Computer Science 9 (Eng)
Computer Science 9 (Eng)
guru/
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
LESSON
1 MS Excel Part-I
Objective of this Lesson
1.1 Formatting Cells
1.1.1 Merge and Centre
1.1.2 Number Group
1.1.3 Styles
1.1.3.1 Conditional Formatting
1.1.3.2 Formatting as Table
1.1.3.3 Cell Styles
1.2 Cells
1.3 Editing
1.3.1 Formulas & Functions
1.3.1.1 Auto Sum-Functions (Sigma)
1.3.1.2 More inbuilt Functions (Only Names)
1.3.1.3 Library Functions
1.3.2 Sorting & Filters
1.3.3 Find & Replace
Introduction
We know that Microsoft Excel is used to calculate mathematical and scientific
calculations. An Excel Workbook consists of many worksheets that are used to
perform these calculations. A worksheet is made up of Rows and columns.
Intersection of a Row and Column generate a cell.
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
The "Format Cells" window can be opened in from the right-click menu. In Excel
formatting options are available on the Home Tab on the Font, Alignment, and
Number groups. To see formatting options not displayed, click the little arrow
(called launcher) in the lower right corner of the group and the "Format Cells"
window displays as shown in fig. 1.1
Fig. 1.1
Fig. 1.2
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
4. Click the Alignment tab of Format Cells dialog box and place a checkmark in
the checkbox labeled Merge cells as shown in fig. below :
Fig 1.5
To merge a group of cells and center the text, we can also use the Merge and
Center button on the Excel tool bar. Let's study about this :
Steps :
1. Highlight or select a range of cells. Click the Merge and Center button on the
toolbar as shown in fig 1.6
Fig. 1.6
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Clicking this button will automatically merge our highlighted cells and center the
cell value.
Fig. 1.7
Format Description
General It is the default number format in Excel when a number is typed in
a cell.
Number It is used for the general display of numbers. You can specify the
number of decimal places that you want to use.
Currency It is used for general monetary values and displays the default
currency symbol with the numbers you type in cells.
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Format Description
Accounting Also used for monetary values, but it aligns the currency symbols
and decimal points of numbers in a column.
Date It displays date and time serial numbers as date values, according
to the type and the location that is specified.
Time It displays date and time serial numbers as time values, according
to the type and location that is specified.
Percentage Multiplies the cell value by 100 and displays the result with a
percent (%) symbol. You can specify the number of decimal places
that you want to use.
Fraction Displays a number as a fraction, according to the type of fraction
that you specify.
Scientific It displays a number in exponential notation,when you enter the
number which length is longer than 11 digits.
Text It treats the content of a cell as text and displays the content exactly
as you type it, even when you type numbers.
Special It displays a number as a postal code, phone number etc.
Custom It allows you to modify a copy of an existing number format code.
Fig. 1.8
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Conditional formatting applies one or more rules to any cells we want. For
example we want to apply a rule if the cell value is greater than 80 then color the cell
Red. By applying this rule to the cells in a worksheet, we'll be able to see which cells
are more than 80.
How to create a conditional formatting rule : If we want to highlight the cells
having value move then desired value. We can use conditional formatting in the
following example we will set the cell value more than 80 using conditional
formatting.
Highlight Cells Rules : To highlight cells that is greater than a value. Steps are as
follow :
1. Type the data in our worksheet as shown in fig. 1.9 below.
2. Select the range A1:A10.
Fig. 1.9
3. Now go to Home Tab as shown in fig 1.10 click Conditional Formatting Ù
Highlight Cells Rules Ù Greater Than
Fig. 1.10
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
4. Enter the desired value 80 and select a formatting style as shown in fig. 1.11
Fig. 1.11
5. Click on OK
Now Excel will highlight the cells with Red color that are greater than 80.
Fig. 1.12
Fig. 1.13
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Just like regular formatting, tables can help to organize our content and make it
easier for us tofind the information we need. To use tables effectively, we'll need to
know how to format information as a table, modify tables, and apply table styles.
To format information as a table :
1. Type the data in worksheet as shown in the fig. 1.14 below.
2. Select the cells we want to format as a table. In this example, an invoice, we'll
format the cells containing the column headers and order details.
Fig. 1.14
3. Click the Format as Table command in the Styles group on the Home tab.
Fig. 1.15
4. A list of predefined table styles will appear as shown in fig. 1.16 . Click a table
style to select it.
Fig. 1.16
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
5. A dialog box will appear as per fig 1.17 confirming the range of cells we have
selected for our table. The cells will appear selected in the spreadsheet and the
range will appear in the dialog box.
6. If necessary, change the range by selecting a new range of cells directly on
your spreadsheet.
7. If our table has headers check the box next to My table has headers as shown
in fig. 1.17 below.
Fig 1.17
8. Click OK. The data will be formatted as a table in the style we chose as shown
in fig. 1.18.
Fig. 1.18
☛ Tables include filtering by default. We can filter our data at any time using the
drop-down arrows in the header.
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Microsoft Office Excel has several built-in cell styles that we can apply or modify.
We can also modify or duplicate a cell style to create our own such as custom cell
style.
Cell styles are based on the document theme that is applied to the whole
workbook. When you switch to another document theme, the cell styles are updated
to match the new document theme.
Applying a cell style :
1. Type the data in our worksheet as show in fig. 1.18
2. Select the cells that we want to format.
3. On the Home tab, in the Styles group, click Cell Styles.
Fig. 1.19
☛ If we do not see the Cell Styles button, click Styles, and then click the more
buttons next to the cell styles box as shown in fig. 1.20
Fig. 1.20
4. Click the cell style that we want to apply. Our data will be changed according
to our selected style.
10
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
To insert new cells, rows, or columns in an Excel worksheet, follow these steps :
1. Select the cells, rows, or columns where we want the new blank cells to
appear.
Fig 1.21
2. Click the drop-down arrow attached to the Insert button in the Cells group of
the Home tab.
Fig. 1.22
3. Click Insert Cells on the drop-down menu as show in fig. 1.23.
Fig. 1.23
11
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Shortcut Method :
➥ To quickly insert an entire column or row into the worksheet, we can right-
click the column letter such as A, B, C, D or row number such as 1, 2, 3, 4 on
the worksheet window frame and then select Insert from the shortcut menu
➥ We should keep in mind that inserting entire columns and rows affects the
entire worksheet, not just the part we see.
Fig. 1.24
12
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. Click the drop-down button attached to the Delete button in the Cells group of
the Home tab as shown in fig. 1.25
4. Click Delete Cells on the drop-down menu.
Fig 1.25
The Delete dialog box opens, showing these options for filling in the gaps:
Fig. 1.26
➥ Shift Cells Left : It moves entries from neighboring columns on the right to
the left to fill in gaps created when we delete the cell selection. This is the
default option.
➥ Shift Cells Up : It moves entries up from neighboring rows below.
➥ Entire Row : It removes all the rows in the current cell selection.
➥ Entire Column : It deletes all the columns in the current cell selection.
Shortcut Method :
➥ If we want to quickly delete an entire column or row from the worksheet, we
can right-click the column or row label and select Delete from the shortcut
menu
13
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
➥ By deleting entire columns and rows from a worksheet is risky unless we're
sure that the columns and rows contain no value.
How to Insert New Worksheets ?
As we can add new cells/row/columns in our existing worksheet, we can also
add a new worksheet in our current workbook. For this click the Insert Worksheet
icon as shown in fig. 1.27 below. A new worksheet will appear.
Fig. 1.27
We can change the setting for the default number of worksheets that appear in
Excel workbooks. To do this click on the worksheet we want to keep in arrange. Now
keep pressing the left button of our mouse and drag that worksheet to desired
location, release the mouse button when its done.
How To Delete Worksheets/worksheet ?
A Single Worksheet or Worksheets can be deleted from a workbook, including
those containing data. Following are the steps for this:
1. Select the worksheet/worksheets we want to delete.
2. Right-click one of the selected worksheets. The worksheet menu appears as
shown in fig. 1.28
3. Select Delete. The selected worksheets will be deleted from our workbook.
Fig 1.28
14
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Cell Size : When we open a new blank workbook, the cells are set to a default size.
We can modify size of cells according to our requirement. We will learn how to
change row height and column width.
Fig. 1.29
Working with columns, rows, and cells : By default, every row and column of a
new workbook is set to the same height and width. We can modify column width
and row height in different ways in Excel.
How to modify column width ?
1. Place our mouse over the column line in the column heading so the white
cross becomes a double arrow as shown in fig. 1.30
Fig. 1.30
15
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
2. Click and drag the column to the right to increase column width or to the left
to decrease column width as shown in fig. 1.31
Fig. 1.31
3. Release the mouse. The column width will be changed in your spreadsheet as
shown in fig. 1.32
Fig 1.32
☛ When we have entered data in a cell and If you see Hash signs (#######) in a
cell, it means that. the column size is not fit enough to display the cell content.
Simply in crease the column width to adjust the cell content.
16
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.33
4. The Column Width dialog box appears. Enter our specific measurement.
Fig 1.34
5. Click OK. The width of each selected column will be changed in our
worksheet.
☛ Select AutoFit Column Width from the format drop-down menu and Excel
will automatically adjust each selected column so all of the text will fit.
17
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.35
2. Click and drag the row downward to increase row height or upward to
decrease height as shown in fig. 1.36
Fig 1.36
3. Release the mouse. The height of each selected row will be changed in our
worksheet as shown in fig. 1.37
Fig. 1.37
18
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig 1.38
Fig. 1.39
19
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
5. Click OK. The selected rows heights will be changed in your spreadsheet.
☛ Select AutoFit Row Height from the format drop-down menu and Excel will
automatically adjust each selected row so all of the text will fit.
1.3 EDITING
1.3.1 Formulas & Functions
We know that Excel is used to calculate numerical information. In this part, we
will learn how to create simple formulas in Excel to add, subtract, multiply, and
divide values in a workbook.
We will also learn how to make a formula easy and effective by using Cell
reference.
To maximize the capabilities of Excel, it is important to understand how to create
simple formulas.
Fig 1.40
2. Type the equals sign (=).
20
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.41
4. Press Enter. The formula will be calculated, and the value will be displayed in
the cell.
Fig. 1.42
Creating formulas with cell references : When a formula contains a cell address,
it is called a cell reference. Creating a formula with cell references is useful because
you can update data in our worksheet without having to rewrite the values in the
formula. Let's learn how to create a formula using cell reference :
To create a formula using cell references :
1. Select the cell where the answer will appear (for example F3).
2. Type the equals sign (=).
21
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. Type the cell address that contains the first number in the equation (for
example D3).
Fig 1.43
4. Type the operator we need for our formula. For example, type the addition
sign (+).
5. Type the cell address that contains the second number in the equation (for
example E3).
Fig. 1.44
6. Press Enter. The formula will be calculated, and the value will be displayed in
the cell.
Fig. 1.45
22
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.46
Fig. 1.47
23
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.48
☛ If we want to cancel the changes made, use the Cancel command in the
formula bar.
Cell Reference : Cell Reference is very important in Excel. In Excel, Cell Reference
is termed to calculate important calculations by using a cell or a range of cells for a
formula to calculate the result of the formula in a worksheet. We can use a cell
reference for a single formula or for multiple formulas. Let's learn about it in detail :
Types of Cell Reference :
1. Relative Reference.
2. Absolute Reference.
3. Mixed Reference.
Fig 1.49
24
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. Drag the fill handle of cell C1 as shown in fig. 1.50, we will see that the
formula becomes in cell C2=A2+B2.
Fig. 1.50
Fig. 1.51
1. Type data in a worksheet as shown in fig 1.50
2. Now type our formula in cell C1=$A$1+B1
3. Drag the fill handle of cell C1 as shown in fig. 1.51, we will see that the
formula becomes in cell C2=$A$1+B2. We will notice that cell address in
formula remain constant as C2=$A$1.
Fig 1.52
25
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.53
Fig 1.54
26
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.55
2. Type the equals sign (=), then enter the function name (SUM, for example).
27
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig 1.56
Fig. 1.57
Fig. 1.58
28
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
4. A formula will appear in J3, the selected cell. If logically placed, AutoSum will
select our cells for us. Otherwise, we will need to click the cells to choose the
argument we want.
Fig 1.59
5. Press Enter, and the result will appear.
☛ The AutoSum command can also be accessed from the Formulas tab.
2. LOGICAL FUNCTIONS :
IF This Function tests a user-defined condition and returns one
result if the condition is TRUE, and another result if the
condition is FALSE
29
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.60
Fig 1.61
30
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.62
6. The Function Arguments dialog box will appear. Insert the cursor in the
start_date then enter or select the cell(s) you want (E3, for example).
Fig. 1.63
31
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
7. Insert the cursor in the End_date then enter or select the cell(s) we want (F3,
for example).
Fig. 1.64
Fig. 1.65
8. Click OK, and the result will appear. Our results show that it took 10 days to
deliver the order.
Fig. 1.66
32
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.67
Fig. 1.68
3. Select the Data tab, then locate the Sort and Filter group.
4. Click the ascending command to Sort A to Z or the descending command
to Sort Z to A as shown in fig. 1.69
33
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.69
Fig. 1.70
☛ Sorting options can also be found on the Home tab, condensed into the Sort &
Filter command.
Filtering data : Filter is a tool in MS Excel that is used to get the information
according to our requirement. When we need to find special information from a list,
then we use Filter. Filters can be applied in different ways to improve the
performance of our worksheet. We can filter text, dates, and numbers. We can even
use more than one filter to further narrow our results.
34
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
How to filter data : In this example, we'll filter the contents of a shopkeeper. We'll
display only the Tea and Oil commodities that are delivered. Let's study how to do
this :
Steps :
1. Type the data in a worksheet as shown in the fig. 1.71 below :
Fig. 1.71
2. Select the Data tab, and then locate the Sort & Filter group.
3. Click the Filter command.
Fig 1.72
35
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 1.73
Fig. 1.74
36
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
9. Click OK. All other data will be filtered, or temporarily hidden. Only Tea and
Oil will be visible.
Fig. 1.75
☛ Filtering options can also be found on the Home tab, condensed into the Sort
& Filter command.
To clear a filter : We can clear a filter very easily. To do so, following are the step :
1. Click the drop-down arrow in the column from which we want to clear the
filter.
2. Choose Clear Filter From.
Fig 1.76
3. The filter will be cleared from the column. The data that was previously
hidden will be on display once again.
☛ To instantly clear all filters from our worksheet, click the Filter command on
the Data tab.
37
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
How to use Find Option : Following are the steps to locate data in a worksheet :
1. Choose Find & Select in the Editing group on the Home tab, and then select
Find (or press Ctrl+F).The Find and Replace dialog box appears with the Find
tab on top.
2. In the Find What box, enter the data we want to locate as shown in fig. 1.79.
Fig 1.79
Click the Options button to expand the dialog box and specify any desired
options.
➥ Within : It searches just the current worksheet or the entire workbook.
➥ Search : It selects whether to search first across the rows or down the columns.
➥ Look In : It selects whether we want to search through the values or formula
results, through the actual formulas, or if we want to look in the comments.
➥ Match Case : It checks this box if we want our search to be case-specific.
38
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
➥ Match Entire Cell Contents: It checks this box if we want our search results to
list only the items that exactly match our search criteria.
Fig 1.80
3. Click Find Next.
Excel jumps to the first occurrence of the match. If this is not the entry we're
looking for, click Find Next again.
Click Close when we've located the entry we want.
Using Replacing data Option : Replace option is used to change data according
to our requirement. We can change each entry of a cell while typing on, but it require
more time and labour so we can do it easily using Replace option. To find and
replace data in a worksheet, follow these steps :
1. Choose Find & Select in the Editing group on the Home tab, and then select
Replace (or press Ctrl+H).The Find and Replace dialog box appears with the
Replace tab on top.
39
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig 1.83
Things to Remember
1. Microsoft Excel is used to calculate mathematical and scientific calculations.
2. By applying different number formats, we can change the appearance of a
number without changing the number itself.
3. Formatting can not only improve the look of our spreadsheet, but it also can
make it easier to use.
4. If we need to add new data within an existing worksheet, we can insert new
cells, columns, or rows in the worksheet.
40
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Exercise
1. Fill in the Blanks :
1. An Excel Workbook consists of .......................... .
(a) Worksheets (b) Rows (c) Columns (d) Formulas
41
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
42
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
LESSON
2 MS Excel Part-II
Objective of this Lesson
2.1 Charts
2.1.1 Inserting Charts
2.2 Equations and Symbols
2.2.1 How to insert equations and symbols
2.3 Pivot Table
2.3.1 Data Tools
2.3.1.1 Text to Columns
2.3.1.2 Data Validation
2.3.1.3 What if analysis
2.4 Protection
2.4.1 Protect Sheet
2.4.2 Protect Workbook
2.5 View Tab
2.5.1 Split
2.5.2 Freeze
2.5.3 Hide and Unhide
2.5.4 Macros
Introduction
A chart is a tool in MS Excel that is used to communicate our data graphically. A
chart can allow us to know the meaning behind our data. We can use these charts to
make comparisons much easier.
2.1 Charts
An Excel workbook can contain a large amount of data. So it is difficult for us to
interpret this data. For example if we have numbers in our worksheet and we want
to know the highest and lowest numbers from these numbers. So we can do it clearly
by representing this data as a chart. Excel has various types of charts, so we can
choose one that most effectively represents our data.
43
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
44
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Result :
45
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Result :
1. Select the chart. We will notice that the Chart Tools contextual tab is activated
as shown in fig. 2.5
46
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Result :
3. We will see a caption (Chart Title) above our chart. Enter our desired title. For
example, Match Analysis.
47
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Result :
48
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
8. Chart text : It is a label or title that we add to our chart. Attached text is a title
or label that is linked to an axis such as the Chart Title.
1. Click the Insert tab and then click the Symbol button in the Symbols group.
The Symbol dialog box appears. The Symbol dialog box contains two tabs:
Symbols and Special Characters.
49
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
2. Select the desired symbol on the Symbols tab; or click the Special Characters
tab and select the desired character. Notice that the most recently used
symbols appear near the bottom of the Symbols tab.
The Symbol dialog box stays open so we can insert a string of special
characters without having to re-open the dialog box for each one.
4. Click close when we're done adding symbols and special characters.
When we have a lot of data, it is difficult to analyze it all. The data in a worksheet
can be easily managed by using PivotTables. We can summarize the data. Pivot
Table allows us to manipulate it in various ways. PivotTables are very helpful tool
when we have to deal with large and complex spreadsheets. We can use it with
smaller spreadsheets also.
Let us lean the use of Pivot Tables with the help of example below.It contains
sales statistics for a Company. There is a row for each order, and it includes the order
amount, name of the Employee who made the sale, month, Area of Sale, and
account number.
50
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Suppose we want to know what is the amount sold by each Employee? This is a
time consuming process because each employee appears on multiple rows, and we
would need to add all of the order amounts for each employee.
A PivotTable is very helpful in doing these calculations. We can do calculations
and summarize the data in a way that's not only easy to read but also easy to
manipulate. When we're done, the PivotTable will look something like this :
51
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
As we can see that the PivotTable is much easier to read. It only takes a few steps
to create one.
3. The Create PivotTable dialog box will appear. Make sure the settings are
correct, then click OK.
52
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
4. A blank PivotTable will appear on the left, and the Field List will appear on
the right.
53
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Just like with normal spreadsheet data, we can sort the data in a PivotTable using
the Sort & Filter command on the Home tab. We can also apply any type of
formatting we want.
54
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
6. Click Finish.
55
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Result :
How to Create Data Validation Rule : To create a data validation rule, the steps
are as follows :
1. Type the data in our excel worksheet as shown in the fig 2.24.
2. Select cell C2.
56
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Input Message : Input messages appear when the user selects the cell and tell the
user what to enter.
On the Input Message tabas shown in the figure 2.26 below do the following:
1. Check 'Show input message when cell is selected'.
2. Enter a title.
57
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Error Alert : If users ignore the input message and enter a number that is not
valid, we can show them an error alert.
On the Error Alert tab as shown in the figure 2.27 below do the following:
1. Check 'Show error alert after invalid data is entered'.
2. Enter a title.
3. Enter an error message.
4. Click OK.
58
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Data Validation Result : To check our Data Validation result follows the steps as
below :
1. Select cell C2.
2. Try to enter a number higher than 10.
Result :
☛ To remove data validation from a cell, select the cell, on the Data tab, click
Data Validation, and then click Clear All.
59
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
What-If Analysis in Excel allows us to try out different values (scenarios) for
formulas. In MS Excel a scenario is a set of values that saves and can substitute
automatically on our worksheet. The following example will guide us to understand
what-if analysis quickly and easily.
Assume we own a Computer Shop and have 50 computers in storage. We sell
some number of computers for the highest price of Rs. 25000 and a certain for the
lower price of 12000.
25000
22000
1190000
If we sell 60% for the highest price, cell C9 calculates a total profit of 30 * 25000 +
20 * 22000 = 1190000
How to Create Different Scenarios : Suppose you want to know your profit if
you sell 70% of your computers for the highest price? and so on…Now for your each
different percentage there is a different scenario. For doing so you can use the
Scenario Manager to create these scenarios. Let's understand how to do this :
1. On the Data tab, click What-If Analysis and select Scenario Manager from the
list as shown in fig 2.31
60
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
61
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
☛ To see the result of a scenario, select the scenario and click on the Show button.
Excel will change the value of cell B4 accordingly for you to see the
corresponding result on the sheet.
62
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Scenario Summary : After creating your required Scenarios, to easily compare the
results of these scenarios following are the steps below :
1. Click the Summary button in the Scenario Manager.
2. Next, select cell C9 (total profit) for the result cell and click on OK.
Result :
Result : If you sell 70% for the highest price, you obtain a total profit of Rs.
1205000, if you sell 80% for the highest price; you obtain a total profit of Rs. 122000,
etc.
63
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
64
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Result : You need to sell 80% of the Computers for the highest price to obtain a
total profit of exactly Rs. 1220000.
2.4 Protection
In simple words Protection means to keep our stuff safe from misuse from an
authorised person. In Excel we can protect our workbook/worksheet.
65
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. Enter a password.
4. Check the actions we allow the users of our worksheet to perform.
5. Click OK.
☛ If we don't check any action, users can only view the Excel file.
6. Confirm the password and click OK.
66
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
67
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Users cannot insert, delete, rename, move, copy, hide or unhide worksheets
anymore.
68
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
☛ To unprotect the workbook, click Protect Workbook and enter the password.
The structure and window of this workbook are protected.
2.5.1 Split
In simple words Split means to break a large object into small parts so that the job
is easy to do. In Excel we can split our worksheet that contains a large volume of data,
so that we could compare it if necessary.
How to Split Worksheet : In Excel we can split the worksheet window into
separate panes and scroll the worksheet in each pane so that we can easily compare
data from two separate worksheet locations. We can make the panes in a workbook
window disappear by double-clicking anywhere on the split bar that divides the
window.
69
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
1. Click the split box above the vertical scroll bar as shown in fig. 2.53
70
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. Notice the two vertical scroll bars. For example, use the lower vertical scroll
bar to move to row 12. As we can see, the first 12 rows remain visible.
4. To remove the split, double click the horizontal split bar that divides the panes
(or drag it up).
☛ In a similar way, we can use the split box to split our window into four panes.
2.5.2 Freeze
Freeze means to make a thing stable or stop the movement. In Excel Freeze means
to stop the movement of a particular row or column while scrolling a spreadsheet.
71
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
columns. This way we can keep rows or columns visible while scrolling through the
rest of the worksheet. In this part we will learn how to freeze top row of your
worksheet :
Freeze Top Row : To freeze the top row, execute the following steps.
1. On the View tab, click Freeze Panes, Freeze Top Row as shown in fig. 2.56
Result : Excel automatically adds a black horizontal line to indicate that the top
row is frozen.
72
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
How to Unfreeze Panes of your worksheet : To unlock all rows and columns,
execute the following steps.
1. On the View tab, click Freeze Panes, Unfreeze Panes as shown in fig. 2.58
We can freeze both row and column simultaneously using freeze panes option.
We can easily read the data of rows column white scrolling.
73
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Hiding Rows : In desired spreadsheet select the rows (for multiple selection hold
Ctrl key and keep selecting) we want to hide and navigate to Home tab.
From Cells group, click Format button. Now from Hide & Unhide options, click
Hide Rows.
74
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Upon click it will automatically hide the selected rows. The rows 4 to 12 numbers
are now hidden.
Hiding Columns : For hiding the columns in specific sheet, following are the steps :
1. Select the columns we want to hide as shown in fig. 2.62 column E to Column
J have been selected.
2. Now click on Format button in Cells group. Now Click on Ù Hide & Unhide
options then click Hide Columns.
75
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. We will notice that column from E to Column J have been hidden as shown in
fig. 2.62. You will notice that the selected column are hidden in fig. 2.63.
2. Now Click Hide Sheet from Hide & Unhide options from Cell group in
Home Tab as show in fig. 2.65.
76
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. Click on Hinde Sheet Option from Hide and Unhide as shon in fig. 2.65. We
will notice that upon click the whole sheet will be hidden.
How to Unhide Rows, Columns, and Sheets : For getting back the hidden sheets,
rows and columns, click Format, and click on Unhide Rows/Unhide Column/
Unhide Sheet from Hide & Unhide options.
77
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
The easiest method for creating many macros is to use macro recorder. When we
record a macro Excel stores the information about each step you take as you perform
a series of commands. We then run the macro to repeat or play back the set of
commands.
The macro recorder records every action we complete. So before we start the
process of recording it is very important to plan macro- that what steps we need to
record.
1. Click the File tab and then click Options. The Excel Options dialog box
appears.
2. Click Customize Ribbon in the left pane, and then select the Developer check
box under Main Tabs on the right side of the dialog box see fig. 2.68.
78
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 2.69. Displaying the Developer tab to work with macros in Excel
79
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
4. From the Store Macro In drop-down list, select where we want to store the
macro :
➥ This Workbook : Save the macro in the current workbook file.
➥ New Workbook : Create macros that we can run in any new workbooks
created during the current Excel session.
➥ Personal Macro Workbook : Choose this option if you want the macro to
be available whenever we use Excel, regardless of which worksheet we're
using.
5. Type a description of the macro in the Description text box as shown in fig.
2.70.
6. Click OK. The Record Macro option on the Developer tab changes to Stop
Recording.
80
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Things to Remember
1. A chart is a tool in MS Excel that is used to communicate our data graphically.
2. PivotTables are very helpful tool when we have to deal with large and
complex spreadsheets.
3. Data validation is a powerful feature that is used to set up certain rules to
dictate what can be entered into a cell.
4. What-if analysis is a powerful tool to do some complex calculations like
calculating an unknown value.
5. The goal seek function is a part of what-if analysis tool set.
6. In Excel we can split the worksheet window into separate panes.
7. Excel automatically adds a black horizontal line to indicate that the top row is
frozen.
8. Excel has an excellent feature to hide the selected rows, columns, and sheets.
Exercise
1. Fill in the Blanks :
1. .......................... contains everything inside the chart window.
(a) Data markers (b) Axis (c) Chart area (d) None of these
81
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
82
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
LESSON
3 Networking
Objective of this Lesson
3.1 Networking
3.2 Need of Networking
3.3 Components of Computer Networks
3.4 Advantages and Disadvantages of Network
3.5 Network Topologies
3.6 Data Communication
3.7 Types of Networks
Introduction
The dynamic world today needs fast communication channels to move date
frequently form one place to another, so data transmission over distances has become
essential. To move the data quickly from one place to another, the concept of
networking has been introduced. In networking the computers from different parts
of the world are connected to each other to share data with each other.
3.1 Networking
A network is the group of two or more computers that are linked in order to
share resources (such as printers and CDs), exchange files, or allow communications.
Internet
VPN-Firewall
VPN-Router
83
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
The computers on a network may be linked through cables, telephone lines, radio
waves, satellites, or infrared light beams. Network is capable of sharing Software and
Hardware resources between many users
Network connections between computers are typically created using cables
(wires). However, connections can be created using radio signals (wireless/Wi-Fi),
telephone lines (and modems) or even, for very long distances, via satellite links.
Network
Printer File server
Switch
Email Chat
84
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3.3.1 Computer
The purpose of a network is to join computers together. For this to work the first
step in setting up a network is to identify computers and users who may wish to
participate in the network. The computers will also need to include software that
enables them to connect to the network.
There are two types of computers which are used for networking :
3.3.1.1 Client or Node
Client/Node is the normal computer system which is connected to network for
sharing of resources.
3.3.1.2 Server
It is a powerful computer. It helps in sharing of resources or information. It
controls all other nodes.
Server
Network
Client
Client
Fig 3.3. Client/Server
85
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Ethernet cable
Ethernet Port
3.3.3 HUB/Switch
A networking hub/Switch is a device that allows you to connect multiple
computers to a single network device. In its simplest form a hub works by
duplicating the data packets received via one port and making it available to all ports,
therefore allowing data sharing between all devices connected to hub
Server PC PC PC PC
86
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3.3.4 Router
A router is hardware device designed to receive, analyze and forward incoming
data within a network or to another network.
87
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
10. Speed : Sharing and transferring files within networks is very rapid,
depending on the type of network. This will save time while maintaining the
integrity of files.
HUB
Link
Node A Node B
(a) Link between two bevices (b) Link between two bevices
Fig. 3.8. Link vs Topology
88
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3.5.1 Topologies
While making a selection of a particular topology we consider the relative status
of different devices that are to be linked.
The nodes in a network can have following two relationships :
1. Peer to Peer : In this relationship, all the devices in the network have equal
status in sharing the link. For example, Ring & Mesh topology.
2. Client-Server (Primary-Secondary) : In this, one device controls the traffic
(called Server) and all other devices (Called Clients) transmit through primary
device. e.g. Star topology.
Topology
89
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
recipient, whose MAC address or IP address matches, accepts it. If the MAC /IP
address of machine doesn't match with the intended address, machine discards the
signal.
Terminator
T-Connector
90
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
either clockwise or anticlockwise around the ring. At the time of accepting data,
each node checks its address. If data is for that node only then it is received,
otherwise not.
There are two kinds of ring topologies :
1. Single Ring
2. Dual Ring
1. Single ring : In single ring network, a single cable is shared by all the devices
and data travel only in one direction.
Each device waits for its turn and then transmits. When the data reaches its
destination, another device can transmit.
2. Dual ring : This topology uses two rings to send the data, each in different
direction. Thus allowing more packets to be sent over the network.
Node 8
Node 7 Node 1
Node 6 Node 2
Node 5
Node 3
Node 4
Single ring topology
91
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
HUB
Computer
Computer
Computer
92
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Computer
Computer Computer
Computer Computer
Computer
93
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Central
Hub
Secondary Secondary
Hub Hub
94
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Bus
Hub
Star
Ring
95
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Message
Medium
Sender Receiver
Fig. 3.16. Data Communication
96
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Direction of data
Monitor
Mainframe
Fig. 3.18. Simplex Mode
2. Half duplex : In it information can flow in both directions but not at the same
time. In other words if information is sent by one system then second can only
receive it or vice versa as shown in figure 3.19. Example : walky-talky system
used by police and force.
Direction of
data at time 1
Direction of
data at time 2
Workstation Workstation
Fig. 3.19 Half-duplex Mode
Workstation Workstation
Fig. 3.20. Full-Duplex Mode
97
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
98
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
such as files or hardware devices that may be needed by multiple users. it Is limited
in size, typically spanning a few hundred meters, and no more than a mile. it is fast,
with speeds from 10 Mbps to 10 Gbps. it Requires little wiring, typically a single
cable connecting to each device. It has lower cost compared to MAN's or WAN's.
LAN's can be either wired or wireless. Twisted pair, coax or fiber optic cable can be
used in wired LAN's. It is suitable to bus, ring or star topology. In it generally coaxial
Cable, twisted pair and optical fiber etc. transmission media is used.
99
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
will be used by many individuals and organizations. A MAN often acts as a high
speed network to allow sharing of regional resources. A MAN typically covers an
area of between 5 and 50 km diameter. Examples of MAN: Telephone company
network that provides a high speed DSL to customers and cable TV network
Network
LAN Users
Switch
LAN LAN
Things to Remember
1. A network is the group of two or more computers.
2. Client/nodes is the normal computer system which is connected to network
for sharing of resources.
3. Hub is a device that allows you to connect multiple computers to a single
network device.
4. The term network topology defines the geographic arrangement of computer
networking devices.
100
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Exercise
1. Fill in the Blanks :
1. .......................... is s the group of two or more computers.
(a) Network (b) Internet (c) Wireless (d) Topology
4. In .......................... network, a single cable is shared by all the devices and data
travel only in one direction
(a) Single Ring (b) Dual ring (c) MAN (d) LAN
2. True/False :
1. LAN covers a large geographic area.
2. In full duplex, information can move in both directions
3. Protocol are rules under which data transmission takes palace
4. Network does not provide security to us.
5. The efficiency of network is increased with increase of computers.
101
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
102
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
LESSON
4 Introduction to DBMS
Objective of this Lesson
4.1 Terminology used in Database
4.2 Data and Information
4.3 What is Database?
4.3.1 Some Necessary instruction for designing a good database
4.4 Uses of Database Application
4.5 File Processing System
4.5.1 Drawback of file processing system
4.6 Dbms, advantages and disadvantages
4.7 DBA
4.8 Data Redundancy and Entity
4.8.1 Entities and their Attributes in DBMS
4.8.2 Types of Entities
4.8.3 Entity-Relationship Diagram
4.9 Keys in Database
4.10 Normalisation
4.11 Relationships
4.12 ORACLE, SQL,DB2
4.12.1 SQL
4.12.2 DB2
4.13 Data Model
Introduction
Before starting any new work there are so many questions in our mind like what,
why, and how ?
We are going to learn about DBMS in this chapter. Do you know about the
history of DBMS. Can you understand In real that what is DBMS ? Where it has been
used ?
103
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Let's discuss about the history of the DBMS. First of all the full form of the DBMS
is Database Management System .
First research for DBMS use was held in 1960 which was in the form of small
software A U.S. based company N.A.A. (North America Aviation) was created it
with the Name of GUAM (Generalize Update Access Method). GUAM was based on
small components, different components build it together so it was called a
hierarchical structure at that time.
From 1960 to 1970 on the basis hierarchical structure several researches was done
and in 1967 Conference on Data System Languages (CODASYL) created Task force
with the collaboration of the U.S. government and the big business personalities
which was called Database Task Force Group(DBTG).IN 1971 Network Database was
developed and later ones from time to time inventions come into existence after the
DBMS innovation was done and now we are easily using DBMS in our todays life
Records
Fig 4.1
➥ Record : In databases, a record is a group of related data held within the same
structure. Specifically, a record is a group of fields within a table that reference
one particular object. The term record is frequently used synonymously with
row. A record is also known as a tuple.
104
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
For example : a Student record may include items, such as first name, roll no,
address, email address, date of birth and gender.
➥ File : A file is a container in a computer system for storing information. Files
in computers fields are very similar in features to that of paper documents
used in library and office files. There are many kind of files such as text files,
data files, directory files, binary and graphic files, and these different types of
files store different types of information. Here we are giving our view on a
database file. It is a combination of records which are interrelate with each
other. For example Student File of 9th class. In this file we can store students
recast as serial number, student name, father's name, date of birth etc.
105
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
106
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. The database design is the main aspect of the database we can't ignore it if the
database design is not planned well a good program cannot get rid of facing
problems to run on it.
4. Database should be design while thinking about the future problem.
107
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
All files were grouped according to their categories; files uses only related
information's and each file is named properly. For example a Student information.
Student files for each class were bundled inside different folders to identify it quickly.
Now, if we want to see a specific Student detail from a file, what do we do ? We must
have to know which file will have the data, we open that file and search for his
details. Fine, here we see the files; we can open it and search for it. But imagine if we
want to display student details what we will do. It is really a difficult work to do..
Now how will we open a file, read or update it ? These kind of problems were arise
in file processing system. Now we are going to discuss the drawbacks of file
processing system as follows :
108
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
7. Concurrent Access : Accessing the same data from the same file is called
concurrent access. In the file processing system, concurrent access leads to
incorrect data.
4.6 DBMS
The full name of DBMS is data management system. To overcome all drawbacks
of file processing system, a new system called database management system was
developed. A database management system (DBMS) is system software for creating
and managing databases. The DBMS provides users and programmers a systematic
way to create, retrieve, update and manage data. A DBMS makes it possible for end
users to create, read, update and delete data in a database. The DBMS essentially
serves as an interface between the database and end users or application programs
ensuring that data is consistently organized and remains easily accessible. The main
function of a DBMS is to provide efficient and reliable methods of data retrieval to
many users.
User 1
User 3
109
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Disadvantages of DBMS :
➥ It is Complex you must have to get training to use the database
➥ However, the DBMS is written to be more general, to cater for many
applications rather than just one. The effect is that some applications may not
run as fast as they used to.
➥ Higher impact of a failure so there is every possibility of damaging the data
➥ The cost of DBMS varies significantly, depending on the environment and
functionality provided. There is also the recurrent annual maintenance cost.
➥ An extra hardware is needed.
➥ Conversion cost is very high of the DBMS. its not easy to move it here and
there.
➥ The complexity and breadth of functionality makes the DBMS an extremely
large piece of software, occupying many megabytes of disk space and
requiring substantial amounts of memory to run efficiently.
4.7 DBA
DBA stands for database administrator. DBA should be a person or bunch of
persons. Database administrator (DBA) directs or performs all activities related to
maintaining a successful database environment. Responsibilities include designing,
implementing, and maintaining the database system; establishing policies and
procedures pertaining to the management, security, maintenance, and use of the
database management system. In the end we can say that all the functions of
database are controlled by DBA.
Different types of DBA's according to their responsibilities are as follows :
1. Administrative DBA
2. Development DBA
3. Architect DBA
4. Data Warehouse DBA
110
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
4.8 Redundancy
A very large amount of duplicate data stores frequently in database in duplicate
form again and again and when same duplicate data stores again and again in
database it produce lot of problem so it is very tough experience to manage the data.
To frequently store an identical data again and again in database is called data
redundancy.
111
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Student
Fig. 4.7
112
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
4. Composite Key : Composite Key is the key which consists of two or more
attributes that uniquely identify an entity occurrence is called Composite key.
But any attribute that makes up the Composite key is not a simple key in its
own.
5. Foreign key : Foreign key is the key in rational database that provide link
between two tables because it references the primary key of the another table
and it established a link between them. Foreign keys are more difficult to
implement than primary key. SO we can say primary key of a first table is
called foreign key of other table.
Primary Key
4.10 Normalization
Without Normalization, it becomes difficult to handle and update the database,
without facing data loss if data is not normalized, Insertion, Updating and Deletion
Differences are very frequent.
Normalization is a scientific way in which difficult table is make quite simple in terms of
understandable by user. To reduce Redundancy from tables and to reduce database
Inconsistency or to remove and to make database strong. we should adopt some
rules written as follows but it should also keep in mind that at time of normalization
not any damage been done to information :
1. There should be an identifier in each table.
2. In each table single type of entity should be stored
3. Null value should store at minimum
4. Same Values that should take place use less frequently in database.
113
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
4.11 Relationships
Relationship allow relational database to split and store data in different tables.it
is a situation between two relational databases tables when one table has a foreign
key which was referred from the other tables primary key
Types of relationship are as under
One-to-One : One to one is implemented using single table by establishing
relationship between same type of column in table. Here one entity is associated with
many other entities.
One-to-many : One to many is implemented while using two tables with primary
and foreign key relationship . Here one entity is associated with many other entities .
Many-to-Many : Many to Many implemented using a junction table. The keys
from both the tables from composite primary key of the junction table. Many entities
are related with many other entities.
114
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig 4.11
SQL Advantages :
1. SQL is not only a high level language even we have to use it for maintain the
data, update data and controlling the data.
2. SQL provides the facility to a user to do work simultaneously in different
databases
3. Program build in SQL is portable means it is very easy to a user to move it
anywhere
4. SQL is an easy and simple language to learn and it use to make tough
programs.
4.12.2 DB2
DB2 is a database product which was design by IBM. It is a relational database
management System. DB2 is developed to store, to find to look and to get accurate
data from database. We will use DB2 for structural and non-structural data.
In starting DB2 was design by IBM for its own use in 1990. But later on it was
decided to make universal database DB2 Server that should be run on any operating
115
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
system like unix, linus and windows. SO a universal database system came into
existence which is named under DB2.
2. Record Base Logical Model : It is also used to describe data line by line but a
format is used in it permanently. Each record has its own attributes and fields
that are used under fixed access. It is of three types :
1. Network model
2. Relational Model
3. Heirachical Model
3. Physical Data Model : It has been used to describe data at lowest level of the
database. Some parts of it as follows
1. Entity : Tells about different kind of entities of the database.
2. Attributes : It tells about the entity of users Name, Address etc.
3. Entity set : It is the mixture of entity and attributes. Different kind of entity
and attributes are store here.
4. Relationship : It describes about the relationship of the entity which we are
using.
5. Relationship set : Many kind of relationships are used in database but
when same kind of relationship bring together at a place it is called
relationship set.
116
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Things to Remember
1. DBMS is a relational database management System.
2. Data are small raw materials such as character, numbers, pictures etc.
3. Database is a place where your data get store
4. DBA is the person or group of person who control the database system
5. To frequently store an identical data again and again in database is called
data redundancy.
6. In ancient times to store Different set of records in different-2 files is called file
processing system.
7. Entity is the item whose information is stored in a database as data is called
entity.
8. Many Kinds of keys are use in relational database.
9. Normalization makes tables effective and structured.
10. SQL is a high level language which is used to store, control and amend the
database.
Exercise
1. Fill in the Blanks :
1. .......................... is the full name of DBMS.
117
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
2. Full Forms :
1. DBA
2. DBMS
3. SQL
118
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
LESSON
5 Introduction to MS-Access
Objective of this Lesson
5.1 Introduction to MS-ACCESS
5.2. Introduction To Relational Database
5.3. Guidelines to designing a Database
5.4. Some Technical Words of Access
5.5. Components of MS Access
5.6. What Are Objects
5.7. Data types
5.8. Advantages of MS Access
5.9. Starting Access
5.10. Working with Tables
5.11. Creating And .Modifying Tables
5.12. Creating And Modifying Forms
5.13. Sorting Of Data
5.14. Filtering of Data
5.15. Creating Reports
119
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
120
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
2. Table : A table is the basic element of a Database and contains the data
entered by users. Each row (or record) contains information about a particular
item. The record is made up of several fields; each field contains one piece of
information relating to the item (e.g., Student's name, roll no., address, phone,
etc.). A database has stored many tables.
3. Fields : A field is an individual set of data items that are of the same type. If
we were to take an example of a class record to demonstrate this, the Class as
a whole would be your database. It has three fields. The roll no. is one field,
the name is another and the marks are the third one. Each as a unit would be
a record, as a record it is a set of fields with data relating to one thing. You
would have a field for each piece of data that you want to store as part of the
record. A table contains Many fields.
Example :
1. Student Name
2. Student Address
4. Data Types : Databases consist of tables, tables consist of fields and fields are
of a certain data type. A field's data type determines what kind of data it can
hold. Every database has data types for text, integers (integers are whole
numbers, i.e. numbers without a fraction) and decimal numbers and so does
121
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Access. But Access also has some data types that are specific to Access, like the
Hyperlink, Attachment and Calculated data type. We will use different kind
of data types for the desired field.
Example :
1. The data type of Student Name is Text.
2. The data type of Student Roll no is number.
2. Queries : A query that copies or changes data. Queries include append, delete,
make-table, and update queries. They are identified by an exclamation point
(!) next to their names in the Database window Crosstab query: A query is that
calculates a sum, average, count, or other type of total on records, and then
groups the result by two types of information : one down the left side of the
datasheet and the other across the top Database window. A query that asks a
question about the data stored in your tables and returns a result set in the
form of a datasheet, without changing the data
122
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
reports, one can prepare : Mailing labels for various producers - Produce a
directory - Prepare invoices - Present data summaries. A report is made from
the data available. There are several ways of preparing a report.
6. Macros : Macro is an automatic action that should be performed to an object of
the data. It allow users to their work automatically. Access allows users to do
an easy and visual mechanism to make and manage macros.
7. Modules : A module is collection of procedure statement and declaration
which are stores as unit. Module are very similar to macros. Generally
modules are of two types the They are used to do the advanced functions of
database, for example to examine the data in complicated situations.
123
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
124
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
125
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 5.1
2. Another shortcut way to open access is Press windows key with R it will open
run command window as shown in the figure on Run command type MS
access is blank box.
Fig. 5.2
After the open of MS access you have to click on the blank database available
Under templates.
Fig. 5.3
126
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Click the create button. A blank database opens in the program window and a
blank table named table1 opens in datasheet view.
In datasheet view, a table looks similar to an excel worksheet in that data is stored
in ROWS (records) and COLUMNS (field) as shown in the following diagram
Field Name
Record
Field
Fig. 5.5
When the active object is a table, the table tools contextual tabs (fields and
table) become available on the ribbon so that you can work the table (see figures 5.6,
5.7).
127
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
1. On the create tab, in the tables group, click the table button. A new blank
table opens in the object window in datasheet view (see figure 5.9).
128
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Adding fields by entering data : Entering data in datasheet view is very similar
to entering data in an excel worksheet. The main restriction is that data must be
entered in contiguous rows and columns, click on the upper- left corner of the
datasheet. The table structure is created while you enter data. whenever you add a
new column to the datasheet, a new field is defined in the table.
In every new table created in datasheet view, access automatically creates the first
fields which is called id in the left column of the datasheet (see figure 7). By default,
this field is designated as the table’s primary key . You can add a new field to the
table by entering data in the click to add click to add column (the last COLUMN) of
the datasheet.
ID Field Field
129
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
WHEN THE record has been changed, but has not yet been saved (see figure
5.11).
2. Click the pencil icon in the row selector. This saves the first record with the
value 1 assigned to the id field; subsequent records will be numbered
sequentially.
3. Continue entering items of data in consecutive cells, and pressing the tab or
enter key.
4. When you finish entering all the data for the first record, click anywhere in the
row below to save the record.
After entering so many records as per your requirement you have to save the
table
130
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
2. In the field name column, type a name for the first field. Field names can be up
to 64 characters long. They can include any combination of letters, numbers,
spaces, and brackets etc.
3. In the data type column click the down arrow and select a data type from the
list (see figure 5.13).
Fig. 5.14
131
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
132
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. Click the ok button. The table appears in the tables list in the navigation pane.
133
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
convenient to work in forms. It is more comfortable easier and popular to enter data
by forms that by datasheet view. Forms can be prepared by following two methods.
Fig. 5.18
MS Access creates a nice simple form. Click on any of the text boxes to position
the cursor and edit the data.
Fig. 5.19
At the bottom you have navigation buttons to move you from record to each
record
5.13 Sorting
The records, as you have seen them so far, are shown in the order that they were
first entered into the database . For this reason, it wouldn’t have been easy to search a
134
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
record you simply done it by scrolling through the records . Access sorts records by
their ID numbers. However, there are many other ways records can be sorted. For
example, the information in a database belonging to a Class could be sorted in
several ways :
➥ Result could be sorted by Name or by the marks of the students who were
appear in exam
➥ Students could be sorted by name or by the roll no.
➥ Students could be sorted by class.
You can sort both text and numbers in two ways: in ascending order and
descending order. Ascending means going up, so an ascending sort will arrange
numbers from smallest to largest and text from A to Z. Descending means going
down, or largest to smallest for numbers and Z to A for text. The default ID number
sort that appears in your tables is an ascending sort, which is why the lowest ID
numbers appear first.
Steps to sort student table are as follows :
1. Select a field in the cell you want to sort by. In student table, we will sort by
student name.
Fig. 5.20
2. Click the Home tab on the Ribbon, and locate the Sort & Filter group.
3. Sort the field by selecting the Ascending or Descending command.
(a) Select Ascending to sort text A to Z or to sort numbers from smallest to
largest. We will select this in our example because we want the names to
be in A-to-Z order.
135
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 5.21
After you save the sort, the records will stay sorted that way until you perform
another sort or remove the current one. To remove a sort, simply click the Remove
Sort command.
136
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 5.24
2. A drop-down menu with a checklist will appear. Only checked items will be
included in the filtered results. Use the following options to determine which
items will be included in your filter :
➥ Select and deselect items one at a time by clicking their check boxes. Here,
we will deselect all of the options except for Class .
➥ Click Select All to include every item in the filter. Clicking Select All a
second time will deselect all items.
137
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
➥ Click Blank to set the filter to find only the records with no data in the
selected field.
Fig. 5.25
3. Click OK. The filter will be applied. Our Student table now displays only class
9 record.
Fig. 5.26
138
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 5.27
3. Click on the down arrow beside the Tables/Queries selection window and
choose the table or query you’re basing your report on. (NOTE : You can select
more than one table/queries. Repeat the step to add any additional
table/queries.
4. Add fields –
All the fields from your selected tables/queries appear in the Available Fields:
window.
➥ Use the button to add fields to the Selected Fields window, one-at-a-
time.
➥ Use the button to move all available fields into the Selected Fields
window at once.
➥ To remove individual fields from Selected Fields, click on each field and
press .
➥ To remove all fields, press .
Note : The order in which you add fields to the Selected Fields window
determines their default order in the report.
➥ When done, click Next.
139
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 5.28
When done, click Next.
Fig. 5.29
140
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 5.30
Fig. 5.31
141
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Fig. 5.32
Things to Remember
1. Access 2010 is a Relational Database Management System (RDBMS).It is used
for database creation and management.
2. The database file is the main file of database which consists the whole data of
the document.
3. A table is the basic element of a Database and contains the data entered by
users.
4. A field is an individual set of data items that are of the same type.
5. A query that copies or changes data. Queries include append, delete, make-
table, and update queries.
6. One important setting for fields is the data type, which could be a number,
text, currency, and date/time.
7. Databases in Access 2010 are composed of four objects : tables, queries, forms,
and reports.
8. Forms are used for entering, modifying, and viewing records.
9. You can sort both text and numbers in two ways: in ascending order and
descending order.
142
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
10. Filters is the concept in MS access which allow you to view only the data you
want to see
11. Reports in Access allow you to print assembled data in a custom layout.
Exercise
1. Fill in the Blanks :
1. .......................... is a relational database management system.
(a) Excel (b) Word (c) Power point (d) Access
143
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
144
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
LESSON
6 Internet Applications
Objective of this Lesson
6.1 E-mail
6.1.1 Gmail
6.1.1.1 Creating New Account
6.1.2 CAPTCHA Code
6.1.3 How to send and receive mail?
6.1.4 How to attach File?
6.2 Google Apps
6.2.1 Google calendar
6.2.2 Google maps
6.2.3 Translate
6.2.4 Google +
6.2.5 Google Docs
6.2.6 Google Sheets
6.2.7 Google Slides
6.2.8 Play Store
6.2.9 Google Drive
6.3 How to download software?
6.4 Internet in Media
6.4.1 On Line Newspaper
6.4.2 Online TV Channels, Radio, Live programs(Streaming Media)
6.5 Cloud networking
6.5.1 Unique IP Address
6.5.2 Cloud Printing
6.6 Internet Security
6.6.1 Virus/Anti-Virus
6.6.2 Spyware
6.6.3 Trojan
6.6.4 Phishing Scams
6.6.5 Digital Signature
145
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
6.1 E-mail
Email, short for "electronic mail," is one of the most widely used features of the
Internet, along with the web. It allows us to send and receive messages to and from
anyone with an email address, anywhere in the world.
Email uses multiple protocols within the TCP/IP suite. For example, SMTP is
used to send messages, while the POP or IMAP protocols are used to retrieve
messages from a mail server. When we configure an email account, we must define
our email address, password, and the mail servers used to send and receive
messages. Fortunately, most webmail services configure our account automatically,
so we only need to enter our email address and password. Some of the webmail
services are Gmail (Google Mail), Yahoo mail, Rediff mail, Hotmail etc.
146
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
6.1.1 Gmail
'Google Mail' or 'Gmail' is a free email service provided by Google. In many
ways, Gmail is like any other email service: You can send and receive emails, block
spam, create an address book, and perform other basic email tasks. But it also has
some more unique features that help to make it one of the most popular email
services on the Web.
Note : We are using Chrome as our browser, however other browsers such as
Internet Explorer and Firefox will look similar.
Follow these step-by-step instructions to create a Gmail account
➥ Open up our internet browser.
➥ Type address.
Note : Or Click on “Gmail” link at the top right corner of the google home page.
147
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
As we don't have a Google account yet, we need to create one. Click Create an
account.
➥ The 'choose our username' is the unique email address that we wish to use,
which will be placed before '@gmail.com'. Because it needs to be unique,
Google may have to check the availability of any name that we decide on to
make sure that no one already has it. Type an email name into the 'choose our
username' box .Once we finalise our email address, it's a good idea to make a
note of it so that we can refer to it until we remember it.
148
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
➥ We'll need to give a password so that we can log in securely to our account.
Google may explain that we should try one with at least 8 characters long to
be secure. Use letters and numbers to make the password more secure and
difficult to guess. We'll need to re-enter our password to ensure that it's we
choosing it and not a hacker's robot. This is why it also asks we to insert two
random words at the bottom of the page this is a CAPTCHA code. We can
149
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
skip this step if we don't want to type in the CAPTCHA code but we will need
to verify via a mobile phone if we don't.(Captcha Code is described ahead in
section 6.1.2)
➥ Then fill your birth date (Month, Day, Year)
➥ Fill your Gender(Male/Female)
➥ Mobile phone number and any other e-mail address(if exist)
Once we have completed this page fully, clicking Next Step will take us to the
next Page.
CAPTCHA
150
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
151
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
The recipients : In the "To:" box, type the address of the person we want to write
to. For multiple recipients, separate the addresses with commas.
To view the "Cc:" tab click "Add Cc". Cc means "carbon copy", type here the
addresses of people who are not the main recipients of the message, but we still want
to send a copy to.
To view the "Bcc:" tab click "Add Bcc". Bcc stands for “Blind carbon copy ”, type
here the addresses of people we want to send a copy of the mail to, without the other
recipients knowing.
The subject
In "Subject:", enter the subject of the email. Enter the text itself. By default, Gmail
will send a message in HTML format.
When we finish typing our mail, click the "Send" button to send it immediately or
on the "Save" button to save as draft.
We'll see that sending emails is a really easy process.
Reading our mails : All emails received are stored in the inbox. The number of
unread messages is indicated in brackets to the right of the "Inbox" folder. Gmail
automatically checks every two minutes when new messages arrive.
152
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
153
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
154
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
6.2.3 Translate
Google Translate is a free multilingual statistical machine translation provided
by Google to translate text, speech, images, or real-time video from one language
into another.
155
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
6.2.4 Google+
Google+ (Google Plus) is Google's attempt at social networking. The Google+
service that delivers functionality and many features similar to those of Facebook.
Features in Google+ include "Posts" for posting status updates, "Circles" for
sharing information with different groups of people (like Facebook Groups), "Sparks"
for offering videos and articles users might like, and "Hangouts" and "Huddles" for
video chatting with a friend or group of friends.
156
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
157
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Note : On Google Drive, our data can't get lost, no matter what we do to our
computer?
158
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
From our file list in Drive : Select the name of a file or folder and click the
share icon at the top .
3. Under “People” in the sharing box, type the email addresses of the people or
Google Groups we want to share with. We can also search for contacts by
typing them into the box.
4. Choose the type of access we want to give these users by clicking the
dropdown arrow to the right of the text box:
➥ Can edit : Users can edit the file or folder and share it with others
➥ Can comment : Users can view and add comments to the file, but can't edit
it. Folders can't be given comment access.
➥ Can view : Users can see the file or folder but can't edit or comment on it
5. Click Done. The users will receive an email letting them know we've shared
the file or folder with them.
159
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
160
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Online radio is the distribution of audio broadcasts over the Internet. There are
thousands of Internet radio stations that can be streamed to a software media player
in a computer, mobile device, stand-alone Internet radio, media hub or media server.
Often called "Webcasts," they come from several organizations as well as traditional
AM and FM radio stations. If an Internet radio has built-in wireless connectivity, it
may be called a "Wi-Fi radio."
The number of online TV services is growing by the day, and every time we wake
up there seems to be dozens more ways to enjoy our favorite programs. For example
we can listen live kirtan from Harmandir Sahib (Amritsar Punjab) on our
smartphone or computer
Intrastructure
Application
Storage
161
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
162
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
tool they want and transfer the file to a cloud printing service provider via whatever
device they choose, which then routes the file to a cloud-attached printer at a location
selected by the user.
6.6.1 Virus/Anti-virus
A computer virus is a computer program that replicates itself into other computer
programs and can cause damage to a computer's software, hardware or data. Once a
163
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
The best way to deal with the threat of a computer virus is to use antivirus
software. Antivirus software helps to protect a computer system from viruses and
other harmful programs. One of the most common ways to get a virus on our
computer is to download a file from the Internet that is infected. Antivirus software
scans our online activity to make sure we are not downloading infected files.
Antivirus software also helps to detect and remove viruses from our computer
system if we do get infected.
6.6.2 Spyware
Spyware is a program installed on our computer that sends information about us
and how we use our computer to a third party, typically without we being aware this
is happening. Spyware often enters our system when we install some type of free
software from an untrusted source. Since we authorized the installation,
conventional protection methods, such as antivirus software, do not prevent spyware
from getting installed in this manner.
Once the spyware program is installed, it starts collecting information. Some
spyware programs are relatively harmless and collect very generic information that
does not personally identify us. Other spyware programs may record our actual
keystrokes, including any passwords, and may search through any of our files
looking for something that looks like a credit card number. These types of spyware
programs can definitely be harmful.
Once spyware has collected its information, it sends this to whoever created the
program. Again, this happens without our notice. Removing the spyware can be
164
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
difficult - often the program installs itself again as quickly as we can delete it. To
counter spyware, we need to use a dedicated spyware management tool. Some
antivirus software are bundled with spyware management tools, but they are
separate functions.
6.6.3 Trojan
A Trojan horse, often shortened to Trojan, is a type of malware designed to
provide unauthorized, remote access to a user's computer. Trojan horses do not have
the ability to replicate themselves like viruses; however, they can lead to viruses
being installed on a machine since they allow the computer to be controlled by the
Trojan creator. The term gets its name from the Greek story of the Trojan War, when
the Greeks offered the Trojans a peace offering in the form of a large wooden horse.
However, once the Trojans wheeled the horse behind their closed gates and night fell,
the soldiers hidden inside the horse climbed out and opened the city gates, allowing
the Greek army to infiltrate Troy and capture the city.
Trojan horse software operates the same way, where Trojan is our computer and
the horse is the benign-seeming application.
165
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
webpage looks very real - but if we look closely, the Internet address is actually not
the official one.
Financial institutions don't send out these types of messages. Don't follow the link.
166
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
seemingly jumbled or meaningless forms and back again. For digital signatures, two
different keys are generally used, one for creating a digital signature and another
key for verifying a digital signature.
Things to Remember
1. E-mail allows us to send and receive messages to and from anyone with an
email address, anywhere in the world.
2. A CAPTCHA is a type of test used in computing to determine whether or not
the user is human.
3. All emails received are stored in the inbox.
4. Google Apps is a suite of Web-based applications from Google that includes e-
mail, calendar, word processing, spreadsheet and presentations.
5. Every machine on the Internet has a unique number assigned to it, called an IP
address.
6. Cloud networking refers to manipulating, configuring, and accessing the
hardware and software resources remotely.
7. Cloud Printing enable users to print documents and other materials on any
device associated with the cloud(network).
8. The Internet is indeed private and secure, but there are a number of serious
security risks.
9. Phishing is an e-mail fraud method in which the wrongdoer sends out
legitimate-looking email in an attempt to gather personal and financial
information from recipients.
10. Digital Signature is a digital code which is attached to an electronically
transmitted document to verify its contents and the sender's identity.
Exercise
1. Fill in the Blanks :
1. 'Gmail' is a free email service provided by .......................... .
(a) Yahoo (b) Google (c) Rediffmail (d) Hotmail
2. Every machine on the Internet has a unique number assigned to it, called
an .......................... .
(a) Address (b) E-mail (c) ID (d) IP Address
167
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
2. True/False :
1. Spyware is an e-mail fraud method in which the wrongdoer sends out
legitimate-looking email in an attempt to gather personal and financial
information from recipients.
2. Google Drive does not allow us to store and share files online.
3. The best way to deal with the threat of a computer virus is to use antivirus
software.
4. In BCC we type the addresses of people we want to send a copy of the mail to,
without the other recipients knowing.
5. Digital signatures are created and verified by means of biography.
168
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
LESSON
7 E - governance
Objective of this Lesson
7.1 Introduction
7.2 Main characteristics of Good Governance
7.3 History and development of E – governance
7.4 E – governance
7.5 Objectives of E governance
7.6 E – governance Models
7.6.1 Government to citizens (G2C)
7.6.2 Government to government (G2G)
7.6.3 Government to employees (G2E)
7.6.4 Government to businessman (G2B)
7.7 Areas of E – governance
7.7.1 E- Governance in urban areas
7.7.1.1 Transportation
7.7.1.2 Online payment of bills and taxes
7.7.1.3 Information and public relation key services
7.7.1.4 Municipal services
7.7.1.5 Roads and traffic management
7.7.2 E- Governance in rural areas
7.7.2.1 Agriculture
7.7.2.2 Local information
7.7.2.3 Disaster management
7.7.2.4 Land record management
7.7.2.5 Panchayat
7.7.3 E – Governance in Health
7.7.4 E – Governance in Education
7.1 Introduction
Before we start learning e-governance, we must know about meaning of
governance. The concept of "governance" is not new. It is as old as human
civilization."Governance" means : the process of decision-making and the process by
169
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Good governance is the processes of making and implementing decisions. It's not
about making 'correct' decisions, but about the best possible process for making and
implementing those decisions.
170
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
7.4 E – governance:
Online working of a government or providing its services online to its citizens at
their door step is known as E-Governance. In other words, E-Governance means
online availability of government services.
In today's world the development of any country depends on the uses of E-
Governance. E-Governance has made the working of government more efficient and
171
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
172
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
3. Copies of land-record.
3. Most of the finance and budget works are also done through e-governance.
173
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
174
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
175
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
176
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
7.7.2.1 Agriculture
Following are the projects used in Agriculture.
1. AGMARKNET : It is a project approved by Department of Marketing &
Inspection (DMI), Ministry of Agriculture, and Government of India.
2. SEEDNET : It is a SEED informatics network under ministry of Agriculture,
Government of India.
177
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
7.7.2.5 Panchayat
Services provided by e-governance in this area are :
1. Issue of Birth/Death certificate.
2. Application for inclusion of name in Voter list.
3. Conducting various welfare schemes for the poor and needy sections of the
society.
4. Preparing district wise planning, implementing those plan, and review for
success.
5. To provide wage employment to the needy from amongst the poorest section
of the rural society.
6. Rural water supply and sanitation.
➥ Various projects :
1. E-GramViswa Gram Project by Gujarat.
178
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
2. Another step taken ahead by PGI through its web portal for online registration
and appointment with concerned doctors.
3. Online Vaccination Appointment for International Traveler : Citizen centric
application for the purpose of vaccination of the persons proceeding abroad
and issuance of International Health Certificate.
Things to Remember
1. "Governance" means : the process of decision-making and the process by
which decisions are implemented.
2. Good governance is the processes of making and implementing decisions.
3. Good governance follows the rule of law.
4. The establishment of e-Governance requires a good knowledge of the needs
that exist in the society and that can be offered using ICT.
5. In E-Governance, government makes best possible use of internet technology
to communicate and provide information to common peoples and
businessman.
6. E-GOVERNANCE services can be shared between citizens, businessman,
government and employees.
7. IRCTC (Indian Railway Catering and tourism Cooperation ltd.) Offers online
rail ticket booking, and checking of ticket reservation status.
8. Online Scholarship Management System such as Ashirwad portal by Punjab
Government is the purpose of distribution of scholarships and fees
reimbursement.
179
https://www.ncertbooks.guru/
https://www.ncertbooks.guru/
Exercise
1. Multiple Choices :
1. G2C stands for .................................................... .
(a) Government to cooperation (b) Grievances to cooperation
(c) Government to citizen (d) None of these
2. G2G stands for .................................................... .
(a) Government to Government (b) Get to Go
(c) Gather to Go (d) None of these
3. G2E stands for .................................................... .
(a) Grievance to employee (b) Government to employee
(c) Government to environment (d) None of these
4. G2B stands for .................................................... .
(a) Government to Banks (b) Government to Businessmen
(c) Government to Business (d) None of these
5. IRCTC stands for .................................................... .
(a) Indian Railway Catering and tourism Cooperation ltd.
(b) Indian Runway Catering and tourism Cooperation ltd.
(c) Indian Railway Catering and travelling Cooperation ltd.
(d) Indian Railway Cargo and tourism Cooperation ltd.
180
https://www.ncertbooks.guru/