Information & Communication Technology: Reading Book Grade
Information & Communication Technology: Reading Book Grade
Information & Communication Technology: Reading Book Grade
Technology
Reading Book
Grade 7
i
First Print - 2018
Second Print - 2019
ISBN 978-955-25-0114-2
ii
The National Anthem of Sri Lanka
iii
wms fjuq tl ujlf. orefjda
tl ksjfiys fjfikd
tl mdge;s tl reêrh fõ
wm lh ;=< ÿjkd
wdkkao iurfldaka
Mde;j rkuf;Nfhd;
ftpijapd; ngau;g;G.
iv
Being innovative, changing with right knowledge
Be a light to the country as well as to the world.
The past two decades have been significant in the world history due to changes that took
place in technology. The present students face a lot of new challenges along with the rapid
development of Information Technology, communication and other related fields. The manner
of career opportunities are liable to change specifically in the near future. In such an
environment, with a new technological and intellectual society, thousands of innovative career
opportunities would be created. To win those challenges, it is the responsibility of the Sri Lankan
Government and myself, as the Minister of Education, to empower you all.
This book is a product of free education. Your aim must be to use this book properly and
acquire the necessary knowledge out of it. The government in turn is able to provide free
textbooks to you, as a result of the commitment and labour of your parents and elders.
Since we have understood that the education is crucial in deciding the future of a country,
the government has taken steps to change curriculum to suit the rapid changes of the
technological world. Hence, you have to dedicate yourselves to become productive citizens. I
believe that the knowledge this book provides will suffice your aim.
It is your duty to give a proper value to the money spent by the government on your
education. Also you should understand that education determines your future. Make sure that
you reach the optimum social stratum through education.
I congratulate you to enjoy the benefits of free education and bloom as an honoured
citizen who takes the name of Sri Lanka to the world.
The educational objectives of the contemporary world are becoming more complex
along with the economic, social, cultural and technological development. The learning
and teaching process too is changing in relation to human experiences, technological
differences, research and new indices. Therefore, it is required to produce the textbook
by including subject related information according to the objectives in the syllabus
in order to maintain the teaching process by organizing learning experiences that suit
to the learner needs. The textbook is not merely a learning tool for the learner. It is
a blessing that contributes to obtain a higher education along with a development of
conduct and attitudes, to develop values and to obtain learning experiences.
The government in its realization of the concept of free education has offered you
all the textbooks from grades 1-11. I would like to remind you that you should make
the maximum use of these textbooks and protect them well. I sincerely hope that this
textbook would assist you to obtain the expertise to become a virtuous citizen with
a complete personality who would be a valuable asset to the country.
I would like to bestow my sincere thanks on the members of the editorial and writer
boards as well as on the staff of the Educational Publications Department who have
strived to offer this textbook to you.
W. M. Jayantha Wickramanayaka,
Commissioner General of Educational Publications,
Educational Publications Department,
Isurupaya,
Battaramulla.
2019.04.10
vi
Monitoring and Supervision
W.M. Jayantha Wickramanayaka - Commissioner General of Educational Publications
Educational Publications Department
Direction
W.A. Nirmala Piyaseeli - Commissioner of Educational Publications (Development)
Educational Publications Department
Co-ordination
H.A.I.P. Upathissa - Assistant Commissioner
Educational Publications Department
Board of Editors
Dr. Prasad Wimalarathna - Head,
Faculty of Communication & Media Technology
University of Colombo School of Computing
Dr. V.G.N. Vidanagama - Senior Lecturer,
University of Wayamba
Dr. Senaka Amarakeerthi - Senior Lecturer,
University of Sri Jayawardenapura
W.W.M.D.C.B. Piyasiri - Instructor,
Technical College, Hasalaka
Dr. K. Thabotharan - Senior Lecturer,
Faculty of Communication & Media Technology
Faculty of Jaffna
H.A.I.P. Upathissa - Assistant Commissioner
Educational Publications Department
E.N. Boralugoda - Assistant Commissioner
Educational Publications Department -
Board of Writers
Oshani Rodrigo - Teacher,
Chi/ Madagama Abhaya Maha Vidyalaya
Panirendawa
A. Sunil Samaraweera - Center Manager
Zonal Computer Resource Center
Kegalle
L.G.I. Priyadarshani - Teacher
CP/ Hoorikaduwa Balika Vidyalaya
Kandy
V.A. Kodithuwakku - Teacher
Zonal Education Office
Gampaha
vii
S.M.D.T. Sinhabahu - Teacher
CH/St. Sebesthiyan M.M. Vidyalaya
Katuneriya
J.A.A. Chinthaka Jayakodi - Teacher
Ke/ Mawa/ Parakrama Maha Vidyalaya
Rambukkana
N. Vagisamurthi - Director of Education
(Retired)
T. Mathiwadanan - In Service Advicer
Zonal Education Office
Piliyandala
M.T. Mohammad Ilham - Teacher
Sahira Collage
Colombo
H.L. Surjudeen - Deputy Principal
Ameena Girl's College
Matale
M.F.M. Jarjoon - Assistant Director of Education
Ministry of Education
D.R.N.K Gamage - Assistant Commissioner
Department of Examinations
H.A.I.P. Upathissa - Assistant Commissioner
Educational Publications Department
Language Editing
W.I. Darshika - Assistant Commissioner
Educational Publications Department
Illustrations
Lalith Gunathilake - Teacher
WP/Jaya/ Vidyakara Balika Vidyalaya
Maharagama
Cover Page
Chaminda Hapuarachchi - Computer Assistant
Educational Publications Department
Technical Assistance
B.T. Chathurani Perera - Computer Assistant
Educational Publications Department
viii
Index
2 Operating System 8
4 Word Processing 33
Programme Development 46
5
Presentation Software 69
6
Using Internet for Information and
87
7 Communication
ix
x
01 Central Processing Unit
• Computer is like a kitchen in a hotel, and the Central Processing Unit is like a
chef in that kitchen.
• As a chef prepares food, the Central Processing Unit processes data in the
computer and converts them into information.
• As the food preparation speed depends on the speed of the chef, the speed of the
computer depends on the speed of the Central Processing Unit.
• A dual-core processor is like having a kitchen with two chefs preparing two
meals, so two things can be prepared at the same time.
While the Central Processing Unit can’t be observed from the outside, it is positioned
(fixed) on the motherboard, inside the system unit.
While the above classification of the Central Processing Unit is a simple classification
only for your understanding in grade 7, in many cases, the evolution of the Central
Processing Unit has been shown in different generations in diverse ways too.
Figure 1.4 - Some vaccume tubes Figure 1.5 - A computer of the first generation
Figure 1.6 - Some transistors Figure 1.7 - A computer of the second generation
Figure 1.8 - An intergrated circuit Figure 1.9 - A computer of the third generation
Figure 1.10 - A microprocessor Figure 1.3 - Some computers of the fourth generation
CU Memory
ALU Registers
Controls all the devices
Performs all mathematical
of a computer system / Functions as a
and logical functions
(Controls all the temporary memory
(operations) of the
operations of a store
computer
computer system)
Ex (- ^«" -¡ " ¬ " − " < >
³ Speed of the Central Processing Unit increased gradually with the evolution of
the computer.
³ Computer can be divided into four generations based on the electronic
technology used in the Central Processing Unit.
1. First Generation (vacuum tubes) 2. Second Generation (transistors)
3. Third Generation (integrated circuits) 4. Fourth Generation (microprocessors)
Operating system...?
What is that?
Microsoft Windows
Ubuntu
Fedora
iOS or iPhone OS
Used in Apple mobile phones such as iPhone,
iPad, iPod
Blackberry OS
Used in Blackberry mobile phones
Windows Mobile OS
Used in mobile phones like Lumia, HTC
Data and information are in different forms such as doucments, photos, videos,
animations, voices and sounds.
That data and information can be stored in computer storage devices. Similarly,
computer programmes which give instructions to the computer can be stored too.
Figure 2.1 - Examples for data, information and programmes that can be
stored in storage devices
10 For free distribution
Earlier, stone inscriptions and
ola leaves were used to
permanently store information.
Now, we use papers
Computer storage devices can be divided into several parts, according to their
manufacturing technology.
1. Magnetic Media Devices. Eg: Hard Disk
2. Optical Media Devices Eg: Compact Disk
3. Solid State Media Devices Eg: Pen Drive
Functions and technology of each of the above media devices are different.
Magnetic tapes" floppy disks and hard disks are known as magnetic media devices.
They consist of a magnetic surface or a magnetic tape.
• Hard Disk
The hard disk consists of a magnetised platter and a moving
metal head. There are two different types of hard disks,
internal hard disks and external hard disks.
• Magnetic Tapes
• Floppy Disk
A floppy disk is a magnetic media device that can be used to store small files. It
contains a capacity of 1.44 MB. It is used to carry data because it is an external
storage device. But is becoming obsolete.
At present, there are disks which are produced by using the same technology used
to produce the floppy disks such as zip disks and jazz disks. The capacity of these
disks is greater than that of the floppy disks. But they are not used often.
What are
folders?
File Folder
myfiles
myself.doc
chapter 1
Name of the Folder
The palce where files are stored is a folder. They are used to store files that are
related to each other. It helps to keep files in order and to retrieve them easily and
fast.
Creating a Folder
The methods used to create a folder can be different according to the operating
system. Figure 2.3 shows one such method.
When saving a file for the first time, despite the window selected, Save As command
window will open.
X X
File Edit View Window Help File Edit View Window Help
New
New
Save changes to the document 'My Open
Open
Pet' before quitting? Close
Close Save
Save Save as
Yes No Cancel
Save as Print
Print
Start Start
X
File Edit View Help
New
Open
Close
Save
Save as
Print
Start
First, take the cursor to the location of the folder and select it.
Important
³ If you delete a folder that is in an internal location such as in a
hard disk, it is deleted temporarily. That means, it can be retrieved
when needed.
³ If you delete a folder that is in an external storage device such as a
pen drive, it is permanently deleted. It cannot be retrieved again.
Delete Permanently
Step 1
Delete File
To delete a file or a folder permanently, press
Are you sure you want to permanently delete this ?
Letter 01.txt
Shift and Delete keys together.
Step 2
Yes No Select Yes command in the dialog box.
Doc3.docx Properties
File type
Doc3.docx
When naming a file the
method of showing the file
Type of file : Microsoft Word Document (.docx)
type File Extension
Opens with : Microsoft Word Change...
Location of the file
Location : C:\Users\22\Documents
Size of the file
Size: 35.4 KB (36,332 bytes)
Ok Cancel Apply
Children …
do you know how to protect our
computers?
By locking the
computer laboratory
By locking
the system unit
Security of computer
system
Computer Hardware
Any physical component of a computer that you can touch and see is called hardware.
It has a definite shape. As there are hardware devices outside of a computer, there
are hardware devices inside the system unit too.
cooling fan
DVD drive
keyboard mouse
motherboard
Figure 3.1 - Some hardware devices that can
be seen externally
Overheat inside
Sudden Dust gathering on
the system unit.
power failure computer hardware
accessories (devices) and
insects
Sudden flow of Main ways that
high voltage current cause damage to Issues related
hardware devices to theft
1
Steps that can be
taken to minimize Using UPS Using surge
Using Fuse
damages caused to protection
the computer by surge protection
electricity
(Uninterupted power supply - UPS) fuse
2
Steps that can be
taken to minimize
overheating inside Fixing cooling
the computer Installing air fans on devices
conditioners in the which get heated
computer laboratory highly inside the
to control the heat computer
NO FOOD OR
DRINK IN THIS
AREA
Let’s avoid taking food and
Let’s remove the shoes when drink inside the lab Let’s prevent insects and rats from
entering the computer lab entering the lab
Figure 3.4 – Some steps that can be taken to protect the computer from physical harm
- By entering the lab without footwear, the computer lab can be kept free of sand
and dust.
- Dust gathering on computer circuits (devices) can be prevented by cleaning all
the computers in the lab at least once in every three months.
- Taking food in the lab can attract insects like ants to the food particles fallen on
the ground
- Moisture in the laboratory may cause short circuit.
Computer Software
Data and information in the computer and programmes used for various tasks come
under the category of software.
Example:
Operating System
Word processing software
Files containing documents
Files containing pictures / images
Unexpected
deletion of files or
overwriting
threat of malware
unauthorized access
complications in the
operating system
disasters, terrorist
Natural disa Some instances that
attacks, etc.. may cause possible
threat to software Sudden power failure
Figure 3.4 – Some instances that may cause possible threat to software
Malware is a main factor that can couse a threat against the security of computer
software.
Types of
malware
Computer virus Spyware
3 Access Control
Summary
³ When providing security to the computer system, both hardware and software
components should be given equal attention.
³ Some possible hardware security issues;
• sudden power failure
• flow of high voltage current
• overheating inside the computer system
• dust gathering on computer hardware and insects menace
• theft menace
³ For the protection of hardware, precautionary methods such as,
• minimizing harm caused to the computer by electricity
• minimizing overheating inside the computer
• protecting computer from physical damage
• protecting from thieves
can be used.
³ Some possible software security issues;
• attack of malware
• unauthorized access
• sudden power failures
• natural disaster, terrorism etc..,
• complications in the Operating System
• unexpected deletion of files, or overwrite
³ For the protection of software, precautionary methods such as,
• providing protection against malware
• keeping backups
• access control
can be used.
A word processor can be any tool from a simple pencil to a complicated computer
software.
iWork Pages
Libre Office Writer
Benefits of a word
processing
software Creating a document Saving (storing) for
future retrieval
Printing a Search text in the
document document
Formatting
(editing) of
document
Word Count
Display spelling & grammar
Printing a several
errors and give a chance for
copies
correction
Typical Keyboard
The keys in the keyboard can be divided into several groups based on the function.
Function keys £ _
>
! " $ % & * ( ) + Back space Page Num
- Insert Home Up Lock
1 2 3 4 5 6 7 8 9 0 =
Character keys Q W E U O
{ } Page 7 8 9
Tab R T Y I P [ ] Enter
Delete End
Down Home Pg Up
: ~
Caps Lock A S D F G H J K L @ 4 5 6
Navigation keys < >
;
?
' #
1 2 3
shift
\ Z X C V B N M , . /
shift End Pg Dn
Character
Keys These keys are used to type in letters, numbers, punctuation
marks and symbols when preparing a document.
Function The function keys are used to perform a specific task. The
Keys functionality of these keys may differ from programme to
programme.
Navigation These keys are used for moving around on a webpage and
Keys for editing text. They include the arrow keys, Home, End,
Page Up, Page Down, Delete and Insert keys.
How the keys are arranged in a typical keyboard is shown in Figure 4.1. It is also
known as QWERTY keyboard considering the design for alphabets. In some cases,
keyboards that are slightly different from this type of keyboard are also available.
shift
shift
key shift
shift key
There are two shift keys on the right and left sides of the keyboard. When + A A
letter keys are pressed while keeping the shift key pressed, English capital
letters are typed. Similarly when other keys are pressed while keeping the shift ?
+ / ?
key pressed, the symbol on the top of the key is typed.
Arrow keys – It moves the cursor up, down, left or right on the screen.
Backspace key – When pressed once, it deletes any character, space, number or any other object to the left of the cursor.
(cursor’s current position)
Before creating a document, one should have a good understanding about how
hands should be kept on the keyboard and manipulate keys.
>
~ ! @ # $ % & * ( ) +
- Delete s
` 1 2 3 4 5 6 7 8 9 0 = A D F G H J K L
Tab Q W E R T Y U I O P { } l
[ ] \
A S D F G H J K L : "
Caps ; , Enter
Z X C V B N M < > ?
Shift , . /
Shift
• Use fingers of both hands and always start typing having placed both hands on
the correct row of the keyboard.(as shown in the picture)
~ ! @ # $ % & ( )
+
* delete
` 1 2 3 4 5 6 7 8 9 0 - =
tab Q W E R T Y U I O P { [
} ]
I
\
:
caps lock A S D F G H J K L ; ",
enter
shift Z X C V B N M , .>
< ?
/ shift
There are a lot of benefits in learning touch typing. For this, use of a typing tutor
software can be shown as the most suitable and the easiest way (method) to learn
touch typing.
So, you can search and find several software by browsing the internet.
edit
documents
easily accuracy –
speed – can
minimize
type very
errors in the
quickly
document
health – it
time –
prevents
time can be
prolonged
saved.
bone diseases
(illnesses)
decrease
job prospects Benefits fatigue – it
– typing speed of learning reduces both
is required touch typing mental and
for some accurately. physical fatigue
positions
TIPP10
https://www.tipp10.com/en/download/getfile/4/
Typefaster
http://www.typefastertypingtutor.com/
Basically the keyboard has been produced for English language. However,
various techniques have been introduced into this keyboard for different
nationals to type (in) their own language through this keyboard. In our
country, Sinhala and Tamil keyboards are widely used.
Sinhala characters can be entered to the computer both by character keys located in
the keyboard and by phonetics keys too.
• Use of Standard Sinhala Keyboard
In this model, it is essential to remember the location of keys on the keyboard.
This Sinhala keyboard is used (operated) in present computers and other data
communication devices as well. This model is used in Unicode system too.
Bk Spc
>
! @ # $ % & * ( ) _ +
1 2 3 4 5 6 7 8 9 0 - =
Tab Q W E R T Y U I O P { }
[ ] \
Lock A S D F G H J K L Enter
Space
• Phonetics Keyboard
This is somewhat an easy method and the keyboard can be used according to Sinhala
sounds (based on Sinhala sound). Therefore it is not necessary to know the location
of the appropriate letters. You can send SMS messages in mobile phone using this
method. Therefore, you are already familiar with this method.
Summary
³ Creation of letters and documents needed in day to day life easily is called
word processing.
³ Skill to use the keyboard correctly is essential in word processing through the
computer.
³ The keyboard that we use normally (day to day) is identified as QWERTY
keyboard.
³ The QWERTY keyboard can also be used for other languages such as Sinhala
and Tamil.
³ The Typing Tutor software can be used to practice the use of keyboard correctly.
Likewise, a complex problem that seems difficult to solve at once can be broken
into several smaller sub-problems as much as possible. Then these sub-problems
can be solved easily one by one.
Advantages of decomposing a
sub-problem 1
problems
Complex • Easy to solve
problem sub-problem 2
• Easy to understant
• Easy to describe
• Easy to analyze
Decomposition sub-problem n
Figure 5.2 - Decomposition of a complex problem into sub-problems
eg:- In grade o6, you have learnt about the basic mathematical function which
include addition, substraction, multiplication and division of a whole number.
Additionally in the first term of graded 07, you have learnt about solving sums
when more than one mathematical functions are used with a whole number.
Consider the following sum (Refer Figure 5.3).
46 For free distribution
Since it is hard and
Multiplication complicated to solve this
sum 5 x 6 = 30 sum at once (in one step),
Addition it would be simple and
5x6+4
30 + 4 = 34 easy to find a solution after
2 decomposing the sum into
Division three sub-problems as
34 = 17 Solution
2 multiplication, addition
17 and division involved in
the sum. The final solution
can be reached easily by
logically integrating the
answers obtained in each
sub-problem.
Figure 5.3 - Breaking a mathematical sum into sub-problems
5.2.1 Sequence
Start
Stop
Figure 5.5 - Flow chart: Covering a textbook
5.2.2 Selection
switch on
Stop
Figure 5.7 - Flow chart funtioning of a font
5.2.3 Repetition
Put money
Is till
full?
No
Yes
Stop
Figure 5.8 - Flow chart: Putting money into a till
Write
Is ink No
available? Finish
Is ink
Yes No finished ?
Write Yes
Stop
Figure 5.9 - Flow chart: Writing with a pen until ink finishes
For free distribution 51
5.3 Introduction to Scratch Programming and Programme
Development
Scratch which is a visual programme development software is an interactive,
attractive and a simple programme with command blocks. This is a Free and
Open Source Software (FOSS) and therefore it can be downloaded freely from the
following website. http://www.scratch.mit.edu
Cursor Tools
Stage where sprites move around and diagrams are drawn X, Y coordinates
plane of the stage
- 240"180 240"180
Sprites X, Y
coordinates
Sprite List
Blocks
Includes command
blocks pertaining to
move the sprite on the
stage.
Sprite moves 100 steps
from the position 0, 0
Includes command
blocks pertaining to
communication among Sprite, after saying
the Sprites. “Hello!, Can you win”
thinks “No, I’m the
winner”
Give instructions
pertaining to the
execution (running) of all
other blocks When run tool (green
flag) clicked, the total
of variables a and b is
shown
Receive input
handles mathematical
operations
• Save as a file
Motion
Looks Control
Sensing
Pen Operators
Data More Blocks
Stage Sprite1
1 backdrop
New backdrop:
play note 65
play note 67
Click on arrow head on
the right to No.60 and play note 69
select a note
play note 71
play note 73
stop
Start
Say Tuesday
Say Wednesday
Say Thursday
Say Friday
Say Saturday
Stop
Let’s consider a situation where two types of coloured liquid have been poured into
two separate glass vessels.
A vessel B vessel
Now let’s consider changing liquid in A vessel into B vessel and liquid in B vessel
into A vessel.
60 For free distribution
In this way, in order to change the liquid from one vessel to the other, it is necessary
to have an extra vessel.
Let’s name that vessel as C vessel.
C vessel
step 1 : Changing liquid in A vessel to C vessel
As a vessel can store liquid, so a variable can store a value. The above vessels
named as A, B and C can be considered as variables and the liquid poured into them
can be considered as values of the variables.
For free distribution 61
Assign Values to Variables
When assigning values to variables, variable name is written on the left to the equal
sign and the value is written on the right to the equal sign.
Amara 12
e.g. name = Amara
age = 12 name age
e.g.
marks
• Click OK
Make a Variable
OK Cancel
Make a List
Create two variables (n1, n2) to store values of two numbers and another variable
to store the multipication of the two numbers.Then join the control blocks shown
below one by one sequentially in the given order. Change the value of control
blocks as shown.
stop
display perimeter
stop
Develop the following programme to randomly change the normal size of the Sprite
that we see. A value randomly chosen from one to ten is stored in the variable X.
The size of the Sprite changes up to the value obtained by multiplying the value of
variable X by 10. In addition, the colour too changes in proportion to the value of
variable X.
Play sound
Stop
5.4.2 Bugs
Bugs may occur when developing a programme. Errors in a
programme are called bugs, while the elimination of such
bugs is called debug. In such a situation, unexpected problems
are to be faced when a program with bugs run. Programmes
with bugs may not run properly. Therefore before running a
programme, bugs that may occur in that program should be
eliminated.
Elimination of Bugs
Bugs may occur in such situations as change of order in the instructions (block),
omission of instructions (block) or non-mentioning of correct variables and
their values. Bugs in a programme can be eliminated by correcting bugs in the
instructions(block) or arranging the order of the instructions (block) sequentially.
Let’s compare the following programme with bugs and the programme without
bugs developed to draw a rectangle with length and width 200 and 100 respectively.
correct
an instruction omitted
order changed
incorrect
The above programme on the left has been developed to draw a rectangle. However
the expected output cannot be achieved due to bugs in the programme. Therefore
there is a possibility to get an erroneous output. It is proved by the programme on
the right that a correct output can be achieved after eliminating those bugs.
Summary
³ Program development can be made easy by decomposing a complex problem
³ There are three control structures used to develop a programme. They are
sequence, selection and repetition.
³ Execution of instructions (sequentially) step by step in an algorithm is called
sequence.
³ Making decision as to which step to follow based on the condition given by
the algorithm is called selection.
³ Flow direction in a flow chart is determined based on the condition of the flow
chart.
³ Scratch open source programme can be used for visual programme development.
³ Command blocks are used in the development of Scratch program
³ Following command blocks can be used to display the decision
² The block to be used to show steps to follow only if the condition
becomes true
Electronic Presentation
Electronic presentation is a tool used to make a presentation attractive and fruitful.
An electronic presentation
like a book. But it is not Why do you say so?
totally similar.
The Slide in Figure 6.2 A indicates a slide related to the content which is open
on the slide pane (In Figure 6.2 B indicates a slide pane) is highlighted, Eg: The
content of the slide indicated by A in Figure 6.2 is displayed on slide pane.
You will get blank slide when you open the presentation software, to be designed.
Or if you wish, you can select from pre-designed slide templates which have being
saved. They are designed with various shapes, colours, designs.
If the slide matches your need, one of the slides can be selected.
note pane
Figure 6.4 - Basic features of a Presentation window
Your presentaion can be prepared using tools in the tools bar. The prepared
pesentation can be saved in any place for reuse when needed.
Start
If the pesentation was not saved, a dialoge box relevant to save it will open.
Start
If you want to save the presentation select Yes command. If not, select No
command.
It is good to use a name of your own to save it rather than using a common
name given by the presentation software. It helps to find it easily among the
other files.
Title
Title
Content
Title Slide Title and content slide
Title
Sub-title 1 2
Empty Slide
Picture Slide
In addition to these, different slides can be used using a blank slide according to
the need.
Underline
One way is to copy a saved picture and paste it on the slide. The other way is using
clip art provided by presentation software.
AUDIO
Number of columns 3
Number of rows 5
OK
For free distribution 79
Activity 11 : See Workbook 6.11
Slide transition can be used to move from slide to slide. The objective of this is to
make it attractive. But if it is desigad in a way which takes more time, it would be
tiresome for the audience.
There are methods to control speed, select slide transition type and making selected
sounds in transition in presentation software.
In order to delete, copy, move or hide, a slide the particular slide should be selected.
Using a suitable Slide view provided by the presention software to select slides is
easy. The slide view presents slides in an organized way.
Slide 1
Slide 2 Slide 1
Slide 3
Slide 5
Deleting Slides
For this, relevant slide should be selected using the mouse head.
Slide 1
Slide 2 Slide 2
Slide 3
Coping Slides
You may need to use a slide of a presentation more than once. Or else you may need
to design another slide using none slide. You will have to change a copy of a slide
in doing so.
If you want to copy the slide, you can copy and paste the slide by the facilitiy
provided by presentation software.
Slide 1
Slide 2 Slide 2
Slide 1
For this you have to take the mouse pointer to the relevant slides. There you have to
click paste command from the tools bar or the menu you get when you right click
the mouse.
To move a slide, selected slide should be dragged and dropped in the relevant place.
You can cut and paste the slide too. For this, you can use cut and paste command in
tools bar or in the menu you get when you right click the mouse.
Slide 1
Slide 2 Slide 1
Slide 1
Hiding Slides
You may not need to show all the prepared slides in a presentation. You can hide a
slide without deleting in such a situation. When a slide is hidden, it does not appear
but you when need you can prepare it in such way that it can be seen.
For this you have to select hide slide command in the menu bar of file menu or in
the menu you get when the mouse is right clicked.
Slide 2 Slide 2
Slide 3
Nimal what is
called as internet? A computer
network that consists
of a large number of
inter-connected
computers.
At present, students can expand their knowledge by using resources like information,
videos, images about any subject area by connecting to the internet.
Map observation
Computer games
Video conferencing
They are many service rendered by the internet apart from providing educational
knowledge. The ability to obtain information quickly on any incident in the world
is one such service.
Have you
heard about the
World Wide Web?
What's that?
world wide
website web
Figure 7.3 - How a website is created
Figure 7.4 - How a world wide web is
formed
The uniform resource locator is the address used to identify one resource among the
huge number of resources in the World Wide Web. The uniform resource locator is
also known by its short name URL.
e:g: https:www.moe.gov.lk
Given above is the uniform resource locator or the address of the website of the
ministry of Education.
With this website address, the Ministry of Education of Sri Lanka can be identified
among many websites in the www.
³ Zoom ³ Skype
³ GoToMeeting ³ Webex
7.3.3 E-mail
Brother, I need to send this
letter to one of my friends.
Can you post it? It's easy if you send
an e-mail.
What is e-mail?
E-mail means an
easy way of sending a letter
on the internet.
The time and date of the sent e-mail is automatically entered to the copy of the
e-mail.
The ability to forward an e-mail message to another person.
The ability to attach data or information file easily into the e-mail (a photo, a
document).
username domainname
In the e-mail address [email protected], saman in the user name.
@ symbol is used to connect the username to the other part.
edupub.gov.lk after @ symbol is the domain name.
.lk means it is an e-mail address in Sri Lanka.
2 compose/new 3 To
A new e-mail Here,
window can be the e-mail
obtained by clicking on 5
address of the Bcc
Compose or New after receiver is (Blind Carbon Copy)
logging on to the e-mail mentioned The e-mail addresses
account in this section are not visible
to people whose e-mail
4
Cc addresses are in To and Cc.
(Carbon Copy) But all the addresses in To and
The e-mail addresses Cc are visible to pepole whose
of the people to which e-mail addresses
the copies of this letter are in Bcc.
should be sent, are
mentioned.
7
Attachment
6 If there are files that should
Subject be attached to this e-mail
Here, the topic related address, it can be done by
to the e-mail address is clicking on this tool.
mentaioned Eg: photos, videos, sound
Eg: Grade 7 student tracks
details)
8
Inbox 9
Sent 10
This contains the e-mail Junk/Spam
E-mails
messages sent by other people. sent by you are Unnecessary
Unopened e-mail messages are contained here. or spam e-mails are
shown in a dark colour. The contained here.
person who has sent the message
and to whom it has been sent can
be seen. 11 Trash 12
Contacts
Deleted e-mails are
temporarily stored here. If This contains the
needed, emails in the folder e-mail addresses and
can be deleted. contact information.
For that,
first you must
know what html is.
What's
html ?
Html is the
language used to
create web pages.
HTML (hyper text markup language) is the language used to create web pages. It
has its own codes and a webpage is created by using these codes. Given below are
several basic codes used in html.
E:g:. notepad
Content
}
end
Here, among the <title> codes, a suitable name for the web page should be used.
It appears on the title bar of the web page. Here what is mentioned in <body> _
<body> section is visible in the web page.
All codes should be written between '<' and '>' symbols. In most html codes, there
is a beginning and an end. To indicate an ending code '/' symbol should be used.
The following table contains examples of how html codes are used to create a web
page. The first column indicates the use of html codes and the second command
indicates how it is visible in the web page.
ms<s.ksuq
insert a paragraph
<p>
Subject
1. ICT
a. Word
b. Excel
c. Power Point
2. Mathematics
3. Science
4. Arts
a file MS-Word
MS- Excel
MS- Power Point
We obtain different
advantages by using the
internet. However, we must
use the internet safely and Can you explain
carefully. that to me,
brother?
Amal what is
software piracy
Software Piracy
(Here, we have paid our attention to several measures that can be taken when using
software)
Install the latest edition of the web browsers and update them regularly.
Protect the wifi router with a password to provide security to the internet
connection.
³ Cyber bullying is releasing negative and fales information which can cause
uncomfort, harassment and insult to a person through social media, forums,
computer games using digital tools.
³ Phishing attacks are obtaining information on bank account details and e-mail
account details by appearing to be trustworthy and cheating the users.