IT Practical File-Updated REVISED
IT Practical File-Updated REVISED
MNR SCHOOL
OF EXCELLENCE
Submitted By:
Ms./Mst.
CLASS: X
DIVISION:
ROLL NO.:
SESSION: 2023-24
Index
Sr. No. Practical Sign
1 Consolidation
2 Writer Template
3 Subtotals
4 Multiple Operations
5 Writer Styles
6 Image Cropping
7 Scenarios
8 Drawing Objects
9 Goal Seek
10 Inserting Image
11 Record Macro
12 Hyperlink
13 Mail Merge
14 Cyber Security PPT
15 Accessibility Options
16 SQL
17 Self-defined Macro
MNR SCHOOL OF
EXCELLENCE
CERTIFICATE
This is to certify that
Ms./Mst. a
student of class X - , Roll no. has
successfully completed a Practical Work
of Information Technology (402) during the
year 2023-
24 in partial fulfillment of Information Technology
(402) Practical examination.
Internal Principal
Practical 1: Consolidation
There are four sheets with same structure – quarterly resultsof sales of a stationery
shop.
A total yearly sales sheet has been made. The steps are: -
Go to Data in menu bar , Click on Consolidate.
2. The Consolidate dialog box appears. Here, we can select the function we need to
apply (Here, SUM).
Then we have to specify the ranges for consolidation. To do so, choose the range
while the Source data range text box in focus, then click on Add.
Choose the desired cell for the results to copy in Copy results to text box.
Click on OK.
We get the consolidated data in the final sheet, named Yearly Sales.
Practical 2: Writer Template
A template is a document type that creates a copy of itselfwhen we open it.
For example, we can create a template for a certificate, andthen use it again and
again instead of making it again fromscratch every time.
Browse to the desired place to save it and write the desired namefor the file
Choose the file type as Template (.ott).
Practical 3: Subtotals
In this table, different accounts are recorded and otherimportant fields (AcctType,
Branch, Customer etc.) are present.
Now we use multiple operations to check the profit withchanging the sale
quantity and the price.
The style gets added and is shown in the Style and Formatting Menu.
Save this file and open another file to which we want to import thestyle.
In the Styles and Formatting sidebar, click on New Style fromSelection drop
down menu, then click on Load Styles.
Click on From File button on the bottom right side of the dialogbox.
The style will get added by these steps to the new file.
Practical 6: Image Cropping
Under the crop tab, Click on Keep Scale radio button Set otherspecification
Click on OK.
This image is about Cyber Ethics. Cyber Ethics are:
We should not use abusive or offensive language with anyoneonline.
We should not break into someone’s computer or try toinfect in any possible
way.
We should not do plagiarism or copy someone’s work andpresent it as our own.
For this image, I have used Square as the text wrapping asit is easy to move or place
it anywhere on the document after doing so.
Practical 7: Scenarios
Scenarios in OpenOffice Calc comes under what-if analysistools, where we are able
to get different values for output by changing the input cells.
Here, we have a table with cost price, selling price and profitpercentage.
Give the scenario desired name, check Prevent changes anduncheck Copy back.
then Click on OK.
Repeat step 2 to add more scenarios and we can see the outputchanging.
Practical 8: Drawing Objects
First, we will add two drawing objects- heart and moon.
In the other cases, the discount %age is given and we haveto find the Selling Price.
We can use Goal Seek in the following ways: -
Go to Tools Goal Seek.
Set the formula cell as Discount %age cell, target as specified,here, and Variable
Cell to be Selling Price.
Practical 10: Inserting Image
Insert image from Gallery. Go to Insert Picture From File.
Do the required steps to be coded in the macro. Here, we write theformula in the
cell B4 i.e., “=B1-B2”. Then click on stop recording.
Write a suitable name for the Macro Save.
Click on Internet Click on Web radio button Under Target textbox, write the
link of website.
Click on Next until the last step. Choose the desired way to save or
send the letter Click on Finish.
Practical 14: Cyber Security PPT
Need of Online Security • Take regular backup of the data on your computer. In case the data Is lost
due to any reason, system failure, vtrus attack, etc., youcaneasily retrieve
your data using backup files.
• Without any online defense, you leave yourself open to be a victim of
fraud, theft andeven property damage. Security and vigilance are vital in • System should be upgraded with new technology that were not there
keeping yourself safe, and this responsibilil'y Isn't just on the individual; at the time of purchase, like, increasing RAM, to improve the
everyone is a potential target. performance.
• Without seturi1y measures in place, priva1e or confidential information • Also storage space should also be increased for storage of more
o, messages can be viewed, intercepted and even stolen. information. If you are getting some disc errors, then make sure that
temporary internet files 5hould be deleted from time to time,
Acts by Government • Child n•s;Online Privacy Protfflion Act (COPPA) (1998) -vlrescertain web51te 11nd
online ser.ric.e providers to obtain 11erifiable parental consent before collecting, using, or
disclosing personal information from minors under the age of 13. It also requires web5itu to
• The Federal Trade Commission Act (ITCl(1914J - regulate-sunralr or deceptive commerclal
post an online privacy pol!cy, collect onl-v the personal lnrormatlon necessary,and create and
practices. The FTC Is the primary federal regulator in the privacy area and brings enforcement
malntaln reasonable security measures.
actions against companies. This Includes falling to comply with posted privacy policies and • Financial Services Modernization Act IGLBA) ll999J - regulates the collection, use,
faillng to adequately protect personal information. and disclosure of penonal Information collected or held by flnanclal ln§tltutlons and
requires
• Compute-r Fraud & Abuse Att (CFAA) (1986) - ma s unlr1wful certillln computer-related tu tomer notice§ and a written lnlormation §eCurity program.
activities involving the unauthorized access ara computer to obtain certain information,
defrilud or obtain anything of value, transmit harmful Items, or uaffic in computer passwords. • Fair and Accurate Credit Transactions;Act IFACTA) [2003) - requires finam::fal institutions
The law has been In (lmended six times. and creditors to maintain written identity theft prevention pr011nms.
Bibliography
• https:/Jcybersafetybyapoorv.wordpress.com/
• https://cybersecuritybyarnav.wordpress.com/home/
• https://www.mcafee.com/enterprise/en-in/security
'' Technology is destructive only
in the hands of people who do
not realize that they are one
and the same process as the
universe.
Alan Watts
awareness/cybersecurity/what-is-internet-security.html
• https://legal.thomsonreuters.com/en/insights/articles/how-your-personal
information-is-protected-online
• https:ljen.wikipedia.org/wiki/Federal Trade Commission Act of 1914
Conclusion
Cybctsecurity is one of the biggest need of the world as cyberSecurity
threats are very dangerous to the country's security. Not only the
government but olso the citi2ens should spread awuencss among the
people to always update yout system and nctwotk security setting, and to
the use propc,: anti-virus so that yout system and network security
setting, stay virus and malwan:-&cc.
Practical 15: Accessibility Options
Windows provide the users with many accessibility options.It enables a person
with a disability or impairment to use a computer. It is known as Assistive
Technology. Steps: -
To launch the accessibility options, Open Control Panel Ease ofAccess Ease
of Access Centre.
Under Use text or visual alternatives, we can turn on Sound Sentry and Show
Sounds by checking the check box beside theoption Apply.
Under Make the mouse easier to use, we can turn on MouseKeys by checking the
check box beside the option Apply.
Under Make the keyboard easier to use, we can turn on StickyKeys, Toggle
Keys and Filter Keys by checking the check box beside the option Apply.
Under Make the computer easier to see, we can turn on High Contrast by
checking the check box beside the option Apply.
Practical 16: SQL
We will create a table and perform specific functions.
Create a table named STAFF with specified fields.
testmax (x, y)
simpleinterest (p, r, t)
compoundinterest (p, r, t)
pover (x, y)