0% found this document useful (0 votes)
45 views165 pages

Code 402 Class 10 Open Office-pages-Deleted

Uploaded by

Its Vikas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views165 pages

Code 402 Class 10 Open Office-pages-Deleted

Uploaded by

Its Vikas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 165

Unit

Information and Communication


3 Technology Skills - II

Session-1 Operating System & Basic File Operations


Operating system manages the functioning of entire computer system including hardware and
software. It also works as an interface between the computer system and the user.
Functions of Operating System
There are 3 main functions of an operating system:
¤ Managing applications and giving them access to hardware services. For example, if you give a
print command to print your document, operating system manages the printable data to be
sent to the desired printer.
¤ Managing data and system resources. For example, you create folders and save files, install
new software and hardware and access files and devices over a network.
¤ Providing user interface to work with the computer system. For example, opening programs,
deleting files, searching on the computer are done by the help of operating system.
Important tasks of an operating system
1. Managing applications running in the computer.
2. Handling input and output.
3. Handling data and signal transfer among the devices and software.
4. Managing memory – allocating/ deallocating memory to programs to run.
5. File system management – keeping track of all the files and folders.
6. Network management – communicating with other computers and devices over a network.
7. Computer system security.
8. User interface.
Types of Operating System
Single-tasking OS: A single tasking operating system executes one task at a time. It does not
allow launching a new task until the task at hand is not finished. Examples of such operating
system is Disk Operating System (DOS) from IBM and Microsoft, Windows 95 (in 80s and early
90s) and PalmOS for mobile devices. An instance of such functionality is, if you have given print
command in DOS, then until the printing is over, you will have to wait to issue the next command
to do another task.
Multi-tasking OS: A multi-tasking operating system handles more than one task at a time. User
can perform multiple tasks simultaneously. All modern operating systems are multi-tasking OS.
Examples are Microsoft Windows family (Win XP, Win 7, Win 8, Win 10, Win 11 etc.); Unix; Linux;
Apple MacOS and iOS; and Google Android. An instance of such functionality is you are listening

42
5
to a streaming song and at the same time given a print command for a multipage document yet
chatting online with a friend while still a file is being uploaded. All these four tasks are occurring at
the same time.
Single User OS: Operating system that allows only one user to work at a time is called single user
operating system.
Examples: MS-DOS, IBM-DOS, Windows 95, Windows 98, Windows ME, Classic MacOS (1 to 9),
PalmOS for handheld devices.
Multi-user OS: Operating system that allows multiple users to work at the same time is called multi-user
operating system.
Examples: Unix, Linux, Windows NT, X-Window system and MVS Operating System for
Mainframe computers. Such operating systems are installed on a main powerful computer system
and other computers connect with it over a network. Users log on to the main computer and its
operating system manages all the users. User terminals are called clients or workstations.
Other Types of OS
Real-Time OS: Such operating systems are used to control the activities which need to be done
precisely at a given specific time. For example, launching a satellite in the designated orbit at a
precise time interval or an aircraft control system. RTOS are normally found embedded in the
devices themselves. They are not like general operating systems which need to be installed on the
computer. Some RTOS are VxWorks, FreeRTOS, Integrity, Ecos, Cocoon etc.

Mobile OS: Operating systems that runs on handheld devices like cellphones and tablet Pcs.
Examples: iPhone OS, Android OS, Windows Phone OS.

43
5
Distributed Operating System: This OS manages multiple computers over a network and
manages users and resources on them.
Examples: Windows Server, Linux Server, Ubuntu, Amoeba.
Windows Desktop
Once the computer is started, the screen which appears on the monitor is called the Desktop.
Various components of a desktop are:
1. Wallpaper 2. Icons 3. Gadgets 4. Taskbar
Let us discuss about these parts one by one.
Wallpaper: The wallpaper is the background picture on the desktop.
Icons: The small pictures on the screen are called the icons.

Gadgets: Gadgets are the small and helpful objects in a computer. They have their specific
functions. They are used to watch time, calender, weather, world time, etc. on a computer.

Taskbar: This is a horizontal bar at the bottom of the desktop. Now, let us learn about the various
parts of the taskbar.

Start Button: The Start button is found on the left side of the taskbar. When we click on the
Start button, a menu appears which is known as the Start menu. We can find and open all the
programs from the Start menu.
Middle Section: The middle section shows the programs and files we have opened and allows us
to quickly switch between them.
Quick Launch toolbar: The Quick Launch toolbar provides a fast and easy access to our
favourite programs. These programs can be opened in single-click.
System Tray: The system tray is used to show the date, time and various other notifications.

Files & Folders


A file stores our work in the computer.
Each file is given a file name, which is useful to identify it. Every file name has 1. Primary name
which is the first name of a file given by the user and 2. Secondary name which is the extension
of the file like ‘.docx', ‘.jpg', etc. It is given by the program (where it is created). Primary and

44
5
secondary names are separated by a dot (.). Folder or directory stores files and other folders. A
folder within a folder is called a sub-folder.

Sub
Folder

Files

Folder

Computer Window
Whatever files or folders you store in your computer, they are accessible from the Computer
window. It is also used to access and manage the files and folders stored in various external memory
devices. For example, CD, DVD, Pen Drive, etc.
To open the Computer window, click on the Start button → Computer or double-click on the
Computer icon on the Desktop.
Left/navigation Pane: It is located on the left side of the computer window. Here, storage drives
and directory tree can be seen. It contains the list of storage drives (hard disk, DVD drive), folders
and sub-folders that you have on the computer. It does not show/lists the files.
Right Pane: It is located on the right side of the window and it shows the content of the folder
which is selected at the left side.

Computer Window

45
5
Creating a File or Folder
1. Open the Computer window.
2. Open the location/drive (or folder) where you want to create a file or folder.
3. Right- click on the blank area, the context menu appears.
4. Select the New option. A submenu appears.
5. Click on the File or Folder option. A new file or folder is created and appears. Type a name
for the file or folder and press the Enter key. This way, various types of files can be created
like LibreOffice Calc, Writer, MS Excel, MS Word or Notepad etc.
1

2
5

3
Right-click on
4 the blank area.

Creating a new file or folder using a right-click

Opening a File or Folder


1. Open the location in the Computer window (where the file or folder is located).
2. Place the mouse pointer on the required file/folder and double-click on it. It will be opened
and you can view its contents.
Renaming a File or Folder
1. Select the file or folder that has to be renamed.
2. Right-click on it, a context menu appears.
3. Select the Rename option.
4. Type the new name and press Enter. (You can also use F2 function key to rename files or
folders).
Deleting a File or Folder
1. Select the file or folder that has to be deleted.
2. Right-click on the required file/folder and select the Delete option.
Or
Press the Delete key on the keyboard.
The Operating system (Windows) confirms before deleting the file or folder by displaying a
dialog box.
3. The Delete File or Folder dialog box appears. Click on the Yes button to delete or No to
cancel deleting.

46
5
Note: Shortcut
Deleted file or folder move to the Recycle Bin. To delete a file/folder permanently: Shift+Delete

Restoring the Deleted File or Folder


1. Open the Recycle Bin window (by double-clicking on the Recycle Bin icon on the
Desktop). It displays the list of deleted files and folders.
2. Select the file or folder that has to be restored.
3. Click on the Restore this item button on the toolbar.
The selected file or folder moves back to the place from where it was deleted.
Copying and Moving a File or Folder
1. Open the Computer window and select the file/folder that has to be copied or moved.
2. Click Organize list box on the toolbar and select Copy/ Cut (to move) option.
Or
Right- click on the file or folder and select the Copy or Cut (to move) option.
3. Select the destination (drive/folder) from the left/navigation pane.
4. Click on the Organize list box on the toolbar and select the Paste option.
Or
Right-click on the blank space and select the Paste option in the context menu.

Shortcut
Copy : Ctrl + C Cut : Ctrl + X Paste : Ctrl + V

LAB EXERCISE
1. Start Your computer and find out which operating system is installed on it.
2. Locate the icons of Computer and Recycle bin. Open them and observe how
different they look. Write any 3 major observations.
3. Locate the Taskbar. Using mouse try to move it to other corners of the
desktop.
4. Open notepad from Start menu, type some data. Save the file on the desktop.
Now delete and restore the file using Recycle bin. Then, permanently delete
the file.
5. Create a folder on drive D: by some name. Now, using notepad create and save
a file in this folder. Now, create another folder on desktop. Copy the file in the
desktop folder.

Supplement: Ubuntu Operating System


Ubuntu Desktop (Gnome)
Ubuntu is an open-source variant (distribution) of Linux. It is developed by a UK-based private
software development firm named Canonical and it is supported by a community of developers.

47
5
The Desktop
Ubuntu desktop is called GNOME 3 desktop. GNOME is an open-source standard desktop
environment for consistent look across various versions of operating system.

The desktop has following major components:


The Top Bar: The top bar provides access to windows and applications, calendar and
appointments, and system menu. System menu helps in setting up properties such as sound,
networking, and power. In the system menu in the top bar, you can change the volume or screen
brightness, edit your Wi-Fi connection details, check your battery status, log out or switch users,
turn off your computer and lock the computer.

48
5
Activities Overview Button: Activities overview allows to type names to search applications,
files and online resources.
Below Activities, there is a bar called dash. It lists the icons of frequent applications and the
currently running applications (with a dot below the icon). Clicking on the icon launches the
corresponding application.
At the bottom of the dash, there is a grid icon. Clicking on this icon displays all the applications on
the screen.

Application Menu: This menu displays the names of


currently active applications. It is located just next to the
Activities button at the top.

Useful Keyboard shortcuts to work with Ubuntu Desktop


Note: The Operating System Key (that has operating system logo icon) is called Super key. For
example, in Windows, it is called Windows key.

Alt+F1 or the Switch between the Activities overview and desktop. In the
Super key overview, start typing to instantly search your applications,
contacts, and documents.
Alt+F2 Pop up command window (for quickly running commands).
Use the arrow keys to quickly access previously run commands.

49
5
Super+Tab Quickly switch between windows. Hold down Shift for reverse
order.

Super+` Switch between windows from the same application, or from the
selected application after Super+Tab.
This shortcut uses ` on US keyboards, where the ` key is above
Tab. On all other keyboards, the shortcut is Super plus the key
above Tab.

Alt+Esc Switch between windows in the current workspace. Hold down


Shift for reverse order.

Ctrl+Alt+Tab Give keyboard focus to the top bar. In the Activities overview,
switch keyboard focus between the top bar, dash, windows
overview, applications list, and search field. Use the arrow keys to
navigate.

Super+A Show the list of applications.

Super+Page Up Switch between workspaces.


and
Super+Page Down

Shift+Super+Page Up Move the current window to a different workspace.


and
Shift+Super+Page Down

Shift+Super+← Move the current window one monitor to the left.

Shift+Super+→ Move the current window one monitor to the right.

Ctrl+Alt+Delete Log Out.

Super+L Lock the screen.

Super+V Show the notification list. Press Super+V again or Esc to close.

Files & Folders


A file stores our work in the computer.
Each file is given a file name, which is useful to identify it. Every file name has 1. Primary name
which is the first name of a file given by the user and 2. Secondary name which is the extension
of the file like ‘.docx', ‘.jpg', etc. It is given by the program (where it is created). Primary and
secondary names are separated by a dot (.). Folder or directory stores files and other folders. A
folder within a folder is called a sub-folder.

50
5
Managing Data Using The file manager
To start the file manager,
click on Files icon in the
Activities overview.
When the file manager
opens, you can double-click
any folder to view its
contents. You can also right-
click a folder to open it in a
new tab or new window.
You can quickly preview
each file by pressing the
space bar.

The Path bar above the list of files and folders shows you the location of the folder.

If you want to search for a file, in the folder, click on the search icon at the top of the window and
start typing name of the file in the search bar. The files that match the search string entered will be
listed. Press Escape key to come out of the search feature.

Sidebar helps in quickly


accessing common locations. If
Sidebar is not visible, press the
menu button in the top-right
corner of the window and
select Sidebar option.

51
6 5
Note: Shortcut
Deleted file or folder move to the Trash Bin. To delete a file/folder permanently: Shift+Delete

Copy or move files and folders


A file or folder can be copied or moved to a new location by dragging and dropping with the
mouse, using the copy and paste commands, or by using keyboard shortcuts Ctrl + C (copy) >
Ctrl + V (paste), Ctrl +X (cut)> Ctrl + V (paste). Same options are available in shortcut
menu when you right click on the desired file and then in the blak space of the target location.
Restore a file from the Trash
Deleted files are moved to the Trash. It is usually located on the Desktop. Trash can used to restore
the deleted files. To restore a file from the Trash:
1. Open the file manager.
2. Click Trash in the sidebar. (You can also open Trash from the Desktop).
3. If your deleted file is there, right click on it and select Restore. It will be restored to the folder
from where it was deleted.
Files deleted permanently (Shift+Delete) cannot be recovered.

Shortcut
Copy : Ctrl + C Cut : Ctrl + X Paste : Ctrl + V

Creating a File or Folder


To create a new folder, go to the desired location
and right click in the blank area. Select New
Folder option. Then, type the desired name of
the new folder and press Enter.
For creating a new document, you can select
New Document option.
Opening a File or Folder
Right click on the desired file or folder and select Open option or simply
double-click on it with mouse.
Renaming a File or Folder
Right-click on the desired file or folder and select Rename option. Type
the new name and press Enter. (You can also use F2 function key to
rename files or folders).
Deleting a File or Folder
Right-click on the desired file or folder and select the Move to Trash
option.
You can also press Delete key after selecting the desired file or folder to
delete it.
The Delete File or Folder dialog box appears. Click on the Yes button
to delete or No to cancel deleting.

52
5
LAB EXERCISE
1. Start Your computer and find out which operating system is installed on it.
2. Locate the icons of File Manager and Trash. Open them and observe how
different they look. Write any 3 major observations.
3. Locate the Top menu, Sidebar and Application Menu.
4. Open notepad from Start menu, type some data. Save the file on the desktop.
Now delete and restore the file using Recycle bin. Then, permanently delete
the file.
5. Create a folder on drive D: by some name. Now, using notepad create and save
a file in this folder. Now, create another folder on desktop. Copy the file in the
desktop folder.

Session-2 Apply Basic Skills for Care and Maintenance of


Computer
Importance and need of care and maintenance of computer
Computer systems need proper care and maintenance for efficient working and durability. Regular
care helps in preventing any problems with the computer system. Regular use of antiviruses and
system upgrades keep the computers safe from viruses and other harmful programs. Using
computer tools like defragmenter etc. keep the computer files well organised. Regular backups are
useful in case of sudden data loss.
In addition to the computer storage and programs, computer hardware also needs care and
maintenance. Some of the important tips are:
1. Keep the computer safe from dust. Use proper cotton cloth cover or plastic covers for system when
they are not used.
2. Avoid eating/ drinking while working on the computer. Any spillage may spoil the parts such
as keyboard.
3. Always keep the parts clean especially keyboard and mouse for smooth functioning.
4. Handle the storage media like CDs and pend drives carefully since these are very delicate
devices. Scratch on disk can corrupt the data.
Cleaning the computer components
Keeping the computer clean keeps it functioning well for a longer time. Some useful tips are:
1. Keep a watch on damaged cables and parts and replace them timely.
2. Check for any unusual noises a computer may make while working such as CPU fan. In such
case, get it cleaned. This will prevent CPU from overheating.
3. General precautions to be takes while cleaning the computer components.
4. Always ensure that computer is shutdown properly. Use a UPS with the mains supply for
enough time to shutdown during sudden power failure.
5. Be careful while cleaning. Liquids and sprays are harmful for computer machinery. Use a soft
cloth damp with cleaning liquid to wipe the computer parts.

53
5
6. Use safety devices like anti-static wrist band to prevent static electricity shocks harmful for
electronic device.
Computer maintenance schedule
1. Regularly scan computer with antivirus to check viruses.
2. Replace damaged cables, parts and hardware immediately.
3. Keep cables untangled.
4. Never use pirated or any software from unknown source.
5. Keep the operating system and anti-virus updated regularly.
6. Upgrade computer hardware if needed for optimum performance and data storage.
7. Take regular data backup using backup utility installed with the operating system.
8. At an interval of a few months, run a disk maintenance utility such as disk defragmenter to
optimise the storage for faster file access from the computer disk.
To create a backup of your system
1. Start > Control Panel > System and Security > Backup and Restore.
2. At the Back up or restore your files screen, click Set up backup.
3. Select where you want to save the backup and click Next.
4. Choose Let Windows choose (recommended).
5. Click Next and Verify the backup details.
6. Click Save settings and run backup.

To restore a backup
1. Start > Control Panel > System and Security > Backup and Restore.
2. At the Back up or restore your files screen, click Restore my files.
3. Browse to locate the backup file.
4. Click Next and select a location where you want to restore the backup file.
5. Click Restore.
6. When the process is complete, click Finish.

54
5
To defrag a hard disk
1. Open the Computer window and right-click the desired disk.
2. Select Properties. In the Properties dialog box, click the Tools tab.
3. Click the Defragment Now button.
4. Click the Analyze Disk button.
Wait while Windows checks the defragmentation on the media.
5. Click the Defragment Disk button.

To delete temporary files


1. In the search box on the taskbar, type
disk cleanup, and select Disk Cleanup.
2. Select the desired drive and click OK.
3. Under Files to delete, select the desired
file types and click OK.
To delete system files
1. In Disk Cleanup, select Clean up
system files.
2. Select the desired file types and click OK.

55
5
Supplement: Computer Maintenance in Ubuntu
Backup and Restore
Ubuntu provides a backup-restore utility called Déjà Dup. It may be pre-
installed on Ubuntu otherwise you may install it. It is a free utility. Using Déjà
Dup, backups can be taken on local drives, remote drives over a network or on
cloud drives such as Google and Microsoft drives.
¤ To start backup, go to Activities and type backup in search bar. Click on
Backups icon. Backup pop-up will open.

1. Go to Folders to save section and use +


button to add folders to backup.
You can include folders not to be backed up in
Folders to ignore section.

2. In Storage location section select the drive/


network location/ cloud drive on which backup
3. You can schedule automatic backups in
should be taken.
Scheduling section by specifying when to run
backup in Every drop-down and duration in
Restore Keep drop-down to keep the backup.
To restore files when needed, click on Restore
button in Overview section.

4. Go to Overview section and click on Back


Up Now button to start back up. Set an
encryption password when asked. Backup of
files will begin.

56
5
Disk Cleanup
Ubuntu provides a disk clean up utility called Bleach Bit. It may be pre-installed on Ubuntu
otherwise you may install it. It is a free utility. Using Bleach Bit unnecessary files can be removed to
free disk space, temporary files and cache files can be removed. Temporary files are created by
various applications when you work with them. Cache files and cookies are used by browsers.
¤ Go to Activities and type Bleach in
search bar. It will list Bleach Bit. Click
on it. If it prompts to install, then click
Install button. Bleach Bit will install.
¤ Select your preferences to delete
(folders, clipboard, cache, temporary
files etc.).
¤ Click on Clean button.
¤ Finally, confirm delete in Delete
confirmation pop-up.

Session-3 Computer Security & Viruses


What is a Computer Virus?
A computer virus is a harmful program which attaches itself with the computer files and infects
them. It is capable of making its copies. The ability to copy itself makes virus capable of spreading
from one file to other and even to other computers over a network.
Types of Virus
Depending on the way they function, viruses are of following types:
Boot Sector Virus
Boot sector is that part of the hard disk which contains the boot sector program. This program
loads the operating system in the computer’s memory. If boot sector program is corrupted then
operating system will not load and computer will not be started.
Boot sector virus replaces the boot sector program with its own program and activates as the
computer is switched on. Modern operating systems are capable of stopping the boot sector virus
and boot the computer properly however it is recommended to take care that virus does not infect
your computer in the first place. Some boot sector viruses are Form, Parity boot, Disk killer,
Cascade, Whale, Proud.
File Virus
File virus hides its code in a file and when user runs or opens that file it also loads in the memory.
Then, it infects other files which load in the memory. Some file viruses are Jerusalem, Invader,
Flip.

57
5
Stealth Virus
These viruses apply some way to avoid detection. For example, reducing the actual file size so that
anti-virus does not get suspicious. Some viruses change their program structure every time they
make a new copy. This makes them hard to detect. Such stealth viruses are also called
polymorphic viruses. Whale, Frodo, Joshi etc. work in stealth way.
Macro Virus
Modern word processors and spreadsheets allow us to write short programs which are the part of
the file. These programs are called macro programs. Macro virus is in the form of a macro
program and it hides itself in the document or spreadsheet as a macro. When the file is opened, it
gets activated. For example, Melissa, Wazzu, Crown.
Virus Symptoms
How will you figure out if your computer is infected with a virus? Look for following symptoms
while switching on and working on your computer:
¤ Your computer is starting up slowly and/or works slower than earlier.
¤ Computer suddenly hangs or crashes so that you need to restart it abnormally.
¤ Unwanted pop-ups and notifications appear which were not there earlier.
¤ Computer restarts suddenly on its own.
¤ Hard disk indicator on your computer shows disk activity even if you are not using any
program or opening/saving any file.
¤ Computer shows lesser hard disk space and memory usage is too high in Task Manager.
¤ Unwanted files are created.
¤ Files are not opening or crashing after opening.
¤ Programs taking too long to load and run.
¤ Strange error messages and dialog boxes.
Other Malware Programs
Viruses are not the only threat today. There are other malware programs also which infect
computers and user data in different ways. Let us learn about them.
Worm
Worms are another form of virus which copy themselves independently without the need of any
file to infect. They spread across computers over a computer and make the data transfer slow.
Some worms are capable of using email service to spread to other mail boxes. Examples:
MSBlast, ILOVEYOU.
Trojan Horse
This computer virus looks like a useful program and once installed or downloaded, it harms the
computer. User will install them thinking as a utility and when it runs the intended damage is done.
For example, Zelu, Rootkit, Exploit.
Spyware or Adware
Spyware installs itself on the computer without user's knowledge and monitors keystrokes, takes
screenshots, reads chat, collects device and user information and forwards it to the malicious
owners of such program. Loss of confidential information and identity theft are the threats posed
by spywares.
Protection from Spyware or Adware
¤ Install an effective spyware detecting software.
¤ Keep your operating system and browser updated.
¤ Check if any unnecessary software is being installed. It is often during the installation steps and
in the User Agreement.

58
5
¤ Carefully read and close any warning boxes that look like important messages.
¤ Be careful while installing free programs, games or shareware. Free programs may contain
spyware.
Preventive Measures Against Viruses
Basic Internet Discipline
1. Don’t open unwanted email and their attachments if source is strange or unknown.
2. Use spam blocking or filtering tools to block unsolicited emails, instant messages and pop-ups.
3. Avoid easy and obvious passwords and change them regularly. Keep passwords safe.
4. Avoid downloading files and programs from untrustworthy web sites.
Protect Your Computer
1. Take regular backup of your important data on a separate external disk.
2. Avoid keeping sensitive data like passwords, credit card details etc. on your computer.
3. Do not let everyone to use your computer.
Use Anti-virus Software
1. Install and use a good anti-virus for regular scanning of your computer.
2. Keep the anti-virus updated regularly to safeguard against new viruses.
Anti-virus Software
An anti-virus software detects the virus threats, scans files for viral infection and removes the
viruses. An anti-virus needs to be installed on the computer to prevent, detect and remove viruses.
It is necessary to update anti-virus at regular intervals of weeks or months to keep it aware of new
threats.
How Anti-virus Works?
An anti-virus detects viruses by their signature or behaviour. A virus signature is the unique
structure of a virus program which anti-viruses are aware of. Anti-viruses have a list of known virus
signatures with which they can identify the possible virus. That is why anti-viruses need regular
updates.
Anti-viruses also detect behaviour of the programs on the computer to detect any unusual action
such as accessing a file which is not meant for them. In case of any suspicious activity, it scans the
program for virus.
Some popular anti-viruses are given here:

59
5
Using an Anti-virus
Let us see how to use one of the popular and powerful anti-viruses -
McAfee.
Scan the Computer for Virus
1. Open McAfee Security Scan Plus from Start menu.
2. Click on Scan. button.
3. Select the type of scan you want to run.

The scan options are:


A. Full - Scans your entire computer for known threats.
B. Quick - Scans only the most susceptible parts of your computer for known threats.
C. Custom - Allows you to manually select the drives, folders, and other locations you want to scan.
To see the results for any suspicious files, click View Results. If View Results is not available that
means Virus Scan did not detect any threats.
Click OK.
Scheduling and Updating Antivirus
¤ Click on Settings.
¤ Make your choices for next scan date
and daily, weekly or monthly scan
schedule.
¤ Select the checkbox for auto-update.
¤ Click on Apply button.

60
5
Spyware or Adware
Spyware installs itself on the computer without user's
knowledge and monitors keystrokes, takes screenshots, reads
chat, collects device and user information and forwards it to
the malicious owners of such program. Loss of confidential
information and identity theft are the threats posed by
spywares.

Protection
¤ Install an effective spyware detecting software.
¤ Keep your operating system and browser updated.
¤ Check if any unnecessary software is being installed. It is often during the installation steps and
in the User Agreement.
¤ Carefully read and close any warning boxes that look like important messages.
¤ Be careful while installing free programs, games or shareware. Free programs may contain
spyware.
Spam
Spam is unsolicited or undesired junk email usually a
promotional material. Senders of such emails are called
spammers. Spams have a link that lures the user into clicking it.
This confirms user's email ID and that brings in more spam in
future.
Protection
¤ Use spam filtering settings in the email service.
¤ Share your personal email ID only with those you trust.
¤ Do not display your email ID online for everyone to access.
¤ Create separate email accounts for public use.
¤ Look out for spelling mistakes and bad grammar in the mail. These mistakes are done by
spammers to pass through the spam filter.

Phishing and Pharming


Phishing
Fraudulently acquiring sensitive information from the users by impersonating trusted websites like
banks and e-commerce merchants etc. is called Phishing. Phishers target the details like pins,
passwords and answers to security questions. Phishing occurs generally in the form of an email or
through a legitimate sounding phone call.
Pharming
When website's traffic is redirected to another unauthorized fake
URL then it is called pharming. Hackers somehow get access to the
website's servers and manipulate the configuration files which
identify the server as host website on Internet.

61
5
Protection
¤ Install anti-phishing software.
¤ Never give away any sensitive information related to finance and security like pins, passwords,
bank balance, transaction details, identification numbers etc. in reply to undesired emails and
never on phone.
¤ Always cross check the source of email and phone call with the concerned agency.
¤ Today, all authentic agencies like banks and
merchants have their own secured apps for
transactions. Download and use them on your mobile
phones instead of unknown third- party apps.
¤ Phishers address their targets with fancy terms like
“valued customer” but genuine agency will address
you by your correct name, username, customer ID
etc.
¤ Regularly check your financial statements and account details.
¤ Secured Socket Layer Certification is done for web sites by authorised Certification Authorities
(CA). CAs do not issue SSL certificates to any agency that is not properly identified and
cleared. Check the website's certificate icon of a padlock in the address bar. All secured web
sites have SSL certificates. If padlock icon is of open lock then web site is not secured and must
be left immediately.
¤ Never ignore operating system, anti-virus and browser upgrades. Do them as and when
prompted or required.
¤ Web sites should deploy effective firewalls with suitable settings to keep away unauthorized
access and intrusion. Let us understand what a firewall is and what does it do.

Firewall
A firewall is a security combination of hardware and software that is used to protect a server and
network resources from unauthorized access and intrusion. Firewall checks the incoming data
packets over the networks and filters out which do not have suitable and sufficient permission to
access the network. This way an extra level of protection is created right at the gates of the
network.

62
5
Internet Frauds and Scams
Today we virtually live and shop on Internet. Scammers send
the users tempting newsletters and prompts of getting rich
quick through online gambling, lottery or games alluring them
to click the link. Once you accept the offer they attempt to take
sensitive information like credit card numbers, pins etc.
Protection
¤ Ignore and do not fall for online offers that seem too
exciting to be true.
¤ Ask yourself: Do I really need it? Does it really concern me?
¤ Avoid individuals asking for donations.
¤ Avoid accepting or vouching for any financial transaction with online friends whom you have
never met especially those in known notorious regions of the world.
¤ Avoid charity involvement offers, placement schemes with instant visas, medical claims of
quacks to cure certain disease instantly.

Supplement: Antivirus in Ubuntu


Clam Tk Antivirus
Ubuntu provides an antivirus application called Clam Tk. It is a GUI version of ClamAV command.
It may be pre-installed on Ubuntu otherwise you may install it. It is a free utility.
¤ Go to Activities and type Clam in
search bar. It will list Clam Tk. Click on
it. If it prompts to install, then click
Install button. Clam Tk will install.

After installation, launch Clam Tk.


¤ You can click on Scheduler button to
schedule scanning of system by setting a time
in Schedul dialog box.
¤ Here, you can also schedule time for update
of details about new viruses.
¤ Click on Scan a file button to scan individual
file.
¤ To scan entire folder, click on Scan a
Directory button.
¤ Quarantine button shows infected files
confined as a result of scan.

63
5
PART B: Subject Specific Skills
Unit
Digital Documentation
1 (Advanced)

Session-1 Document Styles


Styles are a pre-designed set of font, font-size, colour and other formatting which can be applied
on the document at once without having to format various parts of the content individually. A
standard word processor provides a library of pre-defined styles to apply on the document in order
to give it a professional look with least efforts.
Benefits of Styles
Styles bring uniformity and consistency in the design of the document. They save time and effort as
we can create and save our own defined styles. This makes the document formatting more
efficient. Document gets a formal look as all the headings, sub-headings and other parts of the text
get a well-defined, balanced look. Changing the style applies to all the parts of the document
which have that style applied. This saves time which is wasted otherwise in reformatting and
making corrections. It becomes easier for the word processor application to read the style-based
document structure and documents load faster in computer memory.
How styles are different from templates?
Styles keep the look and design of the text within a document. If you need to use exact styles you
created in a document into another document then you need to save the document as a template and
create the document based on that template. This way, templates are used to apply consistent styles
and formatting across different document. Every new document can be based on a template. With
templates, we can reuse the settings of a document.
Different types of style
LibreOffice Writer has 6 types of styles:
¤ Paragraph styles affect an entire paragraph.
¤ Character styles affect a block of text inside a paragraph.
¤ Page styles affect page formatting (page size, margin, and the like).
¤ Frame styles affect frames and graphics.
¤ List styles affect numbered lists and bulleted lists.
¤ Table styles affect the look and formatting of tables.

80
5 Digital Documentation (Advanced)
These styles can be seen in Styles and Formatting
window which can be displayed by clicking Style and
Formatting icon on the Sidebar.

Shortcut
To display Styles pane in Sidebar: F11

In this pane, the buttons for each of the style types are
displayed. Click on anyone to list the available styles.
They appear in the same sequence as their names are
listed earlier.

Applying Styles
To apply any style, select the part of the text (heading or paragraph or any text) and double click on the
desired style in the list under corresponding style type. For example, if you have to apply Example style
on some text, then select that text, click on Character style button and double click on Example style.

Apply styles using Fill Format Mode


Next to the Style types button is found Fill Format button. If you want to apply a selected style on
multiple parts of text quickly, one-by-one then click on Fill Format Mode button and then
click on the desired text parts to apply the style one by one.
Finally, press Escape to come out of Fill Format Mode.
Creating a New Style
You can format some text as you like or need and then save that formatting as a new style for later use.
To do so, do any of the following:
¤ Click on New Style from Selection button on the Formatting toolbar.
¤ Styles menu > New Style from Selection option.
¤ Click on Styles actions drop-down in the Styles pane of Sidebar and select New Style
from Selection option.
Create Style popup appears.
Mention a relevant name of your style and click OK.

Shortcut
New Style from Selection:
Shift + F11

81
Digital Documentation (Advanced) 5
Create a New Style Using Drag and Drop
Formatting of a text can be save as a new style using simple drag-drop method. Click on the
desired Style type button on the Style pane in Sidebar. Select the pre-formatted text and drag-
drop it into the pane. Create Style popup appears.
Mention a relevant name of your style and click OK.

Updating Existing Styles


Once you select the text and apply a style to it. you can add
some more changes in the style and update the selected style.
To do so, follow any of these:
¤ Click on Update Selected Style button on the
Formatting toolbar.
¤ Style menu > Update Selected Style option.
¤ Click on Style Action drop-down in the Styles pane of Sidebar
and select Update Selected Style option.

Shortcut
Updated Selected Style:
Ctrl + Shift + F11

Loading Styles from a Template


To load an external style from a document template do any of the
following;
¤ In Styles menu, select Load Styles options.
The selected style will be listed in the Style sidebar.
¤ Click on Styles actions drop-down in the Styles
pane of Sidebar and select Load Styles
option.
In Load Styles popup, select the desired style under
various Categories and click OK.

Session-2 Working with Shapes and Images


Mostly documents such as various reports, flyers, newsletters, books, etc. contain images and
shapes, etc. along with the text. Many operations are common on images and shapes such as
special effects, text wrapping and grouping/ungrouping, etc.
¤ Shapes can be insereted using Insert menu > Shape submenu.
¤ To insert an image in the document, go to the Insert menu > Image option. In the Insert
Image dialog box, locate the desired image and click on Open button.

82
5 Digital Documentation (Advanced)
Inserting Shapes Inserting Images

Drawing Toolbar
Shapes can be drawn and managed using Drawing toolbar in Toolbars under View menu.

Drawing toolbar provides a rich library of a variety of shapes arranged in various categories.
Shapes range from simple forms like Lines, Arrows, Rectangle, Circle to Curves and Polygons, Basic
Shapes (Diamond, Ring, Hexagon, etc.), Symbol shapes (Smiley, Cloud, Flower, etc.), Block Arrows,
Stars and Banners, Callouts, Flowchart, Text Box and FontWork Text.

Curves and Polygons Basic Shapes Symbol Shapes Callouts

Stars and Banners

Block Arrows
Flowchart Fontwork Gallery

83
Digital Documentation (Advanced) 5
Various Ways of Inserting Images
In Writer, images can be inserted in following ways:
1. Import graphics files using Insert menu > Picture > From
File option. (7.1.2.2 & higher versions: Insert > Image)
2. Link image by Insert menu > Picture > Link option or
embed image by breaking the link as Edit menu > Links
option and clicking Break Link button in the Edit Links
dialog box.
3. Scan the image by Insert menu > Picture > Scan option >
Select Source > OK. Then insert the scanned image using
Insert menu > Picture > Scan > Request option.
(7.1.2.2 & higher versions: Insert > Media > Scan >
Request)
4. Insert any copied image from the clipboard by using Edit
menu > Paste Special option.
5. Drag-dropping images in the document with Ctrl key ( images
are embedded in the document as its part.) or, Ctrl+Shift key (a link to the image is inserted
in the document. Actual image is not inserted.)

Object Properties Panel


While working with any shape and image, the properties of the
selected object can be viewed and changed in the Properties
panel in the Sidebar (Ctrl+F5). Some common properties of
the shapes are:
¤ Area, Shadow and Transparency
¤ Glow and Soft Edge
¤ Line, Line Styles, Arrow Styles
¤ Wrap and Spacing
¤ Position and Size

84
5 Digital Documentation (Advanced)
Drawing Object Properties Toolbar
When a shape or image is selected, the Drawing Object Properties Toolbar can be used to
manage the drawing object in following ways:
¤ Text wrapping: These options determine how the text around the inserted shape or object
should be arranged. There are following ways a text is wrapped around an object:
i. None: The text remains as it is above and below the object.
ii. Parallel: The text flows around the object.
iii. Optimal: Optimal Page Wrap prevents text from being placed to the side of the image if
the spacing between the image and the margin is less than 2 cm.
iv. Before: The object is placed to the right side of the text.
v. After: The object is place to the left side of the text.
vi. Through: The object floats over the text and hides the text.

¤ Align Object: Object can be aligned Left, Right, Center (horizontal),


Center (vertical), Top and Bottom.
¤ Arrange Object: Object can be arranged
above all other objects, behind all the other
objects below it, behind the object just below
it or over the object just above it.
¤ Object can also be placed above the text and behind the text.
¤ Arrow style: These can be selected for arrow heads and tails.
Changing line colour, line style, fill colour and fill style of a shape
¤ Line style: This can be selected for lines and outline of a shape.
¤ Area style/Filling: This is a list of various styles in which a colour or pattern can be filled in
the shape.
¤ Line width and line colour can be set using Line width and Line Color buttons.
¤ Colour can be filled in the object using Fill Color colour box.

Line Width and Line Color

Fill Color

Area
Style/Filling Note:
When we use the term object, we refer to an
image or shape inserted in the document.
Arrow Style Line Style

85
Digital Documentation (Advanced) 5
¤ Resizing object: To resize an object, select it. 8 handles will appear
around it. Grab any handle with the left mouse click and drag to resize
the object.

¤ Rotating object: The Rotate button on the Drawing Object Toolbar helps in rotarting
and skewing the object. Rotation means turning around the object on its central axis by
holding it with corner handles. Skewing means changing the shape of the object by stretching
it across horizontally or vertically by holding the handles on its margins.

Rotation Horizontal Skew

¤ Grouping objects: Multiple shapes and images can be grouped together and ungrouped. To
do so, first select the first object, then pressing and holding down Shift key, select other
objects. This way all the desired objects will be selected. Then click on Group button on
the Drawing Object Properties toolbar.

To ungroup the objects, select the grouped objects and click on Ungroup button on the
Drawing Object Properties toolbar.

Note:
To edit any object which is a part of
an object group, use Enter group
button and to exit, use Exit
Group button on the Drawing
Object Properties tooolbar.

Some more operations specific to images using Image Toolbar


Operations such as rotating and resizing the shapes are applied on the images also in the same
manner. Following are some more operations and setting that can be applied on images using
View menu > Toolbars > Image:

86
5 Digital Documentation (Advanced)
¤ Cropping Image: Cropping is the way to remove unwanted part of the image starting from its
outer edges. To crop the image, select it and click Crop button on the Image toolbar. 8
handles will appear around it. Grab any handle with the left mouse click and drag to inwards
to crop the image.

¤ Image Color Settings: Image colour settings such as brightness, contrast, colour channels can
be changed using Color button in the Image toolbar. In the Color pop-up, apply the
changes as required.

¤ Image Transparency: Image transparency can be set


by changing transparency value in the Transparency
counter in the Image toolbar.

¤ Image Mode: Image can be displayed in modes such as Grayscale, Black


and White and Watermark. Click on Image Mode drop-down on the
Drawing toolbar and select the desired mode.

87
Digital Documentation (Advanced) 5
¤ Image Filters: Filters are certain special effects that can be applied on an
image to give it a completely different look. Filter button on the Drawing
toolbar provides various filters

Image filters are summarised here:


Invert: Inverts the image color values, or the brightness values of a grayscale image.
Smooth: Reduces pixel contrast.
Sharpen: Increases pixel contrast.
Remove noise: Compares and adjusts extreme intensities of pixels.
Solarisation: Adjusts pixel brightness up to only a set threshold.
Aging: Gives image an old, vintage look.
Posterize: Reduces number of colours in the image.
Pop Art: Makes the image look like images in advertisements.
Charcoal Sketch: Gives look of a charcoal drawn image.
Relief: Detects edges in the image and makes it look like exposed to extreme light.
Mosaic: Makes image look like composed of small rectangular tiles.

EXERCISE
1. You own a multimedia design company. Write a small introduction of the
company then do the following:
a) Insert a picture depicting about your company.
b) Rotate and Resize the picture.
c) Click on the picture and try Cropping some of its part.
d) Save the file.
2. Create visiting cards of various post holders in your IT Club or school activity
club.
3. Open the document saved in the previous question and do the following:
a) Insert a picture of your school's building in the document.
b) Set its Layout Option to Parallel.
c) Set/move the picture to the right side of the document.
d) Save the file.
4. Make a poster to spread awareness about personal hygiene or environmental care.
5. Collect some images of any occasion or your friends and make a collage.
Finally, group all the images.
6. Create an invitation letter for teachers to a Stage Play students going to
present on teachers' day. Use various shapes in decorating the card.

88
5 Digital Documentation (Advanced)
Session-3 Document Template
A template is a pre-designed and pre-formatted document which can be used to fill in the content as
you need. Template saves time and effort that otherwise goes in designing and formatting the
document manually.
A template saves you time and effort as it contains all the formatting and design already applied in
it. You just need to enter your content and arrange it as you require.
Writer provides a rich library of templates like resume, CV, Modrn, MediaWiki, Simple, etc. Some of
the templates are installed when you install LibreOffice and many more templates can be accessed
online.
Open LibreOffice and select Writer Templates in the Templates drop-down in the left
Options Pane.
A variety of document templates will be listed which can picked up depending on the
requirement.

Creating a Template
You can create your own pre-formatted templates which you can pick and use later to save time
and hard work.
First, create a well formatted document
which you need frequently. For example,
a colourful newsletter.
Then, click on File tab> Save As option.
In the dialog box, enter the name by
which you wish to save the template.

89
Digital Documentation (Advanced) 5
Click on Save as type: drop
down list and select ODF Text
Document template. Finally,
click on Save button.
The Writer template document
will be saved as .ott file.
You can save your template
anywhere or in application
template folder. You can find
the path to the templates by
going to Tools menu >
Options option > LibreOffice
> Paths category.

Setting Default Template


To replace default settings for the document, you need to replace the default template with a new
one. You can set any template displayed in the Templates dialog box to be the default for that
document type:
1. Go to File menu > Templates > Manage Templates option.
2. In the Templates dialog
box, open the category
containing the template
that you want to set as the
default, then select the
template.
3. Right-click on the
selected template and
click the Set as default
option.
Next time the document will
be created from this template.
Shortcut
To Manage Template :
Ctrl + Shift + N

Note:
To reset back to the default template, click on the Wheel icon at
the left bottom of the Templates dialog box and select Reset
Default Template > Text Document.

90
5 Digital Documentation (Advanced)
Importing a Template
One way is to select a template while creating a new document which we have learnt earlier. The
other way is to import a template of our choice. This can be done by clicking on
Import button at the bottom of the Templates dialog box.
User created template must be saved in one of the folders listed in Tools menu> Options option
> LibreOffice > Paths.
1. In the Templates dialog, click the Import button. The Select Category dialog appears.
2. Select the category where you want to import the template and click OK.
3. In Open dialog box, locate and select the template that you want to import and click Open.
The template appears in the selected category.
Editing template
In the Templates dialog, right-click on the desired template and select Edit. The template opens in
Writer. Edit the template as you need and save it as .ott file.
Updating a document from a changed template
If you have changed a template and if you open a document that was based on that template
earlier then a confirmation message is displayed. You can select Update Styles to apply the
changed styles in the template to the document or Keep Old Styles if you do not want to apply
the changed styles in
the template to the
document.
As shown here, earlier
Sample_Template1.ott
file had blue text and
Sample_Doc1.odt was
based on it. Then
Sample_Template1.ott
was changed to Red
and Green text. Later
when Sample_Doc1.odt
was opened, the
confirmation to update
template styles is
displayed.
Instaliing Online Templates using Extensions
You can install online templates by clicking Extensions button at the bottom of Templates dialog
box. In the popup, click on the link website bedise the desired template. It will take you to the
download page of that template. Download and save the template to use it.

91
Digital Documentation (Advanced) 5
Changing Template Using Template-Changer Extension
Go to
https://extensions.libreoffice.org/en/extensions/show/tem
plate-changer and download the Template Changer
extension. It is a .oxt file. Open it by File > Open in Writer.
The Extension Manager dialog box will appear to install it.
After installation close the dialog box and restart LibreOffice
application.
After that, you can open the document and use File >
Templates > Change template (current document).
Remember that changes made to the templates using Template
Changer are permanent and cannot be undone once saved.

Using Template Changer, you can:


Ÿ Set a template to replace the earlier template on which your document is based.
Ÿ Deactivate link to template so that template remains linked with the document but any changes in it
will not affect the document.
Ÿ Reactivate link to template to revert deactivation.
Ÿ Cut link to template completely so that your document is not based on any template.

92
5 Digital Documentation (Advanced)
Manually Changing a Template
1. In the Templates dialog, double-click the template you want to use.
2. Delete any unwanted content from it and save the document but keep it opened.
3. Open the document you want to change, select everything (Ctrl+A or Edit > Select All) in
this document and copy (Edit > Copy or Ctrl+C) the contents.
4. Go to the new document created in step 2. Paste (Edit > Paste or Ctrl+V) the contents into
this new document.
5. Save the new document (File > Save).
Now you can discard the old document.
Deleting a Template
Right click on the desired template in Templates dialog box and select Delete.

LAB EXERCISE
1. Using Writer create the document containing following text:
<<Your Name Here>>
INVITE YOU TO
<<name of the event>>
On
<<date>>
At
<<time>>
Venue: <<venue address>>
Looking forward to welcome you at the event.
Thank you.
Now, save the document as template by the name my_invite_template.ott.
2. Using Templates dialog box, import your template in My Templates category.
3. Open this template, create an invitation letter and save it as .odt document.
4. Open your template my_invite_template.ott to edit and make changes in the text
formatting and save it as a different name such as my_invite_template2.ott. Close
LibreOffice then open it again.
5. Now, open your document and confirm if you want to apply new styles or keep the old.
6. Try deactivating and activating the link between your document and the template using
Template Changer extension.
7. Try permanently unlinking the template from your document. (Now, if you make
changes in the template, document will not ask for applying any new styles.)

93
Digital Documentation (Advanced) 5
Session-4 Creating Table of Contents
A table of contents (ToC) contains the numbered list of topics in a document and the page number
on which they are located. In the soft copy of the document, each entry in the ToC functions as an
internal hyperlink to the topic content. User can use Ctrl+Mouse click to jump to the linked topic.
A ToC can be created automatically in any word processor. However, it is always advisable to
update ToC after major changes in the document.

ToC and Character Styles


An efficient way of creating a ToC is to apply styles on the headings in the documents which are
needed to include in the ToC. For example, the document has a chapter title, topic headings and
sub-headings then Chapter title can be given the style Heading 1, topic headings can be applied
with the style Heading 2 and sub-headings can be of style Heading 3. Then, it is easier to create a
ToC automatically.

Creating a ToC
The table of content depends on the headings in the document. It is necessary that document
contains adequately defined standard headings such as Heading 1, Heading 2, Heading 3, etc.
To create a quick ToC in the document, first place the cursor where you need the ToC to appear.
Then do the following:
l Go to Insert menu > Table of Contents and Index > Table of Contents, Index or
Bibliography option.
l In the dialog box of similar name,
in Title tab, specify the title of the
table, specify the number of levels
of headings as required.
l Protect against manual
changes checkbox keeps the
table from being modifed like
common text.
l Click OK.
The ToC will be inserted.

94
5 Digital Documentation (Advanced)
Customising a ToC
To customise a ToC, right click on it and select Edit
Index option.
Ÿ In the dialog box, go to Styles tab.
Ÿ Select level in Levels list and a style in
Paragraph Styles list.
Ÿ To change the style, click on Edit button below
the Paragraph Styles list.
Ÿ In Paragraph Styles dialog box, change style such as font colour and click OK.
Ÿ Click on Assign button.
Ÿ Click OK.

Character Style using Entries Tab


This tab helps formatting each part of the ToC. Select the desired level in the Level column as per
the structure of your ToC. The Structure section contains the elements of the table for the selected
level. The active buttons below the Structure section are those elements which can be added to
the ToC.
The LS icon represents the start of a hyperlink. The E# icon represents the “chapter number”. The
E icon represents the chapter (or sub-chapter) text. The T icon represents a tab stop. The # icon
represents the page number. The LE icon represents the end of a hyperlink. Each white field on
the Structure line represents a blank space where you can add custom text or another element.
Applying character styles: In the Structure section, click the button representing the element
needed to be modified. Then, select the desired character style in the Character Style drop-
down You can click on Edit button to change the selected character style.

95
Digital Documentation (Advanced) 5
Updating a ToC
Table of Content is not updated automatically by Writer if any changes are done in the document.
The ToC needs to be updated manually. To do so, right-click anywhere in the TOC and select
Update Index.
Deleting a ToC
To delete the TOC from a document, right-click anywhere in the TOC and choose Delete Index
Remember that Writer will not confirm the deletion.

EXERCISE
Create a multipage document describing about your school. Keep main title as
My School and some sub headings such as About My School, Academics, Sports,
Staff etc. Apply some styles to all the headings and create a well formatted table
of contents for the document.

Session-5 Mail Merge and Labels


Mail merge is a very powerful and useful feature of a word processor. It allows to generate mulitple
mail document with same content and variable values such as names, address, cities, department,
class, section, country, etc. For instance, if you need to create 50 copies of a letter for each of the
50 recipients then using the mail merge feature, you can create as many copies as the number of
recipients. In each copy the letter content would be same but the name and address of the
recipient would be different.
Mail Merge feature involves 3 documents:

96
5 Digital Documentation (Advanced)
Main document: It is the document that contains the content which is common across all the
copies. This is the document whose multiple copies are generated.
Data source: This document contains the variable data such as names of the recipients, address,
city, state, pincode, country, designation, department, etc. These values are arranged as rows or
records in a tabular format and the first row contains the headings of each column. During the
mail merge process, these values are merged with the main document and as many copies as the
number of records merged, are created.
Merged document: This is generated as the output of the mail merge. The values in the Data
source are merged with the Main document to create merged document. User just has to specify
where the merged values should appear in the merged document. The location of merged values
are specified by the help of merged fields. Merged fields are the placeholders which indicate
where the merged values must appear.

Data
source

Main document

Final merged documents Merged fields inserted in the main document

Creating a Data Source


A data source contains the values to be used for merging with the main document. It is a tabular
document that contains records (rows) of data values. First row is considered to be the header row
that contains column headings called fields. Data source can be simple document or a spreadsheet
or the values may come from a database through a data connection. Here, we shall learn how to
use a document-based data source. For example, to create a notice for the apartment owners of a
building to pay their maintenance dues. The data source contains following details. There are
seven fields namely Salutation, First Name, Surname, Apartment Number, Service Start Date,
Amount Pending and Pending Since.

97
Digital Documentation (Advanced) 5
The Main Document
Main document is the main letter that can be drafted and saved beforehand or it can be created
new during the process of mail merge. Main document of notice reminder looks like this.

Notice, the missing values after the words To, since, Rs. and the second since. Here, the values will
be inserted (merged) from the data source.

Setting up Data Source


After creating and saving the data source, we need
to access the data source in the main document.
Open the main document and follow the steps given
here:
1. Go to File menu > Wizards submenu >
Address Data Source option.
2. In the Address Book Data Source Wizard
dialog box, select Other external data source
radio button. Click Next.

98
5 Digital Documentation (Advanced)
3. Click on Settings button.

4. Select Database type as Writer Document.


Click Next.

5. Click Browse and select the data


source document. Click Next.
6. Go to the section Data Source
Title and give a relevant name to
the data source. Click Finish.
Notice that the name given here is
ApartmentOwners.
7. Go to View menu > Toolbars >
Mail Merge.
8. Go to View menu > Data Sources.

Shortcut
View Data Sources: Ctrl+Shift+F4

9. In the Explorer, open the table under the name of your data source. The records of the data
source will be displayed. Click on the fields in the data source and drag-drop them in the
main document where ever required as shown here.

99
Digital Documentation (Advanced) 5
10. In the Mail Merge toolbar, click on
Next Mail Merge Entry button to
see the first merged letter.

¤ Click on Edit Individual Document button to display the merged document.

¤ Click Save Merged Document button to save it.

¤ Click Print Merged Document button to print the merged document.

LAB EXERCISE
Your school is going to organize annual sports meet. Use mail merge feature as
specified here:
1. Create an invitation letter to invite all the schools of your zone/district to participate in
this event.
2. Create a list of 10 schools that you want to invite.
The fields should be: PRINCIPAL_NAME
SCHOOL_NAME
SCHOOL_ADDRESS
3. Perform mail merge to generate individual letters for each school.

Address Labels
Labels contain the addresses
which can be printed for
mailing purpose. All the labels
may contain same address on
all of them or different address.
Once you have the data source
for labels is ready and
registered with LibreOffice like
you did earlier, you can begin
creating a document containing labels out of it. We are going to use a Writer document
addresses.odt as data source that contains all the data for labels as shown here.

100
5 Digital Documentation (Advanced)
Creating Label Document
1. Go to File menu > New > Labels options. In the
Labels dialog box, do all the settings for the labels. We
shall create multiple labels with different addresses.
2. In Labels tab, selected your registered data source in
Database drop-down and Table 1 as the data table.

3. One-by-one add the fields from


Database field drop-down using
Insert button.
4. Arrange the fields in the Label
Text box as you need.

5. Go to Format tab and define the page


dimensions that will contain the labels,
number of labels in terms of rows and
columns, dimensions of the labels and
distance between them.

6. Go to Options tab and check the


Synchronize content checkbox so that
if you format one label then other labels
are formatted automatically.
7. Click on New Document button. A new
document with label placeholders will
appear. Each placeholder shows the fields
in the label.

101
Digital Documentation (Advanced) 5
At this time if you change the format of any
label and click on Synchronize Labels button
in the Synchronize popup, the format will be
applied to all other labels.
8. Click on Next Mail Merge Entry button
to preview the labels.
9. Click on Edit Individual Document
button. The document with labels will be
displayed.

Note:
Try making the name of one
recipient bold and colourful then
click on Synchronize Labels
button in the Synchronize
popup. Notice that same format is
applied to all the other labels.

LAB EXERCISE
1. Create labels of dimension 4 X 5 inches to paste on the notebooks. Label should
contain your school name and space to write Name, Class, Section and Subject.
2. Create multiple visiting cards on single page for your friend containing a fictitious
company name, Address and Contact Number.

102
5 Digital Documentation (Advanced)
Unit
Electronic Spreadsheet
2 (Advanced)

Session-1 Calculating Subtotals


Subtotals feature is a quick way to calculate automatic subtotals, averages and other numeric summary
on a group of data. Subtotals works better on the sorted data. For subtotals, you need to have at least
one column in the data-set as numeric to calculate the subtotal on. To calculate subtotals, first select the
data-set and then click on Subtotals option in Data menu.

In the Subtotals dialog box, specify the following:


The field at whose change you need the subtotal in Group by drop-down.
Select the fields for which calculation needs to be done in Calculate subtotals for list.
The function you need to apply (by default, it is SUM) in Use function list.
Then, click on OK button.
The example shown here is calculating subtotals of QUANTITY at each change of TYPE of the
garment.
You can add more groups for sub-totals by going other group tabs in the dialog box.

107
Electronic Spreadsheet (Advanced) 5
LAB EXERCISE
Mr. Rajan has a sheet containing the names of the students, their houses (Red, Green,
Blue, Orange) at school and their score in sports. He wants to calculate number of
students for each house and average score of each house. Help Mr. Rajan.

Data Consolidation
This feature allows you to bring together data from different spreadsheets and workbooks into a
consolidated form where sum or average or other calculations are done on the data values. Let us
see a simple example. Sheets named East Sale and West Sale need to be consolidated as their
average in sheet Average Sale.

Ÿ Go to the blank sheet and desired cell where you


need to display the consolidated data.
Ÿ Data menu > Consolidate option.
Ÿ In the Consolidate dialog box, select the desired
function to perform on the values. Click the
Shrink/Expand button of Source Data Ranges
and select the data range in first sheet and click
on Add button. The select data range will be
added in the list. Repeat this step for all other
sheets to be consolidated. Finally, click on OK button.

LAB EXERCISE
Mrs. Sengupta has English marks of some students for exams Term1, Term2 and PreBoard
in separate sheets by the same names. Help her to consolidate the average marks of the
three exams into a fourth sheet in the same workbook.

What-if Analysis
What-if analysis is a way to do forecast on the basis of assumed but realistic figures. It is the process
that allows to see “what” changes would happen “if ” the data values are changed in a particular
manner. For example. “What” should be the commission “if ” the sale is increased? There are
various ways to perform what-if analysis in electronic spreadsheets such as applying scenarios,
goal-seek etc.
What-if Analysis with Scenario
Scenario is a way to perform what-if analysis. A scenario is defined by a set of values which can be
applied on an existing data-set. The original data-set is substituted by the scenario data-set and user

108
5 Electronic Spreadsheet (Advanced)
can analyse the changes. Various scenarios
can be created and applied on the original
data-set to analysis different situations
predicted in the scenario. This way, user can
analyse different business scenarios by using
Scenario feature.
Creating Scenarios
Let us understand it with the example shown
here. In this example, we shall apply different
scenarios of prices to see the change in the
commissions. The new set of prices are
labelled as NEW PRICE 1 and NEW PRICE 2.
These will be applied to the origirnal prices in
column C.
First, select all the original price values in
range C2:C10.
Go to Tools menu > Scenarios option. In the Create
Scenarios dialog box, mention the name of the scenario
(ORIGINAL PRICE) and click OK.
Repeat this step once more but this time save the scenario
with different name (NEW PRICE 1).
Now, copy-paste the values of NEW PRICE 1 i.e.
A13:A21 on the original range i.e. C2:C10. Now the
second scenario has different values.
Again, select all the values in range C2:C10 and create
yet another scenario (NEW PRICE 2)
Now, copy-paste the values of NEW PRICE 2 i.e.
B13:B21 on the range C2:C10. Now the third scenario
has different values.

Applying Scenarios
As you select different scenarios form the drop-down, you
can observe and analyse the changing values of
Commission.

109
Electronic Spreadsheet (Advanced) 5
LAB EXERCISE
Mr. Ben is investing Rs. 12000 per month with a guaranteed return of 13% on the annual
amount (i.e. 12 * 12000). Create a scenario to help Mr. Ben see the amount he should get
in return after 15 years if he invests Rs. 15000 per month. Also, prepare a scenario to
check what will be the return after 10 years on investing Rs. 12000 per month but at a rate
of 15%. Assume the layout of the data.

What-if Analysis with Goal Seek


When we need to assess the impact on any data value due to any change in another data value,
we use Goal Seek feature. In simple terms, goal seek allows us to determine the input for a
desired output. For example, how many more students should have scored 70% to make class
average 75%? Or, how many more five stars were needed for a web site to have its rating above 8?
In goal seek, you need to specify 3 items – which cell you want changed, by which value (expected
output) and which cell has the input value. To apply goal seek, go to Tools menu > Goal Seek
option. Let us understand this with a small example. In the example shown here, the merchant
wants to know how many sofas should be sold to achieve total commission of 20 lakh?
Commision is calculated as 12% of Price * Sale Qty for both the items.
Open Goal Seek tool and then do the following:
¤ In Formula cell, select the cell D4 since it contains the formula to calculate total commission.
¤ In Target value, mention 2000000 since that is the expected total commission.
¤ In Variable cell, select the cell C2 that has sale quantity to be estimated.
On clicking OK, Goal Seek tool will confirm whether you want to apply the new changes on the
data. You can click Yes or No as per your choice.

So, 98 more sofas (total 298) need to be sold to achieve the goal
of Rs. 2000000 commission.

110
5 Electronic Spreadsheet (Advanced)
LAB EXERCISE
Ravi wants to apply the “cause and effect” on his studies. His exams are approaching and
he has to prepare for 7 subjects. Each subject has 12 chapters to be prepared. He takes 4
hours to prepare one chapter. He studies 6 hours daily. He needs to know, how many
hours does he need to study daily to complete the preparation of all the 7 subjects.

What-if Analysis with Solver


Solver is a more advanced tool than Goal Seek. It is used to find out best optimised results from
the data by considering certain constraints. For example, maximizing the profits, minimising the
expenses, estimating optimum budget etc. Solver analyses the values and constraints to provide
the best possible solution.
In order to use the Solver to solve a mathematical programming problem, you must formulate the
problem as follows:
• Decision variables – one or more non-negative values.
• Constraints – conditions to be satisfied depending on the business requirement.
• Objective function – the maximised, minimised or a fixed value to achieve after calculation.

Let us understand Solver with the following scenario:


A publication company publishes books in 4 subjects namely Windows 10, Windows 7, LibreOffice and
MS Office. The billing of books is done on credit (no payment at the time of selling the books) and
details of billing amount are recorded.
T h e n , a n e s t i m a t e o f ex p e c t e d
amount to be collected is taken as 60%
of the billing amount. The publisher
wants to know - How much billing of
each book is needed to collect
expected amount of Rs. 40000000
but for each subject, the billing amount should be at least Rs. 10000000?
Here,
· Target cell is D8 which needs to have calculated value 40000000.
· Optimisation result is the fixed value of 40000000.
· The changing cells are C4:C7.
· Limiting conditions for each of the billing cells is 10000000.
Let us setup solver with the above values and criteria by going to Tools menu > Solver option.
Ÿ Select cell D8 for Target cell field.
Ÿ Enter 40000000 in Value of option of the field Optimize result to.
Ÿ Select cells C4:C7 for By changing cells field.

111
Electronic Spreadsheet (Advanced) 5
Ÿ In Limiting Conditions section, one-by-
one select cells C4, C5, C6 and C7 and for
each of them select the Operator as >=
and specify Values as 10000000.
Finally, click on Solve button.
Solver Status popup will show the
calculation being done. You can click on
Continue button to recalculate new figures.
Once satisfied, click on OK.
You can save (Keep Result button) or
discard (Restore Previous button) the
result in Solving Result popup.

Note:
To calculate values as integers you can click on Options
button on Solver dialog box and select Solver engine as
LibreOffice Linear Solver and select Assume variable as
integer option.

Solver engines
Solver engines are based on following algorithms:
DEPS – Evolutionary algorithm best suited for calculating closest approximate result.
SCO – Evolutionary algorithm based on social cognitive optimisation techniques.
In above two, a group of solutions is generated. The best solution is selected by evaluating it against the
input values (changing cells) and output values (objective cell). This is used for complex calculations.
LibreOffice Linear Solver - Good for optimising linear equations.
LibreOffice Swarm Non-Linear Solver - Good for optimising non-linear equations.

112
5 Electronic Spreadsheet (Advanced)
LAB EXERCISE
Consider the sales sheet given here.
The objective is to achieve the
profit of 100000. You need to
manipulate 3 variables: number of
burgers needed to sell (C2), the
price per burger (C3), the cost of
one burger (C6).
The constraints to consider are:
1. The number of burgers sold (C2) should be a whole number (integer).
2. The price of one burger (C3) should not exceed 65.

Session-2 Referencing and Linking Sheets


You have learned how to refer to the cell addresses while applying various formulae and functions
in a worksheet. Calc allows referring to the cells in another worksheet or workbook from your
active worksheet. Within the active worksheet, cells are referred to simply by their cell addresses
but if you need to refer to a cell which is in another worksheet of the same workbook then the cell
address needs to be preceded by
worksheet name with an ! sign in
between the worksheet name and
the cell address.
For example, =mysheet2!B5 *
mysheet3!B5
Here, cell addresses B5 belong to
the worksheets named mysheet2
and mysheet3.
Remember that this approach of
calculation across the sheets works
where consistent formats are used
by the team members and every
sheet has a fixed format.
Let us understand it with the
following example. Consider the
four sheets in a workbook here:

Notice that cell B3 contains the sales figures of North region in all the sheets names JAN, FEB
and MAR. To calculate the total of these 3 values, you need to mention the name of the sheet,
followed by ! sign and then the cell address B3 in the formula as shown in the sheet QRT1.
=JAN!B3+FEB!B3+MAR!B3

113
Electronic Spreadsheet (Advanced) 5
Referring to Sheets as a Range
If the worksheets are in sequence then they can be referred to as a range of sheets which includes
the name of the first sheet in the range and the name of the last sheet in the range, both separated
by a :
Consider the sheets JAN, FEB and MAR in the previous example. The formula to calculate total
sale of Quarter1 can also be calculated by the formula as shown here: =SUM(JAN:MAR!B3)

Note:
If sequence of first or last sheet is changed then the formula will consider only the sheets in the new range.
For instance, if there are 10 sheets named from sheet1 till sheet10 and formula is:
=SUM(sheet1:sheet10!B3) and if sheet10 is moved before sheet5 then the sequence of sheets
would be sheet1, sheet2, sheet4, sheet10, sheet5, sheet6, sheet7, sheet8, sheet9. In this case,
SUM function will refer to only the sheets sheet1, sheet2, sheet4 and sheet10.

Creating references to other worksheets with mouse


We can refer to the cells in the other worksheets. To do so, first go
to the cell in which you need to apply the reference of a cell in
another sheet and type = sign (See the example sheet named
TOTAL). Then, click on the name of the desired sheet. In that sheet,
click on the desired cell and press Enter key. Apply the same steps
for other cells.
Finally, drag with the fill
handle to apply the same
references to other cells.
To refer to the cells in a sheet
in another workbook, follow
the same steps. You just need
to keep the other workbook
opened first.

Referring to Sheets in Separate Workbooks


The processes of referring to the cells of other sheets in separate
workbooks is same as explained earlier except that you need to open
the desire workbook, go the desired sheet and select the cell you need
to refer to. The path to the workbook will be included in the cell
reference. One example is shown here as in a worksheet following
reference is created:

Here, cell range B2:b12 of Sheet1 in workbook Ex-session 3.ods on


the local path H:/ is referred to in SUM(). Here, file: is a protocol that
refers to a local storage such as disk drive H.

114
5 Electronic Spreadsheet (Advanced)
LAB EXERCISE
1. There are 5 sheets named Class1, Class2, Class3 and Class4. Each sheet contains
average marks of English in cell A1, average marks of Hindi in cell B1 and average
marks of Math in cell C1. Calculate overall average marks in a sheet Class5 of all three
subjects by referring to above cell addresses using + arithmetic operator.
2. Calculate the above using SUM().
3. Create a new worksheet Sheet1 with the names of some countries and their
populations in columns A and B. In column C type the percentage rate at which their
population is increasing (e.g. 5, 3, 10 etc).
In Sheet 2, in column A, display the populations of those countries after 3 years. The
formula for calculating this is: ((Population * Percentage Increase) / 100) * 3.

Absolute and relative hyperlinks


Hyperlinks connect one document with another. A piece of text or image works as hyperlink,
clicking on which fetches the linked document. Imagine that a file summary.ods is on the following
path: D:\myprojects\project20\reports\summaries\summary.ods
summary.ods has a text: Click for details which is hyperlinked to another file details.ods on path:
D:\myprojects\project20\reports\details\details.ods
This is absolute hyperlinking wherein entire path to the linked document is mentioned. If you send
reports folder to someone who copies it on his computer in drive E: so, the path to these files on
his computer will be - for summary.ods: E:\reports and for details.ods: E:\reports\details
Can you see the problem? When he will click on the hyperlink, the application will look for
D:\myprojects\project20\reports\details\details.ods, instead of E:\reports\details. To prevent
such situations when you need to distribute linked documents to others, relative hyperlinking is
useful. Now, let us understand relative hyperlinking.

Notice the common path to both the files: D:\myprojects\project20\reports. This is called Base
address. So, if the source file (that contains the hyperlink) and the linked file are sharing a
common path, then hyperlink can be created by omitting the base (common) path. This is called
relative hyperlinking. Therefore, in above example, relative hyperlink address in summary.ods will
be details\details.ods. When user clicks on a relative hyperlink, application looks for the path
from the current folder onwards and not from the very beginning (root) of the path. In this case,
folder details is always going to be under folder reports so, no matter where you copy folder
reports on any computer the relative path is not going to change.

115
Electronic Spreadsheet (Advanced) 5
Setting up and inserting hyperlinks
¤ G o t o t h e To o l s m e n u >
Options option. In the Options
dialog box, go to Load/Save >
General and check Save URLs
relative to file system and
Save URLs relative to internet
check boxes. Click OK.
¤ To insert a hyperlink into the
spreadsheet do any of these:
¤ Go to the desired cell or select
the desired text. Then, Insert
menu > Hyperlink option,
Or
¤ Click the Insert Hyperlink button on the Standard toolbar.
¤ Drag-drop an item from the Navigator to the desired cell.
¤ Type the target web address or URL or Shortcut
path to the target document at the point To display Insert Hyperlink dialog box : Ctrl + K
where you want to insert the hyperlink.
Hyperlink Dialog Box
Ÿ Internet section: It allows to mention the web (http/https) or file (ftp) url and hyperlink text. For ftp
links, you need to provide username and password to access the ftp service.
Ÿ Document section: It allows to set the path to the target document or part of that document.
You can also insert the mail reference to a mail recipient in Mail section or create a new hyperlinked
document by going to New Document section.
The hyperlink can be inserted as a form button if you select Button option in Form drop-down.
Finally click on Apply or OK button.

Hyperlink to the target sheet named SCENARIO in the


worksheet Unit 2Examples.ods
Button Hyperlink to a URL

116
5 Electronic Spreadsheet (Advanced)
Editing a Hyperlink
To edit a hyperlink, go to the cell that contains the hyperlink and do any of the following:
Ÿ Right click on the hyperlink text and select Edit Hyperlink option in the popup menu.
Ÿ Insert menu > Hyperlink option.
Ÿ Press Ctrl + K.
Removing a Hyperlink
To remove a hyperlink, right click on it and select Remove
Hyperlink option in the popup menu.
Opening a Hyperlink
To open or follow a hyperlink, right click on it and select Open
Hyperlink option in the popup menu. Or, left click with Ctrl
key down.

LAB EXERCISE
Ankita has created a sheet for her team to be filled individually. She created the data
format in Sheet2 of the workbook and mentioned the instructions in Sheet1. In cell A1 of
Sheet1, she needs to create an internal hyperlink to the instructions in Sheet1. Help
Ankita.

Linking to External Data


You can link HTML tables in web pages, csv files and data on other worksheets to another
worksheet.
To insert the linked data from an external worksheet, place the cursor where
you need to insert the linked data and go to
Sheet menu > Link to External Data
option.
l In the External Data dialog box, click
on Browse button to locate the file
which contains the desired data to be
linked. The named ranges in that sheet
will be listed.
l Select the named ranges you want to
link using Ctrl key and click OK.
You can also link data range in a sheet by drag-
dropping it onto the other sheet from Navigator
pane. Do not forget to right click on the range
name and select Drag Mode > Insert as Link
option to insert the range as a link.
To view a list of all external data links in the
spreadsheet, select Edit menu > Links to
External Files option.
In Edit Links dialog box all the links are listed. You
can modify, break or update the links.

117
Electronic Spreadsheet (Advanced) 5
Note:
Use Data menu > Define
Range option to name a
selected data range.

Linking to Registered Data Source


Registered data source means any file which contains the data required to be accessed through
your document or spreadsheet and your application is aware about it. Aware means, your
application knows about its file type (spreadsheet, csv file, database, website etc.) and able to
establish connection with it (compatibility).
l Tools menu > Options. In the Options dialog box, go to LibreOffice Base > Databases.
l Registered databases
will be listed.
l Click on New button
to locate the database
to be registered and
click OK on Create
Database Link
popup.
l Finally click OK in
Options dialog box.

Linking the registered database: Go to View menu > Data Sources option. Registered data
sources will be listed in the Data Source Window. Navigate to the desired database and table in it.
Select the whole table by clicking in top-left blank gray cell. Then, drag-drop the table to the sheet or
click on Data to Text button in the Table Data toolbar.
Update any changes in the data in datasource by selecting the data range in the sheet and using Data
menu > Refresh Range option.

118
5 Electronic Spreadsheet (Advanced)
LAB EXERCISE
A. Open a new worksheet and insert two hyperlinks - one to a document saved on your
computer and the other to a web url.
B. Get a database StudentDB made by your teacher that contains a table named
Student. The table should store First Name, Surname, Date of Birth, Class, Section,
House and Percentage Marks. Import this data in a spreadsheet.

Session-3 Share and Review Sheets


Modern businesses work in a shared environment where information and resources are shared
over a network. Concurrency is the main factor while sharing files on the network. It refers to the
ability of the software application or operating system to allow multiple users access the same file
to facilitate collaborative data sharing. In such scenario, multiple users can view the data of the file
and can make edits in the same file simultaneously. The worksheet can be shared over local
network as well as across the world over internet. For a local network (LAN), the spreadsheet file
can be shared by saving it on a shared drive on any computer with rights given to the concerned
users by network administrator to access it.
Sharing of file has following major advantages:
¤ Faster data entry.
¤ Real-time data updates.
¤ Decreased data redundancy (multiple copies of same data set).
¤ Collaborative work environment.
For any worksheet to be shared, first ensure that it is saved on a shared drive where it can be
accessed by multiple users. If you have not saved the file then Calc will prompt to save it while you
share it. To share the worksheet, go to Tools menu > Share Spreadsheet option. In the Share
Document dialog box, check Share this spreadsheet with other users check box and click
OK button.

119
Electronic Spreadsheet (Advanced) 5
When you change and save a shared
worksheet, there are following possible
scenarios:
1. If no other user has modified the
sheet meanwhile then it will be
saved.
2. If another user has modified the
sheet then Calc will prompt you to
choose other changes (Keep
Other/ Keep All Others) or your
changes (Keep Mine/Keep All
Mine) in Resolve Conflict dialog
box.
3. If you have already opened the
sheet, the other user will be
displayed the message that the file
is locked for changes and he/she
may save the file later.

LAB EXERCISE
If your lab has computers networked with each other, ask your teacher to have a worksheet
copied on a shared drive which you can access then try editing the sheet at the same time
along with some of your classmates.

Review changes in spreadsheet


Spreadsheets, like other documents, can be reviewed either before sharing them with the
intended recipients or after receiving from them to review the changes made by others. We know
how to review sheets by the tools such as Spelling and Grammar and Thesaurus. Now, let us see
how to review sheets when they are shared among multiple users.

120
5 Electronic Spreadsheet (Advanced)
Preparing a sheet before sharing
When multiple users are likely to make changes in a sheet, it is a
good practice to switch on the tracking of changes. This way, the
changes made by anyone in the sheet are visible clearly for
review by others.
To do so, go to Edit menu > Track Changes > Record option.

You can also go to File menu > Properties option >


In Properties dialog box, Security tab > Record
changes > OK.

Shortcut
Switch on Recording Changes: Ctrl + Shift + C

Once the recording of changes in the sheet is on, any changes made in the sheet are recorded.
Changed cells are indicated by red border
with a red dot in top-left corner of the cell.
Cells B4, B6 and C5 are shown as changed
here. As you bring the mouse pointer over
any changed cell, the information appears
in a yellow pop-up.
Reviewing Changes in the Sheet
To review the changes, open the sheet. Go to Edit menu >
Track Changes > Manage option.

In the Manage Changes dialog box, all the


changes are listed. Select them one by one and
click on Accept or Reject button. Or, to accept/
reject all changes at once click on Accept All or
Reject Changes buttons respectively.

121
Electronic Spreadsheet (Advanced) 5
Adding and Reviewing Comments
Instead of making specific changes, users can also suggest changes by adding popup comments to
the cells in the sheet. Calc provides two types of comments - comments on changes and general
comments. Track changes comments are added to the changed cells and appear in the Manage
Changes dialog box while reviewing the sheet but general changes do not.
¤ To add/edit comments on changes in the selected cell, go to Edit menu > Track Changes
> Comment. A comment pop-up appears for the user to enter the comment.

You can click on Next and


Previous buttons to jump to
other changed cells.

¤ To add general Comments, right click on the cell > Insert


Comment option or go to Insert menu > Comment option.

Shortcut
Insert general comments: Ctrl + Alt + C

General comments are indicated by a


red dot in the top-right corner of the cell.

Formatting Comments
General comments can be formatted like
text and graphics. To format the
comment:
¤ Right click on the cell that contains
the comment and select Show Comment option.
¤ Using buttons in Text Formatting toolbar and Drawing Object
Properties toolbar comment text and comment box can be formatted.
¤ After formatting, right click on the cell and select Hide Comment
option.

122
5 Electronic Spreadsheet (Advanced)
Editing and Deleting Comments
General comments can be edited and deleted by right clicking on the cell
that contains the comment and selecting Edit Comment and Delete
Comment options respectively.

LAB EXERCISE
Practice adding certain changes and comments in a spreadsheet using Track Changes.
Then, exchange spreadsheets with your classmate. Practice accepting/rejecting changes in
the sheet.

Merge and Compare Sheets


If there are multiple copies of same worksheet modified by multiple users then all of them need to
be merged into the original sheet. Sometimes users forget to enable tracking of changes and
changes made by them are not recorded. In such a case, you can compare the original document
and changed document.
Merging Sheets
To merge the worksheets, first open the original worksheet. Then, go
to Edit menu > Track Changes > Merge Document option.
In the Merge With dialog box, select the other file whose data needs
to be merged and click on Open button. The sheet will be merged.

In the Merge With dialog box,


select the other file whose data
needs to be merged and click
on Open button.

Manage Changes dialog box will appear. Accept/Reject


changes as you need and click Close. The sheet will be merged.
Comparing Sheets
Go to Edit menu > Track Changes > Compare Document
option > In the Compare to dialog box, select the desired file >
Open button.
Manage Changes dialog box will appear. Accept/Reject changes
as you need and click Close.

123
Electronic Spreadsheet (Advanced) 5
LAB EXERCISE
Create a sheet to store 5 records of your friends names with their marks in 3 subjects. Make a
copy of this sheet. Make some changes in the copy. Also, delete a record so that the copy
has only 4 records. Now, merge the copy to the original sheet. Discuss your observations
with the teacher.
Do not forget to switch on recording of changes in the original file before making its copy.

Session-4 Working with Macros


Macros are a great way to automate routine tasks in an application like spreadsheet. For example,
Mr. Sen heads a team of 200 salesmen in various cities who send him sales data by day end daily.
That is 200 records which Mr. Sen needs to sort on the basis of city, sales target and salesman
name. Since he needs to do it every day, he can have a macro created for the same to execute this
task automatically in a few seconds.
Macros are the named set of recorded steps which can be run anytime later as and when required.
Macro feature allows the user to record the steps he/she does. The steps are saved in the
workbook by a unique name given by the user. User also sets a shortcut key to run the macro later.
Macros usually work well with a standard, fixed layout of data. In real life, people perform a lot of routine
tasks on a fixed layout of data-set. In such scenarios, macros help in saving a lot of time and effort.
Macros can be created by recording the steps as you perform a task or they can be created using
LibreOffice Basic programming language.

Recording a Macro
A macro can be recorded by running the macro recorder and performing the desired task to be
automated. Macro recorder records all the steps. Once done, macro recorder is stopped and
macro is saved.
Enabling Macro Recorder: Go to Tools menu > Options option > In Options dialog box,
LibreOffice > Advanced and select Enable macro recording (may be limited) checkbox.
Then, click OK.

Now, go to Tools menu > Macros > Record Macro option.


The macro will begin recording with a popup containing Stop
Recording button to stop macro recording once you are done.

124
5 Electronic Spreadsheet (Advanced)
Example: Creating a New Macro to Sort Data
First, open a sheet with some data to sort. Begin macro recording by following the steps explained
before. Select the data and go to Data menu > Sort option. Select the desired field on sort in the
Data Sort dialog box and click OK. After sorting, click on Stop Recording button. Now follow
the steps below to save the macro:
¤ When you stop the macro recording, Basic Macros dialog box opens. Macros are organised
under modules and modules under libraries. By default macros are saved in Module1.
¤ You can create your own module by clicking on New Module button.
¤ In New Module pop-up, enter the relevant name of the module (e.g. Routine_Tasks) and click
OK button.
¤ Mention a relevant name of the macro (e.g. Sort_BallsPlayed) in Macro Name field and click
on Save button.

Assigning Shortcut Key to the Macro


¤ To see and organise macros, go to Tools menu
> Macros > Organise Macros > Basic
option.

¤ In Basic Macros dialog box, select your macro


and click on Assign button.

125
Electronic Spreadsheet (Advanced) 5
¤ Here, go to Keyboard tab and in
Shortcut Keys section, scroll and
select a combination of shortcut keys
e.g., Ctrl+Alt+Shift+B.
¤ In Category tree, expand the tree to
locate and select the module name.
¤ In Functions section, select the desired
macro.
¤ In Keys section, select the shortcut key
displayed
¤ Click OK button.
Now, when you get new data to be sorted,
copy-paste it in the sheet at exact location
of the older data and press the shortcut key
for the macro. Data will be sorted.
Alternatively, you can run the macro by
pressing Run button in Basic Macros
dialog box.

LAB EXERCISE
Assume a blank colourful, formatted layout and record the macro to create it. The fields
are Serial No., Name, Address, Street, City, Pincode, State, Landline No., Mobile Phone
No., WhatsApp No., Email ID, School Name, School Address, School Phone and School
Email ID.
After recording the macro, test it by the help of the shortcut key.

Using Macros as a Function and Pass Arguments


Macros can be implemented as built-in functions also. A function is an independent executable unit
of code which is identified by its unique name. A function performs a specific task and returns the
result of the task done. For example, SUM() returns the total of the given values. Many functions
need input values to process. The values input to a function are called arguments. For example,
in =SUM(A1:A10), range A1:A10 is argument. You need to have basic knowledge of Basic
programming language to create functions. Here, concept is explained with a simple example.
A function body begins with the keyword Function followed by its name and any arguments and
ends with End Function.
Creating a function: Let us create a function DA under our module created earlier by the name
Routine_Macros.
In this example, function DA is taking 2 arguments – basic_salary and da_perc and returns the
dearness allowance calculated.
¤ Go to Tools menu > Macros > Organize Macros > Basic option.
¤ In the Basic Macros dialog box, click on the Organiser button.
¤ In the Basic Macro Organiser dialog box, select your module and click on Edit button.

126
5 Electronic Spreadsheet (Advanced)
This will open up the macro program editor window. If you
have recorded any macro earlier in your selected module
then the code of that macro will be displayed by the name of
the macro preceded by the keyword Sub. Sub denotes a
sub-procedure or in simple terms, a macro. A sub block ends with keyword End Sub. Scroll down
in the program editor until cursor comes to end sub. Press Enter key to take a new line. Here, we
shall insert the code for our function named DA as shown here. After completing the code, close
the editor’s window.

Using a function: Once a function is created, it can be used as any other


functions you have been using in spreadsheets. Go to any blank cell and
type =DA(3500, 180) and press Enter key. You will see that function DA
has returned the dearness allowance as 180% of 3500 i.e. 6300.

127
Electronic Spreadsheet (Advanced) 5
Structure and working of a function: A function must have a unique, relevant, short name in
a module such as DA. The function name is preceded by the keyword Function. A function block
ends by the keyowords End Function.
Any function arguments are mentioned after the function name within parentheses, separated by
comma. E.g., Function DA(basic_salary, da_perc). These arguments hold the values passed to
the function when it is called later. These values are used in the function for processing.
Once all the calculations are done by the function, the result is returned by it. To return the result
of the processing, the result value is assigned to the function name.

Accessing Worksheets and Cells Using Macros


Modern programs deal with objects. The objects have properties and methods. Properties give us
some information about the object. For example, the number or text or a formula in a cell is its
property. Objects also have functions which help us in manipulating their properties as we need.
Functions associated with objects are called methods. For example, getValue() method is
associated with cells of the worksheet and returns the number stored in the cell. Similarly,
setValue(number) method takes a number and puts it into the corresponding cell.
ThisComponent object: ThisComponent object of LibreOffice Basic refers to the currently
opened worksheet in which macro is running. This object has method getSheets() which returns
a collection of all the sheets in the workbook.
Sheets object: This object refers to all the sheets in the workbook. It has method getCount() that
returns the number of sheets in the workbook; method getByIndex(number) which returns the
reference to the sheet at the given index. Index is zero-based that means getByIndex(0) will
return reference to the first sheet. If there are n sheets in the workbook, then you can pass n-1 into
the method getByIndex() to refer to the last sheet.

Note:
Zero-based indexing is a way to locate items in a collection. Here, first item has index 0,
second has 1 and so on. So, if there are 10 items in a collection then, the index of the last item
will be 9. Hence, by formula it is n - 1 where n is the total count of items in the collection.

Sheets object also has another method getByName(string) which takes the name of the sheet
and returns its reference.
Sheet object: This object refers to the single sheet out of all the sheets in the Sheets object. It has
method getCellByPosition(col, row) that returns the reference to the cell at given column
number and row number. Remember that here also, the column position and row numbers are
zero-based indices. For example,
ThisComponent.Sheets(1).getCellByPosition(0,0)
This is referring to first column, first row i.e. cell A1 in the second sheet (Sheets(1)) in the current
workbook.

128
5 Electronic Spreadsheet (Advanced)
You can also access a cell range by using the method getCellRangeByName(“starting
cell:ending cell”) which returns the reference to the given cell range. For example,
ThisComponent.Sheets(1).getCellRangeByName(“A1:B5”)
Cell Range object: This object refers to a cell range. It has method getData() that returns all the
rows in a range.
Cell object: This object refers to a particular cell in a sheet. It has methods getValue() to retrieve
a number in it; getString() to retrieve text stored in it and getFormula() that returns any formula
stored in the cell.
Functions LBound() and Ubound(): These functions return the index position of the first item
and index of last item in a collection respectively. For example, LBound(Sheets) will return the
position of the first sheet in a collection of sheets while UBound(Sheets) will return the index
position of the last sheet.

Example 1

Here, object ThisComponent is storing reference to the current sheet in user defined object
workbook. It has the collection Sheets which is taken into user defined object sheets. Its index
0 is mentioned to access the first sheet i.e. Sheet1. It is taken into user defined object sheet.
Now, on this sheet object, method getCellByPosition(0,1) is called to access first column i.e. A
and second row i.e. 2 (A2). Reference to cell A2 is created in user defined object cell. On this
object, method getString() is called because this cell contains text value i.e. APPLE. Method
getString() returns string APPLE in user defined variable cell_value. Finally, a function
MsgBox(cell_value) is used to display it in a popup message box.

Example 2

Here, object ThisComponent.Sheet(0).getCellRangeByName(“B2:B6”) returns cell range


B2:B6 (quantities of all fruits) in Sheet1 in the current workbook. Note how reference opererator .
(dot) is used to access the objects within an object.

129
Electronic Spreadsheet (Advanced) 5
The returned cell range is stored in user defined reference range. Its method getData() returns
the rows in the range i.e. rows 2, 3, 4, 5 and 6. These rows are stored in user defined collection
rows.
In collection rows, the rows are arranged on zero-based index i.e. row 2 is at
index 0, row 3 at index 1 and so on.
This range has only one column so the column index is 0. Thus, first cell in the
range can be accessed as rows(0)(0), second cell as rows(1)(0) and so on.
Here, first index is row and second index is column. So, all the values are
accessed and their sum is stored in user defined variable total. Its value is
1319. Next, ThisComponent.Sheet(0).getCellByPosition(1,6) returns the
cell B7 (column B at index 1 and row 7 at index 6) into user defined reference
cell. Finally, cell.setValue(total) is storing the value of variable total i.e.
1319 in the cell B7.

For Loop
Loop is a way to execute program statements muliple times as long as we need. When all the
statements within a loop are executed, it runs again and again as long as a condition allows or on
the basis of a counter. For loop is one such loop that runs on the basis of available counts. It is
denoted by For - Next keywords. With For, a counter variable is associated which is set to count
from a lower value to a higher value using the keyword to. Keyword Next increases the value of
counter variable by 1 by default (or, mention the numbers to skip. E.g., Next 3). The syntax of For
loop is:
For counter_variable = start value to end value
statement
statement
statement
statement
Next

130
5 Electronic Spreadsheet (Advanced)
As shown in the example function for_demo(). Here, loop counter is variable
x which is set to start value 0 till the end value 10. This means, the loop will
run 11 times. This loop has two statements which will execute 11 times. In first
iteration of the loop, statement
cell = ThisComponent.Sheets(0).getCellByPosition(5,x)
will access cell F1 (i.e. 5, 0) since value of variable x is 0. Second statement
cell.setValue(x) will store 0 in cell F1. Next, the value of variable x will be 1.
So, its value 1 will be stored in cell F2, then 2 in cell F3 and so on. Finally, cell
F11 will have value 10 and the loop will terminate.

Example 2 revised with For Loop


Notice lines 5, 6 and 7. In line 5 , LBound(rows) returns 0 and
UBound(rows) returns the index of last cell in the range i.e. 4. So,
the loop will run 5 times (0 to 4).
In line 6, rows(x)(0) refers to indices 0,0. Then, in next iteration 1,0
and so on. This way, one by one, variable total will accumulate sum
of all the 5 values. When the loop is over, finally, the value of variable
total is displayed in cell B7.

5 rows in cell range B2:B6


returned by getData()

Note:
With for loop, Step keyword can be used to specify a number by which the loop counter
should skip. E.g. For x = 1 to 5 Step 2 means x will count 1, 3 and 5 (skipping by 2).

Sorting the columns using macro


Let us now learn how to create a macro code to sort the data on the basis of multiple columns.
Consider the dataset shown
here of Classes and Sections
which is not sorted. Let us
create a macro to sort the
column Class in ascending
order and within it the column
Section in descending order.
Column SNo will remain
unchanged obviously.

131
Electronic Spreadsheet (Advanced) 5
¤ Go to Tools menu > Macros > Organize Macros > Basic option.
¤ Select the module under which you need to create macro and click on Edit button.
¤ Type the following code in the macro editor.

LibreOffice Basic language provides two main objects that help in sorting:
SortField object: This object has property Field to specify the field on which the sorting should
be done in the selected range. Field 0 means first column in the selected range and so on. For
sorting on multiple fields, we need to create an array of this object. This object is defined in a
package util which is part of package star under package sun under com. See how it is accessed in
line 3. New keyword is used to create an object of the specified type. Dim keyword is used to
declare a variable or object. So, here, array of 2 objects of SortField by the name sortfields(1) is
created. This array has 2 elements - element 0 and element 1 - one for each of the two fields on
which we have to do sorting. Element 0 will be used for column Class and element 1 for column
Section.
PropertyValue object: This object just needs the reference of SortFields object to apply sorting.
See line 4 how a new array sortdesc(0) of type PropertyValue is created.
Let us now understand rest of the program.
Lines 6 and 7 are familiar. They are used to create an object range_to_sort which refers to the
range B2:C13 in the sheet named Data1.
In Line 8, method select() is passed with the range object range_to_sort to select the range in
the sheet.

132
5 Electronic Spreadsheet (Advanced)
In Lines 10 and 11, properties Field and SortAscending of element 0 of array sortfields are
being set to 0 and TRUE respectively. Value of property Field is 0 that refers to the first column in
the selected range i.e. Class. Property SortAscending is boolean type that can be either set to
TRUE or FALSE - TRUE means sort in ascending order otherwise descending. So, lines 10 and
11 means sort on column Class in ascending order. Similarly, in lines 12 and 13, element 1 refers
to the second column of the selected range i.e. Section and sorting order is set to descending by
setting property SortAscending to FALSE. So, lines 12 and 13 means sort on column Section in
descending order.
Now, the specified sorting settings need to be loaded into object sortdesc of type PropertyValue.
Line 15 has property Name of sortdesc(0) is set to a string “SortFields”. So, lines 10 and 11
means sort on column Class in ascending order. In line 18, finally, the sorting is applied by passing
object array sortdesc() into the method Sort of range object range_to_sort as argument.

LAB EXERCISE
1. Write a macro function SortNames() to sort the names of 10
cities and their population in descending order of cities and
ascending order of population.
2. Consider the given data set. Write macro CalcAvg() to
calculate average marks for each subject in correspoinding
coloured cells.

133
Electronic Spreadsheet (Advanced) 5
Unit
Database
3 Management System

Session-1 Database Concepts


Storing data and retrieving information has been a necessity of all businesses. Data can be
anything such as, name of a person, a number, images, sound, etc.
For example, Ravi, 4, student, etc. When the data is processed and converted into a meaningful
and useful form, it is known as information.
For example, Ravi is 4 years old and he is a student.
is information.
Earlier, the data was stored manually in the form of
files, books and ledgers. Storing data and retrieving
information from them is a time-consuming task.
With computers, this problem has been resolved.
Computers have replaced paper, files and ledgers as
the principal media for storing important
information. Computers help manage and organize
the data so that useful information can be accessed
easily and efficiently.
A database is a collection of related data from which users can efficiently retrieve the desired
information. A database can be a simple collection of text data in a simple tabular form to a
complex collection of images, audio or video.
DBMS is a collection of programs that enables users to create, maintain database and control all
the access to the database. The primary goal of the DBMS is to provide an environment that is
both convenient and efficient for user to retrieve and store information.
The basic concepts behind a DBMS are:
a) Specification of data types, structures and constraints to be considered.
b) Storing the data and manipulating it as required.
c) Querying the database to retrieve desired data.
d) Updating the content of the database.
Need for Database Management System
Database approach came into existence due to the drawbacks and limitations of file processing
system. In file processing systems; updating, deleting and maintaining the data is difficult. A
number of application programs are written by programmers to maintain the data. In the database

138
5 Database Management System
approach, the data is stored at a central location and is shared among multiple users. Thus, the
main advantage of DBMS is centralization of data.
Advantages of Database Management System
a) The ability to update and retrieve data: This is the fundamental feature of a DBMS.
Without the ability to view or manipulate data, there would be no point to using a database
system. Updating data in a database includes adding new records, deleting existing records
and changing information within a record.
b) Support Concurrent Updates: Concurrent updates occur when multiple users make
updates to the database simultaneously. Supporting concurrent updates is also crucial to
database management as this ensures that updates are made correctly. Otherwise it would
lead to the loss of important data and/or inaccurate data stored.
c) Recovery of Data: DBMS provides ways to backup and recover database. There are times
computers may crash, a fire or other natural disaster may occur, or a user may enter incorrect
information invalidating or making records inconsistent.
d) Security: To prevent unauthorized access to the database, DBMS uses features like
encryption, authentication, authorization and views to provide security to the database.
e) Data Integrity: Data integrity is a set of rules that DBMS provides to see that data incorrect
or inconsistent data is not stored.
f) Controlled data redundancy: During database design, various files are integrated and each
logical data item is stored at central location. This removes replicating the data item in
different files, and ensures consistency and saves the storage space.
g) Data sharing: The data stored in the database can be shared among multiple users or
application programs. Due to shared data, it is possible to integrate new applications without
having to create any additional data or with minimal modification.
h) Ease of application development: The application programmer needs to develop the
application programs according to the users' needs. The other issues like concurrent access,
security, data integrity, etc., are handled by the DBMS itself. This makes the application
development an easier task.
Application Areas of Database System
Database systems support businesses of almost every nature now a days. Some of the most
common database applications are listed here.
Travel Industry: Airlines, railways, hotels and cab industry use online databases for reservation,
room bookings and for displaying the schedule information.
Banking & Finance: Databases are used for storing information such as sales, purchases of stocks
and bonds or data useful for online trading, customers, accounts, loans, and other transactions.
Education: Schools and colleges use databases for course registration, result, and other
information.
E-commerce: Integration of heterogeneous information sources (for example, catalogues) for
business activity such as online shopping, booking of holiday package, consulting a doctor, etc.
Health Care Industry: Databases are used for maintaining the patient health care details.
Digital libraries & publishing: Databases manage bulk text & multimedia data.
Human resources: Organizations use databases for storing information about their employees,
salaries, benefits, taxes, and for generating salary cheques.

139
Database Management System 5
Components of Database Management System
User: Any person who can access the data by using a DBMS is called database user.
Database Administrator: A database administrator is a person who directs or performs all
activities related to maintaining a successful database environment. Responsibilities include
designing, implementing and maintaining the database system, and providing security & training
to employees in database management system.
Application Program: An application program is any program designed to perform a specific
function directly for the user or, in some cases, for another application program or operating system.
Relational Data Model (RDM)
The relational data model is both flexible and natural. This model depicts the storage of data in
symmetrical layouts of tables. tables are the simplest form of organised data. A table stores the data
in rows. Details about any object or event constitute one row. Each data value in a row is identified
a unique label or name. This way, similar data values are found in a single vertical column called
field with a unique name. More than one table together store the data about entire enterprise or
business. These tables are called relations hence the term relational data model. To locate complete
information from the tables, they are linked with each other through common fields.
Properties of relational data model:
Types of Database
Databases are essential for record keeping. You can set up databases with database software
packages, or even spreadsheet applications. Either way, both include options for database tables.
Establishing database tables are a big part of database design, and the number of database tables is
the main contrast between flat file and relational databases.
1. Flat File Database: Flat file is a database with one database table. One single database table
can include all the database's fields.
A single table flat file database can be okay if the database is only a small one with a few
fields. However, some require much larger and more extensive databases with lots of fields.
With lots of multiple fields, some record details can then become duplicated within a single
database table. As such, flat file databases are not ideal for larger database models.

2. Relational Database: Relational databases are more widespread than the flat file database
alternatives. Relational databases break up the single table of flat file database mode.
Relational databases are based on relational data model explained earlier. Links between the
tables are established with primary and foreign keys which are unique identifiers for the
database tables. These links between the database tables are known as relationships and can
be one-to-one, many-to-one or one-to-many. We shall learn about primary and foreign keys in
coming sessions.

140
5 Database Management System
Database Servers
Database servers are dedicated computers that hold the actual databases and run onlythe DBMS
and related software. Typically databases available on the database servers are accessed through
command line or graphic user interface tools referred to as Frontends; database servers are
referred to as Back-ends. Such type of data access is referred to as a client-server model.

LAB EXERCISE
1. Your school library runs on the database of books. Try to find out how your librarian
uses that database.
2. Design the structure of a table BOOK with fields namely: Book_No, Book_Title, Author.
3. Design another table BOOK_ISSUE with the fields namely: Book_No,
Student_Registration_No, Issue_Date, Return_Date.
4. Decide the primary key and foreign key in the above tables and mention the reasons.
Why?

Session-2 Data Storage


Data in a relational database management system (RDBMS) is organized in the form of tables. You
will now quickly recap what you learnt in the last session and assimilate more concepts.
Table
A Table is a collection of data related to a single topic and a database is a collection of tables. A
table organizes the information about a single topic into rows and columns.
Parts of a Table
a. Columns: The columns of a table are also called attributes. The column is the vertical part of
a table. For example, table STUDENT given below has 6 columns.
b. Rows: This is the horizontal part of the table. One row represents one record of the table.
The row of a table is also called tuple. For example, table STUDENT given below has 8 tuples
or rows.
c. Cell: Cell is a small rectangular box that contains a value in the table. It is an intersection
point of row and column.
d. Degree: The number of attributes (columns) in a table is called the degree of the table. For
example, table STUDENT given below has degree 6 (number of columns) columns.

141
Database Management System 5
e. Cardinality: The number of
rows in the table is called its
cardinality. For example, table
STUDENT given below has
cardinality 8 (number of rows).

Query
The purpose of a database is not only to store and accumulate information, but also to ensure
information retrieval according to specific criteria. A query can be used for selection of
information in one or several tables. The result of a query can be displayed in data table, form and
report views; it is possible to specify the table fields to be included.
Form
In databases, it is possible to use forms for
the creation, display and modification of
records. Data entry in a form is visually
easier to understand than in a table, and
is simpler for the user. Forms may contain
fields for data entry, field descriptions
(names), action buttons, menus, pictures,
and design elements.
Report
Reports are formal presentation of data in a particular design and layout. Reports are created using
query or table data. Creating database reports is ideal when you want to:
¤ Reports help in analysing data and take decisions for future plans.
¤ Provide hard-copy printouts for review at a meeting.
¤ Include data from your site in a printed publication.
¤ Mark up the information in your database that needs updating.

142
5 Database Management System
Data types
Data types are used to identify which type of data (value) we are going to store in the database.
Fields themselves can be of different types depending on the data they contain. Data types in
Open Office base is broadly classified into five categories listed below.
• Numeric Types.
• Alphanumeric Types.
• Binary Types.
• Date time.
• Other Variable Types.
Numeric Types
Numeric data types are used for describing numeric values for the field used in the table of a
database. Numeric data types in a database can be using for storing information such as mobile
number, roll number, door number, year of school admission, true or false statements, statistical
values, etc. The different types of numeric data types available are listed here.
¤ BOOLEAN (yes / no): Values as 0 or 1. Example: True or False, Yes or No.
¤ TINYINT (tiny integer): Integer range between 0 and 255
-1
¤ SMALLINT (small integer): Integer range between -215 to +215
-1
¤ INTEGER: Integer range between -231 and + 231
-1
¤ BIGINT (big integer): Range between -263 to + 263
¤ NUMERIC: Maximum precision of e(+/-)231
¤ DECIMAL: Maximum precision of e(+/-)231
-1074 -52 1023
¤ REAL: 2 to (2-2 )* 2
-1074 -52 1023
¤ FLOAT: 2 to (2-2 )* 2
-1074
¤ DOUBLE: 2 to (2-2-52)* 21023
Alphanumeric Types
¤ LONGVARCHAR or memo: Stores up to the max length or number indicated by user. It
accepts any UTF 8 character.
¤ CHAR text (fix): Stores exactly the length specified by user. Pads with trailing spaces for
shorter strings. Accepts any UTF 8 Character.
¤ VARCHAR (text): Stores up to the specified length. No padding (Same as long var char).
¤ VARCHAR_IGNORECASE (text): Stores up the specified length. Comparisons are not case
sensitive but stores capitals as you type them.
Binary Types
Binary data types are used for storing data in binary formats. Binary data types in a database can
be using for storing photos, music files, etc. In general, files of any format can be stored using the
binary data type. The different types of binary data types available are listed here.
¤ LONGVARBINARY (image): Stores any array of bytes (images, sounds, etc.). No validation
required.
¤ BINARY (fix): Stores any array of bytes. No validation required.
¤ VARBINARY: Stores any array of bytes. No validation required.

143
Database Management System 5
Date time
Date time data types are used for describing date and time values for the field used in the table of
a database. Date time data types in a database can be using for storing information such as date of
birth, date of admission, date of product sale, etc. The different types of date time data types
available are listed here.
¤ Date stores month, day and year information 1/1/99 to 1/1/9999.
¤ Time stores hour, minute and second info Seconds since 1/1/1970.
¤ Timestamp stores date and time information.

Database Keys
Each table has a set of attributes and values of each attribute are different from each other in the
form of data types. Each table has a number of rows that represent to a single record. So how do
databases keep all of these records straight? It's through the use of keys.
Primary Key
Primary key uniquely identifies each record in the table. Primary key consists of a single attribute or
multiple attributes in a combination.
Properties of Primary Key
a) It must have a non-null value for each instance of the entity.
b) The value must be unique for each instance of the entity.
c) The value must not change or become null during the life of each entity.

Foreign Key
The foreign key refers to a referencing
key present in child table to a matching
value in a column in another table
(parent). It cannot contain the values
other than that column. It can contain the
duplicate values also.
Candidate Key
In some instances, an entity will have more than one attribute that can serve as a primary key. Any
key or minimum set of keys that could be a primary key is called a candidate key. Once candidate
keys are identified, choose one and only one primary key for each entity.
Let's assume that for each employee in an organization there are three candidate keys: Employee's
ID, Social Security Number and Insurance Policy No. So you can choose only one column as a
primary key.
Properties of Candidate Key are same as of Primary Key.

144
5 Database Management System
Alternate Key
The Candidate Key, which is not chosen as a Primary Key is known as Alternate Key.
Let's assume that for each employee in an organization there are three candidate keys:
“Employee's ID”, “Social Security Number” and “Insurance Policy No. that serve as unique
identifiers in the given table.
If for example “Emp_Id” was chosen as Primary Key then “Social_Security_No” and
“Insurance_Policy_No” would become the alternate key.
Combination of “Emp_Id”, “Social_Security_No” and “Insurance_Policy_No” is known as Candidate Key.
Composite primary key
There are certain cases where a single field may not qualify to become a primary key then unique
combination of more than one key can be considered as a primary key. Such fields which together
function as primary key are called composite primary key fields.

LAB EXERCISE
1. Go to a grocery shop in your neighbourhood and analyse that if you create a table to
store the details of all the items in that shop then what will be the data types of each
field in the table. Justify your choice of data type.
2. Which type of data should be suitable for the fields Phone_Number and Pin_Code?
Justify your answer.
3. Why does database have a variety of data types?
4. How is a form different from a report? Give example.
5. Why table is the most important object of a database?
6. List 2 basic differences between primary key and foreign key.

Session-3 Manipulating Data


Database applications provide graphical interface to work with the database and manage the data.
Besides this, they provide a common high level language called structured query language to work
with the database.
Structured Query Language
Structured Query Language (SQL) [pro: sequel] is the industry standard to work with databases
and usually follows the similar basic syntax for easier operation of all kinds of database
applications. SQL allows working with a relational database in two aspects - defining and modify
the structure of the database and manipulating and managing the data stored in the database. The
part of SQL that lets us define and modify the structure of the database is called Data Definition
Language and the part that allows manipulating and managing the data is called Data
Manipulation Language.
Data Definition Language (DDL)
Data definition language or data description language (DDL) includes database commands that
define, modify and remove the structure of various objects like tables, indexes, users, etc. in a
database. Common DDL statements are CREATE, ALTER, and DROP.
145
Database Management System 5
Data Manipulation Language (DML)
Data manipulation language (DML) includes the commands that allows to access and manipulate
data in a database in the following ways:
¤ Retrieval of information from the database- SELECT statement.
¤ Insertion of new information into the database - INSERT statementDeletion of information in
the database - DELETE statement.
¤ Modification of information in the database - UPDATE statement.

Session-4 Creating a Database Object


There are several popular RDBMS applications like Microsoft Access, OpenOffice Base, LibreOffice
Base, IBM DB2 etc. Here, we shall use LibreOffice Base open source database application.
Opening LibreOffice
1. Start > All Programs > LibreOffice.
OR
Click on the desktop shortcut of LibreOffice.
Creating a Database
To open LibreOffice Base, do any of the following:
¤ Start > All Programs > LibreOffice > LibreOffice Base.
¤ Open LibreOffice and select Base Database from the side bar.
¤ Open LibreOffice > File menu > New > Database option.
2. In the pop-up window, click on Database.
3. In the Database Wizard dialog box, select Create a new
database option.

146
5 Database Management System
4. Click Next.
5. Keep the option to Yes, register the database
for me and Open the database for editing
selected.
6. Click Finish.
7. In the Save As dialog box, select the desired
location for the database and enter the name of
the database file. Note that, LibreOffice database
file has the extension ODB.
8. Click on Save button.

LAB EXERCISE
Create a database in LibreOffice Base by the name Library.

Session-5 Creating and Working with Tables


Table is the primary object of a database, which is used to store data in tabular format. While
creating a table you need to decide the field or column names you need and their data types.
Master Table
What is a master table? A master table contains the main and primary data about any object in any
enterprise or any business. Such table is not modified after every transaction. For example, a table
containing details like codes, names, description, type and unit prices of items.
Master table ideally contains a primary key field. Master table is also referred to as parent table.
Transaction Table
A transaction table contains the details of every transaction that occurs in any enterprise or
business. For example, daily sales details like Sale Date and quantity sold for each item that is sold.
Transaction table usually has a field common with the primary key field of Master table. Such field
logically relates transaction table to the master table. Such field in transaction table is called
Foreign Key. Transaction table is also referred to as child table.

147
Database Management System 5
Transaction Table : Sales

Master Table : Item


Working with Tables
After creating the database, you will see the database interface which lists the four database object
types – Tables, Queries, Forms and Reports in the Database pane.
Click on the category Tables. The Tasks pane will list the choices to create a new table.
Table Design View
Design View provides full control to the user to create or design a database object by defining every
small detail. For example, Table Design View allows you to mention each field you need to keep in
the table and define the type of data it should store along with various constraints on the fields which
ensures valid data storage in the field. You can specify which field should be primary key field.
Click on Create Table in Design View… option in the Tasks pane.
As you chose to create a table using Design View, the Design View window opens up.
Under Field Name, specify the names of the fields that make the table. For each field, define the
data type under Field Type. Description is optional and is for documentation or reference
purpose.
Before designing a table, the basic requirements regarding that table should be determined.
Let us create table Item considering following structure requirements:
Maximum
Size or Decimal Other
Field Name Field Type
Length Places Requirements

ITEM_CODE Text of variable 4 None Primary Key


number of
characters
ITEM_NAME Text of variable 100 None
number of
characters
ITEM_SIZE Text of variable 5 None
number of
characters
ITEM_TYPE Text of variable 100 None
number of
characters
PRICE Text of variable 6 2
number of
characters

As shown here, one by one, type the name of the field, select the field type. For currently selected
field, properties of that field are displayed in the Field Properties pane at the bottom.
Some common field properties are as below:

148
5 Database Management System
Entry required: If Yes, it means that data entry in this field is mandatory. Such fields cannot be
left blank. For example, in the Item table above, all fields are mandatory for data entry.
Length: Refers to maximum number of letters allowed in a text field. For numeric field, the length
refers to the number of digits entered. E.g., 6 means values from 0 to 999999.
Default value: A value can be defined in this property which will be taken if user does not enter
any value. For example, in the garments shop, mostly the size is 32. So, a default value of 32 can
be set for the field that is going to store the size (E.g., Item_Size).
Decimal places: Number of places after decimal for numeric and monitory values.
Format example: Specifies formats of dates, time, currencies etc. You will learn about them in a
later session.

The field property settings for each field are given below:
Field Name Property Settings

ITEM_CODE

ITEM_NAME

ITEM_SIZE

ITEM_TYPE

PRICE

149
Database Management System 5
Setting the Primary Key
We know that primary key uniquely identifies a record on a table. If none of the fields (alone or
combined) qualify for primary key then you can provide an additional field to do so. Here, such
primary key field id ITEM_CODE. To set a field as Primary Key, in the Design View, right click on
the left hand side gray area showing a green arrow beside the desired field and select Primary
Key option from the context menu.

Notice that an icon of a key is displayed beside the primary key field now where you had right clicked.

Note:
If you try saving the table without setting any primary key, database will
display a prompt warning you of the same and lets you decide what
action you would like to take further.

Editing Table Design


After saving the table, if you need to make any more Note:
changes in the design of the table, right click on the When you close the table Data View, records
table name in the list of tables and select Edit option entered so far are saved automatically
from the context menu or you can select the table however you can press Ctrl+S or select
and click Edit… option in Edit menu. Save Current Record option in File menu
to save the currently entered record.
Table Data View
Once the table is created, it is ready to store the
desired data. Double click on the name of the
desired table. It will open up in Data View which
allows you to key in the data on the table. Data
View displays table contents in the form of rows of
records. Each record stores the data in the
corresponding field which are displayed as named
columns. While entering the data, be careful in
entering the values as they are, avoid typing any
leading or trailing spaces unless they are really
there in values. Database will consider any extra
spaces and letters as part of the value and that
might not give you desired results when you try to
find records through a query. Item table Data
View is shown here.

150
5 Database Management System
LAB EXERCISE
Create database FLORAL GARMENTS and create table Item. Then, create table Sales as
shown here. TRANSACTION_ID is primary key in Sales table.

Create table using Table Wizard


Following are the steps to create table
using Table Wizard:
1. Click on Table object > Select Use
Wizard to Create Table in Tasks
pane.

151
Database Management System 5
2. In the Table Wizard, select a sample
table and add desired fields. Click Next
button.

3. Specify desired field properties. E.g.


EventID is Integer type and Auto
Increment value. User needs not to enter
the values for it. Click Next button.

4. Specify for automatic primary key


field or select a field to be a Primary
key. You may uncheck the checkbox
to skip creating any primary key.
Click Next button.

5. Specify a relevant, unique name to the table.


Click Finish button.

152
5 Database Management System
After the table is created, you can right click on its name and select Edit option to open it in
Design View. Here, select the field BeginTime and click on the browse (...) button of the property
Format example. In the Field Format dialog box, select Category Time and select desired time
format. Click OK. This way, you can change the formats of other fields too such as StartDate,
EndDate and EndTime etc.

LAB EXERCISE
Open database Library created earlier and create table Book with following
fields:
Field Name Field Type Size Decimal Places Other details
BookID Number 4 None Primary Key
Title Varchar 100 None
Author Varchar 100 None
Publisher Varchar 100 None
Price Decimal 4 2
Copies Number 3

Creating table using SQL Command


Besides design view and wizard, there is another powerful way of creating table which is called
SQL (pronounce “sequel”) – Structured Query Language. An SQL statement is a simple English
like set of commands and clauses which help in creating databasee objects, querying desired data
from the database, deleting data, updating data and carrying out many other tasks related with
data management and user management. You will learn about SQL in more detail in coming
sessions. SQL statement Create is used to create table by mentioning table keyword. It is used to
define the table name, field names along with their types and other constraints.
The syntax of Create Table statement is given here:

153
Database Management System 5
CREATE TABLE <table name>
(
<field name> <data type> <constraint>,
<field name> <data type> <constraint>,
<field name> <data type> <constraint>,
<field name> <data type> <constraint>
);

To open SQL Command window, go to Tool


menu > SQL option. Type the command and
click on Execute button. Any errors in the
statement will be reported in the Status textbox
otherwise the result of the statement will be
displayed in the Output text box.

CREATE TABLE “Invitation”


(
InvitationID integer primary key,
EventID integer not null,
Guest_Name Varchar(100) not null,
Donation decimal default 1000.00
)
Here, table Invitation has 4 fields. InvitationID will store unique numbers since it is declared as
primary key field. EventID will store numbers and not null means that it cannot be empty. Same is
for Guest_Name which stores strings of variable character length maximum 100. Donation will
store currency value or decimal value. If data entry in it is skipped then by default it will store
1000.00. This is ensured by using default constraint.
What is a constraint?
A constraint is a way to decide the behaviour of the fields in different ways. For example, a field
which should behave like a primary key is declared so by using primary key constraint.
Constraints are also applied to check that a valid data value is stored in a field. This way, for
various purposes, constraints can be applied on the fields to ensure that they function in a
particular way or they store valid data as specified.
Notice in the above example how the field InvitationID is declared primary key, how the fields
EventID and Guest_Name are declared not to be blank (not null) and how the field Donation must
store the value 1000.00 if user skips to enter any value in it (default value 1000.00).

154
5 Database Management System
Some common examples of field definitions with constraints in SQL
GuestID int GENERATED BY DEFAULT AS This is an auto-increment field with
IDENTITY unique values.
Refund BOOLEAN default ‘Yes’ This will store either Yes (or 1) or,
No (or 0).
Create table Invitation (EventID integer foreign key EventID of table Invitation points to
(EventID) references "School_Events"("EventID") the primary key field EventID of
table School_Events.
Create table Voter(age int, check(age >=18)) Check constraint validating applies
if age of the voter is 18 or more.

Employee_age int Check(Employee_age between 18 Checking Employee_age is in the


and 65) range of 18 and 65.

age int not null, unique(age)) Unique constraint is applied on age


to suppress duplicate values in it.

Examples of modifying table definition (ALTER TABLE Command)


Sometimes requirements change after creating the table. The table definition can be changed such
as adding/removing a field or applying/removing a constraint. This is called altering the table.
Adding new fields: Syntax : Alter table “table name” add “new field” “type” before “existing field
name”
E.g., alter table item add item_type varchar(50) before “price”.
Here, a new field item_type is added to the table item before the field price
Dropping existing fields: Syntax : Alter table “table name” drop “existing field name”.
E.g., alter table item drop sale_value
Renaming fields: Syntax: Alter table “table name” alter column “field name” rename to “new
field name”
E.g., alter table item alter column “qty” rename to “QOH”
Setting default value: Example: alter table item alter column qty set default 100
Setting NULL/NOT NULL: Example: alter table item alter column price set not null
Adding constraint: Syntax: Alter table “table name” add [CONSTRAINT “constraint name”]
constraint definition Here, giving constraint name is optional. Constraint name is useful in
dropping the constraints.
E.g., alter table item constraint “chk_qty” add check(qty > 0)
Dropping constraint: Syntax: Alter table “table name” drop CONSTRAINT “constraint name”
E.g., alter table item drop constraint “chk_qty”
Renaming table: Example: alter table “item” rename to “item_master”
Dropping table: Example: drop table item

155
Database Management System 5
LAB EXERCISE
A. Delete the table Book created earlier and create it by giving SQL command.
Then, fill the following data in it as shown here.
BookID Title Author Publisher Price Copies
------------------------------------------------------------------------------------------------------------------------------
100 Eye of the Needle Ken Follet Rupa 545 5
101 The Firm John Grisham DigiMedia 399 2
102 The Third Twin Ken Follet Rupa 400 2
103 Clear and Present Danger Tom Clancy Rupa 760 1
104 The Innocent Man John Grisham DigiMedia 324 3
105 The Hunt for Red October Tom Clancy DigiMedia 575 2
Apply following constraints:
¤ Book ID is primary key.
¤ Title should be unique.
¤ Title, author and publisher cannot be blank.
¤ Price should not be 0.
¤ Copies should be by default 2.
B. Create a table Employee to store Employee code (PK), Employee Name, Date
of birth, date of joining, basic salary, gender and city of posting.
¤ Add a field Contact_Number Varchar(15).
¤ Rename the fields for Employee code and employee name to emp_code and
emp_name.
¤ Add a constraint to basic salary to check that it should be at least 1000.
¤ Set default date of joining as today’s date.
¤ Rename the table to Employee_Master.

Edit, delete, sort data in table


For editing data in the table, open it in Data view and insert data as shown here.

156
5 Database Management System
To sort the data on the basis of any field, select the field and click on Sort Ascending or Sort
Descending buttons on Table Data toolbar.

Note that data is sorted in ascending order of BeginDate field values.

To delete a record, simply select it and select Delete Record option in Edit menu.

157
Database Management System 5
Session-6 Relationships and Referential Integrity
Real life databases store the data in more than one table for easier management of data. The tables
are related on the basis of primary key fields and foreign keys to retrieve the data from them.
Managing data in multiple tables raises the need of maintaining accurate and consistent data. For
example, if a business deals in selling 5 items then in sales table no record for a non-existent item
should be accepted or if a record in parent table is deleted then the related records in child tables
should also be deleted. This concept is called referential integrity.
Referential Integrity
Referential integrity is the concept to ensure that accurate and consistent data is maintained in the
database tables which are related.
In Base, referential integrity addresses following 3 aspects:
a. Value entered in foreign key in child table must match a primary key value in the parent table.
b. Any update in the key of the parent table will automatically update the matching values in
child table. This is called Update cascade.
c. Any delete operation on a record in the parent table will automatically delete the matching
records in child table. This is called Delete cascade.
Types of Relationship
Relationships between the two tables can be of 3 types:
1. One to many 2. One to one 3. Many to many
One to Many Relationship: This means one record in one table has many matching records in the
other related table. One is denoted by number 1 and Many is denoted by infinite (∞) sign.
For example, an author can write many books.

Author
1
writes ∞ Book

One to One Relationship: This means one record in one table has exactly one matching record
in the other related table. For example, in a school library, one book can be issued to a student at
a time.

1 can be 1
Book issued to Student

Many to Many Relationship: This means multiple records in one table have many matching
records in the other related table. For example, in a college, many students are pursuing many
courses.

∞ can ∞
Student pursue Course

158
5 Database Management System
Steps to Set up Relationship Between the Tables
1. In Tools menu, click Relationships option.
2. In the Add Tables popup, select the tables and click Add
button one-by-one to add desired tables to Relationship
Design View.

3. In the table structures, drag desired matching field from one table and drop it to the matching
field of the other. The relationship is established and denoted by a thread.

4. Right click on the relationship


thread and select Delete to
remove the relationship or
Edit to make further changes
in the relationship.

159
Database Management System 5
5. In Relations popup, specify desired update and
delete options and click OK. Here, Update cascade
and Delete cascade are selected.

Let us check the relationship. Below is master table Item.

Below, in the table Sales, Item_Code J015 does not exist in related table Item, so an Integrity
constraint violation error is displayed indicating J015 is not found in parent table.

LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Relate the two tables so that for any update and delete in table Furniture, update
cascade and Delete cascade occur in Sales table.
Test the relationship by entering sample data and performing updates and deletions.

Session-7 Create and Manage Queries


Basically, queries are used to access conditional data from tables. It is very difficult to extract data
from the table without a query.
Using query, we can request for data of our choice. It is also used to answer questions to perform
calculations, combine data from different tables, or to add, change or delete table data.

160
5 Database Management System
Create query using Query Wizard
To create query using Query Wizard, following are the steps by example.

1. Select Query object and click on Use Wizard to


Create Query option in Tasks pane.

2. Select the desired table in


first step of Query Wizard
and add desired fields in
the query. Click Next
button.

3. Select the fields on


which you may want to
get the data sorted. For
example, sort ascending
on item type and sort
descending on item
price. Click Next button.

161
Database Management System 5
4. Specify the search conditions
such as price smaller than
1000.
Match all of the following
option filters records that
satisfy all of the multiple
conditions.
Match any of the following
option filters records that
satisfy any of the multiple
conditions.
Click Next button.

5. Specify if you need to display


all the records filtered out by
query or only the summary of
the data. Summary is created
by selecting the aggregate
function to apply on the
selected field. E.g., average of
price.
Here, we shall select Detailed
query radio button.
Click Next button.

6. Enter the names of the fields which


should be displayed in your query.
Here, field names are taken as alias
names. Click Next button.

162
5 Database Management System
7. Specify a relevant name to the query.
Click Finish button.
The query will be created by the
specified name. You can double click
on the name to run the query and
display the output of the query.
Fo example, the result of the query
Item_with_price_1K_or_less is sown
here.

LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Create a query to display the names of those furniture items whose quantity more than
100 is sold before January 1. Enter some sample data that matches the criteria.

Create query using Query Design View

Design View gives better control over designing a query.


1. Click on Queries object and select Create Query in Design View option in Tasks pane and
add desired table.

163
Database Management System 5
2. From the table structure (field list),
drag-drop desired fields which
you need to show in the query
output into the Field section.
Alias is display name of the field
which can be changed optionally.
Specify sort order in the Sort
section exactly below the desired
field.
In Visible section, uncheck the
boxes for the fields you do not
need to show on the query result.
In Criterion section, specify the
record filter criteria.
Once done, close query design
and save the query with a relevant
name.

Criteria on multiple fields


For multiple criteria, mention the
desired criteria in Criterion section
below desired field. To specify if all the
conditions should be true then keep the
criteria in the Criterion section. For
having any of the conditions to be true,
put them in Or sections as shown here.
For example, this query design view
shows query that should display details
of the jackets of sizes ‘L’, ‘XL’ or ‘32' and
whose price id 1000 or more. The
output is given here.

Note:
It is possible sometimes that none of the records in the table satisfy any of the criteria given in
the query. In this case, query will show zero records or blank output.

BETWEEN Operator
Between operator is used to specify a range of numeric or date values. For example, for a field
named age the range of age from 25 to 60 can be specified as Between 25 and 60.

164
5 Database Management System
LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Create a query to display the names and SaleDate of those furniture items whose quantity
between 10 and 50 is sold on Feb 5. Enter some sample data that matches the criteria.

Wildcards
Wildcards are a shortcut way to specify value patterns that are shared by multiple values in a table.
For example, you may need to display the records of all the students whose names begin with
letter 'R' or those having letters 'sh' in their names. Or, you may need to list records of those student
whose names have exactly 5 letters.
To specify wildcard patterns, LIKE operator is used. There are 2 wildcards: * and ?.
* : This symbol means any number of occurrences of any letter.
? : This symbol means exactly one letter.

As shown here, LIKE 'J????' means values in field


ITEM_NAME beginning with letter 'J' followed by
exactly 4 letters. This matches with values JEANS.

In this example, LIKE '*L*' means values in


field ITEM_PRICE having letter anywhere.
This matches with the values PARALLEL,
WOOLEN and LEATHER.

Other example are LIKE 'D*' means values starting with letter D, LIKE ‘*N’ means values ending
with letter N.

165
Database Management System 5
LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Create a query to display the following:
i. All the details of furniture items who have exactly 5 letters in their name.
ii. All the details of furniture items whose names contain letter ‘A’.
iii. All the details of furniture items whose names begin with letter ‘T’ and letter ‘E’.
iv. All the details of furniture items whose names either contain letter ‘H’ or ‘P’.

Perform calculations
Queries can store formulas based on the fields to perform calculations. When query executes, the
formula is executed and displayed as an additional field but it is not saved in the table. Such fields are
called calculated fields. To perform calculations in a query, in Design View, these are the steps:
In the Field section, specify the formula. Enter an Alias name for the formula. For example, if
table Item has field PRICE and table Sales has field QTY_SOLD then the sale_value can be
calculated as PRICE * QTY_SOLD in Field section. Another example is to calculate discount of
10% on PRICE as PRICE * 0.10.
Let us calculate sale_value as Item.PRICE * Sales.QTY_SOLD.

.One more scenario could be where we wish to know how many days before an item was sold. To
calculate differences between dates, DateDiff() is used. It takes 3 arguments:
First argument is a defined value for taking difference on the basis of year, month or day.
Smaller or earlier date.
Larger or later date.
For example,
DATEDIFF(‘DAY’, SALE_DATE, TODAY) takes difference of ‘days’ between current system
date and sale_date values. Note that in Alias section, the name of the calculated field is
mentioned as DAYS_SOLD_BEFORE. If we assume that current system date is October 30, 2022
then the output of the query is given here.

166
5 Database Management System
Difference of days taken on 30/10/22 between TODAY and
SALE_DATE displayed as alias DAYS_SOLD_BEFORE

LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name and Furniture
Price. Create another table Sales table to store FurnitureID, SaleDate and SaleQuantity.
Create a query to calculate and display Sale Amount by multiplying SaleQuantity with
Furniture Price. [Hint: Precede field name with table name such as Furniture.Price *
Sales.SaleQuantity]

Grouping data
Many times it is required that calculations are done on the basis of a data group. For example,
calculating total price of JEANS and JACKETS separately, or calculating average price sale qualityt
of all items, or calculating total of sale made in each region, or counting how may employees are
there in each department.
To do so, in query design, we need to select keyword Group in the
Function section of that field which is used for grouping. Then, we
select suitable aggregate function in the Function section of that
field on which calculation needs to be done. COUNT, SUM,
AVERAGE etc. are aggregate functions because they perform
calculation on a group of multiple values.
In the example given here, garments are grouped on the basis of
item names (JACKET, JEANS) and SUM function is applied on the
field PRICE. Thus, total prices of jeans and jackets will be
displayed. Compare the output with table data. TOTAL_VALUE is
the Alias name given to the calculated field.

SUM of PRICE (alias TOTAL_VALUE)


Actual data in the table Item grouped by ITEM_NAME

167
Database Management System 5
LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name, Furniture Material
and Furniture Price. Furniture Material can be Wood, Plastic or Metal. Create another
table Sales table to store FurnitureID, SaleDate and SaleQuantity.
i. Create a query to display total furniture price Furniture-Material-wise.
ii. Create a query to display total sale amount (price * sale quantity) Furniture-Material-
wise.

Editing query
To edit the query, right click on it and select Edit option.

Session-8 Structured Query Language


Some RDBMS like MS Access, Base etc. provide graphical interface to design a query while others
do not. Besides design view, there is another powerful way of querying for data from the database
and that is called SQL (pronounce “sequel”) – Structured Query Language. An SQL statement is a
simple English like set of commands and clauses which help in querying desired data from the
database.
SQL Command: It is a keyword that denotes the action to be performed on the desired table like
CREATE (to create database objects like tables), SELECT (to query data), UPDATE (for data
modification) and DELETE (to remove data)
SQL Clause: It is a keyword that is used along with SQL command to define the scope of the SQL
Command and to determine in which order the data should be displayed in output. E.g., where (to
filter records on the basis of condition(s), order by (to sort the output) group by etc.
Example of SELECT command without any clause:
SELECT ITEM_CODE, ITEM_NAME, PRICE from Item;
Here, item code, name and price of all the items will be displayed.
SELECT * from Item where price > 100;
Here, where is a clause that mentions a condition for the records.
Creating Query in SQL View Using SELECT Note:
The structural syntax of SELECT command is as follows: An SQL statement can be written without
Select<comma separated fields list> any line breaks. Here, line breaks are
given easier clarity of the concept and
from<comma separated table names>
make the SQL statement easily readable.
where<condition> and/or <condition>....
order by<field name on which output to be sorted><ASC/ DESC>
where and order by clauses are optional unless you need them.

Select Create query in SQL view option in the tasks of Query object. In SQL View, type:
SELECT *from Item;. Press F5 or Run SQL command directly button in SQL toolbar.

168
5 Database Management System
The interface with the SQL
statement and with the output
will look like this:

Note:
SQL is not case sensitive in typing the commands but field
names should be typed in exact the case they have been
created in the table.

Let us try some more SQL statements:


Display selective fields from the table
This statement displays, item code, name and
price of all the records in the table.
Select ITEM_CODE, ITEM_NAME, PRICE
from Item;

Display selective fields on the basis of a


criteria (condition)

Let us display item names, size, type and price


of those items whose price is more than 800.
Select ITEM_NAME, ITEM_SIZE,
ITEM_TYPE, PRICE
from Item
where PRICE > 800;

Let us display the size and type of all the jeans in


our store.
Select ITEM_NAME, ITEM_SIZE, ITEM_TYPE
from Item
where ITEM_NAME='JEANS'

Note:
1. Text values in condition should be enclosed in single quote, not double quotes.
2. Data value are compared with case sensitivity. Here, JEANS will not match with 'jeans' or 'Jeans' etc.

169
Database Management System 5
Sorting Output
Output of the query result can be sorted in ascending or descending order,on the basis of one or
more fields.
Let us display the output of above SQL
statement in the descending order of price.
Select ITEM_NAME, ITEM_SIZE,
ITEM_TYPE, PRICE
from Item
where PRICE > 800
order by PRICE Desc

Note:
Default sort order is ascending (keyword Asc)

Performing Calculations on Fields


It is a usual practice to not to store those values in the tables which can be calculated. For
example, percentage of some amount. The reason behind such practice is that SQL allows creating
simple formulas and apply some aggregate functions on the fields to calculate values.
Let us understand this with an example. In the table Item, calculations can be performed on the
field PRICE. Let us calculate 10% discount on the price for all the items.
Select ITEM_NAME, PRICE, PRICE * 0.1
from Item
Here, PRICE * 0.1 is the calculation done on the
field PRICE.
Notice that title of the calculation is showing the
formula in the query output. We can give it an alias
name by modifying the statement by using as
keyword followed by the alias name.
Select ITEM_NAME, PRICE, PRICE * 0.1 as
DISCOUNT
from Item
DISCOUNT is just an alias name or calculated field.
It does not exist in the table actually.

170
5 Database Management System
Following SQL statement displays price after discount along with all item details.
Select Item.*, PRICE * 0.1 as DISCOUNT, PRICE - (PRICE * 0.1) as
PRICE_AFTER_DISCOUNT
from Item
Here, notice Item.* in select command. Here, dot (.) is used as an operator to specify * as all the
fields in the table named Item. This is necessary here because * is also used as arithmetic operator
for multiplication in the formulas. Item.* tells the application that this * is not arithmetic operator.

Following SQL statement displays


projected price next year for only
jackets as 12.5% more.
Select Item.*, PRICE + (PRICE *
0.125) as PROJECTED_PRICE
from Item
where ITEM_NAME = ‘JACKET’

Assuming that a table Marks has fields eng, math and IT which store marks in the corresponding
subjects out of 100. Then total marks can be calculated using + operator with field names to be added:
Select (eng + math + IT) as total
from Marks
This way, using arithmetic operators, calculations can be performed on the fields by creating a formula
depending on the requirements.
Applying Aggregate Functions on the Fields
Sometimes we need to perform calculations on a
set of values in a field. For example, calculating total
price of all the items. This is done by using built-in
aggregate functions. They are called aggregate
functions because they perform calculations on a
set of values at a time. See these examples. SUM() applied on field PRICE

171
Database Management System 5
Here, SUM() is returning the total of all values in the field PRICE. Aggregate functions have a set of
parentheses in which the name of the field is passed.
Here, group by clause is used to
calculate SUM of PRICE on unique
values in the field ITEM_NAME (i.e.
JEANS and JACKET).
Some common aggregate
functions are SUM, AVG, MAX,
MIN and COUNT
SUM of PRICE grouped on ITEM_NAME

Ÿ SUM() returns the total of the set of given values.


Ÿ AVG() returns the average of the set of given values.
Ÿ MAX() and MIN() return greatest and smallest value of the set of given values respectively.
Ÿ COUNT() applies to non-numeric fields also to return their count.

Inserting and Modifying Data in the Table


Using SQL, you can insert new records in the table, delete and update (modify) the existing
records in the table.
To modify data in the table, you need SQL Statement Execution tool. To open it, select SQL
option in Tools menu. Execute SQL Statement dialog box will popup.
Type the statement in Command to Execute box and click on Execute button.
Inserting New Records
SQL syntax for inserting new records in the table is:
Insert into “<table name>” (comma separated list of fields)
Values (comma separated list of values)

Note:
1. The table name should be in double quotes.
2. The sequence of fields and that of values should
be same.
3. Non numeric values need to be enclosed in
single quotes.

Let us add details of a new woolen jacket in the table


Item.
Insert into "Item" (ITEM_CODE, ITEM_NAME,
ITEM_SIZE, ITEM_TYPE, PRICE)
values('J012','JACKET','28','WOOLEN',8500);

Deleting Records
Deleting records is a very sensitive issue and should be dealt with care. Always consider before hitting
Execute button if you really need to delete the intended records. Delete statement should generally have
some condition associated with it otherwise all the records in the table will be deleted.

172
5 Database Management System
The syntax of Delete statement is:
Delete from <table name>
Where <criteria>
Let us delete all the items which have price less than 700.
Delete from “Item” where PRICE < 700;
Updating Records
Updating records is a also very sensitive issue and should be dealt with care. Always consider before
hitting Execute button if you really need to update the intended records. Update statement should
generally have some condition associated with it otherwise all the records in the table will be
updated with the given same value.
Update is used to make changes in the data values of existing records.
The syntax for update statement is:
Update “<table name>”
Set “<field_name>” = '<value> or <formula>'
Where <criteria>
Let us increase the price of STRETCH type jeans by 5%.
update "Item"
set "PRICE" = PRICE + (PRICE * 0.05)
where "ITEM_TYPE"='STRETCH';

LAB EXERCISE
A. Table Book is given here.
Book ID Title Author Publisher Price Copies
------------------------------------------------------------------------------------------------------------------------------------
100 Eye of the Needle Ken Follet Rupa 545 5
101 The Firm John Grisham DigiMedia 399 2
102 The Third Twin Ken Follet Rupa 400 2
103 Clear and Present Danger Tom Clancy Rupa 760 1
104 The Innocent Man John Grisham DigiMedia 324 3
105 The Hunt for Red October Tom Clancy DigiMedia 575 2
To work on the table Book issue SQL commands to find out the following:
1. List all the details of all the books.

173
Database Management System 5
2. Display title, publisher and price of all the books.
3. Display title, author and price of all the books whose price is less than 400.
4. Who are the authors whom 'Rupa' publication has published?
5. What are the prices of the books written by ‘Tom Clancy’?
6. List details of all the books in descending order of Price.
7. Display the names of the authors with book titles in ascending order of Price.
8. Refer to question 4 and display the output sorted on Book Title.
9. Which books and their authors are published by 'DigiMedia'?
10.What are the titles and prices of books whose more than 2 copies are there in
library.
11. Who has written which books cheaper than 300.
12. Here, BookID is primary key. Why not any other field is considered as primary
key? Explain briefly.
B. Change the price of Book number 5 to 430.
C. Delete the all the book which are priced higher than 400.
D. Deleted the books which have just 1 copy in the library.
E. Write the SQL Statement to create the table Tea as described below.
Tea_Code A number to identify each tea flavour
Tea_Flavour Stores name of the flavour such as Ginger, Lemon, Honey etc.
Size Size is Large, Medium, Small
Sugar_Type Sugar, Sugar free
Price A value with two decimal places
In the above table, which field should be the primary key and why?
F. Write the SQL Statement to create the table Flight as described below.
Sector For example, KOL-DEL, DEL-BAN, CHN-DEL etc.
Date Date of flight
Day1 3 letter weekday name
Day2 3 letter weekday name
Day3 3 letter weekday name
Capacity number of seats
In the above table, which field should be the primary key? Why?/Why not? Suggest a
remedy also if why not.

Session-9 Building Forms


A Form is a database object that can be used to create a user interface for the database. With the
help of 'forms', you can enter, view and change data in an easy manner. A form is an interface
between the user and the underlying table whose layout is defined by the user for working
conveniently with the data stored on the table. A Form is a collection of buttons, text boxes and
labels. These are also known as controls. Let us create a Form for the table Item.

174
5 Database Management System
Creating Form with Form Wizard
A form can be created in two ways - Using Form Design
View and Using Form Wizard.
Here, we shall learn to use Form Wizard.

1. Click on the category Forms in Database pane


and then select Use Wizard to Create Form…
option in the Tasks pane.

2. In the Form Wizard dialog


box, do the following:
a. i.) Select the desired table
from the Table or
queries drop-down.
Using Shift key, select
all the fields in the
table that you need to
add to the form.
ii.) T h e n c l i c k o n >
button. You can click
also on >> button to
add all the fields at
once in the form.
Then, click Next.

b) Next step allows you to


insert an already existing
form in the form being
created. We do not need
this step here, so simply
click Next.
c) Select the arrangement
of the controls in the
Form and click Next.

175
Database Management System 5
d) Select the data entry mode either to
enter only new records and not to
display the records already entered in
the table or to display all the records.
Here, you can also select to disallow
modification and deletion of existing
data and entry of new data. Let us
select to display all data with every
action allowed. Then, click Next.

e) Select any display style for the


Form and click Next.

3. Specify a name for the form. In our


example, it can be named as
Item_Form. You can decide to use
the form as it is created or to format
the look of the form in the form
editor. Let us select Work with the
form option and click Finish.

176
5 Database Management System
Navigating Form and Searching Records
Once form is opened in the working mode, you can use the Previous/ Next/ First/ Last Record buttons
in the Form Navigation toolbar. If it is not visible, select it from Toolbars submenu under View
menu.

Short cut
Previous Record: Ctrl + Alt + Left arrow Next Record: Ctrl + Alt + Right arrow
First Record: Ctrl + Alt + Home Last Record: Ctrl + Alt + End
To skip to a blank record for entering new data values, click on New Record button on this
toolbar.

Enter a new record in the table through this


form as shown here.
Close the form. Closing it will automatically save
the changes and newly added records in the
underlying table. You can also click on Save
record button in the toolbar.
Open the table Item and you will find the newly
added record in it.

LAB EXERCISE
A. For table Book created in previous session create:
1. A form named View_Books only to view the records.
2. A form named Add_Books only to add records of new books in the table. Delete
and update should not be allowed through this form.
3. A form named Modify_Books only to modify existing records of books in the
table. New entry and delete should not be allowed through this form.
B. Open these three forms and test if they are working as desired.

Delete records using Forms


To delete the current record, click on Delete Record button on the Navigation bar of the form.

177
Database Management System 5
Editing Form
Once a form is created using wizard, to edit it, right click on it and select Edit. The form will open
in Form Design View. Using design view, a new form can also be created from scratch. Form
contains 3 types of controls:
Data Controls: These controls are bound with a field in the concerned table and they
display the data value of that field.
Calculated Controls: These controls store formulas and functions for calculations. They
are not bound with any field in the table.
Design Controls: These controls are used in giving desired
look to the form and to organise controls over the form. For
example, line, rectangle, group box etc.
To open a form for editing, right click on the name of the form and select
Edit option.

Understanding Form Properties


If you right click on any form control and
select Form Properties
o p t i o n , t h e n Fo r m
Properties pane is
displayed. It shows the
properties related to the
data in the table such as
Content type, Content,
Sort, etc., event handling properties useful for
programming and macros. It also shows general form
properties such as Name of the form.
Understanding Control Properties
Once form is opened in the Design View, you can
display the properties of a control by double clicking
on it or by clicking Control button on the Control
toolbar. Usually, when you edit a form created by
wizard, the label and text box are grouped together. You
can right click on them and select Ungroup. Now,
their properties can be displayed separately. In the
following example, properties of a Textbox control
txtITEM_CODE are displayed such as Enabled
property is set to Yes means, value in this control can
be edited or clicked by user, Label Field property is
bound with the field ITEM_CODE in the Item table.
So, it is a bound control.

178
5 Database Management System
Setting Properties of the Controls
Binding a control with a field in a table
¤ In the Form Properties box, Content property of a control allows to select the desired table,
query or SQL command whose data that control should display. To select the desired table,
you must select Table in its Content type property.
¤ Once table is selected, right click on the control and select Control Properties. Here, go to
Data tab and select the desired field in the Data field property drop-down.

Creating a Lookup List


Many times, in a child table we need to enter a value which must present in the master (parent) table.
For example, when an item is sold then, in Sales table we must enter item code that is present in Item
table. For this purpose we can create a list in the Form created for child table in which values come
from the parent table. Such list is called lookup list. Here, the Form is created for Sales table and for its
field ITEM_CODE, the values are listed from Item table. To achieve this, first draw a List Box control
from the Control Toolbox then set the properties like this:
¤ Form properties:
Content type: Table
Content: Sales
¤ Control properties (Data tab):
Data Field: ITEM_CODE
Type of list contents: Table
List content: Item
When you save and open this form,
notice the 5th record shows J003
highlighted because that is the code
stored in Sales table in 5th record but
all 13 item codes are listed from Item
table. So, the user can only select item
code from these codes while adding a
new record. This ensures data
integrity as no non-existent item code
will be entered in Sales table.

179
Database Management System 5
General Control Properties
Right click on the desired control and select Control Properties. In the properties box, various
properties are there.
General Properties
¤ Name: Unique name given to the control.
¤ Enabled (Yes/No): If no, disables the control.
¤ Visible (Yes/No): If no, hides the control.
¤ Background color: Sets backgorund colour of the control.
¤ Border: Sets border to flat or 3D look.
¤ Max text length: Sets maximum number of characters to enter in a Text Box.
¤ Text type: Single or multi-line text.
¤ Password character: Character to display in place of letters in a password text box.
Changing a Label Background
Right click on the Label control and select
Control Properties. In the properties box, go
to General tab. Scroll down to Background
color property drop-down and select the
desired colour from the colour box as shown
here.

Form Controls Bar


Form Controls Bar contains the
common controls which can be
added on the form or can be used to design the form as desired.
Here, common form controls are shown.

180
5 Database Management System
LAB EXERCISE
Create a master table Furniture to store FurnitureID, Furniture Name, Furniture Material,
Furniture Price and Out of Stock. Furniture Material can be Wood, Plastic or Metal. Design
a new Form using Form Design View. Keep FurnitureID non editable assuming that it is an
autoincrement value. Furniture Material should be a List Box. Out of Stock should be a
Check Box, checked means Yes otherwise No.
At the top of the form display a big title: FURNITURE DATA ENTRY SCREEN
Perform some colour and font settings also on the controls to make the form look formally
appealing.

Session-10 Design Reports


A report isused to present the data formally and can be used to print. It is a logical combination of
all the raw facts of the database and presents the result with a visual meaning. Reports present a
comprehensive summary of the data stored in the database. Reports help in analysing the data and
making decisions.
Different Sections of Report
The Header Section is the top most section of the report. Report headers usually contain titles and
logos. Page headers usually contain column headings.
The Details Section is the body of the report which contains the main data. All reports must have a
detail section.
The Footer Section can appear in several places. You can create page footers that appear at the
bottom of each report page and display elements such as page numbers.
The header and footer sections are optional.
Sample report shown here is grouped on ITEM_NAME and ITEM_TYPE. It is made on a query that
calculates SALES AMOUNT as PRICE * QTY_SOLD

181
Database Management System 5
If you don't want to group the data, you don't need to group headers or footers. However, make
sure that your reports contain enough information to make them meaningful and easy to
understand.
Creating Report
1. Click on the category Reports in Database pane and select
Use Wizard to Create Report… option in the Tasks pane.

In the Report Wizard:


2. From Tables or queries drop-
down, select the desired table or
query (In our example, let us select
query Sales Query1), add the desired
fields to the Fields in report list and
click Next.

3. If you wish, change the labels of the fields


into more readable forms as shown here.
Then click Next.

4. Select the fields to group the records on


it by selecting the desired fields and
clicking on > button. Here, ITEM_NAME
and ITEM_TYPE are taken for grouping.
Click Next.

182
5 Database Management System
5. You can sort the report output on
the basis of one or more fields.
Select the fields on which report
data should be sorted in ascending
or descending order. Here, data is
sorted in ascending order of
ITEM_NAME, ITEM_TYPE and
PRICE. Click Next.

6. Choose a report layout and page


orientation. Then, click Next.

7. Specify the Title of report as shown


here along with Dynamic Report
option under which, select Create
report now option. Finally, click
Finish.
Dynamic report means every time the
report is generated, it will be refreshed with
updated data from the source table/query.

Another sample report is shown here. Its header has title, details section has report data. The
report is grouped on item type and sorted on item name, size and price.

183
Database Management System 5
LAB EXERCISE
A. Create a report named FURNITURE SALES listing FurnitureID, Furniture
Name, Furniture Material, Furniture Price, Sale Quantity and Sale Amount
as Price * Quantity. You need to create a query on which report must be
created. Give the alias name SALE AMOUNT to the calculated field Price *
Quantity.
B. Practice creating various reports on the tables created in earlier sessions.
C. Practice Section D of Assessment in lab.

184
5 Database Management System
Unit
Web Applications
4 and Security

Session-1 Accessibility Options in Windows


Computer Accessibility refers to the user friendliness of a computer system for all, regardless of
their disability. This is mainly a software issue. How ever, when a combination of hardware and
software, it enables a person with a disability or impairment to use a computer. It is known as
Assistive Technology.
In this session, you will learn about the basic accessibility options available on your computer.
There are numerous types of impairment that impact computer usage. These include:
¤ Cognitive impairments and learning disabilities, such as dyslexia, attention deficit-hyperactivity
disorder (ADHD) or autism.
¤ Visual impairment such as low- vision, complete or partial blindness, and color blindness.
¤ Hearing impairment including deafness.
¤ Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and
repetitive strain injury.
Windows 7 includes accessibility options and programs that make it easier to see, hear, and use
your computer.
Launching Accessibility Options
Steps to launch accessibility options in Windows 7 are as below:
¤ Click on Start.
¤ Click on Control Panel.
¤ Click the Ease of Access link.
¤ Click Ease of Access Center link.

Setting up Keyboard Access


Click Make the keyboard easier to use in the Ease of Access
Center.
Turn on Mouse Keys checkbox to allow the user make use of arrow
keys on the numeric keypad to move the keys on screen and Enter key
to click. For example, user can press top arrow and left arrow key to
move mouse pointer diagonally upwards towards left side.
Turn on Sticky Keys checkbox allows user to keep the key active when
it is pressed once and when any other key is pressed then it is processed

190
5 Web Applications and Security
by the computer with the currently active key. For example, if user has pressed Window key on the
keyboard then it will remain active. Now, if user clicks only letter E then it will ne interpreted as
Windows+E and Windows Explorer will open up.
Once enabled, sticky keys icon will appear in the system tray.
Turn on Toggle Keys checkbox allows user to hear an alert sound every time a key like caps lock,
num lock etc. is pressed.
Turn on Filter Keys check box, when selected, makes keyboard ignore rapidly repeated or long
pressed key to avoid repeated typing of the same key thereby helping people who type with
trembling hand.
Text or Visual Alternatives to Sound
People with hearing impairment have great use to this feature where they can see the visual
feedback or cues on the screen instead of sound.
Click on Use text or visual alternatives for sounds in Ease of Access Center.
or Turn on visual notifications for
sounds (Sound Sentry) option replaces
system sounds with visual warnings like
flashing caption bar of active window,
flashing the active window itself and flash
desktop. Select the desired visual warning.
Any sound that reads the screen can be
turned into text caption that appear on the
screen by checking Turn on text
captions for spoken dialog checkbox.
Make the Computer Easier to See
In Ease of Access Center, click Make the computer easier to see link.
Choose a High Contrast Theme: Select the option to turn high contrast on/ off by pressing left
Shift + left Alt and Print Screen keys. This lets visually challenged people see screen
comparatively clearly.
Turn on Narrator option allows read aloud of any text on
the screen and Turn on Audio Description option lets
visually impaired person hear descriptions of what is
happening in any videos.
Turn on Magnifier option lets user move mouse pointer
on the screen and see the objects larger in size. This mode is
called lens mode. In docked mode a portion of the screen
can be left magnified and rest of the screen remains normal.
This portion can be changed as required. Full screen
mode magnifies whole screen. Lens size, focus area, zoom
level etc. can be set by the user.
Set the thickness of the blinking cursor option makes
blinking cursor thicker and larger to see them easily.

191
Web Applications and Security 5
Make the Mouse Easier to Use
In Ease of Access Center, click Make the mouse keys
easier to use link.
Here, you can change the colour and size of mouse
pointers. You can turn on mouse keys of numeric keypad.
You can set option to activate any window just by bringing
mouse pointer over it instead of having to click it.

LAB EXERCISE
1. Enable mouse keys on numeric keypad and test them to move mouse pointer on
screen. Try opening a file using it.
2. Enable sticky keys then open any word processor and type some text. Now press Ctrl
key and leave it. Then press other keys like A, C followed by V, P and observe what
happens. These letters must make combination of command shortcuts Ctrl+A,
Ctrl+C, Ctrl+V and Ctrl+P.
3. Open notepad and turn on Filter Key option. Now practice typing letters with brief
pauses. Observe how the repeated strokes of same letter are ignored.
4. Enable toggle keys option and test them by pressing them on the keyboard.
5. Turn on Sound Sentry and open notepad. In notepad open Print dialog box and then
try clicking in the notepad. Observe how it gives visual warning.
6. Try out various settings of Magnifier and see how screen looks like in various modes
of magnifier.
7. Try out mouse ease of access options by changing cursor colours and size.

Supplement: Accessibility Options in Ubuntu


The Universal Access icon of a man in the Top
bar refers to the accessibility options in Ubuntu. You
can click on System Settings in Side bar to go to
Universal Access.
Universal Access has 4 tabs namely:
¤ Seeing
¤ Hearing
¤ Typing
¤ Pointing and Clicking

192
5 Web Applications and Security
Note:
Universal Access can also be opened by pressing Super key to switch to Activities Overview mode
and typing Accessibility.

Seeing
This section provides visual settings such as
contrast settings, text size, zoom, enabling screen
reader and sounds for keys like Num and Caps
lock. User can set the screen contrast and text size
as needed. User can enable/disable zoom feature.

Hearing
This section allows the user to set up a visual
indicator on the screen when system produces a
sound alert. Users with hearing impairment may
not hear the sound so they can see the flashing
Title bar of the opened window or entire screen
flashes. User can select a suitable option.
Typing
This section allows the user to
enable/disable onscreen keyboard
Typing Assistant for touch screens,
Sticky keys that allow user to keep the
modifier key (Shift, Ctrl etc.) active
when it is pressed, Slow keys which
allow setting up a time delay between
the key press and its acceptance by the
computer. This is good for elderly
person or anyone who tends to have
slower typing speed and Bounce keys
that set up the delay between the
repeated press of a key to avoid
accidental duplicate typing of a key.
Pointing and Clicking
This section allows user to enable keyboard arrow keys on the numeric keypad to be used as
Mouse Keys and move the mouse pointer on the screen. Simulated Secondary Click can be
enabled to set a time delay for how long the left mouse button should be pressed to be accepted
as right click. Hover Click option can be enabled to trigger mouse click just by bringing the
mouse pointer over the desired option or object. The time delay and motion threshold can be set
for this.

193
Web Applications and Security 5
Accessibility feature refers to the assistance in the following impairments:
Visual impairments: Poor or low vision and blindness are assisted by the screen readers,
contrast settings, changing text size, magnifying or zooming parts of screen and by blinking the
cursor while typing.
Hearing impairments: These is assisted by visuals on the screen by flashing window Title bar or
the whole screen.
Mobility impairments: These are assisted by mouse speed, using keyboard as mouse, adjusting
click speed, simulating right click with left button, click by hovering, setting slow keys, bounce keys
and sticky keys, setting repeated key press delay, on-screen keyboard and navigating applications
by keyboard.

Orca Screen Reader Brief Overview


Orca is a free. open source screen reader utility. Orca provides access to the graphical interface
through speech synthesis and braille for visually impaired.
Orca can read aloud the user interface.
To enable/disable Orca, press Super + Alt + S.
To access Orca Preferences, press Insert + Spacebar. Orca preferences
window will open up. You can also click on Preferences button on Orca
Screen Reader main window.

Orca Preferences
Orca preferences dialog box can be used to setup Orca utility. In the Speech tab you can enable
speech by selecting Speech system as GNOME speech services, Speech synthesizer, Voice settings
and Human voices. You can also set the Rate, Pitch and Volume of the speech. To enable/disable
speech you can also press Insert + S after Orca is enabled.

194
5 Web Applications and Security
If you need to display the Orca preferences for any currently opened application then press Ctrl +
Insert + Spacebar.
To learn the commands to use Orca, first enable Orca and then enter the learning mode by
pressing Insert + H. Now, press keys on the keyboard, Orca will read aloud the key name and the
commands associated with that key. To come out of learning mode, press Esc key.
You can refer to https://help.gnome.org/users/orca/stable/commands_reading.html.en to explore
about Orca reading commands.
Go to https://help.gnome.org/users/orca/stable/commands_structural_navigation.html.en to explore
Orca navigation commands.

LAB EXERCISE
Try out the lab activities given in the previous lab exercise for Windows. Explore
Ubuntu features to do them.

Session-2 Networking Fundamentals


Computers, when connected with each other, through a communication medium form a network.
The purpose of connecting computers to form a network is to share the data, services and various
resources. For instance, one printer connected with a computer can be accessed for printing by
other computers on the network or a file can be copied from one computer to another without
having the need of sharable media like disks or pen drives. Communication medium can be as
simple as cables or advanced as wireless and satellites.
On the basis of architecture, networks are of 2 types- Peer-to-peer and Client-Server.
In peer-to-peer network, computers are equipped with similar processing power and share
information and resources with each other. There is no specifically designated computer that is the
source of all data and services.

195
Web Applications and Security 5
In Client-Server network computers which are
dedicated to provided services and access to resources
are called Servers and computers that access these
services and resources over the network from the
servers are called Clients. Depending on the service
they provide, servers are called file server, print server,
database server, internet access server (proxy server)
etc.
Servers are equipped with powerful processors and
larger storage as compared to clients. In certain
networks, clients even rely on server for their data
processing. Such clients are called dumb clients.

Types of Networks on the Basis of Span


On the basis of their span or space occupied, networks are classified into following types:

Personal Area Network (PAN)


A Personal Area Network (PAN) is a computer network
which is used by a single person for communication among
the computer devices. For example, printers, fax machines,
telephones, or scanners are the computer devices used with
a PAN.
The reach of a PAN is few metres only. Typically, this is used
at home or in a small office. The devices are commonly
connected here through wire or Bluetooth, Infrared
technology.

Local Area Network (LAN)


A Local Area Network (LAN) covers a small
geographic area, such as home, office or any building.
These are used within smaller geographic range and
have limited communication lines. LANs have higher
data transfer rate. It is useful for sharing resources like
files, printers and other applications. A LAN can be set
up using wireless media also.

Metropolitan Area Network (MAN)


A Metropolitan Area Network (MAN) is a large network
that usually spans a city, but does not extend the boundaries
of the immediate town, city, or metropolitan area. Data
transfer rate in Metropolitan Area Network is little slower
than the Local Area Network. The distance covered by this
kind of network enables a large number of users to
communicate with each other in the network. For example,
network set up by MTNL in Delhi and Mumbai, cable TV
network in a city.

196
5 Web Applications and Security
Wide Area Network (WAN)
A Wide Area Network (WAN) is a geographically
independent communication network. It covers a large
geographical area. For example, network between two
or more countries. A Wide Area Network may be
privately owned or rented. It has lower data
transmission rate. For example, mobile network set up
by BSNL

Internet
Networks all over the world are globally inter connected to form Internet. This is the reason why
internet is called 'network of networks'. Today, almost every computer and handheld
communication device is part of Internet. Computers over internet communicate through
communication protocols.
Internet is one of the most useful technologies of modern times which help us in our daily,
personal and professional life. Internet is widely used by students, educational institutes; scientist
and professionals to gather information for research and general information. Businesses use the
Internet to access complex databases such as financial database. The Internet is the largest
encyclopedia for all age groups. The Internet helps in maintaining contact with friends and
relatives who live across different locations via Internet chatting systems and email software.
Internet is also becoming a major source of entertainment for the general public.
The first workable form of internet came in 1969 with the creation of Advanced Research Projects
Agency NETwork (ARPANET) in USA under the U.S. Department of Defense. ARPANET allowed
multiple computers to communicate on a single network. In 1990s, Internet came in wider use
when computer scientist Tim Berners-Lee invented the World Wide Web.
World Wide Web
World Wide Web (www) is the largest information system on internet. It contains millions of web
sites that provide information in the form of text, animations, pictures and videos. Thus, it is like a
library that contains millions of books or information in the form of web pages.
What is the difference between Internet and World Wide Web? Internet is a massive network of
computer networks. It connects millions of computers together globally, forming a network in
which any computer can communicate with any other computer (as long as they are connected to
the Internet).
The World Wide Web, or simply Web, is a way of accessing information over the medium of the
Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the
HTTP/HTTPS protocol to transmit data.
The Web also utilizes browsers, such as Internet Explorer or Mozilla Firefox, to access Web
documents called Web pages that are linked to each other via hyperlinks.
Advantages of networking
Data Sharing: One of the most important uses of networking is to allow the sharing of data. User
scan send text files, spread sheets, documents, presentations, audio files, video files, etc. to other
users.
Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared.
For example, instead of purchasing 10 printers for each user, one printer can be purchased and
shared among multiple users thus saving cost.

197
Web Applications and Security 5
Internet Access Sharing: You can purchase a single Internet connection and share it among
other computers in a network instead of purchasing multiple Internet connection for each
computer. This is very commonly found in Internet café (browsing centres), schools, colleges,
companies, etc.
Usage of network based applications such as web browsers, email clients, chat application,
audio & video calling, remote desktop applications etc. is another advantage.
Getting Access to Internet
To connect your computer with internet you need some additional hardware and software. These
are as follows:
¤ A telephone or cable line or a dongle (internet data card) for internet connection by the
Internet Service Provider.
¤ A modem: Modem is a device that enables a computer to transmit the data through telephone
or cable lines. A modem modulates outgoing digital signals from a computer to analog signals
for a conventional copper twisted pair telephone line and demodulates the incoming analog
signal and converts it to a digital signal for the digital device. Modem can be wired (Digital
Subscriber Line, dial-up, cables) or wireless (Wi-Fi, 3G/4G etc.).
¤ Software (browser): A browser/web browser is an application software that is used to access
the information (web sites) on the web. Mozilla Firefox, Internet Explorer, Google Chrome,
Safari, Opera are some commonly used browsers.
Internet Service Provider
A company or organisation that provides the access to internet. Access is provided through a cable
and a modem that connects your computer with the service providers internet server. Connectivity
provides a wide choice of data transfer speed and other services along with internet access. The
kind of connectivity available to you depends connectivity facilities in your area.
Types of Common Internet Connectivity
Connectivity to internet can be broadly categorised into wired and wireless. There are different
types of Internet Connectivity available today; it can be widely categorized into wired and wireless
access. Following table is a summary of different types of Internet connectivity categorized into
wired and wireless:

Technology Type of Connectivity Speed

Dial-Up Wired 56 Kbps approx.


DSL Wired 5-35 Mbps
Cable Internet Access Wired 100-300 Mbps
3G/4G/5G Wireless 8/28/280 Mbps approx respectively.
WiMAX Wireless Up to 75 Mbps
Wi-Fi Wireless 50-2000 Mbps
Some of the commonly used Internet connectivity are:
Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities of the public
switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP)
via telephone lines using a device called MODEM. Users dial a particular number provided by the
ISP and gain access to the Internet.

198
5 Web Applications and Security
Dial-up connections are extremely slow and in most cases, it is replaced by a high speed
connection such as DSL or Cable Modem.
DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires of
a local telephone network. DSL service is delivered along with wired telephone service on the
same telephone line. On the customer premises, a DSL filter removes the high frequency
interference, enabling simultaneous use of the telephone and data transmission. For using a DSL
connection, you need a DSL modem and a subscription.
Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses
the cable television in frastructure. Cable Internet Access is provided through existing cable TV
networks; this is similar to DSL that is provided over existing telephone lines.
3G/4G/5G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile
telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G
mobile telephony communications protocol that allows higher data transfer speeds and capacity.
3G can transfer multimedia at very high speed rate. Advanced forms of 3G are 4G and 5G.
While 3G speed is 8 Mbps, that of 4G is 28 Mbps. 5G promises to be 10 times faster than 4G. If your
mobile device supports any of these, you can subscribe for them with your ISP in order to get high
speed Internet connection on your phone.
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless
communications standard designed to provide mobile broadband connectivity across cities and
countries through a variety of devices. WiMAX is a long range system, covering many kilometres
and is typically used where DSL or Cable Internet Access cannot be used; this could be difficulty in
laying out cables for home or offices located in remote locations but need access to the Internet.
WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or
mobile phones to exchange data wirelessly over a network, including high-speed Internet
connections. Wi-Fi devices such as personal computer, smart phones, video game console, etc.
can connect to a network resource such as Internet through a device called the Wireless Access
Point (WAP). Wi-Fi is used where cables cannot be run (such as old buildings, outdoor areas)to
provide network and Internet access. Wi-Fi can also be used where users require mobile
connectivity. Wi-Fi connectivity is used in home & offices, hotels, college & school campus
typically for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi
access to the Internet for their customers.
Data transfer on the Internet
Let us see how a piece of data, say a Web page, when it is transferred over the Internet:
¤ The data is broken up into bits of same sized pieces called packets.
¤ A header is added to each packet explaining where the data has come from, where it should
end up and where it fits in with the rest of the packets.
¤ Each packet is sent from computer to computer until it finds its destination. Each computer on
the way decides where next to send the packet. All packets may not take the same route.
¤ At the destination, the packets are examined. If any packets are missing or damaged, a message
is sent as king for them to be re-sent. This continues until all packets have been received intact.
¤ The packets are now reassembled into their original form. All this is done in seconds!
To access the Internet, you need an active internet connection. You need to gather and
understand your requirement carefully before subscribing to an internet connection plan. In this
exercise, you will learn how to choose an Internet connection.

199
Web Applications and Security 5
Some of the common questions that help you in your decision are:
¤ What is the purpose of getting this connection?
¤ Will you use the connection regularly?
¤ How much data will be downloaded on an
average per month?
¤ How much speed do you need?
¤ What technology is available in your
particular area?
¤ What are the different plans available from
the ISP?
¤ Is there any limitation or catch for the
selected plan?
Use the following table to compare different
subscription plans to get an estimate and
analyse if that would suit your requirement.
To access Wi-Fi, you need an access point with an active Internet
connection. Usually when you subscribe to an Internet connection,
the ISP provides options to purchase or rent a Wi-Fi router that can
act as both an internet connectivity device and an access point for
Wi-Fi connectivity. Setting up a Wi-Fi network requires technical
expertise; how ever, you can access the Wi-Fi network by
connecting to an access point that is already setup for use. On
computers that run Windows, you can view the list of wireless
networks available by using the following procedure:
Windows will display the list of available Wi-Fi networks; you can
choose any of the connection from the list. Select by Double-
clicking on the name displayed in the list.

EXERCISE
1. How is internet different from the network in a closed, small area like your computer
lab?
2. How WWW is different from internet?
3. What is a modem?
4. What is the role of internet service provider in accessing internet?
5. How does data travel on internet?

Session-3 Introduction to Instant Messaging


Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous
transmission of text-based messages from sender to receiver.

200
5 Web Applications and Security
Most instant messaging software include the option for performing file transfers, audio chat, video
calling and conferencing, sharing desktops, etc. a part from standard text chat. Instant messaging
software is widely used for personal and commercial use. In this session, you will be introduced to
the concept of instant messaging, the steps to create an instant messaging account and also work
with instant messaging software.
Unlike email, instant messaging happens in real-time and the response from participants can be
spontaneous. Some instant messaging software allows users to view messages received when they
are not logged on. These are called “Offline Messages”.
For utilizing audio and video chat or conferencing, you need to have microphones and headsets
or speakers and web cameras so that users can talk or see each other.
Key features of an instant messaging are as follows:
¤ Text Messages can be sent to one or more person (Similar to SMS).
¤ Audio calling and conferencing.
¤ Video calling and conferencing.
¤ File transfers (Not limited to documents, spreadsheets, audio files, video files, etc.).
¤ Message history (Save messages for future reference).
Instant Messaging Account
Participants messaging to each other need to be signed in to the same instant messaging software.
To use instant messaging software, a user must have a valid instant messaging account.
Instant messaging accounts differ in formats; some instant messaging software such as Windows
Live Messenger use email addresses for managing the account and software such as Skype use
standard names.
Instant Messaging Services
There are two kinds of instant messaging software – application based and Web based.
¤ Application based instant messaging software is downloaded and installed on user's computer.
Some of the popular instant messaging software are:
l Google Talk – Now known as Google Hangout.
l Yahoo! Messenger (now discontinued).
l Skype.
l Windows Live Messenger.
l RediffBol, etc.
¤ Web based instant messaging software is accessed using browsers such as Internet Explorer,
Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging
software are:
l Meebo.
l MSN Web Messenger.
l IMO, etc.
Instant Messaging with Google Hangout
Google Hangout was earlier available as an installable application GTalk. Hangout provides
chatting, voice calls and video calls for free over Internet.
This facility comes along with the e-mail account. Besides Google Hangout, Facebook Instant

201
Web Applications and Security 5
Messaging,WhatsApp, Skype provide this facility on different interfaces.
To use Hangout, login to your Gmail account. You will see your hangout connections on the right
hand side as shown here.

To begin conversation follow the steps below:


1. Click on Search button to search and send the
chatting request to someone, who is online.
2. Type the name or email address of the person and
press Enter key.

3. If the person or email address is found, the name


and profile image appear on the left pane and
chatting window appears on the right of the
window. Here you can start text chatting.

LAB EXERCISE
Go to Gmail and create an account if you do not have already.

Session-4 Chatting with a Contact - Google Talk (Hangout)


To chat with someone, the person needs to be online. When
you see the person online, you will see a green dot beside the
name of the person.

202
5 Web Applications and Security
To begin chatting, double click on the contact
name. A chat window will popup where
messages can be typed, sent and seen.

Chat Etiquettes
1. Messages should be short and to the point.
2. Always introduce yourself by name if your
screen name doesn't reflect it.
3. Always ask if the other person has time to
chat first-regardless of how important you
think what you have to say is, it's not going
to be well received if the recipient is busy.
4. In a business environment, know exactly
what you want to discuss.
5. TYPING YOUR MESSAGES IN UPPER
CASE is extremely rude-it's considered
shouting and very aggressive.
6. Give people time to respond - Multiple
questions sent to a recipient before they've
had a chance to answer can seem more
like an interrogation rather than a
conversation.
7. Wherever possible, give the person you are communicating with your undivided attention. It's
not just a sign of respect, but if you have multiple conversations happening or are allowing
other issues to distract you, you may miss an important point in the other person's messages
or lose the gist of the conversation.
8. It's important to properly end an IM conversation - you may think the chat is over, but the
other person may not. While you're off doing other things, they may be sitting there staring at
the screen waiting for further communication from you!!

LAB EXERCISE
Go to Gmail and practice instant messaging with some of your classmates with teacher's
permission.

Session-5 Creating and Publishing Web Pages - Blog


A blog is a discussion style site used by non-technical (and technical users) users for creating
personal web pages. Blogs are similar to an online personal diary and simple to use.
You can use a blog to convey messages about events, announcements, news, reviews, etc. Blogs
are usually managed using a web browser and this requires active internet connection. You can

203
Web Applications and Security 5
also use off line blog software to create content first and later publish the content when an active
internet connection is available.
There are hundreds of websites that offer blog service for free. Some of the popular blogs include:
• www.WordPress.com
• www.blogger.com
• www.blog.com
• www.weebly.com
• www.blogsome.com
Creating a Blog Account
Let us learn how to create a blog account on WordPress.
1. Open the browser and go to https://wordpress.com/
2. Click on Get Started on top right corner.

3. Fill the simple registration form mentioning your email


id, username and password. Then, click Continue.

4. You email inbox will receive


an activation mail from
WordPress which you need
to confirm by clicking Click
here to Confirm Now.

204
5 Web Applications and Security
5. Fill in Create Site form and click on Continue.

6. Enter blog address for your site and click on Create for free account.

7. Click on Start with


Free choice.

205
Web Applications and Security 5
Starting with New Blog Post
1. In your account page, click on Add beside Blog Posts.

2. This will take you to the post


editor where you mention the
title of the post and the content.

You can format the content


using various controls given on
the top toolbar.
You can preview you post before
publishing to have an idea how
it would look like finally.
You can click on + Add to insert
audio, video, images and other
controls in your page.

3. Once you finish writing your post, click Preview


to see how your post looks like and whether you
need further edits in it. Once finalised, click on
Publish… to publish the post on the web.

You can decide to publish immediately or any future date. Click on green colured Publish!
button. It will show your published page. Click on Visit Site.

4. Your final published post


will be displayed which
you can share with
others.

206
5 Web Applications and Security
Posting Comments on Other Posts
When you visit other blogs and read posts,
you can post comments on the post. The
options for posting comments are usually
given at the end of the post which you
might find after scrolling down the post
page.
Key in your comments and details and click
on Post Comment.

LAB EXERCISE
1. Go to WordPress or Blogger.com to create a blog account and create a small blog
post about your school.
2. After publishing blogs share it with your classmates online through Facebook. Post
comments on each other's blog posts.

Session-6 Using Offline Blog Editors


Offline blog editors can be used that can be
installed on your computer and you can use them
to draft your blog posts without having to connect
with internet. When your post is finalised, you can
connect with internet and publish your final post.
Some popular offline blog editors are Windows
Live Writer from Microsoft, Qumana, BlogDesk,
Blog Jet and Weblog. Weblog extrension can be
installed in Writer for blog publishing but here we
shall see how to use MS Word to create a blog
post. You should have an online blog account
already before starting with offline blog editor.
Publishing Blog from MS Word.
¤ Open MS Word 2013.
¤ Go to File tab >New option.
¤ Select Blog Post template.

207
Web Applications and Security 5
Click on Create in the popup.

MS Word will ask you to register


your online blog. Click on
Register Now.

In New Blog Account dialog box,


select WordPress.

In New WordPress Account dialog box, enter


your blog post URL and login credentials of
your blog site.
Working with Blog
You can create a new blog post just like you
create any Word document with pictures,
SmartArts, Shapes, ClipArts, etc. or you can
open existing post to edit from your blog site.

Publishing a New Blog Post


Once your blog is ready to publish. Click Publish option in Publish
drop-down in Blog group of Blog Post tab.

208
5 Web Applications and Security
The post will be published and an
update will be displayed on the page.

Clicking on Home Page option in


Blog group of Blog Post tab will take
you to the online home page of your
blog in the browser.

Editing an Existing Blog Post from Blog Site


1. In Blog group under Blog Post tab, click on Open
Existing option.

2. In Open Existing Post dialog


box, your online posts will be
listed. Select the desire post and
click OK.

3. Selected post will be opened for editing.


Make changes and publish it again.

209
Web Applications and Security 5
Working with Qumana
Qumana can be downloaded and installed from https://www.softpedia.com/get/Internet/News-
Newsgroups-Blog-Tools/Qumana.shtml
Qumana makes blogging very easy. You can add pictures, audio, video and images to your blog.
You can easily manage you blog and publish it online.
Once installed, open Qumana by clicking Start > All Programs > Qumana > Qumana or by
clicking Qumana shortcut on the desktop.
Connecting with Online Blog

1. On first start, mention your


blog's address in Add Blog
Wizard and click Next. It will
automatically locate your blog.

2. Enter login credential of your


blog site and click Next.

3. Blogs on your site will be listed.


Select the blog you need to
work with and click Finish.

210
5 Web Applications and Security
Qumana interface will open up listing your blog posts.

Editing Blog Posts


1. In the list of your blog posts, double click on the one you wish to edit. It will open up in the
editor.

2. Make changes in your post in the editor. You can use formatting toolbar. If you have basic
knowledge of HTML, you can insert content with HTML using Insert HTML button at the
top. Insert Ad button lets you insert advertisement in your post page. Once changes are
done, click on Save button to save your post offline on your computer.
Publishing the Blog Post
1. To publish changes to your blog site, click on Update Post button.

211
Web Applications and Security 5
2. Qumana will take a while and publish the changes to your online post.

LAB EXERCISE
1. Go to WordPress, register yourself and create a simple blog.
2. Publish a post using MS Word.
3. Download and install Qumana.
4. Use the editor to connect with your online blog.
5. Edit the online blog created in previous session using offline editor and publish the
changes.

Session-7 Online Transactions


Online shopping is a form of electronic commerce where customers can buy or sell goods over the
Internet. Customers need to have an active internet connection for viewing goods or services
offered by a seller; customers can pay online using a credit, debit card.
Online shopping could be useful in situations when:
¤ A customer does not have sufficient time to visit stores.
¤ Visiting a store is more expensive than purchasing a product online.
¤ A product or service that is not available in the local market is available online.
Some of the popular online transaction websites are:
¤ IRCTC, an online portal for booking flight and train tickets.
¤ Flipkart, an online shopping portal for buying consumer products.
¤ eBay, an online portal for buying and selling goods.
¤ Redbus, an online portal for booking bus tickets.
To perform an online transaction, all you need is a web browser and an active internet connection.
In some cases where purchasing is involved, you will need a valid credit card, debit card or online
banking support referred to as Net Banking Subscription. Some websites even allow COD (Cash
on delivery) where the users can pay once they receive the product or service.
A Basic Online Shopping Process
All online shopping websites follow following standard shopping process:

212
5 Web Applications and Security
1. User registers on the website.
2. User searches for products and browses through product catalogues.
3. User selects, reviews and adds the products in online shopping cart.
4. User reviews the cart and finalises the products in the cart.
5. User fills in the shipping address.
6. User fills in the online payment details.
7. User furnishes the payment and checks out.
8. Website sends SMS and Email to the user, acknowledging the payment received and
regarding the dispatch of the products purchased.
9. Finally, products are delivered to the dispatch address.
Let us understand this process with Amazon.in.
Online Transaction Using Amazon
Amazon is one of the premiere online stores where you can purchase a variety of consumer goods,
books, apparels, mobile phones, groceries, toys, sports goods and several other goods.
Amazon offers multiple payment methods like credit card, debit card, net banking, e-gift voucher,
and Cash on Delivery.
You can make purchase and transactions on Amazon without registering but every time you make
payments you will have to enter all your details again hence otos recommended that your create
an account on Amazon.in and log into it to make online purchase.
Shopping on Amazon.in
1. Open any browser and go to www.amazon.in.
2. Bring the mouse pointer over Your Orders and click on Sign In to login to
your account.
3. On next page enter your email ID, click Continue, enter your password and
click Continue.
Amazon home page will provide you a wide variety of products organised into
various categories. Page also displays various deals.

You can also search for the products from the search bar at the top which
provides choice for product categories.

213
Web Applications and Security 5
Browsing Product Catalogue
Products in a catalogue can be sorted according price, reviews and popularity. You can narrow
down your search on the basis of manufacturer, product price range, discounts, availability etc.
The catalogue interface is seamlessly provided with search, links and category choices that your
can easily look around.
Shopping Cart and Wish List
When you click on a product or its image, its features, any technical details, discount schemes,
customer reviews and payment options are displayed on a new page.
It is not necessary to buy the products immediately. You can add the product into a wish list to
review it later. If you like the product, you can add it to your shopping cart and continue shopping.
Finally, you can decide which products you really need to buy and delete rest from the cart. Once
your shopping cart contents are finalised, you can proceed to payment.

Viewing Shopping Cart and Purchasing


To visit your cart, click on Cart link at the top right corner.
This will take you to your shopping cart listing your items.

With each item, there is Delete link to remove the item from the cart.
Once finalised, click on Proceed to Checkout button.
Enter your Delivery address and Shipping preferences. Amazon will
save it for future use. Click Continue.

Select Payment options through all standard credit and debit cards,
Netbanking, EMI (if applicable), Cash on Delivery, Gift Cards, Vouchers
etc. Select the suitable method and click Continue.

214
5 Web Applications and Security
Fill on your payment details like card details, login credentials etc. Click
Continue. On next page, click on Place Your Order and Pay. This will
take you to the payment gateway and once the payment is successful you
will receive an acknowledgment mail regarding product, payment and
delivery details.
Online Transaction for Booking Rail Tickets
Let us see how we can use an online ticketing service for booking train
tickets. Here we shall use IRCTC website for this purpose.
Open the browser and go to IRCTC website: https://www.irctc.co.in
On website's home page, fill in the details of your journey like cities to
travel from and to, date of journey and preferred travel class. Then, click
on Find trains. You can login into IRCTC account which you may have
created earlier. Registering on IRCTC is the same standard process as on
any other public services website. To login, click Login option in the drop-
down menu on top right corner.
The trains will be listed. Click on Check
Availability to check the seats available. You can
change the travel class to check seats for other
classes. Once you decide to book a seat, click on
Book Now.

215
Web Applications and Security 5
On the next screen,
fill the passenger
details as shown
here. If you have
passenger details
already saved in the
website then you
can pick up details by clicking My Saved Passenger(s) List. To add more passenger details, click
on Add Passenger.

Scroll down, fill in mobile number and captcha details and click Continue Booking. Review
booking page will appear. When sure, click on Continue Booking.
On payments page, select the suitable payment
option for example Net banking, select the Bank
and click on Make Payment.
This will take to the payment portal. Furnish the
payment and your ticket will be displayed to
download and print.

Viewing Transactions
In the main menu, click on
MY ACCOUNT and hover
mouse pointer on My Transactions. You will see choices namely Booked
Ticket History, Failed Transaction History, Ticket Cancellation
History. You can select the desired choice.

LAB EXERCISE
1. Create an account on any online shopping site of your choice with teacher's
permission. Add some items in shopping cart, go upto payment option and then
logout without buying the items.
2. Register yourself on IRCTC website and practice booking a ticket. (Do not book
actual ticket. Stop when payment page appears.)
3. Check you email ID of there is any mail from shopping website and IRCTC.

Session-8 Internet Security


Internet security refers to computer security especially when we are
online on Internet. It often involves browser security but also
network security. Internet security is to establish preventive
measures against attacks from hackers, phishers and online

216
5 Web Applications and Security
scammers. The Internet is as secured as safely we use it. Exchanging information may often
involves high risk of intrusion.
Though Internet is a valuable and vast source of information. It is also the most preferred source
and virtual place of entertainment. But it makes your computer prone to many online threats.
Ensuring security of our login credentials on various sites like bank sites, our credit card and online
banking information from unauthorized users is a must. Some web sites can also install Malware
on the computer without user consent thereby leaving the computer damaged or insecure.
Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of
users getting compromised.You can reduce the risks by using best practices such as using Antivirus
Software, Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading
awareness of the best practices.
Best Practices for Security
Use strong passwords, with combination of letters in both cases, numbers, and special characters
which makes a password difficult to crack or guessed by others. Do not keep easy-to-guess obvious
passwords like your birth date, birth place, friend's name, relative's birth date, mobile number etc.
Change your pass word frequently at least monthly or fortnightly.
Most web sites like Gmail, Facebook, bank web sites and important transactional web sites check
for password effectiveness when you register for the first time or change the password.
Following is a general guideline for managing strong passwords.
¤ Password length should be at least 10-15 characters if possible or allowed by the website or
software.
¤ Do not repeat password while changing them. Many bank web sites do not allow this.
¤ Pass words should be a complex combination of numbers, letters and symbols.
¤ Avoid using same password for multiple sites.
Example of a strong password is k3xP%,7Ym[}
Web sites such as www.strongpasswordgenerator.com help generate random strong pass
words. Go to www.strongpasswordgenerator.com and click Generate strong password. The pass
word will be displayed.
Regular Data Backup: Regularly backup your data on an offline storage like external drive, disc
or tape drive etc. You can restore it in case of data loss or computer hard drive crash. Keep the
back up in a secured place away from unauthorized users.
Encrypt Data by using a good encryption software. Some operating systems provide this feature
also.
Secure your user name and password: Never save your security credentials in a place or
location, which is shared among others such as cybercafé, shared drive etc. Do not set your
browser to automatically login to your bank sites for automatic logon. Every time you visit such
site, type the password always.
Do not share personal data; web sites require you to fill out forms containing fields such as name,
gender, age, email address, school, etc. Be cautious when filling out such forms; research and
verify if it's a trustable web site. Your email addressed could be used by unauthorized users to send
you fake or unwanted emails; think twice or thrice before providing information to any website
and decide if it is really necessary.
Secure transactions: If you are using online shopping or transactions, web sites even store your
credit card or online banking personal information such as your credit card number, account

217
Web Applications and Security 5
details, etc. This information can be tracked and used by un-authorized users often known as
hackers to misuse this information.
Again, ensure the web site is legitimate and uses secure practices for performing and maintaining
online transactions. Since information such as credit card details or personal information is sent
over the network, it is always recommended to use only secure web sites for such transactions.
Verify if the web site uses secure transaction; usually it is indicated through a digital certificate
represented as a golden lock in the web browser's address bar.
Use antivirus and antispyware software, computers are prone
to attacks from software known as Malware that could har my our
computer. Malware track browsing be havior or transmit personal
data from your computer; programs such as key loggers could be
in stalled on your computer track and transmit every key that is
pressed on akey board (keystrokes) to unauthorized users.

Antivirus and Antispyware programs also offer real-time protection


monitoring your computer for any changes by malware software.
Keep your Antivirus an Antispy ware software always up to date, this
can help in protecting your computer from recent threats.

Do not immediately respond to mails from unknown users, it may be a


fake mail trying to gather personal information such as your bank
account details, home address, etc. Some mails could promise you jobs
or announce lottery results which in turn could compromise the user.
And in some cases, virus or scripts that are dangerous could be attached
to the mail; NEVER open the attachment from an unknown source.
Clear browser cookies frequently, cookies are programs that are created on your local computer
when you visit web sites. Though cookies are meant for storing data based on your activity
performed during your earlier visit such as logon details, details of as hopping cart, visited pages in
a website, etc. they could also be tracked by unauthorized users and possibly gain access to your
personal information.
Keep the operating system and software applications up to date; though
operating systems and applications are designed, tested and distributed,
sometimes they may have security holes through which a hacker can take
advantage; they may track and gather information or even damage the
whole computer. In general, most vendors notify the users whenever a
security hole is identified and an update is available to address that
particular issue. You can also visit respective vendor's website to check if
there are any updates available, download and keep your operating system
and software applications up to date, free from security holes.
Install Firewalls: Firewalls could be software or hardware and can assist in keeping a computer
and a network secure. Firewalls analyze the network traffic and determine if the traffic should be
allowed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall
software as a part of operating system thus keeping the computer secure. In rare cases, you may
need to configure your firewall for additional security.

218
5 Web Applications and Security
Never install software from unknown sources as they might not be
trust worthy; download only from well-knownorreputed web sites.
Verify the source if it is legitimate by searching the internet or referring
to comments from other users before downloading them; understand
the nature and the purpose of the software before attempting to
download and install them.
Secured Socket Layer Certification is done for web sites by known
authorised Certification Authorities (CA). CAs do not issue SSL certificates to phishers, spammers
or any agency that is not properly identified and cleared. Check the website's certificate icon of a
padlock in the address bar. All secured web sites have SSL (Secured Socket Layer) certificates. If
padlock icon is of open lock then website is not secured and must be left immediately.
Remove unwanted or unknown software applications; these might have got installed without your
knowledge when you have visited some web sites. Unwanted software could get installed as they might
have been bundled along with necessary software. Some programs such as toolbars get installed usually
through bundled software and are programmed to send personal data without your consent.
Cyber Bullying
Any sort of threat or harassment over internet is the act of cyber bullying. Messages in bad taste
and intentions, online mockery in friend groups or circles, stalking someone's online profile and
trying to post unwanted updates, sending unsolicited private messages, videos, and pictures are
considered as Cyber bullying that affects young minds intensely even up to the threats of death.
Protection from Cyber Bullying
¤ Children must know that their parents and teachers are always available for them when they
face such problem.
¤ Children must know that no matters what, parents and teachers are their first support.
¤ Children should inform their elders about any incident that sounds nasty even remotely.
¤ Children must know the fact that cyber bullies are not capable to do any harm and they can
never carry out their claims of harming someone.
¤ Children are advised to block such intruders immediately and never entertain them.
¤ In case of cyber bully attack, save all his/ her messages offline as evidence for later use.
Malicious Smartphone Applications
Many smart phone applications seem attractive but in fact contain malicious code that
steals information stored in the smart phone, such as the address book data without
the owner's knowledge. The personal information stolen this way is forwarded to the
hackers who abuse it to commit cyber crimes such as spam operations, billing frauds
and cyber scams. Every trending app is not worth downloading.
Smartphone Safety Measures
¤ Set up emergency numbers for instant calling.
¤ Do not use cell phone everywhere – keep your senses free to perceive other stimuli like while
crossing road, driving, using escalators, crowded areas etc.
¤ Get rid of unwanted data as soon as possible – keep your phone data tidy.
¤ Protect your phone from physical theft. Make it a habit to check while leaving any place.
¤ Keep good password and pattern protection.
¤ Keep the antivirus and software updated.

219
Web Applications and Security 5
¤ Sign out of and close the apps that are used.
¤ Avoid automatic download settings.
¤ Keep your wireless access secured.
¤ Do not install just any app impulsively or in peer pressure.
¤ Keep a regular backup of your phone data.
Clearing Data Stored In Browsers
Web browsers have built-in password management designed
to store passwords used informs on web sites.
Browser soften prompt to save user name sand
passwords when users attempt to logon to web
sites. This facility is offered to users, so that they
can logon to their frequently used web sites
without having to type the user names or
passwords. However it is not advisable to leave
the web browser store this data particularly on
public or shared computers.
To clear personal data from a web browser such
as Google Chrome, launch the browser.
Click Tools Menu > More Tools > Clear Browsing data…
The next window will show various options to clear Browsing History, Cookies and Cache.
You can make changes in Privacy settings according to your preferences.

LAB EXERCISE
Visit security options of Internet Explorer and note down your observations in notebook
like how history settings are changed, how cookies settings are changes and how other
security levels are setup in Internet Explorer.

Session-9 Workplace Safety


People on a workplace are important asset of the company they work for. In addition to this,
workplaces may have other people also involved such as students in schools, patients in hospitals,
customers in a bank and clients in other working places. So, workplace safety is not an issue
concerning only the people who work in a particular place but everyone who is present at the
workplace due to one reason or other.
Why Workplace Safety is Important?
Safety is always an important issue in every aspect of life owing to the reason that it concerns the
living beings directly. A safe environment is what everyone looks for and wants to be in. Workplaces
are very dynamic in nature and depending on that they can be very crowded too. So, a place that
involves dynamic interaction of people at work needs to be safer for all people concerned.
A safe working environment ensures better work performance and efficient workforce. It is the
responsibility of every organisation to provide as much as it is the right of every working person to
have a safe and healthful working environment.

220
5 Web Applications and Security
Safety Issues and Workplace
As we learnt that workplaces are mostly dynamic in nature and depending on that, their
environment varies. Think of a small stationery shop manned by two people at one hand and on
the other a busy railway platform buzzing with the crowd of passengers arriving and leaving, along
with vendors, staff and security personnel around. Quite a contrast! Isn't it? So, you can now figure
out that certain workplaces could be quiet like, offices and libraries while some workplaces are
moderately noisy and crowded such as shops and restaurants, yet some workplaces like hospitals,
public transport stations, factories, mines, construction sites, packaging units, ware houses etc.
work under stringent safety controls.
What is of importance is the safety of each and every individual directly or indirectly related to the
place of work. For instance, hospitals have responsibility of safety not only for their staff but also
for the patients and the visitors. So does for airports, railways and bus stations for passengers,
shopping malls for shoppers, restaurants for customers, schools for students, recreation parks for
children and the likes.
Safety Hazards
Preventing and protecting against a threat or hazard needs the knowledge of kind and nature of
the threat. Knowledge helps in devising effective safety measures and rules. Nature of workplace is
the prime factor that decides the kind of threats to the safety of the people present there. In highly
sophisticated workplaces such as laboratories, construction sites, mines and manufacturing expert
guidance and vigil are needed to ensure safety and a strict code of conduct is followed in
complying with the safety rules and regulations. In certain specialised cases, breaching such rules
may be considered as criminal offence. Comparatively common workplace areas such as schools,
offices and shops need not to have such extensive safety measures but they do need to follow
certain basic and mandatory safety practices on regular basis. Some common workplace safety
hazards are related to the following items or factors:
Fire: Fire has the most devastating effect. In absence of appropriate safety measures, it is like
inviting the trouble knowingly. Fire safety must be the prime concern for every domestic and
commercial place. Protection against fire is the part of basic rules and guidelines of safety. A
sudden outbreak of fire catches the people off-guard and by the time they react, it spreads. In
certain areas like mines, paper and garment go-downs, confined places like elevators, theatres and
washrooms, oil-rigs, fuel stations, chemical laboratories are most prone to complete devastation by
fire. If fire breaks out in such places and adequate means of safety are absent then such places
succumb completely to the raging fire in no time.
Electricity: We tend to take this silent monster very lightly and in most of the cases, victims hardly
survived. Today, quality electrical equipment and fittings are installed which make us little inadvertent
in using them. This makes us overlook certain trivial danger signs such as broken sockets or wire-
casings, water leakage near the electrical fittings, wires exposed due to rodent-bites, wear and tear of
the old fitting and wirings etc. Other reasons behind a safety hazard due to electricity are misuse of
allocated power (using high voltage equipment over a low voltage line) leading to short-circuits,
equipment and fittings in the reach of children, deployment of untrained personnel for repairs and
poor fitting layout design. Careless handling of equipment. For instance, using a hair-drier casually in
the bathroom or handling electrical fittings barefoot standing on the naked ground. Electricity
accidents, like short-circuits, may cause fire, leading to more destruction and loss of life.
Unsafe places: An unsafe place could be as ordinary as a narrow passage cluttered with a stack
of heavy cartons or as dangerous as several feet below the ground in a coal mine. A construction

221
Web Applications and Security 5
site is a life-threatening place for untrained, unequipped and casual individuals. Like construction
sites, factories and warehouses have two major threats – heavy objects and moving objects. For
example, heavy containers and fork lifts. Confined places like narrow passages, operation theatres,
air-locked rooms, bank safes, freezers and cold storages, driver's cabin, cockpit, soundproof cabins
and basements – parking, go-downs, mines – all such places turn out to be hell holes when
disaster strikes. Certain places are unsafe due to hazardous nature of the work such as virus
medical research centre, nuclear plants and machinery, blast furnaces, refineries, work involving
dust, smoke and other particles in the air, work involving high decibel noise due to heavy
equipment like drilling machines and hammers, life threatening sites such as underwater, space
research, outer space missions, extreme heights and extreme weather conditions (desert, north
pole etc.), places which bring workers in contact with harmful diseases – people working for
patients during a pandemic such as recent Covid-19 virus etc.
Tools and Machinery: Various trades use different kinds of tools, machines, gadgets and
instruments. Using certain tools and operating specific machines needs right kind of training and
methods. Tools pose a threat if they are not used in the adequate manner, machines can create havoc
if they are not worked with adequate skills. Mishandling of these leads to the dangers for the people
on the workplace. Certain examples are heavy drills, cranes, trolleys, furnaces, medical equipment,
forklifts, indoor carriage cars, push carts, carpentry tools etc. Working with a tool or a machine is as
safe as the level of skill and knowhow of its operator. Proper placement and location of the
equipment is also necessary. Distractions while operating them may also lead to accidents sometimes.
Ergonomics: There are certain ways to operate equipment and right kind of postures to assume
while working. A person merely sitting in a chair, typing on a computer is exposed to the effects of not
using the equipment properly and not assuming the right posture. The correct posture of working on
a computer, correct posture to man a vehicle, correct pose to handle an equipment come under
ergonomics. The quality of a product is also determined by its ergonomic design. A chair meant for
sitting for longer hours by a data entry operator will be different than that meant for a person working
on a loom. Ergonomics involves both – the right product design and the right posture to work.
Slippery and unsafe passages: A simple slip may cause a broken hip or elbow. Businesses
involved in show and display such as hotels, malls, restaurants and other such places have more
reasons for accidents due to a sudden slip. Imagine a slip and topple from the third floor of a mall
down to the ground floor or a slip over the moving escalator. Passages partially blocked by
discarded stuff like broken furniture or wooden cartons. Untidy narrow pathways due to poor
housekeeping. This is the reason that in certain professions, personnel are trained into handling
equipment in narrow passages like the passage in aeroplanes, crowded places like restaurants,
moving trains. All such workplaces made of slippery floors need extra care and caution for the
people who work there and the visitors.
Crowd: Overcrowded workplaces may cause different kind of threats but they are more of a big
disaster in other kinds of threats such as fire breakout or stampede. Crowd makes an emergency
situation worse. Law enforcement professionals and workers many times deal with crowd.
Crowded hospitals are a common example. Such places need discipline and a code of conduct for
restricted movement as well as authorised access to specific areas. Crowds on railway platforms
and over bridges many time lead to accidents.
Hygiene and health: People in healthcare, medical profession and scientific research are
exposed to infections, radiations and other similar threats depending on where they work. A strict
regime of discipline and safety measures are needed to be followed in such places. People not
trained into working at such places pose greater threat.

222
5 Web Applications and Security
Training and capability of staff: Certain businesses sometimes compromise on the adequate
training, capacity and skills of the working staff due to budget constraints or short-sighted business
decisions. This leads to accidents. In certain businesses it is more of a mortal threat such as public
transport and commutation services (taxi, school van etc.). There had been a few news of school
van accidents. Capability refers to the physical and mental state of the worker or operator of the
machine. A drunk driver kills self and many others. Lack of adequate staff results in untrained
persons handling the equipment. We have heard cases where an untrained support staff was
caught administering an injection to a patient. All professions involving handing of equipment,
tools and machines need adequate expertise level and certified, trained and skilful personnel to
work. Anything less than this is an open invitation to an accident in waiting.

EXERCISE
1. Imagine a public place which you visited recently. Which safety hazards did you
notice there?
2. What are the common safety hazards likely at a school?

Session-10 Maintain Workplace Safety


As we discovered earlier, workplaces are exposed to different kinds of threats depending on their
nature of business and location. It is imperative to ensure safety of workers and to do so, adequate
safety norms and discipline are followed at workplaces. The safety rules and measures should be
clearly communicated through formal ways and displayed for everyone to see on the workplace.
Let us have a look at some common workplace safety measures.
Suitable safety gear: Certain specialised professions need specific uniforms and safety gears. It's
not only for sportspersons to wear safety gear. Personal protection equipment (PPE), helmets,
goggles, anti-glare specs, thermal safety wear, anti-slip shoes, overalls, anti-radiation suits,
protective boots and gloves, bulletproof and fireproof jackets are necessarily used in various work
fields. For doctors, construction workers, mine workers, engineers, mechanics, housekeeping staff,
computer operators, security personnel, vehicle handlers, packagers, assembly line operators and
factory workers it is necessary by rule to wear adequate safety gear to ensure workplace safety.
Fire safety: It is important to have suitable and adequate fire safety measures. These include the
workplace design and environment as well as safety equipment.
Fire-safe work environment includes:
1. Proper ventilation at workplace.
2. Emergency exits.
3. Safe electrical, LPG and water supply fittings.
4. Suitable safety against any inflammable material.
5. Means to check and handle overcrowding.
6. Practice of safety rules by all at workplace.
Fire safety equipment includes:
1. Fire extinguishing equipment. 2. Fire alarm.
In addition to the above, the staff should be trained through mock drills and regulations to practice

223
Web Applications and Security 5
safety. People at workplace should know what to do during a fire breakout. Evacuation drills,
demo and practice sessions for using fire extinguishers, instant access to fire fighting services and
medical help, self-management and helping others during the emergent situation etc., equip staff
to handle the emergency adequately instead of panicking and losing control.
General health and ergonomic safety: Nature of work and workplace environment affect the
health of the workers. A conducive work environment is conscious of workers' general health and
its ergonomic aspects. Due to work-specific environment workers may get exposed to different
kinds of health hazards. For instance, coalmine labourers are exposed to poisonous gases, harmful
radiations, inflammable materials etc., sewage cleaners lose their lives due to poisonous gases and
deep running smudge. Such workers need adequate equipment and gear to work.
Hospitals are a dangerous place for the staff who come in direct contact of the patients with infectious
diseases, people working in refineries, chemical plants and dye industry tend to get their respiratory
system infected with hazardous chemical, tiny dust particles and general air contamination, extreme
temperatures may cause discomfort or danger to physical health, Such workers should follow the safety
guidelines such as wearing right kind of PPE, gear and obey the prescribed health measures. People
working behind desks with least or zero physical movement are prone to ailments related to heart,
backbone and neck. Suitable breaks, fitness regime and discipline must be followed by them. Many big
corporates provide gym facility for the employees. Minimised physical activity takes a toll on the physical
fitness. Long durations of standing (shopping mall, food joint), too much physical movements such as by
salespersons, traffic policemen, hotel kitchens, waiters, security guards etc. Suitable breaks, arrangements
for little recreation and physical fitness must be in place for such professions.
First Aid Kit is a mandatory requirement at all workplaces irrespective of their nature and kind
however, it should be equipped with suitable tools and medicines. FAK helps in minimising the risk
of life until the help arrives. It enables the victim to hang on for a little longer time until the real
help is reached. A standard FAK contains the following:
plasters in different sizes and shapes sterile gauze dressings
bandages of different size/shape safety pins
tweezers and/or small scissors alcohol-free cleansing wipes
sticky tape digital thermometer
skin rash cream antiseptic cream/ liquid
painkillers cough medicine
antihistamine cream or tablets small torch
FAKs need to be checked regularly to replace any expired material or to add any new item
depending on the requirements.
Providing first aid: Every individual should know how to provide basic first aid to a victim.
Usually, first aid is a matter of trained persons but a basic training from the right source such as
redcross.org etc. equip a person to become useful during emergency. Depending on the cause of
harm, the patient or victim should be treated properly for the quick comfort and safety. Taking care
of proper air flow (ventilation), comfortable lying down of the patient, applying suitable medicine,
suppressing any bleeding, aiding in respiration, supporting a broken bone, least distressing
movement of the patient are certain basic know-hows that may save a life. The main purpose of
the first aid is to keep the victim or patient alive and comfortable until the adequate health arrives.
Visit www.redcross.org to learn more about providing first aid.
Ergonomic safety refers to the correct way of working with an equipment. It involves body posture,

224
5 Web Applications and Security
duration of working, safety of sensitive organs such as eyes and right skill. For example, to type for
longer duration on a keyboard, one must be trained in the typing skills of specific language
keyboard, the right posture of the body, kind of chair, position of knees and elbows, position of
wrists while typing and using mouse, distance from the monitor, intensity of the monitor glare etc.
need to be considered.
Keyboard
¥ Your neck and shoulders should be relaxed.
¥ Your upper arms & elbows should make a little
more than 900 angle.
¥ Your wrists should be straight.

Mouse
¥ Mouse should not cause pressure on the wrist.
¥ Avoid bulky mouse.
¥ Keep mouse closer to the keyboard.
¥ Elbows should be bent and closer to the body.

Monitor
¥ Monitor should be placed at a distance anywhere between 18 and 30 inches.
¥ You should be able to focus on the screen while still using the back of the
chair and keep your arms parallel to your upper body.
¥ Your eyes should be level with the top of the screen.
¥ Turn the screen brightness down to a comfortable level.

Sitting and Posture


¥ Chair height should be adjustable.
¥ Chair should swivel (rotate on centre) easily and
0
completely (360 )
¥ Chair should have good back support.
¥ You should be able to sit with your feet flat on the
floor (or a footstool) and knees approximately 900.
Mild Exercises (Do not over stretch and do not do with jerk)
þ It is a good idea to take a break of a few minutes for every hour.
þ One by one, gently lower your ears to your shoulders. Repeat a few times.
þ Turn head slowly & look over left shoulder (10 sec) then right shoulder. Repeat a few times.
þ Tilt the head slowly backwards then bring slowly forward to tuck the chin in the neck. Hold for 10
seconds and repeat a few times.
þ Circle shoulders forward several times, then backwards. Repeat 3-5 times.
þ Stretch arms above head, pull elbows behind the head. Hold for 10 seconds and repeat.
þ Go to an open area, swing arms one by one forward & backwards like a windmill. Repeat.
þ Interlace fingers, palms outwards and straighten arms in front. Hold for 10 sec & repeat.
þ Rotate wrists clockwise for 30 seconds than rotate them anti clockwise.
þ Every 20 minutes, look away from the screen at a distant object for 10 seconds.

Safety equipment: It is the responsibility of the concerned business and authorised persons to
ensure that safety equipment required for the work is worn by the workers. Through guidelines,
trainings and checks must be there to ensure the compliance in using the safety equipment. In

225
Web Applications and Security 5
sensitive areas like hospitals, construction sites etc., government regulations need to by applied
and followed. There must be detailed guidelines and stringent discipline to ensure everyone's
safety. People must be educated in realising that safety equipment may slow them down but
prolongs their life span. To stay alive and physically safe are the prerequisites to be of any use to a
workplace. No business would like to have a crippled worker or a worker lost.
Lighting: Workplaces involving late working hours or places like mines, go-downs and basements
need suitable amount of lights for workers to see and carry out their tasks. Improper lighting leads
to visual health issues and low productivity. A well lit room, a mine fitted with moving flash lights,
operation theatre with bright overhead flash lights, a classroom with proper light arrangements are
examples of well-lit workplaces.
Cleanliness and hygiene: Clean and tidy workplaces is a prerequisite for better working
environment. Workplace should be free of rodents and other insects. Regular cleaning of the
floors, working areas, desks and other parts of the building should be carried out. Occasional but
regular sanitisation and disinfection is needed depending on the nature of the workplace.
Cleanliness of the washrooms and other areas is necessary. Adequate arrangements must be there
to ensure that employees could manage hygiene properly. Maintaining a clean and healthy
environment is the responsibility of both the employer and the workers. Suitable guidelines and
rules should be communicated regarding this and management should ensure that they are
obeyed strictly.
Controlled access: Certain organisations and enterprises need to ensure authorised access to
certain parts of the workplace. For example, everyone cannot go inside an operation theatre.
Places like electrical control rooms, centralised machine control rooms, server rooms and specific
floors are kept out of reach from the unauthorised personnel to ensure that entire system runs
smoothly. Large organisations even practice authorised security card-based access into the
working site besides having a detail of security personnel. These measures ensure that untrained,
hostile and unwanted persons should not get in.
Training the workforce: All the measures for ensuring workplace safety fall flat if workers are
not properly aware of them, understand them and acknowledge them. Workers should be
informed, educated and trained into following the safety measures laid out by the organisation.
Formal means of communication, quarterly safety measures quiz and mock drills, evacuation plans
are effective ways to ensure that workers understand and comply with the safety policy and safety
rules of the workplace.

EXERCISE
1. What is the use of First Aid Kit?
2. Discuss in brief the ergonomics related with working on computer.

Session-11 Prevent Accidents and Emergencies


Prevention is better than correction. Safety rules and guidelines, if followed by the word, help in

226
5 Web Applications and Security
preventing major accidents at workplace. That is why mock drills and reminder quizzes are
important. Let us understand some common types of accidents.
Slipping: Wet floors, slippery surfaces, edges of the stairs etc. are common places where a person
may slip and hurt badly. Anti-slip strips and big warning displays prevent such accidents. The grips
on the stairs should be anti-slip. Cleaning staff should clean the floor by putting up warning boards
on every possible entrance of the area being cleaned.
Tripping over: One must be careful while moving in a cluttered place like maintenance rooms
strewn with wires or place with loose rugs. Tripping over sometimes may cause serious accidents
as it leads to falling objects and further damage and threat to life. For instance, tripping over the
wire of a stand-alone fan causing it to fall down may lead to short circuit. Tripping over can only
be prevented through informing all in advance, cordoned off areas, restricted access and suitable
warning signs and most importantly being careful ourselves.
Falling: Falling down from the ladder, edge, roofing and other such unprotected areas may lead
to serious injuries or even deaths in case of dangerous heights. Construction sites, factories,
warehouses, go-downs, mining and digging operations are the sites prone to accidents and deaths
due to fall. People working at heights should be trained and skilled in doing so, they should be
equipped with adequate gears such as safety ropes, helmets, anti-slip gloves and shoes, climbing gear,
anti-slip ladders, walkie-talkie, catching nets and arrangements of instant first aid of advanced level.
Hit by vehicle or falling objects: People should be careful in places like car parking, moving
trucks in a warehouse, loaded truck backing up, fork-lifts moving inside a large warehouse or
store, heavy objects kept at height, rail-carts, carriages and even people carrying some heavy
object. Warning signs placed at conspicuous points, restricted access, localised, in-house traffic
rules, signal controls, suitable announcements on loudspeakers, controlled movement, automatic
warning sirens such as backing up warning callout can prevent such accidents.
Other common workplace accidents are due to electrocution, tools and machine handling, lifting
accidents, common physical injuries and strains, overexertion, inhaling toxic material, crashes,
collision and harms due to high decibel noise, dust, smoke and dirt.
Major accidents include explosions, fire breakout, leakage of hazardous material, electrical surge
and high voltage accidents, mine collapse and underground avalanche, flooding of closed,
congested areas, building collapse and machine-related accidents etc.
Preventing Accidents
Some common preventive measures against accidents at workplaces are listed here.
Safety guidelines, rules and their communication: Workplace should be governed by
standard as well as specific safety rules. Staff should be communicated formally about them and
should also be educated and trained in certain cases through draft policy, email literature, quizzes
and mock drills.
Workplaces should be displayed with conspicuous warning signs, directions, safety tips and
indicators for any diversions during maintenance. For cases where danger can be anticipated,
timely warning should be conveyed to all concerned through most effective channel. One such
example is sending an email to all, informing that staff buses will leave early through alternate
route due to sudden heavy rainfall and water-clogged roads.
Efficient housekeeping should be ensured through trained and skilled staff. Carelessness during
cleaning and maintenance are causes of most common accidents. Housekeeping should have
clear guidelines for standard tasks and rules for safety. Storage of materials, movement and lifting
of heavy objects and use of cleaning equipment should be done in the safest possible manner.

227
Web Applications and Security 5
Preventing unauthorised access through restricted entry with the help of ID cards,
security checks, digital swipe cards, fingerprint scanners, CCTV cameras, alarm systems and
classified, secured areas greatly helps in most of the accidents because it keeps untrained and
unwanted hands at bay. Only required and skilled persons access the place who are aware of
importance of safety for everyone.
Safety guidelines during operations at production floors installed with machines should be
followed strictly. Movements around the machines (slow, vigilant and cautious), proper uniform
(no loose clothing), adequate gear (helmet, eye guards) and careful operation of the equipment
can prevent many accidents.
Risk assessment should be done regularly to understand who are at risk, potential dangers and
possible losses. Such assessments provide clear picture of the safety quality of the workplace and
help in devising effective preventive measures. Identifying safety exits and devising effective
evacuation plans are helped by thorough risk assessment.
Employing trained and skilful personnel ensures that major safety guidelines are taken care
of. Skilled and trained hands are educated in observing safety measures. Regular training of new
staff ensures that everyone at workplace knows how to keep self and others safe and what to do
when emergency occurs.
Discipline, alertness and care are the three basic qualities which help every individual in
maintaining common security. Attitude of the people is of importance here. If everyone is
motivated and encouraged to follow safety guidelines, observe carefulness in daily operations and
show care and concern for others then many mishaps can be avoided. A feeling of responsibility
and professionalism needs to be there in working personnel to cooperate in observing safety at
workplace. Such attitude strengthens the preventive measures otherwise all kinds of safety
measures are not enough to help.

EXERCISE
List any 4 different workplaces you might have seen and suggest how common accidents
can be prevented there.

Buddy System for Workplace Safety


This is an industry standard in workplace safety wherein two co-workers are paired as part of safety
management practice with the responsibility to ensure mutual safety at work place.
The practice of grouping employees so that each member of the work group is observed by at least one
other employee in the work group. The primary purpose of the buddy system is to provide instant aid to
employees in any emergent situation at workplace.
Buddy system is considered an important risk control measure by both government and non-
government organisations.
Pairing is done among the team members working on a same project or work site. In certain cases, one
person is given only the role of ensuring safety. This person is not supposed to carry out the task at hand
as it is done by the other partner. This arrangement is mostly used in the work that involves higher risks
such as working in hazardous environment and dangerous setup. Generally, both the partners carry
out the assigned task while ensuring each other's safety.
This system helps in the orientation of a new joiner in the team. The experienced employee guides the

228
5 Web Applications and Security
newcomer until s/he gets acclimatised with the work environment and risks involved. Later, the
newcomer can also play the role of safety-buddy with the same partner. This arrangement gives an
opportunity to the experienced employee to test his/her skills in doing the role of the buddy.
Buddy system is useful in:
l Reducing risk through safety assistance.
l Helps in monitoring for possible workplace risks and dangers.
l Advising to keep safe from potential exposure to hazards.
l Providing rescue assistance during emergency situations
l Providing instant help such as first aid, evacuation to safety if the partner is injured.
l Raising an alert or alarm to summon help in case of any accident.
Emergency Evacuation
In the event of any emergency such as fire, flood or any such disaster, an emergency evacuation
procedure is a must to ensure that everyone at the workplace is evacuated to safety with least harm
possible. Workplaces should set their own standard policies for handling
workplace emergencies. Employees should be made aware of the policy
and procedures of emergency evacuation. Suitable training, if needed, and
regular drills should be scheduled to assess how effective the emergency
plans are. Regular drills and training helps in preventing as well as handling
an emergency in time. It reduces panic among the people and helps them
use their heads instead of adding to chaos. Evacuation plan also helps in
eliminating or minimising the risks to injury and life.
General Emergency Evacuation Procedure
l Alert everyone by activating the nearest alarm and shout the alert clear and loud. Use any other
procedure set by the safety policy of the workplace.
l In response to the alarm or emergency call/shout out employees should immediately stop all
the work and collect personal valuables.
l Ensuring one's own safety, one should assist others who might be in immediate danger or need
any immediate aid.
l Ensuring one's own safety and if necessary, then check or curb any activity that may pose threat,
become hazardous or cause damage if left unattended during evacuation.
l Comply to the emergency instruction issued by designated control personnel until you reach to
the safety.
l Assist with the general evacuation if directed to do so by emergency control personnel.
l Follow emergency procedures and instruction to provide assistance to disabled, physically
challenged, elderly people.
l In case of fire, avoid taking elevator to evacuate a building. Use emergency staircase or any
stairs for that matter.
l Maintain strict discipline, keep calm and stay alert with your mind fully present on the current
situation until you reach the evacuation assembly area.
l Stay in the evacuation assembly area until the signal of all clear is conveyed by the authority.

229
Web Applications and Security 5
Emergency Evacuation Plan
Emergency evacuation plan includes:
l Floor plans of the building or workplace.
l Maps of emergency exit paths.
l Location of emergency equipment.
l System map of electricity connections, generator sites and exits (stairs, doorways etc.)

A Sample Evacuation Diagram

Emergency and Evacuation Policy


An evacuation policy should be in place depending on the type of workplace and nature or work
being carried out there. For instance, evacuation policy of a cola mine will be completely different
from that of a construction site or a hospital.
A standard emergency and evacuation policy:
l Clearly states the objectives and commitment regarding ensuring safety of everyone present on
the workplace.
l Describes any legislative requirement of the policy to address compliance to the local laws and
rules regarding safety of the employees.
l Includes detailed emergency and evacuation procedures, floor plans, escape route diagrams
and evacuation procedures.
l Describes the preparation plans, training procedures and general information system in place
to educate employees in handling emergencies and be part of evacuation process.

230
5 Web Applications and Security
l Lists the findings of the risk assessments and countermeasures of any risks.
l Includes the training and drill calendar for regular awareness on the workplace hazards,
emergencies and safety procedures.
l It states for whom the policy is meant for in what way. (E.g. children, elderly, disabled, patients,
management etc.)
l Includes work health safety measure observed by the workplace.
l Clearly defines specific procedures against each potential emergency.
l Describes the control hierarchy of individuals and designated chain of command for
emergency procedures to execute along with their duties and powers in such situations.
l Includes policy review plan to ensure that policy remains updated over the period of since it is
drafted or renewed last.

Session-12 Various Workplace Emergencies


Work-specific emergencies such as blasts, explosions, spills of hazardous material, breakdown,
crash etc.
Equipment or machine-related emergencies like sudden injury, cuts or bruises; body-part or
cloth stuck in the machinery, accidents related to turbines, boilers and chemical plants; crashes
and accidents by moving objects – vehicles, lifts, trolleys and carts etc.
Natural calamities also add to emergencies sometimes or increase the chances of accidents, for
instance, heavy rainfall at a construction or mining site, earthquakes, extreme temperature conditions
(too hot regions, too cold regions) and extreme weather conditions (hurricanes, storms).
Civil or behavioural emergencies such as conflict and violence at workplace, strike or hostile
crowd, unauthorised access to restricted area, rogue or disgruntled employee, sabotage by
competitor or adversaries are some major causes that pose threat to the safety of the work-force.

231
Web Applications and Security 5
Health related emergencies can occur at common workplaces like a desk and chair as well as
dangerous work environments like chemical plants, mines, oil-rigs and medical research labs etc.
Workers in factories may be exposed to smoke, poisonous gases, extreme heat, extreme cold,
radiations, intense lighting, high decibel noise and extreme physical exertion. Careful, efficient and
regular safety measures can only protect workers from the impending harm.
Workspaces during a pandemic: Due to the recent COVID-19 pandemic, the entire world had
almost come to a halt. Still, as of this writing, the threat still looms and we are forced to practice
strict safety measures since no definite cure has been devised. The workplaces need to be kept safe
during this pandemic as the lockdown has been relaxed and world business and economy are
resuming back to normal. During this time, safety measures mandated by the government
agencies need to be observed strictly such as social distancing, using masks, regular sanitising and
following other related safety measures to keep infection at bay. Workplaces need to ensure that
employees follow the safety rules strictly and if not there should be suitable penalties to set serious
examples. While commuting between our residence and workplace, we need to follow safety
guidelines as we move on crowded places and closed places such as buses and other means of
public transport.

Protect Health and Safety at Work


Health is one of the prime concerns for an efficient and productive work-force. Employees with
sound health and fitness can give desired output from the assigned tasks and projects. Workplaces
that are prone to obvious health-related emergencies need specialised measures of safety. We have
discovered earlier some common health related emergencies are smoke, poisonous gases, extreme
heat, extreme cold, radiations, intense lighting, high decibel noise and extreme physical exertion etc.
Hazards and their sources: Hazards cause physical damage and health related emergencies for
the workers. Certain hazards do not seem harmful initially until their prolonged exposure results
into evident damages. For instance, prolonged working hours at a desktop computer may lead to
physical stress, muscle strain, vision-related ailments and bone-joints related problems. Another
instance is exposure of mine workers to a colourless and odourless poisonous gas which slowly
damages the lungs or skins causing skin and respiratory disorders. A lung disease called
pneumonoultramicroscopicsilicovolcanokoniosis (pro: new-mono-ultra-my-kro-skopic…siliko-
volkano-ko-neo-sys) is caused by inhaling fine silica particles of ash or dust in the workers involved
in areas like thermal plants, furnaces or places affected by dust-storms and volcano ashes. Some
hazards types and sources are listed here:
Ergonomic: Incorrect posture, prolonged work hours, improper use of equipment, careless usage
and sometimes poor product design lead to damages caused in muscles and body joints.
Work environment: Noisy workplaces, poor lighting, inadequate setup of work area, over-
crowded places, longer than usual working hours, poor work ethics, work-floor politics,
exploitation, bullying, poor work policies and underpaid jobs are the examples of non-conducive
work environment which causes distress, physical ailments, poor health, and psychological
disorders.
Chemical and physical: Exposure to hazardous chemicals in the form of liquids, gases and
radiations leads to poisoning, skin diseases, respiratory disorders, vision-related ailments and
sometime mortal diseases like cancer and even sudden death. Physical dangers include places that
are dangerous for human life which are prone to collapse of walls, sudden fall, crushing under
heavy objects, vehicular accidents, electrocution, fire outbreaks, flooding etc.

232
5 Web Applications and Security
Countermeasures to Hazards
Risk assessment: Analysing and assessing risk factors to identify possible risks and potential
dangers help in devising effective safety measures.
Emergency plans: Emergency exits and general evacuation procedures should be in place to
ensure safety when sudden emergency strikes. Trained personnel and educated staff make the
emergency plan execution efficient.
Regular checks and tests: Regular monitoring of workplaces, mock drills, quizzes and awareness
sessions empower the workers in managing themselves and help others during emergency.
Healthy Living
Workplace safety is the combined responsibility of the organisation and workers. But, as an
individual one should take care of one's health and physical wellbeing. A working person should
follow some sort of health discipline and fitness regime. Depending on the nature of work, daily
routine and available time, one should devise a plan related to diet, physical health and mental
strength. Some common ways to healthy living are listed here:
Mild exercises: They help in keeping fit and get rid of physical stress.
Yoga, good reading and meditation: These are the ways to keep mental stress at bay and develop
a positive mind set. A strong and positive mind develops impressive physical appearance too.
Sports, jogging and gym: Some people play some sports, go for jogging or visit gym regularly as
a hobby to keep fit. Playing a sport that involves physical exercise, running and any game like
chess, sodoku etc. that tweaks one's mental faculties are best practices to stay healthy.
Healthy eating: Eating almost everything one likes but in right measure and frequency is the key
to healthy eating. Having some sort of discipline in eating brings out good physical results and add
to the impressive personality. Avoiding temptations like indulgence in drinking and smoking is
good. An occasional cheers is no harm but smoke and joints should be a big and strict no-no!
Basic human values: Observing basic human values such as humility, respectfulness, respecting
other's perspectives, avoiding fruitless conflicts, being considerate, developing civic sense, clean
and good habits make you strong from inside and develop an effective and positive outlook.

EXERCISE
1. How do you ensure a healthy living being a student?
2. What is the importance of safety at workplace?
3. Describe some safety issues at school and how to prevent them?
4. Describe some common safety hazards.
5. What is a first aid kit? What is its significance? What are the contents of a standard
FAK?
6. Describe computer related ergonomics?
7. How can we prevent common accidents at workplace?
8. What are various types of workplace emergencies? Describe any 2.
9. What are some health hazards at workplaces?
10. How do sports and basic human values help in healthy living?

233
Web Applications and Security 5
WRITER: Shortcut Keys for Moving and Resizing Frames,
Graphics and Objects
Keyboard
Function
Shortcut

Esc Cursor is inside a text frame and no text


is selected: Escape selects the text frame.
Text frame is selected: Escape clears the
cursor from the text frame.

F2 or Enter or any key that produces If a text frame is selected: positions the
a character on screen cursor to the end of the text in the text
frame. If you press any key that produces
a character on screen, and the
document is in edit mode, the character
is appended to the text.
Alt+Arrow Keys Move object.
Alt+Ctrl+Arrow Keys Resizes by moving lower right corner.
Alt+Ctrl+Shift+Arrow Keys Resizes by moving top left corner.
Ctrl+Tab Selects the anchor of an object (in Edit
Points mode).

Shortcut Keys for Paragraphs and Heading Levels LibreOffice Writer

Keyboard
Function
Shortcut
Ctrl+Alt+Up Arrow Move the active paragraph or selected
paragraphs up one paragraph.
Ctrl+Alt+Down Arrow Move the active paragraph or selected
paragraphs down one paragraph.
Tab The heading in format "Heading X" (X = 1-9)
is moved down one level in the outline.
Shift+Tab The heading in format "Heading X" (X = 2-10)
is moved up one level in the outline.
Ctrl+Tab
At the start of a heading: Inserts a tab stop. Depending on the Window Manager in use,
Alt+Tab may be used instead.
To change the heading level with the keyboard, first position the cursor in front of the
heading.

Shortcuts 247 Information Technology NSQF Level-2


CALC: Common Keyboard Shortcuts
Keyboard
Function
Shortcut
Ctrl + N Create a new workbook
Ctrl + O Open an existing workbook.
Ctrl + S Save the active workbook.
Ctrl + Shift + S Open Save as dialog box.
Ctrl + Q Quit Calc.
Ctrl + C Copy the contents of the selected cells to Clipboard.
Ctrl + X Cut the contents of the selected cells to Clipboard.
Ctrl + V Insert the contents of the Clipboard into the selected cell(s).
Ctrl + Z Undo your last action. Panic button :)
Ctrl + P Open the "Print" dialog.
Shift + F3 Cycle case for selected text.
Ctrl + F5 Show/Hide Side bar.
Tab Autocomplete any function name. Example: Enter = and start typing av, press
Tab and you will get =average(
Ctrl + ` Toggle between displaying cell values and formulas.

Ctrl + F1 Show/hide the Excel Ribbon. Hide the ribbon to view more than 4 rows of data.
Ctrl + Tab Switch to the next open Excel workbook.
Ctrl + PgDown Switch to the next worksheet. Press Ctrl+PgUp to switch to the previous sheet.
Ctrl + H Display “Find and Replace” dialog box.
Ctrl + F Display the "Find" dialog box.
Ctrl + Home Move to the beginning of a worksheet (A1 cell).
Ctrl + End Move to the last used cell of the current worksheet, i.e. the lowest row of the
rightmost column.
F2 Edit the current cell.
Ctrl + Enter In cell editing mode, enter a new line (carriage return) into a cell.
Ctrl + ; Enter the current date. Press Ctrl + Shift + ; to enter the current time.
Ctrl + Shift + V Open the "Paste Special" dialog when clipboard is not empty.
Ctrl + Y Repeat (Redo) the last action, if possible.
Ctrl + A Select the entire worksheet.
Ctrl + Space Select the entire column.
Shift + Space Select the entire row.

Shortcuts 248 Information Technology NSQF Level-2

You might also like