. For this each bank branch. It is an 11 character alphanumeric
internet connection is necessary. As soon as the user code, which is given by the Reserve Bank of India to
inserts the ATM card in the ATM machine, it connects each branch. This code initially consists of 4 character
to the host processor of the bank and money is alphabets, which represent the name of the bank. The
withdrawn without going to the bank. ATM is such an fifth character of this code is always 0 and the last 6
electronic machine, which, can do basic transactions digits represent the branch code of the bank.
by itself despite being representative of any bank
5. IMPS stands for–
branch,. (a) Intermediate Payment Service
2. UPI is– (b) Immediate Payment Service
(a) Messenger (c) Inter Money Payment Service
(b) Real Time Payment System (d) Immediate Payment Security
(c) (a) and (b) both
Ans. (b) The full form of IMPS is Immediate Payment
(d) none of these Service. It is an instant payment inter bank electronic
Ans. (b) UPI (Unified Payment Interface) is a system fund transfer system, which provides an inter-bank
that provides multiple banking features to bank electronic fund transfer service through mobile. UPI is
accounts in a single mobile application. This is instant also IMPS based service.
money transfer through mobile devices 24×7 x 365
6. USSD means–
days. It is called UPI to receive money through UPI,
(a) Unstructured Supply Service Data
an instant real time payment system developed by the
(b) Uniform Supply Service Data
National Payments Corporation of India. (c) Unstructured Supplementary Service Data
3. POS machine works– (d) none of these
(a) Debit/Credit card reading
Ans.(c) USSD stands for Unstructured Supplementary
(b) giving the receipt of the goods to the customer
Service Data. It is a Global System for Mobile (GSM)
(c) both (a) and (b) communication technology used to send text between
(d) none of these mobile phones and application programs in the
Ans. (c) The full meaning of POS is Point of Sale. network.
POS is a computerized machine which is used in place
7. The full form of UTR number is–
of cash register. The POS machine is used to read (a) Unique transmission reference
debit/credit cards, verify purchases, and give receipts (b) Unique transfer reference
to customers. But this work can be change according
(c) Union transaction reference
to business and location. A POS machine is capable of
(d) Unique transaction reference

M1R5 178 YCT


Search on TG: @apna_pdf
Ans. (d) The full form of UTR number is Unique Ans. (d) QR code [Quick Response Code] is a two
Transaction Reference Number. Whenever there is a dimensional barcode. It can be read by digital devices
transaction of money between any two bank accounts, and stores information. 7089 numbers and 4296
an UTR number is issued, which is unique. With the alphanumeric characters can be stored in QR code.
help of UTR number, you can check the status of your 12. The maximum loan limit for business under
fund transfer. Mudra Yojana (PMMY) is–
8. The facilities available through AePs are– (a) 5 lakh (b) 10 lakhs
(a) Balance Inquiry (c) 15 lakhs (d) 20 lakhs
(b) Cash Deposit Ans. (b) The full name of MUDRA scheme is Micro
(c) cash withdrawal Units Development and Refinance Agency. Mudra
(d) All of the above Yojana has been made by the Government of India to
Ans. (d) AePS (Aadhaar Enabled Payment System) is provide funds to those people whose income is less
an Aadhaar based payment system through which than 10 lakhs. Pradhan Mantri Mudra Yojana started
inter financial banking transactions can be included on 8th April Done since 2015. The maximum loan
easily. This system has been developed by the limit for business under PMMY is Rs.10 lakh.
National Payments Corporation of India (NPCI). 13. EMI means–
Services like cash withdrawal, cash deposit, balance (a) Every Month Instliment
enquiry, Aadhaar to Aadhaar fund transfer, mini (b) Equate Month Installment
statement, etc. can be availed through AePS. (c) Each Month Installment
9. When did the IMPS service start? (d) None of these
(a) 23 November 2015 Ans. (b) EMI stands for Equate Monthly Installment
(b) 22 November 2016 The Equated Monthly Installments (EMIs) that are
(c) 22 November 2010 paid to repay a loan or buy goods are called EMIs.
(d) 23 November 2012 14. Which bank first started the Aadhaar based
Ans. (c) IMPS (Immediate Payment Service), is an microATM?
instant payment inter bank electronic funds transfer (a) SBI (b) PNB
system, which provides an inter bank electronic funds (c) HDFC (d) AXIS
transfer service through mobile. It is operated through Ans. (d) Micro ATM service was started in 2018 and
the National Payment Corporation of India (NPCI). first Aadhaar based micro ATM was started by Axis
This service started from 22 November 2010. Bank.
10. What is the full form of EFT– 15. The full form of PAN is–
(a) Electronic feature transfer (a) Personal Account Number
(b) Electronic Fund Transmission (b) Permanent Account Number
(c) Electronic Fund Transfer (c) Person Account Number
(d) None of these (d) none of these
Ans.(c) The full form of EFT is Electronic Fund Ans. (b) The full form of PAN is Permanent Account
Transfer. EFT is a system in which money is sent Number. This is a unique identity card and any kind of
from one bank to another through computer, ATM or financial transaction is required in a 10-digit
wire transfer without any paper documents. alphanumeric number is present in the PAN card,
11. What is the maximum number of characters that which is received by the Income Tax Department.
can be stored in the QR code? 16. What is the full form of CVV?
(a) 5000 (b) 10,000 (a) Card Virtual Verification
(c) 7000 (d) None of these (b) Card Verification Value
M1R5 179 YCT
Search on TG: @apna_pdf
(c) Credit Verification Value 20. What is the full form of DFT?
(d) Credit Virtual Value (a) Dynamic Financial Tools
Ans. (b) The full form of CVV is Card Verification (b) Digital Fund Tools
Value. There are some codes on debit cards and credit (c) Digital financial tools
cards, which are called card security codes. It was (d) Double finance tools
invented by Michael Stone in the UK in 1955. Initially Ans.(c) Full form of DFT is- Digital Financial Tools
CVV codes were of 11 digits but later it was kept Digital Financial Services provides basic financial
from 3 to 4 digits. services to the poor at very low cost through latest
17. NRI means– technologies. DFS (Digital Financial Services)
(a) Non Rural Individuals channels provide 24x7 365 services. Digital channels
(b) Non Rural Immigrants provide customers and service providers with the
(c) Non Resident Indian latest technologies. Substantially reduces costs.
(d) None of these 21. What is the full form of UTR?
(a) Unique Transaction Reference
Ans. (c) The full name of NRI is Non-Resident
(b) both a and b
Indian. The person of India who leaves India and lives
(c) Unique Transmission Reference
in some other country and adopts the citizenship of
(d) None of these
that country is called NRI. There are many residents
of India, who are living in foreign countries. It is a Ans. (a) The full name of UTR is Unique Transaction
rule all over the world that a person can get citizenship Reference. It is a 22 character code that is generated in
of only one country. If the person also has citizenship the RTGS system to uniquely identify any transaction.
of any other country, then legal action can be taken In NEFT, this code is of 16 characters. UTR number is
against him. a unique number.

18. KYC means– 22. When has the symbol of Indian rupee been
recognized?
(a) Know Your Customer (a) 2009 (b) 2010
(b) Know Your Character (c) 2012 (d) 2015
(c) Both of the above
Ans. (b) The Indian rupee symbol (`) was issued by
(d) none of these
the Government of India on 15 July 2010. It is the
Ans.(a) KYC means- Know Your Customer. KYC symbolic currency symbol of the Indian Rupee, the
guidelines are used for customer identification official currency used in India.
process. This includes correct identification of account
23. PoS is–
holders, sources of income, nature of their industry,
(a) Point of sale
etc. so that banks are able to recognize the credibility (b) Picture of Sale
of their customers and give them good facilities. (c) Position of Sale
19. What is IFSC Code? (d) None of these
(a) 11 digit alphanumeric code Ans. (a) The full form of PoS is Point of Sale. Point of
(b) Indian Financial System Code sale means that the customer pays money to a
(c) both (a) and (b) merchant for receiving services or goods. After
(d) none of these receiving the payment, the merchant gives a receipt
Ans. (c) The full form of IFSC Code is Indian for that transaction. The customer can also make the
Financial System Code, which is a unique code for payment by credit or debit card.
each bank branch. It is an 11 character alphanumeric 24. What is Aadhaar seeding?
code, which is given by the Reserve Bank of India to (a) Linking Aadhaar with bank account
each branch. (b) Linking Aadhaar card with post office

M1R5 180 YCT


Search on TG: @apna_pdf
(c) Linking Aadhaar card with gas connection 29. Atal Pension Yojana is for Indian citizens till
(d) None of these which year–
Ans.(a) Aadhaar seeding is related to banking. It (a) 25-45 years (b) 30-60 years
means- linking Aadhaar number with your bank (c) 18-40 years (d) 20-55 years
account. After adding Aadhaar number to your Ans.(c) The objective of Atal Pension Yojana is to
account, you can withdraw money from your account provide guaranteed pension benefits to people in the
anytime, anywhere. age group of 18-40 years. participants of the scheme
25. From which two languages combination of the People will be given minimum 1000 and maximum
Indian currency symbol is derived? 5000 pension per month after the age of 60 years.
(a) Devanagari, Arabic (b) Arabic, Persian 30. What is the time limit for OTP?
(c) Devanagari, Roman (d) All of the above (a) 5 minutes (b) 10 minutes
Ans.(c) The Indian currency symbol ` is made by (c) 30 minutes (d) none of these
combining the letter (j) of the Devanagari script and Ans. (b) OTP (One Time Password) is a security
the letter (R) of the Roman script, in which a code, which is of 6 digits. It is used at the time of
horizontal line are also made. The Government of online transaction. OTP prevents us from
India accepted this symbol on 15 July 2010. unauthorized person login to internet banking, e-
26. PIN means– commerce website, e-mail, gmail etc. and money
(a) Portable Identification Number transaction. OTP can be valid for a maximum of 10
(b) Permanent Identification Number minutes. Often many OTPs are valid only for 30 or 60
(c) Personal Identification Number seconds.
(d) None of the above
31. USSD can be used for how many ' payments per
Ans. (c) The full form of PIN is Personal customer per day.
Identification Number. It is a numeric or alphanumeric (a) 10000 (b) 25000
code used in the authentication process of a user (c) 50000 (d) 5000
accessing a system.
Ans. (d) USSD (Unstructured Supplementary Service
27. QR code means–
Data) is a service aimed at making banking accessible
(a) Quick Response Code(b) Quality Response Code
to every citizen of the country. Through this,
(c) Quick Response Code (d) None of these
customers can transfer payment of 5000 per day.
Ans.(a) The QR code is a two-dimensional barcode
32. Under Pradhan Mantri Mudra Yojana, the
created by the Japanese company Denso Wave in
amount of loan given to the child class is–
1994. It can be read by digital devices and stores
information. QR codes are often used to track (a) Rs 5 lakh
(b) Rs 10 lakh
information about products. When you scan the QR
(c) 50 thousand rupees
Code through webcam or mobile, the QR application (d) 5000 rupees
takes the user to the website or other web content. Ans. (c) Loan is given without any guarantee under
Codes hold information in the form of horizontal and Pradhan Mantri Mudra Yojana and no processing
vertical axes. Compared to regular barcodes, QR charge is also taken for the loan. In this scheme,
codes allow a large amount of raw data to be 50,000 under Shishu loan, 50,000 to 5 lakh under
embedded. Data can be stored up to 2953 bytes in Kishor loan and under Tarun loan Loans ranging from
these. 5 lakh to 10 lakh are given.
28. What is the full form of PAN? 33. IFSC code is used for which of the following–
(a) Present account number (a) OIL (b) RTGS
(b) Permanent Account Number (c) IMPS (d) all of the above
(c) Portable Account Number Ans. (d) Money comes directly to your account
(d) Personal Account Number through IFSC Code. Use of IFSC Code NEFT, RTGS,
Ans. (b) The full form of PAN is Permanent Account IMPS It is also done for convenience. Apart from this,
Number. This is a unique identity card and required in it can be used for many other types of work. Like-
any kind of financial transaction is A 10-digit Internet banking, foreign money transaction, online
alphanumeric number is present in the PAN card, payment, fast payment etc. all these transactions
which is received by the Income Tax Department. cannot be done without this code.

M1R5 181 YCT


Search on TG: @apna_pdf

9 OVERVIEW OF FUTURSKILLS
AND CYBER SECURITY

9.0 Introduction to Futureskils: ■ Nearly a century later, the emergence and expansion of
Future skills are abilities that allow individuals to electricity, gas, and oil from the 1870s onwards
solve complex problems in highly emergent contexts of represented the beginning of the Second Industrial
action in a self-organized manner and enable them to Revolution. Chemical synthesis gave us synthetic
perform successfully. They are based on cognitive, fabrics, dyes and fertilizers invention of telegraph and
motivational, voluntary, social resources, value based telephone.
and can be acquired in the learning process. ■ The second half of the 20th century saw the Third
The Future Skills Portal was launched on 19 Industrial Revolution with a new type of energy
February 2018. FutureSkills is an industry utility that (nuclear power), the rise of electronics (transistors and
helps India to upgrade skill and become a global hub for microprocessors), and the development of information
its talent in emerging technologies. Future Skills includes technology.
9 skills– Internet of Things, Big Data Analytics, Cloud ■ The fourth manufacturing technology is the trend of
Computing, Virtual Reality, Artificial Intelligence, automation and data exchange. Which includes Cyber
Social and Mobile, Blockchain Technology, 3D Printing Physical System, Industrial Internet of Things (IIOT),
/Additive Manufacturing and Robotic Process Big Data, Cloud Computing etc. Digital technology
Automation. allows new business models and value creators for
opportunities and is attainable for most developing
9.1 Industrial Revolution 4.0:
countries.
Industry 4.0 refers to a new phase in the industrial
Future skills training can help in increasing industry
revolution that focuses heavily on interconnectivity,
and employment. For which NASSCOM (National
automation, machine learning, and real-time data.
Association of Software and Service Companies) started
Industry 4.0 is also known as IIOT (Industrial Internet of
the Future Skill Portal on 19 February 2018, playing an
Things). Industry 4.0, is also known as the Fourth
important role.
Industrial Revolution (4IR), refers to a period of current
The diagram below shows the timeline of the
technology that is enabled by advanced technologies,
development of manufacturing in the industrial sector (as
such as artificial intelligence (AI), machine learning, big
in Figure 9.1). There are four design principals in
data, Internet of Things (IOT), Cyber Physical Systems,
Industry 4.0 that identifies and apply Industry 4.0
Robotics and Automation. It is often predicted that
scenarios. These principles are–
Industry 4.0 will differ from the first three industrial
revolutions because of the nature of work and its
disruptive and transformative impact on the future of
society. Industry 4.0 will blur the lines between the third
industrial revolution and the digital and organic spheres
occurring since the middle of the last century.
Technologies like cloud computing, big data and IoT
enable us to connect all production resources and allow
them to do real time conversion.
Industry 4.0 was first introduced in 2011 as
"Industry 4.0" to enhance German competitiveness in the
manufacturing industry by a group of different sectors Fig. 9.1 Timeline of development of manufacturing in
and their representatives. the industrial sector refers to ability.

■ The first industrial revolution spread from the end of Interconnection– It refers to the ability of
the 18th century to the beginning of the 19th century. machinery and related components to connect and
The invention of the steam engine and the emergence communicate with people via Internet.
of mechanization established the role of industry as the Transparency in Information– Transparency
foundation of the economic structure, spurring the operated by Industry 4.0 provides operators with useful
development of the economy and society. information needed to make appropriate decisions.
M1R5 182 YCT
Search on TG: @apna_pdf
Technical Support– It provides services, support • Sensors / devices; Sensors or devices help in collecting
and aids to the people. It focuses on the ability of cyber data from the surrounding environment and
enabled systems to physically support human resources networking to collect data. The device helps in sending
handle various tasks. data from one device to another through the network.
Decentralization of decisions– This principle refers • Connectivity; Data collected by sensors or devices is
to the ability of cyber physical systems to make their sent to the cloud infrastructure, but requires a medium
own decisions and to be as independent as possible of to sent it. For this, various mediums are used like
their function. cellular network, satellite network, Bluetooth, Wi-Fi
etc.
9.2 Introduction to Internet of Things • Data processing, when data reaches to the cloud after
[IOT]: collection, software is used for processing to stored
data.
The full form of IOT is Internet of Things. It was
developed by Kevin Ashton. It broadens the concept of • User Interface, it determines the way in which data is
the Internet. It is the connection of electronic devices presented to the end users.
containing various sensors. It is a concept that refers to Challenges of IOT–
a. Privacy
the connections between physical devices such as
b. Security
vehicles, home appliances and other objects embedded in
c. Electricity Consumption
electronics such as sensors and software refers to the d. Network Congestion
connection between these things that enables data Examples of Big Data are Stock Exchange, Social
collection and exchange etc. Media, Big Data in Education Industry, Healthcare
Industry, Public Sector, Media and Entertainment,
Banking Sector etc.

9.2(i) Advantages and Disadvantages of


IOT:
The full form of IOT is Internet of Things. It was
developed by Kevin Ashton. It broadens the concept of
the Internet. It is the connection of electronic devices
containing various sensors.
The definition of IoT has evolved due to a number
of technologies, real-time analytics, machine learning,
Figure 9.2 Internet of Things commodity sensors and embedded systems. The
traditional fields of embedded systems, wireless sensor
The definition of IoT has evolved due to a number networks contribute to enabling control systems,
automation, and the Internet of Everything.
of technologies, real-time analytics, machine learning,
Benefits of IOT– Following are the benefits of
commodity sensors and embedded systems. The
IOT–
traditional fields of embedded systems, wireless sensor
⇒IOT platform is used to establish a good connection
networks, control systems, automation and more between all the devices of IOT, which can be server or
contribute to enabling the Internet of other things. cloud.
IoT applications are anticipated to do many things ⇒After connecting IoT devices, reliable, secure and
including connectivity and intelligence. Extensively in communication requires high speed data
various domains it is used– communication between the devices and cloud.
• Wearable ⇒Sensor devices used in IOT technology detect changes
• Smart Home Applications in the weather and monitor its condition. Report the
data accordingly.
• Health Care ⇒IOT technology makes active network. IOT
• Smart Home environment conditions can't find out exactly without
sensors.
• Smart Cities
⇒IOT technology comes with hardware, calculation and
• Agriculture software, which makes the IOT device smart. Financial
• Industrial Automation aspects are the best advantage. This technology can
There are 4 basic components of IOT system used in replace the human beings who monitor and maintain
IOT technology– the supply.

M1R5 183 YCT


Search on TG: @apna_pdf
Disadvantages of IOT– The disadvantages of IOT 9.3(i) Characteristics of Big Data:
are as follows– Following are the main features of Big Data
⇒IoT devices are vulnerable in terms of security as Analytics–
sensitive information is transmitted from endpoints to Volume– This is the most important feature of Big
other devices via the Internet through connectivity Data. When analyzing data, its size is of paramount
devices. importance. We know the data size only through the
⇒Everything connected to the Internet is at risk of being size. Generally, the size of big data is in the range of
hacked, so there is a risk of private data leaking in IoT terabytes or petabytes.
devices. Variety– The format of the data is known only
⇒Being a complex and mixed network, there is always a through the variety of the big data. Any data is either
possibility of malfunction. structured, like tabular form data saved in our
9.3 Big Data Analytics: database, which we also call as RDBMS database.
The second type of data is semi-structured and there
It is a process in which large sets of data are is also unstructured data which is very difficult to
collected, organized and analyzed in order to find hidden convert into structured format. Nowadays, whatever
patterns and useful information. Big data analytics refers data saved through images, audio or social media
to the analysis of large amounts of data or big data. This belongs to the category of unstructured data, the
big data is collected from various sources including important task of Big Data is to convert this
unstructured data into a useful format.
social networks, videos, digital image, sensors and cell
Velocity– With the increment in the speed of
transaction records. The purpose of analyzing all this internet, the speed of data generation has also
data is to uncover patterns and connections. Data increased, due to which its frequency and speed are
analytics allows data scientists and various other users to analyzed at the time of data generation in Velocity.
evaluate large volumes of data transactions and other big 9.3(ii) Applications of Big Data:
data sources. It is a process in which large sets of data are
Types of Big Data– It is mainly of three types– collected, organized and analyzed in order to discover
a. Structured Data; Data that can be stored, accessed hidden patterns and useful information. Big data
and processed in a specified format. analytics refers to the analysis of large amounts of data
or big data. This big data is collected from various
b. Unstructured Data; These are data with unknown
sources including social networks, videos, digital image
structure. Due to the large size, many challenges sensors and cell transaction records. The purpose of
have to be faced in the processing of unstructured analyzing all these data is to make the patterns and
data. Examples of unstructured data are simple text connections clear. Data Analytics, Data Scientists and
files, images, videos etc. various allows other users to evaluate large volumes of
c. Semi-Structured Data: This type of data can have data transactions and other big data sources.
both the forms of data. DBMS tables, XML files etc. At present, there are many applications of Big Data
are examples of semi-structured data. in various fields. Following are the major areas where
Big Data is being used–
Driven by specialized analytics systems and
⇒Education– Its use in education ensures a great
software, as well as high-powered computing systems, experience for both students and teachers. It is possible
Big Data Analytics provides various business benefits, to monitor the actions of the students by Big Data.
including– ⇒ Government– Big data analytics is very useful in the
• Some Big Data tools such as Hadoop and cloud- government sector. This is useful in elections.
Government of India uses big data to improve policies
based analytics businesses can find cost benefits
and to know public opinion about the government.
when large amounts of data are stored. ⇒ Health Care– Healthcare is one area in which a lot of
• By knowing the needs and satisfaction of the data is generated. Big data has been used to identify
customers through analytics, you can create products Ebola virus, cure cancer etc. Big Data Analytics has
according to choices of the customers. aided in health improvement through personalized
medicine, clinical risk intervention and predictive
• Big data analytics is used in various applications like analytics, automated internal and external reporting of
e-commerce industry, social media, healthcare, patients, etc.
banking, entertainment industry etc. has become ⇒Manufacturing– Analysis of Big Data in the
prevalent among institutions. manufacturing industry to reduce component defects,
product quality can help to improve quality and
• Amazon, Flipkart, Myntra, Snapdeal and other increase capacity and save time and money.
online shopping sites that come in the e-commerce ⇒Insurance– Through Big Data, insurance companies
industry, use Big Data. collect data on the basis of health.
M1R5 184 YCT
Search on TG: @apna_pdf
9.4 Cloud Computing: 9.4(iii) Advantages of Cloud Computing:
Cloud computing refers to storing and accessing Following are the benefits of cloud computing–
data and programs over the Internet instead of on your • Unlimited data can be stored in cloud computing.
computer's hard drive. Cloud is a Metaphor for the
Internet.
• With cloud computing, we can back up our data and
recover lost data again.
When you turn on or run programs from the hard
drive, it is called local storage and computing. Cloud • After logging in by opening the browser, we can
computing is the use of hardware and software to deliver easily access cloud computing. It is not expensive.
a service over a network. With cloud computing, users • There is a lot of security in cloud computing. It is
can access files and access the Internet, using secure for data storage.
applications from any device. • Cloud Computing is very reliable.
Following are some of the major cloud service
providers– • It allows accessing utilities as applications over the
Amazon web services (AWS), Gooogle cloud Internet.
platform, Red Hat, SAP, Dropbox, Oracle cloud, • It can modify and configure the application online at
Salesforce, Microsoft Azure IBM cloud services, Adobe any time.
creative, VM ware. 9.4(iv) Characteristics of Cloud Computing:
9.4(i) Basic Concept of Cloud Computing: Some of the following characteristics of Cloud
Some of the services and models that work to make Computing are as follows–
cloud computing more accessible to end users are as (i) Resources Availability– In cloud computing
follows– every user has access to resources. Users can modify
• Public Cloud; It provides most of the computing physical and virtual resources as per their demand. This
resources such as software and storage on the is also called resource pulling because in this, resources
Internet. This type of cloud can be used by any are pulled to provide services to many users.
company or individual. (ii) On-Demand Self Service– User can use
computing resources as per their requirement. If it needs
• Private Cloud; This type of cloud computing instance resources (like storage space, database, virtual
resource is used exclusively within a single business keys) user can use them.
or organization. (iii) Broad Network Access– Cloud computing
• Hybrid Cloud; Hybrid cloud includes both public resources are present all over the Internet and can be
and private clouds. used easily. A user must have a device and an Internet
9.4(ii) Service Model of Cloud Computing: connection to access required resources.
Service model refers to the models on which cloud (iv) Easy Maintenance and Low Down time–
computing is based. The service models of cloud Server maintenance is very easy. Server down time
computing are as follows– becomes less. In some cases the downtime is non-
existent. The reason for this is– Cloud Computing is
• IaaS (Infrastructure as a Service); In type of Iaas
being used again and again. Updating due to which old
cloud service, we can take on rent to IT
deficiencies are fixed.
infrastructure like-server, operating system, virtual
(v) Elasticity– Companies can easily increase
machine, storage, network from cloud service
resources to increase their capabilities and can also
provider.
reduce resources if not required. To organize resources in
• PaaS (Platform as a Service): It Provides an on- cloud computing Capability.
demand environment for develop testing, (vi) Pay as you go– The user pays only for the time
distribution, and management of software he has used the resources. No extra charge is taken for
applications. this.
• SaaS (Software as a Service); It distributes software 9.5 Virtual Reality:
over the Internet on the basis of an on-demand and In virtual reality, 'virtual' means near and 'reality'
subscription membership. As- Microsoft One Drive, refers to what we experience as human beings. The
Google Drive, Dropbox WordPress, Office 365 and original meaning of virtual reality is 'near reality'.
Amazon Kindle etc. Virtual reality is a term used to describe a 3D
An example of a cloud computing provider is computer generated environment that can be explored
Google's Gmail. Gmail users can access Google-hosted and interacted by a person. Most current virtual reality
files and applications from any device with an Internet environments are primarily visual experiences displayed
connection. With the increase in computer and mobile either on a computer screen or through specialized
usage, data storage has become a priority in all sectors. stereoscopic displays, but some simulations include
To access cloud computing, the user should register and additional sensory information such as through speakers
provide ID and password. or headphones sound.
M1R5 185 YCT
Search on TG: @apna_pdf
Nowadays virtual reality is used in advanced fields 9.6 Artificial Intelligence:
of medicine, engineering, education, entertainment, In the 1950s, John McCarthy described artificial
design and training. Virtual Reality (VR) is a computer intelligence. Artificial intelligence (AI) is the field of
interface that simulates a realistic 3D visual experience. computer science that focuses on building intelligent
machines that act and react like humans. Technology has
We perceive the world on the basis of five senses -
become an essential part of the industry. Machines can
Touch, See, Smell, Hear, Taste and our brain helps us in act and respond like humans if they have enough relevant
doing all this. Sense of reality is experienced due to the information. AI has become a part of our daily life. This
combination of the sensory information and the sensory technology is used in a wide range of day to day
system. Virtual reality has many applications in the fields services. The machine is used to speed up the working
process and gives right result. Nowadays there are many
of entertainment, education, marketing and medicine.
such fields which have started using Artificial
9.5(i) Applications of Virtual Reality: Intelligence. Like health, education, automobile etc.
Virtual reality technology has many applications in Many companies like Amazon, Facebook, Flipkart
human life. Some of the major ones are as follows– and Apple have adopted machine learning technology
recognizing the value of this technology. Planning to
(i) Military– Virtual Reality has been adopted by all
invest more to grow further. Artificial intelligence is a
the three military forces Air Force, Navy and Army. VR broad subject that includes many theories and
has various uses in the military. It allows to trained techniques. Some of the sub-fields that belong it–
soldiers in a simulated battlefield without the risk of • Aritificial general intelligence
soldiers being killed or injured. • Natural language processing
(ii) Real Estate– VR is used to view the plan of a • Machine learning
building. It gives 3D images. Architects and developers • Super intelligence
can create imaginary versions of the proposed buildings
• Computer vision
in their virtual reality. Database and their potential
• Cognitive computing
clients can view the architect from there.
• Deep learning
(iii) Cinema– Now many cinemas have adopted VR
technology. They distribute head mounted display units
9.6(i) Goal of AI:
The main goals of Artificial Intelligence are as
for each film to all viewers. When the effect of this unit follows–
is combined with the powerful speakers, the movie
• Creating Expert Systems– Creating systems that
becomes more impressive. can exhibit intelligent behavior, it can learn, display,
(iv) Medical Field– Now surgeons use virtual explain, and advise their users.
reality to locate unwanted tumors in the patient's body, it • Implementing human intelligence into
enables them to remove the tumor without any kind of machines Creating– These systems think, understand,
complications. Virtual reality is now used for robotic learn and behave like humans.
surgery where the robot is in control of the surgeon. This 9.6(ii) Applications of AI:
increases the speed, accuracy and effectiveness of The main applications of Artificial Intelligence (AI)
are as follows–
surgery procedures.
(v) Aviation– to simulate flying experience to • Healthcare– The biggest use of AI is in the
healthcare industry. Treatment of patients can be better
trainee and test trainee pilots. VR is being used for Every
and quicker. Now health assistants are also available for
pilot to pass a number of simulation tests before flying a common diseases.
real plane. That's what the simulation feels like. It is one
• Business– Now buisness is being deal by
of the oldest applications of virtual reality.
machines with the help of robotic process automation.
(vi) Education– Virtual reality has also been
adopted in education which improves teaching and Machine learning algorithms are now being integrated
learning. With virtual reality, a large group of students with analytics and CRM platforms to learn how
can interact with each other in a 3-D environment. It companies can better serve their customers.
enhances understanding. And also makes learning fun for • Education– Automatic grading can now be done
the students. with the help of AI so that educators can get more time
(vii) Business– Virtual reality has also been adopted to teach children. With the help of AI, any student can be
in business. Now it is used for commercial environment. thoroughly inspected, whether he is needed, in which
subjects he is weak etc. With the help of AI, that student
Virtual tour is being done for training of new employees.
can be helped in the right way.
M1R5 186 YCT
Search on TG: @apna_pdf
• Finance– With the help of AI, the financial How does blockchain work?– A blockchain is a
institution is getting a lot of benefits. Because earlier the growing list of records called blocks that are linked using
company had to invest a lot of money and time in data cryptography. Cryptography is a process that uses data to
analysis, but now AI does everything in a very short prevent private messages from being read.
time.
Encrypts and secures communications. Blockchain
• Manufacturing– AI is also being used very technology is commonly used by cryptocurrencies. It
vigorously in the manufacturing industry, earlier the uses a distributed system to verify each transaction. Once
work which used to take hundreds of people to do, is signed and verified, a new transaction is added to the
now done in a very short time. blockchain and cannot be changed.
9.7 Social & Mobile: Benefits of blockchain technology–
In modern times social and mobile is a fast growing • Security
form of online marketing. Many web based social • Reduced risk of hacking
networking sites like Facebook, Twitter have created • Transaction Transparency
applications for their users to use in instant and real time
from where they can provide internet access. Nowadays
• Access at various levels
it is the most effective way of social networking. • Time saving
Facebook is a free social networking service on the • Less cost
Internet through which its members can keep in touch 9.9 3D Printing Additive Manufacturing:
with their friends, family and acquaintances. 3D printing is a manufacturing process through
Twitter: Twitter is a free social networking site. In which three dimensional solid objects are created. 3D
Twitter messaging, you can send short messages (up to Printing is also known as Additive Manufacturing. In
140 characters), called tweets. this, the material is placed in successive layers to form an
LinkedIn is one such social network available in the object. It is also known as a rapid prototype. To complete
social media world which is geared towards business. the 3D printing process, it takes graphical data input
Using this you can increase professional networking and from a computer, often created using CAM (Computer
job searching activities. Aided Manufacturing) equipment, and cuts the data to
Instagram: Instagram is a free online photo sharing accommodate the different object layers. Then the
application and social networking platform through layered graphical data is sent to the 3D printer which
which you can share your life and your day to day applies the required combination of raw materials for
experiences with your friends and other people. that particular layer. Then printer adds the product
Instagram users can share photos and videos through the development layer by layer until it is completely built
mobile app and can upload video. according to the design criteria.
9.8 Block Chain Technology: This process of 3D model making with the use of
Blockchain technology is a structure that stores what inkjet technology saves time and cost by eliminating the
are known as public block records in multiple databases, need to design, print, etc. individual models. Using 3D
known as 'chains', in a network connected through peer- printing the entire model can be made in one time. 3D
to-peer nodes. Blockchain is a technology that helps in printing technology is used in a variety of industries,
transferring bitcoins from one person to another. including industrial design, architecture, engineering, the
Bitcoin is a digital currency which is also known as medical industry, education, and consumer products.
cryptocurrency. Blockchain is a wide database that is 9.10 Robotics Process Automation:
encrypted. It was invented in 2008 by 'Satoshi Robotic Process Automation (RPA) is the term used
Nakamoto'. Through this, money can be sent easily to for software tools that partially or fully automate human
any person in the whole world without the help of a activities. It uses software with artificial intelligence and
bank. It is a database of records of all transactions that machine learning capabilities to handle any repetitive
are shared and executed among all participants. It works tasks. They work by replicating the actions of a real
properly even if one of the computers fail in the human interacting with one or more software
blockchain. It is a public ledger. In this, the approval of applications to perform tasks such as data input, process
many partners is required to enter a new agreement or standard transactions, or answering simple customer
record. service questions.
M1R5 187 YCT
Search on TG: @apna_pdf
It works with complete accuracy. In this, work is banking and financial data, national data security, global
done on the basis of fixed structure and predefined rules. economy, etc. Security is required as it can affect your
It is used in Accounting Customer Care, Business personal financial status. In present time internet is very
Operation, IT and HR etc. important for students of commerce & educational
For example, if you want to publish an article to institutions etc.
multiple social groups at a specific time every day. By The rapid expansion of technology is also making
doing the work manually every day, both your money cyber security more challenging for our network and
and time are wasted. You can do this very easily by information security. Information to maintain the
using RPA confidentiality, integrity and availability of the data
9.10.(i) Applications of RPA: Security is designed which is a subset of cyber security.
Following are the applications of RPA– 9.11(ii) Securing your PC:
■ Health Care– It is used for patient registration, billing Nowadays computers are mainly used for both
and keeping their records. personal or official work, so it is more important to keep
■ HR– It can be used for joining of new employees. PC safe. In the context of computer security, we should
■ Telecom– It can be used for order management and consider attacks by hackers and computer theft etc.
quality importing. You can keep the information stored in your computer
■ Travel– It is used for ticket booking, passenger safe by using some of the following measures-
retailing. ■ Keep your operating system and software up-to-date;
■ Banking – It can be used for automation of credit card Computers should keep the operating system as well as
applications in fraud claims, bank loan processing. all anti-virus applications up to date.
■ It can be used for automation of credit card ■ Turn on Windows Firewall; A firewall acts as a
applications in banking-fraud claims, bank loan security guard between your computer or network and
processing. the Internet. It provides security from the data being
■ Customer Service– It can help companies to provide entered or sent to your computer system.
better customer service by verifying e-signature and ■ Install antivirus software; Antivirus software is a
uploading scanned documents. security utility. It keeps safe to your PC from viruses,
■ Financial Services– It is used for foreign exchange spyware, malware and online threats.
payments. ■ Adjust your browser settings; Most browsers have
Blue Prism, UiPath, Automation anywhere tools are options that enable you to adjust privacy and security
used for RPA. while you browse. It helps to reduce the risk of
9.11 Cyber Security: malware accessing your computer and hackers
A technology or method that allows multiple types attacking your device.
of information present on computers or Internet or their ■ Have Strong Passwords; Using strong passwords is
interconnected networks, mobile devices, servers, one of the most important ways to prevent
computer programs (or any system or device that unauthorized access to your computer network. The
processes, stores, transmits information) prevent cyber more secure your passwords are, more difficult to
attacks or unauthorized access to security. attack your system. You should use a password that is
Cyber security is also called information technology. at least eight characters long and a combination of
It can be used on your internet and network based digital numbers, upper case; lower case and symbols.
devices done to protect the information from ■ Back up your system; Create a restore point for your
operating system. The data stored in the computer
unauthorized access.
should be backed up at a fixed time.
9.11(i) Need for Cyber Security: ■ Be careful online and don't click on suspicious links.
In modern times, cyber security is essential for any ■ Use a standard user account instead of an
individual, organization, government, educational administrative account. Always use an administrative
account there is a possibility of system hack or virus
institutions and business. All computers, mobiles etc. are attack and your system can be completely affected.
connected to the internet, due to which the possibility of ■ Always use licensed software, unauthorized software
cyber attack increases. To protect a person's private data is more likely to contain viruses or malware programs,
(images, audio, video, files, etc.), intellectual property, so do not use them.
M1R5 188 YCT
Search on TG: @apna_pdf
9.11(iii) Securing your Smartphone: ■ Update phone and app regularly, from the point of
Smartphones, tablets and other mobile devices have view of security, your mobile's software and app
become an essential part of many people's life. Many should be updated continuously.
people use smartphones for banking, shopping and other ■ Understand the application permissions before
transactions, as well as sending texts and e-mails to more accepting them, which are asked by the application
and more people. Many types of personal information are while installing it on the phone. Before accepting the
stored in the smartphone, such as pictures, location, permission, understand whether it is correct according
banking applications, social media applications, etc. to the security or not.
These All information needs to be kept secure. ■ WiFi and Hotspot Security; Avoid using any public
Following are some ways to keep the smartphone wifi as there are more chances of phone hacking
safe– through it. With this, a strong password should be kept
■ Have a strong password; The phone lets you set a to use the hotspot.
password lock, pattern or fingerprint lock for security. ■ Back up phone data; To save photos, videos,
You can use any of these to keep your smartphone applications and other files in your phone, you should
safe. backup regularly.
■ Use only trusted apps; Always download apps from ■ You can also secure your mobile physically using the
trusted sources like Google play store. Auto-Lock feature.

Practice Questions with Explanatory Solutions


1. Asking for bank details through e-mail is called– • Private Cloud: This refers to cloud computing
(a) Spamming (b) spoofing resources used exclusively within a single business
(c) Detailing (d) messaging or organization.
Ans. (b) Sending fake e-mail to a person by fake • Hybrid Cloud: Hybrid cloud includes both public
name is called e-mail spoofing. Most spoofing mail is and private clouds.
used to send phishing e-mails. Through this, money is
4. Lycos is–
withdrawn by obtaining any personal information
(a) operating system (b) search engine
from the bank, financial institution or personally.
(c) web browser (d) none of these
Asking for bank details through e-mail is called e-mail
spoofing. Ans. (b) Lycos is a search engine, which started in
1994. It provides a web portal service with search. It is
2. Bitcoin is–
also used to provide email, web hosting, social
(a) Digital currency (b) Cryptocurrency
networking and entertainment websites.
(c) both (a) and (b) (d) none of these
Ans.(c) Bitcoin is a digital currency which is also 5. When a record is in the block chain, it can be
known as cryptocurrency. Bitcoins are stored in online accessed at a time by–
wallets. Bitcoin was invented by Satoshi Nakamoto in (a) one person (b) two person
2009. We use bitcoin to make online payments. (c) three person (d) many person

3. Provides the most software and storage on the Ans. (d) Any record available in the block chain can
Internet– be accessed by many person at a time. Blockchain
(a) Public cloud (b) Private Cloud technology is a structure that supports public records
(c) a hybrid cloud (d) none of these
known as block records in multiple databases.
Ans.(a) Cloud Computing is mainly of 3 types- Public
Cloud, Private Cloud and Hybrid Cloud 6. How many devices were estimated to be
• Public Cloud; It provides computing resources connected to the Internet of Things (IOT) by the
such as software and storage on the Internet. This year 2020?
type of cloud can be used by any person or (a) 2 million (b) 5 million
company. (c) 50 million (d) 100 million
M1R5 189 YCT
Search on TG: @apna_pdf
Ans.(d) By the year 2020, around 100 million devices Through malware, hackers can steal your information,
were estimated connected to IOT. Most of the IoT photos, videos or bank account related information.
(Internet of things) devices are made for consumer There are many reasons for malware attack on
use. computer. The biggest reason for this is the
7. The first artificial intelligence programming downloading from the internet. The more you
language was– download, could be greater the risk of malware.
(a) FORTRON (b) LISP Malware can be prevented by installing anti malware,
(c) COBOL (d) BASIC anti virus and firewall in your system.

Ans. (b) The first artificial intelligence programming 11. Cloud service provider is–
language was LISP (List Processing). It was (a) Red Hat
developed in 1995 by John McCarthy. It is a (b) VM ware
functional programming language. (c) IBM Cloud Service
(d) All of the above
8. Who is considered the discoverer of 3-D
Ans.(d) Following are some of the major cloud
printing?
service providers- Amazon web services (AWS),
(a) Charles Hull (b) Chuck Hull
Gooogle cloud platform, Red Hat, SAP, Dropbox,
(c) Hamlinson (d) none of these
Oracle cloud, Salesforce, Microsoft Azure, IBM cloud
Ans. (b) Chuck Hull is considered the discoverer of
services, Adobe creative, VM ware.
3D (3 – Dimension) printing. The first 3D printer was
12. MQTT stands for–
made in 1983 by him.
(a) MQ Transport Tool
9. The main objective of Denial of Services attack
(b) MQ Telementary Tool
is– (c) MQ Telementary Transport
(a) Block access to any service (d) None of these
(b) To access any service
Ans.(c) The full form of MQTT is MQ Telementary
(c) Discontinuation of a service
Transport. It is a protocol used in IoT. MQTT protocol
(d) None of these
is a machine to machine and Internet of Things (IoT)
Ans. (a) The main objective of a DOS (Denial of connectivity protocol.
Services) attack is to prevent users from accessing a
13. The language used for IOT analysis is–
service such as the Internet. The main purpose of a
(a) Java (b) C
DOS attack is to prevent users from accessing a
(c) Python (d) C++
service such as the Internet. In DOS attack, only a
Ans.(c) Python language is used to analyze the data
computer and an internet connection are required to
generated in IOT.
make Unavailable network or machine.
14. Which is the Big Data Framework developed by
10. Malware is–
Google?
(a) Software program
(a) Map Reduce (b) YouTube
(b) Collects sensitive information.
(c) Hive (d) All of the above
(c) Comes in computer due to downloading from
Ans. (a) Big data framework like Map reduce, Apache
internet.
Hadoop etc. has been developed by Google.
(d) All of the above.
15. Who creates the RPA process–
Ans. (d) Malware is a type of software program
(a) Robot (b) Tester
designed to harm a computer. Software is designed by
(c) User (d) Programmer
hackers to steal personal data from computers. In the
language of hackers, the term malware is used for Ans.(a) RPA is used for automating workflow,
virus, spyware, trojan, worm etc. Malware can access infrastructure, bank, office process. RPA is a software
your private files and transfer them to another device. program that runs on the end user's PC, laptop or

M1R5 190 YCT


Search on TG: @apna_pdf
mobile device. It is a sequence of orders, which are 20. What is UiPath?
executed by bots under some defined set of business (a) Computer virus
rules. (b) Program
16. What is the name of the first recognized IoT (c) Robotic process automation software
(Internet of Things) device? (d) none of these
(a) smart watch (b) ATM Ans.(c) UiPath is a robotic process automation
(c) radio (d) video game platform for end-to-end high scale automation. It was
Ans. (b) The first recognized IoT device is ATM. The founded in 2005 by entrepreneur Daniel Dines in
full meaning of ATM is Automated Teller Machine, it Romania.
is also called Automatic Banking Machine, Cash 21. What is Flicker?
Point. An ATM is a computerized machine that allows (a) Photo hosting website
instant withdrawal of money without visiting a bank. (b) Video hosting website
17. What is the full form of WPS? (c) both (a) & (b)
(a) WiFi Protected System (d) none of these
(b) WiFi Protected Setup Ans.(c) Flickr is an image and video sharing website
(c) WiFi Protocol Setup and network service provider. It is also an online
(d) Wireless Protected Setup community platform.
Ans. (b) The full name of WPS is WiFi Protected 22. What is the full form of IFR?
(a) International Federation of Robotics
Setup. It is a wireless network security standard, that
(b) International Foundation of Robotics
is, a layer for connecting and providing security to a (c) International Federation of Robotics
WiFi network. It only works with networks that (d) none of these
require a password but only those that are encrypted Ans.(a) The full form of IFR is International
with Personal or the WPA2 Personal Security Federation of Robotics. It is a professional non-profit
Standard. organization to strengthen, promote the worldwide
18. Which of the following is a type of computer robotics industry.
threat– 23. What is blockchain?
(a) Fishing (b) soliciting (a) Large distributed P2P network
(c) DOS attack (d) stocking (b) A type of cryptocurrency
Ans.(c) DOS attack is called Denial of Service attack. (c) making online transactions
Using this attack, hackers make a network or machine (d) a centralized online account leave
unavailable to the users accessing it. The main Ans.(a) Blockchain technology is a structure known
objective of this attack is to prevent users from as block records of public in multiple databases that
accessing a service such as the Internet. In DOS are peer-to-peer in networks connected through peer
attack, the network or machine is overloaded due to (P2P) nodes are known as chains.
which people are not able to access it. 24. What are the three basic components of computer
19. The full form of IAM is– security?
(a) Identity and Address Management (a) Confidentiality, Integrity, Availability
(b) Identity and Access Management (b) Control, Intelligence, Action
(c) Central, Intelligence, Agency
(c) Identify Access Management
(d) Confidentiality, Integrity, Action
(d) none of these Ans.(a) Computer security is a branch of computer
Ans.(d) IAM stands for Identity and Access technology known as information security as applied
Management. It is a framework of business processes, to coins and networks. The three basic components of
policies and technology that facilitates the computer security are confidentiality, integrity,
management of electronic or digital identity. Availability.

M1R5 191 YCT


Search on TG: @apna_pdf
25. Used for secure Electronic Data Interchange Ans. (b) Cloud computing refers to storing and
(EDI) transmission over the Internet. accessing data and programs on the Internet instead of
(a) TCP/IP (b) MIME
on your computer's hard drive is cloud Computing is
(c) HTTP (d) None of these
closest to Web 2.0.
Ans.(c) EDI (Electronic Data Interchange), is a
communication system in which data is transferred 31. What is the cheapest type of VR?
electronically from one computer to another. In (a) based on simulation
modern times, EDI is most commonly used in B2B e- (b) based on projector
commerce. FTP HTTP HTTPS is used for secure
(c) based on avatar images
electronic data interchange (EDI) transmission over
the Internet. (d) none of these
26. When was the word IOT first used? Ans. (a) VR (Virtual Reality) is a type of experience
(a) 1998 (b) 1999 that is experienced only with the help of computers
(c) 2000 (d) 2001 and hardware. VR is the cheapest type based on
Ans. (b) The term IOT (Internet of things) was first simulation.
used in 1999. It expands the concept of Internet. IOT
is the connection of electronic devices with various 32. Who is called the father of artificial intelligence?
sensors. (a) Fisher Aida (b) John McCarthy
27. What is IIOT? (c) Alan Newell (d) Alan Turing
(a) Information Internet of Things Ans. (b) Artificial intelligence was described by John
(b) Industrial Internet of Things
McCarthy in the 1950s. Artificial intelligence is the
(c) Innovative Internet of Things
(d) None of these field of computer science that focuses on building
Ans. (b) The full form of IIOT is Industrial Internet of intelligent machines that act and react like humans.
things. It is used to make machines, sensors, software. 33. Viruses are–
It is Very useful in data collection exchange and (a) man made (b) natural
analyze with devices and big data analytics. This
(c) machine made (d) All of the above
industrial, IOT is making a big contribution in
strengthening engineering. Ans. (a) Virus is a small illegal program of human-
28. What is IOT built on? made computer, which starts destroying software and
(a) Network of sensors collecting data information as soon as it is activated.
(b) Cloud Computing
34. When a hacker enters in a network, it is a
(c) Both (a) and (b)
(d) None of these network…..problem.
Ans. (c) IoT (Internet of Things) is a computing (a) performance (b) Reliability
concept that enables physical devices and other (c) Security (d) none of these
devices connected to the Internet to recognize each Ans.(c) Hacking is misuse of computers by a person
other. It enables things like data collection and for his own needs by connecting to the network.
exchange etc. This cloud computing and data The Hacker entering a network is a problem related to the
collecting is done on a network of sensors. security of the network.
29. According to a study by IBM, which is the largest
single source that collects data– 35. .......tracks user activity on the Internet and
(a) e-mail (b) social media transmits that information in the background to
(c) business transaction (d) log data another person.
Ans. (d) According to a study by IBM, the largest (a) Malware (b) spyware
single source data is log data, which collects data. Log (c) Adware (d) All of the above.
files are generated by the web server during software Ans. (b) Spyware is a malware that is installed on a
installation. Which are used for many different tasks
computer without the user's permission and Gives all
.30. Cloud computing is closest to–
the information to the person or group by sending the
(a) Peripherals (b) Web 2.0
(c) Mainframes (d) None of these malware.

M1R5 192 YCT

You might also like