78% found this document useful (27 votes)
40K views

Logix Answer Key 6 To 8

The document discusses categories of computers and computer languages. It covers topics like machine language, assembly language, high-level languages, microcomputers, embedded systems, and handheld devices. It also discusses file management, data organization, word processor features like tables and mail merge, and visual effects in presentations.

Uploaded by

Sheethal J
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
78% found this document useful (27 votes)
40K views

Logix Answer Key 6 To 8

The document discusses categories of computers and computer languages. It covers topics like machine language, assembly language, high-level languages, microcomputers, embedded systems, and handheld devices. It also discusses file management, data organization, word processor features like tables and mail merge, and visual effects in presentations.

Uploaded by

Sheethal J
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

CLASS 6

CHAPTER-1: CATEGORIES OF COMPUTERS AND


COMPUTER LANGUAGES

A. Fill in the blanks:


1. Program
2. Four
3. Machine
4. High Level
5. Assembly
6. Off, On
7. Sunway TaihuLight
8. Handheld
9. Embedded system
10. Language processor
B. State True or False:
1. True
2. False
3. True
4. False
5. True
6. True
7. False
8. False
9. True
10. True
C. Application Based Questions:
1. Super Computer
2. Mainframe Computer
3. High Level language
D. Multiple Choice Questions:
1. Source Program
2. Interpreter
3. Object Program
4. 13 to 15 Inch
5. Micro Computers
E. Answer the following:
1. Machine Language is the only language that a computer understands. It is expressed
in binary form i.e., ‘0’ and ‘1’ where 0 means ‘Off’ state and 1 means ‘On’ state.
2. Assembly Language uses Mnemonic codes or Symbols in place of 0 and 1 which are
used in Machine Language. For example, if the operation code for ADD is 0010 in
binary language, it can be directly written as ''ADD" in assembly language.
3. High-Level language has the following features:
• It uses English words and Mathematical operators.
• It is Machine-independent.
• It has to be converted into Machine Language by Translator programs.
4. An Interpreter translates the program one line at a time and then executes its
instruction. This process is repeated for the entire program. A Compiler on the other
hand translates the whole program at once and then execute the instructions.
5. Characteristics of the Fourth-Generation Language:
• Highly user-friendly and independent of any operating system.
• Very high speed of execution.
• Designed to reduce the level of programming efforts.
6. Types of Micro Computer are: Desktop Computers, Laptop Computers, Tablet
Computers, Palmtop Computers, and Handheld Devices.
Desktop Computers: These computers fit comfortably on top of desks. Desktop
computers typically come with several units, such as monitor, CPU, keyboard, and
mouse, which are connected to each other and work like a single unit.
7. Laptop Computers: These computers are small in size, usually having 13 to 15 inch
screen and can be placed on the lap. These are battery operated and portable. These
computers are mainly used by people who travel a lot.

Tablet Computers: These computers are smaller and lighter than laptop computers,
usually having 7 inch, 8 inch or 10 inch screen. Tablets use touch-sensitive screen for
typing and navigation. Popular uses of tablets include reading e-books, watching
movies etc.
8. An embedded system is the one that has a computer hardware with software,
embedded or implanted into a larger device. Embedded systems are also called Micro-
controllers as they are designed to perform a specific task in various devices.
9. Devices that are small in size and can be easily held in hand or carried in the pocket
are called Handheld Devices. Smart phones, Tablet computers are a few examples of
handheld devices.

CHAPTER-2: FILE MANAGEMENT-DATA ORGANISATION

A. Fill in the blanks:


1. Source
2. Rename
3. Search Box
4. *, ?
5. File Format
B. State True or False:
1. False
2. True
3. False
4. True
5. False
C. Application Based Questions:
1. R*.* (Where R represents the first letter of the file name)
2. Show windows side by side option.
D. Multiple Choice Questions:
1. Ctrl
2. Wildcard
3. .mp3
4. Windows Explorer
E. Answer the following:
1. File is a collection of related information stored together on some storage device.
2. A file format is a standard way for encoding information in a computer file. It is
generally indicated by the file’s extension e.g. .doc or .docx.
3. Wildcard characters such as ‘*’ and ‘?’ are used when only a part of the file name is
known. The character ‘*’ can. Be used to replace a string of text, whereas character ‘?’
can be used in place of any single letter or symbol in a search term. For Example: -
• *.docx will search for all the files having extension as .docx (Word Files).
• Kips???.docx will search for all the files whose name begin with ‘kips’ followed by
any three characters and extension as .docx.
4. Sorting helps in easy retrieval of the required files. To sort the files in an alphabetical
order, the steps are: -
 Right-click on the blank area of the desktop, a shortcut menu appears.
 Point to the Sort by option and click the Name sub-option.
 The icons will be sorted.

CHAPTER-3: WORD PROCESSOR-TABULAR PRESENTATION

A. Fill in the blanks:


1. Tab
2. Insert
3. Properties
4. AutoFit Windows
5. Double-headed Arrow
6. Quick Tables
B. State True or False:
1. False
2. True
3. False
4. True
5. False
6. False
C. Application Based Questions:
1. SUM Function.
2. Table Resize Handle.
D. Multiple Choice Questions:
1. Cell
2. Insert
3. Shift + Tab
4. F9
5. Table
E. Answer the following:
1. A table is an organized arrangement of data (text, numbers, pictures, and other
objects) which consists of number of rows and columns.
2. (a) A plus sign which appears at the upper left corner of the table is called Table Move
Handle. It is used to move the table. A small hollow square at the bottom right corner
of the table is called Table Resize Handle. It is used to resize the table.

(b) Splitting a cell means dividing the selected cell into separate cells. Merging the
cells provide a way to consolidate data in one cell.

3. The following steps are used to calculate the sum in a table: -


 Click on the cell where the result is to be displayed. Click on Formula button in the
Data group on the Layout tab.
 The Formula dialog box is displayed.
 The SUM formula is already displayed. Click on OK button.
 The result appears in the selected cell.
4. Formatting controls the overall appearance of a table. After creating a table, you can
format the entire table by applying various styles, changing row height, column width,
splitting and merging cells, or applying border and shading.
5. The width of the column can be changed by, clicking on the Layout tab and selecting
the Width spin box present in the Cell Size group on the Layout tab.

6. To change the height of the row in a table follow these steps: -


 Select the row and right click on it. Select the Table Properties option from the
Shortcut menu. The Table Properties dialog box appears.
 Click on the Row tab. Select the Specify height check box.
 Specify the height either by typing or by clicking the spin arrows. Click OK.

7. To insert a column in a table, the following steps are performed: -


 Select the column, adjacent to which you want to insert a new column. The Table
Tools tab appears on the ribbon.
 Click on the Layout tab under it. Select either the Insert Left or Insert Right button
in the Rows & Columns group. An empty column gets inserted in the table as per
the chosen option.

CHAPTER-4: WORD PROCESSOR-MAIL MERGE

A. Fill in the blanks:


1. Main document
2. Tab
3. Field
4. Tick
5. Right
B. State True or False:
1. False
2. True
3. True
4. False
5. False
C. Application Based Questions:
1. In Data Source
2. (1) Type a new list (2) The e-mail address book opens for use.
D. Multiple Choice Questions:
1. Record
2. Merge Field
3. Type a new list
4. Pamphlets
5. Mailings
E. Answer in one word or one sentence:
1. Data Source
2. Mailing Tab
3. Print Documents
4. Field
F. Answer the following:
1. Mail Merge feature of Microsoft Word is used to combine a data source, which
contains addresses of all the recipients, with the main document. It saves our time
and energy to send letters at multiple addresses.
2. The Mail Merge feature combines two documents, one is Main document and the
other is Data Source.
3. Data source consists of a mailing list. It is associated with the main document, so that
its field names can be used in the main document, and it becomes easy to merge
addresses with the main document.
4. Main Document contains the text that we wish to send to the recipients.
5. Mail merge involves three basic steps:
 Creating a main document
 Specifying a data source
 Merging the data source with the main document
6. To create a new mailing list, the following steps are required: -
 Select the-> Type a new list radio button. Click on the-> Create option.
 On the New Address List dialog box click on the-> Customize Columns button.
 Enter data in the respective fields. Click on the-> New Entry button.
 After entering records. Click on the-> OK button.
 Specify a name in the File name: text box. Click on the ->Save button.
 The Mail Merge Recipients dialog box appears, which displays the details of all the
records added by you.

CHAPTER-5: PRESENTATION-VISUAL EFFECTS

A. Fill in the blanks:


1. Transitions
2. Objects, Text
3. Action Button
4. Microphone
5. Reading
6. Loop until Stopped
7. Mouse Click
8. Two
B. State True or False:
1. False
2. True
3. False
4. True
5. True
6. True
7. False
8. True
C. Application Based Questions:
1. He can use the ‘Hyperlink to’ function. In the ‘Action on click’s section of the Mouse
Click tab, select the Hyperlink to: radio button, then click on the drop-down arrow and
choose next slide option from the menu.
2. To import data from Microsoft word file, click on the New Slide drop-down menu.
Select the Slides from outline option. When the Insert Outline dialog box appears,
browse the location of the file. Select the file > click on Insert and the data gets
imported.
3. The number on each object indicates that animation effect is applied
D. Multiple Choice Questions:
1. Slide Show
2. Animation
3. .wav
4. (*)
5. Both a and b
E. Answer the following:
1. The ability to move objects and text in all directions of the slide is called animation.
Animation is very helpful when, you wish to focus on important points.
2. Transition are used to add visual effects to the slides. Transition effects are the
movement you see when one slide changes to another during a slide show view.
3. To add your own sound to the slide,
 Select the slide. Click on the->Audio drop-down arrow.
 Choose the Record Audio option.
 In the Record Sound dialog box type a name for the audio recording. Click on the -
>Record button to start.
 When the recording is finished, click on the ->Stop button.
 Play button can be used hear the recorded sound. Click on the->OK button. The
audio file will get inserted in the slide.
4. Action buttons are built-in shapes, which when added to the presentation can set a
link to another slide, play a sound, or perform some other action. Actions can be
assigned to ClipArt, pictures, or the text in SmartArt graphic.
5. The Slide Sorter View helps to change the order of slides, insert or delete the slides,
add transitions and set the timing for the slide show.
6. Slide Master is an element of the template that stores information, including font
styles, placeholder sizes, bullet styles etc. It sets the default layout and formatting for
all other slides.

WORKSHEET
Chapters 1, 2, 3, 4, and 5
A. Fill in the blanks:
1. Syntax
2. .mp3
3. Paragraph
4. Field
5. Transition
B. State true or False:
1. True
2. False
3. False
4. True
5. True

C. Match the following:


 Lady Ada Lovelace --- The first programmer
 Sunway TaihuLight --- Supercomputer
 Assembly language --- Mnemonic Codes
 Interpreter --- Language Translator
 MicroVAX3100 --- Minicomputer

WORKSHEET
Chapters 1, 2, 3, 4, and 5
A. Choose the best answer:
1. Beta
2. Ctrl
3. Row
4. Main document
5. F10
B. Answer in one word:
1. Programming
2. *
3. AutoFit Window
4. Mail Merge
5. Esc
C. Answer the following:
1. Several pieces of source code in a program can be linked together into one program,
with the use of a program called Linker. It generates an executable file.
2. There are two wildcard characters ‘*’and ‘?’, commonly supported in Windows to
search a file or folder. ‘*’ can be used to replace a string of text and ‘?’ can be used in
place of any single letter or symbol in a search term.

3. Quick Tables are a quick and easy way to insert a pre-designed table, saved in the
quick tables gallery in your document. To insert a quick table:
 Click where the table is to be inserted.
 Click on Table > Quick Tables.
 Select an appropriate template from the drop-down list.
4. To create a main document,
 Create a new document and type a letter or open an existing letter in Microsoft
Word that is to be sent to different people at their addresses.
 Click on-> Mailings tab. Click on-> the Start Mail Merge drop-down arrow. Select->
Step by Step Mail Merge Wizard option.
 The Mail Merge task pane appears on the screen. Select-> Letters radio button.
 Click on-> Next: Starting document. A new task pane appears on the screen.
Choose the type of set up for your letters.
 Click on-> Use the current document radio button. Click on-> Next: Select
recipients. Another task pane appears showing options for defining recipient’s list.
5. Action buttons are built-in shapes present in PowerPoint. These provide the facility to
play a sound, set a link to a web page, e-mail address, slide etc when one clicks on or
hovers the mouse pointer on the button.

CHAPTER-6:
SCRATCH PROGRAMMING -INTRODUCTION TO GAME CREATION
A. Fill in the blanks:
1. Shrink
2. Pen
3. Script area
4. Sprite list
5. Horizontal, Vertical
6. Costumes
7. Stop
B. State True or False:
1. False
2. True
3. False
4. True
5. False
6. False
7. False
C. Application based Questions:
1. Duplicate feature of cursor tool can be used to create a duplicate copy of the sprite in
her project.
2. Sound Block.
3. Pen Block.
D. Multiple Choice Questions:
1. Help
2. Script
3. Grow
4. 180 to -180
5. 13
6. 21
7. Hide
8. Motion
E. Answer in one word:
1. Grow Option
2. Stack blocks
3. Help dialog box
4. Looks Block
5. 13
F. Answer the following:
1. Scratch is a programming language, designed for children to enhance their computing
skills, create their own games, projects etc. Main features of Scratch are:-
• It is available free of cost.
• It is easy to understand and learn.
• It allows playful experimenting with program segments.
2. It displays the information about the selected Sprite and few tools for manipulating it.
The tools include Sprite rotation style buttons, x-y coordinates and directions.
3. Backdrop refers to the background of the stage. This can either be chosen from the
available built-in options or be created. Scratch provides four different backdrop
options to change the backdrop of the stage.
4. The collection of stepwise instructions given to a sprite is known as a Script. Script
Area is a place where we pick and drop the blocks to create a script.
5. Names of different block categories given under the Blocks menu are:-
• Hat Blocks
• Stack Blocks
• Boolean Blocks
• Reporter Blocks
• C Blocks
• Cap Blocks
6. SHORT NOTES-
1. This block changes the volume of a sprite by the specified amount.
2. This block changes the sprite’s costume from its current costume to the next one
in the Sprite’s list. If the current costume is last in the list, the Sprite takes the first
one.
3. This block instructs the Sprite to follow the mouse pointer or another Sprite.
4. This block changes the pen’s size by the specified value.
7. The Say block displays the Sprite with a speech bubble containing specified text for
the specified amount time.

CHAPTER-7: MORE ON SCRATCH

A. Fill in the blanks:


1. Operators
2. Light blue
3. True
4. String variable
5. Sensing
6. One
B. State True or False:
1. False
2. False
3. False
4. True
5. True
C. Application based Questions:
1. Pick random 1 to 10 from the Operators block category.
2. Data block
3. Repeat Block 15.
D. Multiple Choice Questions:
1. Operators
2.
3. Light Green
4. Data
E. Answer the following:
1. A variable is a placeholder in Scratch’s memory that is used to store a changing value.
Variables can old one value at a time. These values can be either numbers or a
string(text).
2. The (<) less than, (>) greater than and (=) equal to blocks are three Comparison blocks
of the Operator block used to compare two values.
3. (a) Repeat block- It is used to repeat a script written inside it, a given number of times.
Repeat Until block- It is used to repeat a script written inside it until the condition
evaluates to true.
(b) If then block- It executes the block written inside it if only the specified condition
evaluates to true. If the condition is false, then the script inside the block is
ignored.
If then Else block- If the condition evaluates to true the If script is executed,
otherwise the script under Else executes.
4. The Forever block runs the blocks written inside it in a never ending loop, unless the
Stop button is clicked.
5. Coding the tasks in computer programming includes logic and decision making.
Scratch provides various blocks enabled with logical reasoning and conditional
programming concepts. Using conditions, we can control scripts and provide solution
for the tasks.

CHAPTER-8: HTML – AN INTRODUCTION

A. Fill in the blanks:


1. <BR>
2. Six
3. <P>
4. Align
5. Bgcolor
6. .html
7. Forward
8. Web Browser
B. State True or False:
1. False
2. False
3. True
4. False
5. False
6. False
C. Applications based Questions:
1. The file should be saved as a HTML document by adding .htm or .html after the file
name.
2. <BODY BGCOLOR= “Red”>
3. <BR> tag adds a line break starting the next sentence, from a new line.
D. Multiple Choice Questions:
1. <B>
2. Web editor
3. <HR>
4. <BR>
5. <I>
E. Answer the following:
1. HTML stands for Hypertext Mark-up Language. It is a complete code package that
allows the user to create web pages that contain both text and graphics. All the web
browsers are designed to understand and interpret this language.
2. Tags are building blocks of a web page, as they contain elements which define how
the information is formatted and displayed on it. All the tags have their own
attributes and default values. Each tag in HTML follows specific rules known as syntax
and is not case sensitive. The HTML tags can be categorised as:
 Container Tags
 Empty Tags
3. The tags that include both ON and OFF tags are called, Container elements. It is
opened using opening angle brackets < > and closed using closing brackets < / >.
Example, <HTML></HTML> tag. Empty elements contain only ON tags. These elements
do not enclose any data, hence do not require closing brackets. Example, <BR> tag.
4. Heading Element: These tags are used to define different heading levels in an HTML
document. These are basically used to emphasise the text. Paragraph Element: To
display a long piece of text on a web browser, paragraph element <P> is used. It marks
a block of text as a paragraph.
5. The <P> tag is used to display the text in the form of a paragraph. To mark the end of a
paragraph, </P> element is used. Various attributes of a paragraph element are: -
• <P Align= "Centre"> Aligns the text in centre.
• <P Align= "Right"> Aligns the text to the right side.
• <P Align= "Left"> Aligns the text to the left side.
• <P Align= "Justify"> Aligns the text from both left and right margins.
6. Four Attributes which are used to set margins in a web page are:-
TOP MARGIN- It sets the top margin by displaying the text away from the top edge of
the web page.
BOTTOM MARGIN- It sets the bottom margin by displaying the text away from the
bottom edge of the web page.
LEFT MARGIN-It sets the left margin by displaying the text away from the left edge of
the web page.
RIGHT MARGIN-It sets the Right margin by displaying the text away from the right
edge of the web page.

CHAPTER-9: INTERNET – ONLINE SURFING

A. Fill in the blanks:


1. Online Chat
2. E-group
3. Malware
4. Virus
5. Internet TV
B. State True or False:
1. False
2. True
3. False
4. True
5. False
C. Multiple Choice Questions:
1. Raymond Samuel Tomlinson
2. Spyware
3. @
4. Paper clip
D. Application Based Questions:
1. Video Conferencing
2. Bcc
E. Answer the following:
1. (a) E-Learning means "Electronic Learning”. It is less expensive than traditional
learning and can be used to impart training to a large group of students at the same
time. Thus using this technology people can learn anytime or anywhere.
(b) Internet Radio is an online radio service that is broadcasted over the internet on
dedicated radio servers. It is capable of broadcasting graphics, texts, and links with
audio, thus serving all the senses of the listeners.
2. ADVANTAGES
 Powerful search engines, like Google, Yahoo etc., facilitate finding information on
almost every subject.
 Using Internet information can be shared with many users simultaneously in an
easy manner.
DISADVANTAGES
 Computers connected through Internet are prone to virus attacks. This slows down
the system and can result in the loss of important data of a user.
 Hackers attack computer systems on a network for monetary gains. They steal and
transfer money from various bank accounts to their own.
3. A threat can be described as a possible danger to the computer system, caused when
there is a security breach in the system. A threat can be either intentional or
accidental. Two Security threats are:
SPYWARE
This software secretly collects information about an online user. It monitors the
surfing habits of the user and steals information about the e-mail addresses,
passwords, credit card numbers, etc.
SCAREWARE
It is a malware which pops up a window, informing the user that the system is
infected and asks for a fee to clean it. It tricks the user to click a link which in the
background downloads the malicious program.
4. The term ‘Netiquette’ is a combination of two words; Net (Internet) and Etiquette
(Good Manners). It is defined as a special set of rules that governs the behaviour of a
user communicating online. It simply means that you should adhere to the same
standards of behavior online that you follow in real life. The communication can be via
e-mails, forums, blogs, and social networking sites, etc. It includes the following rules:
USE PROPER SALUTATION AND SIGNATURE0
When communicating online, always begin your message with a salutation and end it
with your name or signature.
INCLUDE A SUBJECT LINE
Give a descriptive phrase in the subject line of the message header that conveys the
purpose of the message.
5. E-Mail stands for Electronic Mail. It is a facility on the Internet to send and receive
messages anywhere around the world, in real time. It works like conventional
correspondence, but it is instant and convenient. The best part of e-mail is that a
single mail can be sent to a number of persons at a time. We can attach photos,
videos, or important data along with our message.
Example Kipspublishingworld@gmail.com
info@kips.in
6. A signature is a bit of personalised text that is automatically inserted at the bottom of
every e-mail you send.

CHAPTER-10: E-COMMERCE, BLOGGING AND PODCASTING

A. Fill in the blanks:


1. Weblog
2. E-banking
3. Layout
4. Amazon
5. Podcast
6. BHIM
7. E-wallet
8. Electronic Payments
B. State True or False:
1. True
2. False
3. True
4. False
5. False
6. False
7. True
8. True
C. Application Based Questions:
1. E-Shopping, amazon.com
2. E-Banking
3. A Blog
D. Multiple Choice Questions:
1. PayPal
2. Flipkart
3. 1999
4. www.soundcloud.com
E. Answer the following:
1. A blog is an easy-to-create web site that allows users to share their thoughts with the
world. The word "blog" comes from "Weblog", because a blog consists of a signed and
dated log of individual postings. A blog is what you make of it. Blogging can be an
interactive activity. Readers can add comments to a blogger's postings, other persons
can respond, and a conversation ensues. Bloggers have become well-known
commentators on the political scene, but blogging can encompass any topic or no
topic at all.
2.
 E-Shopping --- www.amazon.com
 E-Banking -- www.statebankofindia.com
 E-Reservation -- www.irctc.co.in
 Blogging --- www.blogger.com
 Podcasting --- www.buzzsprout.com
3. E-reservation means making a reservation or appointment for a service via the
Internet. Using E-reservation, we can not only check the availability of seats in bus,
train, or aircraft anytime, but can also reserve rooms, meeting halls, or tables in
restaurants. For these services, we can check the payable charges at the same
moment and by making online payment through credit cards, we can confirm our
reservations.
4. The word Podcast is a combination of two words: ‘IPod’ and ‘Broadcast’. A podcast is
an audio or video broadcast that is distributed on the Internet. It has a similar format
as that of a radio or television show. As the distribution medium is Internet, anyone
can distribute his thoughts and opinions to the world by creating a podcast. Although
the term is derived from the word iPod, but you do not need an iPod to listen to a
podcast. A Podcast can be accessed and downloaded easily on a user’s computer or
digital media player through the Internet. You can easily subscribe to a Podcast over
the web and use any portable media player or your computer to listen to it.
Podcasting facility is free of cost.
5. E-Commerce or Electronic Commerce is a way of doing business over the Internet. It
refers to buying and selling of goods and services, or transmitting funds or data
through electronic medium.
b) E-banking stands for electronic banking. It is the way of performing bank
transactions using Internet. A customer can do a number of things using e-banking,
such as he can check the amount in his account, make FD (Fixed Deposit), transfer
the money, apply for loans, pay bills, etc.
c) A Web feed is a data format used to keep the users abreast with the frequently
updated contents of a website. Websites such as news and blog sites, medical
websites, etc. keep on updating their content on a regular basis. Using web feeds,
you can view information and updates from such sites on a single page without the
need of visiting multiple URLs.

CHAPTER-11: GOOGLE DRIVE

A. Fill in the blanks:


1. 15 GB
2. Can view
3. Move to
4. Trash
5. List
B. State true or False:
1. False
2. True
3. True
4. False
5. False
C. Application Based Questions:
1. From Google Drive, locate and select the New button, then select File upload. Choose
the file to be uploaded and Click Open. File will be uploaded to Google drive.
2. Access Google drive through drive.google.com and click the presentation you want to
share. Click Share and under "People," type the email address of the people you want
to share with. To choose how a person can use the folder, click the Down arrow and
Click Send. An email is sent to people you shared with.
D. Multiple Choice Questions:
1. April 24, 2012
2. Make a Copy
3. Download
4. Remove
5. Can comment
E. Answer the Following:
1. Google Drive is a free service from Google that enables you to store and share files
online and access them anytime, anywhere using the cloud. It offers 15 GB of free
storage space that facilitates you to store all kinds of files and documents on it. You
can store unlimited amount of photos, drawings, recordings, videos, text documents,
and much more. The files stored on Google Drive can be opened and edited from any
device.
2. Easy uploading and storing.
Remote access from any device.
Sharing files with your friends.
3. To upload a file to your drive,
 Choose the Upload files option from the My Drive drop-down list.
 An Open dialog box appears. Browse and select the file(s) you want to upload and
then click on the Open button.
 A pop up window appears notifying the uploading status of your document.
 Once completed, the uploaded files will appear in your Google Drive folder.
4. To share a file, follow the given steps:
 Select the file that is to be shared. Click on the Share button located at the upper
right corner of the web page.
 A Share with others dialog box appears. Enter the e-mail addresses of the people
with whom you want to collaborate on the file.
 For more control over the files, you can select one of the following authorization
options by clicking on the drop-down arrow of the Edit files directly button to
decide whether people can edit, comment on, or simply view the file.
5. The Three Authorization options are:
 CAN EDIT: This option is selected by default, which allows multiple people to work
on the same project in real time. When you share a file with people, they receive
an e-mail. It contains a link to the shared file, which allows them to edit it along
with other users. Each editor who is working in the file will be visible as icons at
the top right corner of the screen.
 CAN COMMENT: By using this option you can restrict people to only comment on
or view the file.
 CAN VIEW: This option allows others, only to view a file.

WORKSHEET
Chapters 6, 7, 8, 9, 10, and 11

A. Fill in the blanks:


1. Sprite
2. Six, Eleven
3. Container
4. Podcast
5. Trojan
6. Trash
B. State True or False:
1. False
2. False
3. True
4. True
5. False
6. True
C. Match the following:
 Hat Blocks --- Start a Script
 Stamp Block --- Creates duplicate copy
 Cap Blocks --- End a Script
 Data Blocks --- Create variables
 Stack Blocks --- Perform main commands
 Reporter Blocks --- Hold values

WORKSHEET
Chapters 6, 7, 8, 9, 10, and 11

A. Choose the best answer:


1. Stage
2. Light Blue
3. WYSIWYG
4. Scareware
5. Pyra
B. Answer in one word:
1. Scripts Area
2. Control Block
3. BgColor
4. Netiquette
5. E-Shopping
C. Answer the following:
1. There are four different Cursor tools. Their functionalities are:
 Duplicate: This option creates a duplicate copy of the selected Sprite.
 Delete: Clicking on this option will delete the selected Sprite.
 Grow: This option helps us to increase the size of the Sprite.
 Shrink: It helps to decrease the size of the Sprite.
2. In Scratch, the Data block is used to create variables in a project. The following blocks
are under it :-
Change block- It changes the data that is assigned to it.
Show variable block- It displays the value of the specified variable on the Stage.
3. The HTML document starts with <HTML> tag and ends with </HTML> tag. Each
document is considered to be a single page. The general structure of an HTML
document has two sections: Head and Body.
4. DISADVANTAGES OF E-COMMERCE ARE:-
 A customer has to check the integrity of the service provider before buying and
making online payments.
 When customer make payments through debit card or credit card, they are extra
vigilant about the possibility of fraud.
 Consumer cannot examine the product physically and cannot be sure about the
quality of the products until they are delivered.
 Constant access to Internet is required to shop online.
5. To create a duplicate copy of your file:
 Select the desired file. Click on ->More actions button.
 Select the Make a copy option. A copy of the selected file appears.
CLASS 7
CHAPTER-1:
COMPUTER- HARDWARE COMPONENTS

A. Fill in the blanks:


1. Hardware
2. Motherboard
3. PCI
4. Winchester
5. Pixels
B. State True or False:
1. False
2. False
3. False
4. True
5. False
C. Application Based Questions:
1. Numeric keys
2. Scanner
D. Multiple Choice Questions:
1. Plotter
2. Optical mouse
3. Impact
4. Kilobytes per second
5. Pen drive
E. Answer the following:
1. Two major components of computer are:
HARDWARE: The physical components of a computer, which we can touch and feel,
are known as Hardware. It is categorized as Internal and External hardware.
SOFTWARE: Software is a set of programs, which controls the internal operations of a
computer. For example, UNIX, MS Word, etc. It is classified as System software and
Application software.
2. A motherboard is the main circuit board of a computer that holds the most essential
components of the computer system. A motherboard is mounted inside the CPU
cabinet and connects the memory, hard drives, Video card and other expansion cards
directly or via cables.
3. CPU is the main unit of a computer. It is alternately referred to as microprocessor. It
controls all the instructions it receives from hardware and software running on a
computer.
4. MODEM stands for MOdulator DEModulator. It allows a computer to send or receive
information through telephone lines. Modulator converts the digital information to
analog mode at the transmitting end and demodulator converts back the analog
signals to digital at the receiving end.
Types of modem:
 Internal Modem
 External Modem
 PC Card Modem

5. (i) SMPS: It stands for Switched-Mode Power Supply. It is essential for saving power,
providing a well regulated power supply and safe running of electrical and electronic
appliances. It transfers electric power from a source (AC mains) to low voltage Direct
Current (D.C.).
(ii) Heat sink: It is an electronic device which helps in dispersing the heat generated by
the CPU. It uses a fan to keep the processor cool. It is used in GPUs (Graphic
Processing System) and video card processors.
(iii) Parallel Port: It is used for devices that require high speed data transmission such
as printers. It is used to connect scanners, printers, CD writers etc.
(iv) Flash Drive: It is a small and portable data storage device mainly used to transfer
data from the hard drive of one computer to another. It is removable and
rewritable with storage capacity up to 2 TB.

CHAPTER-2: NUMBER SYSTEM


A. Fill in the blanks:
1. 2
2. Decimal
3. 8
4. 10
5. Binary
6. Hexadecimal
7. 0
B. State true or False:
1. False
2. True
3. False
4. True
5. False
6. False
C. Applications Based Questions:
1. Start multiplying the digits of the decimal number from right hand side with increasing
power of 8(80, 81) and so on)
2. He should borrow 1 from the number present on it’s immediate left.
D. Multiple Choice Questions:
1. Aryabhatta
2. Digital Computer
3. Binary
4. 1
5. 2
E. Answer the following:
1. A number system is a set of values used to represent different quantities. For
Example: number of students present in a class. Commonly used types of number
system are Decimal, Binary, Octal and Hexadecimal.
2. To convert a decimal number into a binary number, follow the given rules:
 Divide the given decimal number with the base 2.
 Write down the remainder and divide the quotient again by 2.
 Repeat the step 2 till the quotient is zero.
3. There are four rules to multiple binary numbers:
• When 0 is multiplied with 0, the result is 0.
• When 0 is multiplied with 1, the result is 0.
• When 1 is multiplied with 0, the result is 0.
• When 1 is multiplied with 1, the result is 1.
4. The Octal number system (Oct) consists of 8 digits, from 0 to 7, with the base 8.
5. The number system with base 16 is known as Hexadecimal number system. It consists
of 16 digits with numbers 0-9 and the letters A-F, where A-F represent decimal
numbers from 10 to 15.

CHAPTER-3: COMPUTER VIRUS

A. Fill in the blanks:


1. Disrupts
2. Speed, Destruction
3. Boot Sector
4. Creeper
5. My Doom
6. Antivirus software
B. State True or False:
1. True
2. False
3. False
4. True
5. False
6. True
C. Application Based Questions:
1. Any Antivirus Software like Avast, AVG, McAfee can be installed.
2. Program file virus
D. Multiple Choice Questions:
1. Boot Virus
2. Trojan Horse
3. 1987
4. April First
5. FarooqAlvi Brothers
E. Answer the following:
1. A computer virus is a program or a set of programs that disrupts the normal operation
of a computer. It infects or destroys the data. For Example, Trojan Horses, Worms,
Spyware etc.
2. Three possible symptoms of a virus are:
• Decreasing the speed of a computer.
• Unexpected error messages pop up.
• Computer may shut down and restart frequently.
3. Spyware is a type of malware Which when installed on the system collects
information about the users without his knowledge. It can collect various types of
personal information such as passwords, credit card numbers etc. and can transmit it
to someone who can misuse it for monetary purposes.
4. Trojan Horse are programs that pretend to be useful software but actually damage the
computer once installed. They create backdoor on the computer by giving
unauthorized access to malicious users.
5. To prevent virus attack, follow the given tips:
• Every PC should be equipped with an updated anti-virus program.
• Always scan the pen drive before copying files.
• Scan the hard disk twice a month.
6. Antivirus software is computer programs designed to identify, prevent and remove
virus from the computer. Some of the popular antivirus software used nowadays are
McAfee, AVG Antivirus, Quick Heal etc.
CHAPTER-4:
ETHICS AND SAFETY MEASURES IN COMPUTING

A. Fill in the blanks:


1. Computing
2. Citation
3. Cyberbullying
4. Hacking
5. Intellectual Property
B. State True or False:
1. True
2. False
3. False
4. True
5. False
C. Application Based Questions:
1. Indicative features are:-
• If the mail does not include Neha’s email address in the ‘To:’ or ‘CC:’ fields is a
common form of spam.
• If the mail contains offensive language or links to websites with inappropriate
content.
2. She can check whether the site is secured or not by checking the URL. If the URL starts
with the “https” tag, it is a secured website else not.
D. Multiple Choice Questions:
1. Spam
2. Cookie
3. Copyright
4. Encryption
5. Phishing
E. Answer the following:
1. Advantages of Internet:
 Powerful search engines like Google, Yahoo etc. facilitate user by finding
information on almost every subject.
 People can connect with each other in an easy and inexpensive way, through social
networking sites like Facebook, Twitter etc.
 Online services enable people to carry out their tasks, anytime and anywhere such
as e-banking, e-reservation, etc.
 Internet provides the facility to share information with many users simultaneously
in an easy manner.
2. Some of the common ethical guidelines which should be followed while using a
computer are:
 Do not use computer technology to cause disruption or interference in other users'
work.
 Do not spy on another person's computer data.
 Do not use computer technology to steal information.
 Do not use someone else’s computer resources without any authorization.
3. Plagiarism is the usage or imitation of the language and thoughts of another person
projected as one's own original work.
Steps to Prevent Plagiarism:
 We should follow 'Citation' which means acknowledging the original writer and
the source from where the material has been taken.
 We must specify the source, which informs readers regarding the basis of one's
ideas and the extent of one's research.
 We can rephrase the material to avoid plagiarism.
 We can use quotation marks around the quoted words of another person to avoid
plagiarism.
4. We can protect Intellectual Property Rights by using Three steps.
 By Patenting our inventions
 By Copyrighting our Art and Publications
 By Registering our Trademarks
5. (a) SPAMMING: It refers to unwanted e-mails, sent indiscriminately to multiple users
worldwide. It can be used to spread computer Viruses, Trojan Horses, Worms or other
malicious software.
b. Cybercrime: A Cybercrime is any illegal activity done through Internet such as
identity theft, where somebody can steal your e-mail id or password and use it to
send fake e-mails to people containing false information about the product or
winning a lottery, etc
c. Digital Footprints: It is the impression or information about a person that exists on
the internet because of his online activity.
d. Software Piracy: When software is copied and distributed illegally, it is called
Software Piracy.
e. Hacking: It refers to an illegal intrusion into a computer system or network to steal
important data or to destroy it. Hacking which is done for a good cause, such as
national security, etc., is known as Ethical hacking.
f. Phishing: It is an act of sending an e-mail or an online link to a user misleading him
to believe that it is from a trusted person or organization. Further, the user is
asked to visit a website in which he is asked to update or validate his personal
details, such as user name, password, credit card details, etc. In this way the
operators of the fake website steal your identity and commit crimes in your name.
This could damage your reputation and cause heavy financial losses.

CHAPTER-5:
SPREADSHEET - AN INTRODUCTION

A. Fill in the blanks:


1. Three
2. Merge & Center
3. Formula
4. Sheet
5. Column
6. Tab Scrolling
7. F12
B. State True or False:
1. False
2. False
3. False
4. True
5. False
6. True
C. Application Based Questions:
1. Right-Click on the Sheet tab, which is to be renamed, and click on the Rename Option.
Now type in ‘Class Schedule’ in the text box that appears.
2. Rohit should type in all his expenses in a column. Enter the formula “=Sum (First cell :
Last cell )” in a cell to calculate the total expense. To find out the balance money,
enter the formula “=(500-Total expense)”.
D. Multiple Choice Questions:
1. AutoSum
2. Left
3. 1048576
4. Name
5. Equal to (=)
6. Three
E. Answer the following:
1. Features of Microsoft Excel:
 We can perform simple and complex mathematical calculations using Formulas
and Functions.
 The data is automatically recalculated in the entire worksheet if any change is
made in a single cell.
 Data can be viewed in a graphical form, such as charts, which help to understand,
analyse, and compare data in an effective manner.
 AutoFill option is one of the exciting features of Excel which helps in quick data
entry in large series of cells
2. An Excel window which appears like a notebook on the screen is called a Workbook.
Whereas, a Worksheet is a grid like area, made up of rows and columns, where we can
enter and work with data. By default, A Workbook is named as ‘Book1’ and
Worksheet with names Sheet1, Sheet2 and Sheet3. A Workbook contains Worksheets
within it.
3. A cell is an intersection of a column and a row in a worksheet. Each cell is identified by
the combination of its column letter and row number, which is known as cell address.
A cell can contain upto 32,767 characters.
4. A Formula bar is an area located to the right of Name box which shows the data and
formulas that you enter in an active cell. Whereas, a Name box is a space which
displays the location of the cell pointer and is located just above the Column heading
on the left side of the window.
5. Three types of data can be entered in a Microsoft Excel sheet, which are as follows:
 NUMBERS: Numbers are values that consist of numerals from 0 to 9 and the
characters, like +,-,!, @, $, %, ^, &, etc and can be used in calculations. By default,
numbers are right aligned in a cell.
 TEXT: Text data can contain alphabets, numbers, spaces and special characters.
Text data is not used in calculations, rather text entries are used for worksheet
headings, names, and for identifying columns of data.
 FORMULAE: A formula is a mathematical equation involving number values,
operators and cell addresses used to perform calculations on a worksheet.
Formulae can range from basic mathematical operations to complex calculations
and begin with an equal to (=) sign.

WORKSHEET
Chapters 1, 2, 3, 4, and 5

A. Fill in the blanks:


1. Software, Hardware
2. Formulas
3. Spreadsheet
4. Radix
5. Multipartite
B. State True or False:
1. True
2. False
3. False
4. False
5. True
C. Convert the following numbers into their equivalent decimal numbers:
1. 61
2. 25
3. 158
4. 27
5. 55
D. Name the term used for the following unethical practices which are prevalent in the
society:
1. Cyberbullying
2. Plagiarism
3. Phishing
4. Hacking
WORKSHEET
Chapters 1, 2, 3, 4, and 5

A. Choose the best answer:


1. Cell
2. 16,384
3. Plotter
4. 8
5. Malware
B. Answer in one word:
1. Multifunction Printer
2. 2
3. Hard disk, CD ROM
4. MyDoom
5. Aryabhatta
C. Answer the following:
1. An Excel window which appears like a notebook on the screen is called a Workbook. Whereas,
a Worksheet is a grid like area, made up of rows and columns, where we can enter and work
with data. By default, A Workbook is named as ‘Book1’ and Worksheet with names Sheet1,
Sheet2 and Sheet3. A Workbook contains Worksheets within it.
2. CPU is the main unit of a computer. It is alternately referred to as microprocessor. It
controls all the instructions it receives from hardware and software running on a
computer.
3. A number system is a set of values used to represent different quantities such as
number of students in a class or number of viewers watching a particular show, etc.
4. Advantages of Internet:
 It helps in finding information on almost every subject using powerful search
engines, like Google, Yahoo etc.
 It helps people in connecting with each other in an easy and inexpensive way
through social networking and discussion boards. E-mail, Skype, and Facebook are
just a few examples of service providers that bring the world closer.
 Online services like e-banking, e-reservation, e-shopping, etc. enable people to carry
out their tasks while sitting at home.
 Internet provides the facility to share information with many users simultaneously
in an easy manner.
5. Plagiarism is the usage or imitation of the language and thoughts of another person
projected as one's own original work. It is considered a crime or fraudulent act.

CHAPTER-6:
MORE ON SPREADSHEET

A. Fill in the blanks:


1. Range
2. F9, F10
3. Ctrl
4. Clipboard
5. F8
B. State True or False:
1. False
2. False
3. True
4. True
5. False
6. False
7. True
C. Application Based Questions:
1. Select the column to the left of which she wants to insert a new column. Click on the
arrow next to the Insert option and choose the Insert Sheet Columns option. The
column gets inserted.
2. Use the Autofill feature.
D. Multiple Choice Questions:
1. F4
2. Paste
3. Ready
4. Ctrl
5. Ctrl+Z
6. Apostrophe
E. Answer in one word or one sentence:
1. To clear the contents of the cell.
2. F2
3. Selecting the required border style, under the Border tab in the Format Cells option.
4. Answer the following:
1. After double clicking on the cell, we find that Edit mode is indicated on the left side of
Status bar. Now, change the contents to something else and press Enter. The mode
shifts to Ready after pressing Enter
2. To insert multiple columns, select the same number of columns that you want to
insert and Click on the Insert button or Right click on the column and choose Insert
command accordingly.
3. The Redo command is used to quickly repeat the last action which you have
performed whereas Undo command is used to cancel the changes and retrieve the
previous data.
4. Click on any cell and Hold Ctrl button. Now click on non-adjacent cells while holding
the Ctrl button in the worksheet and then release Ctrl button when you are done.
5. Select the range of cells and position the mouse pointer at the edge of selected cells.
Notice the pointer changes to a move pointer symbol. Drag the selected range of cells
to a new location and release the mouse button.
6. The two methods of copying data are as follows:
a) Select the cell and click on Copy button in the Clipboard group. Select the destination
cell and click on Paste button on the Clipboard group. The text will be copied to the
new location.
b) Select & Right click on the cells from where the data is to be copied. Choose Copy
option from the shortcut menu which appears and now Right click on the cell where
we want to place the selected data and Choose Paste option from the shortcut menu
7. AutoFill is a feature that allows the user to extend a series of numbers, dates, or even
text to the necessary range of cells. It can be applied via following steps:
a) Select the cell which contains data and position the pointer at the lower right
corner of the cell.
b) The mouse pointer changes to a ‘+’ sign and then hold the left mouse button and
drag the pointer across the cells which you want to fill and release the button.

CHAPTER-7:
DATABASE AND DBMS-AN INTRODUCTION

A. Fill in the blanks:


1. Database
2. DBMS
3. Flat File
4. Templates
5. Datasheet
B. State True or False:
1. False
2. False
3. False
4. False
5. True
C. Application Based Questions:
1. Design View
2. 6
b. 4
c. Komal, Priya
d. 4
e. 5
D. Multiple Choice Questions:
1. .accdb
2. Two
3. Data Integrity
4. Memo
5. Pencil
E. Answer the following:
1. A database is an organized collection of data which helps us to enter, manage, access,
and analyse a large amount of information quickly and efficiently. Examples of
database are maintaining addresses and phone numbers of our friends, creating a list
of library books, keeping students’ records pertaining to academic and co-curricular
achievements, keeping employees' information, etc.
2. FLAT FILE DATABASE: A flat file database refers to the data files that contain records,
which have a small, fixed number of fields, without any structured relationship. For
example, Microsoft Excel.
RELATIONAL DATABASE: A relational database stores the data in several tables and
links those tables together to get a common piece of information. For example,
Microsoft Access, Microsoft SQL, Oracle
3. Tables are the building blocks of a database which store the complete data in a
structured manner, i.e., in the form of rows and columns. Elements of a Table are:
Fields, Records, and Data.
4. A Data type is used to declare the fields of a table and determines the type of data, a
particular field can accept. Once the data type is defined, we cannot enter a different
type of data in it.
Text: It is used to store text or a combination of text and numbers that does not
require calculations, such as addresses, phone numbers, etc. The fields with this data
type can have maximum of 255 characters.
5. A Primary key is a sort of check on the table that every record in the table is unique.
The field which is designated as the Primary key of a table can neither have duplicate
data nor can it be left blank while entering the data.
For example: A Students table; we all know that each student in a class has a unique
Roll No that cannot be assigned to any other student. Hence, Roll No can be defined as
a Primary key to uniquely identify each record.

CHAPTER-8:
WORKING WITH TABLES AND QUERIES

A. Fill in the blanks:


1. Sorting
2. Toggle Filter
3. Freezing
4. Query
5. OR
B. State True or False:
1. False
2. False
3. False
4. False
5. False
C. Application Based Questions:
1. Specifying the simple criteria
2. Answers are as follows:
• Account Number
• Setting account type as savings.
• Setting criteria>2000
D. Multiple Choice Questions:
1. Select
2. Two
3. Parameter query
4. Table
5. Remove Sort
E. Answer the Following:
1. Sorting means arranging the data either in the ascending or descending order. We can
sort data within a table based on the values of a particular field. To sort the data,
follow the steps given below:
 Select the field that you wish to sort.
 Click on the drop-down arrow of its field header.
 Select either Sort Smallest to Largest or Sort Largest to Smallest option from the
drop-down list (if the field is numeric) or select the Sort A to Z or Sort Z to A option
(if the field is alphanumeric). Observe the change in the database.
2. Filtering in a Datasheet implies displaying specific records while hiding rest of the
records until the filter effect is cleared. This is the utility of Filtering in datasheet.
3. A Query is a database object that helps a user to retrieve and view information from
one or more database tables that meet a specific condition/criteria, specified by the
user.
Major Parts of a Query Window are as follows:
a) Design Area – It is present at the top and displays the fields, tables, and queries
that you may want to use in the query.
b) Grid – It is present at the bottom and contains columns where you can set up the
fields.
4. A Criteria is the one which contains the condition on the basis of which the records
can be filtered in the Query output. If an item matches all the criteria you enter, it
appears in the query results.
5. It is an advanced version of the normal filter. By specifying the customized filter
criterion, it further narrows down the display of the records. It can be applied on a
table in the datasheet by the following steps:
a) Click on drop-down arrow present to the right of the selected column header
b) Select The Number filters option after which a cascading menu appears
c) Select any options from the list (Equals, Does Not equal, Less Than, Greater Than,
Between)
d) The Custom Filter dialog box appears in which type the required number and click
OK.

CHAPTER-9:
USING LIST, IMAGES AND LINKS

A. Fill in the blanks:


1. Bullet, Number
2. Unordered
3. Start
4. Nested
5. Hyperlinking
B. State True or False:
1. False
2. True
3. True
4. True
5. False
C. Application Based Questions:
1. The right syntax is <OL start=“iii”
2. Use the Anchor tag and its “href” attribute.
D. Multiple Choice Questions:
1. Bulleted
2. Disc
3. Rectangle
4. <IMG>
5. <A>
6. href
E. Answer the following:
1. <UL> tag is used for Unordered List whereas <OL> tag is used for Ordered List. <UL>
tag is used when the items are not to be displayed in any particular order whereas
<OL> tag is used to display the list of items in a specific order. <UL> tag gives you
bullets by default whereas <OL> tag gives you numbers.
2. There are three types of Lists in HTML:
a) Unordered list — It is used to group a set of related items in no particular order.
b) Ordered list — It is used to group a set of related items in a specific order.
c) Definition list — It is used to outline multiple term and their descriptions one after
another.
3. We can add Images to a HTML document using <IMG> tag. It is an empty tag and
requires different attributes to be specified with it. The different attributes of the
image tag are as follows:
a) SRC – This attribute helps in defining the source of an image i.e. we need to
mention the path whether the file is being taken from the computer or internet
b) HEIGHT AND WIDTH – The Height and Width attribute specify the height and width
of an image respectively, either in the form of an integer or percentage value.
c) ALIGN – This attribute aligns an image relative to the surrounding text, according
to the specified value.
d) ALT – It is used to display alternate text for the images so as to provide description
about the images.
4. Using Alternate text with image is important because sometimes, a browser on the
user’s computer does not display images due to slow connection or error in the SRC
attribute. In that case, we can display alternate text for the images with the help of
ALT attribute.
5. HTML renders a powerful feature of linking multiple web pages together (known as
Hyperlinking) through the <A> (Anchor) tag. There are 2 types of Linking:
a) Internal Linking – It means when one part of a web page is linked to another
section on the same page.
b) External linking – It means when one page is linked to another web page or
website.
CHAPTER-10:
TABLES AND FORMS IN HTML

A. Fill in the blanks:


1. Cellspacing
2. Valign
3. Rowspan
4. Checkbox
5. Radio
B. State True or False:
1. False
2. False
3. True
4. True
5. False
C. Application Based Questions:
1. CELLPADDING attribute should be used to set the amount of space in between the cell
border and the cell data by 5 pixels. CELLSPACING attribute should be used to set the
minimum distance between two adjacent cells by 3 pixels.
2. She should use <TEXTAREA> tag along with rows and cols as attributes.
D. Multiple Choice Questions:
1. <TH>
2. Row
3. Cellpadding
4. <INPUT type =”Text”>
5. <SELECT>
E. Answer the following:
1. We can set the Background color of a table, row and cell using BGCOLOR attribute
along with following tags: <TR> for table row, <TABLE> for Table and <TD> for a cell
2. CELLSPACING: This attribute is used to set the minimum distance between two
adjacent cells. It is measured in pixels.
CELLPADDING: This attribute sets the margins within a cell and sets the amount of
space in between the cell border and the cell data. The value of this attribute is
indicated in pixels.
3. Colspan is used to combine cells horizontally. It specifies the number of columns that
the cell spans across and merges them to a single cell whereas Rowspan is used to
combine cells vertically. It merges the number of cells vertically and displays them as a
single cell.
4. A form is a collection of fields of information on a page. The various fields of
information in a form may contain, text boxes, radio buttons, drop down menus,
checkbox, password box, and other elements.
5. The two input elements of a form are as follows:
a) TEXTBOX – This allows a user to enter data such as characters and numbers. The
Textbox element creates a single line text box.
b) CHECKBOX – This is like a toggle switch where a user can select or deselect one or
more than one items.
6. Colspan is used to combine cells horizontally. It specifies the number of columns that
the cell spans across and merges them to a single cell.
Example: <TD colspan =”7”>, where 7 is the number of columns that the cells span
across.
Rowspan is used to combine cells vertically. It merges the number of cells vertically
and displays them as a single cell.
Example: <TD rowspan=”5”>, where 5 is the number of rows that the cells span across.

WORKSHEET
Chapters 6, 7, 8, 9, and 10

A. Fill in the blanks:


1. Range
2. Datasheet
3. Templates
4. Relationships
5. List
6. Align
B. State True or False:
1. False
2. True
3. True
4. False
5. False
6. True
C. Match the following:
 To select the entire worksheet --- Ctrl + A
 To repeat last actions or redo something
 that you have undone --- F4
 To apply outline border around the selected cell --- Ctrl + Shift + 7
 To maximize the worksheet --- Ctrl + F10
 To minimize the worksheet --- Ctrl + F9
 To paste the data --- Ctrl + V

WORKSHEET
Chapters 6, 7, 8, 9, and 10

A. Choose the best Answer:


1. Clipboard
2. MS Access
3. Sort
4. Nested list
5. Cellspacing
B. Answer in one word:
1. F2
2. Two
3. Select query
4. bgcolor
5. Three
C. Answer the following:
1. A Table is a representation of data in rows and columns which helps in making
comparative analysis of data and displaying information to make it easier to read
and evaluate. The two attributes of the Table tag are as follows:
a) BORDER – It is used to draw a border around the table
b) BORDERCOLOR – It is used to set the colour of a table’s border
2. A flat file database refers to the data files that contain records, which have a small,
fixed number of fields, without any structured relationship. For example, Microsoft
Excel.
A relational database stores the data in several tables and links those tables together
to get a common piece of information. For example, Microsoft Access, Microsoft SQL,
Oracle
3. A Query is a database object that helps a user to retrieve and view information from
one or more database tables that meet a specific condition/criteria, specified by the
user. The different types of queries are Select, Parameter, Crosstab, Action, and SQL.
4. A form is a collection of fields of information on a page. The various fields of
information in a form may contain, text boxes, radio buttons, drop down menus,
checkbox, password box, and other elements.
5. The difference between an Ordered List and Definition list is as follows:
a) Ordered list — It is used to group a set of related items in a specific order and gives a
number to each item in the list, that is why it is also known as Numbered list. <OL> tag
is used to represent the same.
b) Definition list — It is used to outline multiple term and their descriptions one after
another. <DL> tag is used in conjunction with <DT> and <DD> tags. Here <DT> helps in
defining the terms/names whereas <DD> helps in describing each term or name.
CLASS 8
CHAPTER-1:
OPERATING SYSTEM AND GRAPHICAL USER
INTERFACE - ROLE AND FUNCTIONS

A. Fill in the blanks:


1. Hardware
2. Software
3. Application
4. Distributed
5. Command line
B. State True or False:
1. True
2. False
3. False
4. False
5. True
C. Multiple Choice Questions:
1. Operating System
2. Multi-tasking
3. RTOS
4. Command Line
5. GUI
D. Application Based Questions:
1. Mohit should use Real Time Operating System (RTOS)
2. No, she should use GUI rather than CUI
E. Answer the following:
1. Hardware refers to the physical parts of a computer that you can see and touch,
whereas Software refers to the instructions or programs, that tell the hardware what
to do. It is not a physical part, but it is stored on a physical medium.
2. A System Software is a collection of one or more programs that controls and manages
the overall operation and performance of a computer system. It can be classified into
four categories:
a) Operating System
b) Language Processor
c) Device Drivers
d) Utility software
3. We need an Operating System because it is the center of interaction between
software and hardware components. Further, an operating system encompasses all
operations, such as What to do, When to do and How to do.
4. The 2 functions of an Operating System are as follows:
a) Processor management – The operating system ensures that all
processes/applications receive enough time from processor to function properly.
b) File management – The operating system keeps a track of information regarding
creation, deletion, transfer, copy, and storage of files in an organized manner.
5. GUI interface is much attractive and appealing whereas CUI interface is relatively less
appealing. GUI is easier to learn and more user-friendly since it contains various
graphical elements, like icons, menu buttons etc. whereas CUI is a text-based interface
and is not user-friendly. In GUI, multiple tasks can run simultaneously at a time
whereas in CUI, only one task can be executed at a particular point.
6. i. Multi-user operating system allows more than one user to use the same computer at
the same time or at different times.
ii. Multi-threading operating systems allow different parts of a software program
to run simultaneously. The feature of multithreading can delay the execution
response of certain processes.
iii. Real time operating system is used when the time span required to react to an
input is rigid and time bound. Even a microsecond of delay will cause the
system to fail.
iv. Distributed operating system runs on a set of computers that are located in
different geographical areas, interconnected by a network. It controls these
interconnected systems and makes them appear as a single computer.

CHAPTER-2:
SPREADSHEET - FORMULAS AND FUNCTIONS

A. Fill in the blanks:


1. Calculations
2. Cell reference
3. Absolute reference
4. Arguments
5. &
B. State True or False:
1. False
2. False
3. True
4. True
5. False
C. Application Based Questions:
1. MAX () & MIN () function
2. '=15000+15000*10/100 or 15000 + 1500
D. Multiple Choice Questions:
1. Sheet1! D4
2. Alt + =
3. Max ()
4. A3
5. Count ()
E. Answer the following:
1. A formula is an expression that can include cell addresses, numbers, arithmetic
operators and parenthesis. We can perform simple as well as complex calculations
using functions. It must begin with = symbol followed by cell references and
operators. For example: =A2+B2*C4-SUM(E3:E5).
2. The cell address in the formula is known as the cell reference. Types of cell reference
are – Relative Reference, Absolute Reference and Mixed Reference.
3. Absolute reference is a cell reference method used in the condition when we do not
want to change the address of the cell on copying the formula to another cell. To
make absolute reference of a formula, you have to add dollar ($) sign before the
column and row number, for example =$A$1+$A$2.
4. A circular reference occurs when a formula in a cell refers to its own cell value directly
or indirectly. For example: If we enter the formula =A1+A2*A3 in cell A2, we are
making the formula to refer to its own cell value, which is not possible. Excel returns a
0 if you accept this circular reference.
5. Functions are pre-designed formulas in Excel to perform simple and complex
calculations. They accept the Arguments and Return values. Some of the commonly
used function are: SUM, AVERAGE, MOD, ROUND, POWER, SQRT, ODD.
6. Rules to enter a function are:
 All Excel functions must begin with a ‘=’ sign.
 Function name must be a valid Excel name, e.g., SUM, AVERAGE.
 Function name must be followed by opening and closing parenthesis.
 Parenthesis contain arguments within it. For example, =SUM (A1:A5). If there are
more than one argument, then they should be separated by comma. For example,
=SUM(A1:A5).
CHAPTER-3:
CHARTS IN EXCEL
A. Fill in the blanks:
1. F11
2. Sparklines
3. Legend
4. Radar
5. Chart Title
B. State True or False:
1. False
2. False
3. True
4. False
5. True
C. Application Based Questions:
1. Pie Chart
2. Format Plot Area
D. Multiple Choice Questions:
1. Area
2. Stock
3. Category axis
4. Line
5. Scatter
E. Answer the following:
1. Chart is an effective way to display data in a pictorial form. Charts make it easier to
draw comparison and analyse the growth, relationship and trends among the values in
a range. It provides more accurate analysis of information.
2. A Column chart displays the categories horizontally and the values vertically whereas
the Bar Chart displays the categories vertically and values horizontally. The column
chart is used for displaying data that shows different trends over a period of time
whereas Bar chart is used to illustrate the data comparison between individual items.
3. COMPONENTS OF A CHART
 CHART AREA: Chart area includes all the area and objects in the chart.
 CATEGORY AXIS: Category axis or X-axis is the horizontal axis of a chart.
 VALUE AXIS: Value axis or Y-axis is the vertical axis used to plot the values. It is
located at the left side.
 DATA SERIES: Data series are the bars, slices or other elements that show the data
values. If there are multiple data series in the chart, each will have a different
colour or style.
 CATEGORY NAME: Category names are the labels, which are displayed on the X
and Y-axis.
 PLOT AREA: Plot area is a window within the Chart area. It contains the actual
chart itself, and includes plotted data, data series, category, and value axis.
 LEGEND: It depicts the colours, patterns or symbols assigned to the data series. It
helps to differentiate the data.
 CHART TITLE: It describes the aim and contents of the chart.
 GRIDLINES: These can either be Horizontal or Vertical lines depending on the
selected chart type. Gridlines make it easier to read and understand the values.
4. Pie chart displays data in the form of a circle that is divided into a series of segments
which show the relative size of each item in the chart. It always shows only one data
series and is useful when you want to emphasize on a significant element. This chart
type works best with smaller number of values.
5. Category axis or X-axis is the horizontal axis of a chart whereas Value axis or Y-axis is
the vertical axis used to plot the values. It is located at the left side.
6. To resize the chart, position the mouse pointer on any of the corner border of the
chart. You will observe that cursor changes to a double-headed arrow. Now drag the
handle in the desired direction to change the size accordingly.
7. To move the chart, place the cursor on the Chart area. A four-headed arrow appears,
press and drag it in order to move the chart in any direction. Release the mouse
button to place it at the desired location.

CHAPTER-4:
ALGORITHMS AND FLOWCHARTS
A. Fill in the blanks:
1. Algorithm
2. Flowcharts
3. Flowcharting
4. Finite
5. Decision
B. State True or False:
1. False
2. True
3. True
4. True
5. False
C. Multiple Choice Questions:
1. Flow lines
2. Input/Output box
3. Start/Stop box
4. On Page
D. Draw the flowchart symbols for the following:

Input A, B
Start Stop
A= A+1 Print A
Is
A>B

E. Answer the following:


1. The step by step procedure to solve any logical and mathematical problem is called an
Algorithm. To solve any problem on a computer, we plan the input and apply the required
methods step by step to get the desired result. Three Characteristics of an algorithm are:
INPUT, GENERALITY, DEFINITENESS
2. A flowchart is a pictorial representation of the steps or an algorithm used to solve a
particular problem. The process of drawing a flowchart for an algorithm is known as
Flowcharting. Two advantages of Flowchart are: COMMUNICATION and EFFECTIVE
ANALYSIS
3. Input/Output box is used for accepting inputs and giving output respectively of the
program.
4. Process box is used for writing the processing instructions and doing calculations.
5. Decision box is used for checking or applying any condition in the program.

CHAPTER-5:
INTRODUCTION TO JAVA & BLUEJ
A. Fill in the blanks:
1. Object Oriented Programming
2. Encapsulation
3. Class
4. Token
5. Initialization
B. State True or False:
1. True
2. True
3. True
4. True
5. True
6. False
C. Application Based Questions:
1. After compiling and closing, she should right click on the Class icon and select void
main (String[]args) option from the pop-up menu. A BlueJ Method Call dialog box
appears after which Click OK. The program successfully runs displaying the output on
the Output window
2. Arithmetic Operators
D. Multiple Choice Questions:
1. Variable
2. Object Oriented Programming
3. Abstraction
4. Bytecode
5. Unary Operator
6. +
E. Answer the following:
1. Objects are real world entities or items that can be either a non-living or living entity.
Every object is defined through its state and behavior: state defines the objects
attributes and behavior defines its function. For example, a pen as an object has its
attributes, such as brand name, model, colour, price, etc. Its behaviour (function) is
writing.
2. A class is regarded as blueprint to create objects. It defines data and functions
common to all objects of a certain kind. A class consists of two aspects: variables and
functions.
3. The word Polymorphism means “many forms”. Polymorphism helps the programmer
to use the same function name for more than one purpose. For example: Your mobile
phone has polymorphic ability i.e., it can be used to send SMS, play music, play games,
make a call etc.
4. Operators are special symbols, which are used to perform calculations. They are
applied to the variables and constants to form an expression. We need Operators to
solve multiple problems such as Arithmetic calculations, Relational operations, Logical
operations, Unary operations and Assignment Operations.
5. Keywords are the reserved words of a Java program with some special meaning and
can be used for that purpose only. The keywords cannot be used as identifiers that is,
variable name, class name or method name. All the keywords are written in lower
case letters only, for example: public, void, class, etc.
6. A Variable is a named location in the memory, which stores value temporarily
whereas Constants mean the fixed values that do not change during execution of a
program.
WORKSHEET
Chapters 1, 2, 3, 4, and 5
A. Fill in the blanks:
1. Processor management
2. Absolute Reference
3. Legend
4. Encapsulation
5. Loop
B. State True or False:
1. True
2. False
3. False
4. False
5. True
C. Identify and name the chart type on the basis of the features given below:
1. Column chart
2. Bar Chart
3. Line Chart
4. Pie Chart
D. Check if the statements given below are performing the same task as defined in the 'Task'
column. If not then write the correct statement, according to the task, in the last column:

Correct Answer
Correct Answer
t=t+1
Correct Answer
If(b>10)

WORKSHEET
Chapters 1, 2, 3, 4, and 5

A. Choose the best Answer:


1. Value error
2. M
3. F11
4. Algorithm
5. Java Virtual Machine
B. Answer in one word:
1. Blackcomb and Vienna
2. BEDMAS
3. Category Axis or X- axis
4. Applets
5. Inheritance
C. Answer the following:
1. RTOS is designed to handle real life scenarios and problems when the time span
required to react to an input is rigid and time bound. Such operating systems have the
capability to prioritize the processes, minimize execution time, and work
independently with no interdependencies. Examples are: Air traffic control, Robots,
Weapon systems, and Industrial control systems.
2. A circular reference occurs when a formula in a cell refers to its own cell value directly
or indirectly. For example, if we enter the formula =A1+A2*3 in cell A2, we are making
the formula to refer to its own cell value, which is not possible. A warning will be
displayed in such a case. As soon as you click on the OK button of the warning dialog
box, 0 will be returned in the cell containing formula. The Status bar will also notify
you that circular reference is found in the workbook and will display the cell address.
3. A Chart is an effective way to display data in a pictorial form. Charts make it easier to
draw comparison and analyse the growth, relationship and trends among the values in
a range.
Two components of a chart:
 CHART AREA: Chart area includes all the area and objects in the chart.
 CATEGORY AXIS: Category axis or X-axis is the horizontal axis of a chart.
4. The step by step procedure to solve any logical and mathematical problem is called an
Algorithm whereas A flowchart is a pictorial representation of the steps of an
algorithm used to solve a particular problem. A flowchart provides a much better way
of solving a problem as compared to a normal algorithm.
5. The word Polymorphism means “many forms”. Polymorphism helps the programmer
to use the same function name for more than one purpose. For example: Your mobile
phone too has polymorphic ability i.e., one name, but many functions.

CHAPTER-6:
DECISION CONTROL STRUCTURE

A. Fill in the blanks:


1. Selection
2. Step value
3. Three
4. Entry controlled loop
5. Do while
6. Flow of control
B. State True or False:
1. True
2. False
3. False
4. True
5. True
C. Application Based Questions:
1. For Loop
2. If(x%2=1)
D. Multiple Choice Questions:
1. If else
2. Initialization Expression
3. Fall through
4. 10
5. 1
6. Default
7. Switch
E. Answer the following:
1. The uses of IF control structure as follows:
a) It allows a program to choose whether or not to execute a particular statement
b) It can be used to check Boolean conditions as well
c) It can be used in many ways in a program such as if statement, if else statement, if
else if ladder etc.
2. The unique features of For loop are as follows:
a) It is used to repeat a particular task for finite number of times.
b) It is also called an Entry controlled loop, because the body of the loop is executed
only after the condition evaluates to true.
c) A For loop contains 3 expressions: initialization, condition, increment/decrement
expression
3. The switch statement is used when there is a requirement to check multiple
conditions in a program. Each value is called a case, and the variable being switched
on is checked for each case.. For example: we have to write a program to accept a
number from the user and print the corresponding color of the
RGB(1=Red,2=Green,3=Blue)
switch(val)
{
Case 1: system.out.println(“Color is red”);
Break;
Case 2: : system.out.println(“Color is Green”);
Break;
Case 3: system.out.println(“Color is Blue”);
Break;
Default: : system.out.println(“Wrong choice”);
}
4. The break statement takes the flow of control out of switch statement as without the
break statement, execution would simply continue to the next case. The default is the
last statement of the switch and it executes only when the values stored in switch
expression does not match any case.
5. The While loop repeats a statement or a block of statements while the specified
conditions remain true whereas the do while loop first executes the block of
statements for once and then checks the condition.

CHAPTER-7:
APP DEVELOPMENT

A. Fill in the blanks:


1. Hybrid Apps
2. App
3. Permissions
4. Social Networking
5. Flipkart
6. Desktop
7. Banking
B. State True or False:
1. False
2. False
3. True
4. True
5. False
C. Application Based Questions:
1. BookMyShow App
2. Facebook
D. Multiple Choice Questions:
1. News Aggregator
2. Appy Pie
3. Programming language
4. Entertainment
5. E-Commerce
E. Answer the following:
1. Apps can be broadly categorized into 3 types: Desktop Apps, Web Apps, Mobile Apps
Suppose, we take Mobile apps into picture. These apps run on a smartphone or a
tablet where screen size is much smaller than a Desktop or a Laptop. Mobile apps are
usually developed for a specific operating system and device. Example of Mobile apps
are: WhatsApp, Twitter, Hotstar
2. For developing an app, the following requirements one must have are:
a) A sound background in programming such as JAVA is essential
b) For Android apps, software such as Android Software Development Kit (Android
SDK) is required
c) Essential knowledge of XML, HTML and CSS may also be needed
3.
HYBRID APPS NATIVE APPS
These can contains the features of both These apps are designed for a particular
Web Apps and Native Apps and they are platform and are expensive to develop
multiplatform oriented and maintain
These apps require the device to be These apps may or may not require
connected to internet Internet depending upon the app design
Mostly Hybrid Apps are not pre-installed Native apps come pre-installed
Examples : Candy Crush, Examples:

4. A Desktop App is desktop or laptop based application whereas a Web App is usually
browser based and stored on a remote server. Desktop Apps generally do not require
web access and run independently on a computer whereas a Web App requires
Internet connection. Example of Desktop Apps: Notepad, Paint etc., Examples of Web
Apps: Google maps, Instant messenger, etc.
5. To download and install an app from the Google Play Store, simply Tap on the Play
Store icon on the screen of your device. In the Search bar, type the name of the app
that you wish to download. Now select the suitable app and tap the INSTALL button.
The app will request you for the permission to access certain information from your
device. Confirm your consent and the app will be downloaded and installed on your
device.
6. Educational apps are not only useful for the students, even teachers find the use of
such apps beneficial for them. They are able to distribute study material quickly,
conduct tests, and grade the students efficiently by using apps. Parents too make use
of educational apps to interact more closely with the teachers and thus monitor the
progress of their children.
7. Photo editing task can be done via following steps:
Desktop App – We can perform Photo editing using Photoshop, a very famous tool. It
should be installed on a Desktop or Laptop
Web App – We can perform Photo editing using Sumo Paint which is a web application
Mobile App – We can perform Photo editing using Mobile Pixlr which can be
downloaded from Play store or App store

CHAPTER-8:
NETWORKS
A. Fill in the blanks:
1. Transmission Medium
2. Bluetooth
3. PAN
4. Hyperlink
5. 32
6. Protocol
B. State True or False:
1. False
2. True
3. False
4. True
5. False
C. Application Based Questions:
1. Bluetooth mode
2. WAN
3. LAN
D. Multiple Choice Questions:
1. Blue
2. Hub
3. Modem
4. Metropolitan Area
5. Infrared
E. Answer the following:
1. A Computer Network can be defined as a group of computers and other peripheral
devices that are linked together for the purpose of sharing data and hardware
resources.
2. Transmission medium is the physical path through which the message travels from the
sender to the receiver.
3. The Two advantages of networking are: Efficient Use of Storage Media and Preserving
Information.
4. A Coaxial cable is a networking media used in the transmission of video,
communications, and audio. It is mainly used by the cable television industry to
connect TVs to a cable service. Difference between Baseband an Broadband coaxial
cable is as follows:
Baseband Coaxial cable supports quick transmission of a single signal at a time. It is
mainly used for LANs.
Broadband Coaxial cable transmits multiple signals at the same time and is used for
longer distances.
5. The range of transmission for Bluetooth is maximum upto 240 meters whereas
Infrared covers approximately 5 meters of distance. Bluetooth uses radio waves to
transmit data whereas Infrared uses light for data transmission. In Bluetooth,
communication devices can be positioned anywhere within the effective range
whereas Infrared requires a direct line of sight between the communicating devices.
6. The Domain name has many uses like it is used to convert human meaningful names
(domain name) to computer meaningful name (IP address). Further, it serves as
directory for the web by locating and addressing devices in a worldwide network.
7. A Gateway is a network point that acts as an entrance to another network using
different protocols. It allows us to carry out various online activities such as sending
email, browsing web pages, purchasing things online etc.
8. i. Wi-Fi stands for Wireless Fidelity. It creates a Wireless Local Area Network that
uses radio waves to send the information. A secure, reliable, and fast wireless
connection is established between the electronic devices and the Internet by using
this technology.
ii. A modem enables you to connect your computer to the available Internet
connection over the existing telephone lines. It converts the digital signals of a
computer into analog signals to enable their transmission via phone lines.
iii. Cluster Area Network, is a network comprising a series of small LANs over a
small geographical area, such as a college campus. This network covers an area
smaller than MAN.
9. i) A hub is a device that connects multiple Ethernet devices on one network and makes
them act together as a single network whereas a Switch contains many ports to
connect different network segments but offer great performance as compared to Hub.
A Hub distributes data to other ports in the network once it receives data in one of the
ports whereas a Switch is aware of the addresses assigned to each of its ports and
sends the data to the correct port.
ii) A Router is used to control traffic and keeping the network efficient, whereas a
Repeater is used to regenerate and enhance a signal. The Router doesn’t consist of a
Repeater whereas a repeater can contain a router.

CHAPTER-9:
CLOUD COMPUTING
A. Fill in the blanks:
1. Hybrid
2. OneDrive
3. Windows 10
4. Skype
5. Picasa, Google
B. State True or False:
1. False
2. False
3. True
4. False
5. True
6. False
C. Application Based Questions:
1. Rapid Elasticity
2. OneDrive settings
D. Multiple Choice Questions:
1. Private
2. OneDrive
3. Get a link
4. Rigidity
5. 1 GB
E. Answer in one word or sentence:
1. RESOURCE POOLING
2. COMMUNITY CLOUD
3. Sort
4. We cannot set.
5. Ctrl + N
F. Answer the following:
1. Cloud Computing is made up of two words, Cloud and Computing. Cloud is a metaphor
for Internet, hence it means Computing on the Internet. Thus, Cloud Computing refers
to manipulating, configuring, and accessing the applications online. It offers online
data storage, infrastructure, and applications.
2. The two advantages of Cloud Computing are: Cost Savings and Unlimited Free Storage
3. Picasa is a free program from Google that is used to organize, edit, and share the
digital photographs online. Once a user downloads Picasa, it automatically locates
photos on the user's PC and moves them to Picasa. It provides 1 GB free online storage
space to store photos.
4. To upload a file,
 Click on the Upload button.
 Select the Files option from the displayed list.
 Locate and select the file you want to upload, in the Open dialog box. Click on the
Open button.
 OneDrive takes a few seconds to upload the specified file. The uploaded file now
appears in the Files pane in the middle of the web page.
5. Characteristics of Cloud computing are as follows:
a) On-Demand Self Service – In this, resources can be used on-demand and often
bought on a subscription basis without human interaction with service providers.
b) Broad Network Access – Services can be accessed on the Internet anytime and
anywhere in the world through multiple devices.
c) Resource Pooling – Resources like virtual server space, network connections,
bandwidth etc., can be pooled by multiple users simultaneously from any location.
d) Rapid Elasticity – This allows consumers to transparently scale up(increase) or
scale down(decrease) the resources
e) Measured Service – It is based on a pay-for-use model where resource usage is
monitored, measured, and reported based on utilization.

WORKSHEET
Chapters 6, 7, 8, and 9

A. Fill in the blanks:


1. Loop
2. Flow of control
3. Hybrid Apps
4. Computer Network
5. Cloud computing
6. Picasa
B. State True or False:
1. False
2. False
3. False
4. False
5. True
6. False
C. Match the given action with the corresponding characteristic of Cloud Computing:

WORKSHEET
Chapters 6, 7, 8, and 9
A. Choose the best Answer:
1. BookMyShow
2. Bluetooth
3. Public
4. Picasa
B. Answer in one word:
1. Native Apps
2. Break Statement
3. Hub
4. Export Button
C. Answer the following:
1. An Entry controlled Loop, where test condition is checked before entering the loop
body, known as Entry Controlled Loop. Example: while loop, for loop

Loop, where test condition is checked after executing the loop body, known as Exit
Controlled Loop. Example: do while loop
2. A Desktop App is desktop or laptop based application which runs independently on a
computer and generally doesn’t require web access. Example of Desktop Apps:
Notepad, Paint etc.
3. Protocols are certain set of rules which determine how data should be transferred
over networks, compressed, presented on the screen, and so on. TCP/IP protocol is
used to connect various computers on the Internet and provides end-to-end data
communication. Also, it is used for a reliable and foolproof data transmission over the
network.
4. The disadvantages of Cloud computing are as follows:
a) Technical issues – Sometimes system encounters serious technical problems,
which may lead to suspending of business process
b) Security – Storing the company’s sensitive data and important files on third-party
cloud providers always opens up security risks
c) Vendor Lock in – Switching from cloud service to another is not so simple as it may
lead to portability and support issues.
d) Limited control – Consumer has very little control over the applications, data, and
services.
5. Features of Picasa are:
a) Provides a variety of special effects
b) It can be used as a platform to upload and store digital photographs
c) It can easily be synced with social media accounts
d) It lets you create slideshows, photos collage and videos with your photos

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy