PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

This PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS will help you in revision during exams.

PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

First research for DBMS use was held in 1960 which was in the form of small software A U.S. based company N.A. A. (North America Aviation) was created it with the Name of GUAM (Generalize Update Access Method). GUAM was based on small components, different components build it together so it was called a hierarchical structure at that time.

PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

History of DBMS:

From 1960 to 1970 on the basis hierarchical structure several researches was done and in 1967 Conference on Data System Languages (CODASYL) created Task force with the collaboration of the U.S. government and the big business personalities which was called Database Task Force Group(DBTG).

IN 1971 Network Database was developed and later ones from time to time inventions come into existence after the DBMS innovation was done and now we are easily using DBMS in our todays life.

Terminology used in Databases

In databases many technical terms are used. Some of the important terms are as follows :

  1. Attribute: In a database management system, an attribute refers to a database component, such a table. It also may refer to a database field.
  2. Record: A record is a group of fields within a table that reference one particular object. A record is also known as a tuple.
  3. File: Files in computers fields are very similar in features to that of paper documents used in library and office files.
  4. There are many kind of files such as text files, data files, directory files, binary and graphic files, and these different types of files store different types of information.

Data and Information

Data are small raw materials such as character, numbers, pictures etc. After processing on these raw materials we get meaningful information.

PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

Database

Database is a proper arrangement of information. There is no use of unarranged information. Database is a collection of a large amount of data. Dictionary is the best example of data in which all words are arranged in an alphabetical sequence which makes it easier for any word to search.

Computer database is collection of well-arranged records that is stored in the computer. User can obtain the required information from the database. The decision can be taken on the basis of this information. Software called database management system is used to prepare database.

Necessary instructions for designing a good database.

  1. The data must be accurate ,well arranged and complete so it could be easily fetch when required by someone.
  2. While creating database system we have to keep in mind that whether database application is going to use on any website or any other local area network or on both the result must be able to get very fast and accurate.
  3. The database design should be correct.
  4. Database should be design while thinking about the future problem.

Uses of Database System Application:

  1. In banking sector to look after of the account of the customer.
  2. For airline reservation and making schedule of the information.
  3. In universities to fetch information of the students and about the courses.
  4. To create the monthly statement of an organization.
  5. For telecommunication
  6. In finance to store the information of sales and purchase.
  7. In sales to store the information of customers purchased products.
  8. In Manufacturing management to store the information of warehouses.
  9. In human resource to store the employee’s salary bills, payrolls, taxes etc.

PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

File Processing System:

In old approach, before to computer, all information’s were stored on papers. But initial days, these records were stored in the form of files. That’s why this system is Called FILE PROCCESING SYSTEM. This is the way we stored data or record in files is similar to papers, in the form of flat files to be simpler, in notepad.

All files were grouped according to their categories; files uses only related information’s and each file is named properly.

Drawbacks of file processing system

  1. Data Mapping and Access: Although all the related information’s are grouped and stored in different files, there is no mapping between any two files.
  2. Data Redundancy: There were no methods to validate the insertion of duplicate data in file system. Any user can enter any data.
  3. Data Dependence: In the files, data are stored in specific format, say tab, comma or semicolon. If the format of any of the file is changed, then the program for processing this file needs to be changed.
  4. Data inconsistency: This has occurred here, because there is no proper listing of files which has same copies of data.
  5. Security: Each file on computer can be password protected. This is very difficult in the file system.
  6. Integrity: If There is no direct checking facility in the file system. Hence these kinds of integrity checks are not easy in file system.
  7. Concurrent Access: Accessing the same data from the same file is called concurrent access. In the file processing system, concurrent access leads to incorrect data.

DBMS:

The full name of DBMS is data management system. A database management system (DBMS) is system software for creating and managing databases. The DBMS provides users and programmers a systematic way to create, retrieve, update and manage data. The DBMS essentially serves as an interface between the database and end users or application programs ensuring that data is consistently organized and remains easily accessible.

PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

Advantages of DBMS:

  1. When the same data is duplicated and changes are made at one site, which is not propagated to the other site.
  2. Redundancy is controlled in DBMS.
  3. Data is shared by multiple applications or by multiple users in DBMS.
  4. In DBMS there is Restricting unauthorized access to the database.
  5. DBMS Providing Backup and Recovery.
  6. DBMS Solves Enterprise Requirement than Individual Requirement.
  7. DBMS systems provide mechanisms to provide concurrent access of data to multiple users.
  8. In DBMS ,Data Model can be developed.
  9. DBMS is a central system.

Disadvantages of DBMS:

  1. You must have to get training to use the database.
  2. However, the DBMS is written to be more general, to cater for many applications rather than just one. The effect is that some applications may not run as fast as they used to.
  3. Higher impact of a failure so there is every possibility of damaging the data.
  4. An extra hardware is needed.
  5. Conversion, cost is very high of the DBMS, its not easy to move it here and there.
  6. The complexity and breadth of functionality makes the DBMS an extremely large piece of software, occupying many megabytes of disk space.
  7. The cost of DBMS varies significantly, depending on the environment and functionality provided. There is also the recurrent annual maintenance cost.

DBA:

DBA stands for database administrator. DBA should be a person or bunch of persons. Database administrator (DBA) directs or performs all activities related to maintaining a successful database environment. Responsibilities include designing, implementing, and maintaining the database system; establishing policies and procedures pertaining to the management, security, maintenance, and use of the database management system.

Different types of DBA’s according to their responsibilities are as follows:

  1. Administrative DBA
  2. Development DBA
  3. Architect DBA
  4. Data Warehouse DBA

PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

Main Responsibilities of DBA are the following:

  1. DBA has to take care of the Database design and implementation.
  2. DBA will Implement and maintain database security.
  3. DBA is responsible for the Database and application tuning and performance monitoring too.
  4. DBA is responsible to Setup and maintain documentation and standards.
  5. DBA will look upon the plan growth and changes.
  6. DBA have to establish and maintain sound backup and recovery policies and procedures.
  7. DBA decides about which kind of hardware will be in use.
  8. DBA have right to change data according to the needs of user.
  9. DBA fix data validation for the users.

Redundancy:

A very large amount of duplicate data stores frequently in database in duplicate form again and again . This is called data redundancy.
Types of Entities:
In DBMS types of Entities are as follows:
PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS 1
1. Weak entity: Weak entity is that type of Entity that cannot be identified separately by its attribute. Thus, We can say that this Entity is not caused primary key.
2. Strong entity: The entity in which Primary key is used that entity is called strong entity by this data comes distinctiveness.

Entity-Relationship Diagram:

Entity-Relationship Diagram is a way which will help us to we identifying with attributes of an entity we can show it logically. There are several ways to ‘make ER Diagram Two them are as follows of which are used mostly.
1. Dr. Peter Chen
2. James Martin and Clive Finekelstein

PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

Keys in DBMS:

Keys are very important part of database management system.
PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS 2

  1. Super Key: Super key is defined as a set of attributes within a table that uniquely identifies each record within a table. Super Key is a superset of Candidate key.
  2. Candidate Key: Candidate keys are defined as the set of fields from which primary key can be selected.
  3. Primary Key: Primary key is a candidate key that is most appropriate to become main key of the table. It is a key that uniquely identify each record in a table.
  4. Composite Key: Composite Key is the key which consists of two or more attributes that uniquely identify an entity occurrence is called Composite key.
  5. Foreign key: Foreign key is the key in rational database that provide link between two tables because it references the primary key of the another table and it established a link between them.

Normalization:

Normalization is a scientific way in which difficult table is make quite simple in terms of understandable by user. To reduce Redundancy from tables and to reduce database Inconsistency or to remove and to make database strong.

  1. There should be an identifier in each table.
  2. In each table single type of entity should be stored Null.
  3. Value should store at minimum.
  4. Same Values that should take place use less frequently in database.

Normalization Concept: To implement Normalization concept various normal forms are used. Commonly used Normal forms are written as follows:

  1. First Normal Form (INF)
  2. Second Normal Form (2NF)
  3. Third Normal Form (3NF)
  4. Fourth Normal Form (4NF)
  5. Boyce Coded Normal Form

PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

Relationships:

Relationship allow relational database to split and store data in different tables.
PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS 3

Types of relationship are as under

  1. One-to-One: One to one is implemented using single table by establishing relationship between same type of column in table.
  2. One-to-many: One to many is implemented while using two tables with primary and foreign key relationship.
  3. Many-to-Many: Many to Many implemented using a junction table. The keys from both the tables from composite primary key of the junction table.

What is Oracle.

Oracle is world’s larges4 software company, it was founded in 1977 with the name of Relational Software Corporation, and This Company developed first Relational Database Management Software (RDBMS) Oracle in the world.

PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS

SQL:

Structure query language is a high level language which is used to store, control and amend the database.

SQL Advantages:

  1. SQL is not only a high level language even we have to use it for maintain the data, update data and controlling the data.
  2. SQL provides the facility to a user to do work simultaneously in different databases
  3. Program build in SQL is portable means it is very easy to a user to move it anywhere
  4. SQL is an easy and simple language to learn and it use to make tough programs.

DB2:

DB2 is a database product which was design by IBM. It is a relational database management System. DB2 is developed to store, to find to look and to get accurate data from database.

Data Models:

Data model is a way to give us information about the structure of database.
PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS 4
1. Object Oriented logically model: It is used to describe data line by line. It is of five type:

  1. Binary model
  2. Functional Model
  3. Entity relationship model
  4. Object oriented model
  5. Symantic data model

2. Record Base Logical Model: It is also used to describe data line by line but a format is used in it permanently. It is of three types:

  1. Network model
  2. Relational Model
  3. Heirachical Model
    PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS 5

3. Physical Data Model: It has been used to describe data at lowest level of the database. Some parts of it are as follows:
PSEB 9th Class Computer Notes Chapter 4 Introduction to DBMS 6

  1. Entity: Tells about different kind of entities of the database.
  2. Attributes: It tells about the entity of users Name, Address etc.
  3. Entity set: It is the mixture of entity and attributes. Different kind of entity and attributes are store here.
  4. Relationship: It describes about the relationship of the entity which we are using.
  5. Relationship set: Many kind of relationships are used in database but when same kind of relationship bring together at a place it is called relationship set.

PSEB 9th Class Computer Notes Chapter 3 Networking

This PSEB 9th Class Computer Notes Chapter 3 Networking will help you in revision during exams.

PSEB 9th Class Computer Notes Chapter 3 Networking

In networking the computers are connected to each other to share data with each other.

PSEB 9th Class Computer Notes Chapter 3 Networking

Networking:

A network is the group of two or more computers that are linked in order to share resources exchange files, or allow communications.
The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 1

Need for Networking:

The ability to exchange data and communicate efficiently is the main purpose of networking computers. Some of common factors for Networking are:

Networks are used to:
1. Facilitate communication via chat email, video conferencing, instant messaging, etc.
2. Enable multiple users to share a single hardware device.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 2
3. Enable file sharing across the network.
4. Allow for the sharing of software or operating programs.
5. Make information easier to access.
6. Allow Multi users to work together from different locations.
7. Allow Multi users to access the Internet simultaneously
8. Store data centrally for ease of access and back-up.

PSEB 9th Class Computer Notes Chapter 3 Networking

Advantages and Disadvantages of Computer Network:

Advantages of Network:

  1. Sharing files, data and information: We can share data program and different resources with it. It is only possible because all the files are stored on server
  2. Sharing Hardware and software: We can share hardware and software within network easily.
  3. Communication Media: Network provides a very fast communication media
  4. Data Integrity: File integrity remains continuous due to network. It saves much time. Network helps in fast saving and sharing of files.
  5. Cost-effective: We can share costly input and output devices like printer with network . It reduces the cost of system.
  6. Reliability: Network ensures use of many resource to us e.g. when hardware fails, information can be recovered from other computer with the help of network.
  7. Flexibility: It provides more flexibility because in it there is a possibility of connecting devices of different businessmen.
  8. Backup: We can take backup over network.
  9. Security: Network provides security to us.
  10. Speed: Sharing and transferring files within networks is very rapid as compared to mannual transfer.

Disadvantages of Network:

  1. Management: Management of whole network is tough.
  2. Network Failure: All the central facilities may fail due to network failure.
  3. Expensive to Build: Building a network is a serious business in many occasions, especially for
  4. Security: Danger of security is always present on network. Data can be misused on network.
  5. Large scale organizations: Cables and other hardware are very pricey to buy and replace.

Parts of Computer Network:

The purpose of a network is to join computers together. The computers will also need to include software that enables them to connect to the network.

There are two types of computers which are used for networking:
1. Client or Node: Client/Node is the normal computer system which is connected to network for sharing of resources.
2. Server: It is a powerful computer. It helps in sharing of resources or information. It controls all other nodes.
3. NIC: A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 3
It should be fitted in each client and server computer. Every client linked to network interface card has its own specific number is called node address.
There are two types of network cards: wired and wireless!
4. HUB/Switch: A networking hub/Switch is a device that allows you to connect multiple computers to a single network device.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 4
5. Router: A router is hardware device designed to receive, analyze and forward incoming data within a network or to another network.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 5

PSEB 9th Class Computer Notes Chapter 3 Networking

Networks Topologies:

The term Topology refers to the way in which the various nodes or computers of a network are linked together. It describes the actual layout of the computer network hardware.

It may be depicted physically or logically. Physical topology is the placement of the various components of a network, including device location and cable installation, while logical topology illustrates how data flows within a network.

The following factors are considered while selecting a topology:

  1. Cost
  2. Reliability
  3. Scalability
  4. Bandwidth capacity
  5. Ease of installation
  6. Ease of troubleshooting
  7. Delay from one node to another.

Topologies:

While making a selection of a particular topology we consider the relative status of different devices that are to be linked.

The nodes in a network can have following two relationships:
1. Peer to Peer: In this relationship, all the devices in the network have equal status in sharing the link.
2. Client-Server (Primary-Secondary): In this, one device controls the traffic and all other devices transmit through primary device.

Types of Network Topologies:

PSEB 9th Class Computer Notes Chapter 3 Networking Notes 6

1. Bus Topology: Bus Topology is the simplest of network topologies. In this type of topology, all the nodes (computers as well as servers) are connected to the single cable (called bus), by the help of T- connectors. This central cable is the backbone of the network and is known as Bus (thus the name). A signal from the source is broadcasted and it travels to all workstations connected to bus cable.

PSEB 9th Class Computer Notes Chapter 3 Networking

Advantages of Bus Topology:

1. Any new computer can be attached easily.
2. It is a cheaper topology.
3. If one computer fails, others are not affected.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 7
4. Cable required is least compared to other network topology.
5. Used in small networks.
6. It is easy to understand & connect

Disadvantages of Bus Topology:

  1. More wire is needed to connect more nodes,
  2. If the main central line fails the entire network collapses.
  3. The efficiency of network is reduced with the increase in number of computers.
  4. Cable has limited length.
  5. It is slower than the ring topology. .
  6. Terminators are required at both ends of the backbone cable
  7. Difficult to identify the problem if the entire network shuts down

PSEB 9th Class Computer Notes Chapter 3 Networking

2. Ring Topology:

In it all the computers are logically linked in the form of a ring. In it each node is connected to two other nodes. Rings can be unidirectional, with all traffic travelling either clockwise or anticlockwise around the ring.
There are two kinds of ring topologies :
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 8
1. Single Ring
2. Dual Ring

Advantages of Ring Topology:

  1. Very orderly network where every device has access to the token and the opportunity to transmit
  2. Performs better than a bus topology under heavy network load
  3. Does not require a central node to manage the connectivity between the computers
  4. It is easier to locate the problems with device and cable i.e. fault isolation is simplified. If one device does not receive a signal within a specified time, it can issue an alarm.

Disadvantages of Ring Topology:

  1. Failure of one computer can affect the total network
  2. Difficult to troubleshoot
  3. Adding or removing Computers disrupts the network
  4. A ring network requires more cable than a bus network.

3. Star Topology:

In this type of topology all the computers are connected to a hub, a router or a switch. This hub/switch is the central node and all others nodes are connected to the central node. The computers present in star topology cannot have a direct relation with each other.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 9

Advantages of Star Topology:

  1. It is easily to prepare and connect.
  2. It is easier to find faults in network.
  3. More nodes can be connected in it. With it propagation delay does not increase.
  4. Easy to setup and modify.
  5. Easy to troubleshoot.
  6. Failure of one computer does not effect the other.

Disadvantages of Star Topology:

  1. Performance and as well number of nodes which can be added in such topology is depended on capacity of central device.
  2. Cost of installation is high
  3. Failure of hub results in failure of complete network.

PSEB 9th Class Computer Notes Chapter 3 Networking

4. Mesh Topology:

1. In mesh topology, each node is connected to every other node in the network.
2. A mesh topology can be a full mesh topology or a partially connected mesh topology.
3. In a full mesh topology, every computer in the network has a connection to each of the other computers in that network.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 10
4. In a partially connected mesh topology, at least two of the computers in the network have connections to multiple other computers in that network.

Advantages of Mesh Topology:

  1. In the event that one of those nodes fails, network traffic can be directed to any of the other nodes.
  2. Even if one of the components fails there is always an alternative present. So data transfer doesn’t get affected.
  3. Data can be transmitted from different devices simultaneously. This topology can withstand high traffic.
  4. Expansion and modification in topology can be done without disrupting other nodes.

Disadvantages of Mesh Topology:

1. Installation and configuration is difficult.
2. Cabling cost is more.

5. Tree Topology:

A tree network is a combination of two or more star networks connected together which involve a variety of single nodes connected to a central node.

Advantages of Tree Topology:

1. It is an extension of Star and bus Topologies, tree topology is the best alternative.
2. Expansion of Network is possible and easy.
3. The whole network can be easily managed and maintained.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 11
4. Error detection and correction is easy.
5. If one segment is damaged, other segments are not effected.

PSEB 9th Class Computer Notes Chapter 3 Networking

Disadvantages of Tree Topology:

  1. Tree topology, relies heavily on the main bus cable.
  2. Scalability of the network depends on the type of cable used.
  3. As more and more nodes and segments are added, the maintenance becomes difficult.
  4. It has higher cabling cost in setting up a tree structure.

6. Hybrid Topology:

A hybrid topology is a type of network topology that uses two or more other network topologies, including bus topology, mesh topology, ring topology, star topology, and tree topology. It is two different types of topologies which is a mixture of two or more topologies.

Advantages of Hybrid Topology:

1. Reliable as Error detecting and troubleshooting is easy.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 12
2. Effective.
3. Scalable as size can be increased easily.

Disadvantages of Hybrid Topology:

1. Complex in design.
2. Costly.

PSEB 9th Class Computer Notes Chapter 3 Networking

Data Communication:

Data communication is exchange of data between two or more computers with the help of communication medium. The device that transmits the data is known as sender and the device that receives the transmitted data is known as receiver.
Data communication must fulfil/obey following three conditions:
1. Delivery: Network should deliver the data at proper place.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 13
2. Accuracy: Data communication should be free from fault.
3. Time limit: Data should reach destination without any delay.

Components of Data Communication

  1. Sender: Sender prepares information (data) and sends it.
  2. Medium: It carriers the information from sender to receiver.
  3. Receivers: Receiver receives the information.
  4. Protocol: There are rules under which data transmission takes place between sender and receiver.

Methods of data transmission:

Three methods of data transmission are given below:
1. Simplex: In it communication is one direction. The message source works as the transmitter. It sends the message over the data channel to the receiver. The receiver is the destination of the message.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 14

2. Half duplex: In it information can flow in both directions but not at the same time. In other words if information is sent by one system then second can only receive it or vice versa
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 15

3. Full duplex: In it information can move in both directions at same time. It provides fast communication.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 16

PSEB 9th Class Computer Notes Chapter 3 Networking

Communication Channel:

Communicating data from one location to another requires some form of pathway or medium. These pathways, called communication channels, use two types of media: cable (twisted-pair wire, cable, and fiber-optic cable) and broadcast (microwave, satellite, radio, and infrared).

Types of Networks:

Network may be small or large based on it size, complexity and Distribution area. On the basis of its area of distribution, network is divided into three parts :

  1. PAN(Personal Area Network)
  2. LAN (Local Area Network)
  3. MAN (Metropolitan Area Network)
  4. WAN (Wide Area network)

1. Personal Area Network: A personal area network, or PAN, is a computer network organized around an individual person. This could be inside a small office or residence. Personal area networks can be constructed with cables or be wireless. It refers to the interconnection of information technology devices or gadgets (include laptop computers, PDAs, cellphones, printers) within the environment of an individual user (typically within 10 meters).
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 17

2. Local Area Network (LAN): A LAN is a network that is used for communicating among computer devices, usually within an office building or home. LAN’s enable the sharing of resources. Such as files or hardware devices that may be needed by multiple users. It Is limited in size, typically spanning a few hundred meters, and no more than a mile.

It Requires little wiring, typically a single cable connecting to each device. It has lower cost compared to MAN’s or WAN’s. LAN’s can be either wired or wireless. Twisted pair, coax or fiber optic cable can be used in wired LAN’s. It is suitable to bus, ring or star topology. In it generally coaxial Cable, twisted pair and optical fiber etc. transmission media is used.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 18

3. Metropolitan Area Network (MAN): It is distributed to a city or large area. In it many LANs are connected. A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities. .A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organization. A MAN often acts as a high speed network to allow sharing of regional resources, A MAN typically covers an area of between 5 and 50 km diameter.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 19

4. Wide Area Network (WAN): WAN covers a large geographic area such as country, continent or even whole of the world. WAN can contain multiple smaller networks, such as LANs or MANs. In this network telephone lines, satellite, microwave etc. media are used. These transmission media are linked with Router.
PSEB 9th Class Computer Notes Chapter 3 Networking Notes 20

PSEB 9th Class Computer Notes Chapter 7 E-Governance

This PSEB 9th Class Computer Notes Chapter 7 E-Governance will help you in revision during exams.

PSEB 9th Class Computer Notes Chapter 7 E-Governance

“Governance” means The process of decision-making and the process by which decisions are implemented. Various factors are involved in governance. Government is one of the actors in governance. Other actors involved in governance vary depending on the level of government.

It’s not about making ‘correct’ decisions, but about the best possible process for making and implementing those decisions.

PSEB 9th Class Computer Notes Chapter 7 E-Governance

Main Characteristics of Good Governance:

  1. Good governance is answerable to the community,
  2. Good governance is transparent.
  3. Good governance follows the rule of law.
  4. Good governance is responsive.
  5. Good governance is effective and efficient in implementing decisions and follows processes.
  6. Good governance is participatory.

History and development of E-governance:

In India E-Governance originated during the seventies. The ICT was used to manage data related to elections, census, tax administration etc. After that, with the efforts of the National Informatics Center (NIC) all the district headquarters were connected during the eighties. From the early nineties, e-governance has used IT for wider sectoral applications with emphasis on reaching out to rural areas.

Earlier, a talk between a citizen and the Government takes place in a government office. But with the advancement of Information and Communication technologies, work culture of government offices has enhanced. Information and Communication Technologies has made it possible to locate service centers near to clients.

Such centers may consist of an unattended kiosk in the government agency, a service kiosk located close to the client outside the government agency, or the use of a personal computer at home or office.

In all the cases public traditionally look for information and services addressing his/her needs. In both cases quality and efficiency are of great importance. Therefore, the establishment of e-Govemance requires a good knowledge of the needs that exist in the society and that can be offered using ICT.

Due to widespread demand of E-govemance and exponentially increasing size of data, new technologies Hke Open source solutions and cloud computing need to be used in working of government. Today, electricity, water, phone and all kinds of bills can be paid over the internet. All these work is what government and citizens are using and doing. All ‘this dependents on internet and when citizens depends on government internet services all that come is E-Govemance.

PSEB 9th Class Computer Notes Chapter 7 E-Governance

E-governance:

Online working of a government or providing its services online to its citizens at their door step is known as E-Govemance. In other words, E-Govemance means online availability of government services.

E-Govemance has made the working of government more efficient andmore transparent to its citizens. Success or failure of any government depends on three things:

  1. The way the government works.
  2. Transparency in its working and information.
  3. Communication to its citizen.

In E-Govemance, government use of internet technology to communicate and provide information to common peoples and businessman.

There are four pillars of E-Governance:

  1. Connectivity: Connectivity is required to connect the people to the services of the government.
  2. Knowledge: The knowledge here is referred to as IT knowledge.
  3. Data Content: To share information over the internet, government possesses its database which should have the data content related to government services.
  4. Capital: Capital is referred to money used by government to provide their services.

Objectives of E-Governance:

The two main objectives of e-governance are:
1. To satisfactorily fulfil the public’s needs and expectations by simplifying their interaction with various online services.
2. To facilitate a speedy, transparent, accountable, efficient and effective process for performing government administration activities.

E-Governance models:

These four models of e-governance are as:

  1. Government to citizens (G2C)
  2. Government to government (G2G)
  3. Government to employees (G2E)
  4. Government to businessman (G2B)

PSEB 9th Class Computer Notes Chapter 7 E-Governance 1

PSEB 9th Class Computer Notes Chapter 7 E-Governance

1. Government to citizens (G2C):

This model of e-govemance refers to the government services which are shared by citizens. In this model, citizens visit to the links of services that they want to use. This model strengthens the bond between government and its citizen. Type of services which are provided by this model includes:-

  1. Payment of online bills such as electricity, water, telephone bills etc.
  2. Online registration of applications.
  3. Copies of land-record.
  4. Online filling of complaints.
  5. Availability” of any kind of online information.

2. Government to government (G2G):

This model refers to the services which are shared between the governments. These types of services or information are as:

  1. Sharing of information between police department of various state.
  2. Government document exchange which includes preparation, approval, distribution, and storage of ail governmental documents, is also done through e- governance.
  3. Most of the finance and budget works are also done through e-governance.

3. Government to businessmen (G2B):

It is used by businessmen to communicate to the government. Type of services which are provided by this model includes:-

  1. Collection of taxes.
  2. Rejection and approval of patent is done by this model.
  3. Payment of all kind of bills and penalty.
  4. Sharing of all kind of information, rules and data.
  5. Complaints or any kind of dissatisfaction can be shown by this.

4. Government to employees (G2E):

This model increases the transparency between government and its employee. Information that can be shared by this model:

  1. All kind of data submission (attendance record, employee record etc.) from various government offices is done by this model.
  2. Employee can file all kinds of complaints and dissatisfaction by this model.
  3. All kind of rule- regulation and information for employees can be shared by this.
  4. Employees can check their payment and working record.
  5. Employees can register all kind of working forms online.

PSEB 9th Class Computer Notes Chapter 7 E-Governance

Areas of E-governance:

Today area of e-governance is very wide. E-Governance is implemented by government in almost every field.

I. E-Governance in urban areas:

1. Transportation

Services provided by e-governance in this area are:

  1. Issue of learner licensees, Issue of driving licenses, Renewal of driving licenses etc.
  2. To provide transport-related facilities online.
  3. For online bookings, cancellation of seats, for enquiry about departure of buses, availability of seats and buses etc.
  4. Issuance of Time Table of buses.
  5. Provision of booking facility for Interstate transport.
  6. Transportation Improvement Program.
  7. Regional Transportation Plans.
  8. Congestion Management Process.
  9. Transportation Demand Management.

Various projects such as

  • IRCTC (Indian Railway Catering and tourism Cooperation ltd.) Offers online rail ticket booking, and checking of ticket reservation status.
  • HRTC (Himachal Road Transport Corporation project) is for online bookings, cancellation of seats, for enquiry about departure of buses, availability of seats and buses etc.

2. Online payment of bills and taxes

Services provided by e-govemance in this area are :

  1. Online Transactions such as payment of license fees, university fees, etc.
  2. Payment of Bill such as online payment of electricity and water bills,utility bills, to avail of trade licenses and transact on government matters at these facilities. ‘
  3. Payment of taxes such as online payment of motor vehicle taxes, revenue taxes,
  4. Payment of house EMIs.

Various Projects such as

  • SAMP ARK by Chandigarh government.
  • E-Suvidha by the government of Uttar Pradesh.
  • E-SEVA (Electronic seva) by Andhra Pradesh.
  • E-Mitra by the Government of Rajasthan

PSEB 9th Class Computer Notes Chapter 7 E-Governance

3. Information and public relation key services:

With these kinds of projects people can get any kind of information with just a single click are as under :
1. Information about vacancies, tenders and market rates etc.
2. Village e-mail etc.

Various projects such as
1. LokMitra by the government of Himachal Pradesh.

4. Municipal services

Services provided are as:

  1. House Tax Assessment, Billing and Collection.
  2. Maintaining records of Land & property. Certificates like Land sale Permission, Legal heir certificate.
  3. Issue of Passport Verification Certificate.
  4. Issue of Death and BirthCertificates.
  5. Registration & Attorneys of properties such as computerization of the Document registration work at Sub Registrar Office.
  6. Provide services such as issuance of certificates, issuance of orders in respect of Social Security Schemes such as old age pension, widow pension, freedom fighter pension etc.
  7. Review and approval authority for site plans

Various projects such as

  • SDO Suite by Assam government.
  • Rural Digital Services.

5. Roads and traffic management

Services provided by this type of e-governance is :

  1. Network of Roads & Bridges.
  2. Road construction and their maintenance.
  3. Traffic Management.

Safety, Accident and pollution control.arious projects such as
1. RSPCB (Rajasthan State Pollution Control Board) by Govt, of Rajasthan.

PSEB 9th Class Computer Notes Chapter 7 E-Governance

II. Areas of e-governance in rural areas

In rural areas e-govemance has its very powerful impact.
1. Agriculture:
Following are the projects used in Agriculture.
1. AGMARKNET: It is a project approved by Department of Marketing & Inspection (DMI), Ministry of Agriculture, and the Government of India.
2. SEEDNET: It is a SEED informatics network under ministry of Agriculture, Government of India.

2. Local information:

For local information such as personal information, prices of seeds, fertilizers, loan rates etc.
Various projects such as
1. E-Aadhar
2. E-JanSampark

3. Disaster management:

To deal with these disasters, much state government has started e-governance service for this.
Project in this area are:
1. Chetana by the state of Bihar is a Disaster management system which has been started to deal with natural disasters such as flood and earthquake.

4. Land record management:

By facilitating e-governance service in this area, millions of land records can be maintain in a very short time span.
Projects in this area are :

  1. Land Records Management System State Government of Punjab.
  2. Devbhoomi State Government of Uttarakhand.
  3. Bhu-Lekh UP State Government of Uttar Pradesh.
  4. E-Dhara State Government of Gujarat.

5. Panchayat:

Services provided by e-governance in this area are:

  1. Issue of Birth/Death certificate.
  2. Application for inclusion of name in Voter list.
  3. Conducting various welfare schemes for the poor and needy sections of the society.
  4. Preparing district wise planning, implementing those plan, and review for success.
  5. To provide wage employment to the needy from amongst the poorest section of the rural society.
  6. Rural water supply and sanitation.

PSEB 9th Class Computer Notes Chapter 7 E-Governance

Various projects:

1. E-GramViswa Gram Project by Gujarat.

III. E-governance in Health

Service provided by these projects are as:

  1. Availability of medicines.
  2. Special health camps.
  3. Facilities at Anganwadi centers.

Various projects are:

  • Hospital OPD Appointment:
  • Online Vaccination Appointment for International Traveler:

IV. E-governance in Education

Providing basic education (elementary, primary, and secondary) to children.

  1. Providing computer education to children.
  2. Results for 10th& 12th classes.
  3. Information on eligibility for “Distribution of books” scheme.

Various projects are:
Online Scholarship Management System such as Ashirwad portal by Punjab Government.

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

This PSEB 9th Class Computer Notes Chapter 6 Internet Applications will help you in revision during exams.

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

Internet allows us to use many services like Internet Banking, Online Shopping, Online Ticket Booking, Online Bill Payment, emaihetc.

Internet provides concept of electronic commerce that allows the business deals to be conducted on electronic systems

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

Email:

Email, short for “electronic mail,” It is one of the most widely used features of the Internet, along with the web. It allows us to send and receive messages to and from anyone with an email address, anywhere in the world.

Gmail:

‘Google Mail’ or ‘Gmail’ is a free email service provided by Google. You can send and receive emails, block spam, create an address book, and perform other basic email tasks.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 1

Creating new account:

In this, we’ll study about how to get started with email by creating an account in Gmail.
Follow these step-by-step instructions to create a Gmail account
1. Open up our internet browser.
2. Type address. WWW.gmail.com

3. Create Google Account
The ‘choose our username’ is the unique email address that we wish to use, which will be placed before ‘@gmail.com’.
1. Type password
2. Then fill your birth date (Month, Day, Year)
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 2
3. Fill your Gender (Male/Female)
4. Mobile phone number and any other e-mail address(if exist)
Once we have completed this page fully, clicking Next Step will take us to the next Page.
Click “Continue to Gmail” to go to our inbox and get started.

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

Captcha Code:

A CAPTCHA is a type of test used in computing to determine whether or not the user is human.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 3
A CAPTCHA is a program that protects websites by generating and grading tests that humans can pass but current computer programs cannot.

How to send and receive E-mail?

To send an email, click “Compose Mail” located above the folder list. An entry form appears in the Gmail interface.

The recipients: In the “To:” box, type the address of the person we want to write to.
To view the “Cc:” tab click “Add Cc”. Cc means “carbon copy”, type here the addresses of people who are not the main recipients of the message, but we still want to send a copy to.

To view the “Bcc:” tab click “Add Bcc”. Bcc stands for “Blind carbon copy “, type here the addresses of people we want to send a copy of the mail to, without the other recipients knowing.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 4

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

The subject

In “Subject:”, enter the subject of the email.
When we finish typing our mail, click the “Send” button to send it immediately or on the “Save” button to save as draft.

Attach file(s)with email message:

In the new message window, click the paperclip icon to add an attachment. Find and click on the folder or files we wish to attach, then click “Open” and we should see the attachment added to our message.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 5

Google Apps:

Google Apps is a suite of Web-based applications from Google that includes e-mail, calendar, word processing, spreadsheet and presentations.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 6

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

1. Google Calendar

Google Calendar is a time-management web application and mobile app created by Google. Google Calendar allows multiple calendars to be created and shown in the same view. Each can be shared, either read-only or with full edit control, and either with specified people or with everyone.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 7

2. Google Maps

Google Maps is a desktop web mapping service developed by Google. It offers satellite imagery, street maps, 360° panoramic views of streets (Street View), real-‘time traffic conditions (Google Traffic), and route planning for traveling by foot, car, bicycle (in beta), or public transportation.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 8

3. Translate

Google Translate is a free multilingual statistical machine translation provided by Google to translate text, speech, images, or real-time video from one language into another.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 9

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

4. Google +

Google+ (Google Plus) is Google’s attempt at social networking. The Google+ service that delivers functionality and many features similar to those of Facebook.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 10

5. Google Docs

Google Docs is an online word processor that lets you create and format text documents and collaborate with other people in real-time.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 11

6. Google Sheets

Google Sheets is an online spreadsheet app that lets you create and format spreadsheets and simultaneously work with other people.

7. Google Slides

Google Slides is an online presentations app that allows you to show off your work in a visual way.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 12

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

8. Play Store

Google Play is Google’s online store for purchasing and downloading apps, music, books, movies and similar content for use on Android-powered smartphones, tablets, Google TV and similar devices.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 13

Google Drive

Google Drive is a service offered by Google that allows us to store and share files online.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 13

Benefits of Google Drive:

  1. Google Drive lets us send large files directly from our Gmail account.
  2. Google Drive allows us to access our files remotely.
  3. Google Drive has its own mobile application which gives us access to our files on our iPhone or smartphone.
  4. Google Drive allows us to find content easily with a keyword search.
  5. Google Drive is equipped with an OCR (optical character recognition) function, which allows us to search for words or expressions in scanned documents.
  6. Google Drive allows users to open various types of files.
  7. All the facilities described above are free.

How to share file(s)?

1. Open Drive, or a file or folder we want to share.
2. Open the sharing box:

  • While we have a file open: Click Share in the top-right comer.
  • While we have a folder open: Click the share icon in the top-right.
  • From our file list in Drive: Select the name of a file or folder and click the share icon at the top.

3. Under “People” in the sharing box, type the email addresses of the people or Google Groups we want to share with.
PSEB 9th Class Computer Notes Chapter 6 Internet Applications 15
4. Choose the type of access we want to give -these users by clicking the dropdown arrow to the right of the text box:

  • Can edit: Users can edit the file or folder and share it with others.
  • Can comment: Users can view and add comments to the file, but can’t edit it.
  • Can view: Users can see the file or folder but can’t edit or comment on it

5. Click Done. The users will receive an email letting them know we’ve shared the file or folder with them.
6. If we want to share multiple files at once, add the files to a folder in Drive and then share the entire folder with the people we want to see the files.

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

How to download software?

The same basic steps apply to most downloads:

  1. Click the link.
  2. Choose open or save.
  3. Confirm the download.
  4. rim or open the download.

Internet in Media

TV, radio and the Internet used to be completely separate things, but that’s no longer true with today’s technology. We can now watch TV shows on our computer, connect to the Internet on many.

1. On Line Newspaper:
Online newspaper is the online version of a newspaper, either as a stand-alone publication or as the online version of a printed periodical.

2. Online TV channels, Radio, Live programs(Streaming Media)
Online radio is the distribution of audio broadcasts over the Internet. There are thousands of Internet radio stations that can be streamed to a software media player in a computer, mobile device, stand-alone Internet radio, media hub or media server.

What is Cloud?

The term ‘Cloud’ refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location.
Applications such as e-mail, web conferencing, customer relationship management (CRM) execute on cloud.
Cloud networking refers to manipulating, configuring, and accessing the hardware and software resources remotely. It offers online data storage, infrastructure, and application.

PSEB 9th Class Computer Notes Chapter 6 Internet Applications

Cloud Printing:

Cloud Printing enable users to print documents and other materials on any device associated with the cloud (network). Users create content with any softwarefool they want and transfer the file to a cloud printing service provider via whatever device they choose, which then routes the file to a cloud-attached printer at a location selected by the user.

Internet Security:

The Internet is indeed private and secure, but there are a number of serious security risks.

1. Virus/Anti-virus:
A computer virus is a computer program that replicates itself into other computer programs and can cause damage to a computer’s software, hardware or data.

2. Spyware:
Spyware is a program installed on our computer that sends information about us and how we use our computer to a third party, typically without we being aware this is happening. Spyware often enters our system when we install some type of free software from an untrusted source.

3. Trojan:
A Trojan horse, often shortened to Trojan, is a type of malware designed to provide unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses being installed on a machine since they allow the computer to be controlled by the Trojan creator.

4. Phishing Scams:
Phishing is an e-mail fraud method in which the wrongdoer sends out legitimate-‘looking email in an attempt to gather personal and financial information from recipients.

5. Digital Signature:
Digital Signature is a digital code which is attached to an electronically transmitted document to verify its contents and the sender’s identity.

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

This PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II will help you in revision during exams.

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

A chart is a tool that is used to communicate data graphically. A chart can allow knowing the meaning behind data.

Charts:

Excel has various types of charts, so we can choose one that most effectively represents our data.

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

Types of Chart:

  1. Pie Chart
  2. Column Chart
  3. Line Chart
  4. Bar Chart
  5. Area Chart
  6. Scatter Chart.

Create a Chart

To create a line chart, the steps are as follows:
1. Type the data in our excel worksheet.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 1
2. Select the range.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 2
3. On the Insert tab, in the Charts group, choose Line, and select Line with Markers.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 3

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

Change a chart type

We can easily change a chart type at any time. Following are the steps to change a chart type:
1. Select the chart.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 4
2. On the Insert tab, in the Charts group, choose Column, and select Clustered Column.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 5

Switch Row/Column

1. Select the chart. Chart Tools contextual tab is activated.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 6
2. On the Design tab, click Switch Row/ Column.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 7

Add chart Title

1. Select the chart.
2. On the Layout tab, click Chart Title, Above Chart.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 8
3. We will see a caption (Chart Title) above our chart. Enter our desired title.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 9

Elements of a Chart

  1. Chart area: A chart area contains everything inside the chart window, including all parts of the chart.
  2. Data marker: A data marker is a symbol on the chart that represents a single value in the worksheet. A data marker can be a bar in a bar chart, a pie in a pie chart, or a line on a line chart.
  3. Data series: It is a group of related values such as all the values in a single row in the chart.
  4. Axis: It is a line that is used as a major reference for plotting data in a chart.
  5. Tick mark: It is a small line intersecting an axis. A tick mark indicates a category, scale, or chart data series.
  6. Plot area: It is the area where our data is plotted and it includes the axes and all markers that represent data points.
  7. Gridlines: These are the optional lines extending from the tick marks across the plot area.
  8. Chart text: It is a label8- or title that we add to our chart. Attached text is a title or label that is linked to an axis such as the Chart Title.
  9. Legend: It is a key that identifies patterns, colors, or symbols associated with the markers of a chart data series. The legend shows the data series name corresponding to each data marker

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

Equations and Symbols

How to insert equations, symbols and special characters in excel:

Excel makes it easy to enter symbols, such as foreign currency marks, as well as special characters, like trademark and copyright symbols, into cells. These symbols are available in the Symbol dialog box.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 10
1. Click the Insert tab and then click the Symbol button in the Symbols group. The Symbol dialog box appears.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 11PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 12
2. Select the desired symbol on the Symbols tab; or click the Special Characters tab and select the desired character.
3. Click Insert to insert the symbol or character.
4. Click close when we’re done adding symbols and special characters. The inserted symbols or characters appear in the worksheet.
5. Press Enter to complete the cell entry.

Pivot Table:

Insert Pivot Table

The data in a worksheet can be easily managed by using PivotTables. We can summarize the data. Pivot Table allows us to manipulate it in various ways. PivotTables are very helpful tool when we have to deal with large and complex spreadsheets.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 13
A PivotTable is very helpful in doing these calculations. We can do calculations and summarize the data in a way that’s not only easy to read but also easy to manipulate.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 14

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

How to create a PivotTable:

1. Select the table or cells – including column headers – containing the data we want to use.
2. From the Insert tab, click the PivotTable command.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 15
3. The Create PivotTable dialog box will appear. Click OK.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 16

Add fields to the Pivot Table:

1. Before using Pivot Table, first of all we’ll need to decide which fields to add to the PivotTable. Each field is a column header from the source data.
2. In the Field List, place a check mark next to each field we want to add.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 17
3. The selected fields will be added to one of the four areas below the Field List.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 18
4. The PivotTable now shows the change.

Data Tools:

Data Tools are simply tools which make it easy to manipulate data. Some of them are used to save our time by extracting or joining data and others perform complex calculations on data.

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

Convert Text to Columns:

Steps are as follows:
1. Type the data in our worksheet as:
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 19
2. Select the range with full names.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 20
3. On the Data tab, click Text to Columns.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 21
4. Choose Delimited and click Next.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 22
5. Clear all the check boxes under Delimiters except for the Comma and Space check box.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 23
6. Click Finish.

Data Validation:

Data validation is a powerful feature that is used to set up certain rules to dictate what can be entered into a cell.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 24

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

How to Create Data Validation Rule:

To create a data validation rule, the steps are as follows:
1. Type the data in our excel worksheet.
2. Select cell D2.
3. On the Data tab, click Data Validation.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 25
1. In the Allow list, click Whole number.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 26
2. In the Data list, click between.
3. Enter the Minimum and Maximum values.
Input Message: Input messages appear when the user selects the cell and tell the user what to enter.

On the Input Message tabas below do the following:
1. Check ‘Show input message when cell is selected’.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 27
2. Enter a title.
3. Enter an input message.

Error Alert:

If users ignore the input message and enter a number that is not valid, we can show them an error alert.
On the Error Alert tab do the following:
1. Check ‘Show error alert after invalid data is entered1.
2. Enter a title.
3. Enter an error message.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 28
4. Click OK.

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

Data Validation Result:

To check our Data Validation result follows the steps as below:
1. Select cell C2.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 29
2. Try to enter a number higher than 10.

What-If Analysis:

What-If Analysis in Excel allows us to try out different values (scenarios) for formulas. In MS Excel a scenario is a set of values that saves and can substitute automatically on our worksheet.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 30
1. On the Data tab, click What-If Analysis and select Scenario Manager from the list.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 31
2. The Scenario Manager Dialog box appears.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 32
3. Type a name, select cell and click on OK.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 33
4. Enter the corresponding value and click on OK again.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 34
5. Next, add 4 other scenarios.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 35

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

Scenario Summary:

After creating your required Scenarios, to easily compare the results of these scenarios following are the steps below:
1. Click the Summary button in the Scenario Manager.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 36
2. Next, select cell for the result cell and click on OK.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 37

Goal Seek?

The goal seek function is a part of what-if analysis tool set. It allows a user to use the desired result of a formula to find the possible input value necessary to achieve that result.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 38
3. Type a name, select cell and click on OK.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 39
4. Enter the corresponding value and click on OK again.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 40
5. Next, add 4 other scenarios.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 41
Scenario Summary: After creating your required Scenarios, to easily compare the results of these scenarios following are the steps below:
1. Click the Summary button in the Scenario Manager.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 42
2. Next, select cell for the result cell and click on OK.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 43

Goal Seek?
The goal seek function is a part of what-if analysis tool set. It allows a user to use the desired result of a formula to find the possible input value necessary to achieve that result.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 44

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

Protection:

In simple words Protection means to keep our stuff safe from misuse from an authorised person. In Excel we can protect our workbook/worksheet.

Protect Worksheet

Steps to Protect Worksheet:
1. Right click a worksheet tab
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 45
2. Click Protect Sheet.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 46
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 47

Protect Workbook

A workbook can be protected easily as we have protected a worksheet. A workbook can be protected such as:
Structure: If we protect the workbook structure, users cannot insert, delete, rename, move, copy, hide or unhide worksheets anymore.
Windows: If we protect the workbook windows, we cannot move, change the size and close windows anymore.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 48
1. Open a workbook.
2. On the Review tab, click Protect Workbook.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 49
3. Check Windows enter a password and click OK.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 50
4. Re-enter the password and click on OK.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 51

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

View Tab

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 52

Split

In Excel we can split the worksheet window into separate panes and scroll the worksheet in each pane so that we can easily compare data from two separate worksheet locations. We can make the panes in a workbook window disappear by double-clicking anywhere on the split bar that divides the window.
1. Click the split box above the vertical scroll bar.
2. Notice the two vertical scroll bars.
3. To remove the split, double click the horizontal split bar that divides the panes (or drag it up).
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 53

Freeze

Freeze option is very useful in some cases when we have a long table and want to see all. We need to scroll it while looking all the data. We will see that the table headings are also scrolled during scrolling, so it becomes difficult to understand the meaning of data without having its heading name hidden.

Freeze Top Row: To freeze the top row, execute the following steps.
1. On view tab, click Freeze Panes and then Freeze
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 54

2. Scroll down to the rest of the worksheet.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 63

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

How to Unfreeze Panes of your worksheet

To unlock all rows and columns, execute the following steps.
1. On the View tab, click Freeze Panes, Unfreeze Panes.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 64

How to Freeze Panes of a Worksheet

To freeze panes, execute the following steps.
1. Select row.
2. On the View tab, click Freeze Panes, Freeze Panes.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 55
3. Scroll down to the rest of the worksheet.

Hide/Unhide Columns, Rows and Sheets:

Hiding Rows:

In desired spreadsheet select the rows (for multiple selection hold Ctrl key and keep selecting) we want to hide and navigate to Home tab.
From Cells group, click Format button. Now from Hide & Unhide options, click Hide Rows.
Upon click it will automatically hide the selected rows.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 56

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

Hiding Columns:

For hiding the columns in specific sheet, following are the steps:
1. Select the columns we want to handle.
2. Now click on Format button in Cells group. Now Click on Hide & Unhide options then click Hide Columns.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 57

How to Hide Worksheets

Following are the steps to do so:
1. Select the sheet which we want to hide.
2. Now Click Hide Sheet from Hide & Unhide options from Cell group in Home Tab.
3. Click on Hinde Sheet Option from Hide and Unhide.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 58

Macro:

A macro is a series of commands that is grouped together so that we can run whenever we need to perform the specific task. We can use macros in Excel to save time by automating tasks that we perform frequently.

The easiest method for creating many macros is to use macro recorder. When we record a macro Excel stores the information about each step you take as you perform a series of commands. We then run the macro to repeat or playback the set of commands.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 59
The macro recorder records every action we complete. So before we start the process of recording it is very important to plan macro- that what steps we need to record. To display the Developer tab, follow these steps:
1. Click the File tab and then click Options. The Excel Options dialog box
appears.
2. Click Customize Ribbon in the left pane, and then select the Developer check box under Main Tabs on the right side of the dialog box.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 60
3. Click OK. The Developer tab appears in the Ribbon.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 61

PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II

How to Record a macro:

Follow these steps to record a macro:
1. Choose Record Macro in the Code group of the Developer tab. The Record Macro dialog box appears.
2. Type a name for the macro in the Macro Name text box.
PSEB 9th Class Computer Notes Chapter 2 MS Excel Part-II 62
3. Assign a Shortcut Key.
4. From the Store Macro In drop-down list, select where we want to store the macro:

  • This Workbook: Save the macro in the current workbook file.
  • New Workbook: Create macros that we can run in any new workbooks created during the current Excel session.
  • Personal Macro Workbook: Choose this-option if you want the macro to be available whenever we use Excel, regardless of which worksheet we’re using.
  • Type a description of the macro in the Description text box.
  • Click OK. The Record Macro option on the Developer tab changes to Stop Recording.
  • Perform the actions you want to record.
  • Choose Stop recording in the Code group of the Developer tab.
  • The macro recorder stops recording keystrokes and the macro is complete.

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

This PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access will help you in revision during exams.

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

Data has become an important part of human life. It has increased the need of data management. This need has given birth to various software. MS Access is one of the most common software in this category.

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

MS-Access:

Access is a Relational Database Management System (RDBMS). It is used for database creation and management. MS-Access Allow user to perform basic tasks such as opening and closing database, Creating tables, Forms, queries and Reports. If we want to understand Access, Firstly we must have to understand databases.

It is part of the MS Office software suite. It is used in millions of corporate firms across the globe and in homes also.

MS Access is used to store and retrieve large amounts of data. It can be used for something simple such as keeping a record of your books collection or for something larger such as invoicing/ stock management.

Relational Database:

Relational database was proposed by Edgar Codd around 1969. It has since become the dominant database model for commercial applications.

A relational database organizes data in tables. A table is made up of rows and columns. A row is also called a record. A column is also called a field.

MS-ACCESS is a relational database management system. Relational databases allow you to organize your data into tables; each table focuses on a specific topic; the various tables can then be linked to each other for inquiry and reporting purposes.

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

Guidelines to design a Database:

  1. Identify all the fields needed by you to produce the required information
  2. Organize each piece of data into its smallest useful part to make the design perfect.
  3. Make group related fields into tables
  4. Determine each table’s primary key which will uniquely identified.
  5. You will have to Include a common field in related tables.

Some Technical Words of Access:

Access arranges and divided database as under:

  1. Database file: The database file is the main file of database which consists the whole data of the document.
  2. Table: A table is the basic element of a Database and contains the data entered by users. Each row (or record) contains information about a particular item.
  3. The record is made up of several fields; each field contains one piece of information relating to the item.
  4. Fields: A field is an individual set of data items that are of the same type.
  5. Data Types: Databases consist of tables, tables consist of fields and fields are of a certain data type.

Components of MS Access:

  1. Table: Tables are the data storage facilities in MS Acfcess. Each table contains rows called records and columns called fields. A record is a collection of facts about a particular person or an organization. Each record in a table should be unique.
  2. Queries: A query that copies or changes data. Queries include append, delete, make-table, and update queries. A query that asks a question about the data stored in your tables and returns a result set in the form of a datasheet, without changing the data.
  3. Forms: Forms provides us friendly environment to view the data in which it shows a single record at a time.
  4. Reports: Reports provide a means of organizing and summarizing data. A report can be a simple list, a student’s report or a school report.
  5. Macros: Macro is an automatic action that should be performed to an object of the data. It allow users to their work automatically.
  6. Modules: A module is collection of procedure statement and declaration which are stores as unit. Module are verv similar to macros.
  7. Database objects: Databases in Access 2010 are composed of four objects: tables, queries, forms, and reports.

Data Types:

In access many types of data types can be used the data type is decided before creating a table. We know there are different data types of table. Some of the important data types of access are given below:

Data types Size/Format Storage Capacity Functions
Text Up to 255 characters Text – including numeric text (eg phone numbers) Text consists of digits/ numbers, letters or their combination. It can have maximum of 255 letters.
Number Long Integer Integer Single and double bytes Whole numbers Numbers been used only from the prescribed size which we will declare in document.
Data types General Both date & time It is used for date and time. The data can vary from 100 to 9999. it is 8 byte long
Yes/no Yes/No True/False On/Off N.A For data with only 2 possible values. It is used for logical values.
Currency Currency Scientific, percentage Up to 15 figures It can also be use in mathematics or scientific functions.
Auto Number N.A Automatic counter- incremented by 1 for each record It is used in all numeric programs it automatically give increment to a number.
Memo Up to 65535 characters Longer pieces of text Memo is used in where we have to enter a longer text
OLE
Object video
N.A For pictures, sound, videos, word/excel, documents or any other docs. It is been used to insert picture, sound, videos, word/excel, documents
Hyperlink N.A N.A It is used For links to the WWW or e-mail
Calculated N.A N.A This data type allow you to create a field that is based on a calculation of other fields in the same table

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

Advantages of Access:

  1. Convenient storage capacity: A Microsoft Access database can hold up to 2 GB of data. *
  2. Easy installation and work: Access gives data managers a fully functional, relational database management system.
  3. Easy to participate: Access works well with many of the developing software programs based in Windows like Microsoft SQL Server and non-Microsoft products like Oracle and Sybase.
  4. Importing data: Microsoft Access allow user to import their important data.
  5. Multi-user support: More About ten users in a network can use an Access application.
  6. Popular Rdbms: Microsoft Access is the most popular desktop Relational database system in the world.
  7. Saves your money: Microsoft Access is more economical than other larger systems; offering the same functions and usage.
  8. Secure Database: MS access is secure database system information is secure which you saved on it.

Starting access:

To start access 2010 from the start menu:
Click the start button, click all programs, click Microsoft office, and then click Microsoft access 2010. The new page of the backstage view opens, displaying thumbnails of the available templates and template categories.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 1
Another shortcut way to open access is Press windows kev with R it will open run command window on Run command type MS access is blank box.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 2

After the open of MS access you have to click on the blank database available Under templates.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 3

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

Working with Tables:

A table is a database object that vou define and use to store data update DATA. A table consists of records and fields. Every record contains data about one instance of the subject.

Creating and Modifying tables:

When you create a new table, you have complete control over the number of fields, the names of the fields, and what sort of data they can store. You can create a new table in the either datasheet view or design view.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 4

Creating tables in datasheet view

To create a table in datasheet view:

On the create tab, in the tables group, click the table button. A new blank table opens in the object window in datasheet view.

Adding fields by entering data:

Whenever you add a new column to the datasheet, a new field is defined in the table.

  1. Click in the first cell in the click to add COLUMN, ENTER the first item of data for the new record, and then press the tab or enter key to move the first cell in the column to the right.
  2. Access AUTOMATICALLY ASSIGNS the value 1 to the id field.
  3. WHEN THE record has been changed, but has not yet been saved.
  4. Click the pencil icon in the row selector. This saves the first record with the value 1 assigned to the id field; subsequent records will be numbered sequentially.
  5. Continue entering items of data in consecutive cells, and pressing the tab or enter key.
  6. When you finish entering all the data for the first record, click anywhere in the row below to save the record.
  7. After entering so many records as per your requirement you have to save the table

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

Creating Tables in design view:

In Design view, the Object window consists of two panes. The field Entry pane, located at the top of the window, is used to enter each field’s name, data type, and description. The field properties pane, located at the bottom of the window, is used to specify the field’s properties. The properties available in the Field properties pane depend on the data type assigned.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 5

To create a table in Design view:

On the create tab, in the Table Design button. A New, blank table opens in the object window in Design view.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 6
1. In the field name column, type a name for the first field. Field names can be up to 64 characters long. They can include any combination of letters, numbers, spaces, and brackets etc.
2. In the data type column click the down arrow and select a data type from the list).
3. In the description column, type a description for the field.
4. Repeat steps 2 through 4 to add additional fields to the table. After entering the all fields save the table.

Setting a primary key:

A primary key consists of one or more fields that uniquely identify each record in the table there are several advantages to setting a primary key.

To set a primary key follow these steps:
1. Click the row selector of the field you want to designate as the primary key.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 7
2. In the design tab, in the tools group, click the primary key button. A key icon appears to the left of the field that you specify as the primary key.

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

Saving tables:

To save a table for the first time:
1. On the quick access toolbar, click the save button. The save as dialog box opens
2. In the table name box, type a name for the table.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 8
Click the ok button. The table appears in the tables list in the navigation pane.

Closing database
To close a database:
Click the file tab, and then click close database.

Exiting access
To exit access 2010:
1. Click the file tab, and then click exit. Or, click the close button in the upper- right corner of the program window.
2. Another option is to exit Access is Press ALT+F4 key together. With this option you will exit from access in very easy way

Forms:

Forms are used for entering, modifying, and viewing records. The reason forms are used so often is that they’re an easy way to guide people into entering data correctly.

Creating forms:

It is always very convenient to work in forms. It is more comfortable easier and popular to enter data by forms that by datasheet view. Forms can be prepared by following two methods.

Create a form to display your data
1. To create a quick screen in MS Access 2010 simply go to the navigation pane and click to highlight the table you wish to base the form on.
2. Now click on the create tab.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 9
3. In the forms section click on the button named ‘Form’.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 10
4. MS Access creates a nice simple form. Click on any of the text boxes to position the cursor and edit the data.
At the bottom you have navigation buttons to move you from record to each record

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

Sorting:

1. Result could be sorted by Name or by the marks of the students who were appear in exam
2. Students could be sorted by name or by the roll no.
3. Students could be sorted by class.
You can sort both text and numbers in two ways: in ascending order and descending order. Ascending means going up, so an ascending sort will arrange numbers from smallest to largest and text from A to Z.

Descending means going down, or largest to smallest for numbers and Z to A for text. The default ID number sort that appears in your tables is an ascending sort, which is why the lowest ID numbers appear first.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 11

Steps to sort student table are as follows:
1. Select a field in the cell you want to sort by. In student table, we will sort by student name.
2. Click the Home tab on the Ribbon, and locate the Sort & Filter group.
3. Sort the field by selecting the Ascending or Descending command.
(a) Select Ascending to sort text A to Z or to sort numbers from smallest to largest.
(b) Select Descending to sort text Z to A or to sort numbers from largest to smallest.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 12
The table will now be sorted by the selected field.
To save the new sort, click the Save command on the Quick Access toolbar.

Data Filters:

Filters is the concept in MS-Access which allow you to view only the data you want to see. The filter then searches all of the records in the table, finds the ones that meet your search criteria, and temporarily hides the other data.

Filters are useful because they allow you to look upon on specific records without any distraction by the uninterested data. Viewing this data with a filter would be far more convenient than searching for it in a large table.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 13
Follow these steps to apply filter:
To create a filter
1. Click the drop-down arrow next to the field you want to filter by.
(A drop-down menu with a checklist will appear. Only checked items will be included in the filtered results. Use the following options to determine which items will be included in your filter)
1. Select and deselect items one at a time by clicking their check boxes.
Here, we will deselect all of the options except for Class .
2. Click Select All to include every item in the filter. Clicking Select All a second time will deselect all items.

2. Click Blank to set the filter to find only the records with no data in the selected field.
Click OK. The filter will be applied.

PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access

Reports:

Reports allow you to print assembled data in a custom layout. You can create reports based on tables and/ or queries. There are several methods for creating a report. We will focus on the Reports wizard.

To create a report:
(i) Click on the Create tab and then select Report Wizard from the Reports group.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 14
1. Click on the down arrow beside the Tables/Queries selection window and choose the table or query you’re basing your report on.

2. Add fields – (All the fields from your selected tables/ queries appear in the Available Fields: window.)
1. To add fields to the Selected Fields window, one-at-a-to move all available fields into the Selected Fields window at once.
2. To remove individual fields from Selected Fields, click on each field and press to remove all fields, press
3. When done, click Next.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 15
3. When done, click Next.
(You can select a sort order for up to four fields. Click on the down arrow to select a field and then choose ascending or descending order.)
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 16
4. When done, click Next and select layout options.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 17
5. Click Next and add title to the form.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 18
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 19
6. Click finish to finish the repeat.
PSEB 9th Class Computer Notes Chapter 5 Introduction to MS-Access 20