INFORMATION TECHNOLOGY (402)
ONE SHOT REVISION
DIGITAL DOCUMENTATION
Style – set of formatting, logical attributes, improves consistency, change indentation
Page Style – headers and footers, Margins
Paragraph style – line spacing, borders, alignment
Character style- Selected text, font size, bold and italic
Frame Style – Wrapping type and columns
Numbering or List style – indentation, outlines, numbered list and bullets
Applying style – F11, Format-> styles and formatting, icon in standard toolbar
Quit fill format mode – ESC key
Insert Image – 3ways ,
1. Insert menu -> picture -> from file
2. From Gallery
3. Drag and drop
Position of graphic or image :
1. Arrangement – Vertical axis & stacked
2. Alignment – vertical or horizontal placement
3. Anchoring – reference point or fixed position
4. Text Wrapping – surrounding text
Crop – cut off or unwanted part or portion to be removed. Picture -> crop
Watermark – changing transparency.
Template – Model or Blueprint of the document, set of predefined styles
2 ways to create - File – New – template or File -> Template
Table of Content (TOC) – automated table of content from headings in document.
Insert -> Indexes & Tables -> Indexes & Tables, evaluates upto 10 levels
Structure of Entries tab
E# - chapter number, E- Chapter Text, T – tap stop , # - Page number
Ls – start of Link , LE – End of Link
Position of image in TOC : Tile – repeat the graphic, Area – stretch the graphic, Position
– Specific location
Mail Merge – Personalized Document, invite people with different address
Has two files – Main Document & Data source
Main Document – contains information
Data Source – database (CSV,MySQL,.odb)
File ->wizard ->Address Data Source
File -> New -> Labels, First label on page – Master label , F10 – non printing character
.odt – extension for document
ELECTRONIC SPREADSHEET
Consolidating Data : Several sheets in one place, multipole sheets into single master
sheet. Data menu -> Consolidate.
Subtotals – analyses data, adds data arranged in a sequence, group of cells with labels
for columns or rows. Data menu -> subtotals
What – if analysis tools – Scenario, Goal Seek, Solver
Scenario – set of values applied on existing data. Tools Menu – Scenario
Goal Seek – define output results and shows what input values are needed, Single
variable, Back solving method. Three Parameters : Formula, Target value and variable ..
Cell.
Solver – elaborated form pf goal seek, Multiple unknown values and equations. Find
optimal value
Insert Sheets – 3 ways : Insert -> sheets, Right click or empty tab at the bottom
Rename sheet – 3 ways : Double click on tab, Format -> sheet ->rename, right click -
>rename
Cell Reference – referring a cell of a worksheet ex: A1, B5
Referencing can be in 2 ways : using keyboard or Mouse
Format : sheetname.cellname , .ods is an extension for spreadsheet
Hyperlink : jump to a document stored at different location. Insert menu -> Hyperlink
Absolute hyperlink – stop working when target is moved, $A$5
Relative hyperlink – stop working when start and target is moved with relative to each
other
Sharing workbook – allows user to work in same workbook and place in network
location. Tools menu -> share document.
Record Changes – track data when change was made during sharing
Merged worksheet – Multiple reviewers return edited worksheets at same time
Edit -> changes -> merge document
Compare Document - reviewer forget to record the changes, this option can be used
Macros – Saved sequence of commands, repeated task, default standard library is used.
Sorting – data can be arranged in sequence or order
DBMS
Database – organized collection of data
DBMS – Database Management System, Software package with computer programs.
- Controls the creation, maintenance and use of database.
- Ex : Ms Access, IBM DB2, MySQL, Oracle
Data – raw fact or figure, Information – processed data
Two types of database :
Flat file – single table, stores less amount of data
Relational File – Multiple table , stores huge amount of data
Database Server – dedicated computer hold actual database.
Advantages of DBMS : Reduces data redundancy , Sharing of data, Data integrity, Data
Security
Features od DBMS : Database can have one or more tables, records uniqueness
Primary Key – unique value, non-null able value.
Composite Primary key – more than one primary colunmn
Foreign key – referencing a columns between table
SQL – structured query Language
TABLES OR RELATION:
Stores data in the form of rows and columns
It has a defined number of columns, but can have any number of rows.
Each row is identified by unique key index or the key field.
COLUMNS OR FIELDS OR ATTRIBUTES:
A column is a set of data values of a particular simple type, one for each row of the table.
The columns provide the structure for the table For example, cFirstName, are fields.
ROWS OR RECORDS OR TUPLES:
A row also called a Record or Tuple represents a single, data item in a table.
Each row in a table represents a set of related data
Every row in the table has the same structure.
DATA TYPES:
Data types are used to identify which type of data (value).
FIVE CATEGORIES.
Numeric Types - numeric values for the field
Alphanumeric Types - represents numbers and alphabets
Binary Types – store data, storing photos, music , files
Date time – data & time values are stored
Other Variable types
DDL-Data Definition Language.Define the different structures in a database.
Common DDL statements are CREATE, ALTER, and DROP.
DML - Data Manipulation Language.It is a language that enables users to access and
manipulate data in a database. Common DML statements are INSERT, DELETE,UPDATE
DQL - Data Query Language.Retrieval of information from the database- SELECT
Statement
SORTING DATA
Sorting means to arrange the data in either ascending order of descending order.
REFERENTIAL INTEGRITY :
Referential integrity is used to maintain accuracy and consistency of data in a
relationship.
Referential integrity helps to avoid:
- Adding records to a related table if there is no associated record available in the
primary key table.
- Changing values in a primary if any dependent records are present in associated
table(s).
- Deleting records from a primary key table if there are any matching related
records available in associated table(s).
CREATING AND EDITING RELATIONSHIPS BETWEEN TABLES
A relationship refers to an association or connection between two or more tables.
Relationships between tables helps to:
- Save time as there is no need to enter the same data in separate tables.
- Reduce data-entry errors.
- Summarize data from related tables.
THREE TYPES OF RELATIONSHIPS IN TABLES:
- ONE TO ONE
- ONE TO MANY
- MANY TO MANY
ONE TO ONE RELATIONSHIP – Both tables must have primary key columns (1- 1)
ONE TO MANY RELATIONSHIP - One of the table must have primary key column.(1-n)
MANY TO MANY RELATIONSHIP - No table has the primary key column (n-n)
REMOVE THE RELATIONSHIPS - Right Click on the relationship thread and select
Delete option.
FILTERING - Filtering means that the query uses criteria.It hides some data and present
only what you want to see.
Queries are commands that are used to define the data structure.
A SELECT statement retrieves zero or more rows from one or more database tables or
database views.
The SELECT statement has many optional clauses:
- WHERE specifies which rows to retrieve.
- ORDER BY specifies an order in which to return the rows.
UPDATE STATEMENT
Update statement is used for modifying records in a database
FORM: A form provides the user a systematic way of storing information into the
database.
REPORTS : A report helps to display the data in a summarized manner.
It is used to generate the overall work outcome in a clear format.
WEB APPLICATION & SECURITY
Computer Accessibility - user friendliness of a computer system for all, regardless of
their disability. It is known as Assistive Technology.
Types of impairment :
Cognitive impairments and learning disabilities, - dyslexia, attention deficit
hyperactivity disorder (ADHD) or autism.
Visual impairment - low-vision, complete or partial blindness, and color blindness.
Hearing impairment - deafness.
Motor or dexterity impairment - paralysis, cerebral palsy, or carpal tunnel syndrome
and repetitive strain injury.
Sticky Keys: reduce repetitive strain. allows the user to press and release a modifier
key, such as Shift, Ctrl, Alt, or the Windows key.
Filter Keys: keyboard to ignore brief or repeated keystrokes, making typing easier for
people with hand tremors.
ToggleKeys: designed for people who have vision impairment or cognitive disabilities.
When ToggleKeys is turned on, computer emits sound cues when the locking keys (Caps
Lock, Num Lock, or Scroll Lock) are pressed. A high sound is emitted when the keys are
switched on and a low sound is emitted when they are switched off.
Serial Keys: difficulty using a keyboard or a mouse (or both). They can use special
devices such as Sip, Puff and Breath Switches to provide input to the computer through
Serial Ports.
ARCHITECTURE: A computer network is a collection of computers and other hardware
components interconnected by communication channels (cables or satellites) that allow
sharing of resources and information.
PEER-TO-PEER (P2P) ARCHITECTURE:Networks in which all computers have an
equal status are called peer to peer networks.
CLIENT-SERVER ARCHITECTURE:Networks in which certain computers have special
dedicated tasks, providing services to other computers (in the network) are called client
server networks.
TYPES OF NETWORKS
There are two major types of network Local Area Network (LAN) and Wide Area
Network (WAN).
LOCAL AREA NETWORK:A local area network (LAN) is one which connects computers
and devices in a limited geographical area such as home, school, computer laboratory,
office building, or closely positioned group of buildings.
WIDE AREA NETWORK:A wide area network (WAN) is one which covers a broad area
(i.e., any network that links across metropolitan, regional, or national boundaries). The
Internet is the most popular WAN, and is used by businesses, governments, non-profit
organizations, individual consumers, artists, entertainers, and many others
World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a
system of interlinked hypertext documents accessed via the Internet.
A Web Browser is a software used to view Web sites and acts as an interface between
the user and the World Wide Web. Ex: Google Chrome, IE, Safari
A Web server is a computer that stores web sites and their related files for viewing on
the Internet.
Advantages associated with networking are:
Data Sharing, Files Transfer ,Hardware Sharing, Internet Access
An Internet service provider (ISP) is an organization which provides you with access
to the Internet via a dial-up (using modem) or direct (hard wired) or wireless
connection. Ex. Airtel, Jio, BSNL
Á modem is a device that converts digital computer signals into a form (analog signals)
that can travel over phone lines. It also re-converts the analog signals back into digital
signals. The word modem is derived from its function MOdulator/DEModulator.
DATA TRANSFER ON THE INTERNET
Each packet is sent from computer to computer
Each computer on the way decides where next to send the packet.
All packets may not take the same route.
At the destination, the packets are examined.
If any packets are missing or damaged, a message is sent asking for them to be
re-sent.
This continues until all packets have been received intact.
The packets are now reassembled into their original form.
Instant messaging (IM) is a form of communication over the Internet that offers an
instantaneous transmission.
Key Features of an instant messaging are as follows:Text Messages ,Audio calling and
conferencing, Video calling and conferencing, File transfers, Message history
Instant Messaging Services:
There are two kinds of instant messaging software – application based and Web based.
Rules and Etiquettes to be followed while chatting
- Messages should be short and to the point.
- Always introduce yourself by name if your screen name doesn’t reflect it.
- Always ask if the other person has time to chat first
- Typing your messages in uppercase is extremely rude
- Give people time to respond.
blog - discussion style site used by non-technical ,personal web pages, online personal
diary and simple to use. Some of the popular blogs include:
www.WordPress.com
www.blogger.com
www.blog.com
www.weebly.com
www.blogsome.com
Qumana • Windows Live Writer • Blogdesk
Online shopping is a form of electronic commerce where customers can buy or sell
goods over the Internet.
Online shopping could be useful in situations when:
- A customer does not have sufficient time to visit stores.
- Visiting a store is more expensive than purchasing a product online.
- A product or service that is not available in the local market is available online.
Some of the popular online transaction websites are:
IRCTC, an online portal for booking flight and train tickets.
Flipkart, an online shopping portal for buying consumer products.
EBay, an online portal for buying and selling goods.
Internet security is a branch of computer security specifically related to the Internet
Best Practices for Security
1. Use strong passwords
2. Use random password generators if possible.
3. Use encryption software
4. Keeping your username and password private
5. Registering with websites
6. Secure transactions
General guideline for managing strong passwords.
- Keep the length of the password at least 12-14 characters if permitted.
- Avoid keeping passwords based on repetition, dictionary words, letter or
number sequences, usernames, relative or pet names, etc.
- Including numbers, and symbols in passwords if allowed.
- Use capital and lower-case letters.
- Avoid using the same password for multiple sites or purposes.
Antivirus and Antispyware programs - monitoringyour computer for any changes by
malware software
Firewalls could be software or hardware and can assist in keeping a computer and a
network secure.
Cookies – small program track information when we login in a website.
Antivirus – Software to protect from malware.
Online Threat - Phishing, Email spoofing, Chat Spoofing
Evacuation – process of emptying the place.
Buddy System : system for differently abled are assisted and guided out of the place