Practical File Class X (402) - 1
Practical File Class X (402) - 1
Class X – IT
(402)
Practical File
Session – 2023-24
Teacher Name:
Teacher Sign:
INDEX
Page styles : include margins, headers and footers, borders and backgrounds. In Calc,
page styles also include the sequence for printing sheets.
Paragraph styles : control all aspects of a paragraph’s appearance, such as text
alignment, tab stops, line spacing, and borders, and can include character formatting.
Character styles : affect selected text within a paragraph, such as the font and size of
text, or bold and italic formats.
Frame styles : are used to format graphic and text frames, including wrapping type,
borders, backgrounds, and columns.
Numbering styles : apply similar alignment, numbering or bullet characters, and fonts
to numbered or bulleted lists.
********************************************************************
Procedure:
1. Select the paragraph and click on B in the Font group on the Home tab.
2. Select the paragraph and click on I in the Font group on the Home tab.
3. Select the paragraph and click on U in the Font group on the Home tab.
Result:
Bold:
On the Insert tab, the galleries include items that are designed to
coordinate with the overall look of your document. You can use these
galleries to insert tables, headers, footers, lists, cover pages, and other
document building blocks.
Italic:
On the Insert tab, the galleries include items that are designed to coordinate
with the overall look of your document. You can use these galleries to insert
tables, headers, footers, lists, cover pages, and other document building
blocks.
Underline:
On the Insert tab, the galleries include items that are designed to coordinate
with the overall look of your document. You can use these galleries to insert
tables, headers, footers, lists, cover pages, and other document building
blocks.
Q3. Demonstrate font case on Text.
Procedure:
Change Text to Sentence Case
Step 1 − Select the portion of text that that needs to be put in sentence case. We
can useany of the text selection methods to select the portion of text.
Step 2 − Click the Change Case button and then select the Sentence Case option to
capitalize the first character of every selected sentence.
Change Text to Lower case
Step 1 − Select the portion of text that needs to be put in lower case. We can use
any ofthe text selection methods to select the portion of text.
Step 2 − Click the Change Case button and then select Lower case option to
display allthe selected words in lower case.
Change Text to Uppercase
Step 1 − Select the portion of text that we want to change to a bold font. We can
use anyof the text selection method to select the portion of text.
Step 2 − Click the Change Case button and then select UPPERCASE option to
displayall selected words in all caps. All characters of every selected word will
be capitalized.
Capitalize Text
Step 1 − Select the portion of text that needs to be capitalized. We can use any
of the text selection method to select the portion of text.
Step 2 − Click the Change Case button and then select the Capitalize
Each Word option to put a leading cap on each selected word.
Toggle the Text
Step 1 − Select the portion of text that we want to change to a bold font. We
can use any of the text selection method to select the portion of text.
Step 2 − Click the Change Case button and then select the tOGGLE
cASE option to change all the words in lower case into words in uppercase;
the words in uppercase words change to words in lowercase.
Result:
Sentence Case
Provide solutions that utilize machine learning, artificial intelligence and
internet of things technologies to provide enhanced insights with real-time
situational intelligence and improved business outcomes.
Lower case
Upper Case
PROVIDE SOLUTIONS THAT UTILIZE MACHINE LEARNING, ARTIFICIAL INTELLIGENCE
AND INTERNET OF THINGS TECHNOLOGIES TO PROVIDE ENHANCED INSIGHTS WITH
REAL-TIMESITUATIONAL INTELLIGENCE AND IMPROVED BUSINESS OUTCOMES.
Toggle Case
pROVIDE SOLUTIONS THAT UTILIZE MACHINE LEARNING, ARTIFICIAL INTELLIGENCE
AND INTERNET OF THINGS TECHNOLOGIES TO PROVIDE ENHANCED INSIGHTS WITH
REAL-TIMESITUATIONAL INTELLIGENCE AND IMPROVED BUSINESS OUTCOMES.
Procedure:
Procedure:
To find text:
2. Type the text we want to find in the field at the top of the
navigationpane.
3. If the text is found in the document, it will be highlighted in
yellow, and a preview will appear in the navigation pane.
4. If the text appears more than once, we can click the arrows on
the navigation pane to step through the results. We can also
click the result previews on the navigation pane to jump to the
location of a result in your document.
5. When we close the navigation pane, the highlighting will
disappear. To replace text:From the Home tab, click the Replace command.
The Find and Replace dialog box will appear.
1. Type the text we want to find in the Find what field.
2. Type the text we want to replace it with in the Replace
with field.
3. Click Find Next and then Replace to replace text. We can also
click Replace All to replace all instances within the document.
Result:
Paragraph with word you in Bold
On the Insert tab, the galleries include items that are designed to coordinate
with the overall look of your document. You can use these galleries to insert
tables, headers, footers, lists, cover pages, and other document building
blocks. When you create pictures, charts, or diagrams, they also coordinate
with your current document look. You can easily change the formatting of
selected text in the document text by choosing a look for the selected text
from the Quick Styles gallery on the Home tab. You can also format text
directly by using the other controls on the Home tab.
Replaced word you to we in bold
On the Insert tab, the galleries include items that are designed to coordinate
with the overall look of your document. We can use these galleries to insert
tables, headers, footers, lists, cover pages, and other document building blocks.
When we create pictures, charts, or diagrams, they also coordinate with your
current document look. We can easily change the formatting of selected text in
the document text by choosing alook for the selected text from the Quick Styles
gallery on the Home tab. We can also format text directly by using the other
controls on the Hometab.
Q6. Write the steps to create new style in Open Office Writer.
1. Open the Styles and Formatting window and choose the type
of style you want to create.
2. In the document, select the item you want to save as a style.
3. In the Styles and Formatting window, click on the New Style
from Selection icon
4. After Clicking on New Style from Selection, create style
dialog box appear.
5. Write the name for the new style and click on OK
********************************************************************
Q7. Write the steps to consolidate data of two sheets in Open Office Calc .
Ans. 1. Open a new file in Open Office Calc and write the following data :
3. Open the third sheet and click on Data → Consolidate. The following
dialog box appear
4. Click to select Source data range of first sheet and then click on Add button.
5. After adding Source data range from both the sheets, the dialog box
will appear like shown below:
6. Click on the green button and select the Cell where you want
the consolidated data.
7. After adding both the range and selecting the cell where we want the
result, click on OK button
8. After clicking OK button, we will get the consolidated data as shown below.
********************************************************************
Ans. Following steps create a macro that performs paste special with multiply.
1. Open a new file in calc.
2. Enter the following data.
3. Select cell A3, which contains the number 3, and copy the value to the
clipboard.
4. Select the range A1:C3. 5. Use Tools > Macros > Record Macro to
start the macro recorder.
5. The Record Macro dialog is displayed with a stop recording button.
6. Use Edit > Paste Special to open the Paste Special dialog.
7. Set the operation to Multiply and click OK. The cells are now multiplied by 3.
8. Click Stop Recording to stop the macro recorder. The OpenOffice.org
Basic Macros dialog opens and save the macro at specified place with a
particular name.
********************************************************************
Q9. Write the steps to create table with minimum five fields on an entity
"STUDENT" in design view.
1. Click on Create Table in Design View… option available under Tasks and a
Table Design window appears as shown below.
2. Specify the field name and data type of the field to be created as shown below.
Class X – IT (402) Board Practical File
3. In the gray box at the left of the line, right-click and select Primary Key,
bringing up a key icon in the box
********************************************************************
********************************************************************
Ans. To launch accessibility options in WindowsXP, Click Start > Control Panel >
Accessibility Options.
Keyboard Tab :
Sticky Keys
• Click Apply.
• Click OK.
Filter Keys :
• Click Settings under Filter Keys and check “Ignore Repeated Keystrokes”.
• Click Apply.
• Click OK.
Display Tab:
Select the Display Tab. A window with options to configure accessibility options for
display is displayed with option.
• High Contrast
• Cursor Options
Mouse Tab :
MouseKeys
MouseKeys is an accessibility feature that assists people who have difficulty
using a mouse. Select the Mouse Tab, a window to configure accessibility
options for mouse will be displayed
********************************************************************
Q12. Write the steps to create instant messaging account for Google
Talk.
Ans. Google Talk is an instant messaging service that provides both text and voice
communication developed by Google Inc. Before you start using Google Talk, a
Gmail account is required.
To launch Google Talk, Click Start > Programs >Google Talk>Google Talk.
You need to have a list of contacts that are available for chat. If you don’t have any
contacts, you can add their Gmail account to your contact list by sending an invite.
Signing In into your Google Talk Account
To use Google Talk, you need to sign in with your account details.
After signing in into your Google Talk account, you should see a window similar to
the one displayed below. Now the Google Talk application is ready for use.
While performing online transactions, you need to check some security aspects. So in
this article, Internet security class 10 notes and Comprehensive guide you will learn
about this.
There are many online threats which may lead to steal your information online.
Whatever sensitive data like username, passwords, credit cards and debit cards
information, you are providing while performing the online transactions can be tracked
by some unauthorized users.
Some websites release links and malware without your consent which are very
dangerous and can damage the computer and steal your information.
Online threats
There are some online threats discussed below:
1. Phishing:
Phishing is an activity that demands your sensitive data like bank details, username or
passwords, credit card details, and other details through email attachments or links. The
links redirect you to such a fake website that looks too similar to the bank’s website and
asks to enter data.
2. Email Spoofing:
Email spoofing is an activity of an email from a source that is fake and used for
phishing emails and spam emails to run a campaign. The main goal of email spoofing is
that recipient opens a message and click on the links provided in that email.
3. Chat Spoofing:
4. Eavesdropping:
The DoS attack refers to an attack from a large number of computers to a single target
and tries to prevent the device from properly functioning.
6. Password Attack:
Password attacks are a common security threat that is aimed to guess your password or
steal your password using different tricks such as dictionary attacks (common words
and numbers), brute force attack (uses a program to generate similar kind of
passwords), Man-in-the-middle attack (Impersonates an app or website to capture
passwords), Keylogger attack (Tracks the keystrokes for a user to collect their
password), Social engineering attack(Uses phishing techniques or personal interaction
to get passwords).
7. Viruses:
Viruses are malicious program or harmful program which can damage the computer
system, memory and replicate themselves.