0% found this document useful (0 votes)
34 views33 pages

IT Practical File-Updated REVISED

Uploaded by

hrishibodhale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views33 pages

IT Practical File-Updated REVISED

Uploaded by

hrishibodhale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 33

Exam Seat No./Roll No.

MNR SCHOOL
OF EXCELLENCE

INFORMATION TECHNOLOGY (402)


PRACTICAL FILE

Submitted By:

Ms./Mst.

CLASS: X
DIVISION:
ROLL NO.:
SESSION: 2023-24
Index
Sr. No. Practical Sign
1 Consolidation
2 Writer Template
3 Subtotals
4 Multiple Operations
5 Writer Styles
6 Image Cropping
7 Scenarios
8 Drawing Objects
9 Goal Seek
10 Inserting Image
11 Record Macro
12 Hyperlink
13 Mail Merge
14 Cyber Security PPT
15 Accessibility Options
16 SQL
17 Self-defined Macro
MNR SCHOOL OF
EXCELLENCE

CERTIFICATE
This is to certify that
Ms./Mst. a
student of class X - , Roll no. has
successfully completed a Practical Work
of Information Technology (402) during the
year 2023-
24 in partial fulfillment of Information Technology
(402) Practical examination.

Internal Principal
Practical 1: Consolidation
There are four sheets with same structure – quarterly resultsof sales of a stationery
shop.

A total yearly sales sheet has been made. The steps are: -
Go to Data in menu bar , Click on Consolidate.
2. The Consolidate dialog box appears. Here, we can select the function we need to
apply (Here, SUM).

Then we have to specify the ranges for consolidation. To do so, choose the range
while the Source data range text box in focus, then click on Add.
Choose the desired cell for the results to copy in Copy results to text box.
Click on OK.

We will the final output as shown in the screenshot below.

We get the consolidated data in the final sheet, named Yearly Sales.
Practical 2: Writer Template
A template is a document type that creates a copy of itselfwhen we open it.
For example, we can create a template for a certificate, andthen use it again and
again instead of making it again fromscratch every time.

To save it as a template, the steps are: -


Go to the File Menu then Click on Save As option.

Browse to the desired place to save it and write the desired namefor the file
Choose the file type as Template (.ott).
Practical 3: Subtotals
In this table, different accounts are recorded and otherimportant fields (AcctType,
Branch, Customer etc.) are present.

Here, we use Subtotal to find the total amount in differentbranches or number of


branches.To perform subtotals, the steps are: -
Select the range of cells as shown below.

Go to Data menu then choose subtotals.

Choose AcctType in Group by drop box menu then Calculatesubtotals for


Amount then Use function Sum.
In the 2nd Group, Group by branch then Calculate subtotals foramount then
Use function count. Then press OK.
Practical 4: Multiple Operations
Here, we have a dataset and want to calculate the profitvalue.

Now we use multiple operations to check the profit withchanging the sale
quantity and the price.

To perform Multiple Operations, the steps are: -


Select the data range with the input cells and space between them.Do not select
the data labels.

Go to Data then Multiple Operations.


Choose the cell containing the formula in Formulae textbox.
Choose the Sale Quantity in Row Input Cell and Price perQuantity cell in
Column Input Cell then OK.

By following these steps, we are able to perform MultipleOperations.


Practical 5: Writer Styles
In this practical, we have to make a style in a file named
“File-1” and then import it in another file “File-2”.
To do so, the steps are: -
Firstly, open a new writer document and make the desired style you like. I have
taken my style to have font as Comic Sans MS, fontsize to be 18 and Italics.
Select the text with the formatting.
 Go to Styles and Formatting in side bar
 Click on New Style from Selection.
 Write the desired style name in the Style name textbox, here My_Style then Click
OK.

The style gets added and is shown in the Style and Formatting Menu.
Save this file and open another file to which we want to import thestyle.

In the Styles and Formatting sidebar, click on New Style fromSelection drop
down menu, then click on Load Styles.
Click on From File button on the bottom right side of the dialogbox.

Browse the file and then Click on Open.

The style will get added by these steps to the new file.
Practical 6: Image Cropping

We make a new writer file, and insert the image.


Now we will crop the image by keeping scale. Right-click the image
Click on Picture.

Under the crop tab, Click on Keep Scale radio button Set otherspecification
Click on OK.
This image is about Cyber Ethics. Cyber Ethics are:
We should not use abusive or offensive language with anyoneonline.
We should not break into someone’s computer or try toinfect in any possible
way.
We should not do plagiarism or copy someone’s work andpresent it as our own.
For this image, I have used Square as the text wrapping asit is easy to move or place
it anywhere on the document after doing so.
Practical 7: Scenarios
Scenarios in OpenOffice Calc comes under what-if analysistools, where we are able
to get different values for output by changing the input cells.
Here, we have a table with cost price, selling price and profitpercentage.

Now we will perform scenarios, the steps are: -


Select the range of cells that are input and will be changed, here, Cost Price and
Selling Price. Go to Tools then Scenarios.

Give the scenario desired name, check Prevent changes anduncheck Copy back.
then Click on OK.

Repeat step 2 to add more scenarios and we can see the outputchanging.
Practical 8: Drawing Objects
First, we will add two drawing objects- heart and moon.

Then we change the line style.

Now, we will change the object’s colour.


For grouping, we will select both of them while holdingshift.
Right Click on the selection Group Group.

Now, we can just drag the corner to increase or decreasethe size.


Practical 9: Goal Seek
This option is used to find the value of input cells by givingthe value of the output
cell.

In the other cases, the discount %age is given and we haveto find the Selling Price.
We can use Goal Seek in the following ways: -
Go to Tools Goal Seek.

Set the formula cell as Discount %age cell, target as specified,here, and Variable
Cell to be Selling Price.
Practical 10: Inserting Image
Insert image from Gallery. Go to Insert Picture From File.

Browse the image and click on Open.

Resize the image or rotate as per your need.


Apply the desired filter.
Practical 11: Record Macro
The steps to record Macro are: -
Go to Tools Macros Record Macro.

Do the required steps to be coded in the macro. Here, we write theformula in the
cell B4 i.e., “=B1-B2”. Then click on stop recording.
Write a suitable name for the Macro Save.

To run the macro, Go to Tools Macros Run Macros.

Choose the desired Macro Click on Run.


Practical 12: Hyperlink
Here, we will add a hyperlink to a website. Steps are: -
Go to Insert Hyperlink.

Click on Internet Click on Web radio button Under Target textbox, write the
link of website.

Click on Apply. The link will be visible in the selected cell.


Practical 13: Mail Merge
Mail Merge helps us create multiple copies of a document at once, such as letters,
saving us time and effort to type theletter again and again.
The steps are: -
Make a document with spaces left for different fields.

Make the database containing the details of the recipients. Go to


File New Database.
Create a new database and store it at an accessible place. Click on
Use Wizard to create table.

Under Personal category, in Addresses sample table, choose therequired fields


Next. Change anything if you want, and then click on Finish.

Fill the details in the table Save it.

In the writer, Go to Insert Fields Others.


Go to Database Mail Merge Fields Choose the desired fields
Click Add. After doing all, click on Close.

Go to Tools Mail Merge Wizard.

Click on Next until the last step. Choose the desired way to save or
send the letter Click on Finish.
Practical 14: Cyber Security PPT
Need of Online Security • Take regular backup of the data on your computer. In case the data Is lost
due to any reason, system failure, vtrus attack, etc., youcaneasily retrieve
your data using backup files.
• Without any online defense, you leave yourself open to be a victim of
fraud, theft andeven property damage. Security and vigilance are vital in • System should be upgraded with new technology that were not there
keeping yourself safe, and this responsibilil'y Isn't just on the individual; at the time of purchase, like, increasing RAM, to improve the
everyone is a potential target. performance.
• Without seturi1y measures in place, priva1e or confidential information • Also storage space should also be increased for storage of more
o, messages can be viewed, intercepted and even stolen. information. If you are getting some disc errors, then make sure that
temporary internet files 5hould be deleted from time to time,

D • Software should be updated regular"ly so that it works with maximum


efficiency

Acts by Government • Child n•s;Online Privacy Protfflion Act (COPPA) (1998) -vlrescertain web51te 11nd
online ser.ric.e providers to obtain 11erifiable parental consent before collecting, using, or
disclosing personal information from minors under the age of 13. It also requires web5itu to
• The Federal Trade Commission Act (ITCl(1914J - regulate-sunralr or deceptive commerclal
post an online privacy pol!cy, collect onl-v the personal lnrormatlon necessary,and create and
practices. The FTC Is the primary federal regulator in the privacy area and brings enforcement
malntaln reasonable security measures.
actions against companies. This Includes falling to comply with posted privacy policies and • Financial Services Modernization Act IGLBA) ll999J - regulates the collection, use,
faillng to adequately protect personal information. and disclosure of penonal Information collected or held by flnanclal ln§tltutlons and
requires
• Compute-r Fraud & Abuse Att (CFAA) (1986) - ma s unlr1wful certillln computer-related tu tomer notice§ and a written lnlormation §eCurity program.
activities involving the unauthorized access ara computer to obtain certain information,
defrilud or obtain anything of value, transmit harmful Items, or uaffic in computer passwords. • Fair and Accurate Credit Transactions;Act IFACTA) [2003) - requires finam::fal institutions
The law has been In (lmended six times. and creditors to maintain written identity theft prevention pr011nms.

;11'.: ' • '


'
' -
-', .

Bibliography
• https:/Jcybersafetybyapoorv.wordpress.com/
• https://cybersecuritybyarnav.wordpress.com/home/
• https://www.mcafee.com/enterprise/en-in/security
'' Technology is destructive only
in the hands of people who do
not realize that they are one
and the same process as the
universe.

Alan Watts
awareness/cybersecurity/what-is-internet-security.html
• https://legal.thomsonreuters.com/en/insights/articles/how-your-personal
information-is-protected-online
• https:ljen.wikipedia.org/wiki/Federal Trade Commission Act of 1914

Conclusion
Cybctsecurity is one of the biggest need of the world as cyberSecurity
threats are very dangerous to the country's security. Not only the
government but olso the citi2ens should spread awuencss among the
people to always update yout system and nctwotk security setting, and to
the use propc,: anti-virus so that yout system and network security
setting, stay virus and malwan:-&cc.
Practical 15: Accessibility Options
Windows provide the users with many accessibility options.It enables a person
with a disability or impairment to use a computer. It is known as Assistive
Technology. Steps: -
To launch the accessibility options, Open Control Panel Ease ofAccess Ease
of Access Centre.

Under Use text or visual alternatives, we can turn on Sound Sentry and Show
Sounds by checking the check box beside theoption Apply.
Under Make the mouse easier to use, we can turn on MouseKeys by checking the
check box beside the option Apply.

Under Make the keyboard easier to use, we can turn on StickyKeys, Toggle
Keys and Filter Keys by checking the check box beside the option Apply.

Under Make the computer easier to see, we can turn on High Contrast by
checking the check box beside the option Apply.
Practical 16: SQL
We will create a table and perform specific functions.
Create a table named STAFF with specified fields.

Add a new record of Fedrick.


Display all records in increasing order of experience.

Update the salary of people by adding 10,000 having experiencemore than 10


years.

Display employees that belong to Sales Department.


Delete the record of staff whose ID 117.

Delete the table along with contents and structure.


Practical 17: Self-defined Macro
numberfive ()

testmax (x, y)

simpleinterest (p, r, t)

compoundinterest (p, r, t)

pover (x, y)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy