0% found this document useful (0 votes)
19 views23 pages

Practical File Class X (402) - 1

The document is a practical file for Class X IT students at Sarvodaya Co-Ed Vidyalaya, detailing various tasks and exercises related to Open Office applications. It includes instructions for creating styles, formatting text, using tools like spelling and grammar check, and performing data consolidation in spreadsheets. Additionally, it covers creating tables, using macros, and understanding internet security and online threats.

Uploaded by

manjugupta26384
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views23 pages

Practical File Class X (402) - 1

The document is a practical file for Class X IT students at Sarvodaya Co-Ed Vidyalaya, detailing various tasks and exercises related to Open Office applications. It includes instructions for creating styles, formatting text, using tools like spelling and grammar check, and performing data consolidation in spreadsheets. Additionally, it covers creating tables, using macros, and understanding internet security and online threats.

Uploaded by

manjugupta26384
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Practical File School ID: 1413027

SARVODAYA CO-ED VIDYALAYA


SECTOR-8 ROHINI

Class X – IT
(402)
Practical File
Session – 2023-24

Submitted By: ______________


Class & Section: ____________
Roll Number: _____________
Subject: IT
Subject Code: 402

Teacher Name:

Teacher Sign:
INDEX

S.No Practical Teacher's Sign


1 Explain the styles given in the Styles and Formatting
Window for writer and paste the screen shot of the
window also
2 Write the steps to create new style in Open Office
Writer.
3 Demonstrate Bold, Italic and Underline effects on Text.

4 Demonstrate font case on Text.


5 Spelling and Grammar Tool

6 Find and Replace .


7 Write the steps to consolidate data of two sheets in
Open Office Calc .
8 Write the steps to record Macro in open office calc.

9 Write the steps to create table with minimum five fields


on an entity "STUDENT" in design view.
10 Write the command for the following table Student

11 Illustrate the use of various options under computer


Accessibility in Keyboard, Mouse, Display tab

12 Write the steps to create instant messaging account for


Google Talk
13 What is internet security and online threads?

14 To reduce the risks follow these best practices.


Q1. Explain the styles given in the Styles and Formatting Window for
writer and paste the screen shot of the window also.

Ans. OpenOffice.org supports the following types of styles:


1. Page styles
2. Paragraph styles
3. Character styles
4. Frame styles
5. Numbering styles
6. Cell styles
7. Graphics styles
8. Presentation Styles

Page styles : include margins, headers and footers, borders and backgrounds. In Calc,
page styles also include the sequence for printing sheets.
Paragraph styles : control all aspects of a paragraph’s appearance, such as text
alignment, tab stops, line spacing, and borders, and can include character formatting.
Character styles : affect selected text within a paragraph, such as the font and size of
text, or bold and italic formats.
Frame styles : are used to format graphic and text frames, including wrapping type,
borders, backgrounds, and columns.
Numbering styles : apply similar alignment, numbering or bullet characters, and fonts
to numbered or bulleted lists.

********************************************************************

Q2. Demonstrate Bold, Italic and Underline effects on Text.

Aim: Demonstrate Bold Italic and Underline effects on text.

Procedure:
1. Select the paragraph and click on B in the Font group on the Home tab.

2. Select the paragraph and click on I in the Font group on the Home tab.

3. Select the paragraph and click on U in the Font group on the Home tab.

Result:
Bold:

On the Insert tab, the galleries include items that are designed to
coordinate with the overall look of your document. You can use these
galleries to insert tables, headers, footers, lists, cover pages, and other
document building blocks.

Italic:
On the Insert tab, the galleries include items that are designed to coordinate
with the overall look of your document. You can use these galleries to insert
tables, headers, footers, lists, cover pages, and other document building
blocks.
Underline:

On the Insert tab, the galleries include items that are designed to coordinate
with the overall look of your document. You can use these galleries to insert
tables, headers, footers, lists, cover pages, and other document building
blocks.
Q3. Demonstrate font case on Text.

Aim: Applying various font case.

Procedure:
Change Text to Sentence Case
Step 1 − Select the portion of text that that needs to be put in sentence case. We
can useany of the text selection methods to select the portion of text.
Step 2 − Click the Change Case button and then select the Sentence Case option to
capitalize the first character of every selected sentence.
Change Text to Lower case
Step 1 − Select the portion of text that needs to be put in lower case. We can use
any ofthe text selection methods to select the portion of text.
Step 2 − Click the Change Case button and then select Lower case option to
display allthe selected words in lower case.
Change Text to Uppercase
Step 1 − Select the portion of text that we want to change to a bold font. We can
use anyof the text selection method to select the portion of text.
Step 2 − Click the Change Case button and then select UPPERCASE option to
displayall selected words in all caps. All characters of every selected word will
be capitalized.
Capitalize Text
Step 1 − Select the portion of text that needs to be capitalized. We can use any
of the text selection method to select the portion of text.
Step 2 − Click the Change Case button and then select the Capitalize
Each Word option to put a leading cap on each selected word.
Toggle the Text
Step 1 − Select the portion of text that we want to change to a bold font. We
can use any of the text selection method to select the portion of text.
Step 2 − Click the Change Case button and then select the tOGGLE
cASE option to change all the words in lower case into words in uppercase;
the words in uppercase words change to words in lowercase.
Result:
Sentence Case
Provide solutions that utilize machine learning, artificial intelligence and
internet of things technologies to provide enhanced insights with real-time
situational intelligence and improved business outcomes.
Lower case

provide solutions that utilize machine learning, artificial intelligence and


internet of things technologies to provide enhanced insights with real-time
situational intelligence and improved business outcomes.

Capitalize each word:

Provide Solutions That Utilize Machine Learning, Artificial Intelligence And


Internet Of Things Technologies To Provide Enhanced Insights With Real-
Time Situational Intelligence And Improved Business Outcomes.

Upper Case
PROVIDE SOLUTIONS THAT UTILIZE MACHINE LEARNING, ARTIFICIAL INTELLIGENCE
AND INTERNET OF THINGS TECHNOLOGIES TO PROVIDE ENHANCED INSIGHTS WITH
REAL-TIMESITUATIONAL INTELLIGENCE AND IMPROVED BUSINESS OUTCOMES.

Toggle Case
pROVIDE SOLUTIONS THAT UTILIZE MACHINE LEARNING, ARTIFICIAL INTELLIGENCE
AND INTERNET OF THINGS TECHNOLOGIES TO PROVIDE ENHANCED INSIGHTS WITH
REAL-TIMESITUATIONAL INTELLIGENCE AND IMPROVED BUSINESS OUTCOMES.

Q4. Spelling and Grammar Tool

Aim: To use spelling and grammar tool to correct the text .

Procedure:

1. Go to the Review tab.

2. Click on the Spelling & Grammar command.


3. The Spelling and Grammar dialog box will open. For each error in
yourdocument, Word will try to offer one or more suggestions. We
can select a suggestion and click Change to correct the error.
Result: Original Paragraph with error:
Machine learning is closely related to computational sttistics, which focuses on making
predictions using computers. The study of mathmatical optimization delivers methods,
theoryand application domains to the field of machine learning. Data mining is a field of
study withinmachine learning, and focuses on exploratry data analysis through
unsuprvised learning. In its application across business problems, machine learning is
also referred to as predictve analytics.
Corrected Paragraph:
Machine learning is closely related to computational statistics, which focuses on making
predictions using computers. The study of mathematical optimization delivers methods,
theory and application domains to the field of machine learning. Data mining is a field of
studywithin machine learning, and focuses on exploratory data analysis through
unsupervised learning In its application across business problems, machine learning is
also referred to
as predictive analytics.
Q5. Find and Replace . Aim: To replace word using find and replace tool.

Procedure:
To find text:

1. From the Home tab, click the Find command.


The navigation pane will appear on the left side of the screen.

2. Type the text we want to find in the field at the top of the
navigationpane.
3. If the text is found in the document, it will be highlighted in
yellow, and a preview will appear in the navigation pane.
4. If the text appears more than once, we can click the arrows on
the navigation pane to step through the results. We can also
click the result previews on the navigation pane to jump to the
location of a result in your document.
5. When we close the navigation pane, the highlighting will
disappear. To replace text:From the Home tab, click the Replace command.
The Find and Replace dialog box will appear.
1. Type the text we want to find in the Find what field.
2. Type the text we want to replace it with in the Replace
with field.
3. Click Find Next and then Replace to replace text. We can also
click Replace All to replace all instances within the document.

Result:
Paragraph with word you in Bold
On the Insert tab, the galleries include items that are designed to coordinate
with the overall look of your document. You can use these galleries to insert
tables, headers, footers, lists, cover pages, and other document building
blocks. When you create pictures, charts, or diagrams, they also coordinate
with your current document look. You can easily change the formatting of
selected text in the document text by choosing a look for the selected text
from the Quick Styles gallery on the Home tab. You can also format text
directly by using the other controls on the Home tab.
Replaced word you to we in bold
On the Insert tab, the galleries include items that are designed to coordinate
with the overall look of your document. We can use these galleries to insert
tables, headers, footers, lists, cover pages, and other document building blocks.
When we create pictures, charts, or diagrams, they also coordinate with your
current document look. We can easily change the formatting of selected text in
the document text by choosing alook for the selected text from the Quick Styles
gallery on the Home tab. We can also format text directly by using the other
controls on the Hometab.
Q6. Write the steps to create new style in Open Office Writer.

Ans. We can create New (Custom) Styles in two ways

1. Creating a new style from a selection :

1. Open the Styles and Formatting window and choose the type
of style you want to create.
2. In the document, select the item you want to save as a style.
3. In the Styles and Formatting window, click on the New Style
from Selection icon
4. After Clicking on New Style from Selection, create style
dialog box appear.
5. Write the name for the new style and click on OK

********************************************************************

Q7. Write the steps to consolidate data of two sheets in Open Office Calc .
Ans. 1. Open a new file in Open Office Calc and write the following data :

Sheet-1 screen shot


2. Open another file in Open Office Calc and write the following Data

Sheet-2 screen shot

3. Open the third sheet and click on Data → Consolidate. The following
dialog box appear

4. Click to select Source data range of first sheet and then click on Add button.
5. After adding Source data range from both the sheets, the dialog box
will appear like shown below:
6. Click on the green button and select the Cell where you want
the consolidated data.
7. After adding both the range and selecting the cell where we want the
result, click on OK button
8. After clicking OK button, we will get the consolidated data as shown below.

********************************************************************

Q8. Write the steps to record Macro in open office calc.

Ans. Following steps create a macro that performs paste special with multiply.
1. Open a new file in calc.
2. Enter the following data.
3. Select cell A3, which contains the number 3, and copy the value to the
clipboard.
4. Select the range A1:C3. 5. Use Tools > Macros > Record Macro to
start the macro recorder.
5. The Record Macro dialog is displayed with a stop recording button.

6. Use Edit > Paste Special to open the Paste Special dialog.

7. Set the operation to Multiply and click OK. The cells are now multiplied by 3.
8. Click Stop Recording to stop the macro recorder. The OpenOffice.org
Basic Macros dialog opens and save the macro at specified place with a
particular name.
********************************************************************
Q9. Write the steps to create table with minimum five fields on an entity
"STUDENT" in design view.

Ans. We will design the following table.

Field Name Data Type Constraint


ID Integer Primary Key
Name Varchar
Address Varchar
Phone Varchar
DOB Date

1. Click on Create Table in Design View… option available under Tasks and a
Table Design window appears as shown below.

2. Specify the field name and data type of the field to be created as shown below.
Class X – IT (402) Board Practical File

3. In the gray box at the left of the line, right-click and select Primary Key,
bringing up a key icon in the box

4. Save the table (File > Save)

********************************************************************

Q10. Write the command for the following table Student.

Rollno Class Name Phone_no


1 XII Sumit 1234565
2 X Amit 3564583
3 X Anuj 1236589
4 XI Mini 5869542

1. Display all the records of table Student.


2. Insert record of your choice
3. Display record of student whose roll number is 3
4. Display record of students who are in class 'X
5. Display the record of 'Anuj'
Ans.
1. Select * from student;
2. Insert into student values(5, 'XI' , 'Suman' , 6953245)
3. Select * from student where Rollno = 3;
4. Select * from student where class = 'X'
5. Select * from student where name = 'Anuj';

********************************************************************

Q11. Illustrate the use of various options under computer


Accessibility in Keyboard, Mouse, Display tab .

Ans. To launch accessibility options in WindowsXP, Click Start > Control Panel >
Accessibility Options.

The Accessibility Options window appears

Keyboard Tab :

Sticky Keys

Sticky Keys is an accessibility feature to help computer users with physical


disabilities. To enable Sticky Keys, select Use Sticky Keys.

• Click Apply.
• Click OK.

The Sticky Keys icon appears in the system tray.

Filter Keys :

Filter Keys is a feature of Microsoft Windows. It is an accessibility function that


tells the keyboard to ignore brief or repeated keystrokes, making typing easier for
people with hand tremors.
• To enable Filter Keys, check Use Filter Keys.

• Click Settings under Filter Keys and check “Ignore Repeated Keystrokes”.
• Click Apply.
• Click OK.
Display Tab:

Select the Display Tab. A window with options to configure accessibility options for
display is displayed with option.

• High Contrast
• Cursor Options
Mouse Tab :

MouseKeys
MouseKeys is an accessibility feature that assists people who have difficulty
using a mouse. Select the Mouse Tab, a window to configure accessibility
options for mouse will be displayed

• To enable MouseKeys, Check Use MouseKeys.


• Click Apply.
• Click OK.

********************************************************************

Q12. Write the steps to create instant messaging account for Google
Talk.

Ans. Google Talk is an instant messaging service that provides both text and voice
communication developed by Google Inc. Before you start using Google Talk, a
Gmail account is required.

First download Google Talk application from www.google.com/talk

To launch Google Talk, Click Start > Programs >Google Talk>Google Talk.

You need to have a list of contacts that are available for chat. If you don’t have any
contacts, you can add their Gmail account to your contact list by sending an invite.
Signing In into your Google Talk Account

To use Google Talk, you need to sign in with your account details.
After signing in into your Google Talk account, you should see a window similar to
the one displayed below. Now the Google Talk application is ready for use.

Q13. What is internet security and online threads?

 Ans. Internet security


As we are using internet for many purposes in a day. So security is also one of the
major concern for it. While using internet you have to take care of two aspects concern
to security.

1. The browser security


2. The network security
Security refers to follow some rules and guideline to protect the data and information
shared on the internet. There is a huge risk of data when you are online if you are not
following some basic protocols.

While performing online transactions, you need to check some security aspects. So in
this article, Internet security class 10 notes and Comprehensive guide you will learn
about this.

There are many online threats which may lead to steal your information online.
Whatever sensitive data like username, passwords, credit cards and debit cards
information, you are providing while performing the online transactions can be tracked
by some unauthorized users.

Some websites release links and malware without your consent which are very
dangerous and can damage the computer and steal your information.

 Online threats
There are some online threats discussed below:

1. Phishing:

Phishing is an activity that demands your sensitive data like bank details, username or
passwords, credit card details, and other details through email attachments or links. The
links redirect you to such a fake website that looks too similar to the bank’s website and
asks to enter data.

2. Email Spoofing:

Email spoofing is an activity of an email from a source that is fake and used for
phishing emails and spam emails to run a campaign. The main goal of email spoofing is
that recipient opens a message and click on the links provided in that email.

3. Chat Spoofing:

It similar to email spoofing on the chat platform.

4. Eavesdropping:

Eavesdropping is a process like listening online. In this technique, a third party is


observing the communication happening between you and your partner. The hackers
may attempt to take out your data from a website directly.
5. Denial of Services:

The DoS attack refers to an attack from a large number of computers to a single target
and tries to prevent the device from properly functioning.

6. Password Attack:

Password attacks are a common security threat that is aimed to guess your password or
steal your password using different tricks such as dictionary attacks (common words
and numbers), brute force attack (uses a program to generate similar kind of
passwords), Man-in-the-middle attack (Impersonates an app or website to capture
passwords), Keylogger attack (Tracks the keystrokes for a user to collect their
password), Social engineering attack(Uses phishing techniques or personal interaction
to get passwords).

7. Viruses:

Viruses are malicious program or harmful program which can damage the computer
system, memory and replicate themselves.

Q14. To reduce the risks follow these best practices


1. Use updated antivirus or antispyware software: Install and use a valid antivirus
or antispyware software
2. Install and Use a firewall: A firewall is software or hardware that provides a
dialog box to allow the services or deny. It controls the incoming traffic and
services.
3. Use strong passwords: A strong password is a combination of character, numbers
and special characters. The following points can be taken into consideration
while assigning a strong password:
1. Do not use simple passwords like your favourite colour, bike number,
hero, date of birth, mobile number, repetition password, common
dictionary words, letter or number sequence, usernames, relative or pet
names etc.
2. Change your password frequently
3. Keep the password length up to 12-24 characters
4. Use capital and lower-case letters
5. Avoid using similar passwords for different websites
6. Avoid using something which is publicly known
7. Use random password generators
4. Use encryption software: Encryption software can be downloaded from the
website. It is used to protect data from unauthorized users.
5. Keep username password private: The username and password cannot be shared
or saved on computers.
6. Clear browser history frequently: Sometimes a computer is used in a shared
environment in the offices. The browsers store the information related to the
user’s logins and sessions in cookies. So whenever one user session is ending, the
history must be cleared.
7. Privacy Policies: Read the privacy policies and agreement about to use personal
data while accepting the agreement.
8. Don’t share personal information: Be careful while filling up the details of the
form such as name, gender, age, and other data. Share data with open eyes.
9. Secure Transactions: While doing online shopping or transactions, ensure that the
website is secured. As you can see a lock icon on the address bar in front of the
website’s address.
10. Don’t respond to unknown mails: While using emails, we are receiving
hundreds of unknown emails, do not respond to such emails or click on any links.
11. Keep up to date software: Download and install regular updates for the
applications and operating systems.
12. Don’t install software from unknown sources: While downloading the
software and applications, use trustworthy and reputed sources.
13. Remove unwanted software: Some applications may be installed automatically
while using the internet, remove such applications.

You might also like