100% found this document useful (1 vote)
2K views

Computer Answer Key 8

Uploaded by

Alam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views

Computer Answer Key 8

Uploaded by

Alam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

®

Teacher’s Resource Book


With Answers
CONTENTS

1. COMPUTER NETWORK 9

2. ACCESS - TABLES AND FORMS 12

3. ACCESS - QUERY & REPORT 14

4. HTML - FORM, MULTIMEDIA & CSS 16

5. CLOUD COMPUTING 18

6. E-COMMERCE & BLOGGING 20

7. ARTIFICIAL INTELLIGENCE (AI) 22

8. APP DEVELOPMENT 24

9. PYTHON – INTRODUCTION 26

10. PYTHON - CONTROL STRUCTURES 28

WORKSHEET 30

2
TEACHER’S MANUAL
INTRODUCTION
Computers are used everywhere, i.e., at homes, libraries, schools, offices, etc.
They touch every aspect of our life making it easier and comfortable. We rely
on computers for most of our daily work. In today’s world, not knowing about
the computer is nothing less than illiteracy. Knowing about computer and its
uses are no more a luxury, but a necessity.
Keeping in mind the increasing need of computer, IT Planet, a series of 8
books from class 1 to 8 has been written with a focus to impart knowledge
about computers to young minds. This series will help the teachers to make
the children computer-friendly according to the level of their knowledge and
help them acquire computer technology skills as required by the curriculum of
various boards. These books are based on new N.C.E.R.T. guidelines.
OBJECTIVES
You are a computer teacher. The subject you are teaching and the knowledge
you are giving will help the students throughout their lifetime. You are
creating a tech-savvy generation.
We should strike a balance between theory and applications, and we should
include appropriate elements of recent research in our curriculum. We expect
our students to play leading roles in industry, profession and government.
Rather than just coping with the future, we expect our students to create the
future.
Co-existence Is The Key: Learning is a collective effort and not an individual
effort. Group learning enhances better understanding and decreases
dissonance among students.
Integration On Life Skills Into Teaching Methodologies: Learning takes place in
every walk of life – from taking our first baby steps to landing a person on the
surface of the Moon. Learning from life skills is, perhaps, the most essential
part of overall student development.
Bridging The Gap: Students in a classroom learn at different levels, thus, the
need for the teacher to adopt various innovative methods to bridge gaps
between the understanding levels of the first child and the last child.
GUIDED DISCOVERY-BASED LEARNING
The teachers should give their students a discovery-based learning. Compared
with many other subjects, Computer Science is not straight-forward to teach.
One reason for this is the general nature of the computer field. The computer
field is changing very rapidly. The computers available to your students in the
school and homes 20 years from now will be a hundred or a thousand times
as powerful as the computers they have now in school. A guided discovery-
based learning environment contributes greatly to learning, and it facilitates

3
transfer of learning. In addition, you may want to assign a number of activities
at the end of the chapters as homework and make use of this in assessment.

YOU ARE A SMART PERSON


One of the major goals of a teacher is to help students acquire a more
realistic understanding of the course contents. The teacher should make the
students say and believe:
1. "I am better at solving some types of problems than others. I am smart
enough to get better at solving any problem that I care to spend time on."
2. "I regularly encounter and solve problems at home, at work, at play, and
at school. Problems are everywhere. What I learn at school can help me
solve some of these problems. What I learn outside of school can help me
solve some of these problems. Both types of learning are very important
to me."
By the time students get to the classes you teach, they will have repeatedly
demonstrated that they are quite smart and that they are good problem
solvers. One of the things that we know about problem-solving is that success
breeds success. Our school system and our society tend to reward people who
are good at solving school and non-school problems. This positive feedback
promotes putting in the time, energy, and thought needed to become still
better at problem-solving.

TEACHING PROCEDURES
The best teaching style ratio is 90:10.
90% serious teaching style and 10% fun based teaching style.
1. Begin by making sure all students have their books. Ask students to
recall what they learnt from the previous lesson. Then observe several
students' responses.
2. Read the chapter to the students. Explain it to them in a very easy to
understand way. Help students get well-versed with every chapter. Have
them write down some important points that they remember from the
chapter.
3. Assign the activity at the end of the chapter.
4. Closure. Near the end of the period, let students think about some of
the important ideas that have been covered in today's discussions and
readings. Each student has to decide on one idea that he/she felt was
particularly important. As time permits, these ideas can be shared by the
whole class in small groups, written down, or merely thought about at a
personal level.

4
Bloom’s taxonomy : teacher planning kit
Bloom's Taxonomy was created under the leadership of educational
psychologist, Dr Benjamin Bloom, in order to promote higher forms of
thinking in education, such as analyzing and evaluating concepts, processes,
procedures and principles, rather than just remembering facts (rote learning).
It is most often used while designing educational, training, and learning
processes.
It provides an important framework for teachers to use to focus on higher
order thinking (HOT). By providing a hierarchy of levels, this taxonomy can
assist teachers in designing performance tasks, crafting questions for conferring
with students, and providing feedback on student work.
This resource is divided into different levels each with Keywords that
exemplify the level and questions that focus on that same critical thinking
level. Questions for Critical Thinking can be used in the classroom to develop
all levels of thinking within the cognitive domain (development of our mental
skills and the acquisition of knowledge). The results will be improved attention
to detail, increased comprehension and expanded problem-solving skills. Use
the keywords as guidelines to structuring questions and tasks. Finish the
Questions with content appropriate to the learner.

1. KNOWLEDGE (Remembering)
Recall/regurgitate facts without understanding. Exhibits previously learned
material by recalling facts, terms, basic concepts and answers.
Key Words:
Choose List Quote Repeat Trace
Copy Listen Read Reproduce What
Define Locate Recall Retell When
Duplicate Match Recite Select Where
Find Memorise Recognise Show Which
How Name Record Spell Who
Identify Observe Relate State Why
Label Omit Remember Tell Write

Questions:
! Can you list three ....? ! What is ...?
! Can you recall ...? ! When did ...?
! Can you select ...? ! When did ........ happen?
! How did .......... happen? ! Where is ... ?
! How is ....? ! Which one ....?
! How would you describe ...? ! Who was ... ?
! How would you explain ...? ! Who were the main ...?
! How would you show ...?

5
2. COMPREHENSION (Understanding)
To show understanding finding information from the text. Demonstrating
basic understanding of facts and ideas.
Key Words:
Ask Estimate Indicate Purpose Summarise
Cite Explain Infer Relate Translate
Classify Express Interpret Rephrase
Compare Extend Match Report
Contrast Generalise Observe Restate
Demonstrate Give examples Outline Review
Discuss Illustrate Predict Show

Questions:
! Can you explain what is ! How would you summarise ...?
happening ... what is meant ...? ! What can you say about ...?
! How would you classify the type ! What facts or ideas show ...?
of ...? ! What is the main idea of ...?
! How would you compare ...? ! Which is the best answer ...?
contrast ...? ! Which statements support ...?
! How would you rephrase the ! Will you state or interpret in your
meaning ...? own words ...?

3. APPLICATION (Applying)
To use in a new situation. Solving problems by applying acquired knowledge,
facts, techniques and rules in a different way.

Key Words:
Act Classify Experiment with Manipulate Select
Administer Connect Group Model Show
Apply Construct Identify Organise Simulate
Associate Correlation Illustrate Perform Solve
Build Demonstrate Interpret Plan Summarise
Calculate Develop Interview Practice Teach
Categorise Dramatise Link Relate Transfer
Choose Employ Make use of Represent Translate

Questions:
! How would you use ...? understanding of ...?
! What examples can you find to ...? ! What approach would you use to
! How would you solve ........... using ...?
what you have learned....? ! How would you apply what you
! How would you organise ........... learned to develop ...?
to show .....? ! What other way would you plan to
! How would you show your ...?

6
! What would result if ...? ! What facts would you select to
! Can you make use of facts to ...? show ....?
! What elements would you choose ! What questions would you ask in
to change ...? an interview with ...?

4. ANALYSIS (Analysing)
To examine in detail. Examining and breaking information into parts by
identifying motives or causes; making inferences and finding evidence to
support generalisations.
Key Words:
Analyse Discover Function Omit Research
Appraise Discriminate Group Order See
Arrange Dissect Highlight Organise Select
Assumption Distinction In-depth discussion Point out Separate
Breakdown Distinguish Inference Prioritize Similar to
Categorise Divide Inspect Question Simplify
Cause and effect Establish Investigate Rank Survey
Choose Examine Isolate Reason Take part in
Classify Find List Relationships Test for
Differences Focus Motive Reorganise Theme

Questions:
! What are the parts or features of ...? How is .......... related to ....?
! Why do you think ...? What is the theme ...?
! What motive is there...? Can you list the parts ...?
! What inference can you make ...? How would you classify...?
! What conclusions can you draw...? How would you categorise...?
! Can you identify the different parts ...? What evidence can you find ...?
! What is the relationship between ...? What is the function of ...?
! Can you make a distinction between ...? What ideas justify ...?
5. SYNTHESIS (Creating)
To change or create into something new. Compiling information together in a
different way by combining elements in a new pattern or proposing
alternative solutions.
Key Words:
Adapt Delete Happen Modify Solve
Add to Design Hypothesise Original Speculate
Build Develop Imagine Originate Substitute
Change Devise Improve Plan Suppose
Choose Discover Innovate Predict Tabulate
Combine Discuss Integrate Produce Test
Compile Elaborate Invent Propose Theorise
Compose Estimate Make Up Reframe Think
Construct Experiment Maximise Revise Transform
Convert Extend Minimise Rewrite Visualise
Create Formulate Model Simplify
7
Questions:
! What changes would you make to ! What way would you design ...?
solve ...? Suppose you could ........ what
!
! How would you improve ...? would you do ....?
! What would happen if ...? How would you test ....?
!
! Can you elaborate on the reason !Can you formulate a theory for ...?
...? Can you predict the outcome if
!
! Can you propose an alternative...?
...?
! Can you invent ...? How would you estimate the
!
! How would you adapt ........ to results for ...?
create a different.....? What facts can you compile...?
!
! How could you change (modify) ! Can you construct a model that
the plot (plan)....? would change....?
! What could be done to minimise ! Can you think of an original way
(maximise)...? for the ...?

6. EVALUATION (Evaluating)
To justify. Presenting and defending opinions by making judgements about
information, validity of ideas or quality of work based on a set of criteria.
Key Words:
Agree Criteria Evaluate Justify Select
Appraise Criticise Explain Mark Support
Argue Debate Give reasons Measure Test
Assess Decide Good Opinion Useful
Award Deduct Grade Perceive Validate
Bad Defend How do we know? Persuade Value
Choose Determine Importance Prioritise Why
Compare Disprove Infer Prove
Conclude Dispute Influence Rate
Consider Effective Interpret Recommend
Convince Estimate Judge Rule on

Questions:
! Do you agree with the ! How could you determine... ?
actions/outcomes ...? ! What choice would you have made...?
! What is your opinion of ...? ! What would you select...?
! How would you prove/disprove ...? ! How would you prioritise...?
! Can you assess the value/importance ! What judgement would you make
of ...? about ...?
! Would it be better if ....? ! Based on what you know, how would
! Why did they (the character) choose you explain...?
...? ! What information would you use to
! what would you recommend....? support the view...?
! How would you cite to defend the ! How would you justify...?
actions ...? ! What data was used to make the
! How would you evaluate...? conclusion...?

8
1 Computer Network

A. Tick [ü] the correct answer.


1. b. 2. c. 3. b. 4. b.
5. b. 6. a.
B. Write ‘T’ for True and ‘F’ for False statements.
1. F 2. T 3. T 4. F
5. F 6. F 7. T

C. Fill in the blanks.


1. Node 2. Client 3. Servers
4. Switch 5. Physical 6. Fiber-optic
D. Define the following.
1. Protocol: It is a set of rules that outlines characteristics of how two
devices communicate. Without protocol, two devices may be
connected but cannot transfer or exchange the data.
2. Router: A router is a device that connects multiple computers
together and transmits data to its correct destination on a network
through a process known as routing.
3. FTP: FTP stands for File Transfer Protocol. It is a set of rules that
allows file uploading to and downloading from other computers on
the Internet. Web page developers often use FTP to upload their
web pages to a web server.

E. Differentiate between the following.


1. POP3: POP3 or Post Office Protocol version 3 allows the users to
view, access and manipulate the messages after downloading or
storing them on their computer.
IMAP: IMAP or Internet Message Access Protocol allows the users to
view, access and manipulate the messages on the mail server
without downloading them on their computer.
2. Hub: A hub offers a central location where all the cables on a
network meet. It allows us to connect multiple computers to a single
network.

9
Switch: A switch is a device that provides a central point for cables
in a network. A switch receives data from many directions and then
forwards it to one or more destinations.
3. Star Topology: In a star network, all the computers and devices
(nodes) on the network connect to a central device, thus forming a
star.
Ring Topology: In a ring network, a cable forms a closed loop (ring)
with all computers and devices arranged along the ring.
4. Twisted-pair cable: It consists of one or more twisted-pair wires
bundled together. Each twisted-pair wire consists of two separate
insulated copper wires that are twisted together and are color-coded
for identification. Landline phone networks and LANs often use
twisted-pair cable.
Coaxial cable: It consists of a single copper wire surrounded by at
least three layers. First one is an insulating material, second is a wire
mesh, and third is a plastic outer coating. On coaxial cables, data
travels through a copper wire. Cable TV network wiring uses coaxial
cable.

F. Answer in 1-2 sentences.


1. A computer network is a collection of computers and devices
connected by communication channels.
2. Network topology refers to the layout structure of connected
computers and devices on a network.
3. Network communication channels are the medium through which
the data, instructions, or information can travel.
4. Types of wireless transmission media include: Infrared, Broadcast
radio, Cellular radio, Wi-Fi, Microwaves, Communication satellite.

G. Answer Briefly.

1. For successful computer communication, we need the following


components:
i. Sender: It is a sending device that initiates to send data,
instructions or information.
ii. Communications Channel or Transmission Media: It is a medium
through which the data, instructions, or information can travel.
iii. Receiver: It is a receiving device that accepts the transmission of

10
data, instructions, or information.
iv. Protocol: It is a set of rules that outlines characteristics of how
two devices communicate.
2. There are many types of network: Local Area Network (LAN),
Metropolitan Area Network (MAN), Wide Area Network (WAN) and
Personal Area Network (PAN).
LAN is a network that connects the computer and the devices in a
limited geographical area.
MAN is a network that connects the Local Area Networks in a
metropolitan area, such as a city or a town.
WAN is the vastest of all types of network. It may cover a whole
country or world such as Internet.
PAN is a network that connects personal devices like laptop,
smartphones, digital cameras, printers, etc. in an individual's
workspace using wired and wireless technology.
3. The two types of network architecture are as follows:
i. Peer-to-Peer Network: A network of two or more computers that
uses same type of programs to communicate and share data is
called Peer-to-Peer network.
ii. Client/Server Network: A network in which one or more
computers are designated as server(s), and the other computers
on the network, called clients, can request services from the
server is known as client/server network.

H. Application Based Question.


Yes, A can access the computer of B.
He can use LAN (Local Area Network) to do so.

11
2 Access - Tables and Forms

A. Tick [ü] the correct answer.


1. b. 2. c. 3. b.
4. b. 5. c.

B. Write ‘T’ for True and ‘F’ for False statements.


1. T 2. T 3. F
4. T 5. F

C. Fill in the blanks.


1. Match Case 2. Datasheet, Design 3. Filtering
4. Duplicate 5. Relationships

D. Differentiate between the following.


Sorting: Sorting means arranging the records in a particular order,
ascending or descending.
Filtering: Filtering means to display only the records containing data of
interest.
E. Answer in 1-2 sentences.

1. Toggle filter option is used to display all the records of tables.


2. Relationships are created and managed in a special database view
called Relationships window.
3. A Form is a view of one or more tables that are designed to be used
for data entry and editing.
4. Split form is used to show the form as well as datasheet for the
table in one window.

F. Answer Briefly.

1. Find feature allows us to quickly search data in tables, queries and


forms for specified task in a large database. Replace feature allows
us to replace the data with some other text we specify.

12
2. Filtering by selection: It is used to display only those records that
contain exactly the same data.
Filtering by form: It enables us to filter by multiple fields and specify
criteria for as many fields as we like.

G. Application Based Question.


She can create relationship between Table 1 and Table 3 because both of
these tables have one common field (Emp_no).

13
3 Access - Query & Report

A. Tick [ü] the correct answer.


1. b. 2. a. 3. a.
4. c. 5. b. 6. a.
B. Write ‘T’ for True and ‘F’ for False statements.
1. T 2. F 3. T
4. F 5. F
C. Fill in the blanks.
1. Design View, Wizard 2. Criteria 3. Wildcards
4. Sort Key 5. Detail Lines

D. Differentiate between the following.


Major key: If you are sorting on more than one field, the more
important field is called the major key, which is also called the primary
sort key.
Minor key: The less important field is called the minor key, which is also
called the secondary sort key.
E. Answer in 1-2 sentences.
1. A Query is simply a question or a basic tool for retrieving
information from our database.
2. When more than one criterion might be available to satisfy the data
we are searching, this type of criterion is called Compound criterion.
3. We need sorting when we want to arrange records in a logical order,
with similar data grouped together.
4. A report is a database object used to display data from a query
and/or table in an appealing way.

F. Answer Briefly.
1. Wildcards are symbols that represent any character or combination
of characters. Access provides two special wildcards. First one is the
asterisk (*) which represents any collection of characters. Other
wildcard symbol is the question mark (?), which represents any
individual character.

14
2. The components of Report are:
i. Page header: The portion at the top of the report called page
header contains a custom title.
ii. Detail lines: The detail lines, which are the lines that are printed
for each record, contain only those fields you specify and in the
order you specify.
iii. Record source: The tables or queries that provide the underlying
data are also known as the record source of the report.

G. Application Based Question.


Fields that can be added to the table are:
Library Card No., Roll No., Student's Name, Class, Section, Name of
book(s) issued, Issuing Date, and Returning Date

15
4 HTML - Form, Multimedia & CSS

A. Tick [ü] the correct answer.


1. b. 2. a. 3. c.
4. c. 5. a.
B. Write ‘T’ for True and ‘F’ for False statements.
1. T 2. T 3. F
4. T 5. F

C. Fill in the blanks.


1. Reset 2. Autoplay 3. Loop
4. Inline 5. Indent

D. Define the following.


1. Text Box: A text box is used in form for a single line of input.
2. Password Box: A password box is used to enter confidential or secret
information, such as credit card number or password.

E. Differentiate between the following.


1. Checkbox: It is used in a form to select more than one choice from a
list of choices.
Radio Button: it is used in a form to select only one choice from a
list of choices.
2. Internal Style Sheet: It is used to define a style for a single HTML
page.
External Style Sheet: It is used to define formatting and layout
instructions, and then link it to more than one HTML documents.

F. Answer in 1-2 sentences.


1. Forms in HTML are used to collect information from the people who
visit our website.
2. Various input control of the Form can be a Radio button, a Check
box, a Submit button, a Reset button, a Text box, Text area and
Password.

16
3. Multimedia elements can be added into HTML pages to enhance our
site message, illustrate a product or service, or simply entertain.
4. DIV tag is used for defining a section of our document. It is used to
group large section of HTML elements together and format them
with CSS.

G. Answer Briefly.
1. The attributes used to control audio and video tags in HTML5 are
AUTOPLAY, CONTROLS, SRC, LOOP, HEIGHT, and WIDTH.
2. Cascading Style Sheets or CSS, allows you to control an element
within a single web page or throughout an entire website. For
example, changing the heading color in a website that contains
twenty pages is easier to do with CSS instead of changing the
individual heading.
3. A Submit button is used to send the information to the appropriate
location for processing.
A Reset button is used to clear any input that was entered in the
form, resetting the input controls back to the default.

H. Application Based Question.


Abhinav should use Radio control in his form because only one of the four
choices needs to be selected by the website visitor.

17
5 Cloud Computing

A. Tick [ü] the correct answer.


1. a. 2. b. 3. c.
4. a. 5. c.

B. Write ‘T’ for True and ‘F’ for False statements.


1. T 2. T 3. T
4. F 5. T 6. F

C. Fill in the blanks.


1. Hybrid 2. ‘Pay as you go’ 3. Paas
4. Google Drive 5. Trash 6. Logout

D. Define the following.


1. laaS: Iaas stands for Infrastructure as a Service and it provides IT
infrastructure like servers, storage, networks operating systems over
the Internet on a pay as you go basis.
2. SaaS: SaaS stands for Software as a Service and it is a method for
delivering software applications over the Internet, on demand and
typically, on a subscription basis.
3. PaaS: PaaS stands for Platform as a Service and it provides a cloud
platform and allows developers to create, test, and run their
program, website, web app, etc. without having to purchase the
hardware and software.

E. Differentiate between the following.

Public Cloud: A public cloud is not proprietary of any organization. The


services provided in these clouds can be accessed by any organization or
individual.
Private Cloud: A private cloud is a proprietary architecture subscribed to
by an organization. It provides hosted services to the users within the
organization.

18
F. Answer in 1-2 sentences.
1. Cloud computing is a technology that provides resources and
services over the Internet. Instead of accessing these resources and
services locally on your computer, you access them on the cloud.
2. Service providers provide various types of cloud computing services
for free or charge a fee from the computer user. Amazon Web
Services (AWS), Google Cloud and Microsoft Azure are the main
service provider of cloud.
3. Google Drive is cloud storage developed by Google. We can store
our files online in Google Drive and can access them from anywhere
in the whole world.
G. Answer Briefly.

1. People are choosing cloud computing for a variety of reasons:


Accessibility: Data and applications are available worldwide from any
computer or device with an Internet connection.
Cost Savings: The expense of software and high-end hardware shifts
away from the user.
Scalability: Provides the flexibility to increase or decrease computing
requirements as per need.
2. The characteristics of cloud computing are:
i. ON DEMAND SELF SERVICE: Users are able to get the cloud
computing resources for almost any type of workload on
demand and without requiring human interaction, mostly done
though a web-based self-service portal.
ii. ELASTICITY: With cloud computing, companies can scale up the
resources as computing need increases and scale down the
resources as computing need decreases.
iii. PAY PER USE: In the cloud computing, our computer resources
are measured, and we only pay for the resources and workloads
we use.
4. The advantages of Google Docs are:
i. Google Docs is free online Office suite for the individual user
and it doesn't need to be installed on any computer.
ii. We can access the applications and all documents wherever we
have access to the Internet and a web browser.

H. Application Based Question.


Riya can use Google Docs which is free online Office suite for completing
her project.

19
6 E-Commerce & Blogging

A. Tick [ü] the correct answer.


1. c. 2. b. 3. a.
4. b. 5. b.

B. Write ‘T’ for True and ‘F’ for False statements.


1. T 2. F 3. T
4. T 5. T

C. Fill in the blanks.


1. M-Commerce 2. C2C 3. Shopping Cart
4. Blogosphere 5. Lock

D. Define the following.


1. Shopping Cart: While shopping online using e-commerce, we usually
add the items that we want to purchase in a virtual shopping cart
that keeps track of these items and their quantity.
2. COD: COD stands for Cash on delivery, it means we can pay cash for
the goods we have purchased only after the goods are delivered to
us.

E. Differentiate between the following.


B2B: It stands for Business-to-Business e-commerce. It is the sale or
exchange of products and services that takes place between firms.
B2C: It stands for Business-to-consumer e-commerce. It consists of the
sale of products or services from business concern to the general public
or end users.

F. Answer in 1-2 sentences.


1. Electronic Commerce (e-commerce), also known as e-business, is a
financial business transaction that occurs over an electronic network.
2. E-retailing is the process in which retailers use the web to sell their
products and services.

20
3. Mode of payment means the way by which we will pay the amount
online to complete financial business transaction. e.g. Debit card,
Credit card, etc.
4. Blogging is an exciting and dynamic medium by which we can
publish our ideas, opinions, and stories online.

G. Answer Briefly.
1. Advantages of e-commerce are:
! Buyers have the convenience of shopping at home.
! Customers can read reviews about the products from other
users.
! Door step delivery of the desired goods and services.
! The web offers low overhead expenses for a seller.
! Free or low-cost marketing activities for a seller.
2. On the website, look for ‘https’ instead of ‘http’ in the site address,
and also look for a security icon, such as ‘VeriSign Secured’. In the
web browser, look for a lock icon in the browser window. In some
browsers, the address bar shows a green background for a secure
site.
3. A blog is a website that consists of a frequently updated collection
of information and entries. Most blogs focus on a particular topic or
subject area. Blogs have become an important means of worldwide
communication.
i. Businesses create blogs to communicate with employees,
customers, and vendors.
ii. Teachers create blogs to collaborate with other teachers and
students.
H. Application Based Question.

Riya can use the COD (Cash On Delivery) facility to pay for the books
that she wants to buy

21
7 Artificial Intelligence (AI)

A. Tick [ü] the correct answer.


1. b. 2. c. 3. b. 4. c.
5. a.
B. Write ‘T’ for True and ‘F’ for False statements.
1. T 2. F 3. T 4. T
5. F

C. Fill in the blanks.


1. Deep blue 2. John McCarthy 3. Deep
4. AI 5. Rideshare

D. Answer in 1-2 sentences.


1. Artificial Intelligence (AI) is a way of making a computer, a robot, or
software think intelligently, in a similar manner as humans think.
2. Machine learning is used in computers because it is an application of
Artificial Intelligence that provides capability to computers to
automatically learn and improve from experience without being
explicitly programmed.
3. Deep learning is the subset of machine learning. It is a function of
Artificial Intelligence that imitates the workings of the human brain
in processing data and creating patterns for making decisions.
4. i. Safety and security of citizens, particularly women, children and
the elderly.
ii. Efficient urban mobility and public transport.

E. Answer Briefly.

1. For many years, scientists had been trying to make a machine with
artificial intelligence that was close to human intelligence. But
achieving artificial intelligence wasn't so simple as large volume of
data was not easily available. After several disappointments in AI,
the period from 1974-93 came to be known as the AI winter.

22
2. Computational thinking is a set of problem-solving methods that
involve expressing problems and their solutions in ways that a
computer could execute.
3. Virtual personal assistants are used to answer the queries and
perform actions via a voice command. Google Assistant is an
artificial intelligence-powered virtual assistant that is primarily
available on mobile and smart home devices.
4. i. AI systems should be safe and secure throughout their
operational lifetime.
ii. AI systems should be designed and operated so as to be
compatible with ideals of human dignity, rights, freedom, and
cultural diversity.

F. Application Based Question.

This game is based on Artificial Intelligence.

23
8 App Development

A. Tick [ü] the correct answer.


1. b. 2. c. 3. b.
4. a. 5. c. 6. b.
B. Write ‘T’ for True and ‘F’ for False statements.
1. T 2. F 3. T
4. T 5. F 6. T

C. Fill in the blanks.


1. Mobile web app 2. Social Networking 3. Recent
4. Unknown Sources 5. Viewer 6. Test

D. Write the uses of the following.


1. Communication Apps: Communication apps enable us to impart or
interchange thoughts, opinions, or information by speech, writing, or
signs. For example: WhatsApp and Skype.
2. Educational Apps: Educational apps make children learning more
interactive and also help the teachers in organizing a teaching
process. For example: Ted and Coursera

E. Differentiate between the following.


Native App: These are developed for a particular platform or device.
Apps built for systems like iOS, Android, Windows phone, Blackberry
cannot be used on a platform other than their own.
Web App: These are actually websites that provide a user with
experience similar to native apps. Web apps are not deployed to an app
store; rather, they are deployed to a web server and user can access
them in a web browser.

F. Answer in 1-2 sentences.


1. An app, sometimes called application software, consists of programs
designed to make users more productive and/or assist them with
personal tasks. It can run on our mobile phone, computer, Internet
or any other electronic device.

24
2. Apps are divided into the following three main types.
i. Native App ii. Web App iii. Hybrid App
3. App Store is a store for Apple’s devices like iPhone and iPad, which
contain many app categories as well as subcategories for different
purposes.
4. Components Palette, Viewer, Components Lists, and Components
Properties are the four areas of a Component Designer window.

G. Answer Briefly.

1. Hybrid apps are the combination of both native and web app
elements. These apps are cross-platform, meaning the same code
can run on many mobile platforms. This approach often saves
development time and costs, but may not provide a consistent user
experience or fast performance on all devices.
2. MIT App Inventor is an open-source web application originally
provided by Google, and now maintained by the Massachusetts
Institute of Technology (MIT). It lets us develop apps or applications
for Android phones using a web browser. It is very easy and user
friendly.
3. Blocks Editor is used to instruct the components what to do and
when to do it.
Main parts of Blocks Editor are: Built-in Blocks, Components Blocks,
Block Viewer, Trash and Backpack.

H. Application Based Question.

Saanvi should run the app on a connected Android device or emulator.

25
9 Python - Introduction

A. Tick [ü] the correct answer.


1. a. 2. c. 3. c.
4. a. 5. b.

B. Write ‘T’ for True and ‘F’ for False statements.


1. T 2. T 3. F
4. T 5. F

C. Fill in the blanks.


1. Interactive 2. Indentation 4. Keywords
3. Literals 4. Sequence
D. Define the following.
1. Character Set: Character set is a set of valid characters that a
language can recognize.
2. Token: A token is the smallest element of a program that is
meaningful to the interpreter.
3. Operator: Operators are the special symbols that carry out
arithmetic and logical computations.
E. Differentiate between the following.
1. Interactive mode: This mode is best for small programs and for the
beginners. But we can't save the commands in it for future use.
Script mode: It enables us to create, edit and run Python source file.
It enable us to save the commands for future use.
2. Relational Operators: Also known as comparison operator, these
operators are used to compare the values.
Assignment Operators: These operators are used to assign value to
the variables.
F. Answer in 1-2 sentences.
1. Python was founded by Guido Van Rossum in early 1990's.
2. Data types are used to define the type of value a data can contain.
3. Input function is used for defining standard input operations in
Python.

26
Syntax: input ([prompt])
4. Print function is used for defining standard output operations in
Python.
Syntax: print (expression/constant/variable)
5. Operator precedence determines the order in which expressions are
evaluated, so you can predict the outcome of an expression.

G. Answer Briefly.

1. i. Python is easy to use and learn.


ii. Python is an open source language and available free.
iii. Python is considered a portable language as it can run equally
on different platforms such as Windows, Linux, Unix, Macintosh,
etc.
iv. Python is a high-level programming language and it is user
friendly in nature for developer.
2. Data types are used to define the types of value a data can contain.
Data types are of two types: Numbers (Integer, Float, Complex) and
Sequence (String, List, Tuple).
3. Variables can be declared by any name or even alphabets like a, aa,
abc, etc. For example, to create a variable name ‘rose’, we use an
assignment operator (=) which assigns what information the variable
should be labelled as
Example: >>> rose = 100
4. Python mainly contains syntax and logical errors. Syntax error will
occur when the rules and regulations of computer language are
violated. Logical errors or semantic errors cause the program to
behave incorrectly, but they do not usually crash the program.

H. Application Based Question.


To convert the string into a number, Riya should use int() or float()
function.

27
10 Python - Control Structures

A. Tick [ü] the correct answer.


1. a. 2. b. 3. b.
4. a. 5. b.

B. Write ‘T’ for True and ‘F’ for False statements.


1. T 2. F 3. T
4. T 5. T 6. F

C. Fill in the blanks.


1. Multipath 2. Nesting 3. Iterates
4. While 5. Continue

D. Define the following.


1. Conditional Branching: When the branching is based on a particular
condition, it is known as conditional branching.
2. Unconditional Branching: If branching takes place without any
condition, it is known as unconditional branching.

E. Differentiate between the following.


1. For Loop: The for loop is used to repeat a block of statement until
there is no item in Object (String, List, Tuple or any other object).
While Loop: It is used to repeat a block of statements for a given
number of times until the given condition is false.
2. Break Statement: Break can be used to unconditionally jump out of
the loop. It terminates the execution of the loop.
Continue statement: It is used to tell Python to skip the rest of the
statements of the current loop block and to move to next iteration
of the loop.

28
F. Answer in 1-2 sentences.
1. Control structures are used to control or change the flow of
execution of the program.
2. When a program breaks the sequential flow and jumps to another
part of the code, it is called branching. Conditional and
Unconditional are two types of branching.
3. The elif is short else if. We use elif statement to check for multiple
expression. If the condition of if is false, it check the condition of
next elif block and so on. If all the conditions are false, body of else
is excuted.
4. Syntax of for loop is:
for variable in Object:
Statement 1
Statement 2
....................
Statement n
G. Answer Briefly.
1. The if...else statement is an extension of the simple if statement. The
if..else statement evaluates test expression and will execute body of
if only when test condition is True. If the condition is False, body of
else is executed.
Syntax:
if test expression:
Body of if
else:
Body of else
2. The while Loop in Python is used to repeat a block of statements for
a given number of times, until the given condition is False.
Syntax: while test_expression:
Body of while

H. Application Based Question.


Break statement should be used to unconditionally jump out of the loop
in a program.

29
Worksheet - 1
Chapters 1 - 5

A. Tick [ü] the correct answer.


1. c. 2. b. 3. a. 4. c.
5. a. 6. a.

B. Write ‘T’ for True and ‘F’ for False statements.


1. T 2. T 3. F 4. T
5. F 6. F

C. Fill in the blanks.


1. Coaxial 2. Protocol 3. Design 4. Field
5. reset 6. Autoplay 7. Google Drive

D. Define the following.


1. FTP: FTP or File Transfer Protocol is a set of rules that allows file
uploading to and downloading from other computers on the
Internet.
2. TCP/IP: It stands for Transmission Control Protocol/Internet Protocol.
It is a network protocol that defines how the information or
messages are routed from one end of a network to the other,
ensuring the data arrives correctly.
3. SMTP: It stands for Simple Mail Transfer Protocol and is an e-mail
protocol for sending e-mail messages across the Internet.
4. Relationships Window: It is used to create and manage relationships
between tables in a special database view.
5. Major key: While sorting more than one field, the more important
field is called the major key or the primary sort key.
6. Password Box: We can create a password box that allows users to
enter confidential or secret information, such as credit card number
or password.

30
7. Radio Button is used in a form for only one choice from a list of
choices.
8. Resource pooling allows cloud providers to pool large-scale IT
resources to serve multiple cloud consumers.
9. SaaS stands for Software as a Service and it is a method for
delivering software applications over the Internet, on demand and
typically, on a subscription basis.

E. Differentiate between the following.


1. LAN: It is a network that connects the computers and the devices in
a limited geographical area such as home, school computer
laboratory, office building or closely positioned group of buildings.
WAN: It is the vastest of all types of network. The network may
cover, say, a whole country or the world, such as Internet.
2. Broadcast radio: It is a wireless transmission medium that distributes
radio signals through the air over long distances, such as between
cities, regions, and countries, and short distances, such as within an
office or home.
Cellular radio: It is a wireless transmission medium that is used for
mobile communications. Several categories of cellular radio
transmissions exist, such as 1G, 2G, 3G, 4G and 5G.
3. Peer-to-Peer Network: A network of two or more computers that
uses same type of programs to communicate and share data is
called Peer-to-Peer network.
Clients/Server Network: A network in which one or more computers
are designated as server(s), and the other computers on the
network, called clients, can request services from the server is
known as client/server network.
5. AND criteria: In a query, an AND combination finds records where
both criteria are met.
OR criteria: In a query, an OR combination finds records where at
least one of the criteria is met.
6. Asterisk (*) wild card: In a query, it represents any collection of
characters. Thus, R* represents the letter R, followed by any
collection of characters.

31
Question mark (?) wild card: In a query, it represents any individual
character. Thus R?vi represents the letter R, followed by any single
character that follows the letter, such as in 'Ravi'.
7. Hybrid Cloud: It is a combination of private and public cloud. The
services are offered to a limited and well-defined number of users.
Community Cloud: In community cloud, the services are offered to a
group of organizations and community having common interests.

F. Answer the following questions.

1. A server, sometimes called the host computer, controls access to the


hardware and software on the network, and provides a centralized
storage area for programs, data, and information. Some servers are
called dedicated servers which perform a specific task. For example,
a file server, print, database server, network server and web server.
2. Wireless transmission media send communication signals through
the air. Many people use this media because it is more convenient
than installing cables. Types of wireless transmission media used in
communications include infrared, broadcast radio, cellular radio,
microwaves, and communication satellites.
3. The various types of basic forms are:
i. Multiple Items Form: In the Multiple-Items form, you will see
multiple records appear at the same time in it.
ii. Datasheet Form: Datasheet Form just looks like a regular
datasheet, but it is actually a form. This form is useful when you
want to show a datasheet on a subform.
iii. Split Form: Split Form shows two parts- Upper part shows the
Form, and lower part shows the datasheet for the table.
iv. Modal Dialog Form: This form is useful for creating navigational
menu systems. This form looks just like a dialog box, but it is
actually a form.
4. Text Data criteria is used in a query to usually look for the records
by entering some condition in text format. For example, we might
want to find the list of students who are learning Kathak dance. To
enter criteria, enter the name of dance in the Criteria row in the
design grid below the field name to which the criterion applies.

32
5. The capability of querying a database is one of the most powerful
database features. In other words, a Query is simply a question
represented in a way that Access can understand. If you want to find
the answer to a question, you will have to create a corresponding
query first. Once your query has been created, you instruct Access
to run the query that is to perform the steps through which you can
obtain your answer. The answer will then be displayed in the
Datasheet View.
6. The <audio> tag supports WAV, Mp3, and Ogg. The <video> tag
supports MP4, WebM, and Ogg.
7. The attributes used to control audio and video tags are:
AUTOPLAY: Plays the audio or video file automatically when the web
page is loaded
CONTROLS: Display the controls on the web page
SRC: Specifies the URL of audio or video file
LOOP: Replays the file once it is finished
HEIGHT: Specifies the height of the video player displayed on the
web page
WIDTH: Specifies the width of the video player displayed on the web
page
8. Advantages of frames:
i. Frames are useful for larger websites when we want to keep
certain information in view at all times.
ii. Frames display a navigation bar in one location, without the
need of navigational links on every page in our website.
Disadvantages of frames:
i. Users might not see our frame content as we envision, as the
monitor resolution might vary.
ii. Although newer browsers support the use of frames, some older
versions do not.
9. Cascading Style Sheets or CSS allows you to control an element
within a single Web page or throughout an entire Website.
You can link every page in your Website to a single style sheet. Any
changes you make to the style sheet formatting are reflected in
every HTML document linked to the sheet. By storing all the
formatting information in one place, you can easily update the
appearance of your site pages in one fell swoop. This can be a real
time-saver if your site consists of lots of pages.

33
10. Style sheets are made up of rules, and each rule has two distinct
parts: a selector and a declaration. The selector specifies the
element to which you want to apply a style rule, and the declaration
specifies the formatting for the selector. For example, in the style
rule H2 {color: silver}, the selector is H2 and {color: silver} is the
declaration.
11. There are many advantages of cloud computing:
i. It is probably the most cost-efficient method to use, maintain
and upgrade. It eliminates the capital expense of buying
hardware and software and other infrastructure.
ii. It allows users to get unlimited storage capacity for storing
information.
iii. It allows users to access files on the Internet from any computer
that has Internet access.
12. Types of Cloud computing are:
i. Private Cloud: A private cloud is a proprietary architecture
subscribed to by an organization. It provides hosted services to
the users within the organization.
ii. Public Cloud: A public cloud is not proprietary of any
organization. The services provided in these clouds can be
accessed by any organization or individual.
iii. Hybrid Cloud: It is a combination of private and public cloud. In
a hybrid cloud, the services are offered to a limited and well-
defined number of users.
iv. Community Cloud: In community cloud, the services are offered
to a group of organizations and community having common
interests.

34
Worksheet - 2
Chapters 6 - 10
A. Tick [ü] the correct answer.
1. a. 2. c. 3. c. 4. b.
5. c. 6. a. 7. c.

B. Write ‘T’ for True and ‘F’ for False statements.


1. T 2. T 3. F 4. T
5. F 6. T 7. F
C. Fill in the blanks.
1. Microblog 2. E-retail 3. 1990's
4. Native 5. String 6. Reserved
7. Indentation 8. Loops
D. Define the following.
1. M-Commerce: The e-commerce that takes place using mobile devices
is called m-commerce (mobile commerce).
2. COD: It means Cash On Delivery service, it allows us to pay for the
goods we have purchased only after the goods are delivered to us.
3. Shopping Cart: The shopping cart allows the customer to collect the
items for making purchase. Items in the shopping cart can be added,
deleted, or even saved for a future visit.
4. Deep learning: It is the subset of machine learning. It is a function of
AI that imitates the working of human brain in processing data and
creating patterns for making decisions.
5. Cortana: Cortana is a personal digital assistant developed by
Microsoft. It works for Windows 10, Windows 10 Mobile, Microsoft
Band, Surface Headphones, Xbox One, iOS, Android, etc.
6. Emulator: It is a hardware or software that enables one computer
system to behave like another computer system.
7. Delimiter: Delimiters are the characters and their combinations in
expressions, list, dictionary, and various statements.
8. Literals: They are the data items which never change their value
throughout the program run.
9. Branching: When a program breaks the sequential flow and jumps to
another part of the code, it is called branching.

35
E. Differentiate between the following.

1. Online Auction: It is the most popular vehicle for C2C e-commerce,


in which one consumer auctions goods to other consumers. If you
are interested, you place a bid on an item. The highest bidder buys
the items.
Online Catalog: It is the website where an e-retailer displays the
products. It contains descriptions, graphics, and sometimes product
reviews.
2. Google Assistant: It is an artificial intelligence-powered virtual
assistant developed by Google that is primarily available on mobile
and smart home devices.
Apple Siri: It is an artificial intelligence-powered virtual assistant
developed by Apple, which is similar to Google Assistant and is
primarily available on Apple devices.
3. Arithmetic Operator: Arithmetic operators are used to perform
mathematical operations. For example: Addition and concatenation
in strings, Subtraction, etc.
Logical Operator: Logical operators perform Logical AND, Logical OR
and Logical NOT operations. For example: or, and, etc.
4. Nested if statement: The syntax of Nested if statement is-
if condition:
if condition:
statements
else:
statements
else:
statements

elif statement: The syntax of elif statement is-

if test expression:
Body of if
elif test expression:
Body of elif
else:
Body of else

F. Answer the following questions.


1. While shopping online using e-commerce, we usually add the items
that we want to purchase in a virtual shopping cart that keeps track

36
of these items and their quantity. Most websites have a View Cart
link that enables you to view the contents of your shopping cart.
2. Bank plays an important role while doing E-retail transaction. When
customer is ready to complete the purchase, he/she proceeds to the
checkout. At this time, he/she enters his/her personal and financial
information through a secure web connection. The transaction and
the financial data are automatically verified at a banking website. If
the bank approves the transaction, the customer receives a
confirmation of the purchase.
3. In 1955, John McCarthy, a young Assistant Professor of Mathematics
at Dartmouth College, in Hanover, New Hampshire, decided to
organize a group to clarify and develop ideas about thinking
machines. This was followed by a period from 1974-93, known as
the AI winter, in which no developments in AI were made. IBM’s
Deep Blue developed in 1997, IBM’s question-answering system,
Watson, developed in 2011 and Apple’s A13 chips developed in 2019
for their iPhone 11 were other significant contributions made to AI.
4. The future of AI seems extremely promising and has opened up the
possibility of robotic companions. Automated transportation allowing
driverless cars, development of smart cities, smart homes, robots
taking over hazardous jobs that were being done by humans till now,
addressing climatic change problems and improved elder care
through home robots are some of the potential uses of AI in future.
5. Blocks Editor is used to instruct the components what to do and
when to do it. Main parts of Blocks Editor are given below:
i. Built-in Blocks: This area shows blocks that are always available
to us to use in our app.
ii. Components Blocks: This area shows blocks that we have chosen
for our app.
iii. Block Viewer: This is the place where we assemble the blocks
for our app.
iv. Trash: It is used for deleting blocks which are not needed.
v. Backpack: We can drag blocks into the Backpack icon so that we
can use them later by dragging items out of the backpack and
use them between the apps. Backpack retains a copy of our
blocks even when we exit App Inventor.

37
6. If we want to use an app on mobile device, we need to run it. We
can run any app from the Apps screen of Android mobile phone. We
can run multiple apps at once. Each app appears full screen, so we
work in a single app at a time, but we can switch from one app to
another as needed. We can switch apps quickly by using the Recent
Apps list.
7. Interpreter plays an important role because Python is an interpreted
language which executes the code line by line at a time. This makes
the debugging process easy. It converts source code written by user
into object code.
8. Script mode enables us to create and edit Python source file. It is
the normal mode where the scripted and finished files are run.
9. We can convert a string value into an integer value by using int() or
float() functions.
Example: >>> int('23')
23 #entered value 23 is a number, not a string
>>> float('23')
23.0 #entered value 23.0 is a float
10. The while Loop in Python is used to repeat a block of statements for
given number of times, until the given condition is False.
Syntax: while test_expression:
body of while

Example:
# Python While Loop - To Print PM Publishers 5 times
i=0
while i<5:
print ("PM Publishers")
i=i+1

38

You might also like