CLASS 6
CHAPTER-1: CATEGORIES OF COMPUTERS AND COMPUTER LANGUAGES A. Fill in the blanks: 1. Program 2. Four 3. Machine 4. High Level 5. Assembly 6. Off, On 7. Sunway TaihuLight 8. Handheld 9. Embedded system 10. Language processor B. State True or False: 1. True 2. False 3. True 4. False 5. True 6. True 7. False 8. False 9. True 10. True C. Application Based Questions: 1. Super Computer 2. Mainframe Computer 3. High Level language D. Multiple Choice Questions: 1. Source Program 2. Interpreter 3. Object Program 4. 13 to 15 Inch 5. Micro Computers E. Answer the following: 1. Machine Language is the only language that a computer understands. It is expressed in binary form i.e., ‘0’ and ‘1’ where 0 means ‘Off’ state and 1 means ‘On’ state.
2. Assembly Language uses Mnemonic codes or Symbols in place of 0 and 1 which are used in Machine Language. For example, if the operation code for ADD is 0010 in binary language, it can be directly written as ''ADD" in assembly language. 3. High-Level language has the following features: • It uses English words and Mathematical operators. • It is Machine-independent. • It has to be converted into Machine Language by Translator programs. 4. An Interpreter translates the program one line at a time and then executes its instruction. This process is repeated for the entire program. A Compiler on the other hand translates the whole program at once and then execute the instructions. 5. Characteristics of the Fourth-Generation Language: • Highly user-friendly and independent of any operating system. • Very high speed of execution. • Designed to reduce the level of programming efforts. 6. Types of Micro Computer are: Desktop Computers, Laptop Computers, Tablet Computers, Palmtop Computers, and Handheld Devices. Desktop Computers: These computers fit comfortably on top of desks. Desktop computers typically come with several units, such as monitor, CPU, keyboard, and mouse, which are connected to each other and work like a single unit. 7. Laptop Computers: These computers are small in size, usually having 13 to 15 inch screen and can be placed on the lap. These are battery operated and portable. These computers are mainly used by people who travel a lot. Tablet Computers: These computers are smaller and lighter than laptop computers, usually having 7 inch, 8 inch or 10 inch screen. Tablets use touch-sensitive screen for typing and navigation. Popular uses of tablets include reading e-books, watching movies etc. 8. An embedded system is the one that has a computer hardware with software, embedded or implanted into a larger device. Embedded systems are also called Microcontrollers as they are designed to perform a specific task in various devices. 9. Devices that are small in size and can be easily held in hand or carried in the pocket are called Handheld Devices. Smart phones, Tablet computers are a few examples of handheld devices.
CHAPTER-2: FILE MANAGEMENT-DATA ORGANISATION A. Fill in the blanks: 1. Source 2. Rename
B.
C.
D.
E.
3. Search Box 4. *, ? 5. File Format State True or False: 1. False 2. True 3. False 4. True 5. False Application Based Questions: 1. R*.* (Where R represents the first letter of the file name) 2. Show windows side by side option. Multiple Choice Questions: 1. Ctrl 2. Wildcard 3. .mp3 4. Windows Explorer Answer the following: 1. File is a collection of related information stored together on some storage device. 2. A file format is a standard way for encoding information in a computer file. It is generally indicated by the file’s extension e.g. .doc or .docx. 3. Wildcard characters such as ‘*’ and ‘?’ are used when only a part of the file name is known. The character ‘*’ can. Be used to replace a string of text, whereas character ‘?’ can be used in place of any single letter or symbol in a search term. For Example: • *.docx will search for all the files having extension as .docx (Word Files). • Kips???.docx will search for all the files whose name begin with ‘kips’ followed by any three characters and extension as .docx. 4. Sorting helps in easy retrieval of the required files. To sort the files in an alphabetical order, the steps are: Right-click on the blank area of the desktop, a shortcut menu appears. Point to the Sort by option and click the Name sub-option. The icons will be sorted.
CHAPTER-3: WORD PROCESSOR-TABULAR PRESENTATION A. Fill in the blanks: 1. Tab
B.
C.
D.
E.
2. Insert 3. Properties 4. AutoFit Windows 5. Double-headed Arrow 6. Quick Tables State True or False: 1. False 2. True 3. False 4. True 5. False 6. False Application Based Questions: 1. SUM Function. 2. Table Resize Handle. Multiple Choice Questions: 1. Cell 2. Insert 3. Shift + Tab 4. F9 5. Table Answer the following: 1. A table is an organized arrangement of data (text, numbers, pictures, and other objects) which consists of number of rows and columns. 2. (a) A plus sign which appears at the upper left corner of the table is called Table Move Handle. It is used to move the table. A small hollow square at the bottom right corner of the table is called Table Resize Handle. It is used to resize the table. (b) Splitting a cell means dividing the selected cell into separate cells. Merging the cells provide a way to consolidate data in one cell. 3. The following steps are used to calculate the sum in a table: -
Click on the cell where the result is to be displayed. Click on Formula button in the Data group on the Layout tab. The Formula dialog box is displayed. The SUM formula is already displayed. Click on OK button. The result appears in the selected cell.
4. Formatting controls the overall appearance of a table. After creating a table, you can format the entire table by applying various styles, changing row height, column width, splitting and merging cells, or applying border and shading. 5. The width of the column can be changed by, clicking on the Layout tab and selecting the Width spin box present in the Cell Size group on the Layout tab. 6. To change the height of the row in a table follow these steps: Select the row and right click on it. Select the Table Properties option from the Shortcut menu. The Table Properties dialog box appears. Click on the Row tab. Select the Specify height check box. Specify the height either by typing or by clicking the spin arrows. Click OK. 7. To insert a column in a table, the following steps are performed: Select the column, adjacent to which you want to insert a new column. The Table Tools tab appears on the ribbon. Click on the Layout tab under it. Select either the Insert Left or Insert Right button in the Rows & Columns group. An empty column gets inserted in the table as per the chosen option.
CHAPTER-4: WORD PROCESSOR-MAIL MERGE A. Fill in the blanks: 1. Main document 2. Tab 3. Field 4. Tick 5. Right B. State True or False: 1. False 2. True 3. True 4. False 5. False C. Application Based Questions: 1. In Data Source 2. (1) Type a new list (2) The e-mail address book opens for use. D. Multiple Choice Questions: 1. Record 2. Merge Field
3. Type a new list 4. Pamphlets 5. Mailings E. Answer in one word or one sentence: 1. Data Source 2. Mailing Tab 3. Print Documents 4. Field F. Answer the following: 1. Mail Merge feature of Microsoft Word is used to combine a data source, which contains addresses of all the recipients, with the main document. It saves our time and energy to send letters at multiple addresses. 2. The Mail Merge feature combines two documents, one is Main document and the other is Data Source. 3. Data source consists of a mailing list. It is associated with the main document, so that its field names can be used in the main document, and it becomes easy to merge addresses with the main document. 4. Main Document contains the text that we wish to send to the recipients. 5. Mail merge involves three basic steps: Creating a main document Specifying a data source Merging the data source with the main document 6. To create a new mailing list, the following steps are required: Select the-> Type a new list radio button. Click on the-> Create option. On the New Address List dialog box click on the-> Customize Columns button. Enter data in the respective fields. Click on the-> New Entry button. After entering records. Click on the-> OK button. Specify a name in the File name: text box. Click on the ->Save button. The Mail Merge Recipients dialog box appears, which displays the details of all the records added by you.
CHAPTER-5: PRESENTATION-VISUAL EFFECTS A. Fill in the blanks: 1. Transitions 2. Objects, Text 3. Action Button 4. Microphone 5. Reading
6. Loop until Stopped 7. Mouse Click 8. Two B. State True or False: 1. False 2. True 3. False 4. True 5. True 6. True 7. False 8. True C. Application Based Questions: 1. He can use the ‘Hyperlink to’ function. In the ‘Action on click’s section of the Mouse Click tab, select the Hyperlink to: radio button, then click on the drop-down arrow and choose next slide option from the menu. 2. To import data from Microsoft word file, click on the New Slide drop-down menu. Select the Slides from outline option. When the Insert Outline dialog box appears, browse the location of the file. Select the file > click on Insert and the data gets imported. 3. The number on each object indicates that animation effect is applied D. Multiple Choice Questions: 1. Slide Show 2. Animation 3. .wav 4. (*) 5. Both a and b E. Answer the following: 1. The ability to move objects and text in all directions of the slide is called animation. Animation is very helpful when, you wish to focus on important points. 2. Transition are used to add visual effects to the slides. Transition effects are the movement you see when one slide changes to another during a slide show view. 3. To add your own sound to the slide, Select the slide. Click on the->Audio drop-down arrow. Choose the Record Audio option. In the Record Sound dialog box type a name for the audio recording. Click on the >Record button to start. When the recording is finished, click on the ->Stop button.
Play button can be used hear the recorded sound. Click on the->OK button. The audio file will get inserted in the slide. 4. Action buttons are built-in shapes, which when added to the presentation can set a link to another slide, play a sound, or perform some other action. Actions can be assigned to ClipArt, pictures, or the text in SmartArt graphic. 5. The Slide Sorter View helps to change the order of slides, insert or delete the slides, add transitions and set the timing for the slide show. 6. Slide Master is an element of the template that stores information, including font styles, placeholder sizes, bullet styles etc. It sets the default layout and formatting for all other slides.
WORKSHEET Chapters 1, 2, 3, 4, and 5 A. Fill in the blanks: 1. Syntax 2. .mp3 3. Paragraph 4. Field 5. Transition B. State true or False: 1. True 2. False 3. False 4. True 5. True C. Match the following: Lady Ada Lovelace Sunway TaihuLight Assembly language Interpreter MicroVAX3100
-----------
The first programmer Supercomputer Mnemonic Codes Language Translator Minicomputer
WORKSHEET Chapters 1, 2, 3, 4, and 5 A. Choose the best answer: 1. Beta
2. Ctrl 3. Row 4. Main document 5. F10 B. Answer in one word: 1. Programming 2. * 3. AutoFit Window 4. Mail Merge 5. Esc C. Answer the following: 1. Several pieces of source code in a program can be linked together into one program, with the use of a program called Linker. It generates an executable file. 2. There are two wildcard characters ‘*’and ‘?’, commonly supported in Windows to search a file or folder. ‘*’ can be used to replace a string of text and ‘?’ can be used in place of any single letter or symbol in a search term. 3. Quick Tables are a quick and easy way to insert a pre-designed table, saved in the quick tables gallery in your document. To insert a quick table: Click where the table is to be inserted. Click on Table > Quick Tables. Select an appropriate template from the drop-down list. 4. To create a main document, Create a new document and type a letter or open an existing letter in Microsoft Word that is to be sent to different people at their addresses. Click on-> Mailings tab. Click on-> the Start Mail Merge drop-down arrow. Select-> Step by Step Mail Merge Wizard option. The Mail Merge task pane appears on the screen. Select-> Letters radio button. Click on-> Next: Starting document. A new task pane appears on the screen. Choose the type of set up for your letters. Click on-> Use the current document radio button. Click on-> Next: Select recipients. Another task pane appears showing options for defining recipient’s list. 5. Action buttons are built-in shapes present in PowerPoint. These provide the facility to play a sound, set a link to a web page, e-mail address, slide etc when one clicks on or hovers the mouse pointer on the button.
CHAPTER-6: SCRATCH PROGRAMMING -INTRODUCTION TO GAME CREATION
A. Fill in the blanks: 1. Shrink 2. Pen 3. Script area 4. Sprite list 5. Horizontal, Vertical 6. Costumes 7. Stop B. State True or False: 1. False 2. True 3. False 4. True 5. False 6. False 7. False C. Application based Questions: 1. Duplicate feature of cursor tool can be used to create a duplicate copy of the sprite in her project. 2. Sound Block. 3. Pen Block. D. Multiple Choice Questions: 1. Help 2. Script 3. Grow 4. 180 to -180 5. 13 6. 21 7. Hide 8. Motion E. Answer in one word: 1. Grow Option 2. Stack blocks 3. Help dialog box 4. Looks Block 5. 13 F. Answer the following:
1. Scratch is a programming language, designed for children to enhance their computing skills, create their own games, projects etc. Main features of Scratch are:-
2. 3.
4. 5.
•
It is available free of cost.
•
It is easy to understand and learn.
• It allows playful experimenting with program segments. It displays the information about the selected Sprite and few tools for manipulating it. The tools include Sprite rotation style buttons, x-y coordinates and directions. Backdrop refers to the background of the stage. This can either be chosen from the available built-in options or be created. Scratch provides four different backdrop options to change the backdrop of the stage. The collection of stepwise instructions given to a sprite is known as a Script. Script Area is a place where we pick and drop the blocks to create a script. Names of different block categories given under the Blocks menu are:•
Hat Blocks
•
Stack Blocks
•
Boolean Blocks
•
Reporter Blocks
•
C Blocks
• Cap Blocks 6. SHORT NOTES1. This block changes the volume of a sprite by the specified amount. 2. This block changes the sprite’s costume from its current costume to the next one in the Sprite’s list. If the current costume is last in the list, the Sprite takes the first one. 3. This block instructs the Sprite to follow the mouse pointer or another Sprite. 4. This block changes the pen’s size by the specified value. 7. The Say block displays the Sprite with a speech bubble containing specified text for the specified amount time.
CHAPTER-7: MORE ON SCRATCH A. Fill in the blanks: 1. Operators 2. Light blue 3. True 4. String variable 5. Sensing
B.
C.
D.
E.
6. One State True or False: 1. False 2. False 3. False 4. True 5. True Application based Questions: 1. Pick random 1 to 10 from the Operators block category. 2. Data block 3. Repeat Block 15. Multiple Choice Questions: 1. Operators 2. 3. Light Green 4. Data Answer the following: 1. A variable is a placeholder in Scratch’s memory that is used to store a changing value. Variables can old one value at a time. These values can be either numbers or a string(text). 2. The () greater than and (=) equal to blocks are three Comparison blocks of the Operator block used to compare two values. 3. (a) Repeat block- It is used to repeat a script written inside it, a given number of times. Repeat Until block- It is used to repeat a script written inside it until the condition evaluates to true. (b) If then block- It executes the block written inside it if only the specified condition evaluates to true. If the condition is false, then the script inside the block is ignored. If then Else block- If the condition evaluates to true the If script is executed, otherwise the script under Else executes. 4. The Forever block runs the blocks written inside it in a never ending loop, unless the Stop button is clicked. 5. Coding the tasks in computer programming includes logic and decision making. Scratch provides various blocks enabled with logical reasoning and conditional programming concepts. Using conditions, we can control scripts and provide solution for the tasks.
CHAPTER-8: HTML – AN INTRODUCTION A. Fill in the blanks: 1. 2. Six
3. 4. Align 5. Bgcolor 6. .html 7. Forward 8. Web Browser B. State True or False: 1. False 2. False 3. True 4. False 5. False 6. False C. Applications based Questions: 1. The file should be saved as a HTML document by adding .htm or .html after the file name. 2. 3. tag adds a line break starting the next sentence, from a new line. D. Multiple Choice Questions: 1. 2. Web editor 3. 4. 5. E. Answer the following: 1. HTML stands for Hypertext Mark-up Language. It is a complete code package that allows the user to create web pages that contain both text and graphics. All the web browsers are designed to understand and interpret this language. 2. Tags are building blocks of a web page, as they contain elements which define how the information is formatted and displayed on it. All the tags have their own attributes and default values. Each tag in HTML follows specific rules known as syntax and is not case sensitive. The HTML tags can be categorised as: Container Tags Empty Tags 3. The tags that include both ON and OFF tags are called, Container elements. It is opened using opening angle brackets < > and closed using closing brackets < / >. Example, tag. Empty elements contain only ON tags. These elements do not enclose any data, hence do not require closing brackets. Example, tag.
4. Heading Element: These tags are used to define different heading levels in an HTML document. These are basically used to emphasise the text. Paragraph Element: To display a long piece of text on a web browser, paragraph element is used. It marks a block of text as a paragraph. 5. The tag is used to display the text in the form of a paragraph. To mark the end of a paragraph, element is used. Various attributes of a paragraph element are: • Aligns the text in centre. • Aligns the text to the right side. • Aligns the text to the left side. • Aligns the text from both left and right margins. 6. Four Attributes which are used to set margins in a web page are:TOP MARGIN- It sets the top margin by displaying the text away from the top edge of the web page. BOTTOM MARGIN- It sets the bottom margin by displaying the text away from the bottom edge of the web page. LEFT MARGIN-It sets the left margin by displaying the text away from the left edge of the web page. RIGHT MARGIN-It sets the Right margin by displaying the text away from the right edge of the web page.
CHAPTER-9: INTERNET – ONLINE SURFING A. Fill in the blanks: 1. Online Chat 2. E-group 3. Malware 4. Virus 5. Internet TV B. State True or False: 1. False 2. True 3. False 4. True 5. False C. Multiple Choice Questions: 1. Raymond Samuel Tomlinson 2. Spyware 3. @
4. Paper clip D. Application Based Questions: 1. Video Conferencing 2. Bcc E. Answer the following: 1. (a) E-Learning means "Electronic Learning”. It is less expensive than traditional learning and can be used to impart training to a large group of students at the same time. Thus using this technology people can learn anytime or anywhere. (b) Internet Radio is an online radio service that is broadcasted over the internet on dedicated radio servers. It is capable of broadcasting graphics, texts, and links with audio, thus serving all the senses of the listeners. 2. ADVANTAGES Powerful search engines, like Google, Yahoo etc., facilitate finding information on almost every subject. Using Internet information can be shared with many users simultaneously in an easy manner. DISADVANTAGES Computers connected through Internet are prone to virus attacks. This slows down the system and can result in the loss of important data of a user. Hackers attack computer systems on a network for monetary gains. They steal and transfer money from various bank accounts to their own. 3. A threat can be described as a possible danger to the computer system, caused when there is a security breach in the system. A threat can be either intentional or accidental. Two Security threats are: SPYWARE This software secretly collects information about an online user. It monitors the surfing habits of the user and steals information about the e-mail addresses, passwords, credit card numbers, etc. SCAREWARE It is a malware which pops up a window, informing the user that the system is infected and asks for a fee to clean it. It tricks the user to click a link which in the background downloads the malicious program. 4. The term ‘Netiquette’ is a combination of two words; Net (Internet) and Etiquette (Good Manners). It is defined as a special set of rules that governs the behaviour of a user communicating online. It simply means that you should adhere to the same standards of behavior online that you follow in real life. The communication can be via e-mails, forums, blogs, and social networking sites, etc. It includes the following rules: USE PROPER SALUTATION AND SIGNATURE0
When communicating online, always begin your message with a salutation and end it with your name or signature. INCLUDE A SUBJECT LINE Give a descriptive phrase in the subject line of the message header that conveys the purpose of the message. 5. E-Mail stands for Electronic Mail. It is a facility on the Internet to send and receive messages anywhere around the world, in real time. It works like conventional correspondence, but it is instant and convenient. The best part of e-mail is that a single mail can be sent to a number of persons at a time. We can attach photos, videos, or important data along with our message. Example
[email protected] [email protected] 6. A signature is a bit of personalised text that is automatically inserted at the bottom of every e-mail you send.
CHAPTER-10: E-COMMERCE, BLOGGING AND PODCASTING A. Fill in the blanks: 1. Weblog 2. E-banking 3. Layout 4. Amazon 5. Podcast 6. BHIM 7. E-wallet 8. Electronic Payments B. State True or False: 1. True 2. False 3. True 4. False 5. False 6. False 7. True 8. True C. Application Based Questions: 1. E-Shopping, amazon.com 2. E-Banking 3. A Blog
D. Multiple Choice Questions: 1. PayPal 2. Flipkart 3. 1999 4. www.soundcloud.com E. Answer the following: 1. A blog is an easy-to-create web site that allows users to share their thoughts with the world. The word "blog" comes from "Weblog", because a blog consists of a signed and dated log of individual postings. A blog is what you make of it. Blogging can be an interactive activity. Readers can add comments to a blogger's postings, other persons can respond, and a conversation ensues. Bloggers have become well-known commentators on the political scene, but blogging can encompass any topic or no topic at all. 2. E-Shopping --www.amazon.com E-Banking -www.statebankofindia.com E-Reservation -www.irctc.co.in Blogging --www.blogger.com Podcasting --www.buzzsprout.com 3. E-reservation means making a reservation or appointment for a service via the Internet. Using E-reservation, we can not only check the availability of seats in bus, train, or aircraft anytime, but can also reserve rooms, meeting halls, or tables in restaurants. For these services, we can check the payable charges at the same moment and by making online payment through credit cards, we can confirm our reservations. 4. The word Podcast is a combination of two words: ‘IPod’ and ‘Broadcast’. A podcast is an audio or video broadcast that is distributed on the Internet. It has a similar format as that of a radio or television show. As the distribution medium is Internet, anyone can distribute his thoughts and opinions to the world by creating a podcast. Although the term is derived from the word iPod, but you do not need an iPod to listen to a podcast. A Podcast can be accessed and downloaded easily on a user’s computer or digital media player through the Internet. You can easily subscribe to a Podcast over the web and use any portable media player or your computer to listen to it. Podcasting facility is free of cost. 5. E-Commerce or Electronic Commerce is a way of doing business over the Internet. It refers to buying and selling of goods and services, or transmitting funds or data through electronic medium.
b) E-banking stands for electronic banking. It is the way of performing bank transactions using Internet. A customer can do a number of things using e-banking, such as he can check the amount in his account, make FD (Fixed Deposit), transfer the money, apply for loans, pay bills, etc. c) A Web feed is a data format used to keep the users abreast with the frequently updated contents of a website. Websites such as news and blog sites, medical websites, etc. keep on updating their content on a regular basis. Using web feeds, you can view information and updates from such sites on a single page without the need of visiting multiple URLs.
CHAPTER-11: GOOGLE DRIVE A. Fill in the blanks: 1. 15 GB 2. Can view 3. Move to 4. Trash 5. List B. State true or False: 1. False 2. True 3. True 4. False 5. False C. Application Based Questions: 1. From Google Drive, locate and select the New button, then select File upload. Choose the file to be uploaded and Click Open. File will be uploaded to Google drive. 2. Access Google drive through drive.google.com and click the presentation you want to share. Click Share and under "People," type the email address of the people you want to share with. To choose how a person can use the folder, click the Down arrow and Click Send. An email is sent to people you shared with. D. Multiple Choice Questions: 1. April 24, 2012 2. Make a Copy 3. Download 4. Remove 5. Can comment E. Answer the Following:
1. Google Drive is a free service from Google that enables you to store and share files online and access them anytime, anywhere using the cloud. It offers 15 GB of free storage space that facilitates you to store all kinds of files and documents on it. You can store unlimited amount of photos, drawings, recordings, videos, text documents, and much more. The files stored on Google Drive can be opened and edited from any device. 2. Easy uploading and storing. Remote access from any device. Sharing files with your friends. 3. To upload a file to your drive, Choose the Upload files option from the My Drive drop-down list. An Open dialog box appears. Browse and select the file(s) you want to upload and then click on the Open button. A pop up window appears notifying the uploading status of your document. Once completed, the uploaded files will appear in your Google Drive folder. 4. To share a file, follow the given steps: Select the file that is to be shared. Click on the Share button located at the upper right corner of the web page. A Share with others dialog box appears. Enter the e-mail addresses of the people with whom you want to collaborate on the file. For more control over the files, you can select one of the following authorization options by clicking on the drop-down arrow of the Edit files directly button to decide whether people can edit, comment on, or simply view the file. 5. The Three Authorization options are: CAN EDIT: This option is selected by default, which allows multiple people to work on the same project in real time. When you share a file with people, they receive an e-mail. It contains a link to the shared file, which allows them to edit it along with other users. Each editor who is working in the file will be visible as icons at the top right corner of the screen. CAN COMMENT: By using this option you can restrict people to only comment on or view the file. CAN VIEW: This option allows others, only to view a file.
WORKSHEET Chapters 6, 7, 8, 9, 10, and 11 A. Fill in the blanks: 1. Sprite 2. Six, Eleven 3. Container
4. Podcast 5. Trojan 6. Trash B. State True or False: 1. False 2. False 3. True 4. True 5. False 6. True C. Match the following: Hat Blocks Stamp Block Cap Blocks Data Blocks Stack Blocks Reporter Blocks
-------------
Start a Script Creates duplicate copy End a Script Create variables Perform main commands Hold values
WORKSHEET Chapters 6, 7, 8, 9, 10, and 11 A. Choose the best answer: 1. Stage 2. Light Blue 3. WYSIWYG 4. Scareware 5. Pyra B. Answer in one word: 1. Scripts Area 2. Control Block 3. BgColor 4. Netiquette 5. E-Shopping C. Answer the following: 1. There are four different Cursor tools. Their functionalities are: Duplicate: This option creates a duplicate copy of the selected Sprite. Delete: Clicking on this option will delete the selected Sprite.
2.
3.
4.
5.
Grow: This option helps us to increase the size of the Sprite. Shrink: It helps to decrease the size of the Sprite. In Scratch, the Data block is used to create variables in a project. The following blocks are under it :Change block- It changes the data that is assigned to it. Show variable block- It displays the value of the specified variable on the Stage. The HTML document starts with tag and ends with tag. Each document is considered to be a single page. The general structure of an HTML document has two sections: Head and Body. DISADVANTAGES OF E-COMMERCE ARE: A customer has to check the integrity of the service provider before buying and making online payments. When customer make payments through debit card or credit card, they are extra vigilant about the possibility of fraud. Consumer cannot examine the product physically and cannot be sure about the quality of the products until they are delivered. Constant access to Internet is required to shop online. To create a duplicate copy of your file: Select the desired file. Click on ->More actions button. Select the Make a copy option. A copy of the selected file appears.
CLASS 7
CHAPTER-1: COMPUTER- HARDWARE COMPONENTS A. Fill in the blanks: 1. Hardware 2. Motherboard 3. PCI 4. Winchester 5. Pixels B. State True or False: 1. False 2. False 3. False 4. True 5. False C. Application Based Questions: 1. Numeric keys 2. Scanner D. Multiple Choice Questions: 1. Plotter 2. Optical mouse 3. Impact 4. Kilobytes per second 5. Pen drive E. Answer the following: 1. Two major components of computer are: HARDWARE: The physical components of a computer, which we can touch and feel, are known as Hardware. It is categorized as Internal and External hardware. SOFTWARE: Software is a set of programs, which controls the internal operations of a computer. For example, UNIX, MS Word, etc. It is classified as System software and Application software. 2. A motherboard is the main circuit board of a computer that holds the most essential components of the computer system. A motherboard is mounted inside the CPU cabinet and connects the memory, hard drives, Video card and other expansion cards directly or via cables. 3. CPU is the main unit of a computer. It is alternately referred to as microprocessor. It controls all the instructions it receives from hardware and software running on a computer.
4. MODEM stands for MOdulator DEModulator. It allows a computer to send or receive information through telephone lines. Modulator converts the digital information to analog mode at the transmitting end and demodulator converts back the analog signals to digital at the receiving end. Types of modem: Internal Modem External Modem PC Card Modem 5. (i) SMPS: It stands for Switched-Mode Power Supply. It is essential for saving power, providing a well regulated power supply and safe running of electrical and electronic appliances. It transfers electric power from a source (AC mains) to low voltage Direct Current (D.C.). (ii) Heat sink: It is an electronic device which helps in dispersing the heat generated by the CPU. It uses a fan to keep the processor cool. It is used in GPUs (Graphic Processing System) and video card processors. (iii) Parallel Port: It is used for devices that require high speed data transmission such as printers. It is used to connect scanners, printers, CD writers etc. (iv) Flash Drive: It is a small and portable data storage device mainly used to transfer data from the hard drive of one computer to another. It is removable and rewritable with storage capacity up to 2 TB.
CHAPTER-2: NUMBER SYSTEM A. Fill in the blanks: 1. 2 2. Decimal 3. 8 4. 10 5. Binary 6. Hexadecimal 7. 0 B. State true or False: 1. False 2. True 3. False 4. True 5. False 6. False C. Applications Based Questions:
1. Start multiplying the digits of the decimal number from right hand side with increasing power of 8(80, 81) and so on) 2. He should borrow 1 from the number present on it’s immediate left. D. Multiple Choice Questions: 1. Aryabhatta 2. Digital Computer 3. Binary 4. 1 5. 2 E. Answer the following: 1. A number system is a set of values used to represent different quantities. For Example: number of students present in a class. Commonly used types of number system are Decimal, Binary, Octal and Hexadecimal. 2. To convert a decimal number into a binary number, follow the given rules: Divide the given decimal number with the base 2. Write down the remainder and divide the quotient again by 2. Repeat the step 2 till the quotient is zero. 3. There are four rules to multiple binary numbers: •
When 0 is multiplied with 0, the result is 0.
•
When 0 is multiplied with 1, the result is 0.
•
When 1 is multiplied with 0, the result is 0.
• When 1 is multiplied with 1, the result is 1. 4. The Octal number system (Oct) consists of 8 digits, from 0 to 7, with the base 8. 5. The number system with base 16 is known as Hexadecimal number system. It consists of 16 digits with numbers 0-9 and the letters A-F, where A-F represent decimal numbers from 10 to 15.
CHAPTER-3: COMPUTER VIRUS A. Fill in the blanks: 1. Disrupts 2. Speed, Destruction 3. Boot Sector 4. Creeper 5. My Doom 6. Antivirus software B. State True or False:
1. True 2. False 3. False 4. True 5. False 6. True C. Application Based Questions: 1. Any Antivirus Software like Avast, AVG, McAfee can be installed. 2. Program file virus D. Multiple Choice Questions: 1. Boot Virus 2. Trojan Horse 3. 1987 4. April First 5. FarooqAlvi Brothers E. Answer the following: 1. A computer virus is a program or a set of programs that disrupts the normal operation of a computer. It infects or destroys the data. For Example, Trojan Horses, Worms, Spyware etc. 2. Three possible symptoms of a virus are: • Decreasing the speed of a computer. • Unexpected error messages pop up. 3.
4.
5.
6.
• Computer may shut down and restart frequently. Spyware is a type of malware Which when installed on the system collects information about the users without his knowledge. It can collect various types of personal information such as passwords, credit card numbers etc. and can transmit it to someone who can misuse it for monetary purposes. Trojan Horse are programs that pretend to be useful software but actually damage the computer once installed. They create backdoor on the computer by giving unauthorized access to malicious users. To prevent virus attack, follow the given tips: • Every PC should be equipped with an updated anti-virus program. • Always scan the pen drive before copying files. • Scan the hard disk twice a month. Antivirus software is computer programs designed to identify, prevent and remove virus from the computer. Some of the popular antivirus software used nowadays are McAfee, AVG Antivirus, Quick Heal etc.
CHAPTER-4: ETHICS AND SAFETY MEASURES IN COMPUTING A. Fill in the blanks: 1. Computing 2. Citation 3. Cyberbullying 4. Hacking 5. Intellectual Property B. State True or False: 1. True 2. False 3. False 4. True 5. False C. Application Based Questions: 1. Indicative features are:• If the mail does not include Neha’s email address in the ‘To:’ or ‘CC:’ fields is a common form of spam. • If the mail contains offensive language or links to websites with inappropriate content. 2. She can check whether the site is secured or not by checking the URL. If the URL starts with the “https” tag, it is a secured website else not. D. Multiple Choice Questions: 1. Spam 2. Cookie 3. Copyright 4. Encryption 5. Phishing E. Answer the following: 1. Advantages of Internet: Powerful search engines like Google, Yahoo etc. facilitate user by finding information on almost every subject. People can connect with each other in an easy and inexpensive way, through social networking sites like Facebook, Twitter etc. Online services enable people to carry out their tasks, anytime and anywhere such as e-banking, e-reservation, etc.
2.
3.
4.
5.
Internet provides the facility to share information with many users simultaneously in an easy manner. Some of the common ethical guidelines which should be followed while using a computer are: Do not use computer technology to cause disruption or interference in other users' work. Do not spy on another person's computer data. Do not use computer technology to steal information. Do not use someone else’s computer resources without any authorization. Plagiarism is the usage or imitation of the language and thoughts of another person projected as one's own original work. Steps to Prevent Plagiarism: We should follow 'Citation' which means acknowledging the original writer and the source from where the material has been taken. We must specify the source, which informs readers regarding the basis of one's ideas and the extent of one's research. We can rephrase the material to avoid plagiarism. We can use quotation marks around the quoted words of another person to avoid plagiarism. We can protect Intellectual Property Rights by using Three steps. By Patenting our inventions By Copyrighting our Art and Publications By Registering our Trademarks (a) SPAMMING: It refers to unwanted e-mails, sent indiscriminately to multiple users worldwide. It can be used to spread computer Viruses, Trojan Horses, Worms or other malicious software. b. Cybercrime: A Cybercrime is any illegal activity done through Internet such as identity theft, where somebody can steal your e-mail id or password and use it to send fake e-mails to people containing false information about the product or winning a lottery, etc c. Digital Footprints: It is the impression or information about a person that exists on the internet because of his online activity. d. Software Piracy: When software is copied and distributed illegally, it is called Software Piracy. e. Hacking: It refers to an illegal intrusion into a computer system or network to steal important data or to destroy it. Hacking which is done for a good cause, such as national security, etc., is known as Ethical hacking. f. Phishing: It is an act of sending an e-mail or an online link to a user misleading him to believe that it is from a trusted person or organization. Further, the user is asked to visit a website in which he is asked to update or validate his personal details, such as user name, password, credit card details, etc. In this way the
operators of the fake website steal your identity and commit crimes in your name. This could damage your reputation and cause heavy financial losses.
CHAPTER-5: SPREADSHEET - AN INTRODUCTION A. Fill in the blanks: 1. Three 2. Merge & Center 3. Formula 4. Sheet 5. Column 6. Tab Scrolling 7. F12 B. State True or False: 1. False 2. False 3. False 4. True 5. False 6. True C. Application Based Questions: 1. Right-Click on the Sheet tab, which is to be renamed, and click on the Rename Option. Now type in ‘Class Schedule’ in the text box that appears. 2. Rohit should type in all his expenses in a column. Enter the formula “=Sum (First cell : Last cell )” in a cell to calculate the total expense. To find out the balance money, enter the formula “=(500-Total expense)”. D. Multiple Choice Questions: 1. AutoSum 2. Left 3. 1048576 4. Name 5. Equal to (=) 6. Three E. Answer the following: 1. Features of Microsoft Excel: We can perform simple and complex mathematical calculations using Formulas and Functions. The data is automatically recalculated in the entire worksheet if any change is made in a single cell.
2.
3.
4.
5.
Data can be viewed in a graphical form, such as charts, which help to understand, analyse, and compare data in an effective manner. AutoFill option is one of the exciting features of Excel which helps in quick data entry in large series of cells An Excel window which appears like a notebook on the screen is called a Workbook. Whereas, a Worksheet is a grid like area, made up of rows and columns, where we can enter and work with data. By default, A Workbook is named as ‘Book1’ and Worksheet with names Sheet1, Sheet2 and Sheet3. A Workbook contains Worksheets within it. A cell is an intersection of a column and a row in a worksheet. Each cell is identified by the combination of its column letter and row number, which is known as cell address. A cell can contain upto 32,767 characters. A Formula bar is an area located to the right of Name box which shows the data and formulas that you enter in an active cell. Whereas, a Name box is a space which displays the location of the cell pointer and is located just above the Column heading on the left side of the window. Three types of data can be entered in a Microsoft Excel sheet, which are as follows: NUMBERS: Numbers are values that consist of numerals from 0 to 9 and the characters, like +,-,!, @, $, %, ^, &, etc and can be used in calculations. By default, numbers are right aligned in a cell. TEXT: Text data can contain alphabets, numbers, spaces and special characters. Text data is not used in calculations, rather text entries are used for worksheet headings, names, and for identifying columns of data. FORMULAE: A formula is a mathematical equation involving number values, operators and cell addresses used to perform calculations on a worksheet. Formulae can range from basic mathematical operations to complex calculations and begin with an equal to (=) sign.
WORKSHEET Chapters 1, 2, 3, 4, and 5 A. Fill in the blanks: 1. Software, Hardware 2. Formulas 3. Spreadsheet 4. Radix 5. Multipartite B. State True or False: 1. True 2. False 3. False 4. False 5. True
C. Convert the following numbers into their equivalent decimal numbers: 1. 61 2. 25 3. 158 4. 27 5. 55 D. Name the term used for the following unethical practices which are prevalent in the society: 1. Cyberbullying 2. Plagiarism 3. Phishing 4. Hacking
WORKSHEET Chapters 1, 2, 3, 4, and 5 A. Choose the best answer: 1. Cell 2. 16,384 3. Plotter 4. 8 5. Malware B. Answer in one word: 1. Multifunction Printer 2. 2 3. Hard disk, CD ROM 4. MyDoom 5. Aryabhatta C. Answer the following: 1. An Excel window which appears like a notebook on the screen is called a Workbook. Whereas, a Worksheet is a grid like area, made up of rows and columns, where we can enter and work with data. By default, A Workbook is named as ‘Book1’ and Worksheet with names Sheet1, Sheet2 and Sheet3. A Workbook contains Worksheets within it.
2. CPU is the main unit of a computer. It is alternately referred to as microprocessor. It controls all the instructions it receives from hardware and software running on a computer. 3. A number system is a set of values used to represent different quantities such as number of students in a class or number of viewers watching a particular show, etc. 4. Advantages of Internet: It helps in finding information on almost every subject using powerful search engines, like Google, Yahoo etc.
It helps people in connecting with each other in an easy and inexpensive way through social networking and discussion boards. E-mail, Skype, and Facebook are just a few examples of service providers that bring the world closer. Online services like e-banking, e-reservation, e-shopping, etc. enable people to carry out their tasks while sitting at home.
Internet provides the facility to share information with many users simultaneously in an easy manner. 5. Plagiarism is the usage or imitation of the language and thoughts of another person projected as one's own original work. It is considered a crime or fraudulent act.
CHAPTER-6: MORE ON SPREADSHEET A. Fill in the blanks: 1. Range 2. F9, F10 3. Ctrl 4. Clipboard 5. F8 B. State True or False: 1. False 2. False 3. True 4. True 5. False 6. False 7. True C. Application Based Questions: 1. Select the column to the left of which she wants to insert a new column. Click on the arrow next to the Insert option and choose the Insert Sheet Columns option. The column gets inserted. 2. Use the Autofill feature. D. Multiple Choice Questions: 1. F4 2. Paste 3. Ready 4. Ctrl 5. Ctrl+Z 6. Apostrophe E. Answer in one word or one sentence: 1. To clear the contents of the cell.
2. F2 3. Selecting the required border style, under the Border tab in the Format Cells option. 4. Answer the following: 1. After double clicking on the cell, we find that Edit mode is indicated on the left side of Status bar. Now, change the contents to something else and press Enter. The mode shifts to Ready after pressing Enter 2. To insert multiple columns, select the same number of columns that you want to insert and Click on the Insert button or Right click on the column and choose Insert command accordingly. 3. The Redo command is used to quickly repeat the last action which you have performed whereas Undo command is used to cancel the changes and retrieve the previous data. 4. Click on any cell and Hold Ctrl button. Now click on non-adjacent cells while holding the Ctrl button in the worksheet and then release Ctrl button when you are done. 5. Select the range of cells and position the mouse pointer at the edge of selected cells. Notice the pointer changes to a move pointer symbol. Drag the selected range of cells to a new location and release the mouse button. 6. The two methods of copying data are as follows: a) Select the cell and click on Copy button in the Clipboard group. Select the destination cell and click on Paste button on the Clipboard group. The text will be copied to the new location. b) Select & Right click on the cells from where the data is to be copied. Choose Copy option from the shortcut menu which appears and now Right click on the cell where we want to place the selected data and Choose Paste option from the shortcut menu 7. AutoFill is a feature that allows the user to extend a series of numbers, dates, or even text to the necessary range of cells. It can be applied via following steps: a) Select the cell which contains data and position the pointer at the lower right corner of the cell. b) The mouse pointer changes to a ‘+’ sign and then hold the left mouse button and drag the pointer across the cells which you want to fill and release the button.
CHAPTER-7: DATABASE AND DBMS-AN INTRODUCTION A. Fill in the blanks: 1. Database 2. DBMS 3. Flat File 4. Templates 5. Datasheet
B. State True or False: 1. False 2. False 3. False 4. False 5. True C. Application Based Questions: 1. Design View 2. 6 b. 4 c. Komal, Priya d. 4 e. 5 D. Multiple Choice Questions: 1. .accdb 2. Two 3. Data Integrity 4. Memo 5. Pencil E. Answer the following: 1. A database is an organized collection of data which helps us to enter, manage, access, and analyse a large amount of information quickly and efficiently. Examples of database are maintaining addresses and phone numbers of our friends, creating a list of library books, keeping students’ records pertaining to academic and co-curricular achievements, keeping employees' information, etc. 2. FLAT FILE DATABASE: A flat file database refers to the data files that contain records, which have a small, fixed number of fields, without any structured relationship. For example, Microsoft Excel. RELATIONAL DATABASE: A relational database stores the data in several tables and links those tables together to get a common piece of information. For example, Microsoft Access, Microsoft SQL, Oracle 3. Tables are the building blocks of a database which store the complete data in a structured manner, i.e., in the form of rows and columns. Elements of a Table are: Fields, Records, and Data. 4. A Data type is used to declare the fields of a table and determines the type of data, a particular field can accept. Once the data type is defined, we cannot enter a different type of data in it. Text: It is used to store text or a combination of text and numbers that does not require calculations, such as addresses, phone numbers, etc. The fields with this data type can have maximum of 255 characters. 5. A Primary key is a sort of check on the table that every record in the table is unique. The field which is designated as the Primary key of a table can neither have duplicate data nor can it be left blank while entering the data.
For example: A Students table; we all know that each student in a class has a unique Roll No that cannot be assigned to any other student. Hence, Roll No can be defined as a Primary key to uniquely identify each record.
CHAPTER-8: WORKING WITH TABLES AND QUERIES A. Fill in the blanks: 1. Sorting 2. Toggle Filter 3. Freezing 4. Query 5. OR B. State True or False: 1. False 2. False 3. False 4. False 5. False C. Application Based Questions: 1. Specifying the simple criteria 2. Answers are as follows: • Account Number • Setting account type as savings. • Setting criteria>2000 D. Multiple Choice Questions: 1. Select 2. Two 3. Parameter query 4. Table 5. Remove Sort E. Answer the Following: 1. Sorting means arranging the data either in the ascending or descending order. We can sort data within a table based on the values of a particular field. To sort the data, follow the steps given below: Select the field that you wish to sort. Click on the drop-down arrow of its field header. Select either Sort Smallest to Largest or Sort Largest to Smallest option from the drop-down list (if the field is numeric) or select the Sort A to Z or Sort Z to A option (if the field is alphanumeric). Observe the change in the database. 2. Filtering in a Datasheet implies displaying specific records while hiding rest of the records until the filter effect is cleared. This is the utility of Filtering in datasheet.
3. A Query is a database object that helps a user to retrieve and view information from
one or more database tables that meet a specific condition/criteria, specified by the user. Major Parts of a Query Window are as follows: a) Design Area – It is present at the top and displays the fields, tables, and queries that you may want to use in the query. b) Grid – It is present at the bottom and contains columns where you can set up the fields. 4. A Criteria is the one which contains the condition on the basis of which the records can be filtered in the Query output. If an item matches all the criteria you enter, it appears in the query results. 5. It is an advanced version of the normal filter. By specifying the customized filter criterion, it further narrows down the display of the records. It can be applied on a table in the datasheet by the following steps: a) Click on drop-down arrow present to the right of the selected column header b) Select The Number filters option after which a cascading menu appears c) Select any options from the list (Equals, Does Not equal, Less Than, Greater Than, Between) d) The Custom Filter dialog box appears in which type the required number and click OK.
CHAPTER-9: USING LIST, IMAGES AND LINKS A. Fill in the blanks: 1. Bullet, Number 2. Unordered 3. Start 4. Nested 5. Hyperlinking B. State True or False: 1. False 2. True 3. True 4. True 5. False C. Application Based Questions: 1. The right syntax is