Study Material XII Typograhpy & Comp
Study Material XII Typograhpy & Comp
CORRESPONDENCE
1.1 Introduction
Correspondence is the most important channel through which Business Communication and
Official Communication takes place in any written or digital form between two or more parties.
It may be in the form of letters, memos, e-mail messages, text messages, fax messages,
voicemails, notes etc.
Business Executives have to write a large number of letters for various kinds of business
enquiries, purchase orders, money collection, complaints and adjustments and for maintaining
the good relations with other companies. A good business letter follows the 7C’s of
Communication – clarity, completeness, conciseness, consideration, correctness, courtesy and
concentration.
In this unit, the students will learn the different styles of Business Letters and Official Letters
such as Memos, Notices, Office Orders, Demi-Official (DO) Letters and Office Note with
adopting the proper formatting techniques.
1.2 Objectives
Business Correspondence means the exchange of information in any written format inside an
organization (intra-organization i.e. within a business), between two or more organizations
(inter-organization i.e. b2b) and between the customer and organization (i.e. b2c and c2b). E-
correspondence has also become extremely essential for modern businesses.
The whole Business Correspondence should, preferably, be done on the letter-head of the
organization. It is through letters that an organization can build good relations with different
1
parties i.e. customers, suppliers and service providers. The image of an organization depends on
what impression is conveyed through the business letters. These letters help to bridge the gap
between two parties. Since the basic objective of a business letter is directly or indirectly to
increase the business of the company, it should be drafted and typed with utmost care, accuracy
and displayed in such a way that it gives a pleasing appearance.
The layout of business letters depends on the choice of individual firm concerned. Yet, some
common styles have been standardized and adopted over the years. The common styles of
business correspondence are:
i. Indented Style
ii. Block Style/Fully Blocked Style
iii. Semi-Block Style
This is the oldest style of typed writing the letters. The word “indented” generally refers to the
beginning of first line of each paragraph by indenting in the left side of the margin of the letter 5
or 7 spaces and typing the remaining lines of each paragraph from the left set margin.
26 Mount Road
Chennai
Tamil Nadu
2
Subject: Non-payment of dues
Dear Sir,
We regret to point out that we have written to you repeatedly, on 14th June, 26th June and
again on 10thJuly, ….requesting to settle the balance account of Rs. 25,000/- (Twenty five
thousand only) against supply of electrical goods vide order No. 36, but we have not received
any response as yet.
In the above circumstances, we are compelled to advise you with great reluctance that
unless our account is settled by 20th July we shall place the matter in the hands of our solicitors.
We trust that you will try to settle our account at the earliest.
Yours faithfully,
for Ashok Electrical Company
(Abhay Prakash)
Accounts Manager
______________________________________________________________________________
This type of letter style is now the most commonly used method of display for all business
correspondence. It is thought to look very businesslike and sleek method. It is also known as the
American Style of typewriting the letters. This layout simply means that every line is aligned
flush with the left margin. No paragraphs are indented, no headings are centered – everything
starts at the left set margin. Paragraphs are separated by leaving two lines blank between the two
paragraphs.
26 Mount Road
Chennai
Tamil Nadu
Dear Sir,
We regret to point out that we have written to you repeatedly, on 14th June, 26th June and again
on 10thJuly, ….requesting to settle the balance account of Rs. 25,000/- (Twenty five thousand
only) against supply of electrical goods vide order No. 36, but we have not received any response
as yet.
In the above circumstances, we are compelled to advise you with great reluctance that unless our
account is settled by 20th July we shall place the matter in the hands of our solicitors.
We trust that you will try to settle our account at the earliest.
Yours faithfully,
for Ashok Electrical Company
(Abhay Prakash)
Accounts Manager
____________________________________________________________________________
Semi-Block Style is a combination of both the Indented Style and the Block Style. In this style,
there is no indentation in the first line of each paragraph in the body of the letter. All the text of
the paragraph is aligned to the left set margin. All the other parts of the letter are typed more or
less in the same way as in the Indented Style. It gives a neat and balanced look to the letter,
which is more popular. Paragraphs are separated by a double or a triple spacing.
4
E-Mail Id: ……………….. Fax No: …………………..
26 Mount Road
Chennai
Tamil Nadu
Dear Sir,
We regret to point out that we have written to you repeatedly, on 14th June, 26th June and again
on 10thJuly, ….requesting to settle the balance account of Rs. 25,000/- (Twenty five thousand
only) against supply of electrical goods vide order No. 36, but we have not received any response
as yet.
In the above circumstances, we are compelled to advise you with great reluctance that unless our
account is settled by 20th July we shall place the matter in the hands of our solicitors.
We trust that you will try to settle our account at the earliest.
Yours faithfully,
for Ashok Electrical Company
(Abhay Prakash)
Accounts Manager
______________________________________________________________________________
Official Correspondence define official work letter and include all action of work in an office.
The letters are written between different offices and departments of government, autonomous
bodies and government and semi-government bodies. It includes the letters written between two
5
governments, inter-government, from one state government to another state government or the
central government or vice versa. Like business letters – the official letters are not friendly.
There is no personal touch. These letters are formal letters and demand special care of dignity
and designation of the person or officer writing the letter. The letter heading in an official letter
is mostly followed by the words ‘From’ and the addressee’s name and address is followed by the
words ‘To’. They have different layouts, styles, language etc. These letters have to be a fine
blend of clarity, correctness and conciseness in all aspects.
The Office Memorandum is known as ‘Memo’ and is commonly used for interoffice
correspondence in different offices. A memo is a message in writing sent by one person or
department to another ‘within the same organization’. This is the reason why a memo sometimes
is described as an inter-office memo. It is usually used in offices for routine matters like
granting of annual increments, confirmation in services, making announcements, requests, policy
statements, notices, reminders, suggestions, acknowledgements, congratulations, informal
invitations, salary and leave adjustments etc.
It is usually drafted by Senior Officers for their subordinates. It includes the name of the
originator, the intended person(s) to whom it is addressed, the date of issue, the general topic and
the body of the document.
6
(iv) The address of the addressee is written in the left hand bottom corner after the signature;
(v) It contains either the name or the designation of the officer signing the letter.
MEMORANDUM
With reference to her application dated………..for the Post of Lower Division Clerk in the
Administrative Department, Ms. Urvashi Rana is selected for the same post and is requested to
join with immediate effect.
ADMINISTRATIVE OFFICER
According to rules Office Orders are used by a competent authority for issuing instructions for
internal administration like change of working hours, warning letter, show cause notice, grant of
leave, distribution of work, promotions and transfers etc. They are the means of downward
communication. The Office Orders are issued periodically. The sequence of information is pre-
decided. The copy of the Officer Order is also forwarded to the other effected
Departments/Officers. It is also written in third person.
7
A specimen of the Office Order is as under:
No……………… Dated…………………..-
OFFICE ORDER
Mr. Sumit Kumar, Assistant, Administrative Section has been transferred to the Accounts
Section with immediate effect. He is also directed to join at the earliest and hand over the charge
of his duties to Mr. Rakesh Sharma, Accounts Section.
ADMINISTRATIVE OFFICER
Copy to:
The DO letters are generally written or typed in the form of personal or private communication
on the printed personal letter heads containing personal name, official designation, name and
address of the office etc. These types of letters are written by one official to another for various
reasons such as (i) maintenance of secrecy (ii) drawing personal attention (iii) expecting quick
decision on the matter etc.
1. DO letter is written in first person using “I” instead of “We” in a friendly way;
2. It is addressed personally to an officer by his/her name;
3. The reference No. and Date are written as usual as “DO No……..”
4. Subject is not mentioned in the DO letter;
5. The starting point of D.O. letter is ‘Dear Mr……….’ or ‘My dear Sh.………….’ In
appropriate salutation;
6. The name of the officer writing the letter and his designation are written before the
salutation at the left hand margin;
7. The subscription or complimentary close often used in DO letters is ‘Yours sincerely’
or ‘Sincerely yours’ or ‘Sincerely’.
8. It is signed by the officer without stating his designation at the bottom as the same is
written on the letter-head. Only the name is written within brackets.
8
9. In these letters, the name and letters of the addressee is written at the end on left hand
bottom corner of letter after the signature line.
10. The respectful phrases like “With kind regards”, “With best regards” etc. may be
added before the complimentary close.
Please refer to your letter No………..dated……….. regarding the purchasing of stationery items
from the “Vikas Publications”. I shall be glad if you kindly let me have your comments on it,
which you had discussed in your purchase committee meeting. The minutes of the same
committee may also be forwarded to me, if possible. It is proposed that we can convene an
Inter-departmental meeting during the next week to finalize the rules and regulations for the
purchase of stationery items. Hence an early reply will be appreciated.
Yours sincerely,
(Dinesh Sharma)
It is also known as Inter-departmental Note or Un-official Note. Office Note is used for a
horizontal communication. They are exchanged between departments, or between officers of
9
almost equal rank. These notes are circulated asking for suggestions, advice, views and
comments of other departments on a proposal or in seeking or giving information about some
matter concerning their respective departments. This reference can be made either on the note
itself, or by an independent self-explanatory note. No salutation or complimentary closes are
required.
DEPARTMENT OF COMMERCE
The Head of the Department of Commerce has desired to obtain the observations of all the
Heads/Teacher-in-charges of the Colleges under the Commerce Department, on the enclosed
letter regarding the change of syllabus under the CBCS Programme.
( )
Programme Coordinator
All Head/Teacher-in-Charges
Encl: As above
10
9. What is the difference between a Memorandum and an Office Note?
(iii) The paragraphs are indented in the left margin in _________ Style letter.
No paragraphs are indented, no headings are centered in _________.
(iv) _________ Style of letter is called the American Style of typing letter.
11
CHAPTER 2
MANUSCRIPT
2.1 Introduction
These drafts require many additions, deletions, alterations, and modifications before sending the
same to the publisher. The drafts are read again and again and the requisite proof correction
signs are put to make corrections in the margins of the document. These symbols are called
Proof Correction Signs.
2.2 Objectives
2.3 Meaning
Manuscripts are rough scripts - hand-written or printed, in any form, having corrections,
additions, deletions, alterations or modifications etc. In certain cases, the Manuscripts are half-
typed and half-handwritten. The various changes i.e. additions, alterations, and corrections are
indicated on the Manuscripts by Standard Proof Correction Signs. Manuscripts also form part of
question papers set for most of the typewriting examinations. The Office Assistants/Computer
Operators are required to typewrite Manuscripts written by various persons. In order to become
an efficient Office Assistant or Computer Operator, he should attain mastery in typewriting of
Manuscripts of different kinds and should have the thorough knowledge about the standard Proof
Correction Signs.
12
The Standard Proof Correction Signs are given below:
13
examination to be
conducted by the Board.
(Run on) The hardware and software The hardware and
There should be no are likely to become less software are likely to
paragraph. expensive as technologies become less expensive
become sophisticated. as technologies become
sophisticated. Their
Their installation being installation being
possible in remote areas has possible in remote areas
increased their popularity. has increased their
popularity.
(Delete the matter) The Heading of the letter The Heading of the letter
or D Not required to Print. should not be centralized. should be centralized.
Ctr. (Centralized the Delhi Development Delhi Development
matter). Authority. Authority.
stet (let it stand as it is) The Board may prove that The Board may prove
Do not delete the the applicant has the that the applicant has the
matter. Ignore the knowledge, practical knowledge, practical
corrections dotted experience, and competence experience, and
underneath/underlined. necessary to act as a competence necessary to
Shorthand Reporter and may act as a Shorthand
require a practical Reporter and may
demonstration of the require a practical
applicant’s skill. demonstration of the
applicant’s skill.
In full (Write the matter in The Committee decided to The Committee decided
full form instead of complete the work within a to complete the work
short form). month conducting the within a month
meetings on every conducting the meetings
Wednesday i.e. on every Wednesday i.e.
3rdAugust,…….and….. 3rd, 10th, 17th, 24th and
31st August.
(Transpose the words). I believe the education is I believe the education is
spreading undoubtedly. spreading undoubtedly.
Possibly in few a years’ Possibly in a few years’
Trans
time, perhaps four or five time, perhaps four or
years, it may well include five years, it may well
everybody and girl in the include everybody and
country. girl in the country.
14
(Transpose the letters). I believe the edcuation is I believe the education is
spreading undoubtedly. spreading undoubtedly
Trans
Trans (Transpose the words I believe the education is I believe the education is
given in a jumbled spreading undoubtedly. spreading undoubtedly.
order). Possibly in a few years’ Possibly in a few years’
time, perhaps years five or time, perhaps four or
four, it five years, it may well
(4) (3) (2) (1) include everybody.
may well include
everybody.
SP (Spell) The Board decided to except The Board decided to
Correct the spelling the Ministry’s invitation in accept the Ministry’s
error. principal. invitation in principle.
(Close Up) Now, the reasons why girls’ Now, the reasons why
Not to leave any space education has lagged behind girls’ education has
between the two some what are fairly lagged behind somewhat
words. obvious social customs. are fairly obvious social
customs.
(Doubtful/Query and The minutes of the meeting The minutes of the
? make it clear from the held on August
August10, w meeting held on August
author or writer). 10… and
were discussed 10, … were discussed
confirmed. and confirmed.
(Change to correct The minutes of the meeting The minutes of the
X
font). held on August meeting held on August
17…and
were discussed 17 were discussed and
confirmed. confirmed
_____ Move to the Left. I believe the I believe the education is
education is spreading spreading undoubtedly.
undoubtedly.
______ Move to the right. I believe the education is I believe the education
spreading undoubtedly. is
spreading undoubtedly .
Move up. The minutes of the meeting The minutes of the
______ held on August 10, 2016 were meeting held on August
discussed and confirmed. 10, ….were discussed
and confirmed.
_______ The minutes of the meeting The minutes of the
Move Down. held on August 10, 2016 were meeting held on August
discussed and confirmed. 10, 2016 were discussed
15
and confirmed.
Straighten the left The Board may prove The Board may prove
Margin. that the applicant has the that the applicant has the
knowledge, practical knowledge, practical
experience, and competence experience, and
necessary to act as a competence necessary to
Shorthand Reporter. act as a Shorthand
Reporter.
Justify the matter The Board may prove that The Board may prove
(Right Side). the applicant has the that the applicant has the
knowledge, practical knowledge, practical
experience, and competence experience, and
necessary to act as a competence necessary to
Shorthand Reporter. act as a Shorthand
Reporter.
Insert Full Stop. The hardware and software The hardware and
. are likely to become less software are likely to
expensive as technologies become less expensive
become sophisticated/ Their as technologies become
installation being possible in sophisticated. Their
remote areas has increased installation being
their popularity/. possible in remote areas
has increased their
popularity.
, Insert Comma. The Board may prove that The Board may prove
the applicant has the that the applicant has the
knowledge/ practical knowledge, practical
experience/ and competence experience, and
necessary to act as a competence necessary to
Shorthand Reporter. act as a Shorthand
Reporter.
Insert sign of What should you do when What should you do
? Interrogation. you decide that a meeting is when you decide that a
necessary/. meeting is necessary?
Insert Hyphen. Make sure you undersand Make sure you
- the question / paraphrase it undersand the question-
if necessary; repeat it if paraphrase it if
needed. necessary; repeat it if
needed
Insert Dash. Here are three samples of Here are three samples
16
_ visuals commonly used for of visuals commonly
presentations / a pie chart, a used for presentations --
table and a bar garph. a pie chart, a table and a
bar garph
Insert Sign of Wow / This grammar stuff Wow! This grammar
! Exclamation. is interesting. stuff is interesting.
Insert Colon. This is the reason why a This is the reason why a
: memo is sometimes also memo is sometimes also
described as an inter-office described as an inter-
memo/ a message sent from office memo: a message
one office to another sent from one office to
another
Insert sign of I/ m afraid it won/t be I’m afraid it won’t be
‘ Apostrophe. possible. possible.
Insert double inverted /The delegation is expected “The delegation is
“” commas. to arrive next week./ expected to arrive next
week.”
Insert the matter in the The next meeting of The next meeting of the
^ or Margin. ^16/8/ Purchase Purchase Committee
Committe will be held on Tuesday,
Insert 2016 Will be he held on 16/8/2016 at 9.30 a.m.
Tuesday ^ at 9.30 am.
17
indicated by the standard proof correction signs. The following points should be kept in mind at
the time of typewriting the fair copy from the Manuscripts:
- Before starting to typewrite the document, it should be read once or twice. In case the
document is lengthy one, it should be read paragraph wise. By reading the document
once or twice, he becomes familiar with the style of the person who has written the
document and it becomes easy to typewrite a fair copy of the Manuscript.
- The word which is not clear in the Manuscript should be encircled and he should proceed
reading the matter. It may be possible that this word is more clear in the following
paragraphs of the document.
- In case, after reading the whole document, one is not able to understand any word, the
sentence should be read time and again in order to find out the correct word which
conveys the correct sense of the sentence.
- During the course of typewriting from the Manuscripts, the spellings of the words must
be checked with the help of Dictionary in the Computer. The Computer Operator should
run the Spelling Check and Grammar Check after typewriting the whole document before
giving the print command.
- The Operator should apply common sense while typewriting from Manuscripts and
glaring errors should be avoided.
- Most commonly used abbreviations should not be typed in full. For example, ‘Dr.’
should not be typed ‘Doctor’, ‘Mr.’ should not be typed as ‘Mister’ and so on.
- The whole document should be compared with the Manuscript before giving the print
command.
1. What is Manuscript?
2. What is proof-reading?
18
5. Why do we need to learn the manuscript signs?
6. Is it compulsory to read the passage two or three times before final typing?
1. Stet
2. Trans
3. Cap
4. /^/
5. /”/
6.
7. l.c.
8. eq#
9. sp
10. D
19
Specimen of Manuscripts
A few specimens of typed and hand written Manuscripts are given below:
Specimen 1
Typewrite a fair copy of the following Manuscript on your Computer by incorporating the
corrections:
20
Specimen 2
Typewrite a fair copy of the following Manuscript on your Computer by incorporating the
corrections:
21
Specimen 3
Typewrite a fair copy of the following Manuscript on your Computer by incorporating the
corrections:
22
Specimen 4
Typewrite a fair copy of the following Manuscript on your Computer by incorporating the
corrections:
23
Specimen 5
Typewrite a fair copy of the following Manuscript on your Computer by incorporating the
corrections:
24
CHAPTER 3
EXCEL
3.1 Introduction
MS- Excel 2007 is a windows based application package. It provides powerful tools and features
that can be used to analyze, share, and manage your data with ease. It displays a table of numbers
and text in rows and columns, and used for accounting, budgeting, financial analysis, scientific
applications, and other work with figures. It performs detailed analysis on numerical data. The
analysis is done by defining formulas to perform calculations on a set of data, link different
worksheets and present data in the form of graphs. It automatically recalculates the result of
mathematical formulas if the source data changes.
An Excel file is made up of Worksheets, which collectively are called a Workbook. Worksheets
are pages within a workbook and can contain data or be blank. Worksheets can contain
information and work independently of each other or can be linked together to form a workbook.
Each worksheet contains horizontal rows and vertical columns. The maximum number of rows is
18,278 (A to ZZZ) columns and 1,048,576 rows. The intersection of a row and column is a cell.
3.2 Objectives
1. Click on (with the help of mouse) the Start button on the Windows 7 Taskbar at the
bottom of the Screen.
25
The symbol is used to indicate the direction (steps) to be followed in all the chapters of MS
Excel.
Microsoft Office Shortcut Bar can also be used to start work on Excel.
Excel window has ribbon, name box, formula bar, worksheet, scroll bars, Status bar, Sheet tabs,
buttons like Normal View, Page Layout View, Page Break Preview.
26
3.3.2 Excel Ribbon
The band at the top of the Excel 2007 window is the Ribbon.
1. Office button: The button is used to open, save and print the document. Option available are
New, Open, Save, Save as, Print, Prepare, Send, Publish, Close.
2. Quick Access Toolbar: Save, Undo, redo, and the toolbar is completely customizable.
4. Group: Each tab has a number of groups. Groups have number of options.
An Excel workbook is a file that contains one or more worksheets that can be used to organize
related information. Each new workbook comes with three worksheets, like pages in a document.
Each workbook can contain upto 255 worksheets. Data is entered into the worksheets. Each
worksheet has a name on its sheet tab at the bottom left of the workbook window: Sheet1,
Sheet2, and Sheet3. Click each sheet tab to view a worksheet.
2. Under Templates, select Blank and recent and under Blank and recent in the right pane,
click Blank Workbook.
3. Click Create.
27
3.3.5 Data Entry
1. Numbers: Numbers are from the entire range of numeric values: whole numbers (example
25), decimals (example, 25.67) and scientific notation (example,0.2567E+2). Excel displays
scientific notation automatically if a number is entered that is too long to be viewed in its
entirety in a cell. Number signs (# # # # # #) can be seen when a cell entry is too long.
Widening the column will allow to read the number.
2. Text: Select the cell in which data has to be entered and type the text. Press ENTER key to
finish text entry. The text is displayed in the active cell as well as in the Formula bar. If
numbers are to be treated as text use an apostrophe (‘) as the first character. Calculations
cannot be done with these kind of data entry.
3. Date and Time: When dates and times are entered in a cell, Excel converts these entries into
serial numbers and kept as background information. However, the dates and times will
be displayed on the worksheet in a format selected.
4. Data in Series: Fill a range of cells either with the same value or with a series of values with
the help of AutoFill.
One can advance through worksheet by rows with the vertical scrollbar or by columns with the
horizontal scrollbar. When the thumb tab on the scrollbar is clicked and dragged, a Screen Tip
will appear alongside the bar identifying the row or column to which the view is advancing.
keyboard shortcuts can also be used for navigating the worksheet.
Page Setup
Select Page Layout tabPage Setup group to format the page, set margins, and add
headers and footers.
1. Margins: Change the top, bottom, left, and right margins under the Margins.
28
3. Size: Set the paper size to be printed.
To enter data into worksheet first a cell or range is to be selected. When an Excel worksheet is
open, cell A1 is already active. An active cell will appear to have a darker border around it than
other cells on the worksheet. The simplest way to select a cell is with mouse pointer. Move the
mouse to the desired cell and click on it with right button. Whatever is typed goes into the cell.
To select a range of cells, click on one cell, hold down the left mouse button and drag the mouse
pointer to the last cell of the range that is to be selected.
Selecting Cells
A cell must be selected first, before it is modified or formatted. Refer to the table below for
selecting groups of cells.
Entire Worksheet Click the whole sheet button (at the intersection of
rows and columns).
Cluster of Cells Drag mouse over the cells or hold down the SHIFT
key while using the arrow keys.
To activate the contents of a cell, double-click on the cell or click once and press F2.
1. Select the cell containing data to be edited. Press F2. Use Backspace key and erase
the wrong entry. Retype the correct entry.
29
3. If the contents of the cell is to be cleared, select the cell and press Delete key.
4. To get back the previous entry, either click on Undo button on standard Toolbar or
select EditUndo command or use keyboard shortcuts CTRL+Z.
2. Row: To add a row to a worksheet, select Home tabCells group Click InsertInsert
Sheet Rows.
3. Column: Add a column by selecting Home tabCells group Click InsertInsert Sheet
Columns.
1. Resize a row by dragging the line below the label of the row to be resized.
Resize a column in a similar manner by dragging the line to the right of the label
corresponding to the column to be resized.
2. Click the row or column label and select Home tabCells group Click FormatRow
Height or select Home tabCells group Click FormatColumn Width
1. Moving Cells
To move the cell contents to another cell select Home tabClipboard groupCut. Highlight the
cell to paste select Home tabClipboard groupPaste.
2. Copying Cells
To copy the cell contents, select Home tabClipboard groupCopy. Highlight the cell to paste
select Home tabClipboard groupPaste.
To move the cell contents only a short distance, the drag-and-drop method is used. Drag the
highlighted border of the selected cell to the destination cell with the mouse.
30
4. Freeze panes to lock specific rows or columns
To lock both rows and columns, click the cell below and to the right of where the split
has to appear.
To lock rows, select the row below where the split is to be appeared.
To lock columns, select the column to the right of where the split is to be
appeared.
On the View tab, in the Window group, click Freeze Panes, and then option.
When one freeze panes, the Freeze Panes option changes to Unfreeze Panes so that one can
unlock frozen rows or columns.
To locate a number or text that is already typed in the worksheet, select Home tabEditing
group click Find & Select Optionfind.
Data can also be located and replaced with new data with Home tabEditing group Click Find
& Select optionReplace.
Autofill
Autofill is used to fill automatically ie., fill a series of numbers, numbers and text combinations,
dates or time periods, based on the pattern established. Select cells and drag the fill handle
.
31
3.5 Formatting Worksheets
Number Tab
The data type can be selected from the options on this tab. Select the range and click on one of
the Category, apply that style to numbers.
Select General if the cell contains text and number and it does not have any specific
number format.
If Number Category is selected numbers can be represented as integers, decimals with
number of decimal as option etc.
Date and Time: Used to change the date format and the time format.
Alignment Tab
These options allow to change the position and alignment of the data with the cell. The tab gives
text alignment options.
Font Tab
All the font attributes are displayed in this tab including font face, size, style, and effects. The
Format Cells dialog box offers options bold, italicize, and underline for cell entries.
32
Border Tab
In the Format Cells dialog box, in Border option the size and style of the border can be changed.
For formatting columns and rows AutoFit Selection feature can also be used. It adjusts a column
width or a row height according to the widest entry of a column or tallest height of a row. Select
Home tabCells group, click FormatAutoFit Row Height or AutoFit Column Width. It
adjusts the width of the column according to the widest entry in that column and increases the
height of the row(s) to accommodate the tallest character in a row.
Hide
Hides the selected column(s) or row(s), though the data is still there. Hiding column(s) or row(s)
will help to prevent unwanted changes. To hide a column:
2. Select Home tabCells group, click FormatVisibilityHide & Unhide option. Select any
of the three options Hide Rows, Hide Columns and Hide Sheet.
Unhide
1. Select the visible range of columns that includes the hidden column(s).
2. Select Home tabCells group, click FormatVisibilityHide & Unhide option. Select any
of the three options Unhide Rows, Unhide Columns and Unhide Sheet.
33
3.5.3 Formatting Text
Formatted text has control codes indicating the fonts, bold or italic type, margins, indents,
columns, tabs, headers and footers, and other attributes.
1. Merge & Center: Select the cells. On the Ribbon, select the Home tab in the Alignment
group click Merge & Center. All selected cells are now merged and the data in the first cell is
centered. To unmerge the cells simply follow the same process.
2. Basic Style Changes: On the Ribbon, select the Home tab in the Font group
select B for Bold, I for italics, U for Underline.
3. Background Colour : Select the cells. On the Ribbon, select the Home tab in the Font
groupclick Fill Colour (down arrow for dropdown menu). Choose the colour.
The use of styles in Excel allows to quickly format worksheet. In Excel, all styles are cell styles.
However, a defined style can be applied to an entire worksheet. Select the Styles from the Home
tabStyles group.
4 Select OK.
3. In the Style name box, type an appropriate name for the new cell style.
34
4. Click Format.
5. From the different tabs in the Format Cells dialog box, select the formatting and then
click OK.
6. In the Style dialog box, in the option Style Includes (By example), clear the check boxes
that is not needed in the cell style.
3. In the Style name box, type an appropriate name for the new cell style.
5. From the tabs in the Format Cells dialog box, select the formatting and then click OK.
6. In the Style dialog box, in Style Includes, select or clear the check boxes that is not to be
included in the cell style.
1. To remove a cell style from selected cells without deleting the cell style, select the cells
that are formatted with that cell style.
35
3. Select one of the following:
To remove the cell style from the selected cells without deleting the cell style, in
Good, Bad, and Neutral, click Normal.
3.5.5 AutoFormat
Automatic formatting can make entering certain kinds of text faster and easier. The specific
options that are available depend on the program that you are using. To see and modify
automatic formatting options :
Select Office buttonExcel Options, Excel Options Window opens. Click the Proofing button at
left bar. In AutoCorrect Options section, click AutoCorrect Options buttonselect AutoFormat
as you type option.
3.5.6 AutoCorrect
AutoCorrect feature is used to correct typos and misspelled words, as well as to insert symbols
and other pieces of text.
36
3.5.7 Format Painter
This tool gives the ability to make a format somewhere in the document and then apply it
somewhere else.
Format a cell using the Format Painter. Select any cell.
On the Ribbon, select the Home tab > in the Clipboard group > click Format Painter.
Select cell.
The formatting of the cell has changed and the Format Painter will be inactive until it is
selected again.
3.6.1 Formulas
Formulas are entries containing an equation that calculates the value to be displayed. Formulas
are used in: (a) simple addition, subtraction, multiplication and division, and (b) complex
formulas involving a combination of arithmetic operators.
3.6.2 Operators
An operator is a special symbol that tells a programme what action to take on a series of
numbers. There are two kinds of operators:
(a) Mathematical operators and (b) Comparison or logical operators.
(a) Mathematical Operators: These operators are used to add, subtract, multiply, and divide
numbers. The following are the 5 mathematical operators.
37
(b) Comparison Operators: These operators are used to compare one value to the other. These
operators are also called logical operators because the resulted answer in the cell is always either
True or False.The following are the comparison operators.
1. A formula may consist of operators, cell references, range names, values and functions.
3. When a formula is entered in the cell, and then the ENTER key is pressed, only the
calculated result is displayed in the cell and not the formula.
4. If a cell containing formula is made an active cell, though it still shows the value, but
in the formula bar, the formula is displayed.
Formulas are to be entered in the cell and with an equal sign “=”. When the formula is typed in
the cell, it is calculated and the formula is visible in the formula bar.
3.6.4 AutoSum
2. Select the cell that the sum will appear in that is outside the cluster of cells whose values will
be added, Cell J9.
38
3.6.5 Relative, Absolute and Mixed Referencing
Relative Referencing: Calling cells by just their column and row labels (such as “A1”) is called
Relative Referencing. When a formula has Relative Referencing and it is copied from one cell to
another, exact copy of the formula is not created. It will change cell addresses relative to the row
and column to which they are moved to.
Relative Reference
When the formula in F2 is copied and pasted to F3, the formula in F3 will
appear as =D3*A3 because it is a relative reference
39
Absolute Referencing: To prevent the cell addresses to change, a dollar sign “$” is placed
before column and row location in the formula. The references become absolute and they will
not change when copied.
Absolute Reference
3.6.6 Functions
The built-in formulas are called functions. The users have to provide the cell references or
addresses only. These are called arguments of the functions that are given between a pace of
parentheses ( ). The functions perform the operations on the given values and return the result
that is displayed in the same cell where the function was entered. They perform mathematical
operations more efficiently than formulas. For example, to add the values of cells D1 through
D10, type the formula “=D1+D2+D3 +D4+D5+D6+D7 +D8+D9+D10”. A shorter way would be
to use the SUM function and simply type “=SUM(D1:D10)”. Several other functions and
examples are given in the table below:
The Syntax is
=SUM(number1,number2,……)
40
(b) AVERAGE() function - Returns the average (arithmetic mean) of the arguments
The Syntax is
=AVERAGE(number1,number2,……)
Ex. =AVERAGE(A1:A10) finds the average of cells A1 through A10
(e) COUNT() function – Returns the number of cells that contain numbers.
The Syntax is
=COUNT(value1,value2,…….)
Ex. =COUNT(A1:A10)
(f) COUNTIF() Function – It is used to count the number of cells within a range that meet the
given criteria.
The Syntax is
=COUNTIF (range, criteria)
Where range is the location of all the values from which the COUNTIF will choose and criteria
are the expressions, text, or values that define which cells will be counted.
For example, Find the number of students who have scored more than 80 with the formula:
=COUNTIF (A1:A10, “>80”) in quotes using comparison operator.
(g) SUMIF() Function – It is used to add the numbers in the range that meet the given criteria.
The Syntax is
=SUMIF(Range, Criteria)
For example, Find the total marks of students who have scored more than 80 with the formula:
=SUMIF (A1:A10, “>80”)
41
In this formula the range A1:A10 is the range of marks of 10 students and the criteria is specified
in quotes using comparison operator.
Checking for possible spelling mistakes and then confirm each correction. To spell check all of
the sheets in a workbook: Select the Review tabProofing group Click Spelling option.
Charts allows to present data entered in the worksheet in a visual format using a variety of graph
types. Before making a chart, first enter data into a worksheet.
There are a number of components of a chart. Some of the major components are:
X-Axis Category : This is the category of the data which have been plotted. These are taken
from the first column or first row of your data range.
Y-Axis Value : This is the data range marked to plot the data series.
Legends : Specifies the colour, symbol or pattern used to mark data series.
42
Tick Marks : These marks are used to show the scaling of X-axis and Y-axis.
Grid Lines : Displays lines at the major intervals on the category X-axis and/or Y-axis.
Select a Chart from a set of chart types in step 1 of the Chart Wizard. Some of the chart types
are :
Column Charts : They compare distinct items. In this chart category axis is horizontal (X-axis)
and value axis is vertical (Y-axis). It is important to keep the number of series in a column chart
to a minimum. Many series cause the column to become narrow and difficult to analyze. Column
charts are used to compare the results.
Chart Title
80000
60000
Maruti
Sales
40000
Honda
20000 Tata
Hyundai
0
2012 2013 2014 2015
Year
Bar Charts : Compare different items or show single items at different intervals. It is similar to
column chart except that the chart value axis is horizontal (X-axis) and category axis is
vertical (Y-axis).
Chart Title
2015
2014 Hyundai
Year
2013 Tata
Honda
2012
Maruti
0 20000 40000 60000 80000
Sales
43
Area Charts : They show the relative contributions of each value to a total over time.
80000
60000
Maruti
Sales
40000
70000 Honda
55000 60000
2000050000 Tata
0 Hyundai
2012 2013 2014 2015
Year
Line Charts : These charts are useful to compare the trends over time.
Chart Title
80000
60000 Maruti
Sales
40000
Honda
20000
0 Tata
2012 2013 2014 2015 Hyundai
Year
Pie Charts : The chart show the proportion of each part value to the total value in a data series.
They are used to show proportional sales figures or representation of different categories of
population like workers/non-workers, male/female, adults/children, etc.
Maruti
50000 2012
70000
2013
55000 2014
60000 2015
44
3.7.3 Creating a Chart
2. Select the cells containing the data for creating the chart. Include the data labels. Choose the
Insert tab. Click the Column button in the Charts group. A list of column chart sub-types
appears. Click the Clustered Column chart sub-type. A Clustered Column chart is created and the
Chart Tools context tabs appear.
3. Apply a Chart Layout : Click the chart. The Chart Tools become available. Choose the Design
tab. Click the Quick Layout button in the Chart Layout group. A list of chart layouts appears.
Click Layout 5. Excel applies the layout to your chart.
45
4. Add Labels : When a layout is applied, it create areas where labels can be inserted. Labels are
used to give chart a title or to label axes. Enter the title, axis title.
5. Change the Style of a Chart : A style is a set of formatting options. Style can be used to
change the colour and format of the chart. Excel has several predefined styles. They are
numbered from left to right, starting with 1, which is located in the upper-left corner.
Click the chart. The Chart Tools become available. Choose the Design tab. Click the More
button in the Chart Styles group. The chart styles appear. Click any Style.
46
6. Move a Chart to a Chart Sheet - By default, when a chart is created, Excel embeds the chart in
the active worksheet. However, the chart can be moved to another worksheet or to a chart sheet.
A chart sheet is a sheet dedicated to a particular chart. By default Excel names each chart sheet
sequentially, starting with Chart1. One can change the name.
7. Change the Chart Type - Any change can be made to a chart that is embedded in a worksheet,
one can also make to a chart sheet. For example, Chart type can be changed from a column chart
to a bar chart.
Practice Questions
47
d) The function _________is used for calculating average.
g) In_________referencing, the cell reference does not change while copying formulas.
III. Reproduce the following worksheet & save it, insert a title Half Yearly Sales
A B C D E F G
Name January February March April May June
1 Mr. Dinesh 20000 10000 5000 10000 50000 70000
2 Mr. Manish 25000 30000 20000 12000 40000 45000
3 Mr. Sahil 30000 18000 16000 28000 30000 40000
4 Mr. Mohan 20000 22000 18000 23000 28000 30000
5 Mr. Harish 25000 28000 16000 30000 34000 40000
6 Total
7 Average
8 Highest
9 Lowest
48
Using Formulas
a) Calculate Total for each month and display them in cells B7, C7, D7, E7, F7, G7
respectively.
b) Calculate Average for each month and display them in cells B8, C8, D8, E8, F8, G8
respectively.
c) Calculate Highest for each month and display them in cells B9, C9, D, E9, F9, G9
respectively.
d) Calculate Lowest for each month and display them in cells B10, C10, D10, E10, F10, G10
respectively.
e) Create a column graph on a new sheet showing the heading Monthly sales for six months.
49
CHAPTER 4
POWER POINT
4.1 Introduction
Microsoft PowerPoint 2007 helps to develop dynamic, easy to create, professional presentations.
It can be used to create and organize slide shows, speaker notes, handouts. It is used by teachers
and trainers to make the lecture presentations. It is used in the corporate sector to present project
plans and strategies. It improves the presentations with pictures, sound effects, tables and charts.
4.2 Objective
50
4.3.2 Creating a Presentation
3. Click on open.
51
4.4 Viewing Slides
PowerPoint consists of different views to help in the creation and presentation of slides. The
views are Normal View, Slide Sorter View, Notes Page and Slide show.
Normal View
It is the default view where one can write and design presentation. It has four working areas:
Outline tab, Slides tab, Slide pane, Notes pane. In Outline tab it displays small images called
thumbnails. Slides tab shows all the text on the slides. Slide pane shows the currently selected
slide. Notes pane is used for entering notes about the current slide.
It displays the thumbnails of all the slides in the presentation. It allows to sort, move, add and
delete slides easily.
52
Notes Page
It displays a page layout of the notes and the slide. It allows to rearrange the notes and compare
them to the content of the slide.
53
4.5.2 Deleting a Slide
54
4.5.7 Format WordArt
55
Formatting an image and Clip Art
3. Format the image using Adjust, Arrange and Picture Styles group.
The Color, Font and Effects for the current theme can be changed using Color, Font, Effects
options from Themes group.
4. One can set the color, solid or gradient, transparency or choose picture/texture fill.
5. To apply to current slide, choose close. To apply to all slides, choose Apply to All.
56
4.8 Formatting Presentation Using the Slide Master
The slide master is template for the entire presentation. Changes made in slide master will
change the formatting of all the slides in the presentation. Select View tabPresentation Views
groupSlide Master. The Slide Master tab appears. Select the top Master Slide, edit the
background, background styles, slide titles, slide animation.
2. Custom Animation Panel appears on the right hand side of the current slide.
2. Custom Animation Panel appears on the right hand side of the current slide.
Slide transitions are the animation effects that occur between slides. Speed of transition slide can
also be controlled and sound can also be added.
57
1. Select Animations tabTransition to this slide.
The Slide show tab of the ribbon contains many options for the slide show. These options
include:
This option allows to set preferences for how the slide show will be presented. The options
include:
Use rehearse timings to rehearse the presentation to see whether it fits within a time frame.
On Slide Show tabSet Up groupRehearse Timings.
When the time is set for the last slide, a message box displays the total time for the
presentation and then select either yes or no:
Slide Sorter view appears and displays the time of each slide in the presentation.
59
Choose the folder where the file is to be saved.
Type the filename and then click Save button.
Print a Presentation
In the Print dialog box, click the arrow next to Print What
Practice Questions
1) Which of the following should be used if all the slide in the presentation to have the same
“look”?
a) The slide layout option.
b) Add a slide option.
c) Outline view.
d) A presentation design template.
3) How can you create a uniform appearance by adding a background image to all slides?
a) Create a template.
b) Edit the slide master.
c) Use the autocorrect wizard.
d) All of the above.
60
5) The effect applied to display when slides changes in slide show view is
a) Slide Animation.
b) Custom Animation.
c) Custom Transition.
d) Slide Transition.
61
CHAPTER 5
INTERNET SEARCH
5.1 Introduction
5.2 Objectives
A software application or service used to locate files on an intranet or the Web, generally
accessed with browsers. It is needed for the same reason you need a card catalogue in a library.
There is lots of great and useful information in a library, but it’s physically impossible to
examine all the books personally. There are millions of pages and billions of words on the Web
and more are being added.
A Search engine can be defined as a tool to search these disorganized sources of information
available on the Internet. Using a search engine is pretty simple. Just type in the data to be
searched, the space provided at the search engine’s current page, and click search. The result
will be displayed with information corresponding to the search in the form of a list of web-sites
that match that word or phrase. A search engine is a critical tool in finding information, products
and businesses on the web.
1. Primary Search Engines: Such search engines use web crawlers or spiders. Google and
AltaVista are examples of the same.
62
2. Web Directory: Web directories organize information into categories and subcategories.
Directories differ from search engines in the way they organize information. Yahoo is an
example of Web-directory.
3. Meta Search Engines: Such search engines pass your queries to many search engines
and web directories and present summarized results to the users. Some of the examples
of meta search engines are – Dogpile, Infind, Metacrawler, Metafind and Metasearch.
Google https://www.google.com/
Bing https://www.bing.com/
Yahoo https://search.yahoo.com/
Baidu http://www.baidu.com/
AOL http://www.aol.com/
Ask.com http://www.ask.com/
Excite http://msxml.excite.com/
Lycos http://www.lycos.com/
Indiatimes http://www.indiatimes.com/
Rediff http://www.rediff.com/
2. Open browser.
63
The Search requested travels to the Search Engine’s WebSite. There, the query terms are
matched against the index terms in the site’s database. The matching references are returned to
the computer as result and displayed on the screen. Each result shows the title of the document.
By clicking the title, link to the document can be made. Under the title is a brief description
consisting of few lines of text in the document. Under the brief explanation, is the URL or web
address of the document.
During the web search there are some simple rules to keep in mind. Generally the more
keywords are used in search the more specific and accurate will be the results. For example, a
search for the “Sania Mirza”, will produce better results if the search is with the keywords "Sania
64
Mirza" and if the search keyword is just "Sania" which might bring up links to websites
containing references to another person named Sania.
Operators are the rules or specific instructions used for making a query in a keyword search. A
well defined query improves the chances of finding the information being searched for. Each
search engine has its own operators; some operators are used in common by a number of search
engines.
Most search engines support Boolean Search, such as AND (+), OR (either or two) and NOT (-),
“” (used for exact phrase). () Parentheses are used to group parts of the search phrase, * Asterisk
is used to search for various forms of word.
Boolean Operator
Boolean Operators AND, OR and NOT are used to connect words and terms in the query
AND Operator
AND is the default operator in search engines. So whenever more than one keyword is typed, the
search engine will automatically connect them with the AND operator. This search will retrieve
records with BOTH search terms present. It is used to narrow the search.
Example: Wind AND Fire
65
OR Operator
By using OR operator search results will contain either one or several or all of the search terms.
It is best used when one want to pull together results on similar topics. OR operator is used to
EXPAND the search.
NOT Operator
It is used to exclude keywords from search. It is best used when the search is ambiguous. Instead
of NOT – (dash) can also be used. NOT operator is used to narrow the search by eliminating
term.
Phrases
Search syntax involves using quotation marks (") around a specific phrase. Phrases are very
useful at narrowing down search results to pages that contain the exact, specific string of
characters written as a phrase.
Example: If "Padma Shri Award Winners 2014" is searched for, the search results now will only
bring back pages that have all these words in the exact order that is typed them in.
In brief, here is a quick run-down of some well-known general topic search engines:
Google: The full form of Google is “Global Organization of Oriented Group Language of
Earth”. It is a powerful tool. It would be practically impossible to find out the information
without Google. It was launched in January 1996 and it is based on Logical ‘AND’ with 3-D
Keyword search operation.
Yahoo!: The word "Yahoo" is an acronym for "Yet Another Hierarchically Organized Oracle".
It is a web search engine owned by Yahoo. As of February 2015, it is the third largest search
engine in the US. Yahoo was launched in January 1996. It is actually a directory – a subject
index. It searches on a subject or topic and is based on Logical ‘And’ and wildcard after each
search word. It is a filtered search site. A search agent, category based approach and recently
switched to 3-D search Google technology.
Rediff: Rediff search engine is one of the leading internet portals in India. Its headquarters are in
Mumbai, New Delhi and New York. It was founded in the year 1996. It maintains a directory
categorically and uses Inktomi search technology. It is the only websites that appears in the first
100 websites. It is one of the best search tools in the world. It has been designed to meet the
needs of Indians worldwide. Yet it is balanced in such a way that it does not compromise on
accuracy for non-Indian topics.
66
Lycos: It is the oldest search engine. It is big, thorough and comprehensive. It was originally
developed in July 1994. It is gradually becoming more like yahoo, acting as a Web Directory as
well as a search engine. It used logical operation “OR” and customized search.
Indiatimes: It is called an Indian Search Engine. It is powered by Google. It has divided search
into “The Web”, “News”, “Indian directory” and “Indiatimes Channels” It does not supports
“OR” operators and wildcard entries but supports Logical “AND” based 3-D keyword search
plus smart search by Autonomy (A Software). Web directories that are India-specific are also
included.
5.7 E-Commerce
As the Internet makes way for new business transactions via its complex telecommunications
network, it is difficult to provide a single all encompassing definition of e-commerce. It means
different to different people. A broad definition of e-commerce is: “The marketing, promoting,
buying & selling of goods electronically, particularly via the Internet”. A narrower definition is
“the trading of goods and services in which the final order is placed over the Internet”. In
fact E-Commerce is the subset of E-Business.
It is necessary to consider the various forms that Internet Commerce embodies in order to
understand the implications for taxation. E-commerce can be categorized in four ways:
5.8 E-Business
E-business refers to all aspects of a business where technology is important. This may include
knowledge management, design, and manufacturing, R&D, procurement, finance, project
planning, human resource planning and the related activities. E-commerce is that part of e-
business that relates directly to sales & marketing. That is, e-commerce is part of the all-
encompassing world of e-business.
E-business is a wider concept that embraces all aspects of the use of information technology in
business. It includes not only buying & selling but also servicing customers and collaborating
with business partners and often involves integration across business processes &
communication within the organization.
67
Practice Questions
3. Name three Boolean operators used with keywords while using Search Engines.
4. What is E-Commerce?
1.When a request is sent from the browser, it is _________ that retrieves the information and
provides it back to the browser.
3. B2B is called_________ .
68
CHAPTER 6
6.1 Introduction
E-mail (Electronic mail) is an electronic exchange of messages. E-mail does not require physical
components like pen, paper for compiling information or man power for movement of message
from the source to the intended end-user. It is a quick and inexpensive way to stay in touch with
the near and dear ones almost anywhere. An email recipient doesn’t even have to be available
when email is sent to her. It is stored in the mail server and the recipient can log in and download
it at a convenient time.
6.2 Objectives
Email is the new age tool used for individual as well as mass communication. There are many
advantages of using E-mail as a prime mode of communication, as summed up below:
Email is Fast: Email provides the fastest mode of messaging when compared to other
modes like post, telegram etc. Just type the message, specify the recipient and click
“SEND”. Within seconds, the message will reach the end-user.
Mass Mailing: You can target multiple audiences in one go using Emailing by selecting
multiple recipients. Email is used as a marketing tool to attract the customers with latest
offers and products on the go.
Email for record keeping: Use Email as a record keeper for all your
conversations/discussions. Email can be used as a proof of dialogue between two parties
for future reference.
Growth of Organization: Maintaining and growing your e-mail database will allow you
to fully utilize the services, including free broadcast e-mails and an upgraded version of
HTML e-mails (fee applies) in order to reach more participants.
69
6.4 Email Services
Last two decades have brought an exponential boom to the count of email service providers. The
service providers are putting a lot of efforts in increasing the services provided via email,
increasing the span to not just mailing but also sharing multimedia and data storage. Some of the
leading internet service providers are as follows:
Other popular emailing services are AOL mail, Hotmail, Zoho Mail, Mail.com, Yandex Mail,
Inbox.com, iCloud Mail.
70
Email Actions:
o Reading a mail.
o Replying a mail.
o Printing a mail.
o Deleting a mail.
o Forwarding a mail.
Add a signature.
Creating folders/labels for archiving mails.
This Unit will be using Gmail to provide an overview of the above actions.
Once you have filled all the personal information, click on the button “Next Step” in the
bottom right corner (highlighted in red).
The next screen will ask you to verify the account as shown in the figure below. Press
“Continue” button at the bottom of the screen.
71
Next screen will ask you to enter the verification code received on your mobile as shown
in the figure below. Enter the verification code and press “Continue”.
The following screen will appear once you have created your Gmail account. Click on the
below icon to access all the applications/services available to you.
Click the Compose button on the left side of your Gmail page.
72
The screen given below will appear on the mailbox. The arrows highlight the purpose of
various buttons and text boxes in the Compose Mail Window.
Click the
“Send”
button
Fill in the intended username in the “To” text box. “Cc” button allows you to add users
whose responses are welcomed but not required. “Bcc” Option allows you to hide
recipient addresses from one another.
Summarize the purpose of mail in the “Subject” text box.
73
Enter the content of the mail in the large field below the subject line text box.
Use “Send” button at the bottom left of the Compose Mail Screen to send the mail to the
recipient.
Gmail provides the feature to add attachments like documents, multimedia files with the
mail.
In Gmail, click the Compose button.
Click the paperclip icon at the bottom of the compose window.
Browse through your files and click the name of the file you'd like to attach.
Click Open.
To remove a file attached to a message, click the x to the right of the file name at the
bottom of the message.
We can use various inbuilt text formatting options to modify the appearance of the mail. Gmail
provides the following options to modify the message text (highlighted in red in the below
screenshot).
Bold
Italics
Underline
Change Font Type/Size/Colour/Background
Indent the message text
Use “Bullets and Numbers” to highlight the information.
74
6.9 Email Actions
Email uses basic terms like Inbox, Outbox, and Sent Items etc. which are summarized below:
o Reading an email
o Replying an email
o Forwarding an email
o Printing an email
o Deleting an email
76
6.9.4 Printing an email
An e-mail signature is a block of text that is appended to the end of an e-mail message that is
sent.
77
Scroll down to the "Signature" section and enter your new signature text in the box.
Gmail provides labels for organizing your email messages into categories, like work, family, to-
do, read later or any other category. Labels are customizable and private to every user. They
work like folders, but one can add more than one to a message or delete labels as per the need.
Use the steps given below to create a label:
On the left, below your labels list, click More. If you don't see More, drag the gray
dividing line down to show more labels.
78
Click Create new label.
Type the name of your new label.
Click Create.
Email is a fast and reliable means of communication that is free and easily accessible. Email
allows people to foster long-lasting, long-distance communication. They are delivered instantly.
Practice Questions
1. What is an E-mail?
3. An_________ is the main folder where your incoming mail gets stored in.
79
CHAPTER 7
COMPUTER VIRUS
7.1 Introduction
7.2 Objectives
A Computer virus is a small program that which can attach it or infect the other programs as well
as replicate itself without the knowledge of the user, like its biological counterpart, and runs
against user’s wishes. All Computer Virus are manmade. Most widespread virus infections
spread through email message attachments that activate when opened. Internet is the main reason
of Virus Infection in Computers.
Virus stands as an acronym for “Vital Information Resources Under Seige” and this concept is
not new but dates back to 1949 when John Von Neumann introduced the concept of Self
Replicating Program.
The first commercial application of viruses appeared in 1985, when two Pakistani brothers, in
order to keep track of software piracy, used Brain Virus (also known as Pakistani virus) on their
80
low cost software. It was an extra program not supplied by the original manufacturer. These
types of self-replicating programs multiplied so fast and they are a threat to the smooth operation
of a computer.
Computer virus is an electronic virus and Biological Viruses (Human Virus) are tiny genetic
codes DNA or RNA that take over the machinery of a living cell and are capable of making
thousands of replicas of the original virus. Like biological virus, the computer virus carries in it
an instructional code that makes copies of itself. In computer, the virus takes temporary control
of the disk operating system and when it comes in contact with an uninfected computer, the virus
passes onto the uninfected computer also.
It is assumed that Biological viruses and Computer viruses are the same entity, because both
cause infection and damage to their host/target. Although some of their features & characteristics
are same but they are quite different from each other.
Viruses are classified on the basis of their nature of infection and behavior. Different types
of computer virus classification are given below:
It is a type of virus which infects master boot record or hard disks. The infected code runs when
the system is booted from an infected disk. They infect at a BIOS level, they use DOS
commands to spread to other floppy disks. Since the floppy disks are not used, the propagation of
boot sector viruses has got almost over. After the introduction of boot-sector safeguards with the
Operating Systems, it is not possible for boot-sector viruses to infect the Computer.
The computer is infected by this virus only if the virus is used to boot up the system. After
completing the booting of the system and running the OS, the virus cannot infect the system.
Examples of boot viruses include: Polyboot.B, Joshi, Gravity, AntiEXE and Cbrain virus.
Unlike traditional viruses, a companion virus is computer virus which does not modify any files.
Instead, it creates a copy of the file and places a different extension on it, usually .com. This
makes a companion virus difficult to detect, as anti-virus software tends to use changes in files as
clue.
The companion virus is an older version of virus that was more prominent during the MS-DOS.
It needs human intervention to further infect a computer but after the advent of Windows XP, as
there is no use of the MS-DOS, there are fewer ways for this type of virus to propagate itself.
81
Some examples include: Stator, Asimov.1539, Stator and Terrax.1069
An email virus is a virus which is attached to email communications or sent with it. Many
different types of email viruses work in different ways, there are also a variety of methods used
to counteract such challenging cyber attacks.
Email viruses also vary in many ways. In some cases the sender of an email virus may be
unknown to a user, or a subject line may be filled with silly text. In some other cases, a hacker
may cleverly disguise the email as being from a known and trusted sender.
Logic bombs and time bombs are small malicious programs to cause harm at a certain point of
time but they do not replicate. They are not even programs in their own right but rather
camouflaged segments of other programs. A logic bomb may be implemented by someone trying
to sabotage a database when they are fairly certain they won’t be present to experience the
effects, such as full database deletion. In these instances, logic bombs are programmed to exact
revenge or sabotage work.
For example, a programmer could delete the critical sections of code by establishing a logic
bomb if he/she is terminated from the company. Logic bombs are most commonly installed by
the insiders who have the access to the system.
A MAC or Macro Virus is a virus which spreads to other computers through software programs
that utilize macros. These viruses infect the files created using some applications or programs
that contain macros such as doc, pps, xls and mdb.
For example, Microsoft Word and Microsoft Excel are two popular and widely used programs
which have the capability of executing macros. The macro virus is initially embedded in one
document or a few documents, but it can spread to other documents within the same computer, as
well reaching out to other computers through shared documents and infect the other files,
templates and documents also. They automatically infect the files, templates and documents with
macros that are contained in the file. They hide in documents shared through e-mail and
networks.
They usually fix themselves inside the computer memory and get activated during the start of OS
and end up infecting other opened files. They are hidden in RAM.
82
7.5.6. Cross-Site Scripting Virus
It is called Cross-site scripting (XSS). It is an injection attack which is carried out on Web
applications that accept input, but do not properly separate data and executable code before the
input is delivered back to a user’s browser. It mostly uses the vulnerable website as a vehicle to
deliver a malicious script to the victim’s browser. During the page loading, the malicious script
execute making the user unable to avoid the attack. The best example of XSS is Java-Script.
7.5.7. Worm
The Worm is very similar to a virus and has the ability to self-replicate itself and infect the
computer also. They travel longer distances by storing themselves in critical areas of the disk
from where they get loaded and have with them sufficient code to transfer themselves outward
from the infected system. Worms have been known to damage and infect the entire LANs.
It does not modify a program like a virus; however, it replicates so much that it consumes the
resources of the computer and makes it slow. Worms are independent programs while viruses
attach themselves to another program.
Examples of Worm: Lovgate.F, Sobig.D, Trile.C, PSWBugbear.B, Mapson, Code Red, Nimda.
It is similar to virus. Trojan horse is a hidden malicious code that could alter or delete the
information of client computer or perform any other unauthorized function. Trojan horses
contain programs that corrupt the data or damage the files. It can also corrupt the software
applications. Trojans can illegally trace important login details of users online – for example E-
Banking.
Trojan horse does not replicate themselves like viruses and do not infect other software. The
difference between bombs and Trojans is that, the bombs are insider jobs, Trojans are brought in
from outside by unsuspecting users through other programs.
83
The following may be the probable effects of Computer Virus after a virus attack:
Computer Virus can slow down your computer performance and become inefficient or
run slowly.
It tends to fill up the computer with useless data.
Virus can corrupt the system files.
Viruses can also wipe out the Boot Sector creating problems when you boot into the
windows, which contain system information.
It can make the changes in the data of the programs or files and cause erratic results.
It might steal important information from your computer and send the same to some other
person.
It might reset or reboot a computer by sending the required codes.
It might format a disk by sending the formatting command to the system thereby causing
to lose everything on the disk.
The computer gets restarted frequently by itself.
If the virus deletes the entire keyboard definition; the computer would not be able to
respond to any keyboard inputs.
The virus might scramble the File Allocation Table (FAT) which contains the
information for the operating system. Any mishappening to the FAT will cause data to
be irrecoverably lost.
There are many Operating systems in the market such as Mac, Windows, Linux, UNIX, DOS
etc. which are being used by billions of professional and personal users. Before selecting any
operating system, there is always a question: “Which Operating System is efficient enough to
prevent virus”? Viruses are not restricted to DOS or Windows. A virus has the capability of
infecting any type of computer, irrespective of the Operating System it runs.Virus writers are like
other software developers in their desire to develop for the biggest market. It depends on the
users how long he or she can keep it off of viruses.
As an operating system, Linux works much better than DOS. In terms of performance Linux is
more reliable than any other operating system, even windows. It easily lowers the number of
viruses.
A common belief is that UNIX as an operating is a safer option than using Windows. However,
it is true that UNIX has something different to offer to its users and many of Windows users have
experienced this while operating Windows, but after the recent innovations they may change
their opinions.
84
Linux and Mac
Linux and Mac operating systems are less vulnerable to virus attack as these two systems need
advantaged access to install and run any kind of viruses. LINUX can be installed in Super
computers to embedded processors and the Windows is the most recommended OS for desktop.
People across the world are being able to use it without any major support to minimize the attack
of any Malware, especially when it is compared with windows.
We all are interested in securing our belongings such as Office, home, locality and even country
also. So we use different mechanisms to ensure the security- such as we keep our valuables
safely locked in a cupboard, we keep the doors of our houses even locked; we keep the guards to
keep secure the localities and police security within the city and armed forces for the country
also. It is always advisable to the follow the dictum “Prevention is better than cure”.
Moreover, since the viruses are made faster than the vaccines, it is a good practice to follow
some simple precautionary measures, which can reduce the possibility of virus attack. These are
as under:
Use updated anti-virus program.
Do not copy pirated software on your computer.
Use the legal software from the reliable sources only.
Do not download suspicious shareware programs.
Use a secure operating system.
Avoid letting the system to be used by unauthorized users.
Allow you to schedule scans to automatically run for you.
Scan the computer using Virus Scanner while booting up the system.
Avoid loading of games that are passed as freeware.
Proper backup of all data and program files should be kept.
Remove suspicious and unnecessary files.
Make system files “Read only”.
Use vaccines and immunization programs to immunize computer against virus
infection.
Always protect your password.
Keep windows updated.
Use the scanned USB drives.
Anti-virus software is a program which is designed to search, detect, prevent and remove
software viruses, and other malicious software like Trojans, worms etc.
If the computer system gets infected, despite all possible efforts, then in such cases the virus
vaccines assist you to come out of such difficulties.
The viruses are not omnipotent. Anti-virus programs help to cure the viruses. They perform one
or more the following functions:
85
Prevention
Detection
Vaccination
Inoculation
Damage control
There are so many anti-viruses available in the market. One can choose any one of them on the
basis of their characteristics:
Norton Anti-Virus
McAfee
Kaspersky
Webroot
Symantec (Norton)
AVG
Microsoft Security Essentials
Quick Heal
EScan
Practice Questions
4. What is the difference between the computer virus and biological virus?
5. What are the various types of viruses? Outline the net effect of each.
6. What precautionary measures should be taken in order to keep your computer safe from
the virus?
11. What is meant by Anti-Virus software? Name few popular anti-virus software.
86
Fill in the Blanks
3. The biological virus contains the genetic material in the form of _________.
5. Viruses do not infect _________files unless the file was infected prior to the
compression.
10. _________ does not replicate themselves like viruses and do not infect other software.
13. Once installed, a _________ program can be set to work in the background.
87
LIST OF STANDARD ABBREVIATIONS
(Terms used in Office)
A
CA : Chartered Accountant
CAT : Common Admission Test
CAD : Computer Aided Design
CENTREX : Central Exchange
CEO : Chief Executive Officer
COBOL : Common Business Oriented Language
COD : Cash on Delivery
Corp. : Corporation
CPM : Critical Path Method
CR : Confidential Report
C/A : Current Account
CV : Curriculum Vitae
C2B : Consumer to Business
C2C : Consumer to Consumer
DA : Dearness Allowance
DD : Demand Draft
Disc. : Discount
DLO : Dead Letter Office
DSC : Digital Signature Certificate
DVD : Digital Versatile Disk
88
D/A : Documents against Acceptance
D/P : Document against Payment
HQ : Head Quarters
HR : Human Resource
HRD : Human Resource Department
89
IST : Indian Standard Time
ITD : Income Tax Department
I/O : Input-Output
i.e. : Id est (In other words/that is)
L
LC : Letter of Credit
LIC : Life Insurance Corporation
LIFO : Last in First Out
LLC : Limited Liability Company
LTC : Leave Travel Concession
Ltd : Limited Company
QC : Quality Control
O&M : Organization and Methods
90
PC : Personal Computer
PCO : Public Call Office
PNR : Passenger Name Record
POD : Payment on Delivery
PR : Public Relations
PRO : Public Relation Officer
PS : Post Script
P.A : Personal Assistant
P.P : Particular Person Call
P.S : Personal Secretary
P&T : Post and Telegraph Department
P/N : Promissory Note
p.a : Per Annum
91
V
92