Basic Computing Eng
Basic Computing Eng
BASIC COMPUTING
ADVISORY COMMITTEE
Chairman Director, Vocational
NIOS, NOIDA, U.P. NIOS, NOIDA, U.P.
CURRICULUM COMMITTEE
Prof. Sunil Kumar Khatri Dr. G. Mythili Ms. Beena Nair
Director Deputy Director HOD Computer Science
Amity Institute of Information STRIDE IGNOU Bal Bharati Public School
Technology, Amity University New Delhi New Delhi
NOIDA
Ms. Radhika. B
Assistant Director (Vocational)
NIOS, NOIDA
LESSON WRITERS
Ms. Mohini Arora Ms. Beena Nair Ms. Chetna Khanna
HOD Computer Science HOD Computer Science Freelancer
Air Force Golden Jubilee Institute Bal Bharati Public School Fr. PGT Computer Science
New Delhi New Delhi Shadley Public School
New Delhi
EDITORS
Prof. Deepti Mehrtora Dr. Samiksha Mishra Ms. Rashmi Narula
Director, Amity Institute of Information Data Scientist Chief Technical Officer
Technology, Amity University R Systems Mavalore Infotech Ltd.
NOIDA NOIDA NOIDA
Mr. Arun Kumar Dubey Ms. Purvi Kumar Ms. Anju Gupta
Assistant Professor HOD Computer Science Former HOD Computer Science
Bharati Vidyapeeth college of Ganga International School Rukhmini Devi Public School
Engineering, New Delhi New Delhi New Delhi
Ms. Radhika. B
Assistant Director (Vocational)
NIOS, NOIDA
COURSE COORDINATOR
Ms. Radhika. B
Assistant Director (Vocational)
NIOS, NOIDA
GRAPHICS/DTP
M/S Sri Krishna Graphics
Delhi
A Word With You
Dear Learner,
Congratulations for having chosen the course in Basic Computing.
In Information Age, Computer knowledge is not only the basic requirement to stay connected, but also
to solve problems efficiently. Nowadays, all the services are delivered at our doorstep due to advancement
of technology and emergence of new digital platforms. As a learner, you should acquire and understand
technologies to get benefit of these services.
The course of Basic Computing is specially designed keeping in view its demand in the IT industry.
This curriculum will give you a clear idea about the basic concepts of computing and the workplace
practices that you should learn to work efficiently.
We have ensured that the course content is presented in a simple and straight forward manner. We are
confident that you will enjoy learning this course through Open and Distance learning system. We hope
you will find this material interesting, informative and useful. We wish you all the very best for a bright
and successful future.
Course Team
National Institute of Open Schooling (NIOS)
How to use the Study Material
Congratulations! You have accepted the challenge to be a self-learner. NIOS is with you at every step
and has developed the material in Basic Computing with the help of a team of experts, keeping you in
mind. A format supporting independent learning has been followed. If you follow the instructions given,
then you will be able to get the best out of this material. The relevant icons used in the material will
guide you. These icons have been explained below for your convenience.
Introduction: This will introduce you to the lesson linking it to the previous one.
Objectives: These are statements that explain what you are expected to learn from the
lesson. The objectives will also help you to check what you have learnt after you have gone
through the lesson. Do read them.
Notes: Each page carries empty space in the side margins, for you to write important points
or make notes.
Intext Questions: Very short answer or self check questions are asked after every section.
The answers to these questions are given at the end of the lesson. These will help you to
check your progress. Do solve them and its successful completion will allow you to decide
whether to proceed further or go back and learn them again.
What You Have Learnt: This is the summary of the main points of the lesson. It will help
you in recapitulation and revision. You are also welcome to add your own points to it.
Terminal Exercise: These are long and short questions that provide an opportunity to
practice for a clear understanding of the whole topic.
Answers to Intext Questions: These will help you to know how correctly you have an-
swered the questions.
www Web site: These websites provide extended learning. Necessary information has been in-
cluded in the content and you may refer to these for more information.
Key Leaning Outcomes: Represent what you ought to know, understand and should be
able to perform on completion of learning process and which would be expressed in terms of
knowledge, skills and competence.
ABBREVIATIONS
Notes
1
INTRODUCTION TO COMPUTER
SYSTEM
Objectives
After reading this lesson, you will be able to:
z differentiate between hardware and software;
z explain the basic components of a computer along with their functions;
z list input, output and storage devices.
Basic Computing 1
Introduction to Computer System
(CPU), motherboard, printers, scanners come under hardware. Then we have the
operating system which is a system software and then MS-Office/OpenOffice, web
Notes browsers are the different types of application softwares or computer programs.
Let us see the difference between hardware and software in the table 1.1.
Table 1.1: Difference between Hardware and Software
Terms for Hardware Software
Difference
Definition The physical components of It is a collection of computer
a computer system that can programs that enables users
be seen and used to physically to interact with computer
store and perform the hardware. it is where the
operations on the data. information is processed into
data.
To function properly, the computer needs both hardware and software. Software
works as intermediate between user and hardware.
The working of a computer can be well understood by the block diagram shown
in Fig 1.1.
Memory
2 Basic Computing
Introduction to Computer System
The working of a computer can be broadly categorized into four functions or steps.
z Receive Input: Accept data/information from user through various input Notes
devices like the keyboard, mouse, scanner, etc.
z Process Information: Perform arithmetic or logical operations on data/
information.
z Store Information: Store the information in storage devices such as hard
disk, CD, pen drive etc.
z Produce Output: Communicate information to the user through any of the
available output devices such as monitor, printer, etc.
The hardware components of the computer specialize in any one of these
functions. Computer hardware falls into two categories; processing hardware and
the peripheral devices. The processing hardware consists of the Central Processing
Unit (CPU), and as its name implies, it is where the data processing is done.
Peripheral devices allow people to interact with the CPU. Together, they make it
possible to use the computer for a variety of tasks.
Now we shall discuss the details about various components of a computer system.
Basic Computing 3
Introduction to Computer System
keyboard and mouse are the two common input devices, other devices such as
Optical Character Recognition (OCR), Magnetic Ink Character Recognition
Notes
(MICR), and mark sense reader, etc., are also used as per our requirement.
Keyboard
The keyboard is very much like a standard typewriter with a few additional keys
(refer Fig. 1.2). Generally, we find a QWERTY keyboard with 104 keys on it. The
additional keys may be included in modern multimedia keyboards.
Mouse
A mouse is another very commonly used input device (refer Fig. 1.3). It is basically
a pointing device that controls the movement of the cursor or pointer on a display
screen. It is a small object that you can roll along a hard and flat surface. As you
move the mouse, the pointer on the display screen moves in the same direction. A
mouse may contain one, two or three buttons which have different functions
depending on what program is running.
4 Basic Computing
Introduction to Computer System
Scanner
It is an input device that can read text or an illustration printed on paper and Notes
translates the information into a form that the computer can use (refer Fig. 1.4).
You cannot directly edit text that has been scanned. To edit the text read by a
scanner, you need an Optical Character Recognition (OCR) system to translate the
image into ASCII characters. Moderate quality converters are available on the
Internet for free use.
Basic Computing 5
Introduction to Computer System
Notes A bar code reader is an input device that is generally seen in super markets,
bookshops, libraries etc. It scans the bar code of the product and checks the
description and the latest price of the product.
Digitizing Tablet
This is an input device that enables you to enter drawings and sketches into a
computer. The tablet contains electronic field that enables it to detect movement
of the cursor or pen and translate the movements into digital signals that it sends
to the computer.
Light Pen
A light pen is an input device that utilizes a light-sensitive detector to select objects
on a display screen.
6 Basic Computing
Introduction to Computer System
transforms them into series of signals to be executed or stored. It also directs the
movement of these electronic signals between memory and ALU or between CPU
and input/output devices. Hence it controls the transfer of data and information Notes
between various units. The user’s program provides the basic control instructions.
Conceptually, the control unit fetches instructions from the memory, decodes them
and directs the various units to perform the specified functions.
The contents of the memory is stored only as long as the microcomputer is turned
on. When you turn the machine off, the contents are lost. The capacity of the
memory to hold data and program instructions varies in different computers. The
original IBM PC could hold approximately several thousand characters of data or
instructions only. But modern microcomputers can hold millions or even billions
of characters in their memory.
1.5.1 Monitor
A monitor or Visual Display Unit (VDU) is just like a television screen and it is used
to display data and information. When some data or instruction is being keyed in,
the monitor displays the characters being typed. The monitors are available in
Basic Computing 7
Introduction to Computer System
various sizes. They may also differ for different types of computers. The standard
size is 24 lines by 80 characters. The output displayed on the monitor is called soft
Notes copy.
There are two types of monitors – CRT and TFT-LCD monitors
Cathode Ray Tube (CRT) Monitor: A CRT monitor is a relatively older type of
monitor. It is rarely being used today. These were bigger and bulkier monitors and
hence took lot of desk space. It also consumed lot of electricity.
Thin Film Transistor-Liquid Crystal Display
(TFT-LCD) Monitors: These monitors are
lighter and occupy less space (refer Fig. 1.5).
They are also commonly referred to as flat
screen displays and consume much less electricity
than CRT monitors. Nowadays even Light
Emitting Diode (LED) monitors are available.
1.5.2 Printer
Printer is a device that produces the output on
paper (also known as hard copy) and it may be
Fig. 1.5: TFT Monitor
in the form of text or graphics. There are many
different types of printers. These printers vary in terms of size, speed and quality
of output. Some of them are discussed below:
z Dot Matrix Printer: It is a type of impact printer that uses a print head to print
characters on paper. The print head undertakes back and forth or up and down
motion on the page. The print head strikes on an ink soaked cloth ribbon that
is laid against a paper. The characters formed from dots are thus printed on
the paper.
z Ink-jet Printer: Ink-jet printers are non-
impact printers which work by spraying
ionized ink on a sheet of paper.
Magnetized plates in the ink’s path direct
the ink onto the paper in the desired
shapes. Ink-jet printers are capable of
producing a better print quality than the
dot matrix printers. A typical ink-jet printer
provides a resolution of 300 dots per
inch, although some newer models offer
higher resolutions. These are also known
Fig. 1.6: Ink-jet Printer
8 Basic Computing
Introduction to Computer System
as Line Printers (as the output is produced line by line). Fig. 1.6 depicts Ink-
jet Printer.
Notes
z Laser Printers: These are non-impact printers which work on the principle
of a photo copier. It utilizes a laser beam to produce an image on a drum. The
light of the laser alters the electrical charge on the drum wherever it hits. The
drum is then rolled through a reservoir of toner, which is picked up by the
charged portions of the drum. Finally, the toner is transferred to the paper
through a combination of heat and pressure.
Since the entire page is transmitted to a drum before the toner is applied, laser
printers are sometimes called page printers. In addition to text, laser printers
are very adept at printing graphics. However, you need significant amount of
memory in the printer to print high-resolution graphics.
The speed of laser printers ranges from about 4 to 20 pages of text per minute
(ppm). A typical rate of 6 ppm is equivalent to about 40 characters per second
(cps).
The drawback of ink-jet printers is that they require a special type of ink that
is apt to smudge on inexpensive copier paper. Since ink-jet printers require
smaller mechanical parts than laser printers, they are especially popular as
portable printers. In addition, colour ink-jet printers provide an inexpensive
way to print full-colour documents.
z Thermal Printer: Thermal printers are printers that produce images by
pushing electrically heated pins against special heat-sensitive paper. Thermal
printers are inexpensive and are used in many fax machines. They produce
low-quality print, and the paper tends to curl and fade after a few weeks or
months.
1.5.3 Plotter
A plotter is a device that is used to draw charts,
graphs, maps etc., with two or more automated
pens (refer Fig. 1.7). Multi-colour plotters use
different-coloured pens to produce a multi-
coloured output.
Different types of plotters are available in the
market. A drum plotter has a paper wrapped
around a moving drum and the pens move on the
paper to print the output. A flatbed plotter has a
flat surface on which the paper is placed and the Fig. 1.7: Plotter
Basic Computing 9
Introduction to Computer System
pens move to draw the output. An electrostatic plotter has a negatively charged
paper on which the drawing is made using a positively charged toner.
Notes
Plotters are considerably more expensive than printers. These were the first of the
devices that could print full sized engineering drawings with colour. They are
frequently used for Computer Aided Engineering (CAE) applications such as
Computer Aided Design (CAD) and Computer Aided Manufacturing (CAM).
1.5.4 Speakers
The speakers are used to produce audio output. The computers have sound cards that
enable the computer to produce audio output through the speakers (refer Fig. 1.8).
10 Basic Computing
Introduction to Computer System
Basic Computing 11
Introduction to Computer System
Notes Primary memory is the memory that is accessed by the processor directly. It is also
known as main memory or internal memory. It helps in executing applications that
are temporarily stored in a specific memory location. Primary memory is of two
types – RAM and ROM.
12 Basic Computing
Introduction to Computer System
Magnetic Tape
Magnetic tapes (refer Fig. 1.9) are used for large computers like mainframe
computers where large volume of data is stored for a longer time. Earlier, these
were used with PCs also. The cost of storing data in tapes is low. Tapes consist of
magnetic materials that store data permanently. It can be 12.5 mm to 25 mm wide
plastic film-type and 500 meter to 1200 meter long which is coated with magnetic
material. The deck is connected to the central processor and information is fed into
or read from the tape through the processor. It is similar to a cassette tape recorder.
Magnetic disks are most popular for direct access storage. Each disk consists of
a number of invisible concentric circles called tracks. Information is recorded on
tracks of a disk surface in the form of tiny magnetic spots. The presence of a
Basic Computing 13
Introduction to Computer System
magnetic spot represents one bit (1) and its absence represents zero bit (0). The
information stored in a disk can be read many times without affecting the stored
Notes data. But if you want to write a new data, then the existing data is erased from the
disk and new data is recorded.
10½ inches
Hard Disk
A hard disk is the most commonly used secondary storage device. Although
generally it is fixed inside the CPU cabinet but still external hard disks are also
available. It can store large amount of data and also provides relatively quick
access to data stored on it.
A hard disk is a set of numerous disks stacked one above the other with a cylindrical
spindle in-between. The data is recorded electromagnetically in the form of
concentric circles called tracks. In the hard disk drive, there are Read/Write heads
mounted on the arm placed next to the stacked disks. These heads move
horizontally to read or write data on the disks.
Optical Disk
With every application and software, there is greater demand for memory capacity.
It is the necessity to store large volume of data that has led to the development of
optical disk storage medium. Optical disks can be divided into the following
categories.
z Compact Disk - Read Only Memory (CD-ROM): CD-ROMs are made of
reflective metals. A CD-ROM is written during the process of manufacturing
by high power laser beam. Here the storage density is very high, storage cost
is very low and access time is relatively fast. Each disk is approximately 4 ½
inches in diameter and can hold over 600 MB of data. As the CD-ROM can
be read only we cannot write or make changes into the data contained in it.
14 Basic Computing
Introduction to Computer System
z Compact Disk - Recordable (CD-R): These CDs can be used to write data
on to them provided your computer has a CD writer. The CD writer uses a
special laser light to write data on to a blank CD. Once the CD-R has been Notes
burned, i.e., data has been written on it, it cannot be modified. The information
can be added to it, but the parts that have been burned cannot be edited.
z Compact Disk – Read/Write (CD- R/W): This type of CD can be used for
both reading and writing. Also these can be written and erased again and
again.
z Digital Versatile Disk (DVD): A DVD is an optical storage disk with much
larger storage capacity than that of CDs. A single sided DVD can store upto
4.7 GB of data. Due to its high storage capacity, DVDs are generally used to
store movies and other audio video files.
Flash Memories
Flash memory is a memory chip that is used for storage and also for transferring
of data between a computer and digital device. A flash memory is one that retains
data in spite of the electricity supply being switched off. Hence, it is a non- volatile
memory. It evolved from EPROM and EEPROM but more often it is said to be a
distinct type of EEPROM which is programmed and erased in blocks. That means
devices using flash memories erase data at the block level. A block of flash memory
chip must be erased before data is written on it. Flash memory is widely used for
storage in consumer devices like mobile phones, USB flash drives, tablet computers,
digital cameras and other solid state drives. It is the least expensive form of
semiconductor memory. It is non-volatile and consumes very less power. That is
why its use is increasing day by day, especially for in-memory devices to help speed
up performance and at the same time increase the scalability of the devices. The
data in flash memory can be erased, modified and rewritten many times. It does not
require batteries for solid state storage.
The memory card that you find in your digital cameras and mobile phones is also
a type of flash memory. A variety of such cards are available in the market. Some
of the varieties are Secure Digital Card (SD Card), memory stick, Multimedia
Card (MMC) etc. The price of these cards depends on their size and storage
capacities.
Another form of flash memory or solid state memory is a pen drive. A pen drive
is a small portable secondary storage device (somewhat shaped like a pen) that
connects to a computer through a USB port. It functions as a portable hard drive
and is small enough to be carried easily. These are also known as thumb drives.
Basic Computing 15
Introduction to Computer System
16 Basic Computing
Introduction to Computer System
1.2
1. (a) 1024 bytes
(b) RAM, ROM
(c) Cache
(d) Secondary
Basic Computing 17
Introduction to Computer System
18 Basic Computing
Operating System
Notes
2
OPERATING SYSTEM
The operating system in these days uses a Graphical User Interface (GUI). Here
you do not have to remember all the commands by heart. The commands are visible
on the interface. Nowadays, proprietary operating system and open source
operating systems are being used. As you are aware that proprietary operating
system requires licensing from the particular company whereas open source
operating systems can be downloaded freely without requiring any particular
license from the companies. The most popular proprietary operating system
available today is Windows. The Windows operating system has evolved over time
in the form of Windows 95, 98, 2000, XP, NT, Vista, 7. Currently Windows 7, 8
and 10 are in use out of which windows 7 is most widely used. In this lesson, we
will explain the main features and file management of Windows 7.
Objectives
After reading this lesson, you will be able to:
Basic Computing 19
Operating System
2.1 Windows 7
Notes Operating system provides the interface for the hardware and software. When the
computer system with Windows 7 operating system is started, it will present a log-
in screen to logon to Windows or to network, if the system is part of a computer
network.
To logon the computer system, do the following:
z Enter the password (if it is password protected) (refer Fig. 2.1).
z Click on the key (→) or hit the Enter key.
After the successful login, Windows 7 will allow you to work on the computer
system. The first screen which you see after login screen is the Desktop. Desktop
contains many elements. Let us discuss about the desktop elements now.
Start Button
Start button will help you to do the major tasks in your computer system like
choosing the installed programs, searching programs or files, shutting down the
Windows, etc. When you click the start button, a menu appears as follows (refer
20 Basic Computing
Operating System
Fig. 2.2) on the screen which will list the available options to start using the
Windows.
Notes
Search box
Start Button
The following table will give you the brief information about the tasks of the start
menu and its descriptions.
Table 2.1: Start Menu Options And Descriptions
Start Menu Option Description
All Programs Displays a list of installed program, which a user
can start or use.
Documents Displays letters, reports, notes and other kind of
documents stored in ‘documents’ folder.
Pictures Displays and organizes list of digital pictures
those are saved in the folder ‘pictures’.
Music Displays a list of music and other audio files from
the ‘My Music’ folder.
Computer Shows the disk drives and hardware connected to
this computer.
Basic Computing 21
Operating System
Task Bar
When you start the computer system, then start button and task bar (refer Fig. 2.3)
appears on the bottom of the screen and by default remains visible when Windows
is running. You can place the taskbar on the right side of the screen also. Whenever
a program is run or a window is opened, an icon representing the program appears
on the taskbar. To switch between windows or the program, click on the icon
representing the window on the task bar. When the program or window is closed,
the icon disappears from the task bar.
22 Basic Computing
Operating System
Start a Program
To start a program, do the followings;
Notes
z Click on the ‘Start’ button.
z Click on the ‘All Programs’.
z Point to the desired folder say ‘Accessories’ and select the desired program
to run such as ‘Calculator’.
Getting Help
Online help and support provided is of great help in using and learning Windows.
One can get help on a specific topic or current task being executed. To start help
z Click on the ‘Start’ button.
z Click on ‘Help and support’.
Windows help and support will be opened, refer Fig. 2.4. Type keywords in which
help is desired.
Quitting a Program
To quit a program select the close button in the upper-right corner of the
window OR click on ‘File’ menu and choose ‘Close’ option.
Close Button
Basic Computing 23
Operating System
Notes If you do not know where a document or folder is located, you can use the search
companion to locate it in the local storage such as hard disk, CD or in the network
drive.
To search for a file or folder
z Click ‘Start’ and click on ‘Search’.
z Type the name of the file or folder in part or full, or type a word or phrase that
exists in the file to be searched (refer Fig. 2.5).
24 Basic Computing
Operating System
To start control panel and use the available tool, do the following:
z Click on ‘Start’. Notes
z Click on ‘Control Panel’ (refer Fig. 2.6).
z Select the desired tool to use.
For example to change the user account settings and passwords for the users who
share the computer, click on the ‘User Account’ icon in the control panel.
Using Computer
When you open Computer icon (refer Fig. 2.7), that shows disk drives (hard disk,
CD ROM, DVD and network drives, etc.) and hardware which are connected to
your computer system. To see what’s on your hard disk, under hard disk drives or
CD or DVD or pen drives, double click the drive you want to see such as C:, D:,
etc. It will display the files and folders present in that particular drive. Then you
double click on the file which you want to work. The file will be opened in the
separate window.
Basic Computing 25
Operating System
Notes
26 Basic Computing
Operating System
When files or folders are deleted from hard disk, Windows places them in the
recycle bin, where they can be retrieved, until the recycle bin is made empty. Files
or folders deleted from removable storage media such as network drive are Notes
permanently deleted and are not sent to the recycle bin.
Basic Computing 27
Operating System
Notes
z Under ‘Edit’, select ‘Copy’ (or use the windows shortcut → Ctrl + C).
z Select the target drive or folder to which you want to copy the files.
z Under ‘Edit’, select ‘Paste’ to copy the desired file or folder to the target drive.
z To select more than one file or folder listed consecutively, click the first file
or folder, press and hold down ‘SHIFT’ key and then click the file or folder.
z To select non-consecutive files or folders press and hold down ‘CTRL’ key,
and then click each of the files or folders to be copied.
28 Basic Computing
Operating System
Notes
Basic Computing 29
Operating System
30 Basic Computing
Operating System
z Type the new name, and then press ‘ENTER’ key. Notes
z File or folder can also be renamed by selecting the file or folder and then right
click it and then select ‘Rename’.
z Files or folders can also be deleted by right-clicking the file or folder and then
clicking ‘Delete’.
z Deleted files or folders are stored in the Recycle Bin, till they are permanently
removed from the ‘Recycle bin’.
z To retrieve a deleted file, double-click the Recycle Bin icon on the desktop.
Right-click on the file to be retrieved, and then click ‘Restore’.
z To permanently delete a file, press and hold down ‘SHIFT’ key and drag it
to the Recycle Bin or click delete.
Install Software/Hardware
Windows provides a quick and easy way to install new software and hardware.
Programs and features option in Control Panel help to uninstall or change the
programs in your computer system. Device driver utility in Control Panel helps to
view / update your hardware’s settings and driver software.
Let us learn about installing software and hardware in the computer system.
Install Software
You can download the required software (free software) from the Internet or you
can use the licensed version of the software (available in the CD/DVD/USB).
Before you try to install any software kindly ensure that it is not malicious software
(the software which brings harm to your computer). Then locate the file you need
to install from the CD/DVD/USB or from your drive. Double click the file or run
the executable file (.exe) of that particular software and allow the programs to run.
Basic Computing 31
Operating System
Follow the instructions of that program or software and finish the setup. It will
prompt the message that software is installed successfully in your computer.
Notes
To use the installed software click ‘Start’ menu → choose ‘All Programs’ option
and then choose the software which you have installed.
You can uninstall the software which you want to remove from your computer
system. Follow the below mentioned steps for uninstalling.
z Click ‘Start’ → click ‘Control Panel’.
z Choose ‘Programs and Features’ option.
z Choose the software which you want to uninstall.
z Right click on the name of the software and choose ‘Uninstall’ (refer Fig.
2.13).
Install Hardware
Windows can help you to set up new hardware components such as sound card,
video card or network card, etc., to your computer.
z Click ‘Start’. Click ‘Control Panel’.
z Double Click ‘Device Manager’.
z Right click the root node and then choose ‘Add Legacy Hardware Option’
(refer Fig. 2.14).
32 Basic Computing
Operating System
Notes
Basic Computing 33
Operating System
Terminal Exercise
1. List out various steps to delete a file or folder.
2. Write down the steps to search for a file or folder.
34 Basic Computing
Operating System
Basic Computing 35
Introduction to Internet
Notes
3
INTRODUCTION TO INTERNET
Objectives
After reading this lesson, you will be able to:
z define internet and intranet;
z connect with internet through wired and wireless media;
z surf the internet using a web browser that may include:
Internet Explorer.
Mozilla Firefox.
Google Chrome.
z use a search engine to find information on the net;
z list the Do’s and Don’ts while surfing the net.
36 Basic Computing
Introduction to Internet
Internet Intranet
Intranet, on the other hand is the network designed for a particular group of people
only. These individuals may be part of an organization who are authorised to access
and use that particular network. It is not open to public but is limited to certain set
of people. For example, the employees of a multinational company, say ABC
International only can access the network of that company. Each employee may
be given a user id and password to access ABC company’s network. General public
will not be allowed to do so. Although to access intranet, we may require internet
but this access is limited in terms of information and number of users. In simple
terms we can say that internet is a public space while intranet is a private space.
Basic Computing 37
Introduction to Internet
A web browser is a software that helps you to view the web pages. A web page
is a document written in Hypertext Markup Language (HTML). World Wide
Web (www) or simply the web, as it is popularly called, is a collection of billions
of such web pages stored on computers connected to the internet. All these web
pages are publicly accessible and can be viewed in any of the web browsers,
provided you are connected with the internet.
38 Basic Computing
Introduction to Internet
Wired Connections
Some of the examples of wired internet connection are:
z Dial Up Connection: In this type of connection, the modem gets connected
to the ISP after dialling a phone number of the ISP. The signal is sent over a
land line serviced by a public telephone network. This is cheap but slow
connection. Also, at a time either the telephone or the Internet is available. It
is very rarely used these days.
z Digital Subscriber Line (DSL): This is an internet connection that uses two
lines thus making Internet available even when the phone is being used. That
is why this type of connection is known as “Always On” connection. The
connection speed lies between 128 Kbps to 50 Mbps.
z Cable Connection: A cable provides an Internet connection through a cable
modem that operates over cable TV lines. It is more efficient than Dial-up or
DSL connections as the speed ranges from 512 Kbps to 100 Mbps.
Wireless Connections
Although wired connections have their own set of advantages, yet wireless
technology is increasingly becoming popular these days. Some of the commonly
used wireless technologies are:
z Satellites: The ISPs may connect to the internet via satellites that revolve
along the earth’s orbit. The speed of such connections ranges from 10 Mbps
to 50 Mbps.
z Wireless Fidelity or Wi-Fi: This is another form of wireless connection
where a local area network (LAN) uses high frequency radio signals or
Basic Computing 39
Introduction to Internet
infrared waves to transfer data over short distances. Wi-Fis are commonly
being used at home, hotels, shopping malls, airports and other public places.
Notes People can simply log in at these places and access Internet.
z WiMax or Worldwide Interoperability: This type of wireless Internet
connection is used to access Internet at a very high speed. It uses radio signals
or microwaves to transmit data from one device to another. Also, the range
of WiMax can go upto 30 miles (approximate 50 kms).
40 Basic Computing
Introduction to Internet
computer has got a unique IP address assigned to it because of which we are able
to know about the computer sending the data as well as the one receiving the data.
Notes
Further, for any type of communication, certain rules need to be followed.
Similarly, we have rules that govern the transfer of data on the network. These set
of rules are known as protocols. The two most important protocols needed for
working of Internet are Transmission Control Protocol (TCP) and Internet
Protocol (IP). The data to be transmitted from one computer (sender) to another
(receiver) is broken down into fixed size packets using TCP. The IP protocol makes
sure that each packet gets the IP address of the sender and the receiver. These
packets are then passed from one network to another until they reach their
destination where TCP again re-assembles them into the original message/data. If,
by any chance any of the data packets get lost or becomes garbled, a request is
made to send the packets again.
For example, If the message “Hello computer” has to be sent from one computer
(with IP address 192.168.7.150) to another computer (with IP address
192.168.7.151), then the process that will be followed is shown in the block
diagram below.
Application Application
TCP TCP
IP IP
Basic Computing 41
Introduction to Internet
Although there are various web browsers available, yet there are certain properties
that are present in each web browser. Some of the common features are discussed
below:
Address Bar
This is the place where we type the address of the web site/web page and then click
‘Go’ button or press the ‘Enter’ key. The requested web page is then displayed
in the browser window.
Navigation Buttons
These buttons are used to navigate between the web pages being surfed in the
browser. Back, Forward, Refresh, etc., are navigation buttons (refer Fig. 3.4).
History: This feature helps us to open the recently visited web pages. By default,
the history folder saves the addresses of the web pages visited in the past 20 days.
Also, when the arrow just to the right of the address bar is clicked, a list of web
sites/web pages visited so far are displayed. We may sort the web pages stored in
the history folder by date, site name or even by frequency of visits.
Tools: This menu provides options for saving, printing or viewing a web page. Let
us now learn about some commonly used web browsers.
42 Basic Computing
Introduction to Internet
The Home, View Favourites, Feeds and History button and Tools buttons are
present on the top right corner of the browser.Also, Internet Explorer has a toolbar
containing commands to perform certain common tasks such as Print, Home, Read
Mail, Help, etc.
Mozilla Firefox is a free and open source web browser developed by Mozilla
Corporation. It is available for Windows, MacOS and Linux operating systems and
can be downloaded from https://www.mozilla.org
It was initially released in the year 2002 and the latest version released is 62.0.2.
The navigation buttons are present on the left of the address bar while on the top
right corner you have View History, Saved Bookmarks and More button. Click
more button to open a pop up menu containing various options.
Basic Computing 43
Introduction to Internet
Notes Navigation button Address bar View History, Saved Bookmark and More
44 Basic Computing
Introduction to Internet
The buttons like Home, Favourites, History etc., are not visible in the Google
Chrome web browser. Instead there is Customize and Control Google Chrome
button on the top right corner. Click this button to do the desired tasks. Notes
Basic Computing 45
Introduction to Internet
Search text box and then click ‘Google Search’ button. Alternatively, press the
‘Enter’ key.
Notes
The process of searching for the Prime Minister of India is highlighted in Fig. 3.7
and Fig. 3.8.
46 Basic Computing
Introduction to Internet
A list of web sites containing the keywords ‘Prime minister of India’ will be
dispalyed. If we click on any link, the corresponding web page containing the
requested information will be displayed. Notes
Likewise, we may also search for any image, audio or video content using any
search engine. Say, if we want to search and download national anthem of India,
just type ‘ National Anthem of India download ‘ and press ‘Enter’ key. The links
from where National Anthem can be downloaded will then be displayed. The list
of lins displaying the same is shown in Fig. 3.9.
Basic Computing 47
Introduction to Internet
3.6.1 Do’s
Notes
z Login to your email account using your login id and password.
z Be a responsible user and respect other’s privacy.
z Use Internet as and when required. Do not aimlessly keep on surfing the net.
z Inform your parents/teachers or any trustworthy person, if anyone tries to
bully you or send you objectionable messages.
z Always keep your antivirus updated. Scan the files/programs before
downloading them to check for any malware like viruses.
z Use only those chat room sites that are public, monitored and trustworthy. It
is advisable to use an alias name for chat room sites.
z Do online shopping only from secure sites.
z Block the users who make you feel uncomfortable.
3.6.2 Dont’s
z Do not give your personal information to anyone on the internet.
z Never share your user-id and password with anybody. In fact, you should keep
on changing your passwords regularly.
z Do not embarrass your friends by tagging them in awkward photos and videos.
z Do not post anything that may be objectionable to anybody.
z Do not spread false information or rumours.
z Do not be rude even if you do not agree with other peoples views.
z If you have befriended with anyone online, do not try to meet him/her alone.
Always take your parent/friend along with you.
z Do not open or download any file/attachment from any unknown source as
it may contain viruses.
z Do not let web browsers remember your passwords, as it increases the risk
of being hacked.
48 Basic Computing
Introduction to Internet
z A modem provides a link between the digital device and the Internet Service
Provider (ISP).
z The two most important protocols needed for working of Internet are
Transmission Control Protocol (TCP) and Internet Protocol (IP).
z Internet is a large public space where each one is able to view, download, post
or send message/information to any other person.
z Web browser reads and interprets HTML documents on the World Wide Web.
Some of the commonly used web browsers are Internet Explorer, Mozilla
Firefox, Safari and Google Chrome.
Terminal Exercise
1. Differentiate between Internet and Intranet.
2. List the requirements to access Internet.
3. Give two differences between the following:
(a) Wired and wireless connections.
(b) WiFi and WiMax
4. Define the following:
(a) Web Page
(b) Web Site
(c) ISP
(d) Search Engine
5. What is the function of TCP/IP with respect to working of Internet?
6. How can a mobile phone access internet?
7. What is a web browser? Name any two features of a web browser.
Basic Computing 49
Introduction to Internet
Notes
9. Sohail wants to search information on festivals of India from Internet. List the
steps to do so.
10. Name any three actions that should not be done while surfing the net.
3.2
1. Internet Explorer
2. (any three)
z Login using your login id and password.
z Be a responsible user and respect other’s privacy.
z Use Internet as and when required. Do not aimlessly keep on surfing the
net.
z Inform your parents/teachers or any trustworthy person, if anyone tries
to bully you or send you objectionable messages.
z Always keep your antivirus updated. Scan the files/programs before
downloading them to check for any malware like viruses.
z Use only those chat room sites that are public, monitored and trustworthy.
It is advisable to use an alias name for chat room sites.
z Do online shopping only from secure sites.
z Block the users who make you feel uncomfortable.
3. The page is reloaded from the server.
4. Search Engine Results Page.
50 Basic Computing
Digital Documentation
Notes
4
DIGITAL DOCUMENTATION
Objectives
After reading this lesson, you will be able to:
z list features of Word processing and Word processors;
z use Proprietary and Open Source tools to create a digital document;
z create a document using Microsoft Word 2013
z save, print and close a document;
z apply various editing and formatting features;
z use ‘Find and Replace’ features;
z insert Headers and Footers;
z insert bulleted and numbered list;
z use the ‘Spelling and Grammar’ check feature;
z create an online document;
z share an online document.
Basic Computing 51
Digital Documentation
52 Basic Computing
Digital Documentation
this software without the permission of the owner company. Examples of proprietary
software are Windows operating system, Microsoft Office, Adobe Photoshop,
Adobe Flash etc. Microsoft Word is the word processing tool from Microsoft. Notes
An open source software is one whose source code is freely available for use and
even for editing, copying and re-distribution. A user can simply download the open
source software from internet without taking any sort of permission from anyone.
Examples of open source software are Linux operating system, Libre Office, Open
Office, Tux Paint, GIMP, Scratch, etc. OpenOffice Writer is the open source word
processing tool. One of the links, from where one can download it is
www.openoffice.org.
In this lesson, we will be learning how to create, edit, format and print documents
using a word processing tool by Microsoft, i.e. Microsoft Word 2013 or simply
called MS Word 2013. It is a proprietary software that comes alongwith Microsoft
Office 2013 suite.
Basic Computing 53
Digital Documentation
The MS Word 2013 start screen appears as shown in Fig. 4.2. We can either create
a blank new document, choose a template for the new document or open an already
Notes existing document.
List of templates
Ribbon
Rulers
Work Area
Status Bar
54 Basic Computing
Digital Documentation
On the left of the Word Start screen, you have a list of files that have been recently
worked upon. We may click and select any file to open it. To open any other saved
document, click ‘Open Other Documents’ button at the bottom of the list. On the Notes
right side, there are options to open a blank document or select any template like
that of a resume, cover letter, brochure, project report, etc. Clicking the ‘Welcome
to Word’ icon will display various new features of MS Word 2013.
Click on ‘Blank Document’ icon to open a blank document. The MS Word 2013
interface window appears, as shown in Fig. 4.3.
The main components of MS Word 2013 window are:
Title bar: It is present at the top of the window and displays the name of the
document and the name of the application i.e., Word. Since the document has not
been saved, the name of the document appears as ‘Document 2’ in the given
screenshot (Fig. 4.4).
Ribbon: It is present just below the title bar and contains multiple tabs to perform
certain common tasks. The tabs present in MS Word 2013 are ‘File, Home, Insert,
Design, Page Layout, References, Mailings, Review and View’. Each tab
contains several groups of commands.
Backstage View: Clicking on ‘File’ tab opens the Backstage view as shown in Fig
4.4. Through this, we can get information on the current document, open a new
document or an existing document, save or print the file and do various other tasks.
We can even set passwords to the document using the backstage view.
Quick Access Toolbar: It is present on the top left corner of the MS Word
interface window. It allows us to access common commands, no matter which tab
Basic Computing 55
Digital Documentation
Work Area: This is the blank space where the document text is typed or any other
graphic object is inserted. It covers the maximum visible area on the MS Word
screen at any time. The vertical blinking line in the work area is called ‘insertion
point’ or ‘cursor’. The location of this cursor determines where the next character
will be inserted.
Rulers: The MS Word 2013 Window has two rulers that help us to adjust the
document with precision.
z Horizontal Ruler: This is located at the top of the document and helps to
define indents and also the left and right margins.
z Vertical Ruler: This is located to the left of the document and helps to define
top and bottom margins.
Scroll Bars: There are two scroll bars on the MS Word Window:
z Horizontal Scroll Bar: It helps to navigate the document left and right and is
located at the bottom of the document.
z Vertical Scroll Bar: It helps to navigate the document up and down. It is
located in the right of the document.
Alternatively, we can click the arrows on the either side of the scroll bars to
navigate through the document remove or move to navigate.
Status Bar: This is located at the bottom of the MS Word window and gives
information about the current document such as its word count, page number,
number of pages, etc.
56 Basic Computing
Digital Documentation
Notes
On the right of the ‘Computer’ option, to save file Press Ctrl +S to save the
on your device, Click ‘Browse’ button to choose the document.
location where the file needs to be saved. The ‘Save
As’ dialog box will appear (refer Fig. 4.7).
Basic Computing 57
Digital Documentation
Choose the drive and folder where the file has to be saved. Type the desired name
of the file in the ‘File Name’ text box and click ‘Save’ button. Although MS Word
Notes allows us to save the document in a variety of formats but by default, the file will
be saved with an extension .docx. Thereafter, the name of the file will appear on
the title bar of the document.
We can also save the document by clicking on ‘Save’ button on the Quick Access
Toolbar. Please note that the ‘Save As’ dialog box appears only when we are saving
the document for the first time. However, if the same file needs to be saved with
a different name or at a different location, then select ‘Save As’ option again from
the ‘File’ tab.
58 Basic Computing
Digital Documentation
z Select the number of copies to be printed from the ‘Copies’ list box.
z Choose the printer name from the list of installed printers. Notes
z Under ‘Settings’ section, we may choose the desired settings such as the
pages to be printed, orientation of the document, paper size, margins etc. The
default print settings are already selected.
z Click ‘Print’ button to print the document.
Click ‘Save’ button to save, ‘Don’t Save’ button to close the document without
saving and ‘Cancel’ button to cancel the closing process and continue working
with the current document.
Basic Computing 59
Digital Documentation
Using a Mouse
Keep the mouse pointer in the beginning of the text (for example, a character, word
or paragraph) that you want to select. Press left button and drag the mouse pointer
till the entire text is selected. The selected text (Internet in Fig. 4.10) is highlighted
in grey colour.
Using a Keyboard
To select the text using a keyboard, place the cursor before the text that you want
to select. Press and hold the ‘Shift’ key, press one of the arrow keys in the direction
of the required selection. Also, there are various shortcut keys available to select
the text. The table 4.1 lists some of these.
Table 4.1: Shortcut Keys for Selecting the Text
Shortcut Key Selection
Shift + End To select the line from cursor position to end of the line.
Shift + Home To select the text from the cursor position to the
beginning of the line.
Ctrl + Shift + ↓ To select the text in a paragraph from the cursor position
to the end of the paragraph.
Ctrl + Shift + ↑ To select the text in a paragraph from the cursor position
to the beginning of the paragraph.
Ctrl + Shift + Home To select the text from the cursor position to the
beginning of the document.
Ctrl + A To select the complete document.
60 Basic Computing
Digital Documentation
Basic Computing 61
Digital Documentation
62 Basic Computing
Digital Documentation
Basic Computing 63
Digital Documentation
To apply a particular case, select the text and click the down arrow near the Change
Case button in the Font group of buttons on the Home tab. Click on the desired
Notes case option to be applied to the selected text.
Let us assume that the selected text is ‘bAsic Computing courSe’. The appearance
of the selected text for various case options will be as given below:
z Sentence Case – Basic Computing Course
z Upper case – BASIC COMPUTING COURSE
z Lower Case – basic computing course
z Capitalize Each Word- Basic Computing Course
z Toggle Case –BaSIC cOMPUTING COURsE
Text Alignment
Text can be aligned in four ways - Left, Right, Center and Justify. Select the
paragraph and then click on the desired alignment button in the ‘Paragraph’
section.
64 Basic Computing
Digital Documentation
Notes
Left aligned
Center aligned
Right aligned
Justify
Basic Computing 65
Digital Documentation
3. To apply line spacing, select the paragraph and click the down arrow besides
the ‘Line and Paragraph Spacing’ button. A pop-up menu with different
Notes line spacing options is displayed (refer Fig.4.19). Click on the desired value
to apply it to the selected paragraph.
The illustration in Fig. 4.20 shows the text with indentation and spacing effects.
Original Paragraph
66 Basic Computing
Digital Documentation
Notes
To set the margins of the page, click the down arrow below the ‘Margins’ button
and select the desired margin from the pop-up menu that is displayed. We can
choose any of the given margin templates or set our own custom margins. To set
custom margins, click on the ‘Custom Margins’ option at the bottom and mention
the desired number (refer Fig. 4.22).
We can set the orientation of the page to give it either a portrait or a landscape
layout. A portrait orientation is taller than wide and more commonly used for
creating documents. A landscape orientation on the other hand is wider than tall
(refer Fig. 4.23).
Basic Computing 67
Digital Documentation
Notes
MS Word 2013 also gives you the option to select the size of the page for your
document. The default page size is A4. Click ‘Size’ button from the Page Setup
section to display the pop-up menu from where we can select the desired page size
(refer Fig.4.24).
68 Basic Computing
Digital Documentation
To find a word in the document, click the ‘Find’ button on the ‘Home’ tab. The
‘Find Navigation pane’ is displayed on the left side of the MS Word window.
Type the word to be searched in the text box (refer Fig. 4.26). The results will be
displayed in the navigation pane and the occurrences of the typed word will also
be highlighted in the document.
Text to be searched
Occurrences of
the typed text
Find
Navigation
Pane
Basic Computing 69
Digital Documentation
Notes
1. Type the word to be replaced in the ‘Find What’ text box (methods in our
example).
2. Type the new word that you want to replace within the ‘Replace With’ text
box (say, ways).
3. Click ‘Replace’ button if only one occurrence of the found word has to be
replaced. However, to replace all the occurrences of the word, click ‘Replace
All’ button.
70 Basic Computing
Digital Documentation
Notes
The header area on the top of the document will be activated and the rest of the
document will be deactivated. Type the text that you want to insert in the header.
When finished, double click anywhere on the main document to make it active and
deactivate the header area. To activate the header again, double click on the header
area again.
Basic Computing 71
Digital Documentation
Footer Area
Similarly to insert the footer, click on the ‘Footer’ button in the ‘Header and
Footer’ section on the ‘Insert’ tab. Select the desired footer layout and type the
text to be inserted in the footer area (refer Fig. 4.29).
72 Basic Computing
Digital Documentation
Notes
Basic Computing 73
Digital Documentation
Notes
74 Basic Computing
Digital Documentation
We may also add a word, that we feel is correct but is still showing a red wavy line
below it, to the standard dictionary of MS Word. To do so, right click on the word
and select ‘Add to Dictionary’ option from the pop-up menu.
Another way to use the Spelling and Grammar feature is to select ‘Spelling and
Grammar’ option from the ‘Proofing’ section
on the Review tab. When we click this command, Press F7 to start the Spelling
a spelling pane is displayed on the right side of and Grammar check
the screen.
The possible suggestions of the misspelt word (arhitectre in Fig. 4.34) will be
displayed in the text area on the ‘Spelling’ pane. We may click on either of the
buttons to use the spelling and grammar check feature:
z To accept the suggested word and replace it for only one occurrence, click the
suggested word and then click ‘Change’ button.
Basic Computing 75
Digital Documentation
Notes
Spelling
Suggestions
z Click ‘Change All’ button to replace all occurrences of the misspelt word
with the suggested and selected word in the document.
z Click ‘Add’ button to add the word in the dictionary of MS Word 2013
application.
z To ignore the spelling error indicated by the word processor, click ‘Ignore’
button to ignore once and ‘Ignore All’ button to ignore all occurrences of the
word with a red wavy line below it.
After all the spelling and grammatical errors in the document are removed, a
message box is displayed stating that the Spelling and Grammar check is complete
(refer Fig. 4.35). Click ‘OK’ button.
76 Basic Computing
Digital Documentation
Paper, Google Docs, Etherpad, Zoho are examples of a few online word
processing tools.
Notes
In this lesson, we will learn how to create, edit, format and share an online
document using Google Docs. It is a web based word processor that allows us to
work online upon a document either individually or in collaboration with other
Google account users. That means it is essential to have a Google/Gmail account
to create, edit, format or share a document using Google Docs word processing
tool.
The steps to create a new document using Google Docs are:
z Open any browser and type https://docs.google.com/document/ in the address
bar.
z Enter the user ID and password of your Gmail account and click ‘Next’ button
or press the ‘Enter’ key. The home page of the Google Docs will appear (refer
Fig. 4.36).
z The upper section of the home page (with black background) contains icons
to start a new document while the lower section (with white background)
contains a list of the documents previously created on Google Docs. Google
Docs also gives us the option to create a document using any of the templates
Basic Computing 77
Digital Documentation
Document Name Box: It displays the name of the document. When the
document is opened for the first time, ‘Untitled Document’ is displayed.
To give a name to your document click once on ‘Untitled Document’.
The cursor will appear. Type the new name, say ‘Sample Document’ and
press ‘Enter’ key.
Menu Bar and Toolbar: These contain commands and tools to perform
editing, formatting and many other tasks. These tools function in the
same manner as in any other word processor. Hence, using these we can
select the text to copy or move, paste, set the font style, size and colour,
align, print and perform various other tasks.
Work Area: It is the space to type the text in the document at the place
where the ‘Insertion Point’ is being displayed.
Scroll Bars: These help us to navigate vertically and horizontally in the
document.
z Type the text in the work area of the document. We can also insert tables, lists,
page numbers, headers and footers in an online document. Please note that
Google Docs automatically keeps on saving your document on Google drive
at regular intervals. That is why there is no command to save a document on
its interface.
78 Basic Computing
Digital Documentation
z Type the email address of the internet users with whom you want to share the
current document. If the email address being typed is not a Google account
then that user will only be able to view the document. To give specific
permissions to the users, click the down arrow near the ‘Permissions’ button.
We may select the desired option to view, edit or comment on the shared
document.
Permissions
Basic Computing 79
Digital Documentation
z The dialog box also contains a text box where we can write a short note
regarding the document being shared. This note may give a small preface of
Notes the document to the shared users.
z Click ‘Send’ button. An email with an invite to collaborate will be sent to all
the users whose email ID was mentioned while sharing. The invited users can
then open the document and all of them can work with the author in real time.
80 Basic Computing
Digital Documentation
Terminal Exercise
1. Define a word processor.
2. Give one difference between a proprietary and an open source software.
3. Is MS Word 2013 an open source software?
4. What is the shortcut key to print a document?
5. Define an online document.
6. Name any two online word processing tools.
7. Write the shortcut keys for the following:
(a) To save a document
(b) To open ‘Find and Replace’ dialog box
(c) To make the text bold.
8. Label the following on the Google Docs interface
Document Name box, Insertion Point, Button to start collaboration
9. Give one difference between a document created in MS Word 2013 and that
created in Google Docs.
Basic Computing 81
Digital Documentation
Notes 11. Write the steps to insert line spacing and indentation in a paragraph.
12. Write steps to create the following list in your document
82 Basic Computing
Digital Documentation
2. (a) False.
(b) False. Notes
4.2
1. Page Layout.
2. Come on at least try.
3. (a) Click Find button from the Editing group on the Home tab.
(b) Type Hello in the text box on the Find Navigation Pane.
(c) Press Enter key.
4.3
1. (a) F7 (b) Insert (c) Bullets and Numbering
(d) Indentation (e) Insert (f) CTRL + P, CTRL + U
Basic Computing 83
Spreadsheet
Notes
5
SPREADSHEET
Tables are the simplest way to store the information in an organized manner that
make the analysis of the data easier to understand and visualize.If the data is
organized as row and column, then data can be stored or retrieved by specifying
its row and coloumn number. You might have created a table when you want to
differentiate two topics or compare more than one item. Spreadsheet is nothing but
a large table in which data can be stored. It has pre-defined template made up of
rows and columns. It is used when we need to work on data calculations or data
analysis – thus it is majorly used in organizations. The spreadsheet program
operates on data entered in cells of a table. In this lesson, you will be introduced
to spreadsheet software in which you can create, edit or format a spreadsheet.
Objectives
After reading this lesson, you will be able to:
explain and use different features of Excel;
create, open and save a spreadsheet;
edit an existing spreadsheet;
format a spreadsheet;
create an online spreadsheet using Google Spreadsheet.
84 Basic Computing
Spreadsheet
known as ‘rows’ and the vertical lines are known as ‘columns’. Rows are labelled
as 1, 2, 3 etc., and columns are labelled using alphabets A, B, C etc. Intersection
of a row and column is known as a ‘cell’. The cells are labelled as the combination Notes
of the row number and the column alphabet. For e.g., A1 is the cell number also
called cell address in Row 1 and Column A. Similarly B5 is the cell number in Row
5 and Column B and so on. We can also perform calculations using formulas and
functions in a spreadsheet.
For example, in an organization, each row of a spreadsheet might store information
about its employee. Each column may store a different aspect of the employee’s
information, such as the first name, last name, address, phone number, department,
salary etc. The spreadsheet program can analyze this data in different ways, for
example counting the number of people in the department, listing all the people in
the order of name, finding the maximum salary of an employee etc.
Features of Excel
Microsoft Excel is one of the spreadsheet programs. The main features of MS
Excel are:
Autosum: It helps to calculate the sum of the content of all the cells in a
specified range.
Autofill: It helps to quickly fill the series of numbers or values; e.g., date,
week days etc., in a range of cells.
Sorting: It helps to arrange the contents of cells in increasing or decreasing
order.
Filtering: It helps to filter out some of the data based on some selection
criteria.
Charts: It helps to present the data using graphs like Pie chart, Bar chart etc.
Basic Computing 85
Spreadsheet
Formula: It helps to insert any type of formula in the sheet to obtain the
calculated output. Few of the functions are like mathematical, trigonometrical
Notes etc.
Pivot Table: It is a tool that allows you to reorganize and summarize selected
columns and rows of data in a spreadsheet to obtain a desired report. A pivot
table does not actually change the original spreadsheet.
Creating a Spreadsheet
A spreadsheet or a workbook is a collection of one or more worksheets. By default,
MS Excel 2013 opens with one worksheet, but we can add more worksheets as
and when required. Data can be entered in any of the sheet. Following are the steps
to create a workbook:
Click on the ‘Start’ button at the task bar.
Select Microsoft Office Excel from the list of available programs.
Select ‘Blank Workbook’ option from the options displayed. A new blank
workbook, named as Book1, opens (refer Fig. 5.1).
Row Number
86 Basic Computing
Spreadsheet
Saving a Workbook
After finishing all the work, the workbook must be saved in order to retain the data.
The excel workbooks are created and saved with .xls or .xlsx extension, depending
on the MS Office version you use. When we are saving a new workbook for the
first time, it will give us an option to name the workbook by displaying the ‘Save
As’ dialog box. The steps to save a workbook are:
Click ‘File’ tab and choose ‘Save’ or ‘Save As’.
Specify or browse to the location where you want to save the file.
Enter the desired name for your file.
Click on ‘Save’ or press ‘Enter’ key.
Closing a Workbook
We can attempt to close a workbook before or after saving the work that we have
done. In case the workbook is already saved, the program will close it without any
confirmation. However, if we try to close the workbook before saving, the
program will display a pop-up giving us an option to choose whether or not we
want to save this workbook, we can choose according to our need and proceed.
Basic Computing 87
Spreadsheet
Opening a Workbook
If we want to modify an existing workbook, we can open it from the location where
we saved it earlier. We can do so either by browsing to that location or by starting
MS Excel and then opening the workbook. We must remember the location where
we had saved it. Following are the steps to open a workbook:
Choose ‘Start’ → ‘MS Office’ → ‘MS Excel’.
Go to ‘File’ menu and select ‘Open’ from the list of options.
Browse the location from where you want to open the workbook.
Select the workbook that you want to open and click ‘open’ or double-click
the workbook.
Shortcut Keys
Open a new spreadsheet: Ctrl + N
Save a spreadsheet: Ctrl + S
Opening a saved workbook: Ctrl +O
Editing a Spreadsheet
While editing a workbook, it might be required to add another worksheet, add a
new row or column, resize a row or column, freeze panes, add remove some
formulas, move or copy the contents, and much more. Let us see the details of some
of these options:
88 Basic Computing
Spreadsheet
Choose Insert option: An Insert dialog box will be displayed (refer Fig. 5.3).
Select Worksheet option and click on ‘OK’. A new sheet with the name of
Sheet 2 will be inserted.
Basic Computing 89
Spreadsheet
B. Renaming a Worksheet
The default sheets can also be saved with a new name. The steps to rename a
worksheet are:
Open the worksheet of the workbook that you want to rename.
Right click on the sheet name i.e., sheet1/sheet2 etc., on the sheet tab - a pop-
up menu will be displayed.
Select ‘Rename’ option and type the new name of the worksheet.
To rename a worksheet, double click on the sheet name and write the new
desired name.
90 Basic Computing
Spreadsheet
Notes
On clicking the Header and Footer option, you will observe the cursor on the
top margin of the page.
Type the text for Header as desired (refer Fig. 5.7).
Click ‘Go to Footer’ option under the ‘Design’ tab for adding footer.
Type the desired text in the footer.
You will observe that this header/footer will be displayed on every page of the
sheet.
Basic Computing 91
Spreadsheet
Notes
Shortcut Keys
CTRL + X – Cut
CTRL + C – Copy
CTRL + V – Paste.
92 Basic Computing
Spreadsheet
(b) Header is the text that is displayed at the bottom of every page.
(c) In spreadsheet, the columns are numbered as 1,2,3 …. Notes
(d) The extension of excel file is .xls.
2. Fill in the blanks
(a) .................... helps to quickly fill the series of numbers in a range of
cells.
(b) The name of the active cell is displayed in .................... bar.
(c) .................... is the intersection of a row and a column.
(d) Resizing a column means changing the column ....................
Basic Computing 93
Spreadsheet
Notes
94 Basic Computing
Spreadsheet
Vertical
Alignment For text
visibility
Horizontal
Alignment To merge two or more
corresponding cells
Basic Computing 95
Spreadsheet
96 Basic Computing
Spreadsheet
cell with a thousands separator. The same E column after applying the ‘comma
style’ will display the values as 12,345.89, 34,210.98 etc. To display numbers with
a currency symbol, click on the drop down of $ symbol and select the required Notes
currency. To display numbers as percentages, select the cells for which you wish
to display numbers as percentages and click the Percent Style command.
In the ‘Format Cells’ dialog box, in the Number tab, select ‘Date’ in the
‘Category’ box.
Choose the desired date format.
Basic Computing 97
Spreadsheet
Notes
C. Showing Decimals
Sometimes the numbers need to be displayed in decimal number format. The
option of showing decimals can be used for that. Select the cell or cells for which
you wish to change the number of decimals. You can increase or decrease precision
(refer Fig. 5.17).
Other than these groups, there are formatting options available to us that help in
organizing the data and making it easy to read. Undermentioned are some of these
options.
98 Basic Computing
Spreadsheet
Place the mouse pointer on the boundary of two column headings or two
row numbers. Click and drag to resize the row or column.
Freeze Panes
While working on large spreadsheet containing row and column headings, you will
observe that the headings will disappear on scrolling the spreadsheet. It will make
your work difficult. You will need to scroll up again and again, to see the headings.
The Freeze Pane option will enable you to freeze one or more top-most row and
left-most columns as per your requirement. The steps to freeze panes are:
Open the worksheet of the workbook.
Click on the ‘Freeze panes’ option of view menu.
Basic Computing 99
Spreadsheet
Select the required option out of (Freeze panes/Freeze Top Row/Freeze First
Column).
Notes
Freeze panes works for more than one row and one column (refer Fig. 5.19).
To use it, we will have to select the cell till which we want to freeze the view
and then click freeze panes. It will freeze all the rows and columns above and
to the left of, the selected cell.
Terminal Exercise
1. What is the difference between moving and copying cells?
2. How do you resize a row or a column in a spreadsheet?
3. What are the main features of MS Excel?
4. Give the names of any two open source softwares used for creating a
spreadsheet.
5. Explain the options of Font group.
5.2
1. (a) False (b) True (c) True (d) False
2. (a) Number (b) Unfreeze
(c) CTRL +V (d) Merge and Center
Notes
6
PRESENTATIONS
A presentation is a good means to reach out to large number of people. The content
of a presentation can be explained to the audience using text, images, audio or
video. All these features make the presentation very interesting and interactive too.
Speaking in public becomes monotonous and boring but with the help of various
features provided in MS PowerPoint, a presentation can be made interesting to
increase audience participation.
In this lesson, we shall learn to create and enhance the presentation created in MS
PowerPoint 2013 by using various formatting features, by inserting images, charts
and audio-video files and also by applying colourful themes.
Objectives
After reading this lesson, you will be able to:
z create a MS PowerPoint presentation on any topic;
z format text and images in a presentation;
z review and protect a presentation;
z insert audio-video files in a presentation;
z modify and apply themes.
Creating Presentations
When you start your PowerPoint program, a screen as shown in Fig. 6.1 will apear.
Here you have an option to choose from the installed templates or start from
scratch using the blank presentation. Let us learn about these options one by one.
Notes
Installed Templates
Select the ‘Installed templates’ tab and then select the desired template. The
Installed template provides templates and ideas for a variety of presentation types.
Select the template you want and move through the wizard by clicking down arrow
button or the scroll bar after making the necessary choices. Choose the type of
presentation you would like and click on create when finished (refer Fig. 6.2).
Your presentation is ready for show.
Design Template
Click on the installed themes box to select the design template you want to use.
A number of template names will appear in the white box. These ‘Installed
Themes’ give you different backgrounds and text formatting to begin your
presentation. Preview each design by highlighting the template name on the list.
Press ‘Create’ after you have chosen the design.
Blank Presentations
Select the ‘Blank presentation’ to open a blank presentation. You can choose this
option to start a new presentation from scratch, if you have a new approach or if
none of the templates suit your needs. Fig. 6.3 shows a blank presentation.
Notes
Slide Layouts
Once you have chosen a blank form for your new presentation, the first slide of
your presentation appears. You can right click on the slide to choose the layout you
want. There are nine different slide layouts from which you can choose. You simply
make your selection and click on it. Each choice described below, dictates how
your completed slides will appear. Fig. 6.4 shows the available layouts.
z Title Slide: This option is useful for beginning a presentation; use this slide
if you want to include subtitles or smaller text underneath a title.
Notes
z Title and Content: When you need to create a list of things that fall
underneath a general subject, choose this layout.
z Section Header: This option is useful for making a major section within the
presentation.
z Two Content: This is useful option for putting different elements or text
boxes.
z Comparison: This is a useful option for doing pro/con lists and other
cmparisons.
z Title Only: This option is great for the beginning of a presentation. No
subtitles are included in this layout.
z Blank: Use this layout if you want a blank slide formatted according to the
master slide and use it as per your need.
z Content with Caption: This can be used to insert pictures/graphs/audio/
video etc., with text.
z Picture with Caption: Use this option to place title over one linked object.
z Table
Notes z Chart
z SmartArt Graphic
z Picture from file
z Clip Art
z Media Clip
Viewing Slides
PowerPoint consists of multiple views to help you in the creation and presentation
of your slides. These views are Normal, Slide Sorter, and Slide Show. The first two
views are for creating your presentation and the last one is for presentation of slide
show. You can access these views by clicking the respective view buttons at the
bottom right of the PowerPoint window. If you want to choose Normal view, select
‘View-Normal’ command on the menu bar.
Normal View
The Normal View divides the screen into three sections: the ‘main window’, Notes
where the current slide is displayed; the ‘outline pane’ on the left; and the ‘notes
pane’ at the bottom (refer Fig. 6.7). You can resize each pane by clicking its border
and dragging it to the size that you want it to be. To access Normal view, click on
‘Normal’ view button at the bottom left of the window or select ‘View-Normal’
command on the menu bar.
Notes
Notes
6.3.1 Inserting and Editing the Existing Slides as Your New Slides
You can insert slides and then edit them from other files; Cut, Copy and Paste
Slides; and duplicate slides.
Slides from Outline … Provide a way to create slides from text file outlines. You
can use this feature to create a group of slides that contain a lot of text. You can
also create new slides by typing text in the outline pane. To access the Insert Outline
dialog box, select ‘Home-Slide-Slides’ from Outline command on the menu bar.
Duplicate Selected Slides gives you duplicate of a slide when you need to create
similar slides. To insert a copy of the current slide after the current slide, choose
the slide you want to duplicate, and then right click for the ‘Duplicate Slide’
command on the menu bar or press ‘CTRL+SHIFT+D’ keys as shown in Fig. 6.10.
You can also cut/copy and paste slides by selecting the whole slide.
Reordering Slides
To reorder a slide in Slide Sorter View, simply click on the slide you wish to move
and drag it to the new location. In Normal or Outline View, click on the slide in the
slide pane and move and drag the slide to a new location.
Notes
2. How many slide layouts are available in New Slide dialog box?
(a) 7 (b) 9 (c) 14 (d) 17 Notes
3. The PowerPoint dialog box is useful to create a new presentation using:
(a) Installed templates.
(b) Open.
(c) Installed Themes and Blank Presentation.
(d) both (a) and (c) above.
4. Which of the following views is shown in the presentation of slides in a
conference?
(a) Slide view.
(b) Slide Sorter view.
(c) Outline view.
(d) Slide Show view.
Fgi.
z WordArt Styles: This section contains various options to change the visual
appearance of the text including text colour, outline and effects (refer Fig. 6.15).
z Arrange: This section contains the commands to arrange the order of objects
on the slide and also to align, rotate or flip them.
z Size: This section contains commands to change the width and height of the
selected object.
For example, let us format the text ‘Switch Statement’ as shown in Fig. 6.16.
Select the text and click on Format tab. Select the desired Shape style and WordArt
style. The text on the slide will be formatted as shown in Fig. 6.17. Notes
z Adjust: This section contains commands to edit the picture by changing the
colour, contrast, brightness, etc. There are also commands to compress or
Notes change the image and also to select any of the artistic effect from the Artistic
Effects gallery (refer Fig. 6.19 and Fig. 6.20).
z Picture Styles: This section contains various border styles in which an image
can be displayed (refer Fig. 6.21). You can even apply or change the border
colour and thickness of the image. Various visual effects such as shadow, 3D Notes
rotation, etc., can also be applied to the selected graphic object (refer Fig. 6.22).
Let us now format the text and image objects on a slide. Consider the slide given
in Fig 6.23. Select the image to be formatted and then click the Format tab. Click
the desired Picture style or any other formatting effect. You will see that the
selected effect is applied on the image on the slide.
Notes
‘Review’ tab. You will see that a Thesaurus pane appears on the right side of the
window with a list of synonyms as shown in Fig. 6.25. and antonyms. You may
choose any of these. Notes
Comment box
Comments pane
z From the ‘Info section’, click and select ‘Protect Presentation’ button. A
pop-up menu will be displayed (refer Fig. 6.28).
Notes
z Re-enter the same password in the ‘Confirm Password’ dialog box and click
‘OK’. Your presentation file is now protected with a password.
Notes
To remove the password, follow the same process as given above except for one
change. In the ‘Encrypt Document’ dialog box and ‘Confirm Password’ dialog
box, delete the password and then click ‘OK’. The password will be removed.
Online Videos: Select this option to download and add video from
internet.
Video on MY PC: Select this option to browse and add a video file
saved on your computer.
z As we would like to add a saved video, select ‘Video on MY PC’ option. The
‘Insert Video’ dialog box will be displayed.
z Browse for the desired folder and file. Click ‘Insert’ button.
Notes z The video along with video control buttons will be inserted on the slide. You
may resize the video as desired by clicking and dragging the size handlers. The
video will play when you run the presentation and click on it (refer Fig. 6.34
and 6.35).
When you click the down arrow in the ‘Variants’ section, Colors, Fonts, Effects
and background styles options are displayed in the drop down list.
z Colors: Select this option to change the colours of the currently selected
theme. When you click the down arrow, a list of in built colour theme appears
Notes (refer Fig. 6.38). Select the desired option and it will be applied to the current
presentation.
Select any of the variants and choose the desired themes in the respective variant.
The theme of the entire presentation will change.
Notes
Hyperlink
button
3. The ‘Insert Hyperlink’ dialog box appears (refer Fig. 6.41). The text that
you had selected will be displayed in ‘Text to Display’ text box.
z In the ‘Link to’ section, the ‘Existing File’ or ‘Web Page’ button will be
selected. For linking the selected text or image, the following options are
available:
Current Folder: This button is by default selected and the files and
folders in the current folder are displayed. Select any file from this list
that you want to link to.
Browsed Pages: Select this option if you want to link the text or image
to any of the browsed pages from the list.
Notes
Recent Files: This button is clicked to select any of the recently selected
files from the list.
Address Text Box: You can also type the address of any web page/
website that you want to link the presentation to in this text box.
z Click ‘OK’. The text or image you selected will be hyperlinked. You will see
the hand sign symbolising that it is a hyperlink when you run the presentation.
Notes
z You can save your file on your local system or Google Doc. You may also
share your presentation with other people.
Online PowerPoint presentation helps to add maximum functionality in slides but
internet connectivity is the vital part of presentation. It is easy to share with other
person.
3. Which button is selected to change the type of chart inserted on the slide?
z Themes are the coloured backgrounds with fonts and certain effects, which
help to enhance the presentation.
Terminal Exercise
1. Why do we need to format document? Which feature of MS PowerPoint
reduces the effort to format your presentation?
2. Write the steps to format image inserted in your slide.
5. Write steps to change the colour of the inserted theme in the presentation.
6. You want to show the students the website of the Prime Minister of India
(www.pmindia.gov.in). How can you link the presentation to this website?
7. Ravish has to present the detailed sales report to the management committee.
Help him to add a chart in his presentation.
6.2
1. Proofing section contains the following options:
o Spelling button.
o Research button.
o Thesaurus.
2. The steps to insert a saved video in a presentation are:
o On the ‘Insert’ tab, click the arrow below the ‘Video’ button.
o Select ‘Video on MY PC’ option. The ‘Insert Video’ dialog box will
be displayed.
o Browse for the desired folder and file.
o Click ‘Insert’ button.
6.3
Notes
1. Yes
2. To remove a hyperlink, right click the hyperlink and click ‘Remove Hyperlink’
button from the drop down menu.
3. ‘Change Chart Type’ button on the extreme right of the Design tab.
Notes
7
DIGITAL STORAGE
You have been creating and saving various types of files in different software such
as Word Processing, Spreadsheet, Presentation etc. Have you ever thought why
do you save a document, what happens when you don’t save it and on saving where
is it stored? How are you able to access the web? Where are the web pages stored?
You must realize that storage is immensely important to ensure future retrieval of
data and for efficient searching and display of data. This lesson introduces you to
digital storage alternatively referred to as storage media or storage device.
Objectives
After reading this lesson, you will be able to:
z define digital storage;
z list digital storage devices;
z differentiate between online and offline storage.
learn about the various types of digital storage that were used and the advancements
that are being used now.
Notes
Features of a Digital Storage
In terms of memory hierarchy, the digital storage can be categorized as:
z Internal Memory: Processor registers and cache.
z Main Memory: The system Random Access Memory (RAM) and controller
cards.
z On-line Mass Storage: Secondary storage.
z Off-line Bulk Storage: Tertiary and Off-line storage.
Tertiary storage provides large storage capacity at low cost such as optical discs.
Offline storage implies any storage that is not currently connected to the computer
whereas online storage implies that the storage is currently connected to the
computer.
It is represented as storage hierarchy as shown in Fig. 7.1.
Size: Small
Capacity: Small Memory Type: Register Memory
Access: Very Fast
Size: Small
Capacity: Small
Access: Very Fast Memory Type: Processor Cache
Cost: Very Expensive
Size: Medium
Capacity: Medium
Access: Fast Memory Type: RAM
Cost: Affordable
Size: Small
Capacity: Large
Access: Slower Memory Type: Flash/USB Memory
Cost: Very Cheap
Size: Large
Capacity: Very Large
Access: Slow Memory Type: Hard Drives
Cost: Very Cheap
Size: Large
Capacity: Very Large
Memory Type: Magnetic Tapes
Access: Very Slow
Cost: Affordable
Source: https://en.m.wikipedia.org/wiki/Memory_hierarchy#/media/File%3
AComputerMemoryHierarchy.svg
A B
(i) Random Access Memory (a) Small Size, Large Capacity
(ii) Tape Backup (b) Medium Size, Medium Capacity
(iii) Flash Memory (c) Large Size, Very Large Capacity
Notes In earlier times data was stored as a punch card using punching machines as shown
in Fig. 7.2. Then came the era of magnetic storage such as Tapes, Hard disk, Floppy
Disk, etc., out of them Hard disk is the most extensively used digital devices.
To store data on a digital storage of your choice you need to specify where you
would want to store your information by selecting the appropriate drive or location
in your digital system. By default, the data is stored in the largest storage device
the hard drive or Secondary Storage Device (SSD). Computers that are networked
may access larger storage devices. However, networked computers may also have
access to larger storage with large magnetic tape storage, cloud storage or
Notes
Network Attached Storage (NAS) devices as shown in Fig. 7.4.
Videos
Share Music
CLOUD
STORAGE
Pictures Documents
Contacts Files
The need to access data anywhere, anytime in the world, independent of the device
brought to the fore the idea of cloud storage. Cloud storage is an online storage
that requires internet connectivity. It allows unlimited storage. It can be thought
of as very large online data storage on the web. If you want to access the file
anytime, anywhere you can just login into cloud storage and get the file. It is not
needed to carry all your files in flash drives or CDs etc. It has the undermentioned
benefits.
Recovery
It can be used as a backup device thus ensuring the availability of files even if they
are deleted or corrupted on your local system.
Security
The data on cloud storage is safeguarded against any type of hardware failure and
can be accessed only after the identity of the user is assured through login and
password.
Cost Saving
It frees the owner from the additional cost of maintaining hardware and software
to store data.
Easy Sharing
Notes It allows sharing of data with other users. It allows to set permissions like read only,
read and write etc.
Data Backup
Cloud storage can perform automatic backups, which is very easy to schedule for
one, many or all of the drive data.
Collaboration
It allows multiple people to work on a document at the same time thus allowing
collaboration. These multiple users can be at anyplace in the world. They would
just need an internet connection.
Case Study
Let us assume that Ramanujan is working as an Office Assistant and thus has
been provided with a computer system by his employer. He is very careful and
thus always saves his work in an organised manner to ensure easy retrieval of
the files. But one day when Ramanujan came to his office, he found that his
system was not working and he had to urgently rework a document created by
him. The non-availability of the system had increased his workload and stress
as the document needed to be urgently shared with his senior.
Step 1: Go to drive.google.com
Type drive.google.com in your browser. You’ll see “My Drive,” which has:
z Files and folders, you upload or sync
z Google Docs, Sheets, Slides, and Forms you create
Notes You can share files or folders, so other people can view, edit, or comment on them
by either clicking on share option by right clicking the file and selecting share as
shown in Fig. 7.7.
Note: You can set permissions while sharing the file with other users. To see files
that other people have shared with you, go to the ‘Shared with me’ section.
Terminal Exercise
1. Define digital storage.
2. Explain features of a digital storage.
3. Differentiate between online and offline storage.
4. Name any two large size, large capacity digital storage devices that are
affordable.
5. Write advantages of using cloud storage.
6. Explain the importance of collaboration feature of cloud storage with an
example.
7.2
Notes
8
MAILING AND MESSAGING SERVICES
Internet is one of the most convenient, fastest and widely used means of
communication today. Few decades back, sending and receiving messages or
information was a relatively time consuming, expensive and tedious process.
Today, anyone, from anywhere and at any time can send and receive messages
across the globe just at the click of a button. The only pre-requisite is that both
sender and receiver should have a device that has an internet connection.
E-mail, instant messaging, social networking, blogs etc., are some of the
communication services that are being used for communication and sharing of
information using the World Wide Web. In this lesson, we will study about mailing
and messaging services being used for communication.
Objectives
After reading this lesson, you will be able to:
z create an E-mail account;
z compose, forward and reply an E-mail;
z attach file with your E-mail;
z use E-etiquettes;
z use messaging services and apps
o Skype
o Windows Live Messenger
o Messenger
o WhatsApp
8.1 E-mail
Notes E-mail (Electronic Mail) is the exchange of messages through digital devices via
the internet. It is one of the first and most popular services of the internet. Although
E-mail messages are usually in textual form but we can send text, graphic, audio
and video files as attachments along with the E-mail. Some of the advantages of
E-mail are as follows:
z The mails can be sent and received from anywhere and at any time. The sender
and receiver just need to have their devices connected to the internet. Also,
the sender and receiver must be logged in to their E-mail accounts for using it.
z It is a very fast mode of communication, as mails are sent and received in very
a short span.
z We can attach multiple files of any type or format along with the mails.
To create an E-mail account, we first need to identify the service provider whose
mail service we want to use. Some of the mail service providers are Gmail, Yahoo!
Mail, Hotmail, Zoho Mail, etc. Let us create an E-mail account using the Gmail
service provider. Follow the steps given below to do so:
z Open any web browser and type www.gmail.com in the address bar and press
‘Enter’ key.
z The home page (Fig. 8.1) containing the option to sign in to the Gmail account
is displayed. Since we want to create a new E-mail id, so click ‘Create
account’ button on the home page.
Notes
z Follow the instructions that appear in the successive steps. We need to specify
details such as user_name, password, name, address, date of birth, phone
number etc., as asked in the registration form (Fig. 8.2).
z Thereafter accept the terms and conditions of the service provider. The new
E-mail account will now be created.
8.1.2 Signing-In
Notes Once an E-mail account is created, we can send a mail, receive a mail and even
forward or reply the mails received from other users. This can be done by signing
in to the E-mail account. For that specify the valid user name and correct password
in the ‘Sign in’ dialog box (Fig. 8.3).
Notes
Primary, Social and Promotions sections
Composed Button
Number of
unread mails
The number of unread mails in each section can be seen on the corresponding tab
header. For the primary section, the number in front of ‘Inbox’ on the left panel
indicates the number of unread mails.
Also, the mails are displayed in reverse order of date. That means the mails that
have been received last will be displayed on top of the inbox.
The list of mails in each section contains the name of the sender, the subject of the
mail and time/date of receipt of mail. To open and view the contents of the mail,
click on the subject or sender of the mail.
Step 1. Click ‘Compose’ button (refer Fig. 8.5). The New Message window
appears (Fig. 8.6).
Notes
address. Thereafter, if required, type the message in the message text area and click
‘Send’ button.
Notes
8.1.6 Send an Attachment
One of the advantages of an E-mail service is that any type of file can be sent as
an attachment with the Email. Even multiple files can be sent in the same mail.
The steps to attach a file with an E-mail are as follows:
z Open ‘New Message’ by clicking the ‘Compose’ button to start creating the
new mail. Alternatively, if we need to pursue a mail sent by some other user,
‘Reply’ or ‘Forward’ button may also
be clicked.
We can attach multiple files with our
z Type the recipient’s address, subject
Email. However, the total size of the
and message in the respective boxes.
attachments is limited according to
z Click on ‘Paperclip’ icon to attach the mail service provider. For
the file. example, Gmail allows a maximum
of 25 MB attachment size.
z Browse for the file that you want to
attach. Select it and then click ‘Open’
button. The file will start attaching. A progress bar depicting the status of the
uploading of file will be displayed in the ‘New Message’ window (Fig 8.7).
This may take some time depending on
the size of the file. Shortcut key to send the E-mail
is Ctrl +Enter.
z Click ‘Send’ button to send the mail with
the attachment.
Notes If a mail is received with file as attachment, a paperclip icon will be seen in the inbox
itself. Open the E-mail having an attachment. The preview of the attachment will
be seen in the mail. Click the ‘Download’ icon (Fig 8.8). The file will be
downloaded and saved in the default download folder of the computer.
Download Icon
Always remember to log out of your E-mail account after the work is done by
clicking on ‘Logout/Sign Out’ button. Refrain from closing the browser without
logging out.
8.1.8 E-Etiquettes
E-Etiquettes or E-mail etiquettes that define the behaviour that one should follow
while working with E-mails. This code of conduct largely depends on the person
with whom are we communicating via email, whether they are our friends, elders,
customers, peers, seniors or subordinates.
An E-mail leaves an impression on the receiver. Good E-mail etiquettes leave a
good impression and increase the chances of prompt and positive response. On the
other hand, bad E-mail etiquettes reflect poorly on us. Every organization or
company should implement etiquette rules for its employees. The benefits of
following these E-etiquettes are as follows:
z An email with a good language gives a good impression of the sender and his/
her organization.
z An E-mail that is worded in a proper manner and to the point is very effective
as compared to badly worded mails.
z An E-mail with good salutation, opening and closing statements are also
appreciated by the receiver.
Hence, we should follow E-Etiquettes while composing the mail. Some of them
are listed below:
z First and foremost, remember that E-mail is not private. Once the sender
sends the E-mail, the receiver can do whatever he/she wants, viz. post it on
When a mail is received, then also certain code of conduct should be followed. The
E-Etiquettes to be kept in mind while replying the mail are as follows:
Notes
z Each E-mail should preferably be replied/acknowledged within 24 hours.
z Do not reply to spam e-mails or the e-mails that look like a potential fraud.
z Each query in the mail should be answered in a very precise and concrete
manner. In fact, any further questions should also be pre-empted.
z Scan the attached file before downloading it.
z Do not overuse ‘Reply to All’ option.
8.2.1 Skype
Skype is one of the very first services that was launched for instant messaging in
the year 2003. It is still being used between any two digital devices that have an
internet connection. In addition, users may exchange digital documents consisting
of text, images, audio or video. But, primarily, Skype gained popularity due to its
video conferencing feature. It is available for almost all operating systems like
Windows, iOS, Android, Mac and Linux.
To use Skype, one has to first register using a unique user id / Skype name. All
registered users are listed in the Skype directory and these can communicate with
each other in any form i.e., text, audio or video. Various other features of Skype are:
z Messaging-Video messaging
z Creation and editing of personal user profiles
z Online status indication
z Numerous emoticons
Source: https://www.cmswire.com/cms/social-business/microsoft-brings-skype-
to-outlookcom-020719.php
Skype is being used increasingly in the educational sector as well. Teachers and
students globally can share and gain from each other’s educational projects. While
conversing on Skype, the users can alternate between two languages, hence,
facilitating language exchange. The teachers and students can hold virtual field
trips to reach out to experts in varying fields. If used in classrooms, teachers can
help students to participate in numerous Skype lessons in an interactive and
interesting manner. Using the search tool, a teacher can find the expert of her
choice to interact with the students.
In December 2017, Facebook launched a new version of its chat app for children
in the age group of six to twelve years. This app is named as ‘Messenger Kids’
and it does not require a Facebook account. Rather, parents are able to manage Notes
their child’s Messenger Kids app from their own Facebook account. This helps the
parent to keep a check on their child’s contact list and messages. Also, it offers
video and text chat services along with all types of playful masks and filters, GOFs,
frames, stickers and drawing tools.
8.2.3 WhatsApp
WhatsApp Messenger is one of the most popular messaging services today. It was
created by WhatsApp Inc. but was taken over by Facebook in February 2014. It
is more commonly used for mobile messaging. In addition to text messaging, it also
used for sending and receiving images, voice messaging, voice calls and video
calls. Although, it is most commonly used for mobile devices yet it is also accessible
from desktop computers. It can be downloaded and installed on any mobile device
(refer Fig. 8.10). Initially, only one to one communication was possible but now,
communication can be held with individuals as well as through groups. It also
provides group chat and location sharing options. In fact, nowadays it is being used
by various companies to provide customer service to its clients.
To use WhatsApp, the user just needs to download the app from app store and then
provide a standard cellular mobile number for installation and working. Some of
the features of WhatsApp are:
z It maintains a contact list of individuals as well
as groups.
z It alerts for messages received or any other
notifications.
z It allows text, audio and video communication.
z Clicking pictures and sending to any user.
z Send any file through the chat window.
z Create and update the user’s profile and status.
The PC version of WhatsApp is known as
‘WhatsApp web’ and was released in January
2015. It is just an extension of the mobile phone
registered with WhatsApp. That means, even if we
open WhatsApp web, all messaging can still be
done live from our mobile phones. The only pre-
requisite is that the mobile should be connected to Fig. 8.10: WhatsApp Chat
the Internet for the browser application to function. Interface
WhatsApp web is available for all major desktop browsers except Internet
Explorer. To use WhatsApp web, open the browser and type https://
Notes web.whatsapp.com/ in the address bar. The home page as shown in Fig. 8.11
appears. It gives the instructions to use WhatsApp on your computer.
After the QR code is scanned, the chat screen with the list of chats on the left and
the active chat on the right is displayed (Fig. 8.12). Now, one can send and receive
messages through this application.
Notes z Some of the popularly used IM are – skype, face book messenger, WhatsApp.
Terminal Exercise
1. Define an E-mail.
4. Write the steps to create a new E-mail account using Gmail. Will the steps be
different if Yahoo service provider is used instead of Gmail?
5. Poonam has created a report on Republic day celebrations in her school. The
name of the file is rep.docx. How can she send this file to her teacher using
E-mail? Write the steps to do so.
8. List any four E-etiquettes that should be followed while composing the mail.
9. Define an App.
8.2
1. (a) False (b) False (c) False (d) True Notes
2. (a) Facebook Messenger/Messenger
. (b) WhatsApp web
3. (a) WhatsApp
(b) Skype
(c) Facebook messenger
Notes
9
INTRODUCTION TO SOCIAL
NETWORKING
Social networking means linking and networking with your friends and family on
the web space. There are various websites that help you to create a profile for you
and add other members in your network. There are lots of social media websites
or apps that are now-a-days used for this purpose. Most popular amongst these
being Facebook, Twitter, Instagram, LinkedIn, WhatsApp, YouTube and Blogs
etc. These sites allow members to share information, photographs and videos.
These apps also help the users to organize events, chat and play online games. The
connections between people on these sites are network of connections and not just
one to one. Availability of smart phones has made the use of social networking sites
easy for the users. These social networking sites also help the businesses to
promote their product or services. You can write small message, article etc., and
share it among your friends, colleagues and others.
Objectives
After reading this lesson, you will be able to:
z list the advantages and disadvantages of social networking;
z create profiles on the most popular social media websites/apps;
z use different social networking sites for various purposes;
z make digital footprints.
from real life, we can also get to know more people online and make new
connections having similar interests to ours that can help us in number of things.
Notes
Having said this, we must always use the networking websites very carefully as we
are at the stake of losing our personal information in the lack of awareness. Let us
now learn some of the pros and cons in detail.
z Real Time Updates: Using social media, we can get the response to our
queries in real time. In older days, the daily newspaper was the only source
of knowing what happened in the world during the previous day. But now, not
only you can come to know what other users share, but also you can chat with
them in real-time irrespective of their location. Additionally, most of these
websites and apps give you an option to forward the updates further, this cycle
increases the reach to another level.
z Education: Social media has a lot of benefits for the students and teachers.
Using social media, students can easily understand and learn from various
experts and professionals at any time. The entire teaching-learning process
can be conducted at any place, at any time and from any expert. It can be either
by paying the fees or even may be free.
z Marketing and Growth: Social media has made a large impact in the area
of marketing. Imagine your father opens up a new cake shop and you want
to share this news amongst all your family and friends. This can be easily done
in a few clicks and shares. Not only can one market business but also receive
online orders as well as by using a number of other methods help promote
business.
z Awareness: Social media creates awareness and innovates the way people
live. People with similar profession, e.g., farmers, can learn new techniques
from each other. Furthermore, people can get to know of noble causes and
donate to the needy, e.g., all the social media platforms were widely used to
generate funds for the flood affected areas of Kerala in August 2018.
Notes z Hacking: Social media profiles need nothing but an email-id or mobile
number to be created, thus there is a risk of fake identity representation.
Stealing someone else’s identity is called ‘hacking’. If someone’s identity
gets hacked the hacker may cause harm as pretending to be someone else.
z Cyber or On-line Bullying: Anyone can speak anything on social media and
share their opinion publicly, be it good or bad, be it about a thing or about any
person. Sometimes, in order to trouble others, unethical people bully them
online. This can cause depression or create suicide tendencies in the person
about whom the wrong things are publicized.
Having understood social media, we shall now learn about the common social
media platforms in detail. While, all of them can have similarities as discussed
above, but each of them can also have a different purpose and approach of using
it. Some can be just for entertainment while others can help you in finding a job.
Some can be used for education purposes while some others can be primarily used
to earn money. Let’s us discuss them one by one.
9.2 LinkedIn
LinkedIn is a social networking platform, and it would be wrong, if we call it a
professional networking platform as it links networking with a job search platform.
It focuses on our professional journey by letting us prepare a well written
professional profile and then helps us in finding a new job as well.
Step 1: Enter your details to create a new account (refer Fig. 9.1).
Notes
Step 2: After creating an account, sign in to your LinkedIn account (refer Fig. 9.2).
vvv
Step 3: Update all your academic details and other useful information under edit
profile section.
Notes
Step 4: Use ‘Jobs’ section to check the jobs recommended by LinkedIn, or you
can manually search for Jobs (refer Fig. 9.3).
Step 5: Right click on ‘Me’ tab and select the ‘Settings and Privacy’ to make your
account secure.
Step 6: After selecting ‘Settings and Privacy’, change the necessary information
in ‘Login and security’ (refer Fig. 9.5).
Notes
z Select an option from the list of the suggestions that appears or click the
‘Search’ icon to run the search (refer Fig. 9.7).
Notes
z You will see the following tabs at the top of the search results page:
All
People
Jobs
Content
Companies
Groups
Schools
z Select any of the tabs to view search results in that category. The LinkedIn
search filter is further specified by many other refined search options. It has
additional search filters such as ‘Sort by, Date posted, Companies’ etc.
z The ‘All Filters’ option displays the list of search options. You may select the
required options and click on ‘Apply’ (refer Fig. 9.8).
Notes
z On clicking the 9 dots (as shown in Fig. 9.9), you can find other options of
LinkedIn.
z You can search for videos by clicking on ‘Learning’ of ‘Visit more LinkedIn
products’. It will redirect you to LinkedIn Learning (refer Fig. 9.10).
Notes
9.3 Facebook
Facebook is another social networking website that permits the users to make
profiles, upload photos and videos, send messages and stay connected with
friends, family and colleagues. It would be interesting to know that Facebook was
created by Mark Zuckerberg, and he actually started its initial version during his
graduation itself. You can use Facebook to promote your institution/organization
and can also tag your friends/colleagues in pictures/videos or any other posts.
You can create a Facebook account using www.facebook.com (refer Fig. 9.13).
Step 1
Notes
After entering all the above details, you can create your account.
Step 2: After logging into your Facebook account, the main page of your
Facebook account will be displayed (refer Fig. 9.14).
Step 3: To change the settings of your account, click on the down arrow as marked
in the Fig 9.14 and choose settings option. On selecting the settings option,
Security and Login page will be displayed (refer Fig. 9.15). Notes
Step 4: You should keep oneself secure on the social media. For that you can add extra
security to your account. Use Two-factor authentication (refer Fig. 9.16 and 9.17).
Notes
Step 5: To change the settings in such a way that only your friends can see the
details of your account (refer Fig. 9.17). This will help you to keep yourself secure
on the Facebook platform.
Step 6: Many times, some apps try to gather some information of your account.
You can also block such apps. Use the option ‘Manage Blocking’ (refer Fig.
9.19). Using this you can also block some of the unwanted users.
Notes
After creating your account and making it secure, you can start posting your
message on Facebook.
z It will show the list of people with same name. To send someone a friend
request, click ‘Add Friend’ next to their profile picture.
Notes
z A friend request will be sent to your friend’s Facebook account. He/She has
the choice to accept your request. Then only he/she will be added to your
friend list and will be able to view your posts.
How to Share Information on Facebook
Generally, people use Facebook for sharing their personal or professional
information. This social media is widely used to connect with friends/relatives so
that they are able to get to know about you. Sharing something on your account
is done by creating post. Post is a message or information that you write in the
Facebook account.
To Share Something on Facebook:
z Create Post option is available on top of your home page (refer Fig. 9.21).
Click on the … (three dots) as shown in the screenshot above for creating a
post.
z Add a text update or click the type of post you had liked to share (example:
‘Photo/Video, Feeling/Activity’) (refer Fig. 9.22).
9.4 Twitter
Twitter is a free social networking microblogging service that permits registered
members to broadcast short posts referred to as ‘tweets’. Twitter members will
broadcast tweets and follow different users’ tweets by using multiple platforms and
devices. Tweets and replies to tweets can be sent by Twitter’s website as well as
the mobile application.
A ‘tweet’ is just a post on Twitter and can contain maximum of 280 characters.
Twitter is more of a public platform which means unlike Facebook or LinkedIn,
where members ought to approve social connections, anyone having a Twitter
account can follow anyone in just a single click. In order to connect a tweet to a
general topic, members add hashtags to a keyword in their post. The hashtags are
Notes sort of a meta tags, and displayed as #keyword. One can create a twitter account
using www.twitter.com
Step 1: Create a new account after clicking on Sign up now.
Step 2: After sign-up, you can login to your account (refer Fig. 9.24) and can see
the home page of your account as shown in Fig. 9.25.
How to Tweet
z Type the message into the What’s happening box at the top of your Home Notes
timeline, or click the Tweet button as shown in the screenshot given in Fig.
9.26. You can include photos, a GIF, or a video in the tweet.
9.5 Blog
Notes Blog (weblog) could be a website that is sort of a diary or journal. Someone who
frequently writes blogs is known as a ‘Blogger’ and the process of writing these
articles is known as blogging. They express their opinions and thoughts in a blog.
Video blog or Vlog is a blog containing video material. Though there are plenty
of websites used for blogging, here we will use ‘Blogger’ i.e., www.blogger.com
to understand more about blogs.
Step 1: The home page of blogger.com as shown below.
Notes
Step 5: Enter the title, address and choose template for your blog as shown in
Fig. 9.31.
Notes
Step 7: Write your blog and click on ‘Publish’ (refer Fig. 9.33).
Step 8: After publishing your blog, it will allow you to edit or share your blog (refer
Fig. 9.34).
Notes
9.6 YouTube
Another widely used social media platform is YouTube. It not just allows you to
reach a wide number of audience, but has many other advantages and still it is
extremely simple to use. It can be used without even creating an account. By simply
visiting the website https://www.youtube.com/ will allow you to browse through
Notes different videos and search for your preferred videos. However, to save your
preferences, you can create an account.
YouTube can be accessed via its mobile applications as well. As YouTube is a
Google product, it allows you to login using your existing gmail account or if you
create a new account, that account will again work across all google services.
YouTube homepage will show you the list of latest trending videos and you can
use the search box for your content. Following screenshot shows a YouTube
search with the keyword ‘nios vocational courses’:
As it can be seen in the Fig. 9.35, a simple search will return the results that can
have both the videos and suggested channels. You can simply watch any relevant
video or go to a channel you like. Let’s have a look at the video we got in the results.
All the above mentioned social networking sites are used for online learning,
different types of communications, professional development, making friends,
Notes
sharing content, uploading videos etc. Every individual must maintain the cyber
ethics. User has to be very careful while using and posting messages, videos or any
other material in social networking sites. We must not be involved in wrong or
improper activities.
(b) People from same walk of life can connect with each other through the
social media.
Notes
(c) Facebook was created by Marc Zuckerberg.
(d) Maximum 250 characters are allowed in a tweet.
2. Fill in the blanks.
(a) ..................... is a trail of data.
(b) People who write blog are known as .....................
(c) ..................... is a business and employment-oriented service.
Terminal Exercise
1. What is the importance of social media?
2. Explain the disadvantages of social media.
3. How to create an account in LinkedIn? Explain the steps.
4. Explain the various types of digital footprints.
9.1
1. (a) True (b) False
(c) True (d) False
2. (a) Digital footprint (b) Blogger
(c) LinkedIn
Notes
10
SECURING THE COMPUTER SYSTEM
Today we live in the technological era where Internet has become indispensable
part of our lives. Internet and its services help us perform multiple tasks. Using
Internet, we can search any type of information, do online shopping and banking,
book movie, railway and flight tickets, undertake online courses and many more.
Unfortunately, there is other side of the coin as well. If not used, with caution,
Internet is a dangerous tool in the hands of malicious people. Internet and its
related services have brought lot of security threats. The most effective way to
protect yourself from the cyber threats is to be aware of them and take appropriate
measures to protect yourself, your device and your data. In this lesson, we will be
talking about cyber security, cyber law and e-waste management.
Objectives
After reading this lesson, you will be able to:
z define cyber security;
z secure the computer system;
z describe cyber law;
z explain about e-waste and its harmful effects.
z Availability of Data for All: Today anyone can get any information, may it
be personal, professional or organizational; all data is accessible to any person
in the world. It is therefore very important to know the means to protect data
from unauthorized access, copying and distribution.
z National Security: ‘Cyber Attacks and Digital Spying’ are one of the most
dangerous threats to national security. The anti-nationals and terrorists are
always trying to steal sensitive data related to a particular country and use it
to for anti-national activities. So, it is very important to be cautious and take
adequate precautions to save our data.
threats and take adequate measures to protect our system. Following are the steps
that should be taken to protect and secure your system from potential cyber crimes.
Notes
z Always Password Protect Your System: It is always advised to password
protect your system and also certain applications or files containing sensitive
data. One should keep the following points in mind while setting passwords:
o Do not share your passwords with anyone.
o Do not use the same password for all applications.
o A password should be strong having a combination of alphabets, digits
and special characters.
o It is not good to have your initials, date of birth, pet’s name etc. as your
passwords.
o Preferably your password should be 8-10 characters long and should
have special characters too..
You may use password manager application that will help you to remember
multiple passwords.
z Always Update Your System: You should always update the operating
system, antivirus or any other software installed in your computer. Although
the updates add on some extra features but they also cover the cyber security
loopholes. Generally, one gets message pop ups when the system or any
software is due for updates. Many OS and other applications have the facility
to automatically update which makes things easier.
z Always Pay Attention to Security Warnings: If the system is giving
security warning, one should not ignore it. Immediate action nees to be taken
as directed by the application or the system.
z Always Install Original Antivirus: It is very well known that any machine
connected to the Internet is prone to viruses, worms, Trajans, or any other
form of malware. An antivirus software helps in protecting the system from
potential virus attack. Although it does not give 100% assurance to keep the
system safe, yet it gives quite a considerable amount of protection. One
should always use original antivirus software and keep on updating the
antivirus regularly.
z Never Open Unsolicited Mails: Most of the cyber attacks are through
emails. So avoid opening the mails that are sent from unknown persons. And
more importantly you should not click on any links provided in these mails,
unless you are sure that they are safe.
You can make settings to block cookies, to block the advertisements, to block
your location access and so on. It must be noticed that many of the options
Notes are disabled by default so, you have to enable them by selecting your
‘Browser Settings’ options. In Google Chrome, the Settings option is
available in the pop up menu that is displayed when we click on ‘Customize
and Control Google Chrome’ button present on the top right of the browser
(Fig. 10.1).
z Use Anti Spy Software: A spyware is a malware that is designed to gather
information secretly from a system or a database and send it to any third party.
Sensitive information such as banking and credit card details can lead to
identity theft and fraudulent transactions. Nowadays, latest antivirus programs
have anti spyware built in them. They also give protection against adware and
Trojans.
z Back up Your Data: It is always a good practice to back up your data on any
secondary storage device or on the cloud. This comes to rescue when your
system gets hacked or even when your hard drive crashes.
z Uninstall the Programs That are no Longer in Use: One should always
uninstall the programs that are not being used. This helps keep your system
secure and also increases the processing speed of your computer.
Cyber Law deals with legal issues related to cyber space and it covers a variety of
areas such as online privacy, intellectual property, freedom of expression, usage of
Internet, online transaction frauds etc. It gives protection to the victims of cyber Notes
crime by providing provisions to take action against the people committing such
crimes.
According to Cyber Law, the definition of cyber crime includes any unlawful act
done using digital devices that are connected to Internet. Following are some of
the acts that come under the purview of cyber crime:
z Online Fraud: The cyber law protects the internet users from online frauds
such as credit card thefts, identity thefts etc. A person who commits such
offence is liable to be prosecuted under this law.
z Identity Theft: The people with malicious intentions steal personal data such
as credit card details from the Internet and use it for transacting money or
extortion purposes. Even social media accounts of people can be hacked and
the information can be used for committing different types of fraud. All these
acts are punishable according to various provisions of cyber law.
To take cognizance of these acts, Indian Penal Code has some up with IT Act 2000.
It is based on The Indian Penal Code, 1860, The Indian Evidence Act, 1872, The
Bankers’ Books Evidence Act, 1891, The Reserve Bank of India Act, 1934, etc.
This is the primary law as far as the cyber crimes and e-commerce in India are
concerned. The salient features of this Act are:
Notes
z The IT Act 2000 provides legal recognition to the transactions done via
electronic medium.
z It gives legal recognition to digital signatures for authentication of any
information.
z It facilitates and regulates online correspondence with the government
agencies and departments. For example, we can file online return, pay taxes,
apply for passports and Aadhar cards etc., and give online payments for these
services as well.
z It allows and facilitates electronic storage of data. Even government banks
such as RBI is given permission to store records in electronic form.
z It gives legal permissions for online transfer of money between customers,
banks and other financial institutions.
z It elaborates the offences, penalties and breeches related to cyber crime.
z It also lays down the trial procedure and justice dispensation system for cyber
crimes and its accused.
z It enacts penalties for offences such as damaging computer systems, committing
cyber terrorism etc.
z The section 66A of the Act makes the offensive messages illegal and owners
of the servers are responsible for its content. If any offensive image is
uploaded and forwarded on social media, its server owner will be held liable.
A cyber crime of any nature should always be reported to cyber cell in local police
station. The Government of India has laid down various initiatives to facilitate
victims of cyber crime so that they can file complaints online.
The complaint of cyber crime can be reported online through cyber crime
portal. (https://cyber crime.gov.in/cybercitizen/home.htm). Through this portal,
the victim can report an anonymous complaint where the victims or the
complainants may not disclose their identity.
z The companies and organizations are able to carry out their business
processes according to the legal provisions stated in the IT Act 2000. This
Notes
encourages healthy trade practices.
z Digital Signatures have been given validity making exchange for authenticated
documents easier between companies and government organizations.
z It has increased the utility of e-governance as well. The Government can now
issue notifications and circulars on the web for the general public. Similarly,
people can transact with government through various online portals. For
example, nowadays we can apply online for passports or even file online IT
returns.
Notes
gloves and masks during the recycling process. Nowadays there are many e-waste
recycling companies coming up with the pickup facilities for collecting old
Notes electrical or electronic items from your homes.
Refurbishing is the process in which the electronics are sold again at lower prices.
This benefits both society and the environment. The word ‘refurbish’ means to
renovate.
Re-use: In this process of e-waste management, the electric or electronic device
is reused after making a slight modification. Devices such as mobile phones,
computers, laptops etc., can be re-used.
The government needs to take a few stringent steps in order to promote e-waste
management. Some of these steps are as follows:
z Various recyclable units should be set up and promoted so that people can
easily send their devices and appliances for recycling.
z There should be proper arrangements for safe storage of e-waste or its
recycled products.
z Research for efficient utilization of e waste should be encouraged.
z There should be strict rules and laws pertaining to e-waste management. The
rudimentary methods of waste disposal and recycling should be stopped.
People openly burn the waste, heat circuit boards, expose them to acid baths,
dump waste into landfills, and so on. Anyone who is caught doing such acts
should be punished.
z Cyber crime includes any unlawful act done using digital devices that are
connected to Internet. Online Fraud, Copyright Infringement, Defamation,
Notes Cyber Stalking and Cyber bullying, Business ethics and Identity Theft are
some of the acts that come under the purview of cyber crime.
z IT Act 2000 of Indian Penal Code takes cognizance of cyber crimes.
z E-Waste or electronic waste is constituted by the old electric and/or electronic
devices that are no longer in use.
z E-waste contains hazardous chemicals and metals such as lead, beryllium,
cadmium, plastics etc., that are difficult to recycle. Hence, it should disposed
in a proper manner.
z Some of the most feasible methods of e-waste management are recycling,
refurbishing and re-use.
z Recycling is the method in which e-waste is converted to something that can
be used again in some or the other manner.
z Refurbishing is the process in which the electronics are sold again at lower
prices.
z ReUse: In this process of e-waste management, the electric or electronic
device is reused after making a slight modification.
Terminal Exercise
1. Fill in the blanks:
2. State whether the following are True or False:
(a) The purpose of cyber security is only to prevent cyber attacks.
(b) We can ignore the security warning being given by our system.
(c) We should download the software from the website that looks most
beautiful.
(d) Downloading an image that has copyright restrictions is a cyber crime.
(e) We should burn e-waste to get rid of it.
3. Define the following
(a) Cyber Security (b) Cyber Crime
(c) Cyber Law (d) E-waste
10.2
1. (a) IT Law (b) IT Law 2000 (c) Cyber cell
2. It has made exchange for authenticated documents easier between companies
and government organizations.
10.3
1. (a) Electronic (b) Refurbishing
(c) Beryllium
2. Lead, mercury 5. Firewall
6. Authenticity 7. IT Act 2000
8. Spyware 9. E-Waste Management
Notes
11
INTRODUCTION TO E-SERVICES
In our day to day lives we avail many services. Many of these services are our daily
requirements and few are needed occasionally. Transportation, communication,
water and electricity are few of the services. In earlier times, to avail any service,
our parents and grand parents had to wait in queues, take leave from their
workplace, write applications, visit the respective organization/office etc.
Technology has made our life easier and we are saved from the hassles that our
parents and grandparents had faced. This has been made possible because of the
E- services.In this lesson we will understand and discuss the various E-services
initiatives that can make our day to day operations easier.
Objectives
After reading the lesson you will be able to:
z define E-service;
z use the government initiated E-services;
z describe the benefits of E-services;
z list the E-services provided by institutions.
11.1 E-service
Any service that can be availed electronically is known as E-service. The popular
electronic mediums that we are using are telephone, call center services, mobile
phone, television or Internet. The rise in the usage of smart phones has ensured the
maximization of availing facilities and services using Internet. The Internet has
played a significant role in revolutionizing E-services. The impact has been such
that nearly every sector is providing services online so that the customers are able
to take advantage.Internet as you know has the capability to connect even the
remotest area, thus benefiting the people and in turn the society. Notes
Passport Seva
Notes In order to travel to other countries in the world, the government issues an essential
travel document known as the Passport. The purpose of travelling can be meeting
relatives in other countries, tourism, pilgrimage, education, business purposes or
medical attendances. Citing the hassles that one faces to apply for a passport, the
Ministry of External Affairs has been successfully providing Passport services also
popularly known as ‘Passport Seva’ online. The services include applying for
passport services, renewal through an appointment etc., to ensure simple, efficient
and transparent processes for delivery of passport and related services.
The URL is: https://portal2.passportindia.gov.in/ (refer Fig. 11.2).
DigiLocker
Locker is a term associated with keeping valuables at a safe place, and all of us have
many documents that are of immense value to us such as our educational
certificates, driving license, voter id, documents associated with our home, job,
vehicles etc. Losing any one of them can cost us dearly. To prevent any such
unfortunate event we can use the services of DigiLocker. A DigiLocker allow us
to upload scanned copies of our documents so that we can access it anytime and
anywhere. The uploaded copies can be electronically signed using the eSign
facility. The digital documents in the DigitalLocker can be shared with organizations,
hence carrying physical copies is not a necessity anymore. As an example of the
utilization of the DigiLocker facility by institutions, CBSE had sent digital copies
of all the board appearing students to the digital locker which is connected to their
Aadhaar (UIDAI) id.
Notes
The benefits of Digilocker are:
z The digital documents can be accessed anytime, anywhere and shared online,
thus saving time.
z Digital Locker makes it easier to validate the authenticity of documents as
they are issued directly by the registered issuers.
z Self-uploaded documents can be digitally signed using the eSign facility
(which is similar to the process of self-attestation).
The URL is: https://digilocker.gov.in/ (refer Fig. 11.3).
Educational Initiatives
Some of the educational initiatives by government are:
Notes
UMANG App
Taking advantage of the Internet and smartphone penetrations in the Indian
households, the Government of India aims to drive Mobile Governance in India
through UMANG (Unified Mobile Application for New-age Governance) app
(refer Fig. 11.6). It is a single window access to all Government initiated E-services
ranging from Central to local Government bodies and other citizen centric
services. UMANG intends to provide major services offered by the Central and
State Government departments, Local bodies and other utility services from
private organizations. It provides a unified approach where citizens can install one
application to avail multiple government services. Notes
appointment without visiting the hospital. To ensure efficient and effective data
maintenance Aadhaar based online registration and appointment system is utilized.
Notes This requires the registration of mobile number with UIDAI (Unique Identification
Authority of India) through Aadhaar. In case the mobile number is not registered
then the patient’s name is used to fix appointment and a Unique Health Identification
(UHID) number is issued. The highly reputed AIIMS hospital has been using the
framework effectively.
The URL is https://ors.gov.in/
Notes
Benefits of E-services
The previous section has showcased few of the landmark E-services that are bound
to benefit the society at large. The following are the benefits of E-services:
z Greater Reach: The penetration of Internet and smartphones in the Indian
household can allow a person from even the remotest village to access the e-
services, thus allowing a greater reach.
z Access to Diverse Users: The E- services have been created with an aim to
benefit all the sections of the society irrespective of age and qualifications.
z Enhances Transparency: Since E-services allows the users to directly
connect with organizations/ institutions hence it allows transparency in the
transactions.
z Convenient Access: The availability of E- Services with user friendly
interfaces at a click or touch of a finger allows users to avail services as per
their convenience.
z Timely Delivery of E-services: Since the process is digital, it allows for
speedy communication between departments thus ensuring timely delivery of
the E-services.
z Saves Cost: It saves cost both for the service provider and the person availing
the services in terms of setting up of infrastructure, hiring employees,
transportation, paperwork etc. Notes
Institution Initiatives
Taking advantage of the digital revolution, nearly all the institutions have
accommodated technology in their day to day operations to benefit its users. They
have successfully migrated their essential processes from manual to online.The E-
services provided by educational institutions can be broadly outlined as follows:
z Filling of application form
z Viewing admit card
z Downloading study material
z Viewing results
NIOS has also been offering its e-services to the learners through their website.
The URL is: https://nios.ac.in/eservices.aspx (refer Fig. 11.11).
z SWAYAM will help the learners to access the course content, audio, video
files, and attempt the quizzes for their registered course at anytime, anywhere.
Notes
z NROER, NDLI, UMANG App, ORS, online ticketing system and online
banking app are also available for use.
z Some of the benefits of E-services include access to diverse users, timely
delivery of E-services and saves cost.
Terminal Exercise
1. Define E-service.
2. What are the components of an E-service?
3. How does an E-service help the service provider?
4. How can E-services benefit the end user?
5. List the government initiated E-services in the field of education.
Notes
12
ASSISTIVE TECHNOLOGY FOR
DIFFERENTLY-ABLED PERSON
Now-a-days you must have seen that differently-abled persons can perform tasks
very efficiently by using some of the digital devices. These devices are developed
for them to undertake basic tasks such as reading the text, writing the content and
listening to sounds, etc. In this lesson, you will learn about some of the assistive
tools which are used by them to work in a better way as well as to carry out the
routine tasks like others.
Objectives
After reading this lesson, you will be able to:
z list the types of disabilities;
z discuss software assistive tools and hardware tools;
z use the assistive tools.
(refer Fig. 12.1) is an impact printer that prints text as tactile braille dots.
Using braille translation software, a document can be embossed with relative
ease, making braille production efficient and cost-effective. Notes
https://nelowvision.com/product/juliet-double-sided-braille-embosser/
https://commons.wikimedia.org/wiki/File:Imprimante-braille.jpg
z Reading Devices: People with low vision or impartial vision require help in
reading the content. Some of them use magnifiers, reading glasses and reading
telescopes. Let us learn about them one by one.
Magnifiers. Magnifiers (refer Fig. 12.3) are commonly used by the
persons for viewing the content or things in an enlarged size. By holding
it in the hand and moving across the text, the text looks big in size and
then you can read the text.
Notes
https://commons.wikimedia.org/wiki/Category:Assistive_technology_for_people_
with_visual_impairment#/media/File:Magnifying_glass_hebrew.jpg
Reading Glasses. These are special high-power reading glasses. It
helps a person with low vision to read small prints. These glasses are
stronger than normal reading glasses (refer Fig. 12.4).
Fig. 12.4: Children with Low Vision Using Reading Aides for Study
https://ocutech.com/bioptics-help-individuals-with-visual-impairments/
Reading Telescopes. These telescopes are used for reading purposes
only. They are generally mounted on the lenses of eyeglasses. It
increases the size of the text from a normal distance. These are often very
helpful for people with low vision.
z Video Magnifiers. These devices are attached to the desktop (refer Fig.
12.5). It is used to display the images in a bigger size. These desktop devices
have a camera lens that displays the images in big sizes on a computer screen.
Using this, a person can sit as close to the screen and adjust the magnification,
brightness, contrast, and color of the display according to them.
Notes
https://www.enhancedvision.co.uk/images/products/Merlin-Elite/600x600/
MerlinElite1.jpg
z Portable Electronic Magnifiers: These are small and easy to carry devices.
It looks like an iPad or any other tablet computer. One can hold this device
in front of the reading material and then the bigger sized font or image appears
on the LED screen.
z Scanning Devices: This device can hold any instrument or document so that
the user can view the details of the page or document.
z Digital Talking Books: It is a collection of electronic books. These electronic
files are stored in the form of audio or video files. DAISY (Digital Accessible
Information System) is a technical standard for digital audiobooks (refer Fig.
12.6). DAISY is designed so that books can be converted to audio files. These
types of books are specifically designed for people with disabilities like
blindness, impaired vision, and dyslexia. These books also help the people to
navigate through the files.
https://en.wikipedia.org/wiki/DAISY_Digital_Talking_Book#/media/File: Daisy_
player.jpg
z Other Input Devices: Some users may not be able to use a mouse or a
keyboard to work on a computer. These people can use various forms of
Notes devices, such as:
https://commons.wikimedia.org/w/index.php?curid=48489740
z Listening Devices: An Assistive Listening Device (ALD) is used to
improve the hearing ability of the person (refer Fig. 12.8). The person who
is hard of hearing or has impaired hearing problems is unable to differentiate
between the speech and the background noise. In a noisy or crowded room,
it is almost impossible for an individual to identify the voice. Hard of hearing
listener has to distinguish between background noise and the speaker. It helps
the person to listen to audio files or listen to others. Hearing aids can amplify
and process such sounds and improve the ratio of speech to noise.
Notes
https://commons.wikimedia.org/wiki/File:Assistive_Listening_Device.jpg
Trackball Mice or Joystick: There are many types of trackball mice or joystick
options for mouse control, for individuals with physical access challenges, who
may not be able to use a standard computer mouse. Trackball mice are also used
for ergonomic purposes, to avoid strain and injury (refer Fig. 12.9).
Terminal Exercise
1. What do you mean by assistive technology?
2. Briefly explain the term person with disability.
3. Give any four examples of assistive technology.
4. What are digital talking books?
5. Differentiate between Dyspraxia and Dysgraphia.
Notes
13
CUSTOMER SERVICES
At many places you must have observed or heard the saying that ‘Customer is
boss’, ‘Customer First’, ‘Customer is our priority’, ‘Customer is God’, etc.,
which establish the importance of customers to a business or service. The success
of any product or service is depending on its acceptance by the customers. The
revenue generation by a product/service is dependent on customers’ satisfaction.
While designing, developing, marketing or delivering a product/service, it is
therefore, important to realize that the target customer is of utmost priority. Every
process thus needs to be designed or developed targeting the customer for which
a lot of research is done. The customer base is a set of prospective customers who
are expected to purchase the product/service. A few of the important elements are
customer’s age, location, habits, expectations, etc. Realizing the importance of the
customer, this lesson will discuss various ways to make customer services a
cherished responsibility.
Objectives
After reading this lesson you will be able to:
z greet customers;
z practice basic communication skills;
z resolve the queries raised by customers;
z co-ordinate with all team members.
at a position that demands client/customer interaction you need to carve out ways
to ensure total customer satisfaction. The popular saying ‘First impression is the
last impression’ works nearly for all the sectors. The first impression is mostly Notes
related to the way a customer is greeted. Always remember you are not a sole
service provider. In this era of competition getting a customer and customer
retention is a very demanding skill. Going ahead with the product/service being
offered is solely the customer’s choice, but as the face of the business, it is your
primary duty to ensure that the customer walks out of your door with complete
satisfaction. The following tips can surely help you in leaving a lasting impression
on your customers.
z Greet Your Customer with a Smile: On entering an office/store/shop if the
customer moves around for a while without any attention it is very likely that
he/she might move out and try another store. It is therefore extremely
important to make sure that the customer is greeted with a welcome message
and a smile. It surely makes the customer feel valued.
z Offer Help: Ask customer, ‘May I help you?’ and guide him/her accordingly.
Never suggest them what they should buy/avail, rather inform them about the
qualities of the product/service and help them to make a choice as per their
requirements.
z Pay Undivided Attention: In case you are occupied with some work and the
customer asks for your help, even though you might not be on customer duty,
always remember customer should be attended first. Stop all your work and
address the customer’s query or politely guide them to the person who can
help them with their query.
z Be Formal: No matter how friendly a customer be, make sure that you
converse formally and exhibit a professional behavior that will always ensure
uniformity and consistency in customer interaction. Sometimes an overfriendly
behavior might land you up in trouble.
z Dress Professionally: Ensure that you dress formally. Your hair should be
well combed. Female staff should prefer tying their hair. A decent, neat and
groomed appearance will ensure that the customers interact confidently and
freely with you.
z Greet Customers and Verify Their Details: Greet your customer pleasantly
and ask for the details such as registered phone number and name on which
the product is registered.
z Be an Active Listener: Only a good listener can provide an effective
response. Make sure you focus on what the customer is saying before
formulating a response. When you are with the customer use positive body
language,ensure an eye contact, nod your head and write down points. While
being on phone make sure you express your attention by using small phrases
such as Ok, Yes I understand, etc. This way the customer realizes that you are
interested and paying attention.
z Impress: After the customer has finished talking, you should seek an approval
of your understanding by repeating what you have understood and seek the
customers’ approval. You should, thus, take notes while the customer is
talking to you and convey your understanding crisply in points.
z Never Interrupt: You should allow the customer to complete their sentence
to ensure that you are able to provide the correct feedback. Interruption is
taken as an offence and it might upset the customer. Keeping patience
demonstrates respect and will help you in interpreting the customer’s
requirement or complaint clearly.
z Use Clear Words and Sentences: While responding make sure, you use
terms that are easily understood by the customer. For example, a technical
term such as ‘booting’ can be replaced with a simpler word such as ‘Is the
z Seek Support: There might be times when you are stuck with an issue raised
by a customer. It is advised that in such a situation you take help of your
colleagues or team members without hesitation. Coordinate with all team
members and you will surely reach to a solution. Always remember everyone
has a unique way of handling queries. Thus learning from others’ practices and
mistakes will help you to reach greater heights as a customer service
representative.
13.2
1. (a) False (b) False (c) True
Notes
14
TROUBLESHOOTING AND
MAINTENANCE
While using computers many times we face problems. Sometimes, the computer
runs very slow, sometimes the system is not turning on, sometimes some external
device is not working. These are the common problems while working in computer
system. This lesson gives the knowledge and competency to diagnose the basic
faults of computer peripherals, software and also secure the computer system. It
will provide knowledge that will enable you to identify and rectify the computer
hardware, software and network related problems.
Objectives
After reading this lesson you will be able to:
z troubleshoot hardware;
z troubleshoot software;
z network troubleshooting;
z secure your computer system.
Network and Internet To change the network and Internet settings such as
creating new network group or joining an existing
network group, adding new Internet connection or
removing an existing one.
This category includes:
z Internet access Network and Sharing Center
z Homegroup
z Internet Options
The Control Panel can also be displayed in other two views (i) Large Icons view,
and (ii) Small Icons view.
Notes
saving or sleeping mode. In case it is not getting on then check it whether all
peripherals are connected or not.
Notes
To change the display settings, select ‘Start’ menu and choose ‘Change display
settings’. The following window will be displayed (refer Fig. 14.5). Change the
resolution, orientation, text size etc., from this window.
Printer Troubleshooting
There are lot of printers available in the market and the reason why printers may
not print vary.
z If your printer is not printing, then first check the printer cable is attached with
your computer or not and, also check your printer is ON. In case the printer
you are using is a network printer, then check whether it is accessible in your
network. Next you try to update the printer driver.
z Load the paper in case your printer is not having papers on printer tray. Printers
may have more than one tray, load the paper accordingly and take print outs.
Notes
z Also, check is there any paper jam in the printer, if yes, then clear the paper
jam and restart the printer.
z To test printer is working properly, open ‘Control Panel’ → ‘Devices and
Printers’. It will display devices and printers attached to your computer. Now
right click on your printer name and choose ‘Printer Properties’. Printer
Properties dialog box will be displayed. Choose (refer Fig. 14.6) ‘Print Test
Page’.
In case, the printer does not print the test page you can use Printer Trouble shooter
(Open Devices and Printers → select Printer → Right click on the Printer Name
and choose ‘Troubleshoot’ (refer Fig. 14.8). Notes
CD Troubleshooting
In case, if you have inserted any CD or DVD on the drive, and it is not working:
Remove CD /DVD from your Computer, insert it again and check.
z Verify whether the CD is placed properly.
z Verify whether the CD can be used on the CD drive of an alternate machine.
z Verify whether the CD is scratched or grimy.
z Verify whether the CD is a CD-R or CD-RW that was copied.
Keyboard Troubleshooting
If your keyboard is not responding, then try the following:
z First, check the keyboard cable is connected properly.
z Connect the keyboard into a different USB port.
z Disconnect your keyboard, clean it with dry cotton cloth. Connect it again and
check keyboard is getting power.
Mouse Troubleshooting
If your mouse is not responding, then try the following:
z First check the mouse cable is connected properly.
Networking Troubleshooting
If you are unable to connect the network, then:
z Check to see if the network cable is plugged, if not then plug it.
z Check to see if the light is blinking when the network cable is plugged.
z Check to see if username, password and domain are entered correctly.
z Re-enter new username, password and domain and try again.
z If you still get an error message, then check the login credentials on other PCs,
if it works correctly then the problem is solved.
Video Troubleshooting
If you get a black screen on your Personal Computer, then check:
z Whether monitor’s light is on, if on, then check your screen’s brightness. If
your screen’s brightness is turned down, then turn it up.
z The power cord is unplugged, then plug the power cable.
Sound Troubleshooting
If you are unable to hear any sound from your computer system then:
z In case, if you are using external speakers, then connect them at the back of
the computer in the audio port.
z Check to see if the speakers are turned on, if not then turn them on.
z Check to see if the volume is turned up, if not, then turn it up. Also check
whether the speaker is mute, if yes then unmute it.
z Try unplugging and re-plugging the speaker again.
No Power
z If the computer doesn’t power up at all, Reset the BIOS first and try.
z If still it does not power up, disconnect all the peripherals and wire harnesses,
except processor and power supply, then try to switch it on from the
motherboard’s front panel connector. Notes
z If still it does not power up, change the power supply and try.
z If still it does not power up, remove the motherboard with processor from
casing and lay it on antistatic surface and plug a power supply and again try.
z If same problem still exists, replace the processor and try again.
z If even this does not solve the problem, the motherboard itself is faulty.
Reinstall/Update Drivers
Numerous hardware related issues happen due to driver clashes, degenerate driver
parts and drivers that need to be overhauled for utilization. At the point when
something does not work, reinstall the driver that accompanied.
Preliminary Measures
When you have an issue with a Windows machine, the first thing you need to do
is to restart the machine.
Reinstall
If a specific program/software starts working in an unexpected manner and is not
working properly, even after a few attempts, reinstalling the particular program/
software is required.
Before re-installing a software, you have to uninstall it (through control panel).
Pinging
Ping command is used to check the reachability of the host on an Internet protocol.
i.e., to verify that computer can communicate with other computers (devices) on the
network. It displays the time taken for the hop to connect, the number of packets
received, the number of packets lost, and the number of packets sent (refer Fig. 14.9).
Traceroute
Traceroute is a command used by a computer network administrator to check the Notes
number of hops and if the packet is being lost or the internet connection is unable
to be established. As the command suggests, it traces the route completely and
checks each and every hop of the route (refer Fig. 14.10).
Netstat
Netstat command also known as the network statistics command is used to display
Notes
the network connections for transmission of packets. It also displays the routing
table with complete network protocol statistics (refer Fig. 14.12).
Notes
Notes
Strange Noises
Sometimes your system makes strange noise due to hard drive problem or fan may
be making noise. In this case first check CPU fan and case fan are working properly.
If not, replace them. If hard drives makes noise, backup your data otherwise you
may lose your data.
Encryption
Most tools encrypt the information kept in the secret word document. Encryption
guarantees that even if the data could be accessed by unknown means, the intruder
won’t have the capacity to peruse the passwords in the document; they will look
like babble. Most tools perform one-way encryption of passwords.
Terminal Exercise
1. How to access the System Recovery options menu?
2. Discuss about the System Restore utility.
3. What are the various causes for having No Power in the system?
4. Discuss the steps to be taken if the power is there, but display is not coming?
5. What are the preliminary measures to ensure that system is working properly?
Notes
15
WORKPLACE PRACTICES AND WORK
MANAGEMENT
Objectives
After reading this lesson, you will be able to:
z explain the importance of workplace practices;
z apply work management tips;
z manage stress better;
z take steps to avoid and manage anger.
understand that though there are different methods of operation, none of the
organizations would compromise either with the deadline for the work to be
Notes submitted nor with the quality of work to be submitted. At this point, it is important
that we understand to become a valued employee in the organisation. We as an
employee should be vigilant and core for the rules and policies followed at the
workplace. Following are the few workplace practices that are universally
applicable to all the workers in any organization.
z Be Punctual: Being on time at your workplace will earn you respect from
everyone. It will help you to manage things better at work and will ensure that
you are aware of all the updates and happenings related to your work and the
organization.
z Be Aware of Your Role: The success of an organization depends on how
efficiently its employees complete their assigned tasks. Always remember you
are being paid to produce an output hence, you should be aware of your role
and the short term and long term goals you are expected to achieve. The ability
to identify the nature and purpose of work, keeps the worker motivated and
also benefits the organization.
z Know the Organizational Chart: An organizational chart is a diagram that
depicts the structure of an organization. It displays a reporting or relationship
hierarchy. Having a clear idea of the organizational chart can help you to
understand the work flow and identify your reporting supervisors or subordinates.
It also gives clarity of communication with respect to the assigned work. An
example of NIOS organisation structure is shown in Fig. 15.1.
Notes z Plan: Have a lot of work to do? It is always better to prepare a ‘To Do’ list
to keep a track of your work. Make sure that you keep updating your to do
list so that it reflects how much you have achieved. This will help you to stay
motivated.
z Prioritize: It is important to note that you cannot do everything at once.
Rather, looking at the list of things sometimes sends your mind into a confused
state. Hence, it is advised to prioritize work in order of the urgency and time
required. Hence, reordering the ‘To Do’ list as per priority will surely help.
This will help you to focus on each work, one at a time.
z Stay Updated: Do you need to generate a letter for 100 recipients along with
mailing labels? Instead of typing each recipient’s name once on the letter and
then the mailing label you can make use of mail merge feature of word
processor. Similarly, if you want a document to be reviewed by n number of
people you can use Google docs as it allows collaborative work. Hence, keep
yourself updated with the latest technology that can help you to work faster
and more efficiently.
z Take Timeout: Giving yourself short break after a significant time would
really help you to manage stress and think better. Allowing yourself time to
relax will help you feel better and prepare you to handle challenges without
being stressed.
z Follow Guidelines: Do you start working without carefully going through
the details? Well that can lead to delay in work or a complete waste of work.
Carefully read the instructions, study the format or understand the details
before starting the work. You should have a clear picture of the outcome of
your work.
z Communicate: Never hesitate to take help. In case you are stuck, discussing
with your seniors or your colleagues will surely help and solve a complex
problem in a lesser time frame.
z Be Grateful: Did your last work get stuck? Were you able to complete it with
your colleague’s advice? If yes. Did you express gratitude to him/her? You
should always give credit and recognize the contribution of your colleagues
in your work. This helps you to build a good rapport and earn respect.
z Never Boast: You should always work for perfection and not recognition.
Recognition is a byproduct of sincerity and hard work. You should never
boast of your achievements; rather your work should do the talking.
(b) You should always express gratitude towards people who have helped
you in completion of your work.
z Be Thoughtful: Take time out and select your words wisely. Think before
you speak as one wrong word, can cost you dearly. So, it is wise to avoid
words that you would later regret using.
z Divert Your Attention: An increasing stress can trigger anger, and you are
the best judge of the situation. So, whenever you feel that you are overstressed,
Notes divert your attention to something enjoyable such as listening to a music or
quick chat with someone you are comfortable with or if possible go for a brisk
walk or jog. Physical activity has the capability of bringing your stress down.
Getting angry is never a solution rather it will rob you of your calmness and
paralyze your thinking process.
z Avoid Blame Game: You may tell your side of story without blaming others.
Blaming others will make the other person feel offended and would create an
awkward situation for both of you.
z Deep Breathe: Deep breathing lowers stress level, reduces anxiety and
alleviates negative feeling. Thus it will help you to be in control of situation.
z Seek Help: Controlling anger might be a challenging task but not being able
to control it might have a bigger impact on your career. Hence, if you are
unable to manage anger despite sincere efforts, it is advised to seek help.
15.2
1. (a) False (b) True (c) True
BASIC COMPUTING
PRACTICAL MANUAL
7. Creating a Presentation.................................................................................................................... 13
Notes
Practical 1
Objectives
After completion of this practical you will be able to:
z identify input and output devices;
z install application software.
Pre-requisite
z You should have theoretical knowledge of hardware devices.
z Operating system should be installed in system before application software
installation steps.
Hardware/Software Required
z Setup file of application software i.e., open office setup file.
Activity/Procedure
z Identify input devices i.e., keyboard, mouse etc.
z Identify output devices i.e., monitor, printer etc.
z Open the folder containing the setup file i.e., open office setup file.
z Double click on the setup file to open the installation window.
z Follow the installation instructions.
Basic Computing 1
Practical Manual
z You will be able to use the software after the completion of installation steps.
Notes
z Open the folder where you have installed this software. Right click on the
execution file and select ‘Send to Desktop (Create Shortcut)’ to create a
shortcut on the desktop.
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
2 Basic Computing
Practical Manual
Notes
Practical 2
Objectives
After completion of this practical you will be able to:
z create a new user account in Operating System;
z set the password for your user account.
Pre-requisite
z Operating system should be installed in computer system.
Activity/Procedure
z Go to ‘Start’ menu and open ‘control panel’.
z Click on ‘Add or remove user accounts’ under ‘User Accounts’.
z Click ‘Create a new account’ under the available accounts list.
z Enter the desired name for the account, choose ‘Standard user’ and click
the ‘Create Account’ button.
z Once the new User Account is created, it will be displayed on the panel –
Click on the icon.
z Click on ‘Set a Password’ and enter the desired password two times.
z Mention a password hint if required.
z Log off from the current (Admin) account and re-login into the new user
account which you have created.
Basic Computing 3
Practical Manual
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
4 Basic Computing
Practical Manual
Notes
Practical 3
Objectives
After completion of this practical you will be able to:
Pre-requisite
z You should have theoretical knowledge of control panel.
Activity/Procedure
z Go to ‘Start’ menu and open ‘Control Panel’.
z Select where you want to save your backup i.e., ‘D drive’ and click next.
z Review your backup setting and save setting and run backup.
Basic Computing 5
Practical Manual
Learner’s Observations
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
6 Basic Computing
Practical Manual
Notes
Practical 4
Objective
After completion of this practical you will be able to share files with the users of
same network.
Pre-requisite
z Your computer system should be connected to the network.
Activity/Procedure
z Put all files that you want to share in a folder.
z Right click on folder and select ‘share with’ option and click on ‘specific
people’.
z A window will pop up, select ‘everyone’ from drop down menu and click on
‘Add’.
z Set permission as desired, click ‘OK’.
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
Basic Computing 7
Practical Manual
...........................................................................................................................
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
8 Basic Computing
Practical Manual
Notes
Practical 5
Objective
After completion of this practical you will be able to create and edit a word
processing document.
Pre-requisite
z Word processing software should be installed on the system.
Activity/Procedure
z Open your word processing software and create a new file.
z Set page size as A4 and set required margins.
z Enter your experience, skills, academic and personal details.
z Academic details should be entered in table format.
z Mention all your skills using bullet listing.
z All titles should be in the heading format.
z You can choose bold letter and underline the text wherever required.
z You can use different formatting styles as per your need and preferences.
z Use ‘Spelling and Grammar’ check in order to correct any mistakes you
might have made.
z Insert page numbers using ‘header and footer’ option and save your file.
Basic Computing 9
Practical Manual
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
10 Basic Computing
Practical Manual
Notes
Practical 6
CREATING A DATASHEET/
SPREADSHEET
Objectives
After completion of this practical you will be able to:
z create and edit a datasheet for different purpose;
z check or validate and store data for any purpose.
Pre-requisite
z Microsoft Office should be installed on the system.
z Knowledge about Excel formulas.
Activity/Procedure
z Open your Microsoft excel and click to open file.
z Write down the point to be stored and make top row as heading for your data.
z Make separate columns for every detail you need to fill.
z Items detail should be filled in according to cell name.
z Mention all details as according to the given information.
z Apply needed formula.
z You can choose bold letter and underline the text wherever required.
z You can use different formatting styles as per your need and preferences.
z Use ‘Spelling and Grammar’ check in order to correct any mistakes you
might have made.
z Save your file.
Basic Computing 11
Practical Manual
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
12 Basic Computing
Practical Manual
Notes
Practical 7
CREATING A PRESENTATION
Objective
After completion of this practical you will be able to create a new digital
presentation.
Pre-requisite
z MS Office should be installed in system.
Activity/Procedure
z Go to start menu and open Microsoft PowerPoint.
z Click on ‘Add or remove title name’ under the title name.
z Write down the points of your topic.
z Use points and heading according to topic.
z Choose decent theme for presentation.
z You can choose bold letter and underline the text wherever required.
z You can use different formatting styles as per your need and preferences.
z Name the file and save it.
z Use ‘Spelling and Grammar’ check in order to correct any mistakes you
might have made.
Basic Computing 13
Practical Manual
Learner’s Observations
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
14 Basic Computing
Practical Manual
Notes
Practical 8
Objectives
After completion of this practical you will be able to:
z create a new digital presentation;
z record presentation and show to others.
Pre-requisite
z MS Office should be installed in system.
Activity/Procedure
z Go to ‘Start’ menu and open Microsoft PowerPoint.
z Click the slide show tab and then click on the drop down arrow.
z Click the record slideshow dropdown arrow.
z Select either start recording from current slide or start recording from
beginning.
z A dialog box will appear, select the desired option.
z Select the animation timing and start recording.
z Perform your slideshow.
Basic Computing 15
Practical Manual
Learner’s Observations
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
16 Basic Computing
Practical Manual
Notes
Practical 9
Objective
After completion of this practical you will be able to create an email address on
Google account and send an email.
Pre-requisite
z You should be connected to internet.
Activity/Procedure
z Create gmail account:
Go to www.gmail.com.
Click Create account.
The signup form will appear. Follow the directions and enter the
required information.
Review Google’s Terms of Service and Privacy Policy, click the check
box, then click Next step.
Here, you will have an opportunity to set up recovery options. Recovery
options are helpful if you forget your password or if someone tries to
access your account. If you do not want to set up recovery options at
this time, click Done.
Your account will be created, and the Google welcome page will
appear.
z Send an email for leave from work to your Supervisor for 10 days:
Enter the email address of supervisor in front of ‘To’.
Basic Computing 17
Practical Manual
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
18 Basic Computing
Practical Manual
Notes
Practical 10
Objective
After completion of this practical you will be able to secure your Gmail account
from hacking and provide security to account.
Pre-requisite
z Your computer system should be connected to the network.
z You should have a Gmail account.
Activity/Procedure
z Go to your Google Account.
z On the left navigation panel, click ‘Security’. On the signing in to ‘Google
panel’, click 2-Step verification.
z Add at least one additional second step like:
z Backup codes
z Authenticator app codes
z Backup phone
z If you forget your password or someone else is using your account, having
updated recovery info can help you get your account back.
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
Basic Computing 19
Practical Manual
...........................................................................................................................
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
20 Basic Computing
Practical Manual
Notes
Practical 11
Objective
After completion of this practical you will be able to store files on DigiLocker.
Pre-requisite
z Your computer system should be connected to internet.
z You should have DigiLocker account for storing document (documents like
Aadhaar, PAN) on DigiLocker.
Activity/Procedure
z Create a DigiLocker account by visiting digilocker.gov.in website (One can
use Aadhaar to sign up using mobile OTP).
z Click the upload icon to start uploading a document. In the file upload dialog
box, locate the file from your local drive and select ‘open’ to complete the
uploading.
z To assign a document type to your uploaded file, click ‘select doc type’. This
will show a pop up with a drop down selection of various document types.
Choose the appropriate document type and click ‘save’.
z You can also edit the name of the file using the edit icon next to the filename.
Basic Computing 21
Practical Manual
Learner’s Observations
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
22 Basic Computing
Practical Manual
Notes
Practical 12
Objective
After completion of this practical you will be able to retrieve files from Drop Box.
Pre-requisite
z You should be connected to internet.
z You should have Gmail account to retrieve the required deleted file from
Dropbox.
Activity/Procedure
z Sign in to dropbox.com.
z Click ‘Files’ in the left sidebar.
z Click Deleted files in the left sidebar.
z Click on the name of the deleted file or folder you want to recover (You can
select multiple files or folders at once).
z Click ‘Restore’. Restorations can take time if you are restoring a large
number of files.
Basic Computing 23
Practical Manual
Learner’s Observations
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
24 Basic Computing
Practical Manual
Notes
Practical 13
Objective
After completion of this practical you will be able to store files on storage apps like
Google Drive and One Drive.
Pre-requisite
z Computer system should be connected to internet.
z Picture and Document folder of your computer should have some images and
.ppt files to store.
z You should have Gmail account for storing images on Google Drive and a
Microsoft account for storing .ppt file on One Drive.
Activity/Procedure
z For storing images from Picture folder of computer on Google Drive:
Using any web browser on your computer, visit the Google Drive page.
Under the Sign In box, enter your Gmail email address and password.
Click the ‘Sign in’ button to proceed.
After logging, you will be brought to the main drive or directory. All
your folders and files on Google Drive can be accessed from here.
Click the ‘New’ button on the top of the left panel menu, then select
‘File upload’. Your computer’s file explorer window will open.
Go to the Picture folder of your computer. Click on all the images you
want to store on Google Drive and upload.
Basic Computing 25
Practical Manual
Click the ‘Open’ or ‘Upload’ button on the file explorer once you have
selected all the photos. The selected pictures will then be uploaded to
Notes Google Drive.
z For storing .ppt files from Documents folder of computer on One Drive:
Go to the OneDrive website and sign in with your Microsoft account.
Pick .ppt file you want to share by selecting the circle in the upper
corner of the item. You can also pick multiple items to share them
together.
Select ‘Share’ at the top of the page.
In the ‘Share’ box that appears, set an expiration date or password if
desired, and choose one of the sharing options: Get a link or Email.
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
26 Basic Computing
Practical Manual
Notes
Practical 14
SKYPE CALLING
Objective
After completion of this practical you will be able to make Skype call.
Pre-requisite
z Your computer system should be connected to internet.
z Install Skype App in your computer.
Activity/Procedure
z Find the person you want to call from your Contacts list.
z Select the contact you want to call, and then select the audio or video button.
If you want to make a group call, simply add another participant.
z At the end of a call, select the end call button to hang up.
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
Basic Computing 27
Practical Manual
...........................................................................................................................
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
28 Basic Computing
Practical Manual
Notes
Practical 15
Objectives
After completion of this practical you will be able to:
z create a new user account on social media;
z use that account to share a video.
Pre-requisite
z Internet connectivity is required.
z An email account is required.
Activity/Procedure
z Open web browser and open facebook/linkedin/twitter.
z Click on register and make a new account.
z Click ‘Create a new account’ under the available accounts list.
z Enter the desired name for the account and click the ‘Create Account’
button.
z Use your email-id and set a strong password.
z Mention a password hint if required.
z Log into your facebook/linkedin/twitter account and go to your profile, post
a desired video you want to post.
z In order to gain more viewers, the video must be short, catchy and distributed
among other users.
Basic Computing 29
Practical Manual
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
30 Basic Computing
Practical Manual
Notes
Practical 16
Objectives
After completion of this practical you will be able to:
z use social media for sharing your opinion and thoughts;
z write about anything for any purpose.
Pre-requisite
z Internet is required.
z Account/access to particular blog/wiki is required.
Activity/Procedure
z Open to web browser and open a blog/wiki.
z Write down the title name of the article, which should be strong and catchy.
z Register your blog and get hosting.
z Customize your blog. Choose a free template and modify it.
z Use images, humor for enhanced reading interest.
z Avoid repetition and choose word wisely.
z Keep sentences and paragraph short.
Basic Computing 31
Practical Manual
Learner’s Observations
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
32 Basic Computing
Practical Manual
Notes
Practical 17
Objectives
After completion of this practical you will be able to:
z secure your system from any cyber attack;
z protect your data and system from cyber harm.
Pre-requisite
z You should have the knowledge of cyber security.
z Security software should be installed in system.
Activity/Procedure
z Keep up with system and software security updates.
z Adjust your browser settings.
z Install antivirus and anti spy software.
z Passwords protect your software and lock your device.
z Encrypt your data.
Basic Computing 33
Practical Manual
Learner’s Observations
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
34 Basic Computing
Practical Manual
Notes
Practical 18
Objectives
After completion of this practical you will be able to:
z recover lost and hidden files;
z use command for data recovery.
Pre-requisite
z You should have theoretical knowledge of Disk Operating System (DOS)
commands i.e., attrib.
z cmd.exe should exist in the system.
Activity/Procedure
z Plug in your pen drive to your system.
z Go to ‘Start’ menu type ‘CMD’ in search bar and enter.
z Double click on cmd.exe, command window is opened.
z Type command “attrib -h -r -s /s /d drive letter:\*.*”, for example, “attrib
-h -r -s /s /d G:\*.*”
z Open the pen drive folder.
z Your pen drive data is recovered.
Basic Computing 35
Practical Manual
Learner’s Observations
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
36 Basic Computing
Practical Manual
Notes
Practical 19
Objectives
After completion of this practical you will be able to:
z communicate with customer;
z resolve the query of customers.
Pre-requisite
z You should have the knowledge of language that is being used by customer.
z You should have the knowledge of company products.
Activity/Procedure
z Greet your customer and inform about your name and employee id.
z Stay calm and listen to customer problems.
z Acknowledge the problems.
z Offer solution to customer if you have otherwise ask him/her to hold the
phone for better solution.
z Get the facts and offer solution.
z Ask customer, if he/she needs solution for any other problem.
z Say thank you.
Basic Computing 37
Practical Manual
Learner’s Observations
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
38 Basic Computing
Practical Manual
Notes
Practical 20
Objective
After completion of this practical you will be able to communicate effectively with
your colleagues.
Pre-requisite
z You should be aware about organization rules.
Activity/Procedure
z Treat your colleagues with respect and dignity.
z Manage your emotion at the time of communication.
z Use effective communication i.e., choice of words, tone of voice, body
language etc.,
z Control your thought patterns, keep it positive.
Learner’s Observations
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
Basic Computing 39
Practical Manual
...........................................................................................................................
Notes ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
(Instructor’s Signature)
40 Basic Computing