Class 10th file
Class 10th file
INFORMATION TECHNOLOGY
SESSION 2024-2025
If paragraph style are active, the paragraph style will be added, the paragraph
style will be added to the list.
If character style are active, the character style will be added to the list.
2. On-screen Keyboard
3. Start Narrator
Steps to open – Control Panel >> Ease of Access >> Ease of Access Center >> Start Narrator
Options available in Start Narrator tool
1. Sticky Keys
Sticky Keys stick your Alt, Ctrl, Del and Windows Logo button even after you release them so that
you can perform windows shortcut operations without having to press both the buttons simultaneously.
Suppose you have enabled Sticky keys, and you want to open Windows Explorer using shortcut keys.
You can press and release Windows button and then press the E key, even after some time, to get to the
Explorer window.
Turn on/off Sticky Keys when SHIFT is pressed 5 times
2. Toggle Keys
Most of the times while typing I accidentally press the Caps Lock button instead of ‘A’ key and then
continue in the uppercase realizing only after I’ve typed two to three sentences. This is where Toggle
Keys feature can come in handy. After you enable this feature, you will hear a notification sound
whenever you press Caps, Num and Scroll Lock keys.
Turn on/off Toggle Keys when NUM LOCK is pressed for 5 seconds
3. Filter Keys
Filter keys are meant to ignore the repeated keystrokes you press accidentally while typing. After
you enable it, don’t forget to configure the default response time, or you will have to wait forever to
write a simple paragraph.
Turn on/off Filter Keys when Right SHIFT is pressed for 8 seconds
4. Mouse Keys
Microsoft Windows accessibility feature that allows a user to control their mouse movement using
the numeric pad on their keyboard. The Mouse Keys feature can be enabled and disabled through
the Accessibility Options or Ease of Access Center in the Windows Control Panel.
To activate Mouse Keys – Press Alt + Left Shift + Num Lock key combination. A tone sounds and
the Mouse Keys dialog box appears. By default, the cursor will be on the Yes button.
A network is a collection of two or more things connected to one another to allow the sharing of data,
thoughts and ideas.
Example: Telephone network, Railway Track Network, Road Network
Computer Network
A computer network may be defined as a group of two or more computer systems or peripheral devices,
that are connected together to exchange information and share resources among a wide range of users.
Types of networks
Depending on their size, capabilities, and the geographical distance the cover, a computer network can
be classified as follows:
Personal Area Network (PAN) or HAN (Home Area Network)
Local Area Network (LAN) or CAN (Campus Area Network)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
Network Architecture
It is an overall design of a computer network hardware and their working.
Peer-to-peer Network
Peer means equal and therefore in a peer-to-peer network, each computer or node is equal to other
computers or nodes in terms of the resources that can access and share. All nodes in this type of
network act both as the supplier as well as the consumer of resources. It treats all devices as having
equivalent capability as shown in figure
Client-Server Network
In client-server network, there is a powerful central node (host) which has more resources than the
other computers (clients) connected to the network. The central computer is known as Server and the
rest computers termed as clients/nodes or workstations. The server is responsible for providing all the
information and resources to the clients as per their request.
The client sends request to the server for services. The client utilizes resources of the server but does
not share its resources with any other client computer.
Difference between Peer-to-Peer and Client-Server Networks
Peer-to-Peer Networks Client-Server Networks
All computers can access resources equally.
1 A server computer, more powerful than the others
All computers work equally
Each computer can request for services and Client can request for services and cannot share with
2
also provide to other computers others
3 Each computer can store its own data Data stored in centralized computer i.e. Server
It is less expensive as compare to Client-
4 It is more expensive as compare to P2P networks
Server network
5 Easy to emplement Not easy to implement
If all computers request for services simultaneously,
6 No effect on speed
it will reslut in slowing down the server
Security is major concern with this type of
7 Security is less concern with this type of network
networks
Is is usually implemented for a smaller It is usually implemented for a large number of
8 number of computers in a limited area. computers in a large area. Example: Office building,
Example: phone to phone Educational campus
Packet Switching
Packet switching is a method of transferring the data to a network in form of packets. Packets are made
of a header and a payload. Header and payload holds information of packets. In packet switching the
message is broken into series of packets. Each of these packets has a header which contains
information about the destination as well as reassembly instructions. The TCP/IP (transmission Control
Protocol/Internet protocol) uses packet switching techniques to transfer messages or data through the
Internet.
Advantage: It is found to be more efficient for large networks.
Disadvantage: If the packet is lost, the sender has to transmit the data again.
Network Components
Some hardware devices are required to connect the two or more computers or devices for proper
functioning and data transmission. These such devices are considered as networking components.
SWITCH – A network switch is a device, which connects different computers and devices on a
computer network. A switch receives data, process it and then forwards it only to the destination
device. It uses packet switching techniques to transfer data on the network.
HUB – A hub is a networking device which is similar to a switch. But unlike a switch which transmits
the information to a particular device, a hub transmits the received information to all devices that are
connected to it. Hubs are known as Dumb Switches. Hubs are comparatively cheaper than the switches.
REPEATER – A repeater simply copies the information arriving at its input and retransmit it from the
output. The weakened or distorted signals at the input are regenerated and then retransmitted by the
repeater.
ROUTER – A router is a networking device that is designed to forwards data packets between
computer networks. A router examines a destination IP address of a given data packet, and it uses the
headers and forwarding tables to decide the best way to transfer the packets. Routers perform the traffic
directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the
form of data packets. It can be internal or external.
BRIDGE – In terms of networking, a bridge network is a Link Layer device which forwards traffic
between network segments. A bridge can be a hardware device or a software device running within a
host machine’s kernel.
The bridge works at the Data link layer (layer 2) of the OSI model.
The data link layer ensures that all packets of information are passed on free of errors
Types of Internet connections
1. Dial-up Connection (Username / Password based)
2. DSL (Digital Subscriber Line) – It transports high-bandwidth data over a simple telephone.
3. Cable Internet – It runs through an underground cable network or the same cables used for cable TV.
It is faster than DSL. highly reliable and isn’t prone to outages due to storms, like satellite internet.
4. Satellite Connection (Broadband)
5. 3G, 4G and 5G System
6. Wi-Fi Wireless Fidelity (lasting support) – A data technology that allow users to access high-speed
internet without the need for cables.
7. Wi-Fi Hotspot
8. WiMax (Worldwide Interoperability for Microwave Access)
Cache
Cache, which is pronounced “cash” (not “catch” or “cashay”), stores recently used information so that
it can be quickly accessed at a later time. It keeps track of things you’ve used recently so that the next
time you need them, they’re right there, ready to go. This makes your computer work faster and
perform better. Common types of caches include browser cache, disk cache, memory cache, and
processor cache.
For example: If you’re exploring a website. Your computer’s browser takes note of all the important
elements on that page, like the text, pictures, CSS or JavaScript. Now, when you move to another page
on the same website that uses the same pictures or other elements, your browser doesn’t need to
download everything again. It will just grab the saved data from your computer’s memory (that’s the
cache) instead of fetching it from the internet.
Cookies
Cookies are small text files (size in kb) with small pieces of data — like a username and password.
Specific cookies known as HTTP cookies are used to identify specific users and improve your web
browsing experience. For example, they remember who you are, so you don’t have to log in every
time. This makes your experience on the web smoother and more personalized.
2. Fire Safety
Fire is a very serious Hazard at a workplace. It can cause major financial losses to a business and also
result in loss of human lives. Prevention is absolutely critical when dealing with fire safety, and there
are many different rules that can be implemented to reduce the risk. Let us learn about some fire safety
rules.
4. Electrical Safety
Electrical safety at work is crucial to prevent accidents. It keeps people safe from shocks and fires,
ensuring a secure environment. Following safety measures helps avoid injuries and damage, keeping
everyone protected at the workplace.
Electric Safety Program should be established by all Organisations and followed properly.
Electrical installations should be done and maintained by a competent person and checked regularly.
Extension cables, plugs, sockets, and other flexible leads and their connections that are particularly
prone to damage should be visually checked, maintained, and where necessary, replaced before using
any equipment.
Correct cable connectors or couplers should be used to join cables together; taped joints should not be
allowed.
Socket outlets should not be overloaded by the use of adaptors.
Electrically powered equipment should be used.
Fixed electrical equipment should have a clearly identified switch to cut off power in an emergency.
A fuse protects the device from over current. It is designed to ‘blow’ and cut off the electricity when
the current exceeds its rated capacity.
It is important to ensure that the correct fuse is used for all appliances.
Employees working in areas where there are potential electrical hazards must be provided with
appropriate, safe, and tested protective equipment.
First Aid Training Course should cover the following Drills or Practices
Burns Poisoning Shock Broken bones No pulse
Choking Heart attack Eye injuries Heatstroke
Respiratory (breathing related) emergencies
Wounds (cut) causing heavy bleeding
Cardiopulmonary Resuscitation (CPR)
Natural Hazards
Atmospheric / Meteorological: Heavy rains, floods, tsunami etc. (cause by extreme weather events)
Geological: Landslides, earthquakes etc. (caused by changes in earth surface)
Biological: Fever (Dengue, Malaria), Influenza etc.
Explore Hazards Signs and Symbols
General Warning
Flammable Material
Explosion Risk
Toxic
High Voltage
Laser Radiation
Bio Hazard
Oxidising
Hot Surface
Danger of death
Slippery Floor
Watch your steps / Trip
High Temperature
Danger of Suffocation
Electricity
Battery Hazards
Rotating parts
Low temperature
Optical Radiation
Radiation