Syllabus and Test Portion

DBMSKHS , JAMSHEDPUR
STD - 7  (SESSION: 2021-22)
PORTION (SUMMATIVE ASSESSMENT I):

UT 1: 10. CYBER THREAT
SA 1: 10. CYBER THREAT
           11. COMPUTER NETWORK
           01. NUMBER SYSTEM

PORTION (SUMMATIVE ASSESSMENT II):

UT 2: 12. OPERATING SYSTEM
SA 2: 03.  MORE ABOUT MS EXCEL 2016
           07. INTRODUCTION TO HTML 5
           12. OPERATING SYSTEM

Unit Test 1

10. Cyber Threat

LISTS OF PODCASTS:

1. Cyber crime
2. Cyber Crime against an Individual Person
3. Cyber Crime against Property
4. Cyber Crime against Society : VIRUS
5. Types of Virus: Overwrite and Boot Sector Virus
6. Types of Virus: Program File, Network and Multipartite Virus
7. Types of Virus: Polymorphic, Macro and Directory Virus
8. Hacking
9. Child Pornography, Cyber Vandalism, Forgery, Cyber Extortion, Cyber Terrorism, Cyber Squatting
10. CYBER SECURITY : Antivirus Software
11. Firewall
12. Encryption Software
13. Biometrics
14. Backup files and Password
15. Cookies

Read the Chapter Thoroughly. In case of doubt while going through the chapter please send the question in the Comment Section. After reading the chapter answer the following questions in your note book.

                                          Work from Home Assignment 1
Answer the Multiple Choice Questions in your notebook. Write the question and the Answer. You don't have to write the option which is present with each question. In case of doubt please sent your queries in Comment.

Which of the following is the type of software that has self-replicating software that causes damage to files and system?
A) Viruses
B) Trojan horses
C) Bots
D) Worms
Answer D. Worms

Question 2. Which of them is not an ideal way of spreading the virus?
a) Infected website
b) Emails
c) Official Antivirus CDs
d) USBs
Answer C. Official Antivirus CDs

Question 3. The full form of Malware is ________
a) Malfunctioned Software
b) Multipurpose Software
c) Malicious Software
d) Malfunctioning of Security
Answer C. Malicious Software

Question 4. An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
a) Cyber-crime
b) Cyber Attack
c) System hijacking
d) Digital crime
Answer B. Cyber Attack

Question 5. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.
a) Malware
b) Remote Access Trojans
c) Keyloggers
d) Spyware
Answer D. Spyware

Question 6. Data ___________ is used to ensure the state of keeping or being kept secret or private.
a) Encryption
b) Locking
c) Deleting
d) Backup
Answer A. Encryption

Question 7. Which of  the following is a software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited?
A) Backdoors
B) Adware
C) Malware
D) Bots
Answer B. Adware

Question 8. It is very important to block unknown, strange and ______________ within the corporate network.
a) Infected sites
b) Programs
c) Unwanted files
d) Important folders
Answer A. Infected Sites

Question 9. Compromising confidential information comes under _________
a) Bug
b) Threat
c) Vulnerability
d) Attack
Answer B. Threat

Question 10. Use of _______________ can bring external files and worms and virus along with it to the internal systems.
a) smart-watch
b) pen drive
c) laptop
d) iPod
Answer B. Pen drive


Question 11. _____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system.
a) Scareware
b) Ransomware
c) Adware
d) Spyware
Answer B. Ransomware

Question 12. What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?
A) Backdoors
B) Key-logger
C) Malware
D) Bots
Answer C. Malware

Question 13. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components
Answer A. Cracking or illegally hack into any system

Question 14. What types of data are stolen by cyber-criminals in most of the cases?
a) Data that will pay once sold
b) Data that has no value
c) Data like username and passwords only
d) Data that is old
Answer A. Data that will pay once sold

Question 15. Attackers commonly target ____________ for fetching IP address of a target or victim user.
a) websites
b) web pages
c) ip tracker
d) emails
Answer B. websites


Question and answers of the book:-

Section - A

A. Multiple Choice questions:
1. a) Cyber Security
2. c) Four
3. b) Biometrics
4. b) Polymorphic virus
5. a) Firewalls

B. Fill in the blanks:
1. SMS Spoofing
2. Nimda
3. Child Pornography
4. Cipher Text
5. Passwords

C. True or False:
1. True
2. False (correct: A cookie is a text file stored by the web browser on the hard disk.)
3. False (correct: Defamation is a act to lower down the self-respect of an individual in the society.)
4. True
5. False (correct: Strong Passwords are used to protect data in the system.)

D. Category (People/Property/Society)
1. Society
2. Property
3. People
4. Property
5. Society

Section - B

A. Short-answer questions:

1. The person who commits cyber offences are called as cyber criminals.
2. Vital Information Resources Under Seize
3. Anti virus programs are used to remove all the viruses from the computer.
4. Cyber stalking is the use of the Internet or other electronic means(computer or mobile phones) to stalk or harass an individual, a group, or an organization.
5. Network virus is a type of virus which has the ability to slow down the speed of the network.
6. Hacking is an unauthorized access of computer system or network to perform illegal activities.
7. The use of biometric technology is to improve the security of various systems that require the user's verification and the development of information technologies.
8.Cookies are the small text files which contains the record of the user's browsing activity , sent from a website, stored by the web browser on the computer's hard disk .


B. Long-answer questions:

1.
a) Email Spoofing:
-->Email Spoofing is a technique of creating of email messages with a forged/fake sender address .
-->A spoofed email is one in which header of the email is fake so that the mail is originated from one source but actually send from another resource.           

b)Identity Theft:
--> It is a kind of cyber crime where a fraud obtains the personal or financial information which includes ATM pin, credit/debit card number, DOB, Account details of an individual in  order to make transactions in the name of the victim.
--> It can be done in two ways: true name or account details.

c) Cyber Squatting:
-->It generally refers to the practice of buying up domain names or selling the products that use the names of existing and well established businesses with the intention to gain profit of someone else's hardwork.
--> The people who are engaged in such activities are called as cybersquatters.

2. Difference between Phishing and Pharming:(note: Students please divide the notebook's page in two halves and then write the differences. DO NOT write paragraph wise...I hope u all remember. )
   Phishing:
-->It is a type of cyber attack used to steal the login credentials and credit card numbers of an individual.
-->When an attacker convinces the victim to open an email account or text message or click on a link or download any attachment to get victim's user id and password.
Pharming:
--> It is also a type of cyber attack by which the attacker gets victim's personal information such as ID, password, account details etc by redirecting the victim to the fake websites unknowingly.
--> In this criminal practice, malicious or false codes are installed in a personal computer or in the server to redirect the victim.
 
3. The three affected categories in the world of cybercrime are as follows:
--> Cybercrimes against an Individual person.
--> Cybercrimes against Property
--> Cybercrimes against Organization/ Society

4. Encryption:
--> It is the process of converting normal message (plain text) into meaningless message(Cipher text).
--> It is actually called as secret writing.
--> This technique is used to secure the data transfer over the network.
--> It is of two types: symmetric and asymmetric encryption.
   Decryption:
--> It is the process of converting  meaningless message (Cipher text) into its original form(plain text).
--> Decryption method recovers the original message transmitted over the network.



5. The basic functions of an antivirus program are as follows:
--> It scans the whole computer for finding viruses.
--> It allows the users to run the scans automatically at any time.
--> It identifies the suspicious behavior of any computer program.
--> It scans the incoming emails which might contains virus in the attachment.

6. Virus:
--> It stands for Vital Information Resources Under Seize.
--> It is a malicious software program (bad program) which is loaded into one's computer without their knowledge to harm the operation of the system.
--> It mainly affects the memory, processing speed, data and programs of the computer system.
--> It is always man made and its main target is to harm the society.

Two types of virus as follows:(note: students you can write any two of your choice from the book)
--> Network Virus: 
It is a type of virus which has the ability to slow down the speed of the network. 
It can also move to the another computer through network (LAN: Local Area Network).
Ex:Nimda, Jerusalem, SQL Slammer.
--> Boot Sector Virus: 
Boot Sector is a small portion of the computer hard disk which stores the program through which a computer starts. 
This virus becomes active at the time of booting(starting) of a computer system and hence destroys the data and program of a computer. 
Ex: Michelangelo, Parity Boot etc.


7.  There are two types of encryption methods which are as follows:       
a) Asymmetric Encryption:            
--> It is also called as Public key Encryption.            
--> It is the modern method of secured communication.            
--> It uses pair of keys : public key(known to sender and receiver) and private key(known only to the receiver).            
--> In this method, sender uses public key to encrypt the message (Plain text to Cipher text )where as receiver uses private key to decrypt the message (Ciphertext to Plain text).                   
(note: draw the diagram given in the book, Pg no: 199)      

 b) Symmetric Encryption:            
--> It is also called as Private Key Encryption.            
--> It uses only one key that is private/secret key which is known to both sender and receiver.            
--> In this method, sender and receiver, both uses the same private key to encrypt(Plain text to cipher text) and decrypt (Cipher text to Plain Text)the message.                  
 (note: draw the diagram given in the book. Pg no: 199)

      ***************************************************************

SUMMATIVE ASSESSMENT - 1

1. NUMBER SYSTEM

List of VIDEOS:

1. Number System: Introduction
2. Types of Number System
3. Decimal to Binary Conversion
4. Decimal to Octal Conversion
5. Decimal to Hexadecimal Conversion
6. Binary to Decimal Conversion
7. Octal to Decimal Conversion.
8. Hexadecimal to Decimal Conversion
9. Binary to Octal & Vice-versa
10. Binary to Hexadecimal & Vice-versa
11. Binary Addition
12. Binary Subtraction
13. Binary Multiplication
14. Binary Division

Assignments:


A. Decimal to Binary Conversions:
1. (50)10  =    (  ?  )2
2. (124)10   =  (  ?  )2   
3. (69)10    =    (  ?  )2
4.  (101)10   =   (  ?  )2
5.  (256)10   =   (  ?  )2

B. Decimal to Octal Conversions:

1.  (25)10  =  (  ?  )8
2.  (76)10  =  (  ?  )8
3.  (122)10  =  (  ?  )8
4.  (82)10  =  (  ?  )8
5.  (105)10  =  (  ?  )8

C. Decimal to Hexadecimal Conversons:

  1. (212)10  = (  ?  )16
  2. (405)10  = (  ?  )16
  3. (99)10  = (  ?  )16
  4. (35)10  = (  ?  )16
  5. (634)10  =  (  ?  )16

D. Binary to Decimal Conversion:
  1. (110)  =  (  ?  )
  2. (1010)  =  (  ?  )
  3. (10001)  =  (  ?  )
  4. (1111)  =  (  ?  )
  5. (1001)  =  (  ?  )
E. Octal to Decimal Conversion:
  1. (71)  = (  ?  )
  2. (112)  = (  ?  )
  3. ( 305)  =  (  ?  )
  4. (65)  =  (  ?  )
  5. (7002)  =  (  ?  )
F.  Hexadecimal to Decimal Conversion:
  1. (1A)  = (  ?  )
  2. ( CAB)  =  (  ?  )
  3. (12E)  =  (  ?  )
  4. (55)  =  (  ?  )
  5. (20B)  =  (  ?  )
G. Octal to Binary Conversion:
  1. (453)  =  (?)
  2. (777)  = (?)
  3. (1020) = (?)
  4. (3214) = (?)
  5. (751) = (?)
H. Binary to Octal Conversion:
  1. (11111010101)  = (?)
  2. (101110101)  = (?)
  3. (1111100110011)  = (?)
  4. (111010101)  = (?)
  5. (101010101)  = (?)
I. Hexadecimal to Binary Conversion:
  1. ( 123F )  = (?)
  2. (FACE) = (?)
  3. (BEBE) = (?)
  4. (1009) = (?)
  5. (7C9) = (?)
J. Binary to Hexadecimal Conversion:
  1. (11010100111) = (?)
  2. (10101111111001) = (?)
  3. (111001) = (?)
  4. (11111100111) = (?)
  5. (101110111) = (?)
K. Binary Addition:
  1. 11100111 + 101001 = (?)
  2. 101101 + 1101 = (?)
  3. 1111101 + 11111 = (?)
  4. 10100 + 101 =  (?)
  5. 1101 + 1001  =  (?)
L. Binary Subtraction:
  1. 11001-1010 = (?)
  2. 10101-1101 = (?)
  3. 1111-1101 = (?)
  4. 100001-1111 = (?)
  5. 110011- 1001 = (?)
M. Binary Multiplication:
  1. 1101 * 11 = (?)
  2. 111 * 10 = (?)
  3. 10101 * 110 = (?)
  4. 1100 * 101 = (?)
  5. 110011 * 111 = (?)
N. Binary Division:
  1. 11001 / 101 = (?)
  2. 1010 / 11 = (?)
  3. 11101/ 101 = (?)
  4. 10101 / 111 = (?)
  5. 1011 / 11 = (?)
      

*****************************



  COMPUTER NETWORK


QUESTION AND ANSWERS:


SECTION - A

A. MULTIPLE CHOICE QUESTIONS:

(a) Repeater
(b) Network
(c) Internet Protocol
(d) Star
(e) LAN
(f) Network interface Card

B. FILL IN THE BLANKS:

(a) Internet / ATM
(b) ring
(c) Protocol
(d) hub
(e) networking

C. MATCH THE FOLLOWING:

(a) Example of MAN - Cable network in a city
(b) WAN - Also known as long Haul network
(c) LAN - Around 1.5 km is the maximum length for this
(d) Cables - used to connect devices on a network
(e) Nodes - Devices in a network

D. STATE TRUE OR FALSE:

(a) True
(b) True
(c) True
(d) True
(e) True


SECTION - B

A. Short-Answers Questions:

1. What is networking?
A. When a group of devices connected with each other in order to exchange  data and resources is called as networking.

2. What are the advantages and disadvantages of Networking?
A. Advantages of Networking:
      (Write any three points from the book)
     Disadvantages of Networking:
      (Write any three points from the book)      

3. How does Star Topology benefits us?
A. Advantages of Star Topology are as follows:
    --> It is very reliable.
    --> If one cable or device fails then all the others will continue to work.
    --> It is high-performing as no data collisions can occur. 

4. Write the purpose of using a MODEM?
A. MODEM:
    --> It stands for MOdulator and DEModulator.
    --> It is used to convert Digital signal to Analog signal and Vice-Versa.
    --> It is generally used to transfer digital data over a phone line.

5. Define protocol.
A. A protocol is a system of rules that define how data is transmitted over network.

6. Define Hub.
A. Hub:
  --> It is a networking device which is used to connect multiple devices in a network.
  --> They are generally used to connect computers in a LAN.


B. Long-Answers Questions;

1. State the difference between LAN and WAN.
A. Difference between LAN and WAN are as follows: (Divide the page in two halves and then write the answer)

LAN:
--> It stands for Local Area Network.
--> It operates over a small area .
--> It is usually privately owned.
--> Example: Office, School building , factory etc.

WAN:
--> It stands for Wide Area Network.
--> It operates over a large area.
--> It is usually owned by big Companies like Reliance, Airtel etc.
--> Example: ATM, Airline Reservation System.

2. What do you mean by Topology? Explain briefly.
A. Topology:
  --> It defines the way in which different nodes are placed and interconnected with each other.
  --> It defines the shape of a communication network.
  --> It also describes how the data is transferred between these nodes.

3. What is the difference between Bus Topology and Ring Topology?
A. Difference between Bus and Ring topology are as follows:  (Divide the page and then write the answer.)

Bus Topology: (Also called as Linear Topology)
-->  Here components are connected to a central cable called bus.
-->  Failure of one device does not affect the rest of the network.
-->  Easy to set-up and extend the bus network.

Ring Topology:
--> Here components are connected with each other in a shape of circle.
--> Failure of one device affect the rest of the network.
--> Adding or deleting the computer disturbs the network activity.

4. Explain any three networking devices.
A. Hub:
  --> It is a networking device which is used to connect multiple devices within a network.
  --> They are generally used to connect computers in a LAN.

   Switch:
  --> It is a networking device which is same as hub but it is more intelligent.
  --> Unlike hub,it can store the network address automatically and provides a dedicated line during communication.

  Routers:
  --> It is the most intelligent device among hub and switches.
  --> It is a networking device which forwards data packets from one network to another network.

5. Define:

(a) Repeater:
  --> It is a networking device which is used to increase the cable length.
  --> Generally it is used to regenerate or replicate a signal.

(b) Router:
  --> It is the most intelligent device among hub and switches.
  --> It is a networking device which forwards data packets from one network to another network.

(c) Gateway:
  --> A gateway is a hardware device that acts as a "gate" between two networks.
  --> The working principle of Gate is quite same as Router.
  --> Gateways controls traffic between two dissimilar networks (LAN and MAN / MAN and WAN) , while routers controls traffic between similar networks (between two MANs or LANs).

6. Explain the role of TCP/IP Networking.
A. TCP/IP:
    --> It stands for Transmission Control Protocol / Internet Protocol.
    --> It is the protocol which specifies how data is exchanged over Internet between two computers.
    --> These protocols identifies how the data should be broken into packets, addressed, transmitted, routed and received at the destination.



***************************************************



Summative Assessment - II

CH 3. MORE ON MS EXCEL 2016


GENERAL NOTES:

1. Basic difference between MS WORD and MS EXCEL is that in MS WORD we cannot use formula or function for calculation whereas in MS EXCEL, we can use formla and functions to do calculations.

2. WorkBook: 
  -->Collection of worksheets is called as WorkBook. 
  -->By default name of the Workbook is Book1.xlsx.  ( .xlsx is the file extension).
  -->Only one of the worksheets is active at a time.

3. Worksheet: 
  -->It is a collections of cells organized in rows and columns.
  -->By default name of the Worksheet is Sheet1

4. Cell: 
  -->It is the intersection of row and column.
  -->Total no of rows: 1048576 (row heading: 1 to 1048576).
  -->Total no of columns: 16384 (Column heading: A to XFD)

5. Active Cell:
  -->The cell with thick and bold border is the active cell.
  -->It means the cell is ready to accept data to be entered.

6. Cell Address: 
  -->Each cell on a worksheet is denoted with an unique address.
  -->Ex: B5 (where, B is the column heading and 5 is the row heading)

7. Name Box: It displays the address of an active cell.

8. Formula Bar: 
  -->It displays the content of the active cell.
  -->It can also be used to edit the data or formula present in the active cell.


LIST OF SHORTCUT KEYS:

1. ctrl + A   --> to select all / to select entire worksheet
2. ctrl + N  --> to open a new workbook
3. Tab  --> Move to the next cell
4. ctrl + B  --> Bold all selected/highlighted cells
5. ctrl + F  -->  to find any data on a worksheet
6. ctrl + H  --> to replace any data on a worksheet
7. ctrl + O  --> to open an existing workbook
8. ctrl + P  --> to print the current sheet
9. ctrl + Z  --> to Undo
10. ctrl + Y  --> to Redo
11. ctrl + S  --> to save the open worksheet
12. ctrl +HOME  -->  Move to cell A1
13. ctrl + END  --> Move to the last cell with text on the worksheet
14. ctrl + Tab  -->  Move between two or more open Excel Files
15.  F2  --> Edits the selected cell
16. F12  --> to open "save as" option
17. Alt + Shift + F1 --> Opens a new worksheet
18. Alt + F4 --> Exits excel
19. ctrl + 9  --> Hides selected rows
20. ctrl + 0  --> Hides selected columns 

1. What can be done to select a row and a column in a worksheet?
A. To select a row: Click on the row heading
     To select a column: Click on the column heading

2. What do you mean by Formula? How can you enter a formula in a worksheet?
A. Formulas are the symbolic expressions which are used for calculation of some values.
     To enter a formula in a worksheet, it must begin with = (equal to) sign.

3. Write down the function to display current date and time.
A. The function to display current date and time is "=Now( )"

4. Write down the shortest and easiest method to insert cell in a worksheet.
A. The shortest and easiest steps to insert a cell are as follows:
    -->  Right click on the cell where you want to insert
    -->  Click on the "insert" option shown on the pop-up list.
    --> Select the required radio button on the "insert " dialogue box and press OK.

5. Is it possible to change the name of a worksheet? If yes, How?
A. Yes, it is possible to rename a worksheet.
      Steps are as follows:
      -->  Right click on the sheet tab
      -->  Select the "Rename" option from the pop-up list.
      -->  Type the new name and press "Enter" key. 

6. Write down the steps to insert row and column in a worksheet.
A.  Steps to insert a row:
     -->  Select the row heading above which you want to insert a row.
     -->  Right click on that row heading.
     -->  Select the "insert" option from the pop-up list
     -->  Entire row will be inserted .
      Steps to insert a column:
     -->  Select the right hand side column heading where you want to insert a column.
     -->  Right click on that column heading.
     -->  Select the "insert" option from the pop-up list
     -->  Entire column will be inserted .

2. What is the use of Auto fill feature? Explain with example.
A. Auto fill Feature: 
    --> This feature is used to fill the series of data automatically.
    --> You just need to type two or three values initially and then just by dragging the        
          mouse    remaining values will be filled automatically.

      For Example:  (Write this answer from the book) pg.no : 55 (Last one)

5. What is the difference between move and copy? How can you move or copy a worksheet?
A. Move a worksheet means to change the location of a worksheet and copy a worksheet means to create a duplicate of it.

Steps to move or copy a worksheet are as follows:
-->  Right click on the sheet tab which you want to move or copy.
--> Select "move or copy" option from the pop-up list.
--> A "Move or copy" dialogue box opens.
--> Move or copy the worksheet to a "new workbook":
     *  Click on "New book" option in "To Book" drop-down list.
     *  Click OK button

1. What do you mean by Cell reference?
A. When a Cell or range of Cells are used in a formula on a Worksheet is called as Cell Reference. 

2. What is the difference between Basic Formula and Compound Formula?
A. Basic Formula can only use one type of operator whereas Compound Formula contains multiple operators.
ex:  =A1+A2+A3  (Basic Formula, because only "+" operator is used)
       = A1+A2-A3  (Compound Formula, because, two different "+" and "-" operators are used)

3. What is the purpose of Formula Bar?
A. --> It displays the content of the active cell
     --> Through formula bar, user can also enter data in the worksheet.

4. What is the difference between formula and function?
A. Formula are the expressions which are entered by the user whereas functions are the predefined formula which are already available in Excel.

5. What do you mean by Cell range?
A. --> A cell range is a collection of selected cells. 
     --> ":", Colon is used as Cell range in functions.

6. What is Name Box?
A. It displays the address of an active cell.

B. Long-answer Question:

1. What is Absolute Reference? Explain with the help of example.
A. --> It is a type of reference which does not change when copied to another cell.
     --> It is used to keep a row or column constant.
     --> It uses a ($) dollar sign before row and column name.
     --> Ex:   = $A$1 + $B$2

2. What do you mean by Formula? Explain its type with example.
A. Formula:
     --> A Formula is used to perform calculation or operations on the cell values like addition, subtraction, multiplication or division.
It is of two types:
(i) Basic Formula : If a formula contains only one type of operator then it is called as basic formula.
   Ex: = A1+A2+A3
(ii) Compound Formula: If a formula contains more than one operator then it is called as Compound operator.
   Ex: = (A1+A2+A3) / 3

3. Explain Relative Reference with example.
A. --> It is a type of reference which changes when copied to another cell.
     --> By default , the cell reference is relative reference.
     --> No dollar sign is required.
     --> Ex:  = A1 + B2

6. How can you combine data in cells including white spaces?
A. In order to combine data of multiple cells into one cell, we need to use (&) ampersand operator.
     And for extra white space we need to use white space in double quotation marks within ampersands.

7.  Explain Mixed Reference with example.
A. --> It is a type of reference which uses both Absolute and Relative Reference.
     --> Dollar sign is used either on a row or a column name.
     --> Ex: = $A1 + B$2


****************************************

CH 12: OPERATING SYSTEM

QUESTION AND ANSWER :

SECTION - A

A. Multiple Choice Questions:

1. (d) All of the above
2. (c) Connection failure in the network
3. (b) Operating System
4. (d) All of the above
5. (c) System

B. Fill in the blanks:
1. Operating System
2. Machine
3. GUI (Graphical User Interface)
4. Copy
5. Command Line Interface

C. State True or False :
1. True
2. False
3. False
4. True
5. True

SECTION - B

A. Short - answer Questions:

1. Define Operating System.
A. --> It is a system software which is require to operate a computer system.
     --> It is the interface between the user and hardware.
     --> Windows 10, Unix , Linux etc.

2. Define User Interface.
A. --> It is a program that allows the user to interact with the system. 
     --> It is of two types: CLI and GUI

3. Write the need of Operating System.
A. Hardware and Software, both are interdependent. In order to operate all the resources and hardware of a computer effectively, a software is required, such software is called as Operating  System.

4. List name of Different types of User Interface.
A. Different types of User Interface are as follows:
    --> CLI (Command Line Interface)
    --> GUI (Graphical User Interface)

5. Give few examples of Operating System.
A. Windows 7, Windows 8, Windows 10, Unix, Linux, Apple macOS, Android.

6. Define:
A. Hardware: These are the physical elements or equipment of a computer. Ex: Monitor, Keyboard, Mouse, Speaker etc.
Software: These are the collection of instructions which tells the computer what to do. Ex: Operating System , Anti-Virus Program , MS Office etc.

B. Long answer Questions:

1. Enlist the various functions of Operating System.
A. The various functions of OS are as follows:
--> Processor Management
--> Device Management
--> Memory Management
--> File Management
--> Security
--> Means of communication between user and computer

2. Enlist the various types of Operating System.
A. The various types of OS are as follows:
--> Real - Time OS
--> Multi-user OS
--> Single-user OS
--> Single-taskingOS
--> Multi-tasking OS
--> Distributed OS
--> Embedded OS

3. Differentiate between GUI and CUI.
A. GUI
--> It stands for Graphical User Interface
--> Here user interacts with computer through images.
--> Accessing GUI is easy.
--> Input can be accepted through keyboard or mouse.
--> Ex: Windows 10
CLI
--> It stands for Command Line Interface.
--> Here user interacts with computer through commands.
--> Accessing CLI is tough.
--> Input can  only be accepted through Keyboard.
--> Ex: DOS Windows.

4. Differentiate between Single-user and Multi-user OS.
A. Single-user OS
--> It is a simple type of OS.
--> It allows a single user to access computer at a time.
--> Ex: Windows, Apple MacOS
Multi-user OS
--> It is a Complex type of OS.
--> It provides services to multiple users at a time.
--> Ex: Unix, Linux

5. Write a short note on OS.
A. Operating System:
--> It is an interface between computer user and computer hardware.
--> It is a system software which performs all the basic tasks of a computer.
--> It also controls all the peripheral devices such as hard disk , printers etc.
--> Ex: Windows 10, Unix, Linux , Android etc.


************************************************

CHAPTER: 3 FROM STD 7 BOOK

List of videos:



Question and Answers:

Section - A

A. Multiple Choice Question.

1. (a) Scatter Chart
2. (c) Pie Chart
3. (a) X-axis
4. (c) Dotted Line
5. (b) Sparklines

B. Fill in the Blanks:

1. Column Chart
2. Scatter Chart
3. Combo Chart
4. Data tab
5. Insert

C. State true or false.

1. False. We can ungroup them
2. True
3. False. Horizontal bars
4. True
5. True

D. DIY (Do it yourself)

E. DIY 

Section - B

A. Short-answer questions:

1. What is a Chart?
A. -->Chart is a tool in MS EXCEL which is used to represent data values in pictorial format.
     -->Charts shows the meaning behind the numbers and 
     -->showing comparison and trends becomes easier.

2. Define following charts:

a. Column chart: These are used to compare values of the data by using vertical bars.
b. Bar Chart: These are used to compare values of the data by using horizontal bars.
c. Pie Chart: It is used to display the data in the form of a circle where the circle is sliced in different sections.
d. Line Chart: It is used to display trends over time where the chart is in the form of lines.
e. Doughnut Chart: It displays data as sections of a circle but can have multiple data series.
f. Scatter Chart: It is used to compare pair of values which is also called as XY Charts.
g. Area Chart: It is same as Line charts except the area below the plot line is solid.

3. What do you mean by legend in chart?
A. Legend in a chart defines the color, patterns and symbols assigned to the data series.

4. What is the difference between Plot Area and Chart Area?
A. Chart area includes charts to represent the data, on the other hand , the plot area includes only the graphical representation of the chart.

5. Name the various types of Sparklines.
A. There are three types of Sparklines which are as follows:
   --> Line
   --> Column
   --> Win/Loss


B. Long-answer Questions:

1. Write down the steps to create a chart. 
A. Steps to create a chart are as follows:
--> First create a data table in a worksheet.
--> Select the table including field names.
--> Click on to "insert" tab.
--> Click on the 2D column chart from Charts group.
--> Chart will be displayed.

2. How will you add the following chart elements in a chart?

a. Chart title.
--> Select the chart
--> Go to design tab
--> Click on the drop down arrow of the "Add Chart Element option".
--> From the list, select the Chart Title option.
--> Chart title text box opens.
--> Type the title in it.

b. Axis title.
--> Select the chart
--> Go to design tab
--> Click on the drop down arrow of the "Add Chart Element option".
--> From the list, select the Axis Title option.
--> Axis title text box opens.
--> Type the title in it.

c. Legend.
--> Select the chart
--> Go to design tab
--> Click on the drop down arrow of the "Add Chart Element option".
--> From the list, select the Legend option.
--> Legend can be inserted to right, left, top or bottom. Select any option.

d. Gridlines.
--> Select the chart
--> Go to design tab
--> Click on the drop down arrow of the "Add Chart Element option".
--> From the list, select the Gridlines option.
--> Gridlines are available in vertical or horizontal direction. Select any option.

6. What do you mean by Combination Chart?
A. --> It is a visualization that combines the features of  any two charts.
     --> Here it each chart can display a particular category.

7. What is the purpose of consolidating data?
A. --> This feature allows us to gather our data from different worksheets to a master worksheet.
     --> Here the data from series of worksheets can be summarized to a single worksheet. 

8. How will you group and ungroup the worksheets?
A. Grouping:
--> To group the adjacent(consecutive) worksheets, click the first sheet tab, hold down the shift key and click the last sheet tab.
--> To group the non-adjacent worksheets, click the first sheet tab, hold down the ctrl key and click the interested sheet tab one by one.
Ungrouping:
--> To ungroup right click on any sheet tab and click on "ungroup sheets" from the list OR you can also click on any worksheet tab outside the group.

10. What do you mean by Goal Seek?
A. -->It means when you have the target value and you need to calculate the input value for it.
     --> Also called as What-if Analysis or Back-Solving.

Extra Questions:

1. Name all the Chart elements of a chart.
A. --> Chart title
     --> Chart Area
     --> Plot Area
     --> Axis
     --> Axis Title
     --> Data Label
     --> Data Table
     --> Legend
     --> Gridlines
     --> Trend Line

2. How Column Chart is different from Bar Chart?
A. --> In Column Chart, vertical Bars are used whereas in Bar Chart , horizontal bars are used.
    --> In Column Chart, X-Axis is the category Axis and Y-Axis is the value axis, whereas in Bar Chart it is opposite.

3. How Pie-Chart is different from Line Chart ?
A. --> In Pie Chart, data are represented using circle whereas in Line Chart, data are represented using trends(Lines).
     --> In Pie Chart, only one data series can be represented whereas in Line Chart, multiple data series can be represented.

4. How a Chart is different from Sparklines?
A. --> Sparklines are very small, tiny charts,  typically drawn without Axes and co-ordinates and with very few markers whereas Charts are designed to show as much data as possible like legends, data labels, data tables, category and value axis etc.
    --> Sparklines uses only a single cell to represent the data whereas Charts takes a lot of space (multiple cells) to represent the data.


***********************************

CH 7 : INTRODUCTION TO HTML 5

List of Videos:- 


Questions and Answers :-

Section - A

A. MCQs:

1. (b) Body tag
2. (a) BGCOLOR
3. (a) <font>
4. (b) BACKGROUND
5. (c) <BR>

B. Fill in the blanks:

1. Hyper
2. <H2>
3. Black
4. .html
5. <title>

C. State true or false:

1. False. Maximum=7
2. True
3. False. it is used to underline the text
4. True
5. True

D. Give the syntax to perform the following:

a. To change the text color to red of the entire web page.
A. <BODY  TEXT="Red">..........</BODY>

b. To draw a line with thickness - r and alignment = center
A. <HR  SIZE="3"  ALIGN="CENTER">

c. to change font style = Bold and font color = Blue of the selected text
A. <FONT   FACE="BOLD"   COLOR="BLUE">.......</FONT>


SECTION-B

A. Short-answer Questions:

1. What is Internet?
A. Internet is a large collection of computers which are connected together in order to share information and resources.

2. What is the purpose of Web Browser?
A. In a Client-Server Architecture, Web Browser acts like a Client through which the request is sent to the server.

3. What is the full form of HTML?
A. HTML: Hyper Text Markup Language

4. What is a Web page?
A. Web page is an electronic page which contains information on any topic in the form of text, images, graphics, audio, video and HYPERLINKS.

5. Define the term HTML tags.
A. HTML tags are the commands which are used to create the structure of a HTML document and also it instructs the browser how to display the content of the web page.

6. Define the term Website.
A. Website is the collection of related Webpages which stores the information on any topic.

7. What is Hyperlink?
A. Hyperlink is a link (underlined blue color text) on clicking on it, it will redirect you to the linked page.

8. Which HTML Tools are used to create and view an HTML document?
A. To create : Notepad is used as an editor where the HTML codes are written.
     To view: Any Web Browser (for eg: Google Chrome) is used to view the created web page

9. What do you call a tag which has no closing tag? Give example.
A. The tags which has no closing tags are called as Empty tags. Ex: <BR> , <HR> ,<IMG>

10. What do you call a tag which has both opening and closing tags? Give example.
A. The tags which has both opening and closing tag are called as Container tags. Ex: <HEAD>, <TITLE> , <BODY>, <P> etc.

11. What is the purpose of using tag attributes?
A. Related tag attributes are used to enhance or modify the default tag properties. 

12. Which tag is used to display the text little slanted? Give syntax.
A. <I> (Italic) tag is used to display the text little slanted.
    Syntax:  <I> HELLO! </I>

13. What is the difference between <BR> tag and <P> tag?
A. The difference between <BR> and <P> tag is that <BR> moves the text to the immediate next line whereas <P> tag moves the text to the new line but add some extra space at the beginning of the paragraph.


B. Long-answer Questions:

1. What is HTML? Give the brief history of HTML.
A. --> HTML stands for HYPERTEXT MARKUP LANGUAGE.
--> It is used to create Web pages , also called as Hyper Text documents.
History:
--> It is created by Tim Berners Lee in the year 1990 at CERN.
--> Earlier it was called as GML (General Markup Language) and after that it was called as SGML (Standard General Markup Language) and now HTML.

2.  Explain the structure of a simple HTML code.
A. A structure of a HTML code has two parts:
--> Head Section
--> Body Section
Both Head and Body Section resides inside the HTML tag.

Syntax:
<HTML>
    <HEAD>
        <TITLE> Title of the Web page </TITLE>
    </HEAD>
    <BODY>
        Content of the web page
    </BODY>
</HTML> 

3. Write down the steps to create a HTML Document.
A. The steps to create a HTML Document are as follows:
--> First, Open a Notepad Editor.
--> Type the structure of HTML code.
--> Save the file on any location using filename and (.html) file extension.
--> Go to the same location and search for the HTML document with the same name you have saved earlier.
--> Open the HTML document using the Web Browser and view the web page.

4. Is it important to save a HTML document? If yes, explain its steps.
A. Yes it is important to save a HTML document so that it can be retrieved and viewed whenever required.
Steps are as follows:
--> Click on the FILE menu from the Menu bar.
--> From the drop down list, select "save-as" option.
--> Save-as window will pop-up , there type the file name using (.html) file extension and choose the location.
--> Click on save button.

5. How can you view the HTML Document?
A. Steps are as follows:
--> Go to the location where you have saved the .html file.
--> Click on the .html document having the default web browser's icon.
--> Now you can view the web page.

6. Explain the following tags with syntax and examples:
a. <HEAD>
--> It is a container tag.
--> It is used to contain the title of the web page.
--> Title of the web page is written inside the <TITLE> tag which resides inside the <HEAD> tag.

b. <HTML>
--> It is a container tag.
--> It is the root of any HTML code.
--> It is the container for all the other tags
--> It has two sections: HEAD and BODY.

c. <TITLE>
--> It is a container tag.
--> It resides inside the <HEAD> tag.
--> It is used to display the title of the web page.

d. <B>
--> It is a container tag.
--> The name of this tag is BOLD tag.
--> It is used for specifying bold text.

e. <U>
--> It is a container tag.
--> The name of this tag is UNDERLINE tag.
--> It is used to underline any text.


7. Explain the purpose and attributes of <BODY> tag in details with syntax and example.
A. Purpose of <BODY> tag :-
--> It is a container tag.
--> It is used to display the body section of any web page.
--> It has a corresponding closing tag. Ex: </BODY>
--> It has three attributes which are required to enhance the features of a web page

Attributes of <BODY> tag:

a. BGCOLOR
--> It stands for background color.
--> It is used to change the background color of a web page to a solid color.
Syntax:  <BODY BGCOLOR = "COLORNAME">.........</BODY>
Example: <BODY BGCOLOR= "BLUE">.........</BODY>

b. BACKGROUND
--> It is used to add the background image in a web page.
Syntax:  <BODY BACKGROUND = "PATH OR IMAGE NAME">.........</BODY>
Example: <BODY BACKGROUND= "NEW.jpg">.........</BODY>

c. TEXT
--> It is used to change the color of the text of the entire body of the web page.
Syntax: <BODY TEXT = "COLOR NAME">.........</BODY>
Example: <BODY TEXT= "red">.........</BODY>


8. Explain <FONT> tag with attributes, Syntax and examples.
A. <FONT> tag :-
--> It is a container tag.
--> It is used to change the looks of the text.
--> It is also called as text formatting tag.
--> It has three attributes which are required to enhance the features of a web page.

Attributes of <FONT> tag:

a. FACE
--> It is used to change the font style in html document.
Syntax:  <FONT FACE="FONT NAME">.........</FONT>
Example: <FONT FACE="CALIBRI">.........</FONT>

b. SIZE
--> It is used to change the default size of the text.
--> The value which is to be assign must be from 1 to 7.
Syntax:  <FONT SIZE="VALUE">.........</FONT>
Example: <FONT SIZE="5">.........</FONT>

c. COLOR
--> It is used to change the color of the text in a web page.
Syntax: <FONT COLOR="COLOR NAME">.........</FONT>
Example: <FONT COLOR="YELLOW">.........</FONT>

9. Explain heading tag in detail.
A. HEADING tag:
--> It is a container tag.
--> It is used to add headings in the html document.
--> It has six levels : <H1> to <H6>
--> <H1> represents the top level and <H6> represents the bottom level of heading.

Syntax: <Hn> Heading text </Hn>
Example: <H1> STANDARD 7 </H1>

10. Explain the usage of <HR> tag with attributes.
A. <HR> tag :-
--> It is an Empty tag.
--> It is used to draw a horizontal line in a document.
--> It is also called as horizontal tag.
--> It has four attributes which are required to enhance the features of a web page.

Attributes of <HR> tag:

a. ALIGN
--> It is used to change the alignment of the horizontal line.
--> Here, the value can be left, right and center.
Syntax:  <HR ALIGN="VALUE">.........
Example: <HR ALIGN="LEFT">.........

b. SIZE
--> It is used to change the thickness of the horizontal line.
--> Here, the value must be from 1 to 7.
Syntax:  <HR SIZE="VALUE">.........
Example: <HR SIZE="3">.........

c. WIDTH
--> It is used to change the length of the horizontal line.
Syntax: <HR WIDTH="VALUE">.........
Example: <HR WIDTH="300">.........

d. COLOR
--> It is used to change the color of the horizontal line.
Syntax: <HR COLOR = "COLOR NAME">.........
Example: <HR COLOR = "RED">.........



******************************************************










  

    




Post a Comment

0 Comments