0% found this document useful (0 votes)
2K views71 pages

Computer Portfolio Class 10th

Uploaded by

patelswarit123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views71 pages

Computer Portfolio Class 10th

Uploaded by

patelswarit123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 71

DIGITAL DOCUMENTATION

(ADVANCE)
Topic 1 : Create and apply Style in the Document
A style is a collection of formats that you may use to easily change the
appearance of chosen pages, text, frames, and other elements in your
document. When you apply a style, you’re applying a whole group of formats
at once.

A document’s uniformity can be improved through the use of styles. They also
make it simple to make large formatting modifications. For example, you
might decide to modify the font of all headings or the indentation of all
paragraphs. The task is simplified by the use of styles.

OpenOffice.org supports the following types of styles:

a. Page Style – Margin, headers and footers, borders, and backgrounds are all
examples of page styles. Page styles in Calc also contain the printing sheet
sequence.

b. Paragraph Style – Text alignment, tab stops, line spacing, and borders, are
controlled by paragraph styles, which can also include character formatting.

c. Character Style – Character styles impact the font and size of chosen text
within a paragraph, as well as bold and italic formats.

d. Frame Style – Text Wrapping, borders, backgrounds, and columns are all
utilised in frame styles to format image and text frames.

e. Numbering Style or List Style – Numbering style includes a numbering list


and a bullet list in the document.

f. Cell Style – Fonts, alignment, borders, background, number formats (for


example, currency, date, and number), and cell protection are all examples of
cell styles.
g. Graphics Style – Line, area, shadowing, transparency, typeface, connectors,
dimensioning, and other attributes are used in graphic styles in drawings and
presentations.

h. Presentation Style – Font, indents, spacing, alignment, and tab


characteristics are all included in presentation styles.

Using the Styles and Formatting windows

The Style and Formatting Windows can be opened in two


different ways.
1. In the menu bar, select Format >> Style & Formatting.

2. To open the Style and Formatting Windows, press the F11 shortcut key.

Style and Formatting Windows also have several additional options to modify
the Style and formatting in document, for example –

1. Fill Format Mode


2. New Style from Selection
3. Modify Style
1. Update Style
2. Load Styles
1. Fill Format Mode
Fill format mode allows you to quickly apply a style to multiple places without
having to return to the Styles and Formatting box. When you need to format a
large number of scattered paragraphs, cells, or other items in the same
manner, this method helps a lot.

How to apply Style in Digital Documentation –

1. Select the style you want to use in the Styles and Formatting window.
2. Select Fill Format mode icon in Style and Formatting Windows.
3. Click and drag the mouse pointer to the location in the document where
you wish to apply the style.
4. Press Esc when finished.
2. New Style from Selection

You can use the Create New Style option in the Style and Formatting Windows
to create your own style for future usage.

Digital Document provides two different methods to create a new style in


Document.

 Create new style from Selection


 Drag and Drop to create new style
 Create New Style from Selection
By replicating an existing manual format, you can make a new style. This new
style will only be applied to this document and will not be saved in the
template.

For example, you can adjust the formatting of a paragraph or frame until it
looks the way you want it to, and then turn the formatting of that item into a
new style. This technique saves time because you don’t have to build a new
style and memories all of the formatting options as discussed earlier.
Step 1 : Open the Style and Formatting windows and choose the type of Style
you want to create.

Step 2 : Select the item you want to save as a Style in the document.

Step 3 : Select the New Style from the Selection icon in the Style and
Formatting window.

Step 4 : In the Create Style dialog, type a name for the new Style and press Ok
button.

 Drag and Drop to create New Style


You can drag and drop a text selection into the Styles and Formatting window
to create a new style.

Step 1 : Open the Styles and Formatting window.

Step 2 : Select some text and drag it to the Styles and Formatting window.

Step 3 : In the Create Style dialog box, type a name for the new style. The list
shows the names of existing custom styles of the selected type, if any. Click OK
to save the new style.

Step 4 : If the Paragraph Styles list is showing in the Styles and Formatting
window, a new paragraph style will be added to the list. If Character Styles are
active, the character style will be added to the list.
3.Modify Style

Writer has a number of predefined styles, but you can find that they don’t
match your preferences in one way or another. OOo provides two ways to
change both predefined and user-created custom styles.

 Updating a style from a selection •


 Load or copy styles from another document or template
 Updating a Style from a selection
To update a style from a selection:

Step 1 : Open the Styles and Formatting window.

Step 2 : In the document, select an item that has the format.

Step 3 : In the Styles and Formatting window, select the style you want to
update (singleclick, not double-click), then long-click on the arrow next to the
New Style from Selection icon and click on Update Style

 Load or copy styles from another document or template


You can copy styles by loading them from a template or another document:

Step 1 : Open the document into which you wish to paste styles.

Step 2 : Long-click on the arrow next to the New Style from Selection symbol
in the Styles and Formatting window, and then select Load Styles.
Step 3 : Locate and choose the template you wish to copy styles from on the
Load Styles box.

Step 4 : Decide which style categories should be duplicated. If you want the
copied styles to replace any existing styles with the same names in the
document you are pasting them into, choose Overwrite.

Step 5 : Click OK to copy the styles. You will not see any change on screen.

Topic 2 : Insert and use Image


There are various ways to insert images into a document, including via the
Drag and Drop, Insert Image from File, Insert Image from Clipboard, Open
Office Gallery, and a scanner.

1. Drag and Drop


2. Insert Image from File
3. Insert Image from Clipboard
4. Insert Image from Gallery
5. Insert Image from Scanner
1. Drag and Drop

To drag an image file into a digital document, follow these steps: –

Step 1 : Open a File browser window and locate the image you want to insert.
Step 2 : Drag the image into the Writer document and drop it where you
want.

With this technique, a copy of the picture file is saved inside the Writer
document. Hold down the Control and Shift keys when you drag the image to
link the file rather than embed it.

2. Insert Image from File

To insert an image file into a digital document, follow these steps –

Step 1: Click in the Open Office document in the first step to place the image
there.

Step 2: From the menu bar, select Insert > Picture > From File.

Step 3: Navigate to the file that needs to be inserted on the Insert Picture
dialogue, select it, and click Open.

3. Insert Image from Clipboard

You can copy photos into an Open Office document from other Open Office
documents as well as from other programmes by using the clipboard. How to
do it:
 Start by opening the source and destination documents.
 Pick the image you want to copy from the source document.
 To copy the image to the clipboard, move the mouse pointer over the
chosen image and hit Control+C.
 Change to the desired document.
 Click to position the cursor in the desired location for the graphic.
 To insert the image, press Control+V.

4. Insert Image from Gallery

The Gallery provides a suitable way to organise reusable elements that you
may add to your papers, like images and music. All parts of Open Office have
access to the Gallery. There aren’t many visuals included, but you can upload
your own or locate addons with extra graphics.

5. Insert Image from Scanner

If your computer has a scanner attached, Open Office may access the scanning
software and enter the scanned item as an image into the Open Office
document. To insert image

Click the area where the image to be placed, then choose Insert > Picture >
Scan > Select Source to begin the process.
Modifying An Image
You might need to edit a new image you include so that it matches the
document. Here, we’ll go through how to use the Picture toolbar, as well as
how to resize, crop, and rotate a photo using a workaround.

1. Picture Toolbar

The Picture toolbar displays when you insert a picture or choose one that is
already in the page. View > Toolbars > Picture allows you to set it to always be
visible.

2. Graphics mode

You can change color images to grayscale by selecting the image and then
selecting Grayscale from the Graphics mode list.

3. Flip vertically or horizontally

Select the image, then click the corresponding icon to turn it vertically or
horizontally.

4. Filters

The filters are briefly described in the following table, but the best way to
comprehend them is to use them. Try around with the various filters and their
settings.
5. Transparency

To make a picture more transparent, change the percentage value in the


transparency box on the Picture toolbar. When making a watermark or
enclosing the image in the background.

6. Using the Formatting Toolbar and Picture Dialog

a. Cropping Images

You could want to crop (cut off) a portion of the image if you’re only
interested in it for your document. Right-click the image and choose Picture
from the pop-up menu to begin cropping it.
b. Keep scale / Keep image size

When the Keep scale option is used (the default), cropping an image does not
alter its scale.

When the option to Keep Picture Size is used, cropping results in either an
increase in image size (for positive cropping values), a decrease in image size
(for negative cropping values), or an image distortion.

c. Width and Height

As you input values in the Left, Right, Top, and Bottom fields under Scale or
Image size, the Width and Height fields change. To find the precise amount to
crop by, use the thumbnail next to these fields.

d. Resizing an Image

If the inserted image is too big or too small, it might not fit into the paper
completely. You can resize the image in Writer.

e. Rotating a Picture

With the aid of the rotation option in digital documentation, you can rotate
the image.
f. Creating Drawing Objects

Display the Drawing toolbar by selecting View > Toolbars > Drawing to start
utilising the drawing tools.

Topic 3 : Create and use Template


A template is a sample that you can follow while writing new documents.
Documents that have previously been designed are called templates. Simply
substitute your own text for the sample text.

Creating a Template

You can create your own templates in two ways:

 from a document,
 and using a wizard.
 Creating A Template From A Document
Step 1 : Open a new or existing document of the type you want to make into a
template (text document, spreadsheet, drawing, presentation).

Step 2 : Add the content and styles that you want.

Step 3 : From the main menu, choose

File > Templates > Save.

 Creating A Template Using A Wizard


Step 1 : Choose File > Wizards >[type of template required]

Step 2 : Follow the instructions on the pages of the wizard like the date,
subject line , salutation, and complimentary close

Step 3 : In the last section of the wizard, you can specify the name and
location for saving the template.

Step 4 : Finally, you have the option of creating a new document from your
template immediately, or manually changing the template.

Topic 4 : Create and customize Table of Contents


A table of contents (TOC) is a reader navigation tool used in a variety of
writing formats, including books and technical documentation. It comprises a
list of the major chapters, headings, subjects, sections, and so on.

The table of contents serves two things –

1. It provides users with a summary of the contents and structure of the


document.
2. It enables users to jump right to a certain area of an online document.
How to Insert Table of Content in Digital Documentation
To insert table of Content in Digital Document follow the following link –

Insert > Indexes and Tables > Indexes and Tables.

Basic Setting in Table of Content

1. Adding A Title

Put a title in the Title area if you want one for the table of contents. (If Writer
automatically entered a title in this field, you may edit it by typing over the
value.) Clear the Title field to remove the title.

2. Protecting Against Manual Changes

Select the Protected against manual changes checkbox to prevent accidental


changes to the table of contents.

If this box is checked, the context menu or the Insert Table/Index window are
the only ways to modify the table of contents.
If this box is unchecked, The table of contents can be modified immediately on
the document page, just like regular text..

3. Changing The Number Of Levels

When creating the table of contents, Writer by default considers 10 levels of


headings.

Enter the required number in the “Evaluate up to level” spin box to adjust the
number of levels examined.

4. Assigning Custom Styles

All paragraphs created using the default heading styles are automatically
assigned to the table of contents by Writer (Heading 1, Heading 2, and so on).

5. Using The Entries Tab

Entries in the table of content can add and remove elements, like chapter
numbers, and you can apply character styles to specific sections. Entries in the
table of contents serve to highlight the content.
E# – The chapter number is indicated by the E# button.

E – The entered text is represented by the E button.

T – A tab stop is represented by the T button.

# – The page number is indicated by the # button.

LS – The beginning of a hyperlink is indicated by the LS button. (This button is


absent from the Structure line by default.)

LE – A hyperlink’s conclusion is indicated by the LE button. (This button is


absent from the Structure line by default.)

6. Deleting Elements

Click the button next to the element you want to remove from the Structure
line, and then press the Delete key on your computer. For instance, click the T
button and then press the Delete key to remove a tab stop.

7. Using The Background Tab

To add colour or a graphic to the table backdrop, use the Background tab.

8. Saving The Table Of Contents

Click OK to save the table of contents and have it display in your document.
The table of contents is displayed in your document once the Insert
Index/Table window closes.

Topic 5 : Implement Mail Merge


Using a mail merge, you can personalise a letter you’ve already written and
send it to a large group of recipients, giving the impression that you wrote it
specifically for them. A mail merge can also be a rapid technique to create
labels or envelopes with the addresses for various persons on each label or
envelope using a list of people’s mailing addresses. Anyone or any business
that interacts frequently with customers, partners, parents, or other individuals
must use the mail merge.
How to create Mail Merge in Digital Documentation

Step 1: Select starting document

Step 2: Select document type

Step 3: Insert address block or Selecting the data source

Step 4: Create salutation

Step 5: Adjust layout

Step 6: Edit document and insert extra fields

Step 7: Personalize documents

Step 8: Save, print or send

What is Data Source

During the mail merge process, data from another document referred to as
the data source, Data Source connects to the main document and retrieves the
information like names, addresses, and phone numbers can be found in a
document, spreadsheet, or database that serves as the data source.

What are the different type of Data Source available in Mail


Merge

OpenOffice.org allows data sources to be accessed and then linked into


documents. For example, a mail merge links an external document containing
a list of names and addresses into a letter, with one copy of the letter being
generated for each entry.

Different type of File which support to insert data in Mail merge are –

1. Spreadsheet
2. Text File
3. Access or Base Database
4. Address Book
DATABASE
MANAGEMENT
SYSTEM
What is Database?
A database is an organized collection of data. You can visualize it as a
container of information.

A database is a structured grouping of data that has been arranged and is


often kept electronically in a computer system. A database management
system used to manage a database (DBMS).

What is a Database Management System?


Data is stored, retrieved, and analyzed using software called database
management systems (DBMS). Users can create, read, update, and remove
data in databases using a Database Management System, which acts as an
interface between them and the databases.

For example – Oracle, IBM DB2, Microsoft SQL Server, Microsoft Access,
PostgreSQL, MySQL, FoxPro, and SQLite.

Data can be organized into two types:

 Flat File: Data is stored in a single table. Usually suitable for less amount
of data. Text files without any markup often make up flat files.
 Relational: Data is stored in multiple tables and the tables are linked
using a common field. Relational is suitable for medium to large amount
of data
What is Database Server?
Database servers are specialised machines that exclusively operate the DBMS
and associated applications. They contain the actual databases. Database
servers are known as Back-ends, while Frontends are programmes with a
command line or graphical user interface that are used to access databases
that are available on them. A client-server model is the name given to this kind
of data access.

Advantages of Database

Reduces Data Redundancy

Multiple files are contained in database management systems and must be


stored in various places inside a single system or even across multiple systems.
This resulted in data redundancy as there were occasionally multiple copies of
the same file.

(Note – Data redundancy happens when the same piece of information


appears more than once, but data inconsistency happens when the same
information appears in various formats across various tables.)

Sharing of Data

A database allows its users to exchange data among themselves. The data can
only be shared with users who have received the appropriate degrees of
authorization because there are different levels of access to the data.

Data Integrity

Data accuracy and consistency in the database are terms used to describe data
integrity. A DBMS contains many databases, therefore data integrity is
important. Data that is accessible to many users is present in each of these
databases. In order to ensure that the data is accurate and consistent
throughout all databases and for all users.

Data Security

A database’s concept of data security is important. The database should only


be accessible to authorized users, whose identities must be verified using a
username and password.

Privacy
The privacy rule in a database states that only the authorized users can access
a database according to its privacy constraints. To secure data levels are set in
the database and a user can only view the data which is allowed to be seen.
For example – In social networking sites, access constraints are different for
different accounts a user may want to access.

Backup and Recovery

According to its privacy limitations, a database’s privacy rule states that only
authorized users are permitted access. A user can only view the data that is
permitted to be seen, and levels are configured in the database to secure data.
For instance, on social networking sites, different accounts that a user may
want to access have varying access restrictions.

Data Consistency

Data consistency states that different versions of the same data shouldn’t
match. All data must be identical for every user viewing the database and must
be shown consistently throughout. Additionally, there are no data
inconsistencies because all users immediately see the effects of any database
changes.

Features of Database

There are some key features of a database:

1. One or more tables can be added in the database.


2. Decreased storage costs and space requirements
3. Users can use query languages in a database to insert, modify, search,
and delete the data easily from the database.
4. Multiple users can access the data from the database.
5. All of the data in a database can be accessed by several users, but only
one person can update a particular piece of data at once.
6. There is no chance of data loss because Database Management System
stores all data files permanently.
7. One or more fields should be designated as keys in every database
table. For the purpose of identifying records with possibly similar names
or addresses, you can give this key a special value.
8. Uniqueness aids in preventing accidental record duplication brought on
by human or technological error.
Primary Key, Composite Primary Key and Foreign
Key in a Database
In the RDBMS data can be integrated using keys. These are Primary Key,
Composite Primary Key, and Foreign Key, Key are used to make the
relationship between the tables.

1. Primary Key – This unique field is called the Primary Key (PK). A primary
key is a column in a table or a group of columns that aids in uniquely
identifying each record in that table. In a table, there can only be one
primary Key.
2. Composite Primary Key – Composite primary key is the term used
when the primary key constraint is applied to one or more columns.
3. Foreign Key – To create connections between two tables, foreign keys
are used. Each value in a column or collection of columns containing a
foreign key must match the Primary Key of the referential table. Data
and referential integrity are preserved with the use of foreign keys.
What is RDBMS?
A database management system that is based on the relational model is called
an RDBMS (Relation Database Management System). Tables are used to
organize data in relational databases. A relational database management
system (RDBMS) is used to store, manage, query, and retrieve data.

Database Objects

Tables

Data is arranged into rows and columns in a table, which is a type of data
structure. It can be applied to both the storage and presentation of structured
data.

Columns or Fields or Attributes

Data is arranged vertically from top to bottom in columns. Each row of the
table has one column, which is a collection of data values of a specific basic
type. The structure by which the rows are put together is provided by the
columns.

Rows or Records or Tuples

A row, also known as a Record or Tuple, in a table represents a single data


item. A database table can be represented graphically as being made up of
rows and columns, or fields. Every row in a table has the same structure and
represents a group of connected data.

How to create a database using Open Office

Step 1: Click on Start > Programs > OpenOffice > OpenOffice Base

Step 2: Click on Create a new database

Step 3: In the Database Wizard, Click on Finish

Step 4: Specify a the Name of database and click on Save

How to create a table in Database


The database’s tables are used to store data. In the database, In Open Office
Base the tables can be created in two different ways.

1. Create Table in Design View


2. Use Wizard to Create Table
Create Table in Design View

Step 1: Click on Create Table in Design View


Step 2: Select Field name and suitable data type
Step 3: Set the Primary Key
Step 4: Change the table name
Step 5: Save the table

Use Wizard to Create Table

Step 1: Click on Table > Use Wizard to Create table


Step 2: Click the Select Fields > Choose Category > Select the table > Click on
Next Button

Step 3: Select data types from the given field

Step 4: Set the Primary Key

Step 5: Rename the table and Click on Finish

Data Types
The type of data (value) that will be stored in the database is defined by its
data type. Important to know the different types of data helps to ensure that
each property’s value is as expected and that data is collected in the correct
format.

Data types in Open Office base are broadly classified into five categories listed
below.

 Numeric Types
 Alphanumeric Types
 Binary Types
 Date time
 Other Variable types
Numeric Types

Data that is presented as numbers rather than in any language or descriptive


form is referred to as numerical data type. Numerical data, also known as
quantitative data, is gathered in number form and differs from all other types
of number data because it can be calculated mathematically and statistically.
Alphanumeric Types

Data that has both letters and numbers is referred to as alphanumeric type.

Binary Types

For storing data in binary formats, binary data types are utilized. In a database,
binary data types can be used to store things like music and image files. The
binary data type can generally be used to store files in any format.

Date Time
When specifying date and time values for a column used in a database table,
date time data types are used. Information like dates of birth, admissions,
product sales, and other dates can be stored in databases using date and time
data types.

Other Data Types

Topic 3: Perform Operations on Table


In Base, data is kept in tables that may be added to, changed, or deleted by
using the proper options.

Insert Data in the Table

Step 1: Select the table > Double click on it


Step 2: The table will open in Datasheet View
Step 3: Now you can Insert Number of records in Datasheet View

Editing Records in the Table

Step 1: Select the table > Double click on it.


Step 2: The table will open in Datasheet View
Step 3: Edit the record as per the requirement

Deleting Record From the Table

Step 1: Select the table > Double click on it.


Step 2: The table will open in Datasheet View
Step 3: Right click on data and select delete option
Field Properties
To modify the field’s attributes It is necessary to modify the table structure in
design view. The following actions will be taken to set the field’s properties:

Select the table > Right click > Select the option Edit > the table Design View
window will open

Following are some properties of data of the numeric type:

1. Auto Value – if set to yes then field will get the auto numeric values.
2. Length – By default length of the field is 10 but the size of the field can be
set to maximum length.
3. Default Value – A default value can be set for a field if user don’t provide
any value while entering the values in the table.
4. Format example – This property helps to set the format of the data entered
in the field such as 91-222-333.

Following are some properties of data of the character type:

1. Entry Required – if set to yes then it will be must to insert the value in the
field which means that field cannot be left blank.
2. Length – By default length of the field is 10 but the size of the field can be
set to maximum length.

3. Default Value – A default value can be set for a field if user don’t provide
any value while entering the values in the table.
4. Format example – This property helps to set the format of the data entered
in the field such as 91-222-333.

Sorting Data
Sorting means to arrange the data in either ascending order of descending
order. Sorting is the process of putting data into a meaningful order so you
can evaluate it more efficiently.

Referential Integrity
The relationship between tables is referred to as referential integrity.
Referential integrity is used to maintain accuracy and consistency of data in a
relationship. In Base, data can be linked between two or more tables with the
help of primary key and foreign key constraints.

Referential integrity helps to avoid:

1. Adding records to a related table if there is no associated record available in


the primary key table.
2. Changing values in a primary if any dependent records are present in
associated table(s).
3. Deleting records from a primary key table if there are any matching related
records available in associated table(s).

Creating and Editing Relationships between Tables

An association or link between two or more tables is referred to as a


relationship. You don’t have to enter the same data again in different tables
when you relate two tables.

Relationships between tables helps to

1. Save time as there is no need to enter the same data in separate tables.
2. Reduce data-entry errors.
3. Summarize data from related tables.
Type of Relationships in Database

There are three types of relationships which can be created in tables:

1. ONE to ONE
2. ONE to MANY OR MANY to ONE
3. MANY to MANY

ONE to ONE

In this relationship, both the tables must have primary key columns.

ONE to MANY OR MANY to ONE


In this relationship, one of the table must have primary key column. It signifies
that one column of primary key table is associated with all the columns of
associated table.

MANY to MANY

In this relationship, no table has the primary key column. It signifies that all the
columns of primary key table are associated with all the columns of associated
table.

Remove the Relationships

With the use of the Delete option, the relationships that have been applied to
the tables can also be deleted.
When you right-click a relationship thread, the Delete option will appear.

Topic 4: Retrieve Data using Query-In order to describe the


data structure and to modify the data in the database, queries are used as
instructions. A query enables the joining and filtering of data from various
tables.

Database Languages having two type:

1. DDL (Data Definition Language)


2. DML (Data Manipulation Language)
DDL Statements:

 Create: Using this statement, a database or set of tables can be created.


 Alternate: This statement is used to change the table’s structure.
 Drop: This statement is used to remove database objects from the
system.
DML statements:

 SELECT: The statement “SELECT” is used to get data from the database.
 INSERT: The statement “INSERT” is used to add a new record to the
database.
 DELETE: The database can be cleaned out by using the statement
DELETE.
 UPDATE: This statement is used to modify the database’s information.
Database Query –
Query is a computer languages. In order to describe the data structure and to
modify the data in the database, queries are used as instructions. Query can
extract particular data from a database. We can filter and join data from
various tables with the help of a query. By using the criteria you supply query
will filter the data.

Select Statement

A select query is a language in a database that displays data in Datasheet view.


Data from tables is displayed by a query rather than being stored by it. A
query may display data from one or more tables, from other queries, or from
both of these sources simultaneously.

The SELECT statement has many optional clauses:

WHERE specifies which rows to retrieve.



 ORDER BY specifies an order in which to return the rows.
Syntax of Select Statement is –

SELECT * FROM <TABLENAME>;

Query related to Simple Select Statement –

Table Name – product

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

45 Shampoo 250 25

52 Soap Box 120 100


Question – Write a Query to display all record from the table;

Select * from product;

Output –

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

45 Shampoo 250 25

52 Soap Box 120 100

Question – Write a Query to display product name from the table;

Select Product_Name from product;

Output –

Product Name

Soap

Powder

Shampoo

Soap Box

Question – Write a Query to display Product Name and Price from the table;

Select Product_Name, Price from product;


Output –

Product Name Price

Soap 40

Powder 80

Shampoo 300

Soap Box 120

Query related to Select Statement with Mathematical function


Table Name – product

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

45 Shampoo 250 25

52 Soap Box 120 100

Question – Write a Query to find the total no of quantity available in table;

Select sum(quantity) from product;

Output – 235
Question – Display the total amount of each item. The amount must be
calculated as the price multiplied by quantity for each item.

Select Product_No, Product_Name, Price * Quantity from product;

Output –

Product No Product Name Price*Quantity

25 Soap 3200

31 Powder 2400

45 Shampoo 6250

52 Soap Box 12000

Question – Write a query to find the average price of the total product;

Select avg(Quantity) from product;

Output – 58.75

Query related to Select Statement with Where clause –

Table Name – product

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

45 Shampoo 250 25
52 Soap Box 120 100

Question – Write a Query to display the product whose price is less than 90

Select * from product where price < 90;

Output –

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

Question – Write a Query to find the total amount of the Shampoo product;

Select Price*Quantity from product where Product_Name = ‘Shampoo’;

Output – 6250

Or

Select Product_No, Product_Name, Price*Quantity from product where Product_Name =


'Shampoo';

Output –

Product No Product Name Price*Quantity

45 Shampoo 6250

Question – Write a Query to display the data whose quantity is equal to 80.

Select * from product where quantity = 80;

Output –
Product No Product Name Price Quantity

25 Soap 40 80

Database Management System Class 10 Notes


Question – Write a Query to display a list of Products whose Price between 40
to 120.

Select * from product where Price >= 40 and Price <= 120;

Output –

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

52 Soap Box 120 100

Query related to Select Statement with Order by –

Table Name – product

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

45 Shampoo 250 25

52 Soap Box 120 100


Question – Write a Query to display the list of Product Name in alphabetical
order.

Select * from product order by Product_Name ASC;

Or

Select * from product order by Product_Name;

Output –

Product No Product Name Price Quantity

31 Powder 80 30

45 Shampoo 250 25

25 Soap 40 80

52 Soap Box 120 100

Database Management System Class 10 Notes


Question – Write a Query to display the list of Price in ascending order.

Select * from product order by Price ASC;

Or

Select * from product order by Price;

Output –

Product No Product Name Price Quantity

25 Soap 40 80
31 Powder 80 30

52 Soap Box 120 100

45 Shampoo 250 25

Question – Write a Query to display the list of Price in descending order.

Select * from product order by Price DESC;

Output –

Product No Product Name Price Quantity

45 Shampoo 250 25

52 Soap Box 120 100

31 Powder 80 30

25 Soap 40 80

UPDATE statement

To edit or update already-existing records in a table, use the UPDATE


statement. Using the WHERE clause, you can either define a specific subset of
entries to edit or use it to update everything at once.

Syntax of Update Statement –

UPDATE <table name> SET = value [, column_name = value ...] [WHERE ];

Table Name – product

Product No Product Name Price Quantity


25 Soap 40 80

31 Powder 80 30

45 Shampoo 250 25

52 Soap Box 120 100

Question – Write a Query to update the price of Shampoo in the product


table.

Update product Set Price = 300 where Price = 250;

Output –

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

45 Shampoo 300 25

52 Soap Box 120 100

Question – Write a Query to update the Quantity of Powder in the product


table.

Update product Set Quantity = 50 where Product_Name = ‘Powder’;

Output –

Product No Product Name Price Quantity


25 Soap 40 80

31 Powder 80 50

45 Shampoo 250 25

52 Soap Box 120 100

Database Management System Class 10 Notes


Create Table

To create a new table in the database you can use Create Table Command.

Syntax of Create Table –

CREATE TABLE table_name ( column1 datatype, column2 datatype, column3 datatype);

Question – Write a Query to create the following table in the database;

Table Name – product

Field Data Type

Product No Integer

Product Name Varchar(20)

Price Integer

Quantity Integer

Database Management System Class 10 Notes


Create table product ( Product_No Int, Product_Name Varchar(20), Price Int,
Quantity Int);

Output –
Product No Product Name Price Quantity

Database Management System Class 10 Notes


Insert Table

Insert statement is primarily used to add a single or more rows to the target
table.

Syntax of Insert Table –

INSERT INTO table_name (column1, column2, column3, ...) VALUES


(value1, value2, value3, ...);

Or

INSERT INTO table_name VALUES (value1, value2, value3, ...);

Table Name – product

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

45 Shampoo 250 25

52 Soap Box 120 100

Question – Write a Query to add a new row with the following details

(72, “Hair Conditioner‟, 350, 60)

Insert into product (Product_No, Product_Name, Price, Quantity) values(72, “Hair


Conditioner‟, 350, 60);

Or

Insert into product values(72, “Hair Conditioner‟, 350, 60);


Output –

Product No Product Name Price Quantity

25 Soap 40 80

31 Powder 80 30

45 Shampoo 300 25

52 Soap Box 120 100

72 Hair Conditioner 350 60

Database Management System Class 10 Notes


Topic 5 : Create Forms and Reports using Wizard

Forms
The Form allows you greater control over your outcomes. The form allows you
to customize various parts of the form’s design and then generates a form
based on your instructions.

Steps To Create Form Using Wizard

Step 1 : Click Use Wizard to Create Form

Step 2 : Select the selective Fields using Arrow button

Step 3 : Click Next

Step 4 : Add Sub form if you need to insert

Step 5 : Click Next

Step 6 : Arrange selected field in a form


Step 7 : Click Next

Step 8 : Click Finish

Reports

A report helps in the presentation of data in a summarized format. It is utilized


to create a clear format for the entire work product. In the database, you can
build reports.

Steps To Create Report Using Wizard

Step 1 : Click on Use Wizard to Create Report

Step 2 : Select the selective Fields using Arrow button

Step 3 : Click Next

Step 4 : Redefine the label of the fields in the reports or else you can set the
default name

Step 5 : You can define grouping for the fields of the table

Step 6 : Click on Next

Step 7 : Click Finish


WEB APPLICATIONS
AND SECURITY
Topic 1: Working with Accessibility Options
Computer accessibility refers to a computer system’s capacity to be used by
everyone, basically for people with disabilities. A person with a disability or
impairment can use a computer with the help of a combination of hardware
and software. Assistive Technology is what it’s called.

There are numerous types of impairment that impact computer usage.


These include:

1. Learning disorders include cognitive impairments such dyslexia,


attention deficit hyperactivity disorder (ADHD), and autism.
2. Visual impairment, including colour blindness, poor vision, and total or
partial blindness.
3. Hearing loss, including total deafness.
4. Impairments of motor or dexterity, such as paralysis, cerebral palsy,
carpal tunnel syndrome, and repetitive strain injuries.
Launching Accessibility Options
To launch accessibility options in WindowsXP, Click Start > Control Panel >
Accessibility Options.

1. Keyboard Tab
2. Sound Tab
3. Display Tab
4. Mouse Tab
5. General Tab
Keyboard Tab

Sticky Keys

Sticky Keys is an accessibility tool for people with physical disabilities who use
computers, but it is also used by others to reduce repetitive strain.
By pressing and releasing a modifier key, such as Shift, Ctrl, Alt, or the
Windows key, Sticky Keys enables the user to keep that key active until
another key is tapped.

Filter Keys

Filter Keys is a feature of Microsoft Windows. It is an accessibility function that


tells the keyboard to ignore brief or repeated keystrokes, making typing easier
for people with hand tremors.

ToggleKeys

Microsoft Windows also has a function called ToggleKeys. It’s an accessibility


feature made for those with vision impairment or cognitive challenges. As
soon as the locking keys (Caps Lock, Num Lock, or Scroll Lock) are pushed on
a computer with ToggleKeys enabled, sound cues are released. When the keys
are turned on, a high sound is produced, and when they are turned off, a low
sound is produced.

Sound Tab

Sound Sentry

Users with hearing difficulties can benefit from Sound Sentry. Every time the
computer produces a sound, Sound Sentry creates visual warnings, such as a
blinking title bar or flashing border.
Show Sounds

Applications that communicate information through sound are instructed by


Show Sounds to also give information visually, for as through text captions or
informative icons.

Display Tab

High Contrast

An accessibility element to help those with vision impairment is high contrast.


For easier viewing, you can change the font’s size, colour, and background.

Cursor Options

Cursor Options is another accessibility tool that helps those with vision
impairment by altering the cursor’s blink frequency and width.

Mouse Tab
MouseKeys

People who have trouble using a mouse can benefit from the accessibility
feature called MouseKeys. This alternative substitutes the keyboard for a
mouse as the pointing device, particularly the numeric keypad.

General Tab

You may set accessibility preferences for all users on this tab. When you select
the General Tab, a window allowing you to set up extra accessibility features
will appear.

Serial Keys

People who have trouble using a keyboard or mouse can benefit from Serial
Keys, an accessibility tool. To offer input to the computer using Serial Ports,
they can employ specialized devices like Sip, Puff, and Breath Switches.

Topic 2: Networking Fundamentals


Connection between two or more computers is known as Network, Network
helps to share information and resources using communication channels.

Peer – to – Peer Architecture

Peer to peer networks are ones where each machine has an equal status.
Generally in such a network each terminal has an equally competent CPU.

Client-Server Architecture

Client server networks are networks where some computers do specific


dedicated jobs and offer services to other computers in the network. Both the
computers that supply services and the people who use those services are
referred to as clients.

Types of Network

Local Area Network (LAN) and Wide Area Network (WAN) are the two main
types of networks.
Local Area Network

A local area network (LAN) links computers and other devices within a certain
geographic region, such as a house, a school, an office building, a cluster of
nearby buildings, or a computer lab.

Wide Area Network

A wide area is covered by a wide area network (WAN) Wide Area Network
links the computer across metropolitan, regional, or national boundaries. The
most widely utilized WAN is the Internet.

Internet
A system of interconnected computer networks used by billions of people
around the world, the Internet is a global network. It is a network of networks
made up of millions of networks that are private, public, academic,
commercial, and governmental.

World Wide Web

The World Wide Web also referred to as the Web or W3, is a collection of
connected hypertext pages that may be accessed online. Web pages that
contain text, photos, videos, and other multimedia can be viewed using a web
browser, and one can use hyperlinks to move between them.

Some of the advantages associated with networking are:

 Data Sharing: One of the most important applications of networking is


to enable data sharing.
 File Transfer: Users have the ability to transmit other user’s text files,
spreadsheets, documents, presentations, audio files, and videos, among
other types of files.
 Hardware Sharing: It’s possible to share hardware elements like printers,
scanners, and other devices. For instance, one printer can be purchased
and shared across several users, saving money instead of buying 10
printers for each user.
 Internet Access Sharing: Rather than buying separate Internet
connections for each computer, you can buy one Internet connection
and share it with other computers on your network. This is fairly typical
in places like Internet cafés (browsing centers), businesses, schools, and
institutions.
 Usage of network-based applications: This includes web browsers, email
clients, chat programmes, audio and video chatting services, etc.
Getting Access to the Internet

Internet Service Provider

An Internet service provider (ISP) is an organization that gives you access to


the Internet by dial-up, direct (hard wired), wireless, or any other connection
method.

Example – Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata
Docomo, etc.

Modem

A modem transforms digital computer signals into analogue signals, which can
be transmitted over phone lines. The analogue signals are also converted back
into digital signals via this process. Its Modulator/Demodulator function is
where the word modem originates.
Types Of Common Internet Connectivity

The many types of Internet connectivity that are currently accessible can be
broadly divided into wired and wireless access. The table below provides a
summary of several Internet access options, divided into wired and wireless:

Technology Type of Connectivity

Dial-Up Wired

DSL Wired

Cable Internet Access Wired

3G Wireless

WiMax Wireless

Wi-Fi Wireless

Dial-up

Dial-up Internet access is a type of internet access that connects to an internet


service provider using the capabilities of the public switched telephone
network (PSTN).

DSL

Digital subscriber line(DSL) provide Internet access by transmitting digital data


over wires of a local telephone network. DSL service is delivered along with
wired telephone service on the same telephone line.

Cable Internet Access


Cable Internet Access is a form of broadband Internet access that uses the
cable television infrastructure. Cable Internet Access is provided through
existing cable TV networks; this is similar to DSL that is provided over existing
telephone lines.

3G

3G, short for 3rd Generation is a set of standards used for mobile devices and
mobile telecommunication services and networks. High-Speed Downlink
Packet Access (HSDPA) is 3G mobile telephony communications protocol that
allows higher data transfer speeds and capacity.

Wi MAX

A wireless communications technology called Wi MAX (Worldwide


Interoperability for Microwave Access) is designed to convey mobile
broadband access across cities and nations using a range of devices. WiMAX is
a long-range system that can operate over distances of many kilometres and
is frequently used in places where DSL or cable internet access cannot be
used.

Wi-Fi

Wi-Fi is a popular technology that allows an electronic device such as


computers or mobile phones to exchange data wirelessly over a network,
including high-speed Internet connections. WiFi devices such as personal
computer, smartphones, video game console, etc. can connect to a network
resource such as Internet through a device called the Wireless Access Point
(WAP).

Data Transfer on the Internet DATA

When a user transfers a file over a network, it frequently travels in smaller data
packets rather than all at once. Small data packets are sent between different
networks using packet switching. These data “packets” or “chunks” enable
quicker, more effective data transport.

Topic 3: Introduction to Instant Messaging


Instant Messaging

Instant messaging (IM) is a type of online communication that allows text-


based communications to be sent instantly from sender to recipient. The
majority of instant messaging programmes offer the ability to send files,
communicate in audio, make video calls and conferences, share desktops, etc.

Key Features of an instant messaging are as follows:

 Text Messages can be sent to one or more person (Similar to SMS)


 Audio calling and conferencing.
 Video calling and conferencing.
 File transfers (Not limited to documents, spread sheets, audio files,
video files, etc.)
 Message history (Save messages for future reference).
Some examples of popular Instant Messaging services today include

1. WhatsApp
2. Facebook Messenger
3. WeChat
4. QQ Messenger
5. Telegram
6. Yahoo! Messenger
7. Skype
8. Windows Live Messenger
9. Rediff Bol
10. Google Talk
Topic 4: Chatting With A Contact – Google Talk
There are some general rules and etiquettes to be followed while
chatting.

 Messages should be short and to the point.


 Always introduce yourself by name if your screen name doesn’t reflect it.
 Always ask if the other person has time to chat first – regardless of how
important you think what you have to say is, it’s not going to be well
received if the recipient is busy.
 In a business environment, know exactly what you want to discuss.
 Typing your messages in uppercase is extremely rude – it’s considered
shouting and very aggressive.
 Give people time to respond – Multiple questions sent to a recipient
before they’ve had a chance to answer can seem more like an
interrogation rather than a conversation.
 Wherever possible, give the person you are communicating with your
undivided attention. It’s not just a sign of respect, but if you have
multiple conversations happening or are allowing other issues to
distract you, you may miss an important point in the other person’s
messages or lose the gist of the conversation.
 It’s important to properly end an IM conversation – you may think the
chat is over, but the other person may not. While you’re off doing other
things, they may be sitting there staring at the screen waiting for further
communication from you!!
Topic 5: Creating and Publishing Web Pages – Blog
A blog is a discussion style site used by non-technical (or technical users) users
for creating personal web pages. Blogs are similar to an online personal diary
and simple to use.

A blog can be used to share information about events, alerts, news, reviews,
etc. A web browser is typically used to manage blogs, and thus requires an
active internet connection. You can also utilize blog software that doesn’t
require an active internet connection to write content first and then publish it
when one is available.

Some of the popular blogs include:

 www.WordPress.com
 www.blogger.com
 www.blog.com
 www.weebly.com
 www.blogsome.com
Topic 6: Using Offline Blog Editors
If you do not have an active internet connection, you can create blogs using a
blog application and publish the blog whenever internet connectivity is
available.

Free offline blog editors available that can be downloaded and installed on the
local computer are –

 Qumana
 Windows Live Writer
 Blogdesk
Topic 7: Online Transactions
Online transactions have made transactions very convenient and simplified the
workflow in many forms in a business. Online transactions deal with transfer of
money over the internet. Revolution in the electronic media has made
transaction handling easy.

Online shopping could be useful in situations when:

 A customer does not have sufficient time to visit stores.


 Visiting a store is more expensive than purchasing a product online.
 A product or service that is not available in the local market is available
online.
Some of the popular online transaction websites are:

 IRCTC, an online portal for booking flight and train tickets.


 Flipkart, an online shopping portal for buying consumer products.
 EBay, an online portal for buying and selling goods.
 Redbus, an online portal for booking bus tickets.
Topic 8: Internet Security
Internet security is a branch of computer security specifically related to the
Internet, often involving browser security but also network security.
Best Practices for Security

Use strong passwords. You can make a password that is difficult for other
users to guess or crack by combining alphanumeric and special characters.
Avoid using single or combination passwords that include your favourite
colour, names of friends or family members, bike number, or mobile number.

Following is a general guideline for managing strong passwords.

 Keep the length of the password at least 12-14 characters if permitted.


 Avoid keeping passwords based on repetition, dictionary words, letter or
number sequences, usernames, relative or pet names, etc.
 Including numbers, and symbols in passwords if allowed.
 Use capital and lower-case letters.
 Avoid using the same password for multiple sites or purposes.
 Avoid using something that the public or workmates know you strongly
like or dislike.
 Use random password generators if possible.
Example of a strong password: u1vX:,4Hd{]$
Encryption Software

Software that encrypts data is used to guard against illegal access to digital
data. Digital information on computers and digital information communicated
to other computers over the Internet are both protected by cryptography/
Encryption Software.

How to prevent our personal information

1. Don’t share your personal information related to your credit card or


online banking, such as your credit card number, account information,
etc.,
2. Use antivirus and antispyware software
3. Antivirus and Antispyware programs also offer real-time protection
monitoring your computer for any changes by malware software.
4. Do not immediately respond to mails from unknown users
5. Clear browser cookies frequently
6. Keep the operating system and software applications up to date
7. Never install software from unknown sources
8. Remove unwanted or unknown software applications
Install firewalls

A firewall, which could be hardware or software, can help keep a network and
computer secure. Firewalls examine network traffic to decide whether or not it
should be permitted.

Clearing Data Stored In Browsers

Passwords entered into online forms can be stored using the built-in password
management features of web browsers. When users try to enter into websites,
browsers frequently ask if they want to save their usernames and passwords.

To clear personal data from a web browser such as Mozilla Firefox, launch
the browser.

 Click Tools Menu, click Options.


 Click Security Tab. The following window will be displayed:
Topic 9: Maintain Workplace Safety
Maintain Workplace Safety

A uniform set of safety guidelines and practices must be followed by every


organization. These guidelines must be expressed and prominently displayed
in key locations. To follow safety regulations, all staff must get training and
demonstrations.

Workplace safety basics to follow: fire safety, slip-and-fall prevention, electrical


safety, and first aid.

Basic Fire safety rules in an organization are

 Fire escape plans must be installed at proper levels


 Conduct regular drills
 Smoke alarms must be placed at proper intervals
 Keep workplace a no-smoking zone
 Maintenance of safety equipment must be taken care of regularly
Falls and Slips Safety rules

 Keep the moving area clean and clutter free.


 Workplace must be proper ventilated receive light.
 Wear non slippery footwear.
 Floors must be clean and dry
 Oil spills, dust must be immediately cleaned.
Electrical Safety Rules

 Electrical equipment used should be approved by a recognized


organization.
 Workers should be trained to handle the electric equipment safely
 Damaged and hazardous electrical equipment should be immediately
replaced. All old and workout and frayed switches and wires should be
changed.
 Heat emanating equipment should be kept away from the electrical
equipment.
 Take care that the outlets/ circuits should not be overloaded.
 Switch off and unplug the electrical appliances before cleaning or
relocating them.
Some rules of First Aid are

 Assure the injured to remain calm and not to panic


 Keep them warm if they are under shock
 Do not move the victim in case of back/neck injury
Topic 10: Prevent Accidents and Emergencies

Types of Accidents:

Accidents may be of following types:

 Accidents at workplace : Slips and fall accidents, fire


 Industrial disease/illness
 Road traffic accidents
 Clinical Accidents
 Sports related accidents
Handling Accidents

 Every organization must follow SOP for accident handling


 Safety measures must be placed to prevent workplace accidents
 Immediately call the medical team for any injury
 Stay alert
 Pay attention to and follow emergency drills
Emergency
To stop more losses and to reduce the loss, an emergency needs to be treated
right away. To spot any form of disaster, one must be vigilant. There are
numerous crises that could happen at home. In job or in school.

Types of Emergency

There are many different kinds of emergencies, thus it is important to have an


emergency management plan in place. The following are some examples of
emergencies:

 Chemical spills
 Extreme heat waves
 Droughts
 Pandemics
 Terrorist attack
 Fire
 Floods
 Thunderstorms
 Leakage of some hazardous gas/ chemical
Some of the types of emergencies that require evacuation are:

● Fire
● Explosion
● Floods
● Earthquake
● Hurricane
● Tornado
● Toxic material release
● Civil disturbance
● Workplace violence

Topic 11: Protect Health and Safety at Work


A company may face health risks that risk the lives of its employees. A hazard
is something that could potentially cause harm, damage, or any type of loss of
life or health.

Hazards can be of different types depending on the industry and the


environment in which the employees work. The different types of hazards
include:
 Physical
 Chemical
 Biological
 Mechanical
Sources of Hazards

Checklist for Workstations: The workstation should:

 provide sufficient space for the user to alter position comfortably


 provide adequate lighting
 have windows fitted with adjustable coverings to alter the sunlight level
 be spacious enough when a workstation is shared by more than one
person
The display screen should:

 display well-defined characters of adequate size and spacing


 have a stable image
 have easily adjustable brightness and contrast
 tilt and swivel easily to suit the user
 Be free from glare and reflection.
 Use a separate base for the screen or an adjustable table
The keyboard should:

 be able to tilt easily and should be able to separate from the screen to
allow the user to adopt a comfortable working position
 have space in front to provide support for the hands or arms of the user
 have a matt surface
 have clearly legible symbols on the keys
The work surface should:

 provide adequate space for the user


 have a low reflective surface
 be of an adequate size to allow the screen, keyboard and other
peripherals to be flexibly arranged
 have a stable and adjustable document holder, which should be at the
same level as the screen and at the same viewing distance
Workplace Evacuation

There should be a plan in place for evacuation in an emergency. In the event


of an emergency or disaster, evacuation is the process of vacating a location.
Every business must take the following precautions to ensure a safe
evacuation in an emergency:

 Every organization must have an evacuation policy


 Organization must have a designated assembly point for emergencies.
 A ‘buddy system’ for individuals with special needs or disabilities must
be designated.
 Floor plans with evacuation routes in work areas.
 Assembly areas, where you are required to assemble after evacuation,
must be properly taken care of.
 Periodic evacuation drills should be conducted. Ensure that you pay
attention during these drills
Healthy Living

A healthy lifestyle helps to keep and improve people’s health and well being.
A healthy lifestyle includes:

 healthy eating habits


 physical activities
 stress management
 healthy mind
 sound sleep
 goal setting

You might also like