qwertyuiopasdfghjklzxcvbnmqwerty
uiopasdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvbnmq
Rukmani Devi Jaipuria Public School
Project Work
wertyuiopasdfghjklzxcvbnmqwertyui 2024
opasdfghjklzxcvbnmqwertyuiopasdfg
Submitted by-Ahshan Shami , Submitted to Babita Mam, Class-X-Tulip
hjklzxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjk
lzxcvbnmqwertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmqwert
Acknowledgement
I would like to express my special thanks of
gratitude to my Information technology teacher
“Babita mam” for their able guidance and support in
completing my project.
I would also like to extend my gratitude to the
Principal Sir “S.K. Saxena” for providing me with the
facility that was required
Index
Topic Page no.
1.Digital Documentation
1.1.Cyber safety 1
1.2.Mail Merge 2
2.Digital Spreadsheet
2.1.Goal Seeker 8
2.2.Solver 11
3.Database Management System
3.1 .Mysql 12
3.2.Mysql 14
4.Web application And security
4.1 Presentation
4.1.Types of network 22
Q1.Draw a poster in openoffice writer on cyber safety to spread
awareness about Internet security and safety, using templates
features of open office.
Cybersecurity encompasses safegaurding digital assets from
threats.
It relies on multi-layered defenses, including network security,
endpoint protection, and user awareness training .
Stay updated on the latest cyber security threats and best
practices to protect yourself and your devices from evolving
risks.
Practice good cyber hygiene by logging out of accounts after
use, clearing browser history regularly, and being cautious of
what you share online.
Q2 Type a letter inviting your freinds and family to a party hosted by
you. For example, you can host a birthday party or you parents’
anniversary part. Your letter will serve as your letter as a Mail Merge
Letter and do as follows:
Mail Merge feature automatically merges a common text with a
set of data coming from a database to produce unique letters.
Components of Mail Merge
The three main components of mail merge
process are :-
Main Text Document : The Main Text
document contains the main body of our
letters names and merge instructions.
Address database [ Data Source ] :
It stores the information to be brought into
the main document.
The Data Source table contains a column for
each category of information.
Merged document : The Writer uses a mai text
document and an address database to produce
a merged document.
STEPS:
1: GO TO MAILINGS. 2: GO TO SELECT RECIPENTS.
3: CHOOSE TYPE A NEW LIST/ 4:- CHOOSE YOUR DATA SOURCE.
USE AN EXISTING LIST
5: TAP ON OPEN. 6: CLICK ON OKAY.
7: TYPE YOUR LETTER. 8: TAP ONE INSERT MERGE FIELD.
8: CHOOSE YOUR MERGE FIELD 9: THEN TAP ON FINISH & MERGE
IN OUR CASE WE CHOOSE E-MAIL.
10: CHOOSE EDIT INDIVIDUAL 11: CHOOSE YOUR MESSAGE
DOCUMENTS/PRINT DOCUMENTS/ OPTIONS THEN CLICK ON OKAY.
SEND EMAIL MESSAGES
Letter:
Digital Spreadsheet
Q3Using Goal Seek,find out what grades
he needs in the final esxams to paas?
Subjects Marks
Maths 74
Science 85
Hindi 76
English 82
SST 86
Information Technology ?????????
Average 67.1666667
Goal Seek in MS Excel is a built-in tool that allows you to find a
specific input value (such as a cell value) that will produce a desired
result in a formula-driven cell. It's particularly useful for performing
reverse calculations or scenario analysis where you know the desired
outcome but need to determine the required input to achieve it.
Here's a brief overview of how Goal Seek works:
1. Objective: You start with a cell that contains a formula, which produces a
result (output). You want to change the value in another cell (input) so that
the result in the formula cell matches a specific target value.
2. Setup:
o Identify the cell containing the formula (target cell).
o Determine the cell containing the input value you want to adjust
(input cell).
o Specify the target value that you want the formula cell to produce.
3. Using Goal Seek:
o Go to the Data tab in Excel.
o Locate the Forecast group (where Goal Seek is often found).
o Click on What-If Analysis and choose Goal Seek from the
dropdown menu.
o In the Goal Seek dialog box:
Set Set cell to the reference of the formula cell (where your
desired result is calculated).
Set To value to the desired target value.
Set By changing cell to the reference of the input cell (the value
you want to adjust).
o Click OK.
4. Outcome:
o Excel will perform calculations to find and adjust the value in the
input cell so that the formula cell produces the specified target value.
STEPS:1MAKE THE TABLE AND PUT THIS SYNTAX IN AVERAGE COLUMN
STEP:2 GO TO WHAT IS ANALYSIS TOOL AND CHOOSE GOAL SEEKTHEN SET VALUES:SET
CELL :- C15 (IT IS THE REFERENCE CELL)
STEP:3 NOW YOUR VALUES HAVE UPDATED.
Goal Seek is handy for various scenarios, such as determining the required sales
volume to reach a profit goal or finding the interest rate needed to pay off a loan
in a certain number of years. It automates the process of trial and error by
iterating through possible input values until it finds the one that satisfies the
target condition set for the formula cell.
Q4:-Using solver
A student is planning his goals about the marks he should attain in the
fourth coming semester4 examination in order to achieve a distribution
(75%) assuming that the examination of each subject is for 100 marks,
his marks of the previous semester are as follows:-
Ans:-
SOLVER
Solver is an advanced tool in Microsoft Excel designed for optimization and
what-if analysis. It allows users to find the optimal solution for a set of variables
subjected to constraints. Here's a detailed definition and explanation of Solver in
Excel:
Definition:
Solver in Excel is an add-in tool used for solving complex optimization problems
where you need to find the optimal value for a formula in a cell (objective cell)
by varying the values of several input cells, while satisfying specific constraints.
Key Features and Use Cases:
1. Optimization: Solver can maximize or minimize a formula by adjusting
the values in designated cells, subject to constraints. This is particularly
useful for scenarios where you need to maximize profit, minimize cost,
optimize production schedules, etc.
2. Constraints: You can set constraints on the values of certain cells to limit
the allowable solutions. Constraints can include conditions like upper and
lower limits, exact values, or relationships between variables.
3. Multiple Variables: Solver can handle problems with multiple variables
(input cells) and complex relationships between them, making it suitable
for a wide range of mathematical and business optimization scenarios.
4. Solver Parameters:
o Objective: Specify the cell containing the formula you want to optimize
(maximize or minimize).
o Variables: Define the cells that Solver can change to achieve the objective.
o Constraints: Set limits and conditions that must be met for the solution to be
valid.
o Solver Options: Adjust settings related to precision, iterations, and solving
methods based on the complexity of the problem.
How to Access Solver:
To use Solver in Excel (assuming it's not already enabled):
Go to the File tab and click on Options.
In the Excel Options dialog box, click on Add-Ins.
In the Manage box, select Excel Add-ins and click Go.
In the Add-Ins dialog box, check the Solver Add-in checkbox and click OK.
Once enabled, you can find Solver under the Data tab in the Analysis group.
Practical Applications:
Financial Planning: Optimizing investment portfolios, determining loan repayment
schedules.
Production Planning: Maximizing production output while minimizing costs.
Resource Allocation: Allocating resources such as manpower, materials, and time
efficiently.
Strategic Decision Making: Making informed decisions based on mathematical
modeling and analysis.
Subject Subject Subject Subject
1 2 3 4
Semester1 82 67 53 87
Semester2 88 78 76 69
Semester3 89 85 91 67
STEP :1 CALCULATE THE TOTAL NO. AND THE TARGET PERCENTAGE
S STEP:2 CHOOSE WHAT IS ANALYSIS TOOL SOLVER THEN PUT VALUE
S STEP:3 CLICK ON OKAY
NOW YOUR SOLUTON ARE READY!
Ch-3
Database management system
Q5Consider the following table named
“Garment”.Write command of Sql for (1) to (4).
Gcode Gname Size Colour Price
111 T shirts XL Red 1400.00
112 Jeans L Blue 1600.00
113 Skirt M Black 1100.00
114 Ladies XL Blue 4000.00
Jacket
115 Trousers L Brown 1500.00
116 Ladies L Pink 1200.00
Top
(1)To display names of those garments that are available in ‘XL’
size.
(2)To display codes and names of those garments that have
their names starting with ‘Ladies’.
(3)To display garments names,codesnand prices of those
garments that have price in the range 1000.00 to 1500.00(both
1000.00 and 1500.00 included)
(4)To change the colour of garment with code as 116 to
“Orange”.
Ans-
Table:-
(1) Select Gname from Garment where size = ‘XL’;
(2) Select Gcode,Gname from Garment where Gname like
‘Ladies%’;
(3) Select Gname,Gcode,Price from Garment where price
between 1000.00 and 1500.00;
(4) Update Garment set colour = ‘orange’;
Q6:- CONSIDER THE FOLLOWING TABLE:
STUDENT
REGD.NO NAME BRANCH
0001 RAM CSE
0002 HARI MECH
0003 DEEP EEE
0004 DEEPAK ETC
(i)Write a SQL command which wll show the entire STUDENT table.
(ii)Write the SQL command which will show theREGD.NO of pradeep
(iii)Write the SQL command which will show the name and the branch
column.
(iv)Write the SQL command which will count the number of rows existing
in STUDENT table.
(v)I want to add another column in the STUDENT table as “address”. How
can I do that.
ANS
1- select *from STUDENT;
2- select REGDNO from STUDENT where Name = 'Pradeep';
3- select Name,Branch from STUDENT;
4- selectcount(*) from STUDENT;
5- alter table STUDENT add column address varchar(200);
Ch-4
Caring for Your Computer
Q-7Prepare the presentation on the topic “Guard your
system against virus attacks”, to spread the awareness
about preventing computer system against virus attacks.
Ch-5
Web Application and Security
Q8-Types of Computer Network
Ans-:
There are four types of computer network.
1.LAN
Local Area Network (LAN)
Definition: A Local Area Network (LAN) is a network that connects computers and other devices within a
limited geographic area, such as a single building, office, or campus. LANs are used to facilitate
communication and resource sharing among devices within this confined area.
Key Characteristics:
1. Geographic Scope:
o Limited Area: Typically spans a small geographic area such as a home, office, or building. It
is designed for short-range connectivity.
2. High-Speed Connectivity:
o Fast Data Transfer: LANs generally offer high-speed connections with lower latency
compared to WANs (Wide Area Networks). Speeds can range from 10 Mbps to 10 Gbps or
more, depending on the technology used
3. Network Layout: LANs can use various topologies, including:
o Star Topology: All devices are connected to a central hub or switch.
o Bus Topology: Devices are connected to a central cable (less common in modern LANs).
o Ring Topology: Devices are connected in a circular fashion.
o Mesh Topology: Devices are interconnected, allowing multiple paths between nodes.
2.PAN
Personal Area Network (PAN) is a small-scale network that connects devices within a very limited range,
typically within a few meters from an individual. PANs are designed to facilitate communication and data
exchange between personal devices, making them ideal for situations where users need to connect their
gadgets easily and conveniently.
Key Features of PANs:
1. Geographic Scope:
o Limited Range: PANs typically cover a very small area, usually within a range of 1 to 10
meters (3 to 30 feet). This makes them suitable for use in close proximity to the user, such as
within a room.
o
2. Connectivity:
o Device Communication: PANs are used to connect personal devices like smartphones,
tablets, laptops, smartwatches, and other gadgets.
o Wireless and Wired Options: PANs can use both wired (e.g., USB) and wireless
technologies (e.g., Bluetooth, infrared).
3. Common Technologies:
o Bluetooth: A widely used wireless technology for PANs, Bluetooth connects devices such as
smartphones, headphones, and keyboards. It operates in the 2.4 GHz frequency range and
supports various profiles for different types of data exchange.
o Near Field Communication (NFC): A short-range wireless technology used for very close
proximity interactions, such as contactless payments and data exchange between
smartphones.
3.MAN
Metropolitan Area Network (MAN) is a network that spans a larger geographic area than a Local Area
Network (LAN) but is smaller than a Wide Area Network (WAN). It typically covers an entire city or a
large campus, providing connectivity over distances ranging from several kilometers to tens of kilometers.
Key Features of MANs:
1. Geographic Scope:
o Coverage Area:MANs generally cover a metropolitan area or a large city. They can connect
multiple buildings or facilities within the city limits or nearby regions.
2. Purpose:
o Connectivity: MANs are used to connect various LANs within a city or large campus,
facilitating communication and resource sharing across a broader area than a single building
or office.
o High-Speed Communication: Designed to provide high-speed connectivity and handle large
amounts of data over longer distances compared to LANs.
3. Common Technologies:
o Fiber Optic Networks: Often used for high-speed data transmission across a city. Fiber
optics offer high bandwidth and low latency, making them ideal for MANs.
o Microwave Links: Wireless communication technologies that use microwave frequencies to
provide high-speed connectivity over long distances.
o Leased Lines: Dedicated lines provided by telecommunications companies that can be used
to connect different parts of a MAN.
o Ethernet: In some cases, Ethernet technologies are used for MANs, especially with the
advent of Gigabit Ethernet and higher-speed standards.
4. Applications and Use Cases:
o Business Connectivity: Connects multiple office locations, data centers, and branches of a
business within a metropolitan area, facilitating seamless communication and resource
sharing.
o Educational Institutions: Links various campuses or buildings of universities and colleges
to centralize resources and enable collaborative effort
4.WAN
Wide Area Network (WAN) is a telecommunications network that extends over a large geographic area,
such as cities, countries, or even continents. WANs are designed to connect multiple Local Area Networks
(LANs) or Metropolitan Area Networks (MANs) that may be geographically dispersed, allowing for data
exchange and communication across long distances.
Key Features of WANs:
1. Geographic Scope:
o Large Coverage Area: WANs cover extensive geographic areas, ranging from regional to
global scales. They connect networks over distances that can span multiple cities, countries,
or even continents.
2. Purpose:
o Connectivity:WANs facilitate communication between different LANs and MANs, enabling
data exchange, resource sharing, and collaboration across vast distances.
o Integration: Connects various remote offices, data centers, and branches of an organization,
providing a unified network infrastructure.
3. Common Technologies:
o Public Networks: Utilizes public telecommunications infrastructure such as the internet,
which provides connectivity over large distances.
o Private Networks: Uses private leased lines or dedicated connections provided by
telecommunications companies, offering a secure and reliable network.
o Fiber Optics: Provides high-speed data transmission over long distances with low latency
and high bandwidth.
o Satellite Links: Uses satellites to provide connectivity in remote or underserved areas where
other infrastructure may not be available.
o VPNs (Virtual Private Networks): Creates secure, encrypted connections over the internet
or other public networks, allowing remote sites to connect as if they were on a private
network.