Design Controls: These controls are used in giving desired look to the form and to organise controls over the form. For example, line, rectangle, group box etc. To open a form for editing, right click on the name of the form and select Edit option. Understanding Form Control Properties Once form is opened in the Design View, you can display the properties of a control by double clicking on it or by clicking Control button on the Control toolbar. In the following example, properties of a Textbox control are displayed such as Enable property is set to No means, this control cannot be edited or clicked by user, it is disabled, Font is Arial, Bold and Size 10, Background color is set to Yellow1, Border is removed by selecting value Without frame. In the following example, properties of a Checkbox control are displayed. Default status is that check box is not selected the first time it is displayed, Font is Garamond, Bold and size 12, Style property is set to 3D and Background color is set to Orange (Chart 10). Database Management System 150 Information Technology NSQF Level-2
Binding a Control with a Field in the Table Data Field property of a control allows to mention or select the desired field whose data that control should display. In the following example, a Textbox control is taken and in its properties popup, in Data section, user is selectin the field TransactionID to be bound with it so that it displays data values of the field TransactionID as they are stored in the table. In the following example, a List Box control is drawn and List Box Wizard lets user select the table. (User selects table School_Events). This step will appear when a form is being created from scratch. If you are editing a form then this step is not needed since form is already associated with a table. Database Management System 151 Information Technology NSQF Level-2
In next step, select the desired field for the control. (User has selected the field EventName). If values for the field are stored in a table called Value table the select the matching fields in value table and List table. Finally, click on Finish button. Now, List Box control will display the values of the linked or bound field. Database Management System 152 Information Technology NSQF Level-2
Form Controls Bar Form Controls Bar contains the common controls which can be added on the form or can be used to design the form as desired. Below is the summary of common form controls: Exercise Create a master table Furniture to store FurnitureID, Furniture Name, Furniture Material, Furniture Price and Out of Stock. Furniture Material can be Wood, Plastic or Metal. Design a new Form using Form Design View. Keep FurnitureID non editable assuming that it is an autoincrement value. Furniture Material should be a List Box. Out of Stock should be a Check Box, checked means Yes otherwise No. At the top of the form display a big title: FURNITURE DATA ENTRY SCREEN Perform some colour and font settings also on the controls to make the form look formally appealing. Session-10 Design Reports A report isused to present the data formally and can be used to print. It is a logical combination of all the raw facts of the database and presents the result with a visual meaning. Reports present a comprehensive summary of the data stored in the database. Reports help in analysing the data and making decisions. Database Management System 153 Information Technology NSQF Level-2
Different Sections of Report The Header Section is the top most section of the report. Report headers usually contain titles and logos. Page headers usually contain column headings. The Details Section is the body of the report which contains the main data. All reports must have a detail section. The Footer Section can appear in several places. You can create page footers that appear at the bottom of each report page and display elements such as page numbers. The header and footer sections are optional. For example, if you don't want to group the data, you don't need to group headers or footers. However, make sure that your reports contain enough information to make them meaningful and easy to understand. Creating Report 1. Click on the category Reports in Database pane and select Use Wizard to Create Report… option in the Tasks pane. 2. In the Report Wizard, do the following: a) From Tables or queries drop-down, select the desired table or query (In our example, let us select table Item), add the desired fields to the Fields in report list and click Next. b) If you wish, change the labels of the fields into more readable forms as shown here. Then click Next. Database Management System 154 Information Technology NSQF Level-2
c) Select the fields to group the records on it by selecting the desired field and clicking on >button. In our example, we have jackets and jeans. We can group all the records of jackets and jeans separately or we can group records on item type also. Let us group on the basis ofITEM_NAME. Then, click Next. Database Management System 155 Information Technology NSQF Level-2
d) You can sort the report output on the basis of one or more fields. Select the fields on which report data should be sorted in ascending or descending order. Let us sort on the basis ofITEM_SIZE also. Then, click Next. e) Choose a report layout and page orientation. Then, click Next. f) Specify the title of the report as shown here along with Dynamic Report option under which, select Create report now option. Finally, click Finish. Database Management System 156 Information Technology NSQF Level-2
Exercise Create a report named BOOK_STOCK_SUMMARY listing all the details of books grouped on Publisher and sorted on in descending order of Number of Copies. Watch & Learn www.eduitspl.com www.youtube.com/edusoftknowledgeverse Database Management System 114537 Information Technology NSQF Level-2
4 Web Applications and Security Session-1 Working with Accessibility Options Computer Accessibility refers to the user friendliness of a computer system for all, regardless of their disability. This is mainly a software issue. How ever, when a combination of hardware and software, it enables a person with a disability or impairment to use a computer. It is known as Assistive Technology. In this session, you will learn about the basic accessibility options available on your computer. There are numerous types of impairment that impact computer usage. These include: ¤ Cognitive impairments and learning disabilities, suchas dyslexia, attention deficit-hyperactivity disorder (ADHD) or autism. ¤ Visual impairment such as low- vision, complete or partial blindness, and color blindness. ¤ Hearing impairment including deafness. ¤ Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel syndrome and repetitive strain injury. Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer. Launching Accessibility Options Steps to launch accessibility options in Windows 7 are as below: ¤ Click on Start. ¤ Click on Control Panel. ¤ Click the Ease of Access link. ¤ Click Ease of Access Center link. Setting up Keyboard Access Click Make the keyboard easier to use in the Ease of Access Center. Turn on Mouse Keys checkbox to allow the user make use of arrow keys on the numeric keypad to move the keys on screen and Enter key to click. For example, user can press top arrow and left arrow key to move mouse pointer diagonally upwards towards left side. Turn on Sticky Keys checkbox allows user to keep the key active when it is pressed once and when any other key is pressed then it is processed Web Applications and Security 158 Information Technology NSQF Level-2
by the computer with the currently active key. For example, if user has pressed Window key on the keyboard then it will remain active. Now, if user clicks only letter E then it will ne interpreted as Windows+E and Windows Explorer will open up. Once enabled, sticky keys icon will appear in the system tray. Turn on Toggle Keys checkbox allows user to hear an alert sound every time a key like caps lock, num lock etc. is pressed. Turn on Filter Keys check box, when selected, makes keyboard ignore rapidly repeated or long pressed key to avoid repeated typing of the same key thereby helping people who type with trembling hand. Text or Visual Alternatives to Sound People with hearing impairment have great use to this feature where they can see the visual feedback or cues on the screen instead of sound. Click on Use text or visual alternatives for sounds in Ease of Access Center. or Turn on visual notifications for sounds (Sound Sentry) option replaces system sounds with visual warnings like flashing caption bar of active window, flashing the active window itself and flash desktop. Select the desired visual warning. Any sound that reads the screen can be turned into text caption that appear on the screen by checking Turn on text captions for spoken dialog checkbox. Make the Computer Easier to See In Ease of Access Center, click Make the computer easier to see link. Choose a High Contrast Theme: Select the option to turn high contrast on/ off by pressing left Shift + left Alt and Print Screen keys. This lets visually challenged people see screen comparatively clearly. Turn on Narrator option allows read aloud of any text on the screen and Turn on Audio Description option lets visually impaired person hear descriptions of what is happening in any videos. Turn on Magnifier option lets user move mouse pointer on the screen and see the objects larger in size. This mode is called lens mode. In docked mode a portion of the screen can be left magnified and rest of the screen remains normal. This portion can be changed as required. Full screen mode magnifies whole screen. Lens size, focus area, zoom level etc. can be set by the user. Set the thickness of the blinking cursor option makes blinking cursor thicker and larger to see them easily. Web Applications and Security 159 Information Technology NSQF Level-2
Make the Mouse Easier to Use In Ease of Access Center, click Make the mouse keys easier to use link. Here, you can change the colour and size of mouse pointers. You can turn on mouse keys of numeric keypad. You can set option to activate any window just by bringing mouse pointer over it instead of having to click it. Exercise 1. Enable mouse keys on numeric keypad and test them to move mouse pointer on screen. Try opening a file using it. 2. Enable sticky keys then open MS Word and type some text. Now press Ctrl key and leave it. Then press other keys like A, C followed by V, P and observe what happens. These letters must make combination of command shortcuts Ctrl+A, Ctrl+C, Ctrl+V and Ctrl+P. 3. Open notepad and turn on Filter Key option. Now practice typing letters with brief pauses. Observe how the repeated strokes of same letter are ignored. 4. Enable toggle keys option and test them by pressing them on the keyboard. 5. Turn on Sound Sentry and open notepad. In notepad open Print dialog box and then try clicking in the notepad. Observe how it gives visual warning. 6. Try out various settings of Magnifier and see how screen looks like in various modes of magnifier. 7. Try out mouse ease of access options by changing cursor colours and size. Session-2 Networking Fundamentals Computers, when connected with each other, through a communication medium form a network. The purpose of connecting computers to form a network is to share the data, services and various resources. For instance, one printer connected with a computer can be accessed for printing by other computers on the network or a file can be copied from one computer to another without having the need of sharable media like disks or pen drives. Communication medium can be as simple as cables or advanced as wireless and satellites. On the basis of architecture, networks are of 2 types- Peer-to-peer and Client-Server. In peer-to-peer network, computers are equipped with similar processing power and share information and resources with each other. There is no specifically designated computer that is the source of all data and services. Web Applications and Security 160 Information Technology NSQF Level-2
In Client-Server network computers which are dedicated to provided services and access to resources are called Servers and computers that access these services and resources over the network from the servers are called Clients. Depending on the service they provide, servers are called file server, print server, database server, internet access server (proxy server) etc. Servers are equipped with powerful processors and larger storage as compared to clients. In certain networks, clients even rely on server for their data processing. Such clients are called dumb clients. Types of Networks on the Basis of Span On the basis of their span or space occupied, networks are classified into following types: Personal Area Network (PAN) A Personal Area Network (PAN) is a computer network which is used by a single person for communication among the computer devices. For example, printers, fax machines, telephones, or scanners are the computer devices used with a PAN. The reach of a PAN is few metres only. Typically, this is used at home or in a small office. The devices are commonly connected here through wire or Bluetooth, Infrared technology. Local Area Network (LAN) A Local Area Network (LAN) covers a small geographic area, such as home, office or any building. These are used within smaller geographic range and have limited communication lines. LANs have higher data transfer rate. It is useful for sharing resources like files, printers and other applications. A LAN can be set up using wireless media also. Metropolitan Area Network (MAN) A Metropolitan Area Network (MAN) is a large network that usually spans a city, but does not extend the boundaries of the immediate town, city, or metropolitan area. Data transfer rate in Metropolitan Area Network is little slower than the Local Area Network. The distance covered by this kind of network enables a large number of users to communicate with each other in the network. For example, network set up by MTNL in Delhi and Mumbai, cable TV network in a city. Web Applications and Security 161 Information Technology NSQF Level-2
Wide Area Network (WAN) A Wide Area Network (WAN) is a geographically independent communication network. It covers a large geographical area. For example, network between two or more countries. A Wide Area Network may be privately owned or rented. It has lower data transmission rate. For example, mobile network set up by BSNL Internet Networks all over the world are globally inter connected to form Internet. This is the reason why internet is called 'network of networks'. Today, almost every computer and handheld communication device is part of Internet. Computers over internet communicate through communication protocols. Internet is one of the most useful technologies of modern times which help us in our daily, personal and professional life. Internet is widely used by students, educational institutes; scientist and professionals to gather information for research and general information. Businesses use the Internet to access complex databases such as financial database. The Internet is the largest encyclopedia for all age groups. The Internet helps in maintaining contact with friends and relatives who live across different locations via Internet chatting systems and email software. Internet is also becoming a major source of entertainment for the general public. The first workable form of internet came in 1969 with the creation of Advanced Research Projects Agency NETwork (ARPANET) in USA under the U.S. Department of Defense. ARPANET allowed multiple computers to communicate on a single network. In 1990s, Internet came in wider use when computer scientist Tim Berners-Lee invented the World Wide Web. World Wide Web World Wide Web (www) is the largest information system on internet. It contains millions of web sites that provide information in the form of text, animations, pictures and videos. Thus, internet is like a library that contains millions of books. What is the difference between Internet and World Wide Web? Internet is a massive network of computer networks. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer (as long as they are connected to the Internet). The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol to transmit data. The Web also utilizes browsers, such as Internet Explorer or Mozilla Firefox, to access Web documents called Web pages that are linked to each other via hyperlinks. Advantages of networking Data Sharing: One of the most important uses of networking is to allow the sharing of data. User scan send text files, spread sheets, documents, presentations, audio files, video files, etc. to other users. Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For example, instead of purchasing 10 printers for each user, one printer can be purchased and shared among multiple users thus saving cost. Web Applications and Security 162 Information Technology NSQF Level-2
Internet Access Sharing: You can purchase a single Internet connection and share it among other computers in a network instead of purchasing multiple Internet connection for each computer. This is very commonly found in Internet café (browsing centres), schools, colleges, companies, etc. Usage of network based applications such as web browsers, email clients, chat application, audio & video calling, etc is another advantage. Getting Access to Internet To connect your computer with internet you need some additional hardware and software. These are as follows: ¤ A telephone or cable line or a dongle (internet data card) for internet connection by the Internet Service Provider ¤ A modem: Modem is a device that enables a computer to transmit the data through telephone or cable lines. A modem modulates outgoing digital signals from a computer to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device. ¤ Software (browser): A browser/web browser is an application software that is used to access the information (web sites) on the web. Mozilla Firefox, Internet Explorer, Google Chrome, Safari, Opera are some commonly used browsers. Internet Service Provider A company or organisation that provides the access to internet. Access is provided through a modem that connects your computer with the service providers internet server. Modem can be wired (Digital Subscriber Line, dial-up, cables) or wireless (Wi-Fi, 3G/4G etc.) Connectivity provides a wide choice of data transfer speed and other services along with internet access. The kind of connectivity available to you depends connectivity facilities in your area. Types of Common Internet Connectivity Connectivity to internet can be broadly categorised into wired and wireless. There are different types of Internet Connectivity available today; it can be widely categorized into wired and wireless access. Following table is a summary of different types of Internet connectivity categorized into wired and wireless: Technology Type of Connectivity Dial-Up Wired DSL Wired Cable Internet Access Wired 3G Wireless WiMA Wireless Wi-Fi Wireless Some of the commonly used Internet connectivity are: Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) via telephone lines using a device called MODEM. Users dial a particular number provided by the ISP and gain access to the Internet. Web Applications and Security 163 Information Technology NSQF Level-2
Dial-up connections are extremely slow and in most cases, it is replaced by a high speed connection such as DSL or Cable Modem. DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires of a local telephone network. DSL service is delivered along with wired telephone service on the same telephone line. On the customer premises, a DSL filter removes the high frequency interference, enabling simultaneous use of the telephone and data transmission. For using a DSL connection, you need a DSL modem and a subscription. Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses the cable television in frastructure. Cable Internet Access is provided through existing cable TV networks; this is similar to DSL that is provided over existing telephone lines. 3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G mobile telephony communications protocol that allows higher data transfer speeds and capacity. If support for 3Gis available on your mobile phone, you can subscribe to the 3G connectivity with your ISP in order to get high speed Internet connection on your phone. WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide mobile broadband connectivity across cities and countries through a variety of devices. WiMAX is a long range system, covering many kilometres and is typically used where DSL or Cable Internet Access cannot be used; this could be difficulty in laying out cables for home or offices located in remote locations but need access to the Internet. WI-Fi: Wi-Fiisa popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections. Wi-Fi devices such as personal computer, smart phones, video game console, etc. can connect to a network resource such as Internet through a device called the Wireless Access Point (WAP). Wi- Fi is used where cables cannot be run (such as old buildings, outdoor areas)to provide network and Internet access. Wi-Fi can also be used where users require mobile connectivity. Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-Fi access to the Internet for their customers. Data transfer on the Internet Having talked of data transfer and the Internet, have you ever wondered howsitting in one corner of the world, you get information from an other distant area in a few seconds? In very simple language, let's see what happens to a piece of data, say a Web page, when it is transferred over the Internet: ¤ The data is broken up into bits of same sized pieces called packets. ¤ A header is added to each packet explaining where the data has come from, where it should end up and where it fits in with the rest of the packets. ¤ Each packet is sent from computer to computer until it finds its destination. Each computer on the way decides where next to send the packet. All packets may not take the same route. ¤ At the destination, the packets are examined. If any packets are missing or damaged, a message is sent as king for them to be re-sent. This continues until all packets have been received intact. ¤ The packets are now reassembled into their original form. All this done in seconds! To access the Internet, you need an active internet connection. You need to gather and understand your requirement carefully before subscribing to an internet connection plan. In this exercise, you will learn how to choose an Internet connection. Web Applications and Security 164 Information Technology NSQF Level-2
Some of the common questions that help you in your decision are: ¤ What is the purpose of getting this connection? ¤ Will you use the connection regularly? ¤ How much data will be downloaded on an average per month? ¤ How much speed do you need? ¤ What technology is available in your particular area? ¤ What are the different plans available from the ISP? ¤ Is there any limitation or catch for the selected plan? Use the following table to compare different subscription plans to get an estimate and analyse if that would suit your requirement. To access Wi-Fi, you need an access point with an active Internet connection. Usually when you subscribe to an Internet connection, the ISP provides options to purchase or rent a Wi-Fi router that can act as both an internet connectivity device and an access point for Wi-Fi connectivity. Setting up a Wi-Fi network requires technical expertise; how ever, you can access the Wi-Finetworkby connecting to an access point that is already setup for use. On computers that run Windows, you can view the list of wireless networks available by using the following procedure: Windows will display the list of available Wi-Fi networks; you can choose any of the connection from the list. Select by Double- clicking on the name displayed in the list. Exercise 1. How is internet different from the network in a closed, small area like your computer lab? 2. How WWW is different from internet? 3. What is a modem? 4. What is the role of internet service provider in accessing internet? 5. How does data travel on internet? Session-3 Introduction to Instant Messaging Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver. Web Applications and Security 165 Information Technology NSQF Level-2
Most instant messaging software include the option for performing file transfers, audio chat, video calling and conferencing, sharing desktops, etc. a part from standard text chat. Instant messaging software is widely used for personal and commercial use. In this session, you will be introduced to the concept of instant messaging, the steps to create an instant messaging account and also work with instant messaging software. Unlike email, instant messaging happens in real-time and the response from participants can be spontaneous. Some instant messaging software allows users to view messages received when they are not logged on. These are called “Offline Messages”. For utilizing audio and video chat or conferencing, you need to have microphones and headsets or speakers and web cameras so that users can talk or see each other. Key features of an instant messaging are as follows: ¤ Text Messages can be sent to one or more person (Similar to SMS). ¤ Audio calling and conferencing. ¤ Video calling and conferencing. ¤ File transfers (Not limited to documents, spreadsheets, audio files, video files, etc.). ¤ Message history (Save messages for future reference). Instant Messaging Account Participants messaging to each other need to be signed in to the same instant messaging software. To use instant messaging software, a user must have a valid instant messaging account. Instant messaging accounts differ in formats; some instant messaging software such as Windows Live Messenger use email addresses for managing the account and software such as Skype use standard names. Instant Messaging Services There are two kinds of instant messaging software – application based and Web based. ¤ Application based instant messaging software is downloaded and installed on user's computer. Some of the popular instant messaging software are: • Google Talk – Now known as Google Hangout. • Yahoo! Messenger (now discontinued). • Skype. • Windows Live Messenger. • RediffBol, etc. ¤ Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging software are: • Meebo. • MSN Web Messenger. • IMO, etc. Instant Messaging with Google Hangout Google Hangout was earlier available as an installable application GTalk. Hangout provides chatting, voice calls and video calls for free over Internet. This facility comes along with the e-mail account. Besides Google Hangout, Facebook Instant Web Applications and Security 166 Information Technology NSQF Level-2
Messaging,WhatsApp, Skype provide this facility on different interfaces. To use Hangout, login to your Gmail account. You will see your hangout connections on the right hand side as shown here. To begin conversation follow the steps below: 1. Click on Search button to search and send the chatting request to someone, who is online. 2. Type the name or email address of the person and press Enter key. 3. If the person or email address is found, the name and profile image appear on the left pane and chatting window appears on the right of the window. Here you can start text chatting. Exercise Go to Gmail and create an account if you do not have already. Session-4 Chatting with a Contact - Google Talk (Hangout) To chat with someone, the person needs to be online. When you see the person online, you will see a green dot beside the name of the person. Web Applications and Security 167 Information Technology NSQF Level-2
To begin chatting, double click on the contact name. A chat window will popup where messages can be typed, sent and seen. Chat Etiquettes 1. Messages should be short and to the point. 2. Always introduce yourself by name if your screen name doesn't reflect it. 3. Always ask if the other person has time to chat first-regardless of how important you think what you have to say is, it's not going to be well received if the recipient is busy. 4. In a business environment, know exactly what you want to discuss. 5. TYPING YOUR MESSAGES IN UPPER CASE is extremely rude-it's considered shouting and very aggressive. 6. Give people time to respond - Multiple questions sent to a recipient before they've had a chance to answer can seem more like an interrogation rather than a conversation. 7. Wherever possible, give the person you are communicating with your undivided attention. It's not just a sign of respect, but if you have multiple conversations happening or are allowing other issues to distract you, you may miss an important point in the other person's messages or lose the gist of the conversation. 8. It's important to properly end an IM conversation - you may think the chat is over, but the other person may not. While you're off doing other things, they may be sitting there staring at the screen waiting for further communication from you!! Exercise Go to Gmail and practice instant messaging with some of your classmates with teacher's permission. Session-5 Creating and Publishing Web Pages - Blog A blog is a discussion style site used by non-technical (and technical users) users for creating personal web pages. Blogs are similar to an online personal diary and simple to use. You can use a blog to convey messages about events, announcements, news, reviews, etc. Blogs are usually managed using a web browser and this requires active internet connection. You can Web Applications and Security 168 Information Technology NSQF Level-2
also use off line blog software to create content first and later publish the content when an active internet connection is available. There are hundreds of websites that offer blog service for free. Some of the popular blogs include: • www.WordPress.com • www.blogger.com • www.blog.com • www.weebly.com • www.blogsome.com Creating a Blog Account Let us learn how to create a blog account on WordPress. 1. Open the browser and go to https://wordpress.com/ 2. Click on Get Started on top right corner. 3. Fill the simple registration form mentioning your email id, username and password. Then, click Continue. 4. You email inbox will receive an activation mail from WordPress which you need to confirm by clicking Click here to Confirm Now. Web Applications and Security 169 Information Technology NSQF Level-2
5. Fill in Create Site form and click on Continue. 6. Enter blog address for your site and click on Create for free account. 7. Click on Start with Free choice. Web Applications and Security 170 Information Technology NSQF Level-2
Starting with New Blog Post 1. In your account page, click on Add beside Blog Posts. 2. This will take you to the post editor where you mention the title of the post and the content. You can format the content using various controls given on the top toolbar. You can preview you post before publishing to have an idea how it would look like finally. You can click on + Add to insert audio, video, images and other controls in your page. 3. Once you finish writing your post, click Preview to see how your post looks like and whether you need further edits in it. Once finalised, click on Publish… to publish the post on the web. You can decide to publish immediately or any future date. Click on green colured Publish! button. It will show your published page. Click on Visit Site. 4. Your final published post will be displayed which you can share with others. Web Applications and Security 171 Information Technology NSQF Level-2
Posting Comments on Other Posts When you visit other blogs and read posts, you can post comments on the post. The options for posting comments are usually given at the end of the post which you might find after scrolling down the post page. Key in your comments and details and click on Post Comment. Exercise 1. Go to WordPress or Blogger.com to create a blog account and create a small blog post about your school. 2. After publishing blogs share it with your classmates online through Facebook. Post comments on each other's blog posts. Session-6 Using Offline Blog Editors Besides online blog editors, offline blog editors can be used that can be installed on your computer and you can use them to draft your blog posts without having to connect with internet. When your post is finalised, you can connect with internet and publish your final post. Some popular offline blog editors are Windows Live Writer from Microsoft, Qumana, BlogDesk, Blog Jet. You can use MS Word to create your blog post too. It is recommended that you should have an online blog account already before starting with offline blog editor. Publishing Blog from MS Word. ¤ Open MS Word 2013. ¤ Go to File tab >New option. ¤ Select Blog Post template. Web Applications and Security 172 Information Technology NSQF Level-2
Click on Create in the popup. MS Word will ask you to register your online blog. Click on Register Now. In New Blog Account dialog box, select WordPress. In New WordPress Account dialog box, enter your blog post URL and login credentials of your blog site. Working with Blog You can create a new blog post just like you create any Word document with pictures, SmartArts, Shapes, ClipArts, etc. or you can open existing post to edit from your blog site. Publishing a New Blog Post Once your blog is ready to publish. Click Publish option in Publish drop- down in Blog group of Blog Post tab. Web Applications and Security 173 Information Technology NSQF Level-2
The post will be published and an update will be displayed on the page. Clicking on Home Page option in Blog group of Blog Post tab will take you to the online home page of your blog in the browser. Editing an Existing Blog Post from Blog Site 1. In Blog group under Blog Post tab, click on Open Existing option. 2. In Open Existing Post dialog box, your online posts will be listed. Select the desire post and click OK. 3. Selected post will be opened for editing. Make changes and publish it again. Web Applications and Security 174 Information Technology NSQF Level-2
Working with Qumana Qumana can be downloaded and installed from https://www.softpedia.com/get/Internet/News- Newsgroups-Blog-Tools/Qumana.shtml Qumana makes blogging very easy. You can add pictures, audio, video and images to your blog. You can easily manage you blog and publish it online. Once installed, open Qumana by clicking Start > All Programs > Qumana > Qumana or by clicking Qumana shortcut on the desktop. Connecting with Online Blog 1. On first start, mention your blog's address in Add Blog Wizard and click Next. It will automatically locate your blog. 2. Enter login credential of your blog site and click Next. 3. Blogs on your site will be listed. Select the blog you need to work with and click Finish. Web Applications and Security 175 Information Technology NSQF Level-2
Qumana interface will open up listing your blog posts. Editing Blog Posts 1. In the list of your blog posts, double click on the one you wish to edit. It will open up in the editor. 2. Make changes in your post in the editor. You can use formatting toolbar. If you have basic knowledge of HTML, you can insert content with HTML using Insert HTML button at the top. Insert Ad button lets you insert advertisement in your post page. Once changes are done, click on Save button to save your post offline on your computer. Publishing the Blog Post 1. To publish changes to your blog site, click on Update Post button. Web Applications and Security 176 Information Technology NSQF Level-2
2. Qumana will take a while and publish the changes to your online post. Exercise 1. Go to WordPress, register yourself and create a simple blog. 2. Publish a post using MS Word. 3. Download and install Qumana. 4. Use the editor to connect with your online blog. 5. Edit the online blog created in previous session using offline editor and publish the changes. Session-7 Online Transactions Online shopping is a form of electronic commerce where customers can buy or sell goods over the Internet. Customers need to have an active internet connection for viewing goods or services offered by a seller; customers can pay online using a credit, debit card. Online shopping could be useful in situations when: ¤ A customer does not have sufficient time to visit stores. ¤ Visiting a store is more expensive than purchasing a product online. ¤ A product or service that is not available in the local market is available online. Some of the popular online transaction websites are: ¤ IRCTC, an online portal for booking flight and train tickets. ¤ Flipkart, an online shopping portal for buying consumer products. ¤ eBay, an online portal for buying and selling goods. ¤ Redbus, an online portal for booking bus tickets. To perform an online transaction, all you need is a web browser and an active internet connection. In some cases where purchasing is involved, you will need a valid credit card, debit card or online banking support referred to as Net Banking Subscription. Some websites even allow COD (Cash on delivery) where the users can pay once they receive the product or service. A Basic Online Shopping Process All online shopping websites follow following standard shopping process: Web Applications and Security 177 Information Technology NSQF Level-2
1. User registers on the website. 2. User searches for products and browses through product catalogues. 3. User selects, reviews and adds the products in online shopping cart. 4. User reviews the cart and finalises the products in the cart. 5. User fills in the shipping address. 6. User fills in the online payment details. 7. User furnishes the payment and checks out. 8. Website sends SMS and Email to the user, acknowledging the payment received and regarding the dispatch of the products purchased. 9. Finally, products are delivered to the dispatch address. Let us understand this process with Amazon.in. Online Transaction Using Amazon Amazon is one of the premiere online stores where you can purchase a variety of consumer goods, books, apparels, mobile phones, groceries, toys, sports goods and several other goods. Amazon offers multiple payment methods like credit card, debit card, net banking, e-gift voucher, and Cash on Delivery. You can make purchase and transactions on Amazon without registering but every time you make payments you will have to enter all your details again hence otos recommended that your create an account on Amazon.in and log into it to make online purchase. Shopping on Amazon.in 1. Open any browser and go to www.amazon.in. 2. Bring the mouse pointer over Your Orders and click on Sign In to login to your account. 3. On next page enter your email ID, click Continue, enter your password and click Continue. Amazon home page will provide you a wide variety of products organised into various categories. Page also displays various deals. You can also search for the products from the search bar at the top which provides choice for product categories. Web Applications and Security 178 Information Technology NSQF Level-2
Browsing Product Catalogue Products in a catalogue can be sorted according price, reviews and popularity. You can narrow down your search on the basis of manufacturer, product price range, discounts, availability etc. The catalogue interface is seamlessly provided with search, links and category choices that your can easily look around. Shopping Cart and Wish List When you click on a product or its image, its features, any technical details, discount schemes, customer reviews and payment options are displayed on a new page. It is not necessary to buy the products immediately. You can add the product into a wish list to review it later. If you like the product, you can add it to your shopping cart and continue shopping. Finally, you can decide which products you really need to buy and delete rest from the cart. Once your shopping cart contents are finalised, you can proceed to payment. Viewing Shopping Cart and Purchasing To visit your cart, click on Cart link at the top right corner. This will take you to your shopping cart listing your items. With each item, there is Delete link to remove the item from the cart. Once finalised, click on Proceed to Checkout button. Enter your Delivery address and Shipping preferences. Amazon will save it for future use. Click Continue. Select Payment options through all standard credit and debit cards, Netbanking, EMI (if applicable), Cash on Delivery, Gift Cards, Vouchers etc. Select the suitable method and click Continue. Web Applications and Security 179 Information Technology NSQF Level-2
Fill on your payment details like card details, login credentials etc. Click Continue. On next page, click on Place Your Order and Pay. This will take you to the payment gateway and once the payment is successful you will receive an acknowledgment mail regarding product, payment and delivery details. Online Transaction for Booking Rail Tickets Let us see how we can use an online ticketing service for booking train tickets. Here we shall use IRCTC website for this purpose. Open the browser and go to IRCTC website: https://www.irctc.co.in On website's home page, fill in the details of your journey like cities to travel from and to, date of journey and preferred travel class. Then, click on Find trains. You can login into IRCTC account which you may have created earlier. Registering on IRCTC is the same standard process as on any other public services website. To login, click Login option in the drop- down menu on top right corner. The trains will be listed. Click on Check Availability to check the seats available. You can change the travel class to check seats for other classes. Once you decide to book a seat, click on Book Now. Web Applications and Security 180 Information Technology NSQF Level-2
On the next screen, fill the passenger details as shown here. If you have passenger details already saved in the website then you can pick up details by clicking My Saved Passenger(s) List. To add more passenger details, click on Add Passenger. Scroll down, fill in mobile number and captcha details and click Continue Booking. Review booking page will appear. When sure, click on Continue Booking. On payments page, select the suitable payment option for example Net banking, select the Bank and click on Make Payment. This will take to the payment portal. Furnish the payment and your ticket will be displayed to download and print. Viewing Transactions In the main menu, click on MY ACCOUNT and hover mouse pointer on My Transactions. You will see choices namely Booked Ticket History, Failed Transaction History, Ticket Cancellation History. You can select the desired choice. Exercise 1. Create an account on any online shopping site of your choice with teacher's permission. Add some items in shopping cart, go upto payment option and then logout without buying the items. 2. Register yourself on IRCTC website and practice booking a ticket. (Do not book actual ticket. Stop when payment page appears.) 3. Check you email ID of there is any mail from shopping website and IRCTC. Session-8 Internet Security Internet security refers to computer security especially when we are online on Internet. It often involves browser security but also network security. Internet security is to establish preventive Web Applications and Security 181 Information Technology NSQF Level-2
measures against attacks from hackers, phishers and online scammers. The Internet is as secured as safely we use it. Exchanging information may often involves high risk of intrusion. Though Internet is a valuable and vast source of information. It is also the most preferred source and virtual place of entertainment. But it makes your computer prone to many online threats. Ensuring security of our login credentials on various sites like bank sites, our credit card and online banking information from unauthorized users is a must. Some web sites can also install Malware on the computer without user consent thereby leaving the computer damaged or insecure. Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of users getting compromised.You can reduce the risks by using best practices such as using Antivirus Software, Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading awareness of the best practices. Best Practices for Security Use strong passwords, with combination of letters in both cases, numbers, and special characters which makes a password difficult to crack or guessed by others. Do not keep easy-to-guess obvious passwords like your birth date, birth place, friend's name, relative's birth date, mobile number etc. Change your pass word frequently at least monthly or fortnightly. Most web sites like Gmail, Facebook, bank web sites and important transactional web sites check for password effectiveness when you register for the first time or change the password. Following is a general guideline for managing strong passwords. ¤ Password length should be at least 10-15 characters if possible or allowed by the website or software. ¤ Do not repeat password while changing them. Many bank web sites do not allow this. ¤ Pass words should be a complex combination of numbers, letters and symbols. ¤ Avoid using same password for multiple sites. Example of a strong password is k3xP%,7Ym[} Web sites such as www.strongpasswordgenerator.com help generate random strong pass words. Go to www.strongpasswordgenerator.com and click Generate strong password. The pass word will be displayed. Regular Data Backup: Regularly backup your data on an offline storage like external drive, disc or tape drive etc. You can restore it in case of data loss or computer hard drive crash. Keep the back up in a secured place away from unauthorized users. Encrypt Data by using a good encryption software. Some operating systems provide this feature also. Secure your user name and password: Never save your security credentials in a place or location, which is shared among others such as cybercafé, shared drive etc. Do not set your browser to automatically login to your bank sites for automatic logon. Every time you visit such site, type the password always. Do not share personal data; web sites require you to fill out forms containing fields such as name, gender, age, email address, school, etc. Be cautious when filling out such forms; research and verify if it's a trustable web site. Your email addressed could be used by unauthorized users to send you fake or unwanted emails; think twice or thrice before providing information to any website and decide if it is really necessary. Secure transactions: If you are using online shopping or transactions, web sites even store your credit card or online banking personal information such as your credit card number, account Web Applications and Security 182 Information Technology NSQF Level-2
details, etc. This information can be tracked and used by un-authorized users often known as hackers to misuse this information. Again, ensure the web site is legitimate and uses secure practices for performing and maintaining online transactions. Since information such as credit card details or personal information is sent over the network, it is always recommended to use only secure web sites for such transactions. Verify if the web site uses secure transaction; usually it is indicated through a digital certificate represented as a golden lock in the web browser's address bar. Use antivirus and antispyware software, computers are prone to attacks from software known as Malware that could har my our computer. Malware track browsing be havior or transmit personal data from your computer; programs such as key loggers could be in stalled on your computer track and transmit every key that is pressed on akey board (keystrokes) to unauthorized users. Antivirus and Antispyware programs also offer real-time protection monitoring your computer for any changes by malware software. Keep your Antivirus an Antispy ware software always up to date, this can help in protecting your computer from recent threats. Do not immediately respond to mails from unknown users, it may be a fake mail trying to gather personal information such as your bank account details, home address, etc. Some mails could promise you jobs or announce lottery results which in turn could compromise the user. And in some cases, virus or scripts that are dangerous could be attached to the mail; NEVER open the attachment from an unknown source. Clear browser cookies frequently, cookies are programs that are created on your local computer when you visit web sites. Though cookies are meant for storing data based on your activity performed during your earlier visit such as logon details, details of as hopping cart, visited pages in a website, etc. they could also be tracked by unauthorized users and possibly gain access to your personal information. Keep the operating system and software applications up to date; though operating systems and applications are designed, tested and distributed, sometimes they may have security holes through which a hacker can take advantage; they may track and gather information or even damage the whole computer. In general, most vendors notify the users whenever a security hole is identified and an update is available to address that particular issue. You can also visit respective vendor's website to check if there are any updates available, download and keep your operating system and software applications up to date, free from security holes. Instal Firewalls: Firewalls could be software or hardware and can assist in keeping a computer and a network secure. Firewalls analyze the network traffic and determine if the traffic should be allowed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall software as a part of operating system thus keeping the computer secure. In rare cases, you may need to configure your firewall for additional security. Web Applications and Security 183 Information Technology NSQF Level-2
Never install software from unknown sources as they might not be trust worthy; download only from well-knownorreputed web sites. Verify the source if it is legitimate by searching the internet or referring to comments from other users before downloading them; understand the nature and the purpose of the software before attempting to download and install them. Secured Socket Layer Certification is done for web sites by known authorised Certification Authorities (CA). CAs do not issue SSL certificates to phishers, spammers or any agency that is not properly identified and cleared. Check the website's certificate icon of a padlock in the address bar. All secured web sites have SSL (Secured Socket Layer) certificates. If padlock icon is of open lock then website is not secured and must be left immediately. Remove unwanted or unknown software applications; these might have got installed without your knowledge when you have visited some web sites. Unwanted software could get installed as they might have been bundled along with necessary software. Some programs such as toolbars get installed usually through bundled software and are programmed to send personal data without your consent. Cyber Bullying Any sort of threat or harassment over internet is the act of cyber bullying. Messages in bad taste and intentions, online mockery in friend groups or circles, stalking someone's online profile and trying to post unwanted updates, sending unsolicited private messages, videos, and pictures are considered as Cyber bullying that affects young minds intensely even up to the threats of death. Protection from Cyber Bullying ¤ Children must know that their parents and teachers are always available for them when they face such problem. ¤ Children must know that no matters what, parents and teachers are their first support. ¤ Children should inform their elders about any incident that sounds nasty even remotely. ¤ Children must know the fact that cyber bullies are not capable to do any harm and they can never carry out their claims of harming someone. ¤ Children are advised to block such intruders immediately and never entertain them. ¤ In case of cyber bully attack, save all his/ her messages offline as evidence for later use. Malicious Smartphone Applications Many smart phone applications seem attractive but in fact contain malicious code that steals information stored in the smart phone, such as the address book data without the owner's knowledge. The personal information stolen this way is forwarded to the hackers who abuse it to commit cyber crimes such as spam operations, billing frauds and cyber scams. Every trending app is not worth downloading. Smartphone Safety Measures ¤ Set up emergency numbers for instant calling. ¤ Do not use cell phone everywhere – keep your senses free to perceive other stimuli like while crossing road, driving, using escalators, crowded areas etc. ¤ Get rid of unwanted data as soon as possible – keep your phone data tidy. ¤ Protect your phone from physical theft. Make it a habit to check while leaving any place. ¤ Keep good password and pattern protection. ¤ Keep the antivirus and software updated. Web Applications and Security 184 Information Technology NSQF Level-2
¤ Sign out of and close the apps that are used. ¤ Avoid automatic download settings. ¤ Keep your wireless access secured. ¤ Do not install just any app impulsively or in peer pressure. ¤ Keep a regular backup of your phone data. Clearing Data Stored In Browsers Web browsers have built-in password management designed to store passwords used informs on web sites. Browser soften prompt to save user name sand passwords when users attempt to logon to web sites. This facility is offered to users, so that they can logon to their frequently used web sites without having to type the user names or passwords. However it is not advisable to leave the web browser store this data particularly on public or shared computers. To clear personal data from a web browser such as Google Chrome, launch the browser. Click Tools Menu > More Tools > Clear Browsing data… The next window will show various options to clear Browsing History, Cookies and Cache. You can make changes in Privacy settings according to your preferences. Exercise Visit security options of Internet Explorer and note down your observations in notebook like how history settings are changed, how cookies settings are changes and how other security levels are setup in Internet Explorer. Session-9 Workplace Safety People on a workplace are important asset of the company they work for. In addition to this, workplaces may have other people also involved such as students in schools, patients in hospitals, customers in a bank and clients in other working places. So, workplace safety is not an issue concerning only the people who work in a particular place but everyone who is present at the workplace due to one reason or other. Why Workplace Safety is Important? Safety is always an important issue in every aspect of life owing to the reason that it concerns the living beings directly. A safe environment is what everyone looks for and wants to be in. Workplaces are very dynamic in nature and depending on that they can be very crowded too. So, a place that involves dynamic interaction of people at work needs to be safer for all people concerned. A safe working environment ensures better work performance and efficient workforce. It is the responsibility of every organisation to provide as much as it is the right of every working person to have a safe and healthful working environment. Web Applications and Security 185 Information Technology NSQF Level-2
Safety Issues and Workplace As we learnt that workplaces are mostly dynamic in nature and depending on that, their environment varies. Think of a small stationery shop manned by two people at one hand and on the other a busy railway platform buzzing with the crowd of passengers arriving and leaving, along with vendors, staff and security personnel around. Quite a contrast! Isn't it? So, you can now figure out that certain workplaces could be quiet like, offices and libraries while some workplaces are moderately noisy and crowded such as shops and restaurants, yet some workplaces like hospitals, public transport stations, factories, mines, construction sites, packaging units, ware houses etc. work under stringent safety controls. What is of importance is the safety of each and every individual directly or indirectly related to the place of work. For instance, hospitals have responsibility of safety not only for their staff but also for the patients and the visitors. So does for airports, railways and bus stations for passengers, shopping malls for shoppers, restaurants for customers, schools for students, recreation parks for children and the likes. Safety Hazards Preventing and protecting against a threat or hazard needs the knowledge of kind and nature of the threat. Knowledge helps in devising effective safety measures and rules. Nature of workplace is the prime factor that decides the kind of threats to the safety of the people present there. In highly sophisticated workplaces such as laboratories, construction sites, mines and manufacturing expert guidance and vigil are needed to ensure safety and a strict code of conduct is followed in complying with the safety rules and regulations. In certain specialised cases, breaching such rules may be considered as criminal offence. Comparatively common workplace areas such as schools, offices and shops need not to have such extensive safety measures but they do need to follow certain basic and mandatory safety practices on regular basis. Some common workplace safety hazards are related to the following items or factors: Fire: Fire has the most devastating effect. In absence of appropriate safety measures, it is like inviting the trouble knowingly. Fire safety must be the prime concern for every domestic and commercial place. Protection against fire is the part of basic rules and guidelines of safety. A sudden outbreak of fire catches the people off-guard and by the time they react, it spreads. In certain areas like mines, paper and garment go-downs, confined places like elevators, theatres and washrooms, oil-rigs, fuel stations, chemical laboratories are most prone to complete devastation by fire. If fire breaks out in such places and adequate means of safety are absent then such places succumb completely to the raging fire in no time. Electricity: We tend to take this silent monster very lightly and in most of the cases, victims hardly survived. Today, quality electrical equipment and fittings are installed which make us little inadvertent in using them. This makes us overlook certain trivial danger signs such as broken sockets or wire- casings, water leakage near the electrical fittings, wires exposed due to rodent-bites, wear and tear of the old fitting and wirings etc. Other reasons behind a safety hazard due to electricity are misuse of allocated power (using high voltage equipment over a low voltage line) leading to short-circuits, equipment and fittings in the reach of children, deployment of untrained personnel for repairs and poor fitting layout design. Careless handling of equipment. For instance, using a hair-drier casually in the bathroom or handling electrical fittings barefoot standing on the naked ground. Electricity accidents, like short-circuits, may cause fire, leading to more destruction and loss of life. Unsafe places: An unsafe place could be as ordinary as a narrow passage cluttered with a stack of heavy cartons or as dangerous as several feet below the ground in a coal mine. A construction Web Applications and Security 186 Information Technology NSQF Level-2
site is a life-threatening place for untrained, unequipped and casual individuals. Like construction sites, factories and warehouses have two major threats – heavy objects and moving objects. For example, heavy containers and fork lifts. Confined places like narrow passages, operation theatres, air-locked rooms, bank safes, freezers and cold storages, driver's cabin, cockpit, soundproof cabins and basements – parking, go-downs, mines – all such places turn out to be hell holes when disaster strikes. Certain places are unsafe due to hazardous nature of the work such as virus medical research centre, nuclear plants and machinery, blast furnaces, refineries, work involving dust, smoke and other particles in the air, work involving high decibel noise due to heavy equipment like drilling machines and hammers, life threatening sites such as underwater, space research, outer space missions, extreme heights and extreme weather conditions (desert, north pole etc.), places which bring workers in contact with harmful diseases – people working for patients during a pandemic such as recent Covid-19 virus etc. Tools and Machinery: Various trades use different kinds of tools, machines, gadgets and instruments. Using certain tools and operating specific machines needs right kind of training and methods. Tools pose a threat if they are not used in the adequate manner, machines can create havoc if they are not worked with adequate skills. Mishandling of these leads to the dangers for the people on the workplace. Certain examples are heavy drills, cranes, trolleys, furnaces, medical equipment, forklifts, indoor carriage cars, push carts, carpentry tools etc. Working with a tool or a machine is as safe as the level of skill and knowhow of its operator. Proper placement and location of the equipment is also necessary. Distractions while operating them may also lead to accidents sometimes. Ergonomics: There are certain ways to operate equipment and right kind of postures to assume while working. A person merely sitting in a chair, typing on a computer is exposed to the effects of not using the equipment properly and not assuming the right posture. The correct posture of working on a computer, correct posture to man a vehicle, correct pose to handle an equipment come under ergonomics. The quality of a product is also determined by its ergonomic design. A chair meant for sitting for longer hours by a data entry operator will be different than that meant for a person working on a loom. Ergonomics involves both – the right product design and the right posture to work. Slippery and unsafe passages: A simple slip may cause a broken hip or elbow. Businesses involved in show and display such as hotels, malls, restaurants and other such places have more reasons for accidents due to a sudden slip. Imagine a slip and topple from the third floor of a mall down to the ground floor or a slip over the moving escalator. Passages partially blocked by discarded stuff like broken furniture or wooden cartons. Untidy narrow pathways due to poor housekeeping. This is the reason that in certain professions, personnel are trained into handling equipment in narrow passages like the passage in aeroplanes, crowded places like restaurants, moving trains. All such workplaces made of slippery floors need extra care and caution for the people who work there and the visitors. Crowd: Overcrowded workplaces may cause different kind of threats but they are more of a big disaster in other kinds of threats such as fire breakout or stampede. Crowd makes an emergency situation worse. Law enforcement professionals and workers many times deal with crowd. Crowded hospitals are a common example. Such places need discipline and a code of conduct for restricted movement as well as authorised access to specific areas. Crowds on railway platforms and over bridges many time lead to accidents. Hygiene and health: People in healthcare, medical profession and scientific research are exposed to infections, radiations and other similar threats depending on where they work. A strict regime of discipline and safety measures are needed to be followed in such places. People not trained into working at such places pose greater threat. Web Applications and Security 187 Information Technology NSQF Level-2
Training and capability of staff: Certain businesses sometimes compromise on the adequate training, capacity and skills of the working staff due to budget constraints or short-sighted business decisions. This leads to accidents. In certain businesses it is more of a mortal threat such as public transport and commutation services (taxi, school van etc.). There had been a few news of school van accidents. Capability refers to the physical and mental state of the worker or operator of the machine. A drunk driver kills self and many others. Lack of adequate staff results in untrained persons handling the equipment. We have heard cases where an untrained support staff was caught administering an injection to a patient. All professions involving handing of equipment, tools and machines need adequate expertise level and certified, trained and skilful personnel to work. Anything less than this is an open invitation to an accident in waiting. Exercise 1. Imagine a public place which you visited recently. Which safety hazards did you notice there? 2. What are the common safety hazards likely at a school? Session-10 Maintain Workplace Safety As we discovered earlier, workplaces are exposed to different kinds of threats depending on their nature of business and location. It is imperative to ensure safety of workers and to do so, adequate safety norms and discipline are followed at workplaces. The safety rules and measures should be clearly communicated through formal ways and displayed for everyone to see on the workplace. Let us have a look at some common workplace safety measures. Suitable safety gear: Certain specialised professions need specific uniforms and safety gears. It's not only for sportspersons to wear safety gear. Personal protection equipment (PPE), helmets, goggles, anti-glare specs, thermal safety wear, anti-slip shoes, overalls, anti-radiation suits, protective boots and gloves, bulletproof and fireproof jackets are necessarily used in various work fields. For doctors, construction workers, mine workers, engineers, mechanics, housekeeping staff, computer operators, security personnel, vehicle handlers, packagers, assembly line operators and factory workers it is necessary by rule to wear adequate safety gear to ensure workplace safety. Fire safety: It is important to have suitable and adequate fire safety measures. These include the workplace design and environment as well as safety equipment. Fire-safe work environment includes: 1. Proper ventilation at workplace. 2. Emergency exits. 3. Safe electrical, LPG and water supply fittings. 4. Suitable safety against any inflammable material. 5. Means to check and handle overcrowding. 6. Practice of safety rules by all at workplace. Fire safety equipment includes: 1. Fire extinguishing equipment. 2. Fire alarm. In addition to the above, the staff should be trained through mock drills and regulations to practice Web Applications and Security 188 Information Technology NSQF Level-2
safety. People at workplace should know what to do during a fire breakout. Evacuation drills, demo and practice sessions for using fire extinguishers, instant access to fire fighting services and medical help, self-management and helping others during the emergent situation etc., equip staff to handle the emergency adequately instead of panicking and losing control. General health and ergonomic safety: Nature of work and workplace environment affect the health of the workers. A conducive work environment is conscious of workers' general health and its ergonomic aspects. Due to work-specific environment workers may get exposed to different kinds of health hazards. For instance, coalmine labourers are exposed to poisonous gases, harmful radiations, inflammable materials etc., sewage cleaners lose their lives due to poisonous gases and deep running smudge. Such workers need adequate equipment and gear to work. Hospitals are a dangerous place for the staff who come in direct contact of the patients with infectious diseases, people working in refineries, chemical plants and dye industry tend to get their respiratory system infected with hazardous chemical, tiny dust particles and general air contamination, extreme temperatures may cause discomfort or danger to physical health, Such workers should follow the safety guidelines such as wearing right kind of PPE, gear and obey the prescribed health measures. People working behind desks with least or zero physical movement are prone to ailments related to heart, backbone and neck. Suitable breaks, fitness regime and discipline must be followed by them. Many big corporates provide gym facility for the employees. Minimised physical activity takes a toll on the physical fitness. Long durations of standing (shopping mall, food joint), too much physical movements such as by salespersons, traffic policemen, hotel kitchens, waiters, security guards etc. Suitable breaks, arrangements for little recreation and physical fitness must be in place for such professions. First Aid Kit is a mandatory requirement at all workplaces irrespective of their nature and kind however, it should be equipped with suitable tools and medicines. FAK helps in minimising the risk of life until the help arrives. It enables the victim to hang on for a little longer time until the real help is reached. A standard FAK contains the following: plasters in different sizes and shapes sterile gauze dressings bandages of different size/shape safety pins tweezers and/or small scissors alcohol-free cleansing wipes sticky tape digital thermometer skin rash cream antiseptic cream/ liquid painkillers cough medicine antihistamine cream or tablets small torch FAKs need to be checked regularly to replace any expired material or to add any new item depending on the requirements. Providing first aid: Every individual should know how to provide basic first aid to a victim. Usually, first aid is a matter of trained persons but a basic training from the right source such as redcross.org etc. equip a person to become useful during emergency. Depending on the cause of harm, the patient or victim should be treated properly for the quick comfort and safety. Taking care of proper air flow (ventilation), comfortable lying down of the patient, applying suitable medicine, suppressing any bleeding, aiding in respiration, supporting a broken bone, least distressing movement of the patient are certain basic know-hows that may save a life. The main purpose of the first aid is to keep the victim or patient alive and comfortable until the adequate health arrives. Visit www.redcross.org to learn more about providing first aid. Ergonomic safety refers to the correct way of working with an equipment. It involves body posture, Web Applications and Security 189 Information Technology NSQF Level-2
duration of working, safety of sensitive organs such as eyes and right skill. For example, to type for longer duration on a keyboard, one must be trained in the typing skills of specific language keyboard, the right posture of the body, kind of chair, position of knees and elbows, position of wrists while typing and using mouse, distance from the monitor, intensity of the monitor glare etc. need to be considered. Keyboard ¥ Your neck and shoulders should be relaxed. ¥ Your upper arms & elbows should make a little more than 900 angle. ¥ Your wrists should be straight. Mouse ¥ Mouse should not cause pressure on the wrist. ¥ Avoid bulky mouse. ¥ Keep mouse closer to the keyboard. ¥ Elbows should be bent and closer to the body. Monitor ¥ Monitor should be placed at a distance anywhere between 18 and 30 inches. ¥ You should be able to focus on the screen while still using the back of the chair and keep your arms parallel to your upper body. ¥ Your eyes should be level with the top of the screen. ¥ Turn the screen brightness down to a comfortable level. Sitting and Posture ¥ Chair height should be adjustable. ¥ Chair should swivel (rotate on centre) easily and completely (3600) ¥ Chair should have good back support. ¥ You should be able to sit with your feet flat on the floor (or a footstool) and knees approximately 900. Mild Exercises (Do not over stretch and do not do with jerk) þ It is a good idea to take a break of a few minutes for every hour. þ One by one, gently lower your ears to your shoulders. Repeat a few times. þ Turn head slowly & look over left shoulder (10 sec) then right shoulder. Repeat a few times. þ Tilt the head slowly backwards then bring slowly forward to tuck the chin in the neck. Hold for 10 seconds and repeat a few times. þ Circle shoulders forward several times, then backwards. Repeat 3-5 times. þ Stretch arms above head, pull elbows behind the head. Hold for 10 seconds and repeat. þ Go to an open area, swing arms one by one forward & backwards like a windmill. Repeat. þ Interlace fingers, palms outwards and straighten arms in front. Hold for 10 sec & repeat. þ Rotate wrists clockwise for 30 seconds than rotate them anti clockwise. þ Every 20 minutes, look away from the screen at a distant object for 10 seconds. Safety equipment: It is the responsibility of the concerned business and authorised persons to ensure that safety equipment required for the work is worn by the workers. Through guidelines, trainings and checks must be there to ensure the compliance in using the safety equipment. In Web Applications and Security 190 Information Technology NSQF Level-2
sensitive areas like hospitals, construction sites etc., government regulations need to by applied and followed. There must be detailed guidelines and stringent discipline to ensure everyone's safety. People must be educated in realising that safety equipment may slow them down but prolongs their life span. To stay alive and physically safe are the prerequisites to be of any use to a workplace. No business would like to have a crippled worker or a worker lost. Lighting: Workplaces involving late working hours or places like mines, go-downs and basements need suitable amount of lights for workers to see and carry out their tasks. Improper lighting leads to visual health issues and low productivity. A well lit room, a mine fitted with moving flash lights, operation theatre with bright overhead flash lights, a classroom with proper light arrangements are examples of well-lit workplaces. Cleanliness and hygiene: Clean and tidy workplaces is a prerequisite for better working environment. Workplace should be free of rodents and other insects. Regular cleaning of the floors, working areas, desks and other parts of the building should be carried out. Occasional but regular sanitisation and disinfection is needed depending on the nature of the workplace. Cleanliness of the washrooms and other areas is necessary. Adequate arrangements must be there to ensure that employees could manage hygiene properly. Maintaining a clean and healthy environment is the responsibility of both the employer and the workers. Suitable guidelines and rules should be communicated regarding this and management should ensure that they are obeyed strictly. Controlled access: Certain organisations and enterprises need to ensure authorised access to certain parts of the workplace. For example, everyone cannot go inside an operation theatre. Places like electrical control rooms, centralised machine control rooms, server rooms and specific floors are kept out of reach from the unauthorised personnel to ensure that entire system runs smoothly. Large organisations even practice authorised security card-based access into the working site besides having a detail of security personnel. These measures ensure that untrained, hostile and unwanted persons should not get in. Training the workforce: All the measures for ensuring workplace safety fall flat if workers are not properly aware of them, understand them and acknowledge them. Workers should be informed, educated and trained into following the safety measures laid out by the organisation. Formal means of communication, quarterly safety measures quiz and mock drills, evacuation plans are effective ways to ensure that workers understand and comply with the safety policy and safety rules of the workplace. Exercise 1. Imagine an outdoor or public place such as zoo, railway station, airport, fete etc. List possible safety hazards in such place and what preventive measures could be taken? 2. What safety measures should be in place for the possible hazards and safety threats in a school? 3. What care should you take while working on a computer? 4. You need to create a first aid kit for your classroom and one at home. List the contents of both the FAKs. How will they be different in contents? Session-11 Prevent Accidents and Emergencies Prevention is better than correction. Safety rules and guidelines, if followed by the word, help in Web Applications and Security 191 Information Technology NSQF Level-2
preventing major accidents at workplace. That is why mock drills and reminder quizzes are important. Let us understand some common types of accidents. Slipping: Wet floors, slippery surfaces, edges of the stairs etc. are common places where a person may slip and hurt badly. Anti-slip strips and big warning displays prevent such accidents. The grips on the stairs should be anti-slip. Cleaning staff should clean the floor by putting up warning boards on every possible entrance of the area being cleaned. Tripping over: One must be careful while moving in a cluttered place like maintenance rooms strewn with wires or place with loose rugs. Tripping over sometimes may cause serious accidents as it leads to falling objects and further damage and threat to life. For instance, tripping over the wire of a stand-alone fan causing it to fall down may lead to short circuit. Tripping over can only be prevented through informing all in advance, cordoned off areas, restricted access and suitable warning signs and most importantly being careful ourselves. Falling: Falling down from the ladder, edge, roofing and other such unprotected areas may lead to serious injuries or even deaths in case of dangerous heights. Construction sites, factories, warehouses, go-downs, mining and digging operations are the sites prone to accidents and deaths due to fall. People working at heights should be trained and skilled in doing so, they should be equipped with adequate gears such as safety ropes, helmets, anti-slip gloves and shoes, climbing gear, anti-slip ladders, walkie-talkie, catching nets and arrangements of instant first aid of advanced level. Hit by vehicle or falling objects: People should be careful in places like car parking, moving trucks in a warehouse, loaded truck backing up, fork-lifts moving inside a large warehouse or store, heavy objects kept at height, rail-carts, carriages and even people carrying some heavy object. Warning signs placed at conspicuous points, restricted access, localised, in-house traffic rules, signal controls, suitable announcements on loudspeakers, controlled movement, automatic warning sirens such as backing up warning callout can prevent such accidents. Other common workplace accidents are due to electrocution, tools and machine handling, lifting accidents, common physical injuries and strains, overexertion, inhaling toxic material, crashes, collision and harms due to high decibel noise, dust, smoke and dirt. Major accidents include explosions, fire breakout, leakage of hazardous material, electrical surge and high voltage accidents, mine collapse and underground avalanche, flooding of closed, congested areas, building collapse and machine-related accidents etc. Preventing Accidents Some common preventive measures against accidents at workplaces are listed here. Safety guidelines, rules and their communication: Workplace should be governed by standard as well as specific safety rules. Staff should be communicated formally about them and should also be educated and trained in certain cases through draft policy, email literature, quizzes and mocj drills. Workplaces should be displayed with conspicuous warning signs, directions, safety tips and indicators for any diversions during maintenance. For cases where danger can be anticipated, timely warning should be conveyed to all concerned through most effective channel. One such example is sending an email to all, informing that staff buses will leave early through alternate route due to sudden heavy rainfall and water-clogged roads. Efficient housekeeping should be ensured through trained and skilled staff. Carelessness during cleaning and maintenance are causes of most common accidents. Housekeeping should have clear guidelines for standard tasks and rules for safety. Storage of materials, movement and lifting of heavy objects and use of cleaning equipment should be done in the safest possible manner. Web Applications and Security 192 Information Technology NSQF Level-2
Preventing unauthorised access through restricted entry with the help of ID cards, security checks, digital swipe cards, fingerprint scanners, CCTV cameras, alarm systems and classified, secured areas greatly helps in most of the accidents because it keeps untrained and unwanted hands at bay. Only required and skilled persons access the place who are aware of importance of safety for everyone. Safety guidelines during operations at production floors installed with machines should be followed strictly. Movements around the machines (slow, vigilant and cautious), proper uniform (no loose clothing), adequate gear (helmet, eye guards) and careful operation of the equipment can prevent many accidents. Risk assessment should be done regularly to understand who are at risk, potential dangers and possible losses. Such assessments provide clear picture of the safety quality of the workplace and help in devising effective preventive measures. Identifying safety exits and devising effective evacuation plans are helped by thorough risk assessment. Employing trained and skilful personnel ensures that major safety guidelines are taken care of. Skilled and trained hands are educated in observing safety measures. Regular training of new staff ensures that everyone at workplace knows how to keep self and others safe and what to do when emergency occurs. Discipline, alertness and care are the three basic qualities which help every individual in maintaining common security. Attitude of the people is of importance here. If everyone is motivated and encouraged to follow safety guidelines, observe carefulness in daily operations and show care and concern for others then many mishaps can be avoided. A feeling of responsibility and professionalism needs to be there in working personnel to cooperate in observing safety at workplace. Such attitude strengthens the preventive measures otherwise all kinds of safety measures are not enough to help. Exercise List any 4 different workplaces you might have seen and suggest how common accidents can be prevented there. Buddy System for Workplace Safety This is an industry standard in workplace safety wherein two co-workers are paired as part of safety management practice with the responsibility to ensure mutual safety at work place. The practice of grouping employees so that each member of the work group is observed by at least one other employee in the work group. The primary purpose of the buddy system is to provide instant aid to employees in any emergent situation at workplace. Buddy system is considered an important risk control measure by both government and non- government organisations. Pairing is done among the team members working on a same project or work site. In certain cases, one person is given only the role of ensuring safety. This person is not supposed to carry out the task at hand as it is done by the other partner. This arrangement is mostly used in the work that involves higher risks such as working in hazardous environment and dangerous setup. Generally, both the partners carry out the assigned task while ensuring each other's safety. This system helps in the orientation of a new joiner in the team. The experienced employee guides the new Web Applications and Security 193 Information Technology NSQF Level-2
comer until s/he gets acclimatised with the work environment and risks involved. Later, the newcomer can also play the role of safety-buddy with the same partner. This arrangement gives an opportunity to the experienced employee to test his/her skills in doing the role of the buddy. Buddy system is useful in: · Reducing risk through safety assistance. · Helps in monitoring for possible workplace risks and dangers. · Advising to keep safe from potential exposure to hazards. · Providing rescue assistance during emergency situations · Providing instant help such as first aid, evacuation to safety if the partner is injured. · Raising an alert or alarm to summon help in case of any accident. Emergency Evacuation In the event of any emergency such as fire, flood or any such disaster, an emergency evacuation procedure is a must to ensure that everyone at the workplace is evacuated to safety with least harm possible. Workplaces should set their own standard policies for handling workplace emergencies. Employees should be made aware of the policy and procedures of emergency evacuation. Suitable training, if needed, and regular drills should be scheduled to assess how effective the emergency plans are. Regular drills and training helps in preventing as well as handling an emergency in time. It reduces panic among the people and helps them use their heads instead of adding to chaos. Evacuation plan also helps in eliminating or minimising the risks to injury and life. General Emergency Evacuation Procedure · Alert everyone by activating the nearest alarm and shout the alert clear and loud. Use any other procedure set by the safety policy of the workplace. · In response to the alarm or emergency call/shout out employees should immediately stop all the work and collect personal valuables. · Ensuring one's own safety, one should assist others who might be in immediate danger or need any immediate aid. · Ensuring one's own safety and if necessary, then check or curb any activity that may pose threat, become hazardous or cause damage if left unattended during evacuation. · Comply to the emergency instruction issued by designated control personnel until you reach to the safety. · Assist with the general evacuation if directed to do so by emergency control personnel. · Follow emergency procedures and instruction to provide assistance to disabled, physically challenged, elderly people. · In case of fire, avoid taking elevator to evacuate a building. Use emergency staircase or any stairs for that matter. · Maintain strict discipline, keep calm and stay alert with your mind fully present on the current situation until you reach the evacuation assembly area. · Stay in the evacuation assembly area until the signal of all clear is conveyed by the authority. Web Applications and Security 194 Information Technology NSQF Level-2
Emergency Evacuation Plan Emergency evacuation plan includes: · Floor plans of the building or workplace. · Maps of emergency exit paths. · Location of emergency equipment. System map of electricity connections, generator sites and exits (stairs, doorways, manholes etc. A Sample Evacuation Diagram Emergency and Evacuation Policy An evacuation policy should be in place depending on the type of workplace and nature or work being carried out there. For instance, evacuation policy of a cola mine will be completely different from that of a construction site or a hospital. A standard emergency and evacuation policy: · Clearly states the objectives and commitment regarding ensuring safety of everyone present on the workplace. · Describes any legislative requirement of the policy to address compliance to the local laws and rules regarding safety of the employees. · Includes detailed emergency and evacuation procedures, floor plans, escape route diagrams and evacuation procedures. · Describes the preparation plans, training procedures and general information system in place to educate employees in handling emergencies and be part of evacuation process. Web Applications and Security 195 Information Technology NSQF Level-2
· Lists the findings of the risk assessments and countermeasures of any risks. · Includes the training and drill calendar for regular awareness on the workplace hazards, emergencies and safety procedures. · It states for whom the policy is meant for in what way. (E.g. children, elderly, disabled, patients, management etc.) · Includes work health safety measure observed by the workplace. · Clearly defines specific procedures against each potential emergency. · Describes the control hierarchy of individuals and designated chain of command for emergency procedures to execute along with their duties and powers in such situations. · Includes policy review plan to ensure that policy remains updated over the period of since it is drafted or renewed last. Session-12 Various Workplace Emergencies Work-specific emergencies such as blasts, explosions, spills of hazardous material, breakdown, crash etc. Equipment or machine-related emergencies like sudden injury, cuts or bruises; body-part or cloth stuck in the machinery, accidents related to turbines, boilers and chemical plants; crashes and accidents by moving objects – vehicles, lifts, trolleys and carts etc. Natural calamities also add to emergencies sometimes or increase the chances of accidents, for instance, heavy rainfall at a construction or mining site, earthquakes, extreme temperature conditions (too hot regions, too cold regions) and extreme weather conditions (hurricanes, storms). Civil or behavioural emergencies such as conflict and violence at workplace, strike or hostile crowd, unauthorised access to restricted area, rogue or disgruntled employee, sabotage by competitor or adversaries are some major causes that pose threat to the safety of the work-force. Web Applications and Security 196 Information Technology NSQF Level-2
Health related emergencies can occur at common workplaces like a desk and chair as well as dangerous work environments like chemical plants, mines, oil-rigs and medical research labs etc. Workers in factories may be exposed to smoke, poisonous gases, extreme heat, extreme cold, radiations, intense lighting, high decibel noise and extreme physical exertion. Careful, efficient and regular safety measures can only protect workers from the impending harm. Workspaces during a pandemic: Due to the recent COVID-19 pandemic, the entire world had almost come to a halt. Still, as of this writing, the threat still looms and we are forced to practice strict safety measures since no definite cure has been devised. The workplaces need to be kept safe during this pandemic as the lockdown has been relaxed and world business and economy are resuming back to normal. During this time, safety measures mandated by the government agencies need to be observed strictly such as social distancing, using masks, regular sanitising and following other related safety measures to keep infection at bay. Workplaces need to ensure that employees follow the safety rules strictly and if not there should be suitable penalties to set serious examples. While commuting between our residence and workplace, we need to follow safety guidelines as we move on crowded places and closed places such as buses and other means of public transport. Protect Health and Safety at Work Health is one of the prime concerns for an efficient and productive work-force. Employees with sound health and fitness can give desired output from the assigned tasks and projects. Workplaces that are prone to obvious health-related emergencies need specialised measures of safety. We have discovered earlier some common health related emergencies are smoke, poisonous gases, extreme heat, extreme cold, radiations, intense lighting, high decibel noise and extreme physical exertion etc. Hazards and their sources: Hazards cause physical damage and health related emergencies for the workers. Certain hazards do not seem harmful initially until their prolonged exposure results into evident damages. For instance, prolonged working hours at a desktop computer may lead to physical stress, muscle strain, vision-related ailments and bone-joints related problems. Another instance is exposure of mine workers to a colourless and odourless poisonous gas which slowly damages the lungs or skins causing skin and respiratory disorders. A lung disease called pneumonoultramicroscopicsilicovolcanokoniosis (pro: new-mono-ultra-my-kro-skopic…siliko- volkano-ko-neo-sys) is caused by inhaling fine silica particles of ash or dust in the workers involved in areas like thermal plants, furnaces or places affected by dust-storms and volcano ashes. Some hazards types and sources are listed here: Ergonomic: Incorrect posture, prolonged work hours, improper use of equipment, careless usage and sometimes poor product design lead to damages caused in muscles and body joints. Work environment: Noisy workplaces, poor lighting, inadequate setup of work area, over-crowded places, longer than usual working hours, poor work ethics, work-floor politics, exploitation, bullying, poor work policies and underpaid jobs are the examples of non-conducive work environment which causes distress, physical ailments, poor health, and psychological disorders. Chemical and physical: Exposure to hazardous chemicals in the form of liquids, gases and radiations leads to poisoning, skin diseases, respiratory disorders, vision-related ailments and sometime mortal diseases like cancer and even sudden death. Physical dangers include places that are dangerous for human life which are prone to collapse of walls, sudden fall, crushing under heavy objects, vehicular accidents, electrocution, fire outbreaks, flooding etc. Web Applications and Security 197 Information Technology NSQF Level-2
Countermeasures to Hazards Risk assessment: Analysing and assessing risk factors to identify possible risks and potential dangers help in devising effective safety measures. Emergency plans: Emergency exits and general evacuation procedures should be in place to ensure safety when sudden emergency strikes. Trained personnel and educated staff make the emergency plan execution efficient. Regular checks and tests: Regular monitoring of workplaces, mock drills, quizzes and awareness sessions empower the workers in managing themselves and help others during emergency. Healthy Living Workplace safety is the combined responsibility of the organisation and workers. But, as an individual one should take care of one's health and physical wellbeing. A working person should follow some sort of health discipline and fitness regime. Depending on the nature of work, daily routine and available time, one should devise a plan related to diet, physical health and mental strength. Some common ways to healthy living are listed here: Mild exercises: They help in keeping fit and get rid of physical stress. Yoga, good reading and meditation: These are the ways to keep mental stress at bay and develop a positive mind set. A strong and positive mind develops impressive physical appearance too. Sports, jogging and gym: Some people play some sports, go for jogging or visit gym regularly as a hobby to keep fit. Playing a sport that involves physical exercise, running and any game like chess, sodoku etc. that tweaks one's mental faculties are best practices to stay healthy. Healthy eating: Eating almost everything one likes but in right measure and frequency is the key to healthy eating. Having some sort of discipline in eating brings out good physical results and add to the impressive personality. Avoiding temptations like indulgence in drinking and smoking is good. An occasional cheers is no harm but smoke and joints should be a big and strict no-no! Basic human values: Observing basic human values such as humility, respectfulness, respecting other's perspectives, avoiding fruitless conflicts, being considerate, developing civic sense, clean and good habits make you strong from inside and develop an effective and positive outlook. Exercise 1. How do you ensure a healthy living being a student? 2. What is the importance of safety at workplace? 3. Describe some safety issues at school and how to prevent them? 4. Describe some common safety hazards. 5. What is a first aid kit? What is its significance? What are the contents of a standard FAK? 6. Describe computer related ergonomics? 7. How can we prevent common accidents at workplace? 8. What are various types of workplace emergencies? Describe any 2. 9. What are some health hazards at workplaces? 10. How do sports and basic human values help in healthy living? Web Applications and Security 198 Information Technology NSQF Level-2
Projects Documentation Project 1: School has assigned you the job of a 4 page quarterly school magazine titled - YOUNG INSPIRERS. The magazine describes the achievements of the school. teachers and students every quarter. Design two magazine templates considering different colour themes and designs. Template should allow to insert text, headings, images and various shapes. Think of a few sections and divide the magazine into section breaks accordingly. Each page should have attractive page border. Footers should contain stylish page numbers and header should contain magazine name (except the cover page). Cover page will have a the magazine title in big stylish fonts and text effect. The first page of the magazine is its cover which should look attractive. Project 2: Design a visiting card for your friend mentioning his/ her name, address, designation, company, contact details and a company logo assuming that your friend works in that company as Regional Sales Manager. Spreadsheet You are assigned the task to maintain the following details of all the students in your class. ¤ Academic Performance in percentage in Mid Term and Final Term Exams. ¤ Co-curricular activities performance in terms of grades out of 10 (passing is 4). ¤ Grades out of 20 in sports (passing is 16). Calculate the overall total performance in percentage for all the students.Now, do the following: ¤ Conditional formatting for the cells containing percentage marks so that cells with passing marks or more are displayed in light blue fill colour otherwise light red fill colour. ¤ Create 4 well formatted graphs to show the following: 1. Column chart to show Academic performance of all the students. 2. Line chart to show Co-curricular performance of all the students. 3. Bar chart to show sports performance of all the students. 4. Pie chart to show the overall performance of all the students in all activities. Database Development Assume that your own a bicycle store and deal in bicycles for the following categories: Girl kids, Boy kids, Girl Teens, Boy Teens, Ladies, Gents. Create a database to store the stock details of the bicycles in your shop for the months of January and February as: Bicycle category, month, quantity sold, quantity in stock, sale value. Create a report grouped on the basis of months showing all the details about bicyles. Write queries to display: 1. Details of all the bicycles sorted on the basis of categories. 2. Details of all the Ladies and Gents bicycles sorted in the basis of month. 3. Increase the stock and quantity sold bu 5% for Girl Teens bicycles. Projects 199 Information Technology NSQF Level-2
Search
Read the Text Version
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218